ALERT!
Click here to register with a few steps and explore all our cool stuff we have to offer!

Jump to content



Photo

Hacking info dump for beginners.


  • Please log in to reply
Hacking info dump for beginners.

#21

regain
regain
    Offline
    0
    Rep
    2
    Likes

    Advanced Member

  • PipPipPipPip
Posts: 120
Threads: 1
Joined: Sep 03, 2019
Credits: 0
Four years registered
#21

thx bro its looks good


  • 0

#22

Cyxt
Cyxt
    Offline
    0
    Rep
    0
    Likes

    Advanced Member

  • PipPipPipPip
Posts: 84
Threads: 1
Joined: Dec 12, 2019
Credits: 0
Four years registered
#22

Thank you for this. It helps make things a little easier!


  • 0

#23

AlDunia
AlDunia
    Offline
    0
    Rep
    1
    Likes

    Lurker

Posts: 7
Threads: 0
Joined: Feb 21, 2020
Credits: 0
Four years registered
#23

Dump 1 of 3.

 

Some quick tid bits.
RAT = Remote administration tool. Allows you to control the targets computer.

 

>>You can be hacked just by your IP address if you have vulnerable programs running.
>> Programs that auto-update can be hacked server side and then an infected update pushed.
>>You can be hacked just by visiting a URL even today - new exploits for browsers are found all the time.
>>RFID cloning is a thing. You can clone peoples badges/tags to enter their buildings within a few seconds.
>>In the majority of cases it is better to unplug or turn off your internet if you are infected. Some on reboot will encrypt your entire computer. Leaving it on and not letting any data escape while being able to use a USB with any virus removal tools you need is preferred.
>>USBs and phones can infect your computer in only a few seconds acting like a keyboard (rubber ducky is the attack) they will quickly type out a payload and take passwords or put a virus on your computer extremely fast.
>>A MiTM or Man in the middle attack is when your wifi is hacked or you are using a hacked/monitored connection - Through this an attacker can see http requests including images, passwords, websites you visit and more. They can also swap out files you download with infected files or craft malicious links that autodownload or infect.

 

 

Thanks


  • 0

#24

RodJiro
RodJiro
    Offline
    0
    Rep
    0
    Likes

    New Member

Posts: 24
Threads: 0
Joined: Feb 19, 2020
Credits: 0
Four years registered
#24

TY


  • 0

#25

professorr9110
professorr9110
    Offline
    0
    Rep
    1
    Likes

    Junkie

Posts: 283
Threads: 0
Joined: Apr 13, 2020
Credits: 0
Four years registered
#25
Awe Brother

  • 0

#26

acoustic4ever
acoustic4ever
    Offline
    0
    Rep
    0
    Likes

    Lurker

Posts: 5
Threads: 0
Joined: May 06, 2020
Credits: 0
Three years registered
#26
good read

  • 0

#27

yilej63985tast
yilej63985tast
    Offline
    0
    Rep
    0
    Likes

    Lurker

Posts: 5
Threads: 0
Joined: Jun 18, 2020
Credits: 0
Three years registered
#27

thabks mate for theknowledge


  • 0

#28

tecos43189tast
tecos43189tast
    Offline
    0
    Rep
    0
    Likes

    Lurker

Posts: 6
Threads: 0
Joined: Jun 18, 2020
Credits: 0
Three years registered
#28

thanks bro


  • 0

#29

brycer1001500
brycer1001500
    Offline
    0
    Rep
    0
    Likes

    Member

Posts: 34
Threads: 0
Joined: Jun 10, 2020
Credits: 0
Three years registered
#29

Dump 1 of 3.

 

Some quick tid bits.
RAT = Remote administration tool. Allows you to control the targets computer.

 

>>You can be hacked just by your IP address if you have vulnerable programs running.
>> Programs that auto-update can be hacked server side and then an infected update pushed.
>>You can be hacked just by visiting a URL even today - new exploits for browsers are found all the time.
>>RFID cloning is a thing. You can clone peoples badges/tags to enter their buildings within a few seconds.
>>In the majority of cases it is better to unplug or turn off your internet if you are infected. Some on reboot will encrypt your entire computer. Leaving it on and not letting any data escape while being able to use a USB with any virus removal tools you need is preferred.
>>USBs and phones can infect your computer in only a few seconds acting like a keyboard (rubber ducky is the attack) they will quickly type out a payload and take passwords or put a virus on your computer extremely fast.
>>A MiTM or Man in the middle attack is when your wifi is hacked or you are using a hacked/monitored connection - Through this an attacker can see http requests including images, passwords, websites you visit and more. They can also swap out files you download with infected files or craft malicious links that autodownload or infect.

123165465


  • 0

#30

bratan27
bratan27
    Offline
    0
    Rep
    0
    Likes

    Advanced Member

Posts: 95
Threads: 0
Joined: Jun 20, 2020
Credits: 0
Three years registered
#30

ty


  • 0


 Users browsing this thread: