ALERT!
Click here to register with a few steps and explore all our cool stuff we have to offer!

Jump to content



Photo

Hacking info dump for beginners.


  • Please log in to reply
Hacking info dump for beginners.

#41

HHsenapi
HHsenapi
    Offline
    0
    Rep
    0
    Likes

    Advanced Member

  • PipPipPipPip
Posts: 132
Threads: 1
Joined: Nov 12, 2020
Credits: 0
Three years registered
#41

wawww grape


  • 0

#42

mnbasdf
mnbasdf
    Offline
    0
    Rep
    0
    Likes

    Member

  • PipPipPip
Posts: 59
Threads: 0
Joined: Nov 05, 2020
Credits: 0
Three years registered
#42

thanks brother


  • 0

#43

obama21212
obama21212
    Offline
    0
    Rep
    19
    Likes

    Addicted

Posts: 245
Threads: 1
Joined: Aug 14, 2020
Credits: 0
Three years registered
#43

nice


  • 0

#44

Zer0r123456
Zer0r123456
    Offline
    0
    Rep
    0
    Likes

    New Member

Posts: 21
Threads: 0
Joined: Nov 27, 2020
Credits: 0
Three years registered
#44

lets see


  • 0

#45

gangshit322
gangshit322
    Offline
    0
    Rep
    2
    Likes

    Veteran

  • PipPipPipPipPipPipPip
Posts: 1067
Threads: 0
Joined: Nov 26, 2020
Credits: 0

Three years registered
#45

poggers, I'll drop a like if it works


  • 0

#46

Wakaka00
Wakaka00
    Offline
    0
    Rep
    0
    Likes

    Advanced Member

Posts: 120
Threads: 0
Joined: Dec 24, 2020
Credits: 0
Three years registered
#46
Thanks dude really helpful

  • 0

#47

kwanza
kwanza
    Offline
    0
    Rep
    0
    Likes

    Lurker

Posts: 3
Threads: 0
Joined: Dec 29, 2020
Credits: 0
Three years registered
#47

Dump 1 of 3.

 

Some quick tid bits.
RAT = Remote administration tool. Allows you to control the targets computer.

 

>>You can be hacked just by your IP address if you have vulnerable programs running.
>> Programs that auto-update can be hacked server side and then an infected update pushed.
>>You can be hacked just by visiting a URL even today - new exploits for browsers are found all the time.
>>RFID cloning is a thing. You can clone peoples badges/tags to enter their buildings within a few seconds.
>>In the majority of cases it is better to unplug or turn off your internet if you are infected. Some on reboot will encrypt your entire computer. Leaving it on and not letting any data escape while being able to use a USB with any virus removal tools you need is preferred.
>>USBs and phones can infect your computer in only a few seconds acting like a keyboard (rubber ducky is the attack) they will quickly type out a payload and take passwords or put a virus on your computer extremely fast.
>>A MiTM or Man in the middle attack is when your wifi is hacked or you are using a hacked/monitored connection - Through this an attacker can see http requests including images, passwords, websites you visit and more. They can also swap out files you download with infected files or craft malicious links that autodownload or infect.

thanks, now im even more paranoid! i do own a rubber ducky it is a great tool!


  • 0

#48

lasvegas10050
lasvegas10050
    Offline
    0
    Rep
    0
    Likes

    Addicted

  • PipPipPipPipPip
Posts: 157
Threads: 0
Joined: Jul 07, 2020
Credits: 0

Three years registered
#48
Thank you

  • 0

#49

kv9h
kv9h
    Offline
    0
    Rep
    0
    Likes

    New Member

Posts: 10
Threads: 0
Joined: Jan 04, 2021
Credits: 0
Three years registered
#49
interesting

  • 0

#50

bossminer
bossminer
    Offline
    0
    Rep
    1
    Likes

    Member

Posts: 28
Threads: 0
Joined: Jan 03, 2021
Credits: 0
Three years registered
#50

Dump 1 of 3.

 

Some quick tid bits.
RAT = Remote administration tool. Allows you to control the targets computer.

 

>>You can be hacked just by your IP address if you have vulnerable programs running.
>> Programs that auto-update can be hacked server side and then an infected update pushed.
>>You can be hacked just by visiting a URL even today - new exploits for browsers are found all the time.
>>RFID cloning is a thing. You can clone peoples badges/tags to enter their buildings within a few seconds.
>>In the majority of cases it is better to unplug or turn off your internet if you are infected. Some on reboot will encrypt your entire computer. Leaving it on and not letting any data escape while being able to use a USB with any virus removal tools you need is preferred.
>>USBs and phones can infect your computer in only a few seconds acting like a keyboard (rubber ducky is the attack) they will quickly type out a payload and take passwords or put a virus on your computer extremely fast.
>>A MiTM or Man in the middle attack is when your wifi is hacked or you are using a hacked/monitored connection - Through this an attacker can see http requests including images, passwords, websites you visit and more. They can also swap out files you download with infected files or craft malicious links that autodownload or infect.

thanks


  • 0


 Users browsing this thread: