HACKING THREAD Whats possible and whats not

CASHAPP

Superstar
Supporter
Joined
Aug 12, 2012
Messages
26,417
Reputation
-2,484
Daps
48,149
:plscop:

Learn how to do email address spoofing, craft emails so that they look official, have the links in the email redirect towards a site that looks legit but isn't, lift the info they provide.

Yall always speak in generic terms to noobs. Type to use computer terminology with old ladies to explain something

Lift the info from WHERE?
 

Obreh Winfrey

Truly Brehthtaking
Supporter
Joined
Nov 18, 2016
Messages
20,852
Reputation
25,540
Daps
132,000
Yall always speak in generic terms to noobs. Type to use computer terminology with old ladies to explain something

Lift the info from WHERE?
:snoop: Re-read what I said. Craft false emails that look official that contain malicious links. Wherever you link them to, have them give up personal information. You've lifted the information from your malicious website that YOU have to make. So if you're really serious about this then you have to learn a few things.

It might be smart to write a JavaScript keylogger so that you can skim their info if they figure out something is fishy before they submit.
 
Joined
Oct 19, 2013
Messages
429
Reputation
190
Daps
900
Hacking these days is really easy. Basically, if someone has the time and resources, they can gain access to anything that they wish. So the goal of someone trying to protect a particular asset is to assume someone is trying to get access to it already and to essentially make it too time intensive and expensive for them to gain access. If it would take you $1M to build a rig to brute force my password in 90 days time... ill change them every 60 days. And when you can build these rigs for less, ill increse my password complexity.

But honestly, most hackers these days arent doing crazy sophisticated shyt to get into these companies you see on the news. Literally, like in the mr robot episode, i drop a usb drive in the lobby, and wait for someone to stick it into a computer. Or, i look at the open jobs, find the email for the hiring manager, then i send them a word resume with a marco embeded. They open it, and i own their computer. shyt, i might pay for malware on a local pizza shops website and wait for employees to hit that. There are just so many ways that dont involve some sophisticated hacking technique these days. Its crazy.
 

Beegio

You ni66as don't exist we eat filet mignon
Joined
May 29, 2012
Messages
3,443
Reputation
1,170
Daps
7,986
Phishing/spear phishing emails is imo the most common way because the average user is likely to click on them. Them dropbox linked emails with encryption payloads aint no joke.
 
Joined
Mar 23, 2017
Messages
889
Reputation
350
Daps
2,164
Most serious hackers are looking at me typing this right now but they aren't using a key logger or anything that primitive. You won't know if Elliot is looking at you because he's using some next level shyt. As @Obreh Winfrey mentioned physical hacking is underrated and under-suspected.

I'm sure many hackers don't really do brute force attacks anymore they just corrupt someone on the inside to open the damn door or slip the key under the door.

The cheesy low level Indian hackers will create dumb e-mail spoofs "CHASE CREDIT CARD SERVICES PLEASE OPEN IMMEDIATELY AND ENTER YOUR PASSWORD" ass bullshyt along with West African scammers.

Like I was looking on CL for apartments and saw something too good to be true sure enough it was and led me to call some bullshyt South African numbers to make it seem "A legit place within Africa" and make believe they are a Afrikanner or White man of Dutch origin born in Africa.

The biggest hacks to pay attention to is hacks involving YOUR OWN PERSONAL CONSENT. Read carefully everything you do and agree to online.

Remember hackers are more concerned with getting caught so don't expect like the old days where you open the wrong link and your computer is locked down - It doesn't work that way anymore.
 
Top