hack tips; post links
Hack tips; post links
Other urls found in this thread:
hackertyper.net
youtube.com
youtube.com
youtu.be
tutorialspoint.com
kitsploit.com
youtu.be
z57whuq7jaqgmh6d.onion
youtu.be
humblebundle.com
youtu.be
youtu.be
youtu.be
twitter.com
need links
reporting...
who's the new target?
jon snow here
pls someone new she is boring
Juicebox standing by
>
I'd link you to Reddit but I hate you and I'm lazy
reporting in
Bumpin
i remember Ustream that was goat
so many threads
-js
Next target?
Hey guys I blocked you from that last chat. don't try that again.
where is the link
stickam was best
u that flash kid lol
someone explain this thread
Ur underage is showing
i just provided the thread, i'm no operator just a lurker.
waiting for instructions myself
hackers doing hacky things
haha reported you to your isp.
sounds interesting, im also very high
Is the fun over?
...
we need a target. Everybody on standby.
post a link cucks
no
Bump if you are a lurker while others search
meh is something, bump
Do this go on youtube search in "hi" sort y livestream boom there you go
New as fuck
everyone is here fags
youtube.com
Bumpin
ok bump
yes current raid even tho its ass
please no we already said no goblins
Because none of you have a fucking clue what OS's beyond windows do,and you barely have a cursory knowledge of windows itself.
almost puked watching her, wtf is wrong with her face what the FUCK
kek
-js
she said praise the sun
EVERYBODY ABORT HERES A GOOD ONE youtu.be
chill out gold wolf
here you go mate
lol canned ass i died
snap?
XXXX5 CHILL HAHAHAAHA
This kid is a fuckin screacherr
new target? this chick is boring as fuck
so..legible.
This is all to hide shit on your own machine. If they're at your house taking your shit, you've already fucked up.
Step one: go mobile. Go out to an area that you can get wifi. either something open or crackable (There are some wifi with WEP/still attackable by pixie/reaver/bully etc). Never useyour home connection, even with a VPN
Even with a hacked wifi, use a vpn. hidemyass will accept a shitload of gift cards you can buy at grocery stores/drug stores/etc. Wear a hat and glasses, be aware of cameras. Stores usually keep video for about a month before recycling the footage. If they do trace it back to you, hopefully a month will have passed, and if it hasn't, they'll just see a guy paying cash with a hat anyone could wear.
Change your mac address. If they subpoena records or otherwise figure out who you are, they can track your mac address back to whoever purchased the card/laptop by going to the manufacturer and then going to the store to get those records. Kali can be set to automatically change your mac address every time you boot up, but it can fail, always check.
Only check for ONE type of vulnerability. Any external IP is going to get absolutely hammered by bot traffic every day, but full port scans and vulnerability scans get a special flag.
Realize that most scans only result in a notification to the ISP. Most VPN/Hosting companies don't even bother reading those unless they start getting calls.
The anti-forensics should go more into how to clean the logs on remote systems. Getting rid of event logs, editing httpd/IIS logs etc. That's a whole other thing.
Learn the OS's. Can't stress this enough.
Learn to code. Really important. Start with something simple like PHP or Python and move forward from there.
etc. you get the drill.
You guys made him cry
the more im here the more i just want to actually talk to her and just ask normal ass questions.
-js
Hoodrat: youtu.be
SHE REPLIES TO COMMENTS
these kids are making me nostalgic af, i gotta stop this theyre too innocent
what does she look like? sounds like a nigger
Indian youtu.be
There is a Microsoft Sally like voice that reads your comments Minecraft
youtu.be
no more kawaii candy? whats next
i think its ded
She started up another stream
im commenting but no halp from bros
link?
i got "placed in timeout" like a little baby child.
recruits
You will only see the hidden text after you delete /system32 from your PC's Windows folder. We have all done it. Report back when complete and after you've read the hidden threads too
fine ill quit, im drunk in vodka and cant sleep, have anything i can do?
>thinking your safe while using a botnet os
There's probably some else in there to screw you over if you aren't careful.
Here's a compilation of links from pastebin UY7RxEqp
No quitting, just right click on System32 and click delete. Say yes when you see a prompt and then restart your pc. Talk soon!
/thread
Who are you? Are you the famous hacker named Sup Forums? Kidding, only post of value here so far. Thanks for your input
stfu give a music link fag
QUADS!!
Quads replying to trips... noice one
Who are you? Are you the famous hacker named Sup Forums? Kidding, only post of value here so far. Thanks for your input
And you know you should respect Quads like the words of God.
do what youre told
...
...
anything better?
I've considered writing a beginners guide.
But I am extremely lazy and drunk a lot, so motivation goes out the window.
You'll see beginners guides that focus entirely on web applications.
But going at web apps, especially if you are a beginner, is fairly impractical. A larger target is going to have an infosec department that regularly scans for low hanging fruit, as well as more app-based to get rid of things like SQL injection. Finding them, and hunting down their injection points is a really time consuming process. You can reduce it with something like skipfish or sqlninja, but it's going to show up in logs.
Depending on the org, and how they treat developers, you can tell how likely they're open to top 10 type of application vulnerabilities. If you go look on glassdoor, and you see comments like "too many procedures and hoops to jump through" from devs, they have a matured application change control process and are less likely to have low hanging fruit. Devs are little precious unicorns and if they don't have immediate access to production and the newest tools, and can push their changes out quickly, they throw a little tantrum and threaten to leave.
Startups are your best target because they usually give in to devs demands, and don't have much in the way of a budget for an infosec guy. Usually it's 1-2 people who are at the mercy of their infrastructure people.
Also, look at companies that have a strong marketing department. If their marketing department/Business Intelligence group is larger than their security group, then they are a prime target.
Check for ftp on those types of orgs. They want to share information as quickly and easily as they can, and email always limits by file size.
The best way inside any company is a phishing campaign. Don't send it to everyone. They start chatting to one another and you get found out quickly. Do a targeted approach to a small selection.
Make moar memes of this shit, m8s