Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Hacking

Name: Anonymous 2012-05-29 20:32

Good references

Name: Anonymous 2012-06-02 22:21

install gentoo

Name: :| 2012-06-03 17:14

Name: Gunman316 2012-06-03 23:14

Кто будитъ ddos-ить?

Name: Anonymous 2012-06-03 23:59

Нахуй иди, русский.

Name: Anonymous 2012-06-04 0:00

213123

Name: Why Hackers Hit Smaller Sites 2013-05-01 11:32

When it comes to active attacks, hackers tend to target sites that have a lot of traffic.
 
When a hacker is manually selecting a site to attack, they want maximum exposure.
 
That's why Anonymous hacked the main Scientology website and Paypal.
 
That kind of action gets you into the news.
 
But this new attack is different.
 
It's an automated attack.  A computer botnet is seeking to create a server botnet.
 
Basically they want to take over your server.
 
And in that type of attack they want QUANTITY.
 
The more servers they have under their control the better.
 
So smaller sites like yours are actually a JUICER target.
 
Smaller sites have less security.  And each one has it's own server and IP.
 
So don't try to think that having a small site means you won't get noticed.

Name: Anonymous 2013-06-23 9:52

Code Breakers Bletchley Park's Lost Heroes : http://vimeo.com/31185786

Name: Anonymous 2013-06-26 12:23

>>9
In your firewall logs you will mostly find hundreds of unsolicited connection attempts per day looking for weak services - mostly probing TCP port 445 (Samba), but also Telnet, SSH, WWW, DNS, SMTP, SIP, and others. Most probes tend to come from China and various other Asian/3rd world countries, but are not limited to that.

Moral: attempts to connect to services you aren't actually running are clearly hostile probes, not so much directed at you, but part of sweeps of IP ranges in an effort to find a potentially weak service and thus an attack vector to take over a system/network. IF you do run services and open/forward ports, make absolutely sure the service itself as well as the network infrastructure and configuration are as secure as possible.

Name: Anonymous 2013-07-09 21:23

This hacker give his 'namecard' when one of an website is hacked by him : http://www.facebook.com/foyshal.bappy

Name: Anonymous 2013-07-15 0:39

https://www.hellboundhackers.org/

fairly good starting point

Name: isac 2013-07-15 3:25

test

Name: Anonymous 2013-07-25 11:21

If you can build an robot like this, then you stand a chance : http://io9.com/this-obsessive-robot-can-crack-your-phones-pin-in-less-893829227

Name: Anonymous 2013-07-27 10:14

>>15
I don't know why anyone would want to crack the password of a GPS.
Pleb reporter. I also like how he said this could happen to android in less than 20 hours but not "Apple"

Name: Anonymous 2013-08-15 7:43

2600 The Hacker Quarterly : http://www.2600.com

Name: Anonymous 2013-08-15 13:37

I am on the Hactivist group Anonymous.

Knowledge is Free
We are Anonymous
We are Legion
We do not Forgive
We do not Forget
Expect us

Anonymous is way bigger than 10 nerds good at computers that sit in their moms basement trying to "Hack"

I am one of many thousands who believe in perusing good causes

We are bigger than the Government

We are better than the Government

We are Anonymous

Name: Ivanna 2013-08-15 17:31

Simple request here...anyone know how to get into a Facebook account? I've tried looking it up which only lead to site with dumb downloads and programs that don't work. ):

Name: dsds 2013-08-16 12:07

Name: Anonymous 2013-08-21 16:42

Hackers in de kont neuken is de beste hobby iemand hebben kan

Name: Anonymous 2013-08-21 20:32

>>9
>>18
I'm not sure if you're kidding or you just went full retard.
Anyways OP, learn how to program (zsh, Perl, C, ASM), networking, OS theory, use some UNIX like OS, read exploits, etc.

Name: Anonymous 2013-09-12 2:12

Name: Anonymous 2013-09-25 13:00

German group claims iPhone 5S hack


It says phone's security system fooled by fake fingerprint


NEW FEATURE: The fingerprint scanner of the iPhone 5S being tested.


A GERMAN hacking group has claimed that it has successfully bypassed the fingerprint-based security system which is used to unlock Apple's new iPhone 5S.

   A spokesman for the Chaos Computer Club said the group managed to dupe the phone's biometric sensor into accepting a fingerprint created with a household printer and wood glue.

   "A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5S secured with TouchID," read the announcement on the group's website.

   "This demonstrates - again - that fingerprint biometrics is unsuitable as [an] access control method and should be avoided," it added.

   Mr Dirk Engling, who belongs to the group, told The Associated Press on Monday that the exploit was documented with several videos so independent experts can verify it.

   A Youtube video appears to verify the claim.

   He added that the hardest part was getting hold of an iPhone 5S, which went on sale in Germany last week.

   Apple didn't respond to repeated requests for comment.

   But another industry leader which has invested heavily in fingerprint and other forms of biometric security was not so shy.

   "Do you think it's easy to first take a high-resolution picture of your fingerprint and then steal your mobile?" Fingerprint Cards chief executive officer Johan Carlstroem asked in a telephone interview with Bloomberg news agency.

   "Wouldn't it be better to pick a gun and press it against your temple, and ask you to unlock it?"

   But his reply did not address the direct claim that the iPhone 5S sensor had been breached.

Predictions

   Sales at Fingerprint Cards and Precise Biometrics have soared more than fivefold since the end of last year, partly because of predictions that all smartphones will eventually be equipped with fingerprint-recognition technology after Apple added such sensors to its iPhone 5S.

   The company expects that "all Tier-One smartphones... will have a fingerprint sensor in their flagship models by the end of next year".

   Apple has claimed the 5S phone's biometric system is superior to all other known systems, and seems to claim it is essentially unbreakable.

   This is an extraordinary claim, since every known fingerprint sensor can be beaten with tactics similar to those used by the German hackers.

   Apple has also said there is no way anyone could steal the recorded fingerprint of a user, because it is encrypted inside the phone, and not on Apple's servers

Name: sofie 2013-10-04 19:56

the guy or people behind this email adress stole 1000 euro's from me, thanks to a very clever copy of paypal emails, please if anyone feels like it (im not so handy with computers) can you screw this motherf**** over for me and hack into his mailbox? i would love to get my hands on that one... here's the adress: Karingeets@gmail.com

Name: Anonymous 2013-10-05 7:50

>>25
Yea, thats no fun. Especially in these days when we certainly need to watch out for the "Big brother" and other nasty companies, that do all kinds of nasty chanengans.

>>23 A hacker is something anyone with atleast some knowledge of just computing can be, it is not hard at all for anyone to become one. I happen to know only a few sets of things, which made me into a Hacker, so that link of yours is irrelevant.

Name: Anonymous 2013-10-05 12:38

>>26

You never mention skills do you know? Is it trolling hacking here or brag hacking? At least I learn something from >>23

Name: Anonymous 2013-10-07 22:06

Name: Anonymous 2013-12-08 4:03

A 14-year-old was hired by Microsoft after he hacked into the Modern Warfare 2 servers! : http://seriousfacts.com/14-year-old-hired-microsoft-hacked-modern-warfare-2-servers

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List