/r/blackhat

Photograph via snooOG

Focused on the ongoing discussion and documentation of vulnerabilities and exploitation techniques. Please read the rules before posting here.

We seek to discuss vulnerability and exploitation theory and [evading] the countermeasures used to deter exploitation. This is also a place to discuss general blackhat rules, etiquette and culture. We welcome:

  • Writeups (not CTF or HTB)/talks detailing new vulnerabilities or techniques (there should be enough information to reproduce the exploit/technique)

  • Proof of concepts of old vulnerabilities or techniques

  • Projects

  • Hypothetical questions

 

Rules:

  • Be excellent to each other.

  • No Solicitation

  • Stay on topic.

  • Avoid self-incriminating posts.

  • Pick a good title.

  • Do not post non-technical articles.

  • Ideally, the content should be original, we don't care about your crappy ARP poisoner or Kaspersky's latest scam.

  • No pay / signup walls.

  • No coin miners

  • No "Please hack X" posts

  • Well thought out and researched questions / answers only.

  • If your project is not free / open source it does not belong.

  • Please limit your posts (we don't want to read your blog three times a week).

  • If you want to submit a video, no one wants to listen to your cyberpunk music while you copy/paste commands into kali terminals.

The mods are ban-happy, you have been warned.

 

Other helpful links:

/r/blackhat

89,162 Subscribers

0

cryptojacking

looking for someone with expierience in coding message me asap. dc: .bigbosman.

0 Comments
2024/05/12
18:51 UTC

3

Disrupting phishing site

Hello everyone, last night a friend of mine got a message with a link from a friends hacked instagram account. It took him to a blatantly obvious phishing page, he knew it was a phishing page so he didnt continue. Anyway it got me thinking, can i just bruteforce the fake login page (with hydra for example) and send 100000 fake emails and passwords to the phishers servers?

If so:

Can they easily tell these accounts apart from actual victims?

If I were to do it should I get those auto IP adress switchers and set an arbitrary timer in between requests?

Should I use tor?

Will this actually do anything lol because they can make a simple script that validates the received logins?

Will this increase the amount they have to pay for them to operate the server (assuming i send a lot of requests)?

FYI:

  1. I'm pretty sure they used cloudfare
  2. the phishing site is already offline and so I cant do anything even if I wanted to, this is just for future reference
3 Comments
2024/05/12
16:17 UTC

0

Can I get a bit of help from someone familiar with telegram and botnets 💲

Looking to get in touch with someone can help with a couple projects plz send DM not sure if I can post here?

0 Comments
2024/05/12
13:59 UTC

0

Can a black hat hacker help me with this?

Is there someone who knows how to trace the date, time and location of when a google account was created?

19 Comments
2024/05/10
13:10 UTC

0

USA Based Cyber Mercenaries

I've had an idea to form a black hat mercenarie group that goes after Russia and China cartels etc. Would this be possible.

37 Comments
2024/05/09
17:05 UTC

0

Compromised iPhone

I’m completely tech illiterate, I’m on my 4th iPhone and everywhere I go people seem to know more than they should. At work they are blatant about it. Everyone tells me I’m paranoid. I’m not I notice funny things while I’m on the net. My battery drains fast and my apps crash a lot. I’ll type in passcode and a digit will delete and I have to retype several times. Not every time I put it in. It’s like whoever is doing this wants me to know. Idc I have nothing to hide but I’m trying to educate myself. Any information on how this is possible is greatly appreciated. I’m stoner and click on things I shouldn’t sometimes. Is it possible to get them out? I’ve factory reset and changed Apple ID thanks

97 Comments
2024/05/08
14:58 UTC

0

Tell me your opinions

Is it still possible to gain remote access control over someone’s pc using malware?

25 Comments
2024/05/07
13:30 UTC

0

Looking for division7 crew members

Good morning,

When I was a kid, I used to hang around with a crew called Division 7. Their old website, which is no longer available, can be seen on the Wayback Machine at the following link: https://web.archive.org/web/20021201082501/http://division7.us/. I am currently trying to reconnect with the members of this crew and would be delighted if anyone has any information or knows someone from the team who could help me get in touch. Any assistance would be greatly appreciated.

Members and their nicknames :

pHrail

saymyname

smurf

barbiedoll

Tekn|CaL

shells

Redhat

optics

bringer

cr0n

Arsenic

shad0w

nexxt

elu1d

digitalrat

xanax

click

razor

Thank you for your time.

2 Comments
2024/05/07
09:46 UTC

0

How does Temu know I am not a new user??

Hi there, I’ll get straight to the point. I had 20 USD coupons with no minimum cart value. I knew it won’t work again on the same phone or the same WiFi so I bought a new android phone, went to a friend’s house that never made a temu account or order, used his WiFi to create the account with the new phone, new location, new gmail/google play account and guess what? THEY STILL TELL ME I am a returning user. I keep thinking there was some leak, somewhere, somehow but when I go over the steps, there isn’t any other than using a link from a facebook ad from an old Facebook account. Copy pasted that ad link so I could get the coupon, there is no other way to get it for my country.

So what is it? The ad link? Is the ad link tailored for my specific Facebook account thus them knowing I am a returning user? Does anyone have any insight into this?

17 Comments
2024/05/05
14:54 UTC

0

Hacking sensei

Hey folks,

I'm a 16-year-old who's been coding professionally at a few companies with Python, JavaScript, HTML/CSS, C#, C++, and C. Yep, I've got my hands in quite a few cookie jars! 🍪 Now, I'm very interested in diving deeper into hacking and cybersecurity.

I've poked around with hacking tools on my own, but I reckon having a mentor would turbocharge my learning. So, if you're a seasoned hacker or cybersecurity whiz who doesn't mind taking on a young padawan, I'd love to tag along for the ride.

Just to be clear, I'm all about using these skills for good, not evil... or a mix of both :)

If you're up for sharing your wisdom, hit me up.

29 Comments
2024/05/01
18:31 UTC

23

Is hacking like it was a few decades a go still possible?

Hey everyone,

I've been diving into the history of hacking lately, particularly impressed by the era around 2009 when high-profile hacks seemed to be more prevalent. Back then, it felt like government sites, public figures' information, and all sorts of data breaches were more common.

But as I look at the cybersecurity landscape today, it seems like things have changed. Governments and companies have ramped up their defenses, technologies have advanced, and there's a lot more awareness about cybersecurity.

So, I'm curious: Is hacking like it was in 2009 still possible today? Can someone with the right skills and tools still pull off those kinds of large-scale breaches? Or has the game fundamentally changed?

What are your thoughts? Have you witnessed any recent hacks that remind you of the Wild West days of hacking?

33 Comments
2024/04/29
17:05 UTC

20

Damn Vulnerable Android Components

The sieve reborn!

Damn Vulnerable Android Components (DVAC) is an educational Android application intentionally designed to expose and demonstrate vulnerabilities related to various Android components such as Activities, Intents, Content Providers, and Broadcast Receivers. It is structured as a password manager application to manage and store passwords securely (LOL).

Licensed under open source GNU GPLv3.

Download now - https://github.com/zinja-coder/Damn-Vulnerable-Android-Components

Official Writeup - https://medium.com/@zinjacoder/the-dvac-damn-vulnerable-android-components-the-sieve-apk-reborn-writeup-e096600ec27d

0 Comments
2024/04/28
21:25 UTC

2

How A Blackbox Target Turned To Whitebox With Recon

0 Comments
2024/04/28
05:06 UTC

8

Recently, my FB account was accessed from the USA, wondering how this happened

14 Comments
2024/04/27
15:38 UTC

1

Getting personal information

Hi. Is it possible to get information about a person by knowing just his first name and mobile number? Thanks.

3 Comments
2024/04/27
10:28 UTC

15

Why were sites such as weleakinfo.com seized for selling leaked personal information but other sites that do the same thing such as dehashed.com and snusbase.com allowed to remain up?

This article https://www.zdnet.com/article/fbi-seizes-weleakinfo-a-website-that-sold-access-breached-data/ was written about how weleakinfo was seized because it was selling leaked personal information. However, there are still other sites that remain up to this day such as dehashed and snusbase, even though you could apparently buy leaked personal information on those sites too. Why is this?

Why does the law not apply to these other sites the same way it applied to weleakinfo?

9 Comments
2024/04/25
00:56 UTC

16

Free useful cybercrime intelligence tools around info-stealers infections from over 25,000,000 compromised computers around the world

Search for Compromised Corporate & Supply Chain Infrastructure - Discover whether your, or your vendor’s corporate infrastructure has been compromised

Search for Compromised Employees, Customers, Users & Partners - Search specific email addresses to find out if your employees, customers, users, partners or yourself have been compromised by info-stealing malware

Search for Compromised Android App Users - Find out whether users of your Android app have had their credentials compromised

Find them here - https://hudsonrock.com/free-tools

And a free API you can integrate into existing services - https://cavalier.hudsonrock.com/docs (integrated into services like IntelTechniques, Osint Industries, etc)

https://preview.redd.it/kv83mqbe2ewc1.png?width=2400&format=png&auto=webp&s=813a582096fbc7ba8b3c591b13c293e6d7b73b9c

1 Comment
2024/04/24
08:34 UTC

3

How to trace back from where invalid/botted traffic is coming from on Youtube? (Desperate)

I have a Youtube channel and I am 100% sure it is being botted, and unfortunately Youtube is beyond useless when it comes to helping out whatsoever obviously, so I'm trying to do this myself. My channel does pretty well monthly, but some videos I post get this random spike of like 10,000 views in an hour, and it's all from third world countries (India, Vietnam, Egypt) with an average view duration of like 9 seconds. Keep in mind my audience is mostly from the US/UK/Canada and watches at least 5 minutes of every video. It is automatically killing the videos I post.

I can see where the external traffic is from, the sites, but they don't exist, I'm fairly sure they're just domains for proxies. How can I uncover this, I have family to take care of so its actually going to destroy my livelihood at this rate..

10 Comments
2024/04/23
00:16 UTC

0

How long would it take for a government agency to break tor circuit (all 3 nodes)

How long would it take to crack all tree nodes by an adversary like a government.

11 Comments
2024/04/22
16:55 UTC

0

Need help to stop privacy breach

Long story short, my privacy has been breached probably through WiFi and now all my internet devices and home and personal appliances, applications are tapped. I’m not technically smart when it comes to networking but changing my WiFi isn’t helping idk if throwing my phone away and creating new online identities will help. What’re some basic and intermediate things I can do to help block what is going on.

3 Comments
2024/04/21
23:04 UTC

1

Hashcat noob

Any recommendations for tutorials ? I got the wordlists just can’t seem to get the commands right

1 Comment
2024/04/19
23:57 UTC

4

Event Analysis and Logs Parsing with Splunk | TryHackMe Fixit

We discussed Splunk configuration files namely, props.conf,transforms.conf,fields.conf,inputs.conf, indexes.conf and mentioned the purpose and goal of each one of them. Splunk configuration files are used to configure log parsing rules, fields extraction and set log storage and retention rules. Use these config files when Splunk doesn’t extract the fields properly from the provided log file or when you have unique format for your logs. For demonstration purposes, we solved TryHackMe Fixit challenge that lets us to practically test our knowledge in configuring log parsing rules with Splunk.

Writeup

Video

0 Comments
2024/04/15
09:38 UTC

0

[ Removed by Reddit ]

[ Removed by Reddit on account of violating the content policy. ]

57 Comments
2024/04/14
04:14 UTC

0

If you had to hack at home what would be your setup to stay anonymous?

So if you had to use your own home internet and computers or laptops how would you setup your network, vms and etc. Share what you would do to keep yourself anonymous and from being caught out.

42 Comments
2024/04/12
03:49 UTC

Back To Top