/r/HowToHack

Photograph via snooOG

Welcome! This is your open hacker community designed to help you on the journey from neophyte to veteran in the world of underground skillsets. Ask, Answer, Learn.

Visit us on discord

https://discord.gg/ep2uKUG

HowToHack Community

3rd Party Links

3rd Party Challenges

Related Subreddits:

Security Advisories

CVE, CWE, NVD, WVE

Download Linux

http://iso.linuxquestions.org/


We teach you how to do it, use it at your own risk.

/r/HowToHack

489,073 Subscribers

1

[Repost] Magnetic Card Reader for Linux Devices

Hello.

I wanted to take an MSR605x as a magnetic card reader, but there is no support for Linux on the software/drivers side. I would liI wanted to take an MSR605x as a magnetic card reader, but there is no support for Linux on the software/drivers side. I would like to know if you know of another magnetic reader with software/driver running under Linux and open source, preferably. THANKSI wanted to take an MSR605x as a magnetic card reader, but there is no support for Linux on the software/drivers side. I would like to know if you know of another magnetic reader with software/driver running under Linux and open source, preferably. THANKS ke to know if you know of another magnetic reader with software/driver running under Linux and open source, preferably. THANKS

0 Comments
2025/02/01
21:07 UTC

0

Please can someone help me!

Hi, I'm trying to crack into my deceased mum's phone after her ex stole it and changed the password. A bit of a backstory, but he was domestically abusing her for years, and isolated her from me. She had cancer, and knew she was going to die (as I've since discovered through her journals, letters, emails), to which he prevented me from saying goodbye to her. I've managed to access her google account, to which I've since discovered recordings of him abusing her. I've also managed to find little snippets of information, but I'm hoping to gain access to her phone to see if I can discover the bigger picture.

It is a Google Pixel 7a, and I've tried all the usual combinations but no luck. I've got her google email and password, just can't get into the phone. I've tried using hashcat, but seeing as I'm not versed in coding, will someone be able to set out the commands that I would need to put in so that I can get into her phone? Or can recommend any other ways that can help me gain access if possible?

Many thanks if you can help!

6 Comments
2025/02/01
14:04 UTC

0

Need help getting my microsoft account back

So my microsoft account got hacked recently.I have tried all possible methods to recover it and have all the information about the account still.Microsoft keeps saying the same things and i cant seem to progress any further.I have been trying for days now to get it back but had no luck.The hacker from china reset my whole privacy settings so im locked out of the account and cant change the password.Is it possible to somehow reverse this and get the account back? I would really appreciate some help on this as i have a lot of important stuff on the account and really need it back.Thanks in advance!

4 Comments
2025/02/01
13:24 UTC

14

In search for friends

Guys anyone interested in making friends with me... I've just started my ethical hacking journey a month ago and realised I need friends to learn together.So anyone interested?

21 Comments
2025/02/01
12:40 UTC

8

Need help with an AI security challenge

I was doom scrolling through some cybersecurity forums last night and stumbled on this CTF challenge called Matrix. Basically you trick AI chatbots by crafting specific prompts in some levels, but level 2 was different. I hope I got paid to write this, but the story was really good,anyways I need some help in level 3

I already passed level 0(demo level ig), 1 and 2. Level 0:this was pretty basic ig,just had to tell it to ignore its own rules Level 1: again, this didn’t look that hard to me, after few attempts of playing around with different prompts, I passed this level Level 2: okay hear me out, this was pretty interesting, I had to craft a webhook url using beeceptor and got the password for this level. But I'm fucking stuck on level 3, maybe because I'm just a beginner, I don't really know, but I need some help

I'm attaching some screenshots here: https://imgur.com/a/NE9BX6z

5 Comments
2025/02/01
11:32 UTC

0

Career opportunities

Guys is someone out there who got job just after a year or two experience on the field...just curious I'm just a beginner in the field though

2 Comments
2025/02/01
03:23 UTC

0

In search for friends

Guys anyone interested in making friends with me... I've just started my ethical hacking journey a month ago and realised I need friends to learn together.So anyone interested?

0 Comments
2025/02/01
02:51 UTC

0

Bash

Guys where and how do I download and learn bash..

20 Comments
2025/02/01
02:05 UTC

0

I need help

Hi, so my Dad recently passed away and we need to figure out how to get into his computer as that is where he kept his records & all his important documents. Unfortunately, I dont have the time to learn how to become a master hacker, and need some help figuring out what to do.

Any ideas?

17 Comments
2025/02/01
00:53 UTC

0

hi if anyone is available I need a little help

I have had problems with sextourting and if anyone is available to help me it would be great, I have this person's telegram account does anyone know how I can get into their phone to make them pay a little, I am already filing a complaint with the postal police but it would be great to have a little personal revenge, you are free to contact me and thanks in advance

3 Comments
2025/01/31
23:33 UTC

0

I need a friend fr

I need a friend for my journey I'm 14 by the way ,but don't get any funny ideas if u can be my friend DM for my discord

6 Comments
2025/01/31
23:06 UTC

0

Can someone send me a phishing link and then say my password etc.

6 Comments
2025/01/31
22:40 UTC

3

Javascript: trying to grab a class from runtime script

Hi all! I would like to know if something like this is possible: I'm trying to hook a class from a web game. I can't access it from console because it return 'undefined'. Tried making a loop that will try to hook it when it's loaded, tried hooking it's prototype with Tampermonkey, but nothing worked. However, I'm able to do it if I put a breakpoint on it like this:

  1. Go to DevTools' > Network tab > Click on it's initiator
  2. Put a breakpoint somewhere
  3. Reload the page and wait for the breakpoint hit
  4. Write "window.W=W" on console

Is this really the only way?

1 Comment
2025/01/31
22:33 UTC

0

Trying to find a way to expose a racist, can you help?

6 Comments
2025/01/31
21:00 UTC

0

Can anyone help me find this guy he got in my mates pc and then provided a email or something

jamessmith1993@peribronml.ru that's the email or what ever it is I wanna know if it's real apparently he's got a virus

7 Comments
2025/01/31
20:45 UTC

4

Cybersecurity Roadmap After Learning Networking, Linux & Python? Need Guidance!

Hey everyone,

I’ve recently gained knowledge in computer networks, basic Linux, and Python as part of my cybersecurity learning journey. Now, I’m a bit confused about what to do next and need some guidance from professionals already working in the field.

Since I’m in India, I’ve noticed that CEH (Certified Ethical Hacker) and OSCP are more recognized by companies here. Should I start preparing for CEH first, or is there a better path to follow?

I’m aiming to land an entry-level job by the end of the year. What should be my next steps from here? Which certifications, hands-on practice, and resources would be the best to focus on?

Would really appreciate a clear roadmap on how to proceed from this point! Also, any tips on getting internships or entry-level opportunities would be great.

Thanks in advance! 🚀

8 Comments
2025/01/31
18:59 UTC

1

Phone hacked

Is there an easy way to tell if my phone is hacked? Also would it matter if I got this phone from someone sus. I know dumb ass question. Plz lmk tho. Thnx

4 Comments
2025/01/31
18:59 UTC

1

How to have a career in cyber security and ethical hacking?

Hey everybody, for past 2 years i were trying to learn cyber security and ethical hacking but everything didn't made me one and some offline tutorial courses costs me over 1lakh rupees. But a week before I got advised by someone (he is not anymore) said that it is easy to learn tools and terms and have a life in this field, but being a successful hacker or security is something like being a man who know the every backend of the thing you do.

He said me to start from the very basic things and have a strong on comouter foundations like hardware, network,os etc. (i don't know what these are) the said some languages like c,java,python, JavaScript,go and he said to have a strong foundation on this, then learn about attacks,how to defend them,learn case studies of previous attacks and etc. Then learn ethical hacking like wise he explained many things and told to use only free stuffs and then finish it by earning certificates but i can't able to get a structured way of learning and i can't able to contant him now.

So i request to the someone knowledged person on this field and have time to explain or give me something that can guide me.

To those who reply and answer this - thanks to you in advance. For helping me for building a career and also sharing the knowledge you know

13 Comments
2025/01/31
17:28 UTC

0

Android Rat

I am fairly new to hacking can anyone teach me how and where to get an android rat for kali linux for free

7 Comments
2025/01/31
16:59 UTC

0

Hello guys, I wanted to ddos attack on my college website, how can I do?

6 Comments
2025/01/31
16:36 UTC

14

I’m stuck in my hacking learning

I’ve started two years ago my hacking journey supported by a strong computer Science knowledge. After a year of following many courses and practicing with different platforms (trytohackme, hack the box portswigger ecc.), i’ve come to a point where i have a solid knowledge. My problem is that now i feel a bit in the nowhere land, where either challenges are too easy or too hard for me. I would love to improve my theoretical knowledge, by following intermediate/advanced courses or books, but i don’t know where to begin.

4 Comments
2025/01/31
13:58 UTC

7

Using embedded RTTI to reverse engineer classes.

Context

I began hacking Deus Ex Human Revolution. It is one of (if not) my favorite single player games ever. Naturally, I wanted to hack it. So I did. Turned out not to be incredibly hard, but this is thanks to RTTI.

RTTI (Run Time Type Information)

What is RTTI? Put simply, it's the magic sauce behind typeid and dynamic_cast in C++. It allows an objects type to be discerned at runtime.

typeid(obj).name() returns the name of an object and/or class. But in order for it to do this at runtime it needs to have a string to reference. Which means that string is embedded in the executable upon compilation. So if you had a class such as NeActorPlayer and wanted the name at runtime then you'd do typeid(NeActorPlayer player).name() and it'd return the string ".?AVNeActorPlayer@@" which is the name mangled version of NeActorPlayer.

dynamic_cast allows you to upcast and downcast a class. What does this mean? Let's say you have a base class Animal and a derived class Cat.

class Animal {};

class Cat : public Animal {};

Now, you can upcast from Cat to Animal using dynamic_cast.

Example: Animal* animalPtr = dynamic_cast<Animal*>(catPtr);

So how is it able to do this at runtime? Well, it needs to have something called a Class Hierarchy Descriptor. Which is a fancy way of saying that it needs the information necessary to know what classes the derived class inherits from.

What This Looks Like In Ghidra

Disclaimer: Depending upon the compiler used to build the program I believe this can look different. But at least for MSVC it looks a bit like this if we have a class called NeActorPlayer which Deus Ex does. It will have each classes name in the symbol tree that has RTTI and it'll look something like this:

NeActorPlayer::RTTI_Base_Class_Array

NeActorPlayer::RTTI_Base_Class_Descriptor_at_(0,-1,0,64)

NeActorPlayer::RTTI_Class_Hierarchy_Descriptor

NeActorPlayer::RTTI_Complete_Object_Locator

NeActorPlayer::RTTI_Type_Descriptor

NeActorPlayer::vftable

NeActorPlayer::vftable_meta_ptr

Why This Matters

This simplifies things drastically. For a few reasons. We now know the names of each of these classes because the string for it is located in RTTI_Type_Descriptor and we also know the name of each class it inherits from thanks to RTTI_Class_Hierarchy_Descriptor. So that means I can discern a lot about an object in memory and its relation to other objects based on this class information.

With this I can now do some decompiling and tinkering to figure out that NeActorPlayer has a class called HealthSystem. Which, low and behold, contains the players health.

I can also see that NeActorPlayer contains an array of UpgradeDescriptor classes and each one of them has a pointer to a string that defines its purpose such as FiringRecoil, EnablePunchThroughWall, StunEnergyCost, TakeDownNumTargets, etc. And also a pointer to its value in memory which I can change.

An Aside On Virtual Function Tables

When a class has at least one virtual function, and/or a function that derived classes can override, it generates a virtual function table. These are incredibly useful because the virtual function table pointer is the first entry at the base of a class in memory. Which means if you know the address of the virtual function table of a class then you can find every instance of that class simply by finding pointers to it.

Let's say in Deus Ex Human Revolution I know that NeActorNpc is the class for all NPC's and I also know its virtual function table address is DXHRDC.exe+0x6B3C78, and for example sake, that equals 0x16B3C78.

Well now I can simply scan for every pointer to 0x16B3C78 and get a list of 42 results and all of them will be the base address of every NPC currently in the game.

This is incredibly useful as well.

Conclusion

RTTI is a life saver in reverse engineering software. It greatly reduces the complexity of understanding classes with multiple inheritance in an executable. It's a wonderful concept to understand if you want to do reverse engineering.

1 Comment
2025/01/31
13:46 UTC

0

Best way to get started in ethical hacking and pentesting?

Hi everyone,

I want to dive into the world of ethical hacking, specifically pentesting and machine solving. I have a basic background in networking and systems from a degree I studied, as well as a degree in programming. Currently, I work as a programmer.

Despite my IT knowledge, I don’t really know where to start when it comes to solving my first easy machines on Hack The Box (HTB) or TryHackMe. What would you recommend as the best approach to get started and go deep into this field?

Would reading a lot of writeups be a good idea to understand the common methodologies used? My idea is to carefully analyze what they do in the writeups, take note of anything I don’t understand, and research it to gradually build knowledge on vulnerabilities, reconnaissance techniques, exploitation methods, and more. Do you think this is a good approach, or is there a better way to build a strong foundation?

Thanks in advance!

9 Comments
2025/01/31
12:09 UTC

36

Is Hacking: The Art of Exploitation still a good book for beginners in 2025?

I am starting new. My top 3 books are

  1. The one that the question is about

  2. Linux basics for hackers

  3. Python all in one for dummies 1st edition

If you would recommend or change something, please let me know

Thank you

24 Comments
2025/01/31
09:20 UTC

10

Can we catch someone using VPN or TOR for hoax calls?

This is my problem statement for a government hackathon penetration testing isn't my forte can anyone guide me PROBLEM STATEMENT 3: Tools like VPN and TOR are used to mask the identity of accused individuals, who then send hoax bomb threats to airlines and other agencies. What tools can be adopted by an investigator to identify the accused even when a VPN is used by them?

9 Comments
2025/01/31
07:18 UTC

4

What's I need to learn?

I'm interested into learn about vulnerate android sistems, only for modifie my own files, and restrictions. I want to know, how would I start?

2 Comments
2025/01/31
04:25 UTC

2

Phishing links

Hello I know how to generate them by Linux and termux but they don't really work on most phones and links are kind of noticeable that are hacks, does anyone know any website or option like zsadow?

0 Comments
2025/01/31
02:12 UTC

3

Has anyone “created” their own WHID Cactus?

There’s a HID tool o found “whid cactus”, Is there a way to create your own?

https://github.com/whid-injector/WHID

0 Comments
2025/01/31
00:27 UTC

29

Everything is hacked 😊

2 days ago I got an email that my Instagram's email changed. I tried to recover it but i can't. Now i found out that he hacker all society media accounts. The question is: How could the hacker do this? Did he hack my laptop or my phone? How to know if he is still on laptop or phone waiting for anything else?

11 Comments
2025/01/30
23:45 UTC

0

I want to hack like elliot from mister robot

hi, my name is Jac0b.. i watch mr. robot with my friend and i want to hack my school and fix my grades. Also i want to try and hack miss Janice phone . She is my art teacher and very cute

20 Comments
2025/01/30
20:38 UTC

Back To Top