/r/hackers
This subreddit is dedicated to the most interesting recent and historical hacks.
Our topics do not need to be technical.
We require detailed information in all posts.
We are not a place to ask for hacking help.
This subreddit is dedicated to the most interesting recent and historical hacks.
Our topics do not need to be technical.
We require detailed information in all posts.
We are not a place to ask for hacking help.
If you post a hacking request, your post will be removed automagically and you may be banned.
If you send the mods a message requesting help, you will be banned.
You have been warned!
/r/hackers
These guys are just selling Indian data like it’s nothing. How and where the fuck do they get all this information? Is it from a data dump or an API or a corrupt low level official? I don’t even fucking know at this point.
For those who don’t know, Aadhar is the Indian equivalent of your SSN
Is there a way to find out someone’s phone number from Instagram or Facebook and If so could you show me where to find it or recommend any hacking tools or trusted experts
I’m just trying to get into my dads phone and laptop he passed away two days ago. Is there any hacker or anyone know what I can do to get into it and not erase everything?
What is your preferred tool or OS to hack?
ok this maybe a out of blue question but i just wanna know is there any way someone can hack me even if they have very limited knowing about me ? ( like in the case where brute force attack cant work )
To clarify im scared that my activision account gets hacked but im wondering if thats possible when the email i used for it stopped existing at the start of this year
Recently someone tried doxxing me, they got my internet service provider through my ip (basically stuff), but then they also said they could get my address. They haven't, mainly because I changed my ISP, but how would they even do that?
I asked chatgpt to give me the step by step on how to become the best hacker in the world lol. Where did it go wrong?
The best hackers in the world are proficient in a wide range of technical skills and soft skills that allow them to navigate complex systems, adapt to evolving technologies, and think creatively. Here’s an overview:
Technical Skills
1. Programming
• Mastery in languages like Python, C, C++, JavaScript, and Assembly.
• Ability to write scripts, reverse engineer code, and automate tasks.
2. Networking
• Deep understanding of networking protocols (TCP/IP, DNS, HTTP, FTP, etc.).
• Knowledge of firewalls, routers, switches, and how data flows through a network.
3. Operating Systems
• Expertise in Linux/Unix, Windows, and macOS.
• Familiarity with kernel-level programming and command-line interfaces.
4. Security Tools
• Proficiency in tools like Metasploit, Wireshark, Burp Suite, Nmap, Aircrack-ng, etc.
5. Cryptography
• Understanding encryption methods, key management, and cracking techniques.
• Familiarity with algorithms like RSA, AES, SHA, and Elliptic Curve Cryptography.
6. Reverse Engineering
• Analyzing and deconstructing binaries to understand software vulnerabilities.
• Using tools like IDA Pro, Ghidra, and Radare2.
7. Exploit Development
• Writing and modifying exploits for vulnerabilities.
• Understanding buffer overflows, ROP chains, and privilege escalation.
8. Web Application Security
• Knowledge of web vulnerabilities (SQL injection, XSS, CSRF, etc.).
• Familiarity with OWASP Top Ten and secure coding practices.
9. Cloud and IoT Security
• Understanding cloud architectures (AWS, Azure, GCP) and their security measures.
• Knowledge of IoT device vulnerabilities and their ecosystems.
10. Machine Learning and AI (Emerging)
• Using AI for penetration testing and detecting anomalies in systems.
Soft Skills
1. Problem-Solving
• Thinking creatively to bypass obstacles and find unconventional solutions.
2. Persistence and Patience
• Staying focused on long-term challenges like cracking encryption or analyzing logs.
3. Collaboration and Communication
• Working in teams for red teaming, bug bounty programs, or open-source contributions.
• Reporting findings clearly and effectively.
4. Continuous Learning
• Staying updated with new vulnerabilities, tools, and trends.
• Experimenting in ethical hacking communities or capture-the-flag (CTF) competitions.
5. Ethical Judgment
• Making decisions that prioritize safety, legality, and ethical behavior, especially in white-hat or gray-hat roles.
Key Areas of Focus
The best hackers excel in understanding how systems are designed, where weaknesses may lie, and how to exploit them for ethical or malicious purposes. They often specialize in: • Penetration Testing (ethical hacking). • Malware Development. • Network Security. • Social Engineering.
Would you like guidance on how to build any of these skills?
Does anyone keep notes on their CTF steps and/or thought processes? Would it be possible for me to borrow or use them to strengthen my own?
How would an hacker enter a uniquely generated password protected account and hijack an email meant to go to a receiver, but avoid sending it to the receiver and instead send it to himself (the attacker)?
Just to be clear:
We're supposing SSL is in place for both Alice and Bob.
Hypothetically, how would one create a website in public net with domain and server, without exposing any information about himself on completely prepaid resources or something?
Is it as simple as finding the domain registrar that accepts bitcoin and same for hosting?
Hi folks,
One of my wordpress website is hacked and is now redirecting to a Japanese ecommerce website.
I have tried removing all the malicious code and even reinstalled the backup of a previous date.
Still there are many pages which are redirecting to the japanese links.
If anyone knows how to get rid of it, please do help. Thanks
professional hackers of reddit, how easy it is to fully hack someone's phone?
im talking like pictures and live screen/camera view, basically having complete control over someone's phone. im really anxious that someone i know might have hacked my phone and i wanna know how hard it actually is? they have my number and my socials and i charged my phone using their charger multiple times.
Hello! My brother is a teenager and is constantly leaving the house and worrying my mother by not telling her where he is. This is NOT for malicious purposes. I use Kali since a year or two ago on and off; I know his number, appleid and IMEI num (I could also get the MAC add) but have yet to find an app or build one to locate him. Any help would be appreciated, just guide me, this is NOT A REQUEST.
Does anyone else ever feel lonely learning ethical hacking? I've been learning pentesting for about 2 years now recently started getting certs to credentialize myself and be able to apply for cyber security roles and over the past year I feel more isolated the more I learn I guess I'm in a weird spot where my learning is pretty advanced but I'm working a production job and the only person I can remotely talk to about technical subjects is the sys-admin of the company but Evan he struggles to keep up with some of the subjects I talk about (Linux) and has told me multiple times he "doesn't understand half of what I say to him" but still enjoys the conversation as he also can't relate to most of the people in the company in regards to technical subjects. Just looking to see if there are any other other budding pentesters that feel the same?
hello all,
so my sister live in Portugal, and she got hacked they started to send her emails to her hotmail from her own hotmail asking for nude pictures and things like that. they also hacked her gmail, so as a person that knows a bit about computers and all that i went ahead and change password, added 2 step verifications and also remove the link between gmail and hotmail (they were the backup email to each other)
after doing all this, they stop sending emails for 2 months until 2 days ago when they start sending her email again, not sure how because she has the 2 step verification.. but they did and the emails got more personal and detailed about it.
they talked about where she live (this one is easy i guess with the email been hacked) but then they started to talk about serious thing like that somebody tried to hit and run her husband which actually happened 2 days ago. They also talk about knowing her daughters school and that they will sell them to random people and also how many kids are on the house where she live and all that crap.
a bit scary, i think they are just bluffing and they are not really here but who knows.. she said somebody even got into her whatsapp and read everything (i guess the info about husband and bank account and balance) was retrieve from there somehow...
i checked the hotmail activity log and looks like every 10 minutes they try to log into her hotmail without luck from so many different countries. i am curious how that person was able to access her phone any suggestions?
already told her to change phone number, factory reset her phone and she is now using new emails.
UPDATE: even though I changed the password for the hotmail 14 hours ago, he sent a new email about 8 hours ago i guess it is possible because hotmail does not log you out completely if you are already login?
update 2: he just email her again talking about police really? you won't get away with it, change number does not matter.. i said more thing personals like my dad likes to do long walks and things like that.. how after resetting her phone he does know about this?
Recently when I'm coding this import appears in my code:
from Demos.EvtSubscribe_pull import events
I don't know what it does, but it seems to connect to somewhere.
Hola amigos, Can any hacker out there make a Trojan but instead of a .jpg file or .pdf file or whatever it's a .wav file or a .mp4 file?
I have an IPhone. I couldn’t x out. I also couldn’t shut my phone off. I had to pick one of the two options
Just had my instagram account hacked last night and I guess I won't be able to get it back but I am just wondering, why would anyone hack a personal account which has a merely 400 followers and 200 posts. I am truly frustrated that this happened to me but in the same time I am trying to understand why. Fortunately, I cam still access facebook although the accounts are connected but now I am really anxious about what else can happen.
Hey all,
I’m a data analyst who’s been diving into cybersecurity lately, and I’m considering starting a side hustle with bug bounties. The idea of setting my own hours and working independently really appeals to me. Has anyone here had any success with this? I’d love to hear any advice or realistic insights from those who’ve tried it out.