/r/hackers

Photograph via //r/hackers

This subreddit is dedicated to the most interesting recent and historical hacks.

Our topics do not need to be technical.
We require detailed information in all posts.
We are not a place to ask for hacking help.

This subreddit is dedicated to the most interesting recent and historical hacks.

Our topics do not need to be technical.
We require detailed information in all posts.
We are not a place to ask for hacking help.


  1. If you post a hacking request, your post will be removed automagically and you may be banned.

  2. If you send the mods a message requesting help, you will be banned.

  3. You have been warned!


/r/hackers

59,098 Subscribers

24

How in the hell?

These guys are just selling Indian data like it’s nothing. How and where the fuck do they get all this information? Is it from a data dump or an API or a corrupt low level official? I don’t even fucking know at this point.

For those who don’t know, Aadhar is the Indian equivalent of your SSN

17 Comments
2024/12/03
14:17 UTC

0

Find a phone number

Is there a way to find out someone’s phone number from Instagram or Facebook and If so could you show me where to find it or recommend any hacking tools or trusted experts

6 Comments
2024/12/03
11:26 UTC

5

Unlocking my dads phone

I’m just trying to get into my dads phone and laptop he passed away two days ago. Is there any hacker or anyone know what I can do to get into it and not erase everything?

33 Comments
2024/12/03
01:44 UTC

1

Advice?

What is your preferred tool or OS to hack?

7 Comments
2024/12/02
06:09 UTC

0

is it possible for hacker to hack someone social with limited knowing ?

ok this maybe a out of blue question but i just wanna know is there any way someone can hack me even if they have very limited knowing about me ? ( like in the case where brute force attack cant work )

5 Comments
2024/12/01
08:03 UTC

4

Is it possible for hackers to hack an account of which the email no longer exists?

To clarify im scared that my activision account gets hacked but im wondering if thats possible when the email i used for it stopped existing at the start of this year

11 Comments
2024/11/30
23:00 UTC

28

Wtf should I be scared

32 Comments
2024/11/30
12:17 UTC

9

How do people get addresses from the internet?

Recently someone tried doxxing me, they got my internet service provider through my ip (basically stuff), but then they also said they could get my address. They haven't, mainly because I changed my ISP, but how would they even do that?

13 Comments
2024/11/30
02:04 UTC

6

Make Me the Best

I asked chatgpt to give me the step by step on how to become the best hacker in the world lol. Where did it go wrong?

The best hackers in the world are proficient in a wide range of technical skills and soft skills that allow them to navigate complex systems, adapt to evolving technologies, and think creatively. Here’s an overview:

Technical Skills

1.	Programming
•	Mastery in languages like Python, C, C++, JavaScript, and Assembly.
•	Ability to write scripts, reverse engineer code, and automate tasks.
2.	Networking
•	Deep understanding of networking protocols (TCP/IP, DNS, HTTP, FTP, etc.).
•	Knowledge of firewalls, routers, switches, and how data flows through a network.
3.	Operating Systems
•	Expertise in Linux/Unix, Windows, and macOS.
•	Familiarity with kernel-level programming and command-line interfaces.
4.	Security Tools
•	Proficiency in tools like Metasploit, Wireshark, Burp Suite, Nmap, Aircrack-ng, etc.
5.	Cryptography
•	Understanding encryption methods, key management, and cracking techniques.
•	Familiarity with algorithms like RSA, AES, SHA, and Elliptic Curve Cryptography.
6.	Reverse Engineering
•	Analyzing and deconstructing binaries to understand software vulnerabilities.
•	Using tools like IDA Pro, Ghidra, and Radare2.
7.	Exploit Development
•	Writing and modifying exploits for vulnerabilities.
•	Understanding buffer overflows, ROP chains, and privilege escalation.
8.	Web Application Security
•	Knowledge of web vulnerabilities (SQL injection, XSS, CSRF, etc.).
•	Familiarity with OWASP Top Ten and secure coding practices.
9.	Cloud and IoT Security
•	Understanding cloud architectures (AWS, Azure, GCP) and their security measures.
•	Knowledge of IoT device vulnerabilities and their ecosystems.
10.	Machine Learning and AI (Emerging)
•	Using AI for penetration testing and detecting anomalies in systems.

Soft Skills

1.	Problem-Solving
•	Thinking creatively to bypass obstacles and find unconventional solutions.
2.	Persistence and Patience
•	Staying focused on long-term challenges like cracking encryption or analyzing logs.
3.	Collaboration and Communication
•	Working in teams for red teaming, bug bounty programs, or open-source contributions.
•	Reporting findings clearly and effectively.
4.	Continuous Learning
•	Staying updated with new vulnerabilities, tools, and trends.
•	Experimenting in ethical hacking communities or capture-the-flag (CTF) competitions.
5.	Ethical Judgment
•	Making decisions that prioritize safety, legality, and ethical behavior, especially in white-hat or gray-hat roles.

Key Areas of Focus

The best hackers excel in understanding how systems are designed, where weaknesses may lie, and how to exploit them for ethical or malicious purposes. They often specialize in: • Penetration Testing (ethical hacking). • Malware Development. • Network Security. • Social Engineering.

Would you like guidance on how to build any of these skills?

7 Comments
2024/11/29
23:35 UTC

1

CTF Notes

Does anyone keep notes on their CTF steps and/or thought processes? Would it be possible for me to borrow or use them to strengthen my own?

0 Comments
2024/11/29
22:40 UTC

3

Hijacking emails

How would an hacker enter a uniquely generated password protected account and hijack an email meant to go to a receiver, but avoid sending it to the receiver and instead send it to himself (the attacker)?

Just to be clear:

  • Alice sends the authorization email to Bob when an event occurs.
  • Hacker receives it
  • Bob never receives the email

We're supposing SSL is in place for both Alice and Bob.

14 Comments
2024/11/25
13:41 UTC

0

Is it very hard to “ hack” into government websites? Ie.. VA, IRS type sites or is it stuff for the movies. I know nothing about complex computer operations.

14 Comments
2024/11/24
01:46 UTC

0

A website in public net with domain and server, without exposing any information?

Hypothetically, how would one create a website in public net with domain and server, without exposing any information about himself on completely prepaid resources or something?

Is it as simple as finding the domain registrar that accepts bitcoin and same for hosting?

8 Comments
2024/11/22
18:15 UTC

3

Wordpress website got hacked

Hi folks,

One of my wordpress website is hacked and is now redirecting to a Japanese ecommerce website.

I have tried removing all the malicious code and even reinstalled the backup of a previous date.

Still there are many pages which are redirecting to the japanese links.

If anyone knows how to get rid of it, please do help. Thanks

6 Comments
2024/11/21
05:50 UTC

0

professional hackers of reddit, how easy it is to fully hack someone's phone?

professional hackers of reddit, how easy it is to fully hack someone's phone?

im talking like pictures and live screen/camera view, basically having complete control over someone's phone. im really anxious that someone i know might have hacked my phone and i wanna know how hard it actually is? they have my number and my socials and i charged my phone using their charger multiple times.

18 Comments
2024/11/20
14:57 UTC

0

A little help with tracking my brother for safety purposes

Hello! My brother is a teenager and is constantly leaving the house and worrying my mother by not telling her where he is. This is NOT for malicious purposes. I use Kali since a year or two ago on and off; I know his number, appleid and IMEI num (I could also get the MAC add) but have yet to find an app or build one to locate him. Any help would be appreciated, just guide me, this is NOT A REQUEST.

6 Comments
2024/11/17
13:15 UTC

13

Lets create a pen-testing cooperative, we do all the work, automating the management and administrative jobs is trivial. I have made up to 150,000 USD on a single bug bounty, but if I was pooling my rewards with others, and we had no c-suite overhead we could poach everyone and shut down competition

18 Comments
2024/11/17
08:13 UTC

14

Loneliness as a aspiring pentester

Does anyone else ever feel lonely learning ethical hacking? I've been learning pentesting for about 2 years now recently started getting certs to credentialize myself and be able to apply for cyber security roles and over the past year I feel more isolated the more I learn I guess I'm in a weird spot where my learning is pretty advanced but I'm working a production job and the only person I can remotely talk to about technical subjects is the sys-admin of the company but Evan he struggles to keep up with some of the subjects I talk about (Linux) and has told me multiple times he "doesn't understand half of what I say to him" but still enjoys the conversation as he also can't relate to most of the people in the company in regards to technical subjects. Just looking to see if there are any other other budding pentesters that feel the same?

12 Comments
2024/11/16
21:44 UTC

0

Help! Anyone see this?

15 Comments
2024/11/14
03:08 UTC

7

my sister got hacked and i guess i am not sure how they did it

hello all,

so my sister live in Portugal, and she got hacked they started to send her emails to her hotmail from her own hotmail asking for nude pictures and things like that. they also hacked her gmail, so as a person that knows a bit about computers and all that i went ahead and change password, added 2 step verifications and also remove the link between gmail and hotmail (they were the backup email to each other)

after doing all this, they stop sending emails for 2 months until 2 days ago when they start sending her email again, not sure how because she has the 2 step verification.. but they did and the emails got more personal and detailed about it.

they talked about where she live (this one is easy i guess with the email been hacked) but then they started to talk about serious thing like that somebody tried to hit and run her husband which actually happened 2 days ago. They also talk about knowing her daughters school and that they will sell them to random people and also how many kids are on the house where she live and all that crap.

a bit scary, i think they are just bluffing and they are not really here but who knows.. she said somebody even got into her whatsapp and read everything (i guess the info about husband and bank account and balance) was retrieve from there somehow...

i checked the hotmail activity log and looks like every 10 minutes they try to log into her hotmail without luck from so many different countries. i am curious how that person was able to access her phone any suggestions?

already told her to change phone number, factory reset her phone and she is now using new emails.

UPDATE: even though I changed the password for the hotmail 14 hours ago, he sent a new email about 8 hours ago i guess it is possible because hotmail does not log you out completely if you are already login?

update 2: he just email her again talking about police really? you won't get away with it, change number does not matter.. i said more thing personals like my dad likes to do long walks and things like that.. how after resetting her phone he does know about this?

10 Comments
2024/11/13
17:16 UTC

0

Stupid Mossad Malware Hackers

Recently when I'm coding this import appears in my code:

from Demos.EvtSubscribe_pull import events

I don't know what it does, but it seems to connect to somewhere.

4 Comments
2024/11/12
20:22 UTC

19

Can Hackers make trojans with a .wav file or .mp4 file

Hola amigos, Can any hacker out there make a Trojan but instead of a .jpg file or .pdf file or whatever it's a .wav file or a .mp4 file?

21 Comments
2024/11/07
23:53 UTC

1

What is this?

I have an IPhone. I couldn’t x out. I also couldn’t shut my phone off. I had to pick one of the two options

20 Comments
2024/11/07
18:10 UTC

15

Unknown device appears on my "Find My Device". Help?

13 Comments
2024/11/06
23:10 UTC

12

Instagram account hacked-reason

Just had my instagram account hacked last night and I guess I won't be able to get it back but I am just wondering, why would anyone hack a personal account which has a merely 400 followers and 200 posts. I am truly frustrated that this happened to me but in the same time I am trying to understand why. Fortunately, I cam still access facebook although the accounts are connected but now I am really anxious about what else can happen.

21 Comments
2024/11/06
09:51 UTC

5

Any experience with Bug Bounties?

Hey all,

I’m a data analyst who’s been diving into cybersecurity lately, and I’m considering starting a side hustle with bug bounties. The idea of setting my own hours and working independently really appeals to me. Has anyone here had any success with this? I’d love to hear any advice or realistic insights from those who’ve tried it out.

4 Comments
2024/11/06
00:09 UTC

Back To Top