/r/hacking

Photograph via snooOG

A subreddit dedicated to hacking and hackers.

Constructive collaboration and learning about exploits, industry standards, grey and white hat hacking, new hardware and software hacking technology, sharing ideas and suggestions for small business and personal security.

A subreddit dedicated to hacking and hacking culture.

What we are about: quality and constructive discussion about the culture, profession and love of hacking.

This sub is aimed at those with an understanding of hacking - please visit /r/HowToHack for posting beginner links and tutorials; any beginner questions should be directed there as they will result in a ban here.

Guides and tutorials are welcome here as long as they are suitably complex and most importantly legal!

Bans are handed out at moderator discretion.

Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...

Damn kids. They're all alike.


Rules:

  1. Keep it legal Hacking can be a grey area but keep it above board. Discussion around the legality of issues is ok, encouraging or aiding illegal activities is not

  2. We are not your personal army. This is not the place to try to find hackers to do your dirty work and you will be banned for trying. This includes:

  • Asking someone to hack for you
  • Trying to hire hackers
  • Asking for help with your DoS
  • Asking how to get into your "girlfriend's" instagram
  • Offering to do these things will also result in a ban
  • No "how do i start hacking?" posts. See /r/howtohack or the stickied post. Intermediate questions are welcomed - e.g. "How does HSTS prevent SSL stripping?" is a good question. "How do I hack wifi with Kali?" is bad.

  • No "I got hacked" posts unless it's an interesting post-mortem of a unique attack. Your nan being phished doesn't count.

  • Sharing of personal data is forbidden - no doxxing or IP dumping

  • Spam is strictly forbidden and will result in a ban. Professional promotion e.g. from security firms/pen testing companies is allowed within the confines of site-wide rules on self promotion found here, but will otherwise be considered spam.

  • Off-topic posts will be treated as spam.

  • Low-effort content will be removed at moderator discretion

  • We are not tech support, these posts should be kept on /r/techsupport

  • Don't be a dick. Play nice, support each other and encourage learning.


  • Recommended Subreddits:

    /r/hacking

    2,758,222 Subscribers

    0

    Old YouTube Account

    This is a long-shot, but can anyone help me hack into my old YouTube account? Yahoo deleted my email that was associated, so I can't get in anymore. I had privated a lot of videos and would like to go back through them to see if any traces of my dad exist in them. He died when I was 13, with no videos or recordings of him, so it would mean so much to me if I could at least see videos from our old house or maybe find something of him. I can prove it's mine, the username is is just a play on my actual name.

    8 Comments
    2024/11/03
    05:41 UTC

    12

    In what do most modern exploits rely on?

    Is it programming mistakes (like the off-by-one mistake)? Flaws in how different parts of the program interact with each other? Or directly logical errors

    I make this question because I am curious about how more theoric aspects of computer science could be applied to hacking

    4 Comments
    2024/11/03
    01:14 UTC

    4

    Issues with hashcat.launcher

    Getting these errors:

    nvmlDeviceGetCurrPcieLinkWidth(): Not Supported
    nvmlDeviceGetClockInfo(): Not Supported
    nvmlDeviceGetClockInfo(): Not Supported
    nvmlDeviceGetTemperatureThreshold(): Not Supported
    nvmlDeviceGetTemperatureThreshold(): Not Supported
    nvmlDeviceGetUtilizationRates(): Not Supported
    nvrtcCompileProgram(): NVRTC_ERROR_INVALID_OPTION
    * Device #1: Kernel ./OpenCL/shared.cl build failed.
    * Device #1: Kernel ./OpenCL/shared.cl build failed.
    nvrtc: error: invalid value for --gpu-architecture (-arch)

    GTX 760, Phenom 955, 8 GB DDR3. Anything else you need to know, let me know.

    3 Comments
    2024/11/02
    21:05 UTC

    14

    DEF CON 32 - Abusing Windows Hello Without a Severed Hand - Ceri Coburn, Dirk jan Mollema

    1 Comment
    2024/11/02
    04:36 UTC

    3

    Remove DRM from shaka-packager

    Nintendo Music is out,
    They use shaka packager and I would like to know if it's possible to remove DRM,

    I have a MP4 and a M4S, the m4s don't look encrypted

    1 Comment
    2024/10/31
    22:46 UTC

    0

    What's best for certifications? Fortinet or Splunk?

    1 Comment
    2024/10/31
    17:05 UTC

    6

    Attack Vectors of Quantum Computers - Sorin Boloș and Adrian Coleșa @ Quantum Village, DEF CON 32

    0 Comments
    2024/10/31
    09:57 UTC

    26

    Has the National Geographic website been hacked?

    Going by the article (link below), National Geographic's website seems to have been hacked and is being used for scamming. Just wanted to understand if it's indeed the case.

    https://techissuestoday.com/google-search-news-tab-spam/

    7 Comments
    2024/10/30
    10:58 UTC

    0

    Flipper zero can run but can't hide 😈

    https://youtube.com/shorts/rr5Z0bpm4dI?si=0rsZGWinbF-XHbF0

    Evil-Cardputer detecting flipper zero trough wall of flipper, a standalone portable way to detect flipper zero and blespam !

    Project : https://github.com/7h30th3r0n3/Evil-M5Core2

    2 Comments
    2024/10/29
    10:16 UTC

    20

    What are some fun things to put on extra flash drives?

    Recently bought a single flash drive from Amazon to put Kali on it and they sent a case pack of them instead of a single. What are some fun things I can do with the extras?

    23 Comments
    2024/10/28
    21:44 UTC

    4,321

    Apple will pay 1million USD if you can hack into their servers

    192 Comments
    2024/10/28
    09:24 UTC

    6

    Having issues with Bettercap in VirtualBox

    I’m doing a lab experiment and am having trouble getting things to work as expected. I’m using virtualbox. I have a NAT network set up with DHCP enabled and I have two virtual machines, a ParrotOS and Windows, both connected to the NAT network as their network adapter using the NAT Network option with the custom NAT selected. Both machines can ping each other and access internet.

    Now, I’m able to arp spoof the windows machine and/or the gateway from the attack box. I AM able to sniff the windows machine traffic as expected. But there are a couple of things that aren’t working.

    When I refresh/check the arp tables from windows using arp -a, the gateway does not show that it’s the same MAC address as the attacker. It’s like there’s no evidence of arp poisoning despite the fact that I’m able to see traffic from the attack box (indicating that it is poisoned?). I’d like to be able to show that the arp tables have changed as proof of the attack.

    Secondly, when I try to do arp ban, the victim box is able to access internet without issue.

    I don’t really know why this is happening. Is there a network configuration thing that I’ve missed? Would appreciate any help or ideas.

    7 Comments
    2024/10/28
    04:51 UTC

    30

    What order would you do these in?

    If you had the following college courses at your disposal and you were starting from the ground up, which order would you do them in?

    1. Intro to relational databases. IE: SQL command stuff (not sure if this is really relatable)

    2. Into to IT

    3. Into to Java programming

    4. Intro to Networking

    5. IT career exploration

    6. Intro to Python programming

    7. Intro to web development

    28 Comments
    2024/10/27
    23:56 UTC

    16

    is there a way to crack a .des file using hashcat?

    My teacher is giving us a task to crack the password of .des file, He gave us the authority to make the password, and suggested that we make a weak password. His instruction was really confusing because he say's to use Kleopatra to encrypt the .txt file using the DES Algorithm and save it as a .des file.

    then after that his asking to bruteforce it using hashcat.

    now the 1st problem I saw on the instruction is the Kleopatra doesn't support .des or producing any .des encryption file (correct if i'm wrong)

    2nd on the hashcat i look for the hashmode of the .des

    (source found in : https://hashcat.net/wiki/doku.php?id=example_hashes )

    || || |14000| ^(8)DES (PT = $salt, key = $pass) |a28bc61d44bb815c:1172075784504605|

    idk if this was right because when I tried to use a online des encyription this is the hash result that it gaved me is different

    6pYmTRrtkXOC5CJCWEH0Sg==

    it's not similar to the hash in hashcat wiki. So I'm kinda stuck on a dead end here, I look for other forums or articles on bruteforcing the .des hash using hashcat but didn't find anything.

    I still also tried using hashcat to decrypt the des file, but still doesn't work.

    rn i'm stuck on a dead end on how to decrypt this thing using bruteforce.

    I don't know if coding it would work, but if you guys have any idea how to bruteforce a .des hash please share your knowledge on how to crack this .des

    11 Comments
    2024/10/27
    17:17 UTC

    46

    Why is there casually usernames and hashes on google and how to report it

    Was google dorking for 1 hour due to boredom and came across over 20 files with username and password hashes, I want to report these so they can be taken off.

    12 Comments
    2024/10/27
    05:20 UTC

    8

    STMP to SMS make sender not a email

    I am trying to program a stmp to sms program. Everything functions great except I am trying to find a way to make it appear as if the text was received by a number (or even better a company or name). Setting the from as name <email> did not work so I was wondering if anyone knew a way that does.

    22 Comments
    2024/10/25
    22:42 UTC

    237

    My nephew was tasked with doing a research on why the Internet Archive was hacked ..

    I hope this is not considered off topic so forgive me in advanced if it is ..

    My nephew was tasked with doing a research on why the internet archive was hacked .. I told him sure, I will help you out to find out why, it will be easy!

    I couldn't find a single source in google which is giving ANY reason behind the attack in over 50 pages, I mean .. consider the magnitude of such a thing, why would it be censored/oppressed?

    All I can find is that it was attacked by hackers again and again, I also learnt that google is actually using the Internet Archive so why in the world would they censor the topic?

    I miss the simpler times when search engines actually did what they where suppose to do, world is going nuts.

    Thanks!

    EDIT: As @techblackops mentioned in his comment. I find what he said as more rational explanation..

    Thanks everyone for the replies 🙏🏻

    87 Comments
    2024/10/25
    21:18 UTC

    10

    Hak5-esque gadgets that are actually worth it?

    As far as I can tell the flipper zero and similar products can all be constructed at home for pennies on the dollar. Is there anything worth the money out there?

    28 Comments
    2024/10/25
    14:08 UTC

    21 Comments
    2024/10/25
    05:48 UTC

    17

    Credible Resources to learn Networking and Network vulnerabilities

    I'm lost in a sea of knowledge and I don't know where to go or which libraries to begin with.

    5 Comments
    2024/10/25
    05:42 UTC

    Back To Top