/r/hacking
A subreddit dedicated to hacking and hackers.
Constructive collaboration and learning about exploits, industry standards, grey and white hat hacking, new hardware and software hacking technology, sharing ideas and suggestions for small business and personal security.
A subreddit dedicated to hacking and hacking culture.
What we are about: quality and constructive discussion about the culture, profession and love of hacking.
This sub is aimed at those with an understanding of hacking - please visit /r/HowToHack for posting beginner links and tutorials; any beginner questions should be directed there as they will result in a ban here.
Guides and tutorials are welcome here as long as they are suitably complex and most importantly legal!
Bans are handed out at moderator discretion.
Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...
Damn kids. They're all alike.
Keep it legal Hacking can be a grey area but keep it above board. Discussion around the legality of issues is ok, encouraging or aiding illegal activities is not
We are not your personal army. This is not the place to try to find hackers to do your dirty work and you will be banned for trying. This includes:
No "how do i start hacking?" posts. See /r/howtohack or the stickied post. Intermediate questions are welcomed - e.g. "How does HSTS prevent SSL stripping?" is a good question. "How do I hack wifi with Kali?" is bad.
No "I got hacked" posts unless it's an interesting post-mortem of a unique attack. Your nan being phished doesn't count.
Sharing of personal data is forbidden - no doxxing or IP dumping
Spam is strictly forbidden and will result in a ban. Professional promotion e.g. from security firms/pen testing companies is allowed within the confines of site-wide rules on self promotion found here, but will otherwise be considered spam.
Off-topic posts will be treated as spam.
Low-effort content will be removed at moderator discretion
We are not tech support, these posts should be kept on /r/techsupport
Don't be a dick. Play nice, support each other and encourage learning.
/r/hacking
This is a long-shot, but can anyone help me hack into my old YouTube account? Yahoo deleted my email that was associated, so I can't get in anymore. I had privated a lot of videos and would like to go back through them to see if any traces of my dad exist in them. He died when I was 13, with no videos or recordings of him, so it would mean so much to me if I could at least see videos from our old house or maybe find something of him. I can prove it's mine, the username is is just a play on my actual name.
Is it programming mistakes (like the off-by-one mistake)? Flaws in how different parts of the program interact with each other? Or directly logical errors
I make this question because I am curious about how more theoric aspects of computer science could be applied to hacking
Getting these errors:
nvmlDeviceGetCurrPcieLinkWidth(): Not Supported
nvmlDeviceGetClockInfo(): Not Supported
nvmlDeviceGetClockInfo(): Not Supported
nvmlDeviceGetTemperatureThreshold(): Not Supported
nvmlDeviceGetTemperatureThreshold(): Not Supported
nvmlDeviceGetUtilizationRates(): Not Supported
nvrtcCompileProgram(): NVRTC_ERROR_INVALID_OPTION
* Device #1: Kernel ./OpenCL/shared.cl build failed.
* Device #1: Kernel ./OpenCL/shared.cl build failed.
nvrtc: error: invalid value for --gpu-architecture (-arch)
GTX 760, Phenom 955, 8 GB DDR3. Anything else you need to know, let me know.
Nintendo Music is out,
They use shaka packager and I would like to know if it's possible to remove DRM,
I have a MP4 and a M4S, the m4s don't look encrypted
Going by the article (link below), National Geographic's website seems to have been hacked and is being used for scamming. Just wanted to understand if it's indeed the case.
https://youtube.com/shorts/rr5Z0bpm4dI?si=0rsZGWinbF-XHbF0
Evil-Cardputer detecting flipper zero trough wall of flipper, a standalone portable way to detect flipper zero and blespam !
Recently bought a single flash drive from Amazon to put Kali on it and they sent a case pack of them instead of a single. What are some fun things I can do with the extras?
I’m doing a lab experiment and am having trouble getting things to work as expected. I’m using virtualbox. I have a NAT network set up with DHCP enabled and I have two virtual machines, a ParrotOS and Windows, both connected to the NAT network as their network adapter using the NAT Network option with the custom NAT selected. Both machines can ping each other and access internet.
Now, I’m able to arp spoof the windows machine and/or the gateway from the attack box. I AM able to sniff the windows machine traffic as expected. But there are a couple of things that aren’t working.
When I refresh/check the arp tables from windows using arp -a, the gateway does not show that it’s the same MAC address as the attacker. It’s like there’s no evidence of arp poisoning despite the fact that I’m able to see traffic from the attack box (indicating that it is poisoned?). I’d like to be able to show that the arp tables have changed as proof of the attack.
Secondly, when I try to do arp ban, the victim box is able to access internet without issue.
I don’t really know why this is happening. Is there a network configuration thing that I’ve missed? Would appreciate any help or ideas.
If you had the following college courses at your disposal and you were starting from the ground up, which order would you do them in?
Intro to relational databases. IE: SQL command stuff (not sure if this is really relatable)
Into to IT
Into to Java programming
Intro to Networking
IT career exploration
Intro to Python programming
Intro to web development
My teacher is giving us a task to crack the password of .des file, He gave us the authority to make the password, and suggested that we make a weak password. His instruction was really confusing because he say's to use Kleopatra to encrypt the .txt file using the DES Algorithm and save it as a .des file.
then after that his asking to bruteforce it using hashcat.
now the 1st problem I saw on the instruction is the Kleopatra doesn't support .des or producing any .des encryption file (correct if i'm wrong)
2nd on the hashcat i look for the hashmode of the .des
(source found in : https://hashcat.net/wiki/doku.php?id=example_hashes )
|| || |14000| ^(8)DES (PT = $salt, key = $pass) |a28bc61d44bb815c:1172075784504605|
idk if this was right because when I tried to use a online des encyription this is the hash result that it gaved me is different
6pYmTRrtkXOC5CJCWEH0Sg==
it's not similar to the hash in hashcat wiki. So I'm kinda stuck on a dead end here, I look for other forums or articles on bruteforcing the .des hash using hashcat but didn't find anything.
I still also tried using hashcat to decrypt the des file, but still doesn't work.
rn i'm stuck on a dead end on how to decrypt this thing using bruteforce.
I don't know if coding it would work, but if you guys have any idea how to bruteforce a .des hash please share your knowledge on how to crack this .des
Was google dorking for 1 hour due to boredom and came across over 20 files with username and password hashes, I want to report these so they can be taken off.
I am trying to program a stmp to sms program. Everything functions great except I am trying to find a way to make it appear as if the text was received by a number (or even better a company or name). Setting the from as name <email> did not work so I was wondering if anyone knew a way that does.
I hope this is not considered off topic so forgive me in advanced if it is ..
My nephew was tasked with doing a research on why the internet archive was hacked .. I told him sure, I will help you out to find out why, it will be easy!
I couldn't find a single source in google which is giving ANY reason behind the attack in over 50 pages, I mean .. consider the magnitude of such a thing, why would it be censored/oppressed?
All I can find is that it was attacked by hackers again and again, I also learnt that google is actually using the Internet Archive so why in the world would they censor the topic?
I miss the simpler times when search engines actually did what they where suppose to do, world is going nuts.
Thanks!
EDIT: As @techblackops mentioned in his comment. I find what he said as more rational explanation..
Thanks everyone for the replies 🙏🏻
As far as I can tell the flipper zero and similar products can all be constructed at home for pennies on the dollar. Is there anything worth the money out there?
I'm lost in a sea of knowledge and I don't know where to go or which libraries to begin with.