/r/hacking

Photograph via snooOG

A subreddit dedicated to hacking and hackers.

Constructive collaboration and learning about exploits, industry standards, grey and white hat hacking, new hardware and software hacking technology, sharing ideas and suggestions for small business and personal security.

A subreddit dedicated to hacking and hacking culture.

What we are about: quality and constructive discussion about the culture, profession and love of hacking.

This sub is aimed at those with an understanding of hacking - please visit /r/HowToHack for posting beginner links and tutorials; any beginner questions should be directed there as they will result in a ban here.

Guides and tutorials are welcome here as long as they are suitably complex and most importantly legal!

Bans are handed out at moderator discretion.

Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...

Damn kids. They're all alike.


Rules:

  1. Keep it legal Hacking can be a grey area but keep it above board. Discussion around the legality of issues is ok, encouraging or aiding illegal activities is not

  2. We are not your personal army. This is not the place to try to find hackers to do your dirty work and you will be banned for trying. This includes:

  • Asking someone to hack for you
  • Trying to hire hackers
  • Asking for help with your DoS
  • Asking how to get into your "girlfriend's" instagram
  • Offering to do these things will also result in a ban
  • No "how do i start hacking?" posts. See /r/howtohack or the stickied post. Intermediate questions are welcomed - e.g. "How does HSTS prevent SSL stripping?" is a good question. "How do I hack wifi with Kali?" is bad.

  • No "I got hacked" posts unless it's an interesting post-mortem of a unique attack. Your nan being phished doesn't count.

  • Sharing of personal data is forbidden - no doxxing or IP dumping

  • Spam is strictly forbidden and will result in a ban. Professional promotion e.g. from security firms/pen testing companies is allowed within the confines of site-wide rules on self promotion found here, but will otherwise be considered spam.

  • Off-topic posts will be treated as spam.

  • Low-effort content will be removed at moderator discretion

  • We are not tech support, these posts should be kept on /r/techsupport

  • Don't be a dick. Play nice, support each other and encourage learning.


  • Recommended Subreddits:

    /r/hacking

    2,708,700 Subscribers

    1

    Alternatives to auto run for flash drive based malware?

    Hello everyone!

    I’m currently working on a project for one of my college courses involving a flash drive based keylogger. I’ve gotten the keylogger working, but I am stuck on the next step. One of my goals is to make the program start automatically upon insertion of the flash drive into a windows pc without user interaction. The answers I’ve found online say it “can’t be done” since auto run is disabled on newer windows versions. Auto play seems to be a dead end too because it requires human interaction. All other answers require prior configuration of the computer itself. A solution must be out there since flash drive based malware still exists. How can I get it to start automatically? Any leads would be greatly appreciated!

    Thank you!

    3 Comments
    2024/04/17
    21:37 UTC

    0

    Bought on marketplace, how would I get in?

    46 Comments
    2024/04/15
    23:08 UTC

    18

    5 Comments
    2024/04/15
    19:14 UTC

    106

    What's the king of free password managers?

    Title

    So basically I'm asking for the most secure, most private, free password manager out there.

    Certainly, nothing is more secure than a notebook, but let's face it—no one wants to carry around a notebook everywhere, especially one filled with thousands of passwords.

    Thx

    133 Comments
    2024/04/15
    12:46 UTC

    4

    Impacket-mssqlclient output

    Usually a failed sign in attempt with impacket-mssqlclient gives output like “Invalid credentials” or “untrusted domain” (if your IP isn’t allowed to connect).

    I’m working on a CTF & it’s just outputting

    [*] Encryption required, switching to TLS

    Then exiting.

    Have any of you seen this before? Is it indicative of something, like the MSSQL Server not working properly?

    4 Comments
    2024/04/14
    19:47 UTC

    1

    SQLi Resources?

    Hey y’all. Working through hackthebox stuff and just wondering what resources are good for learning effective SQLi, or possibly any tips or things you wish you knew earlier. I’m pretty good at the networking side of things but SQL is kicking my ass

    Thanks in advance

    8 Comments
    2024/04/14
    16:51 UTC

    21

    Hacking Notes: Acquire a collection of RedTeam tools notes

    Here, you'll find a wealth of information on various aspects of hacking, including information gathering, scanning and enumeration, web hacking, exploitation, and windows/linux hacking.

    https://github.com/Hacking-Notes/RedTeam

    13 Comments
    2024/04/14
    13:47 UTC

    39

    Do you guys also think the standard certs are just professional scriptKiddie certs?

    So professionally I had to do some certs. I was really excited about them especially the CEH, probably because I never looked into them ahead of the event.

    but fuck me. I especially hated the definition of a script kiddie by the CEH I figured that showed perfectly what the CEH is. I can’t remember now but it wasn’t what a script kiddie was a script kiddie is someone who only knows the CEH.

    the most advanced part of the course was going over or rather flying over metasploit. not even the advanced cool stuff just here’s metasploit here’s a few flags have fun.

    Did I just take a terrible course (I did pass the cert) or do you feel the same?

    29 Comments
    2024/04/13
    10:48 UTC

    6

    How do I bypass this?

    I am doing a lab where I need to exploit NFS. So far I ran the following commands:

    mkdir ross

    showmount -e <ip>

    mount -t nfs <ip>:/home/ross ross

    cd ross

    useradd -u 1005 ross (1005 is the UID of the owner of the files)

    Goes without saying, but <ip> isn't actually the IP I am typing. Now I am supposed to install an SSH backdoor but I don't have write permissions in that folder, even though I am using the same UID and the folder is intentionally designed to be vulnerable. How do I bypass this?

    6 Comments
    2024/04/13
    03:43 UTC

    5

    What are the most used methods for data exfiltration?

    Hello, I'm a master's student in cybersecurity and need to build a data exfiltration to a c2, what are the most common methods?
    I want nobody to do my work just directions please =)

    20 Comments
    2024/04/12
    19:28 UTC

    2

    Fighting back against spam in 2024

    TL;DR No-U-Kai-Reply is a work in progress as a counter tool against spam emails. Looking for thoughts from other experts. Yes, initial research is done. Yes, this project is in progress and growing. The next post will share a GitHub repo.

    First post so please be nice. I plan to follow up with a lot more work and results along the way if the feedback is good. (14+ years as a software engineer).

    Context: So a few months ago, I was reading through my emails as I do every day. And over the years I've taken many steps to protect communications, but after a stout cup of joe and about 25 minutes of double-checking spam folders on multiple accounts as I do every few days. I got an idea and perhaps this is already done, but as an engineer, I think it is a fun build. Not to mention making the world a happier place for scammers. So I wanted to bring it to the larger community for feedback.

    How: It takes emails from spam folders from many email accounts, then it takes the bodies and the emails and shuffles them, sending from each spammer email to another spammer email and sending the bodies with slight variations to the subject and the body. Alternatively, I can take blacklisted emails from ISPs or ESPs. In retrospect, that's probably better.

    Edge Cases: A verified white list of emails that are safe and just happened to land in the spam box.

    Of course, the IPs get blacklisted very quickly.

    Having worked with massive companies on projects that have been blacklisted by ISP I know that email blasting or mass emails are possibly effectively off the table.

    Rotating email servers every X hours/minutes.

    Hitting some limits from the cloud service providers or ISPs but I'm sure I can figure that out with debouncing.

    8 Comments
    2024/04/12
    17:07 UTC

    1

    Highschool Hacking/programming challenge

    My school provides students with Macbook Airs as part of their education system, and have them all set up as company/school devices with a locked admin account and several proxy's and firewalls such as Linewize and Falcon.

    For some extra context about my school, we are heavily iSTEM focused with a massive engineering course budget. Despite the large budget however, they have only this year opened up a programming course for year 11 and 12. There hasn't been much interest so far so the IT department decided to issue a challenge. (with permission from the school)

    For the challenge, we have to figure out a way to either steal the password for the admin account or change the student account into an admin. The only rule is that our method has to involve programming, apart from that anything is allowed, and we have permission to use some degree of malware as long as it doesn't create any permanent changes or damage to devices. The winner of the challenge gets $50 and are allowed to unblock 1 website (non-explicit) for every unique solution the students can come up with. They will all be reset next year so the quicker we come up with a solution the more we get out of it.

    I haven't ever tried coding before this, so I'm kinda stumbling around in the dark. So far I have figured out how to make a decent keyreader on Swift UI, but it can't run without admin password because all permission, VPN, Proxy and account settings are password locked. I also can't run the side command from terminal. I have scrolled through every web certificate and key chain entry possible, but the ones I need are admin locked. I can't think of any other ways to do it through kinda normal means. Recently I have been reading about malware, in particular SQL injections but don't know where to start and what would be a waste of time.

    Any suggestions would be great.

    4 Comments
    2024/04/12
    14:49 UTC

    1

    I need your opinion on an a project idea

    Guys, right now, I am studying for the hack the box certification for pentester, so creating a playbook became of the uttermost importance, I always used Joplin to store the knowledge I learned and content I create, but Joplin is at most a markdown wiki.

    I was thinking about creating a tool that could be used in the terminal or web app, where you can store your commands, and later be queried by some tags (like tool name, OS, usage), what you guys think about this idea?

    I tried to find a tool with a similar idea, but I was unable to find such a thing. Or maybe I used a poor search terms.

    Also, please let me know how you store your playbook if you have such a thing.

    Thanks in advance.

    2 Comments
    2024/04/12
    12:53 UTC

    7

    Are Hackers the Biggest Threat to America’s Critical Infrastructure?

    12 Comments
    2024/04/11
    21:39 UTC

    1,147

    You’re welcome

    51 Comments
    2024/04/11
    21:03 UTC

    10

    looking for books for beginners which talks about technical stuff

    hey there, so im looking for books which talks about technical stuffs, like not one of those kinds which talks about how to use (CLI) softwares.

    Something like which explains all the known vulnerabilities, the working behind it and how they were discovered or something like that, Just looking for technical stuff.

    i've looked on so many books for beginners but all of them talks about how to use software(like nmap or basic bash)

    Hope i got myself clear. Ty.

    11 Comments
    2024/04/11
    17:50 UTC

    19

    How does BIOS password locks work? Is it possible to hack them?

    I was under the impression the entire point of BIOS passwords were to "lock" the computer entirely, but no data was encrypted and the quickest safe way to unlock the BIOS was to reset the CMOS battery. However i've been told that some computers, specially laptops, have a BIOS password that can be set to stay on permanently unless you unlock them with the right password even if you reset CMOS, or you contact support from the manufacturer to get a flash key to remove it. Since as far as i know no method from any manufacturer involves external communications between a server and the computer i can assume its not a DRM measure.

    Is it true? Are BIOS password that serious now and impossible to crack?

    Is there any privacy/security concern about having a computer that the manufacturer can, using security through obscurity, always keep a backdoor open yet at the same time not let anyone with physical access to the internals crack or reset the BIOS password?

    26 Comments
    2024/04/11
    03:59 UTC

    0

    A cheap way to have many ips?

    Vps are expensive and often share the same ip, if from the same providers

    Vpns, socks, tor and so on, are often already abused/banned

    Sim cards do share the same ip addresses

    Leeching off third party devices, is not that easy,

    17 Comments
    2024/04/10
    20:07 UTC

    1

    Almost every A series phone other than my A32 4G will get One UI6. Is there anyway to set up a bootloader?

    6 Comments
    2024/04/10
    17:34 UTC

    1

    Ideas Script for touchscreen Raspi hacking suite?

    Hello guys :) !

    I built a raspberry pi with a touchscreen, I first wanted to run Kali and then wifite, airgeddon, etc. but as I wanted it to be portable it is not working with the inbuilt touchscreen keyboard.

    Maybe some of you have an idea for a script (image) I can flash on it, something like the wifi marauder, etc. but for the Raspberry Pi. Maybe evil Twin, rogue AP, etc. That would be awesome! Thanks!

    0 Comments
    2024/04/09
    19:42 UTC

    570

    in the light of recent posts i have came to a conclusion that it's my turn to post this

    body text(optional)

    86 Comments
    2024/04/09
    21:03 UTC

    Back To Top