/r/hacking
A subreddit dedicated to hacking and hackers.
Constructive collaboration and learning about exploits, industry standards, grey and white hat hacking, new hardware and software hacking technology, sharing ideas and suggestions for small business and personal security.
A subreddit dedicated to hacking and hacking culture.
What we are about: quality and constructive discussion about the culture, profession and love of hacking.
This sub is aimed at those with an understanding of hacking - please visit /r/HowToHack for posting beginner links and tutorials; any beginner questions should be directed there as they will result in a ban here.
Guides and tutorials are welcome here as long as they are suitably complex and most importantly legal!
Bans are handed out at moderator discretion.
Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...
Damn kids. They're all alike.
Keep it legal Hacking can be a grey area but keep it above board. Discussion around the legality of issues is ok, encouraging or aiding illegal activities is not
We are not your personal army. This is not the place to try to find hackers to do your dirty work and you will be banned for trying. This includes:
No "how do i start hacking?" posts. See /r/howtohack or the stickied post. Intermediate questions are welcomed - e.g. "How does HSTS prevent SSL stripping?" is a good question. "How do I hack wifi with Kali?" is bad.
No "I got hacked" posts unless it's an interesting post-mortem of a unique attack. Your nan being phished doesn't count.
Sharing of personal data is forbidden - no doxxing or IP dumping
Spam is strictly forbidden and will result in a ban. Professional promotion e.g. from security firms/pen testing companies is allowed within the confines of site-wide rules on self promotion found here, but will otherwise be considered spam.
Off-topic posts will be treated as spam.
Low-effort content will be removed at moderator discretion
We are not tech support, these posts should be kept on /r/techsupport
Don't be a dick. Play nice, support each other and encourage learning.
/r/hacking
in windows 11 using kali linux as vm from ovm.. its all working fine untill i started using nmap.
when i scan some ports using nmap than network drops in only in kali linux not on host machine.. any way to resolve this? every time i have to restart vm to use wifi. again..
So I've been trying to restore some of the lost game art from an old dead MMO called ''Black Prophecy'' A space MMO that died in 2012, there is precious little info remaining about the game out there, but i managed to get my hands on a fully installed version of the game with all its files there.
Now the second hurdle is actually extracting the art files from the game's archive, while the .pkg files can be viewed with any archive viewer like WinRAR or 7z, no files inside can be opened or extracted without the password to these files.
My only hint was this old thread on a site called ownedcore: https://www.ownedcore.com/forums/mmo/mmo-exploits-hacks/321548-requesting-black-prophecy-data-files-help.html
Supposedly the guy found the 16 byte password hardcoded in the .exe
CPU Dump
Address Hex dump
0200B0BC B7 27 4A 3B|CB DD 4B D8|B4 CD 8D D8|2D 8F 00 DB
But i fully realize this isn't a password you can just enter with a standard archive opener.
So now I'm curious on how to proceed, provided the information found in the ownedcore thread isnt wrong, and if its wrong, how would i go about trying to crack these files myself ?
Edit-1: link to relevant files: https://drive.google.com/drive/folders/1XyrrskxLkBQwVtDwfINZHH3EY6Q2UjBU?usp=sharing
I have tried various one's and it never seemed to work. This is on emirates OnAir by the way.
So basically I did this live stream from download the app from play store and playing with servers where I downloaded a similar app created by APEX and tried login the same account in Layers App.
https://www.youtube.com/live/JSTybXVKEbo
It shows the app is not only created by APEX but also server by apex server and developers as the signatures of apex, layers and another app (Elari) created by APEX is same and developers know better no signatures can be same of apps created by different developers, it's impossible.
I tried contacting few youtubers to talk about it but got no response, tech freaks can test the thing what I did (before it's patched ofcourse)
Also as tech burner claimed they build the firmware from scratch, app from scratch, all are lies. And now he uploaded a video apologising that we never said this, but they actually said.
Hi all
I've been looking for a tool to remove Fileopen protection from certain PDF so I can work them as I want (extraction, comments etc.)
Any of you has experienced this?
Running in windows 11.
my development environment is on linux and i want to be able to write malware rather efficiently problem is i need to test it and for me to do that i need to
1 compile
move file to windows machine (probs using http)
and then move to windows machine to observe the malwares progress
this is all rather slow and i was wondering if there was a one click way to do this from my linux environment
i got the idea of having an application on windows which accepts .exe files in POST requests then automatically executes them but i wouldn't get the terminal results back
I recently made a post asking what gadgets and stuff I can get for 50$(feel free to share more gadgets of your choice down below!!!) I got a lot of good and nice responses, from htb, to those in the title!! and the ones that stuck with me the most are those. So!!! What can I do?
I already have a pwnagotchi so I would like to steer clear of just taking wifi password, if I could go deeper, that would be great, but I would LOOOOVEEE to do other things than just wifi with these devices!!!
I have read about firmware, please tell me how that works too, and what the firmware would do <3
thx to all and happy new year!!!
dry sprinkles :|
One of their pwn challenges that I won't attempt to spell was about becoming root in Stock ToaruOS 2.2.0. A wonderful hobby OS by Kevin Lange.
The flag encouraged people to report the issues they found after the CTF, so there are a lot of issues on the projects github page that are very instructive for kernel level bugs. Some even with PoCs.
If you are curious or trying to get into this stuff, it's probably a lot more accessible than "real" kernel vulns on any major OS. So take a look. https://github.com/klange/toaruos/issues
how do you guys deal with burnout? I've been mentally exhausted, everything was fun at first but you reach a certain point where it stops being a hobby and feels more like work.
Hey guys! I'm having a hard time figuring out what's wrong with my etter.dns configuration.
I have root on my phone
I installed ettercap like this: pkg install tur-repo , and I had to add the ip6tables rules to etter.dns because they didn't exist
(line 176) redir6_command_on = "ip6tables -t nat -A PREROUTING -i %iface -p tcp -d %destination --dport %port -j REDIRECT --to-port %rport"
redir6_command_off = "ip6tables -t nat -D PREROUTING -i %iface -p tcp -d %destination --dport %port -j REDIRECT --to-port %rport"
Invalid entry in etter.conf line 176
ettercap 0.8.3.1 copyright 2001-2020 Ettercap Development Team
WARNING: [/home/builder/.termux-build/ettercap/src/src/os/ec_linux.c:disable_interface_offload:281]
cannot disable offload on wlan0, do you have ethtool installed?
WARNING: [/home/builder/.termux-build/ettercap/src/src/ec_redirect.c:ec_redirect:258]
Cannot setup redirect (command: sh), please edit your etter.conf file and put a valid value in redir_command_on|redir_command_off field
FATAL: Can't insert firewall redirects
Thanks for your help!
I've been testing out facial recognition software. From my test images, the only site that gave me a relevant result was Pimeyes. They found 2 images that appear to be the same person.
Since Pimeyes charges about 20USD for the URL for each image found, I tried screenshotting the resulting images and reverse image searched those through several sites. No results.
What's curious to me is how Pimeyes can apparently find images that no other site finds? I'm sceptical because the reverse image searches didn't bring up anything, yet the 2 results from Pimeyes look legit.
Any suggestions to move forward without paying for Pimeyes?
basically the title, for a while i was making hacking tools and published them as free and open source, but right now i want to make some money using them(i realized itch.io allows hacking tools), so what are some of the best strategies for monetizing a hacking tool
thanks
Hello, I am looking to gain access to a windows computer. I have physical access to the computer, but I need to find out the pin number or password or just any way to unlock it. Any help is appreciated 👍.
What language have you found the most exploitable vulnerabilities in over your career?
Backstory on them is welcome. Did you find a no click vuln that would have given the attacker admin level access? I would absolutely love to hear about it
Both developer created ones and ones existing in the language or various functions/processes in language itself.
Is there one that you instantly remember or think of like, oh yeah that's Javascript for sure. Or, yeah by far python, mostly due to developer error. Maybe you have experience as a high level developer and have seen stuff so dumb it made you wanna cry.
Tell me all of the vulnerability things.
I know it memory safe but isn't this making nsa jobs harder or they have backdoors to a programming language?
I got myself a chipcard reader but unfortunately it didn't came with any software to work with and I couldn't find anything helpful with Google either. Anyone here who knows a good software to read/write info from/to chipcards?
Beyond exploits, could hacking involve optimizing home energy systems or designing DIY renewable energy solutions? Where do we draw the ethical line between innovation and intrusion?
TL;DR: Trying to access loved one's encrypted folder that he left for us. I'm using JTR and would like verification that I've setup everything correctly.
Hi All, A few days ago, my dad passed away. It was an absolute shock to all of us. We are slowly rebuilding our lives since the funeral. My dad created an encrypted folder with a bunch of critical documents and he had told us the password many times. He 100% wanted us to open it but also wanted to keep it safe from bad guys.
https://imgur.com/a/uzCOQPS are screenshots of the setup I have running to crack the file. Please let me know if this makes sense to you all.
High level technical review:
File type: .dmg
Encryption: AES 128 or SHA-128
Password: 4 unique words in a sentence.
Special characters, spaces and so are unknown.
I've modified the password list to include all variations of those 4 unique words (capitalization & pluralization)
I'm currently running "Prince Mode"
Hello to all!
I'm trying to test some vulnerabilities on a website with some archive data, and i want to know the best way i can bypass a JWT. I tried the "none" vulnerability and some others but i think the main problem is that i cannot decode the previously JWT data, i think it's encoded or something. I'm not a professional, just trying here and needing some help.
Thank you all!
*REPOST(1+yr)*
A shortcut to using JohnTheRipper for Windows users
ZipRipper: https://github.com/illsk1lls/ZipRipper
All that is needed to get going is the CMD script itself
I made this last year to help someone use JtR. Last time I posted it here there were a bunch of bugs, including LF line endings auto-generated by github that would cause the script to crash. It was more of an afterthought than anything. Somehow it became the most popular script on my github, so I've been trying to keep it maintained, and it's pretty solid at this point.
If you have time, take a look, and feel free to let me know what you think..
Hi, i know this has been asked a lot probably, but is there any way of getting GPS location from online device?
I remember watching a video on YouTube explaining how a researcher found a crazy bug in github through an image upload for their profile. I'm struggling to remember the details but I believe it had something to do with using an image container format that allowed code injection or execution of some sort, though I could be wrong. Anyway he have any idea what I'm thinking of?