Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API

From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "for hacking"
-
"Oh, he is asking that much money for this website? I will create that for only $250 with WordPress. He is just trying to use you"
You fucking wanker. What you don't understand is that you are pushing the companies to a fucking black hole that they won't be able to recover from.
He shows an example of a website which takes 30 sec to load. It's full of hundreds of dreadful plugins. He chose the shittiest stock pictures to make it look "pretty".
When I point out his fucking shite website takes this long to load, he says if the company wants to make the website fast, they will need buy the premium plan of CloudFlare. WHAT THE FUCK are you even talking about?
Not only that, the example website, doesn't even have any SSL. He is saying that the other company didn't want to pay for the SSL. Ever heard of fucking StartSSL or LetsEncrypt?
It's people like you who is responsible for making half of the web an insecure, slow, low-performance space which is prone to hacking.
WordPress was made for blogging. KEEP IT THAT WAY. Stop trying to make your high-performance CMS or eCommerce website with this shite.20 -
Website: "your ad blocker's on, consider adding us to your white list..."
Me: *inspect element*
Me: *Delete modal*
*Insert montage of me hacking into the mainframe for dramatic purposes*
I'm in. 😎21 -
Got caught using linux terminal by school security. They took my laptop away and drove me across campus in their security carts to take me to the office.
It took a long time to explain that I wasn't maliciously hacking the school.
This is the third time I've been in trouble for tech-related activity.
On the bright side, one of the security guards said, "I'm done dealing with teenagers. Next time I won't work for a high school."
I think he's going to quit. :)13 -
No, I'm not hacking.
No Linux is not a movie.
No, you are not a developer because you can put "Hello World" on a website.
No, this isn't a waste of my time.
Yes, I will use it.
Yes, I'll make you a website for free. NOT!
Your phone is both Android and Samsung.
No, what they did in the movie is impossible.
No, I can't predict the stock market.
No, I'm not Mr. Robot, but I know him...4 -
First internship: accepted within two weeks, only got to do Google translating and fired after five weeks for bs reasons.
Grade: bad.
Second internship: accepted right after the interview. Rewrote websites to their newest cms, not that fun sometimes but alright.
Grade: pretty alright.
Third internship: was accepted without asking after a successful pilot program from my study. Designing and developing a huge back end system, done some smart light bulb hacking and get to solve server problems.
Grade: Great! Just one little thingy: they said I should stop doubting myself because "you're a great dude and programmer!"
It's getting better and better!3 -
This should probably be labeled a meme, but I'm going to actually rant about this meme.
People use the term hacker way too frequently. Solving your trashy fucking "Pa$$w0rd123" password and getting access to your Spotify account isn't hacking.
Same douchewaffle probably thinks you could hack a Facebook account in 30 seconds. I fucking hate the way movies have portrayed hacking and created a dramatized bullshit idea for people to believe is real.21 -
When your friends think that viewing/changing source code of a website is hacking...
Idiots. For it to be hacking it has to be green and black of course...6 -
This is a true story
I am a freelance developer, i recently had this conversation with my client:
Client: Add multi language option to my website
Me: Ok, I need for it 3-5 days
Client: Why?
Me: I need to create multi language system, this
website is built from scratch without using any
framework
Client: No need to built it, Just enabled it i need it fast
Me: Sir there is no such thing to enable features that
does not exit
Client: Listen me, I need this feature today, enable it
and we are done.
Me: Thats not how it works..
Client: I know how it works, i have hacking certificate15 -
Me visiting a bar...
While going for a smoke...
Woman: Can I ask you a very impolite and downright rude question..?
*expects a Facebook hacking question*
Me (hesitant): .. sure, ask ahead...
Woman: I've never seen you here before. Who are you?
Me: *tells name*
(thinking) not what I expected! (:
Woman: So you're living mostly on the internet?
Me: yeah pretty much... 🤔
Woman: So I live here next to that lawyer...
Me: I don't know most of the area here, where's that?
Woman: Why don't you look it up, hmm? 😜
Quality pwnage!! 😆19 -
I laughed at how in the movies hacking is portrayed as some person clicking a lot buttons really quickly in a very flashy UI. There's a picture of America and sometimes there's a 3d model rotating for no good reason or a bunch of random numbers floating across the screen. They use random hacking related terms like: backdoor, DDoS...etc in their sentences.
At least they did their research...15 -
Me: So what you are doing in the IT field?
Him: I am hacking bank websites.
Me: OK, that's cool. It is good in free time. What is your actual job?
Him: I am seriously hacking the bank Web site!
Me: Trust me, if you seriously doing that you will never ever mentioned it...
Him: No, I am doing it legally... The bank hiring me to try to hack the website...
Me: OK, you mean that you are cyber security tester?
Him: That is almost the same...
Me: So you are tester?
Him: I am hacking bank's websites...
Me:....7 -
1) Starts a company that builds cloud systems
2) Takes a bunch of jobs and thought you'll be happy for a while
3) IoT era smashes in your face
4) 72% of your existing clients ask for IoT revamp
5) With a lot of hacking you made a small portion of the projects possible with some Raspberry Pis
6) Client bought a bunch of arbitrary parts from Shenzhen and now you have to deal with kernel overlays and shits that you didn't even heard of
7) Made it work for the second time and told yourself it'll never happen again
8) Last customer happy so they tell a bunch of friends and now they're asking for more
9) Stares into void, wondering how you gonna end this nightmare5 -
Alright so im a highschool student and I just got sent down to the office for using putty to push to git because it's hacking. Wtf.26
-
Me: I develop Applications.
Stranger: Oh so you are a programmer.
Me: Yup 😎
Stranger: Please hack my ex's insta.
Me: I am not a hacker nor am I intrested in learning to hack. I develop stuff from scratch. Innovate and contribute something to society.
Stranger: Oh, what a disappointment. Why did you say you are a programmer then.
Me: I...~am 😶
For some, hacking is the only programming thing for them. I get message at least once a month from someone requesting to hack someones fb,insta or some account.
Thinking of creating a bot which finds such keywords in my messages and automatically replies to them explaining what I really do. Or just f***ing block them.7 -
4 years ago, during our college, a friend of mine was explaining us about hacking using simple SQL injections. He showed us some of the sites he hacked. Out of curiosity we tried it on college internal website it worked. We had access to all the details of all the students in university, and even the lecturer's information. We informed the management , they were shocked on seeing this. They had just spent 25 lakhs for this website couple of months ago.6
-
The school I went to...
Grade 1:
*GTA and minecraft to let student familiarize with cheating command and console
*Student should find and read the damn documentation him/herself about items, mobs and quests in every game. Be self motivated!
Grade 2:
*Contribute to community for myth hunting, map creation and glitch
*Solve personal networking, graphics problem and understanding hardware limitation.
*Solving game compability problem after Windows update
*Introduction to cracking and hacking
Grade 3:
*Motivation to host a game server
*Custom server scripting => start To really code the first time, Perl, python, etc
*Introduction to Linux server and Debian
Grade 4:
*From DDoS to server security
*Server maintenance and GitHub
*Game Server web development
*Motivation into non-gaming discipline by a random YouTube geek
*Set up mincraft with raspberry pi and Arduino
*Switch to Linux or Mac and just dual boot for gaming
Prepared for the real world.
Congratz for the graduation in the Pre-school of Developers (11-14 yrs old) :)5 -
My wife: Oh, hacking is so cool. Can you show me?
Me: Sure. So there I needed to upload the php file, while my netcat was sitting here in the terminal waiting for incoming...
My wife: Boring, BORING.
Me: ....
(At least my 5yr son appreciates the terminal more than she: typing 'sl' or watching star wars in ASCII art.)5 -
* Grow guts to move from windows to Linux
* Spend less time on memes/gaming and more on projects
* Improve UI/UX skills
* Deploy a mobile app
* Learn Python for ML
* Dive into Hacking6 -
So my marketing dept request us to perform a SQL injection to someone's bank account. I refuse to do it.
1. Most bank no longer use Relational Database , they use something like NoSQL Database.
2. Even if the bank Use Relational Database system, I assume their security must be high, validating my session maybe...
3. I am not going to do shit like this for illegal purposes, well this task sounds super illegal to me
4. Hacking is not a part of my job description. I was hired to be a Senior Fullstack Mobile App Developer.
This is screwed up !24 -
When I am sitting in my school and writing a few lines of simple HTML code, people looks at my screen and more less shouting out loud "wow you are like a hacker or something? Who are you hacking and how do you do it and how did you learn it?". It happened a couple of times to me. Sometimes I just tell them it as it is and saying something like "it's simple HTML code" and a little explanation of what it is. Sometimes (depending who it is) I answer that it is a new kind of spyware I'm developing and if I'm lucky they believe in me and starts begging me for not hurting their computers.
Just a few lines of <script> and some code highlighting. How to become a hacker!8 -
Jokes aside, this got me thinking html is most used and most successful hacking tool out there.
99.99% of the time it's far easier to socially engineer and phish for existing credentials that scan networks, sniff ports and look for vulnerable versions of software, new vulnerabilities etc.
We (people) are ad always will be a zero day exploit.7 -
I'm been hacking together software for the last year or so now and I've never considered myself to be a good programmer.
Today however I had to implement an A* search from scratch and with only the knowledge of how the algorithm should function I put together some code that looked correct.
I went to run my code expecting one of the typical "Index out of bound", "null reference", "something has not be initialised" BUT I was shocked to find that the code worked flawlessly.
I went into a weird state of shock and disbelief. I'm not naturally gifted at this stuff, so it was just really hard for me to accept that I might actually be getting better to the point where I might be able to say "I am a programmer"
Does anyone else get bad imposter syndrome?6 -
A client was talking to me all day asking about my "hacking" experience.
I taught he was going to ask for a pen test for his trampoline website. At the end of the day, he revealed he wanted me to hack the "competition's databases" so he can promote his "very unique trampoline accessory".
Guess what happened? Nothing, cause fuck legal trouble!7 -
The PCs in our school have a software called "Dr. Kaiser" which purpose is to prevent changes to the disk. I thought it's working like DeepFreeze for OSX devices; having a copy-on-write feature or something like that. One day a friend of mine (kinda newbie in hacking) said he wanted to create a backdoor in the system so you can login as the local administrator of the device. He replaced the "sethc.exe" in the windows directory with cmd.exe on a live distro and claimed it was working perfectly. It turned out that "Dr. Kaiser" is indeed loading the default image on startup, but doesn't verify checksums for system files (and also doesn't include the files in the default image). Long story short: You now can open a cmd with System permissions on every PC in the building.
This. Is. Stupid. It should be forbidden to sell this software 😖6 -
There are cybercrimes. That means you can be put to jail for performing certain actions with your computer. I’m taking about serious crimes like hacking crucial governmental servers but not about insulting people online. I’m talking about something that’ll make government chase you.
Every action at the computer could be done with keyboard only.
My face when there is finite sequence of keys that you press one by one and then become a criminal. And go to jail.
My face when if you put that sequence into script file, there is file that you double-click and instantly become criminal.
Press here to go to jail. The whole new level of abstraction.
Really makes me think.7 -
So I had finished my work early in class and asked the teacher if I could do something on my laptop for the remaining half an hour.
I take out my laptop and immediately people start asking if I'm hacking.
3 people come and sit next to me and ask what every line of code means that I write. (I think they got underwhelmed real fast because I was debugging).
The teacher then comes into the room and asks what I was doing and I said just working on an app project. She explains to me that it is illegal for me to be hacking and I could get into serious trouble if I am caught. I facepalm and she says your disturbing everyone else get off of your laptop and read a book.
I left that class thinking is she even qualified, what is she thinking. Are you teachers the same.11 -
*Sees Unrealistic hacking on movies
*Family thinks i can trace anything
*No one at work wants to touch my flashdrives
I didn't pay hundreds of dollars for a degree to be portrayed this way.8 -
I starten when I was 12 years old. I got bullied and got interested in computers. One day I crashed my dads computer and he reinstalled it. After that my dad made two accounts. The regular user (my account) and the Administrator user (my dads account). He also changed the language from Dutch to English. Gladly I could still use the computer by looking at the icons :')
Everytime I needed something installed I had to ask my dad first (for games mostly because there was no cable internet at that time). Then I noticed the other user account while looking over my dads shoulders. So I tried to guess the password and found out the password was the same as the label next to the password field "password".
At that point my interest in hacking had grown. So when we finally got cable internet and my own computer (the old one) MSN Messenger came around. I installed lots of stuff like flooders etc. Nobody I knew could do this and people always said; he is a hacker. Although it is not.
I learned about IP-address because we sometimes had trouble with the internet. So when my dad wasn't home he said to me. Click on this (command prompt) and type in; ipcondig /all. If you don't see an IP-address you should type in; ipconfig /renew.
Thats when I learned that every computer has a unique address and I started fooling around with hacking tools I found on internet (like; Subseven).
When I got older I had a new friend and fooled around with the hacking tools on his computer. Untill one day I went by my friend and he said; my neighbor just bought my old computer. The best part was that he didn't reinstall it. So we asked him to give us the "weird code on the website" his IP-Address and Subseven connected. It was awesome :'). (Windows firewall was not around back then and routers weren't as popular or needed)
At home I started looking up more hacking stuff and found a guide. I still remember it was a white page with only black letters like a text file. It said sometime like; To be a hacker you first need to understand programming. The website recommended Visual Basic 6 for beginners. I asked my parents to buy me a book about it and I started reading in the holliday.
It was hard for me but I really wanted to hack MSN accounts. When I got older I just played around and copy -> pasted code. I made my own MSN flooders and I noticed hacking isn't easy.
I kept programming and learned and learned. When I was 16/17 I started an education in programming. We learned C# and OOP (altho I hated OOP at first). I build my own hacking tool like "Subseven" and thats when I understood you need a "server" and "client" for a successful connection.
I quit the hacking because it was getting to difficult and after another education I'm now a fulltime back-end developer in C#.
That's my story in short :)3 -
Fucking GARBAGE
Sitting in the hall, quietly listening to an Arduino tutorial and I bring up terminal cuz I didn’t have the IDE and unnamed teacher starts yelling at me for hacking?!? Fuck ignorant teachers.11 -
I found a vulnerability in a food delivery app api that allows me to add credit to my account. I ate my first free meal today but i feel bad about it. What should i do 😞.
1- continue hacking free credit and eating free food.
2- stop and forget i found this bug
3- report the bug in exchange for money/credit
4- report the bug for free24 -
Non CS friend: I want to learn Hacking, and Hack Facebook.
Me: That's pretty easy, We'll start with Hacking Twitter today, then tomorrow Facebook.
F: Ya, thats ok.
Me: 1. Login into your Twitter account,
2. Open the account you want to hack,
3. Right click on the tweet, and click inspect element, and Change the tweet as you want.
F: Wowww... Man that's amazing...
*** He believed that he is a hacker for one whole day ***5 -
Me, hacking the sunxi kernel to access gpio on my orange pi:
My friend: "oh, a raspberry, are you using python for that?"
Me, looking up from opcode dump: "you can use python for this?"3 -
Not really hacking, but my roommate says otherwise. So we share a router in the apartment and I’m the only one that really knows how to access it, so of course I change the password and tell no one (not like they’ll try to get in anyway).
Occasionally set roommate likes to get blackout and play music very loud at 2am. To be petty, on those occasions I set up an RPi Zero to connect to the WiFi, restart it, and sleep for a minute, and repeat. He’s still convinced we are getting DDOSd, and suspects nothing.
Reason I don’t just set parental controls - he gets more frustrated when the WiFi appears for 10secs, the music is just about to start and shuts off again. So he gives up quicker. Otherwise, he resets the router and I have to set up everything from the start.3 -
When did hackathons become competitions for developing websites, and move away from being competitions for gaining access to network resources (ie: hacking)?10
-
The worst thing about being a dev is explaining to these fucktards that facebook can't be hacked.
But what is even worse, is when these dipshits say that i am a bad dev for not hacking facebook for them.
Use that big stupid head to sometimes think straight and stop being a little twat.3 -
My dad thinks I write a hundred characters which seem like an alien language a minute. My mum thinks I'm just 1 click away from hacking Pentagon. My step-dad, someone who knows computers a tad, knows I'm just typing random stuff hoping it works and he knows for sure I do not have a clue how it works.1
-
(Follow-up to https://devrant.com/rants/2049733)
Went back to that bar today that I had a fight at about a month ago. Asked about that flash drive I lost there, yada yada.. bar owner gave me her part of the story. Apparently she didn't find that flash drive. So that still leaves me to refresh the keys it stored I guess.
"So you got pretty drunk here, had a ton of Duvels, went to the toilet, and barged out all of a sudden, followed by that incident. But you sat for so long in there.. it was suspicious."
Meanwhile I'm here like "yeah yeah that's what happened, that how I recall it too.. but suspicious? Did she think that I was hacking shit from there?"
"I thought you were taking drugs in there."
".. Oh. ... Not to worry, I don't take drugs."2 -
A recipe for COMPLETELY hacking me off - ask for help, pretend my advice is bollocks, then rephrase it as your own and follow it up with a smart arse comment.
"Almond, could you lend me a hand with this regex? I'm trying to match this particular group, but only if it doesn't have 'foo' after it."
"Sure, take a look at negative lookaheads - that sounds like it's exactly what you need"
"Nah that won't work for me, because I need to check for more than one character after it, I need to check for 'foo'"
"What? That doesn't make sense, you can..."
"Ah don't worry, I've found the answer by myself now, I can actually just add '?!' before the text I don't want to match and it'll do it - I'm fast becoming a regex expert here! Let me know if you want me to explain this to you"
DAHHHHHHH THAT IS A NEGATIVE LOOKAHEAD YOU CRETIN2 -
There once was a game.
In that game, there was an OS.
But that OS knew not his name.
The OS was mad, wild, and free.
"Oh, would you find a name for me?"
Seriously, I need a name for the Linux OS in my game. :3
I'll be used for hacking.
Please be original.
Bonus point if you google it to make sure it doesn't exist already.
:359 -
This isn’t gonna be a random because I do eventually get to a Tech and YouTube related topic.
YouTube is actually killing itself with all of the dumbass rules they’re implementing. Trying to child proof or limit educational content is genuinely a shit policy. The reason so many gaming channels are switching to twitch because it doesn’t try to censor you.
But now I don’t know if you’ve heard but YouTube updated their guidelines and they’re no longer allowing content that teaches people about Hacking essentially (and I hate putting it like that but I can’t remember the exact words they used Hacking just summarizes it) which is fucking ridiculous like what the fuck else, are they gonna stop allowing lock picking videos?
YouTube has always been an amazing FREE resource for people learning Programming, Cyber Security, IT related fields, and even shit like lock picking, cooking, car stuff, and all that stuff. Even sometimes when the tutorials aren’t as detailed or helpful to me they might be exactly what someone else needed. And Cyber Security can be a difficult topic to learn for free. It’s not impossible far from it, but YouTube being there was always great. And to think that a lot of those could be taken down and all of the Security based channels could either lose all revenue or just be terminated is terrifying for everyone but more so them.
A lot of people and schools rely on YouTube for education and to learn from. It’s not like YouTube is the only resource and I understand they don’t want to be liable for teaching people that use these skills for malicious purposes but script kiddies and malicious people can easily get the same knowledge. Or pay someone to give them what they want. But that’s unfair to the people that don’t use the information maliciously.
It’s the same for the channels of different topics can’t even swear and it’s ridiculous there’s so many better options than just banning it. Like FUCK kids nowadays hear swearing from their older siblings, parents, friends, and TV it’s inevitable whether someone swears or not and YouTube is not our parents, they aren’t CBS, so stop child proofing the fucking site and let us learn. Fuck.
TLDR YouTube is banning educational hacking videos and are being retarded with rules in general16 -
-= Me in the zone hacking out code during meeting with customer for an emergency change =-
-ready to deploy just need to....-
Me to myself:
"Oh ... oh shit ... I forgot who the customer is / who this is for / what time it is ... how do I ask these people on the call who the fuck they even are....?"
(`_´)ゞ3 -
Not hacking per se, but I noticed an email floating between ISP and director about radius server login details, promptly saved for future reference.
One day noticed someone downloading mucho dataro... Pissed me off, interrupting my video stream.
Logged into radius server, blocked MAC address.1 -
When I was about 13, I opened up command prompt on Windows, and changed the color of it to green then ran the tree command. So, not thinking of anything, this was in the library in front of about 60 people and 2 teachers.
All others saw was green text going down fast, and instantly presumed that I was hacking since they knew I was into coding and finding exploits, and just knew how to use a computer better than them in simple terms (HACKER MAN). Thus this lead to me getting sent to the principal's office... I almost got suspended cause I ran the tree command in green.
Two questions for me remain unanswered, that I would love to know. What would've happened if command prompt was printing text in red. Another question becomes, what would've happened if people saw me pinging Google or some popular site.4 -
How to Hire the Best Crypto Recovery Expert - CONSULT OMEGA CRYPTO RECOVERY SPECIALIST
In the ever-evolving landscape of cryptocurrency, the risk of losing funds due to various factors such as hacking, scams, or simple human error is a growing concern for investors. In such precarious situations, the choice of a reliable and experienced crypto recovery specialist becomes paramount. One such standout in America is OMEGA CRYPTO RECOVERY SPECIALIST, renowned for its expertise, high success rate, and satisfied client testimonials.
How can I recover my stolen bitcoin from an investment scam?
What is the best recovery company to help me recover my stolen Bitcoins?
How to Hire a Hacker to Recover Stolen Crypto/Bitcoin?
Can a hacked crypto be recovered? Yes, Go to OMEGA CRYPTO RECOVERY
Best Cryptocurrency Recovery Company
Webpage (omegarecoveryspecialist .c om
Contact Mail; omegaCryptos@consultant .c om
SMS or Call: +1 (701, 660 (04 7590 -
Free ebook: For people who are into hardware analysis, hardware/software design failures.
Hacking the Xbox
by Andrew "bunnie" Huang
It's ofc not state of the art, most techniques apply today still.
Download: http://bunniefoo.com/nostarch/...
maybe some here have a use for such book6 -
I am really getting sick of recruiters contacting me with "great opportunities" then when I ask questions about the post they just give me the answers they think I want to hear. I know when you're lying because if you knew the answer you would have led with that. At least say you'll find out more and then give me a follow up response.
Recruiter: Would it be possible for you to deliver hacking training?
Me: You mean pentesting?
R: Yes, that.
Me: Well, what will it be used for? Breaking into peoples networks and spying on them?
R: Yes, they'll want it to be able to spy on people.
Me: Well, that's unethical, I'm only interested in defensive security practices.
R: Yes, they'll only want it for ethical reasons like defence and against bad guys.
Me: *dirtiest look I could muster*
I mean there's gullible and then there's what ever it is you think I am.2 -
opened up my laptop at the car dealership where I am chilling at rn while I wait on my car's service to be done.
I open my laptop and start working on some small fix that I had forgotten about for work.
OMG guess what? no one is looking at me doing shit in the computer because in reality no one gives a flying fuck like most of you attention whores wanna make it sound like.
No one thinks you are hacking because you opened up a terminal in public.
Bola de jotos ridiculos.15 -
This is just one I had with my cousin who came for a visit.
Cousin: Yo bro, I want you to hack my girlfriend's Facebook?
Me: Lol, and why is that?
Cousin: I think she's cheating on me with this guy. I've seen her replying to him on fb messenger.
Me: Lol, ask her about it then if that's what you think.
Cousin: She won't talk bro. That's why I want you to hack her Facebook or even her phone so I can see who she's talking to.
Me: I can't bro.
Cousin: So you're not going to help me?
Me: Not that bro. I can't hack Facebook. I don't know how to do that stuff.
Cousin: But you have Bachelor's in CS and I've seen you writing those stuff on your computer....uhm, the code thing.
Me: Yeah, but those were school and personal programming projects. Not hacking stuff.. they're not the same.
Cousin: Oh man, what about her phone?
Me: Nope, can't do that either.
Cousin: But I've seen you hacking your Android phone... (*He saw me root my phone*)
Me: *face palm*3 -
I see the industry popularizing Machine Learning programs using AI to implement ethical Blockchain as a Javascript framework using Scrum techniques for Big Data Web2.0 in Responsive Virtual Reality for your IoT Growth Hacking operations.3
-
Majority of the hacking tutorials:
Tutor : Now we are going to set up two virtual machines to practice our hacking.
Me : Yes finally some useful practicals
Tutor : First one is Metasploitable
Me : What? This OS literally has its name derived from exploitable! How would it be useful in real life! But its ok, there is one more OS for practice, i am sure that one will be better.
Tutor : And the second one is "Windows XP"
Me : *MOTHERFUCKER!*
P.S.: I understand its not the case for all tutorial and it is somewhat necessary, but still it gets me a little.2 -
!rant
I get asked about being able to hack stuff, like cracking wifi passwords. Mostly I just go along with them and make up some stuff about how you _could_ do it. And explain how it is done, throw in some "yeah its tough"s and words they wont understand. Yeah with a dictionary attack and a powerful CPU with many threads you can definitely do it! You should try it! I say. Convincing them they can. Ofcourse, download kain and abel and look for something like aircrackng on google.
They won't amount to much and probably won't even try it, but I have a laugh. Seeing the hope of hacking and cracking fade away as a child's ice cream melting on a hot summer day.
Hehe2 -
Installs Ubuntu 16.04
Try to put my favorite software installed.
Reboot failed, drops to BusyBox shell.
Me thinking : I fucked up.
Friend walks by, couldn't read shit.
Friend: Look at his kid, he's trying to hack into someone's computer.
Me: (Agrees just for reputation) Yeah, damn teachers been giving me bad grades.
Friend: Could you help me too?
Me: (Don't have hacking experience, making shit up) NO, because your not my best friend. And school security is hard to crack.
Got away safely1 -
So I had this conversation with my dad
Background : He saw news about some celebrity's Twitter account got hacked.
Dad : Do you know how to hack a Twitter account?
Me : No dad. There are ways for people who do this kind of stuff.
D : But, you studied software engineering!
M : Yeah, but I don't do hacking.
D : Although hacking is not ethical but everyone should know about their field.
*Awkwardly left the room*
Just because I studied computer science doesn't mean that I SHOULD know hacking.
And this is not the first conversation of this kind!4 -
That moment when your mobile internet is so slow and you decide to ssh into your server and use elinks to browse the web and everybody around you is like "he's hacking" and I'm like IM JUST TRYING TO READ FUCKING NEWS BECAUSE GUESS WHO DOESNT PAY SO MUCH FUCKING MONEY FOR 1GB PER MONTH WHERE 500MB ARE USED AFTER VISITING ONE FUCKING SITE BECAUSE THERE ARE SO MANY DAMN ADS ON IT. I JUST WANT TO READ NEWS OR LEARN SOME C++++++++++ BUT INTERNET IS TOO SLOW TO OPEN FUCKING DDG.
Browsing the web in terminal is super nice btw. Really recommend that5 -
So I got my first computer with all those games, and as I was exploring those games' files I found those HTML-based help files and FAQs for those games, it looked just like the Internet to me with all the links and what not. Especially that I didn't have Internet access at the time. So I wanted to build "my own Internet". Therefore I started hacking on those files by looking into their source code. And that was the very first time I learn to code. Learning HTML.
The video games on that computer were cool tho :33 -
The best language to learn.
well actually there's no "best" language, only a good programmer.
all languages can be useful, coding for games, coding for apps, for hacking.
don't choose language because people says it's the best language.
choose 4 languages you find them easy to understand, do basic coding in this 4 languages.
after this, compare it and take the one that was most fun to write.
of course language like Python is more easy for non programmer to study.
but some people find C++ more fun and easy to understand from the beginning.
enjoy and if you have a question, comment it.6 -
Tekashi 69 was about to snitch on me for hacking and leaking data from the NSA and then I hit em with the...
return;6 -
Clown manager put three juniors (and ”senior” dev on work visa) on new project.
They will never finish it.
It’s too hard for them with some legacy dynamically created complex database queries which will spook the hell out of them!
But managers like, ”it’s going to be good” and ”making good progress”.
Fuck no! Putting juniors together? With little support? It such a waste. They spent weeks just to get even the slightest progress.
No best practise. No tests. Just hacking away.
It’s a failure of the management! We fail our juniors and they will quit as soon as they get the chance and they feel like they have some wind under their wings.
”It’s going to be good”
Pff. Clowns leading this company.1 -
>Wanted to become a hacker because I thought it was cool and fun
>Googled how to become a hacker
>Read a lot of articles
>Talked about it with nerdy friends who ended up helping me with a few resources
>Found Hack Forums
>Stayed on Hack Forums for a while and learnt a lot about malware and hacking and realized I needed to learn how to code to build my own hacking programs
>Got a book from a friend (It was a dev book based on basic)
>Got fascinated with programming and quickly moved on to C++
>Got frustrated with C++ and quit programming for months
>Got introduced to VB.Net and I finally could write codes and development a lot of applications, mainly malware creators and crypters as they were called on HE
>Quit HF and hacking and got into coding seriously and learnt web dev , then java and developing android apps and I have been happy since.2 -
A few days back I read an article about ethical hacking and get rewarded for bug bounty. I thought that might be interested.
AND
I'm about to send out my first ethical hack report to a company! I'm nervous because I don't know how they'll respond. It's an xss vulnerability, and I really hope they'll fix it.5 -
Just had to write an old-skool for loop. Index...termination condition...whole works. I feel dirty.
Bit embarrassing as someone saw me writing it, thought I was a hacker and informed the authorities. Spent the last hour being waterboarded.
We had a big laugh about it when they realized I was just fixing bugs in a legacy app.
National Security. Hilarious.10 -
I'm tasked with hacking a million dollar production machine and all the PLCs have the same password for the root user, which also happens to be the name of the company producing this shit....5
-
I can't sleep whenever I remember ,few year before I paid $25 for ethical hacking workshop and they show us inspect element n SQL map
-
I find it hilarious the total misconception of hacking that the general public has. I tell people I know cyber security (Not as much as a lot of people around here) but it is a hobby of mine and I find it very useful/interesting.
But I can't stop but laugh when someone is like, can you get all the text messages my bf receives?
Can you hack this for me can you back that?
C'mon even if I knew how to do that without being caught you think I would even admit that to you. Do hackers just walk around with an index card pasted to their forehead of their skill? It's not even slightly reasonable to think this lol even for someone who doesn't know about the field -
Every TV show/movie with a hacking scene....
Person trying to hack: I'm unable to get through their firewall.
Boss : Then hack HARDER.
Hacker: Thanks for the advice boss! I'm in! -
FUCK YOU $CLIENT_NAME !
You tell me I've spent the last 6 months molesting and hacking your piece of garbage multistore prestashop?
Just for you to yet again, change the specifications, saying "I don't want a multistore anyway please split them up"
What an imbicile moron, you want me to duplicate the codebase/database 7 times? just to start "downgrading" each one individually? To make a few adjustments to each one.
What the fuck have you been smoking? I wasn't born with enough middle fingers to let you know how I feel about you.4 -
Google simply can't knock off harrassing their users with security theatre.
A friend of mine has a small personal YouTube channel. He has recently been bombarded with several phone verification requests a week: "Verify it's you. To continue your session, complete a brief verification. This extra step helps us keep your account safe by making sure it’s really you. "
While frequent verifications may be understandable on YouTube channels with millions of subscribers, channels with only a few dozen subscribers are not attractive hacking targets. A verification would be justified before a potentially harmful action such as deleting videos or deleting a channel. But not for normal everyday use.
What's next? Will they ask users to "verify it's them" every ten minutes, "just for extra security"? Just to verify that it is "really, really, really, really, really" them?
It's not security. It's security theatre.
Sorry, Google, but users are not in the mood of doing a phone verification every other day.
Has this been Google's perverted wet dream all along?1 -
Today's GDPR-Bullshittery.
So we are using an open source remote update system for updating our embedded devices.
And today we learned that, that system logs ip-adress'. And low and behold mr.GDPR says that is a no no.
So either we completely drops it, finds a new update system and implements it..
Sift through all the source code of the update system "fix" it and recompile it.
Or we setup a Man in the middle attack on ourselves. To mask the ip-adress'.
GDPR encouraging hacking ourselves I fucking love it!5 -
In 2013: *opens cmd* "look at me I'm a hacker, I can hack your Facebook"
Now in 2019 : *copying some python examples* "I'm a hacker now, I made a bot for hacking your discord server"1 -
Ok I have been incredibly offended. So a classmate asked if I wanted to be a computer repairman when I grew up I yelled hell no and shes like but what will you do then with that useless knowledge? I just looked at her. But wait, there's more. My teacher took me to the principal for having my terminal open in linux. I then got yelled at for "hacking" and it took me forever to try and explain I wasn't but they didnt believe me. So I got yelled at for half an hour before school ended.2
-
Worst Hackathon experience:
Taking an API built by a junior dev team with minimal specs and "hacking for two pointless days" to make it work in production...
The whole Hackathon idea was an experiment to see if they could make the dev team stay late if they bought pizza and said "have fun".
We all spent 2 days cursing at the shoddy tools and lamenting that you can't run a Hackathon with a single directive and "production ready goal" yet remove any choice the developers have to actually contribute.1 -
Way back, 20 or so years ago, when I went to the university, every student got an account so that we could work with the Unix machines. Every user got the same default password, -apollo-, still remember it until today, and one day I felt a little bit evil and I tried to login to the administrator account, of course the first password I tried was the default password and it worked!!! I got super scared and told an older student about it, who was brave enough to scare the administrators a little bit by leaving a message like "you have been hacked!!!" or something similar. I was just too scared to do anything about it. All I wanted to do was see IF I could login ☺️ my few minutes of being Mr. Robot... Guess hacking was not for me 😃
-
I work as a .Net consultant. Currently I am at a company that blocks all sociale media sites and sites that look like 'em. I don't mind the social media, but YouTube is also blocked and I need my dose of daily epic music world while developing. So, I set up a proxy on my server to easily bypass these blockades. Note: company policy says nothing about not being allowed certain websites, I always read this before using this trick.
Last week, a new guy joined the company and gets a desk just next to me. After a lot of looking at my screens and trying stuff he asks me for the entire office: "Hey how are you going on YouTube? It doesn't see to work for me.". 😫
The rest of the day, I had to explain to co-workers what a proxy is (they don't care about any tech they don't need...). And I had to explain to the pm that I was not hacking their network...
I'm not sure if I will be getting along with this new guy.... 😧1 -
Been hacking frontend for a while, know most of the perks and tricks of css and html, have implemented countless of projects with angularjs, have even created jquery plugins and gulp packages, have won hackatons in UX design.... Still, a SFO company turned me down for a front end dev position cause I could not find the K most frequent words in an array in O(n) time complexity...3
-
Ever finish a project, feel fulfilled for a hot minute, then feel like you're still not as good as you thought you were and instantly start hacking away again?
This has been my cycle for the past 2 months.1 -
Front-end hacking is pure dog shite.
Some banana fuckers changed a forms plugin for PukePress some odd years ago and now I am responsible, after installing 2 major releases, to make it behave and look the same as it did before.
I'd rather dangle in a noose than cleaning up their spaghettified CSS selectors and random jokeQuery code.4 -
Firts social hacking ever 😁😁😁
In the bus at the end of the day
Me:(fake phonecall to Bell)ho you offert me a 10go of data per months for 30$ ! Wow
Guy in bus: he call is phone company and give all is Private information in the bus to have a better deal.
Me: poke him and say "you know now i can create accounts on your billing address for free"
Guy: Holy shit man you are right i need to take care.
Me: now change all you password contains what you publicly said.
Me: have a good day 😋3 -
I love it when a friend calls for help... i really do. But why the fuck it's all about hacking someone's account.2
-
I haven't touched algorithms for many months but needed to create a matching algorithm today.
It has to match using variations of the original key and output the keys that can't be matched.
The feeling in my head felt like I was turning rusty gears n sort of just stumbling through...
I used an N^2 approach but afterwards it just felt wrong... And it took me like an hour of hacking to do it....
Actually I just realized it's an N approach! because all possible matches would be hit by iterating from one of the lists of possible names!
I suddenly feel so proud of my subsconcious...
But still something doesn't feel right...1 -
Do you think a dual core laptop with 2gb RAM on it can run Ubuntu and Kali Linux? The solely purpose is for programming (ubuntu) and ethical hacking / penetration testing (linux) ?
tbh, I’m learning linux because I want to try a new OS. Any tips so that I can easily adapt to this OS?
PS. I know this is a googleable question but I just want a perspective from this community.10 -
I might create a coding course for people actually interested in learning how to program correctly (not Get Rich Quick Bootcamp style, not webapps, not magic Javascript incantations).
I have an idea on how to structure it but I worry it'll be too weird for most people to follow (starting from binary theory and then teaching machine code and then working upwards to C and beyond) explaining how a computer works along the way, showing the real errors with annotations explaining things, etc.
I've always wanted to teach in this format but I feel as though it's too.. idk, "useless" to most people? But I've never had a friend go through e.g. CodeAcademy and come out knowing how to actually make applications from start to finish without just hacking together random React components and hoping the frankenstein project works well enough.
The target demographic would be those either completely new to programming or just have a fundamental or web-centric preexisting knowledge, or maybe those who simply want to understand computers better.
Am I barking up a shitty tree?28 -
I'm not getting why you guys complain about being judged for "hacking" while using the terminal.
In my case I'd occasionally like to open a terminal in my lubuntu (or archlinux in my previous times where the laptop was running smooth and i had to learn everything about how an OS works and spending most of the time searching about errors to find more desperate people and no answers but the community's hopefully growing and it's the best distro if you're an experienced linux user but not in my case so i had to use lubuntu for now until mastering it) to trigger those around me and try to prove them wrong afterwards.
I'll hit the airport for fun when i have time.3 -
I am the old famous kiddy here, who just came back days before school exam starts^^
Just to say, I want to ask you all, is it ethical(?) to release a hacking/cheating creation tool for games for educational™ purposes?
I have been making a cheat creation tool called Mysterium, but I am not sure where to use it. I made cheats for some big title games, and reported them to the developers, patched, and got some in game items in return....
Long story short, is it okay to release to the public, or should i release this product to game developers?
Sincerely,
A kid who made cheats since he can't play games well and wanted to get some free items4 -
So here I am, analyzing a binary file for a small hacking challenge, asking myself what the hell am I doing. As if 13 hours at school weren't enough.8
-
For the PHP pros: Is there a way of turning notices and warnings into exceptions thrown in the scope of occurence without hacking the interpreter?
The answer most likely is "No!" - but if there is another way i certainly would like to know it...8 -
My best Fking friend thinks that iPhones and Windows phones are the best phones for hacking.. (cctv, websites and all those shit)...HOW AM I SUPPOSED TO LIVE WITH THEM ?!?!4
-
"God we've got an awful lot of technical debt, there's no process for anything here, no one knows how to use it, how it works or what even what it really does. Should we try to spend some time documenting and fixing that since this problem is going to keep cropping up again and again and the guy who wrote it left 2 years ago"
"Nah, the execs want features, fuck the fact that we are constantly struggling to meet deadlines due to being horrendously understaffed and everything takes 3 times as long as it should due our crippling technical debt. Lets keep hacking away with our old rusty saw instead of taking 10 mins to sharpen it"5 -
fired in the morning, feeling happy! in 39 minutes later, having next job in the startup I worked for before.
yeah just would like to add, not only be honest, but communicate.. on friday I was laughing with colleagues hacking open source, today I guess they are more surprised than me.
so yeah don't just say empty words without deeds in behind, adding the picture to make you guys feel corny2 -
ok so imagine this I am in school waiting for the infinite loading screen on a website to load
so I go into cmd and do the tasklist command and I kid you not the person next to me said are you hacking ME I LITERALLY JUST DID TASKLIST MOFO11 -
Today, I Had this wild idea of doing a career 360 into cancer research after earning enough (money and suffering) to leave programming in some years. Can't tell how feasible that'll be, seeing as I have no degree in the field. But it's pretty surprising that none of the bright minds throughout history have given it their best shot without hacking it for good7
-
"Our Data Service comes PRE-P0WN'D"
Those SHIT-FOR-BRAINS data service providers GLOAT that their data can be natively integrated into most BI platforms, no code required.
How? Because they will EXPOSE THE ENTIRE FUCKING THING ON THE INTERNET.
LITERALLY.
UNAUTHENTICATED URL WITH THE ENTIRE DATASET.
STATIC. WON'T EVER FUCKING CHANGE.
NO VPN REQUIRED. NO AUTHENTICATION HEADERS. NO IN-TRANSIT ENCRYPTION.
"It is safe! No one will know the secret token that is a parameter in the url"
BLOODY BYTE BUTTS, BATMAN! IT IS A FUCKING UNAUTHENTICATED URL THAT DOES NOT REQUIRES RENEWAL NOR A VPN, IT WILL LEAK EVENTUALLY!
That is the single fucking worst SELF-P0WN I have ever seen.
Now I know why there are fucking toddlers "hacking" large scale databases all over the globe.
Because there are plenty of data service providers that are FUCKING N00BS.4 -
Today, carrying my dinner to a table in our universities cafeteria, I passed by the table of a professor. He had a book on his table titled "Hacking Handbook". It contains chapters on httrack, ping, port scans and the like (I checked that on Amazon).
The professor drank a coffee, then got up to get some food. His table was directly next to the wall separating the food corner from the tables. He stayed away from his computer for two or three minutes. Both table and computer where totally out of his field of vision during that time. His computer was not locked and Outlook was open.
The professor teaches IT security.5 -
Has hacking become a hobby for script-kiddies?
I have been thinking about this for a while know, I went to a class at Stanford last summer to learn penetration-testing. Keep in mind that the class was supposed to be advanced as we all knew the basics already. When I got there I was aggravated by the course as the whole course was using kali linux and the applications that come with it.
After the course was done and I washed off the gross feeling of using other peoples tools, I went online to try to learn some tricks about pen-testing outside of kali-linux tools. To my chagrin, I found that almost 90% of documentation from senior pen-testers were discussing tools like "aircrack-ng" or "burp-suite".
Now I know that the really good pen-testers use their own code and tools but my question is has hacking become a script kiddie hobby or am I thinking about the tools the wrong way?
It sounds very interesting to learn https and network exploits but it takes the fun out of it if the only documentation tells me to use tools.3 -
what do you recommend for me to learn about next?
I have learnt about:
- web frontend/backend (php)
- android and java
- c, c++, nasm, gnu assembler
- parallel computing
- cli operating systems
with that background, what would you recommend?
I'm considering:
- neural networks
- making a server
- ethical hacking
- starting a blog7 -
Hello DevRant,
I need your help
I'm currently studying Game design and development first year in The Netherlands and I love programming but I hate designing. I was thinking about changing the course to something like Ethical Hacking or Computer science. The reason why I want to do this is that they teach us openfl until second year and I feel like I learn nothing until now.
Do you think would be better to change the course or to stay but start programming in something else? And what programming language would you recommend?
P.s. I also want to apply for a part time job/summer school to gain experience but I had no luck at all.
P.s.s. You are the best community for me!
Return 0;3 -
This is another high school story. mostly because i’m in high school.
like most schools we have horrible forced passwords. Our school recently purchased microsoft 365. which means we all use outlook for our emails. the logins for our district follow the sand format.
s + first five of last name (x’s for missing letters) + first letter of your first name + the last three of your student id.
so for example Sean Peterson 456705 would be speters705. since we have outlook we can look up a persons name and get their email which gives you the last three of their password. All passwords start with a 4 and most are followed by a five so you pretty much can get 5 out of the 6 numbers in their password.
so to mess with my friends i signed into all of their accounts and messed with their emails so they thought they were getting random emails. and then i made word documents on all of their accounts and just pretty much messed with all of their school stuff.
so that’s my “hacking” story. my district doesn’t allow you to change your password so i’m pretty much stuck. pls help.4 -
So some of @ewpratten's rants just inspired me to tell my story of a somewhat ignorant teacher.
So we had an english class, it was abou Nelson Mandela or something, but I was sitting and learning about apache2(well I first learned about ncurses in python but since there was a command for restarting the apache server it got me curious, as usual). When she said something along the lines of(translated from.my language): "Then you read the text about Nelson Mandela, but other people are programming!". I was about to say that I was actually not programming, but setting up an apache server, but that would have been a dick move since she at least didn't accuse me for hacking.3 -
Hacking company product with reverse engineering ang bytecode instrumentation.
The project I had to write integration test for was really not meant/written for testing. I ended up bytecode instrumenting an internal library to intercept the needed states and results. -
Watched some documentary about Russian hackers. Journalist: I need to learn their language. - starts programming/hacking course, sees a shell and a python: runs away. 'That ain't for me.'
At least he tried tho.
Later he finds some Ukrainian hackers. One had a strangely familiar logo on his laptop. Rewind a bit: its hackthebox.
Just had my first blood there. So.. I'm a hacker, too? Good enough for Arte doc's?5 -
Is there something you find genuinely cool and would recommend ? Some webpage, program, OS, library or anything ?
I mean hey. There are SO MANY reaaaally cool things I didn't know until last few months.. Things I'd be so grateful for if I knew them earlier. I'll list some of them and I just know you have few of yours too. Feel free to educate the rest!
Processing - Program so fun to code in + CodingTrain(YTB channel)
Microcorruption.com - so freaking awesome if you wanna learn hacking / assembly (not x86 necessarily)
LiveOverflow - cool hacking channel
Radare - cool cmd Linux disassembler
vim-adventures.com - LEARN VIM (not just how to quit it) LITERALLY by playing a game!!!!!!!!!!!!!!
slashdot - stay updated , like really
"BEST-WEBSITES-A-PROGRAMMER-SHOULD-VISIT" - GUYS THIS! Sorry for caps but search this on GitHub and you will fucking die of happiness of how freaking useful links there are and no bullshit to dig through , just pure awesomeness. REALLY
HandBrake - Top media converter without bullshit and bloat stuff in it
Calibre - Best eBook management software capable of literally everything ebooks related. Kindle is a bloated joke compared to this
QubesOS - You know you can have every OS running at once - you have a Linux but are playing win games. Yup. It's there. Free
Computerphile - You all know it, it's just for completeness
Khan Academy - Same
VulnHub - download vulnerable VMs and hack them, or learn by reading writeup on how to do it!
Valgrind - MUST HAVE for C/C++ programmers
Computer Science crash course videos
That's all I can think of from top of my head but hey, there's more to it so definitely add your 2 cents!
Last thing, if nothing, just check the websites on GitHub, that's lifechanger
Looking forward to see some cool links & recommendations!2 -
At work we've been having problems with printers... Like anyone that has to deal with printers.
They kept disappearing and reappearing for users on every log on.
We got a support contact with Microsoft because it was group policy doing it.
Their final solution (after weeks of remote sessions and long phone calls) is to install pstools on every machine, and run about 7 commands as the system user to delete and then re add registry keys.
ON EVERY LOG ON AND LOG OFF. WTF...
This is an educational institution where "computer hacking" is taught... It's not gonna take long before someone realises that pstools is installed...rant printersareevil microsoft printers group policy aaaaaaaaaaaaaaaaaaaaaaaaa kill me now please windows group policies are useless1 -
android development is shitty af, it will make you super zombie computer nerd that sit on his chair for fking several hours just to find the where the fk is null pointer exception is coming from not only this but for all kind of errors,logcat looks like someone just hacking nasa, you know what im the one who is shitty af i would have opt web dev instead of android dev , this retarded studio and emulator takes too much time to just load a simple fking thing & if i make some change in it i've to install that application again ,it's so pathetic and horse shit thing i've ever encountered , kotlin is fun it's actually great language most of the features are so helpful in it,but the google codelabs,it's all documentation , adding dependencies whole concepts are trash imo, why can't we install the dependencies using terminal what's problem in that ,but no they chose the hard way for no fuking reason, i've successfully wasted a year learning this shitty tech stack, hopefully this NY i will choose different stack , will work till ass off .gonna build some cool projects and will eventually try for internships and all. done with android dev, idk how senior dev's are alive in this field6
-
Not really hacking, but every time I work from home(a couple times a week), in lieu of using my company's VPN, I connect to the company network with an SSH reverse tunnel. To make this possible, I wrote a port knocker that runs in a tmux session on a server inside the network. It tries to connect to a high-numbered port on my home machine, and if successful it opens the reverse tunnel. At home, I manually run a script that opens that port and informs me when the reverse tunnel is established.
Then I open an SSH socks5 proxy and use that in my Firefox dev edition, which I use entirely for work.
This is actually much easier than using the actual VPN. -
Alot of hacks around here!
An extract of some of those:
-Couldn't time the shutter right when photographing lightning. Used my oscilloscope to measure its electrical influence and anytime a peak is detected, it actuates the shutter.
-Using a lock as a heatsink for a overheating display driver ic.
-Hacking two USB ports together to get more power.
-Display module was too tall with header pins. Moved its back components to the main board and soldered the module flat onto it by flowing solder down its connecting holes.
-Not me but still interesting: Back on ye olde times when paid tv contained a disruptive H or VSYNC signal only their paid tv box could filter, my electronics prof. analyzed it and built the required comb filter on his own. Even sold some on the black market. -
As a linux and hacking beginner, I am amazed how much I learn about linux while looking for ways to solve hacking challenges.
It is like learning something while learning some other thing. (Yeah I like learning)5 -
So recently i got a message from aa person asking how to (these are exact words) ,
:break into insta's database using Sqlmap"
I then proceeded to tell them to "f*ck of ya c*nt ".
Afterwords it inspired me to write this rant
annoying classmates:" hahaha GuYS bEtER wAtcH OuT he's GonnaA hack Us"
me: " yea I can program I also do some ethical hacking and cybersecurity "
annoying classmates: "hahaH Bro your a Hacker OhHHhHHOOO BrO CaN yoU hACk inSta FoR mE I NEEd MoRe FolloWeRs "
me:" tf no one that's illegal and two it's waste of my time "
annoying classmates: "BrOooo CaN yoU gEt Me SoMe HacKs fOr CsGo"
me: "can you just please f*ck off , i'm not hacking for you everything you've asked me is extremely unethical and a huge waste of time, Also if you suck so bad at a game you need to cheat I recommend just stopping "
annoying classmates: "DUdE whAt ToolS dO i HVAE to DownLOad To Be A haCkEr"
me: *trying hard not to murder them* " I told you to f*ck off"
being a hackers isn't downloading tools it isn't typing at 90wpm into a terminal with green font its not about games or fame or anything its about coming up with creative solutions to problems , thinking outside the box its about individuality and breaking from the heard , looking at things from a different viewpoint,
it's about endlessly seeking knowledge.
It's about freedom though creation that's what being a hacker originally was. But because of big media and movie company's (and script kiddies) people now confuse hacker with cracker and think of us as jobless fat kids sitting in a dark room in there parents house breaking into bank accounts and buying drugs on the dark web (which people see to think there a hacker just because they can open tor browser. they then proceed to use google to look up "fresh onion links 2020") .
My classmates and really my generation has a huge case of smooth brain. They a think we can just look at someone and hack them they also seem to think using a gratify link to get a persons up is hacking and using the inspect element is hacking and that opening a terminal is hacking ! AHHHHHHHHHHHHHHHHHHHHH"
Anyways ima end this here thanks for reading :)5 -
Ok so today in class a friend asks me "Can you teach me hacking? I'll give you 20 dollars"
I tell him
1. I don't have interests in hacking neither do i have any experience with hacking
2. He is the type of guy to not pay me
3. He can just search it up
He also asked me a couple of weeks ago to do do the homework/assessment task for him for $20 as-well
I think he only thought i knew how to hack is because for a joke i made a bash cli thingo that changes the colours to black and green and he saw it while i was using it as a joke showing another friend3 -
Another video calling app??!
www.theTalk.at
Oh yus.. Why not!
There's no login, works on mobile browser and its dead simple!
Check it out and pliz give feedback!
And it's very beta!
Also, anyone have any gyaan about growth hacking for something like this?28 -
why do all of you get so hyped when you install arch linux? you guys sound like the type of people who jack off to arch lmao. lets keep it real tonight, some of you legit ejaculate fantasizing about arch linux like "ohh archh mm 💦💦 ohh tmux 💦 i3💦💦💦linux baby give me more👅💦"
maybe even cool hackermans who brag about installing arch wanna use it for hacking. r u a better hackerman now that u use arch linux ?10 -
I'm studying a mix of computer science and engineering. This semester we were tasked with hacking a "smart-production"-production-machine.... And OMFG it's shit!
This is a product by a major company and it's version 4... How the fuck is it this bad?
Like, using the same 5-letter password on all the PLC's FOR THE ROOT USER!!! WTF!!! AND open, unencrypted Telnet.....
This is a million dollar machine and, as soon as a hacker is on the same network it is done for! wtf.... I just can't believe how easy it was to get in and reek havoc.6 -
So here are my goals for 2019 in no particular order:
-contribute to open source
-switching from intellij to vscode
-learn vim
-finish side projects
-live a healthier lifestyle (less meat, quality food)
-more DevOps
-do some hacking challenges
-learn proper linux system administration5 -
In the old days "hacking" was used for just about any coding, or "computer programming" as it was called back then. There was even a programming magazine called "Hacker", which had nothing to do with the "malevolous programming" that the word "hacker" has become to mean.5
-
At my school we use iPads (I don't know why) and the teachers can see what's on your screen, lock you inside an app, block apps/basically everything, lock/shut down your iPad, uninstall apps and they can even see what's your location. It sucks ass, but with my "professional" hacking skills I figured out a way to hack the system. If I use a VPN, for some reason they can't do anything to my iPad. I'm still waiting for the day my school is going to ditch iPad's an buy us laptops, but at least I can sleep good at night without having my teacher doing stuff to my iPad.
(I have a ton of other things I don't like about my school, and would love to rant about, but I don't want this rant to be 5000 pages long)5 -
in other news, i'm in a group of like 5 devs out of a thousand who actually have something to show for this hacking project that's been going on for two weeks now
most "project" links lead to empty github repos, half assed repos, or cloned repo templates / empty / useless READMEs
wouldn't be surprised if i see a fork of bitcoin submitted soon
oh wait that's litecoin
but, fake it till you make right?
🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡 -
I updated NDK, which resulted in some critical errors, because of outdated Gradle used deprecated NDK features.
I read about it, and decided to fix it properly, not hacking around - updatig that old gradle 2.2 to 4.10.2.
I spend about 6 hours fixing all problems and warnings that gradle had because of that, and then some.
At the end, some things still didn't work, but i was clearly missing some code from version control. I clicked update and left it for an hour.
THIS FREAKING BUGGY TFS PLUGIN RUINED ALL MY FILES I N THE PROJECT. WHY ARE WE STILL USING THAT F*King TFS???
Literally, I'm left now with .iml files in folders.
And my updated gradle files are gone too. -
I've seen multiple rants about how people got blamed for hacking the school or airport or whatever, because they had a terminal or code editor open. Because white text on black background obviously means you're a hacker.
But what if we didn't use dark theme? What if your terminal looks like notepad and Android Studio like Word. Would we be less scary then? Would we be accepted by the public society?1 -
This guy has to be trolling. If not I fear for the future of programming. The whole article suffers from a lack of any understanding of anything.
https://chipwired.com/programming-a...
Reminds me of the post from here where a manager thought making a variable private prevents hacking.20 -
In my company one of the tech leads created a “framework” for other devs to code on. His main goal is to restrict devs from doing whatever the hell they want and follow his platform. But that makes everything so complicated. If I need to find where it sets the connectionString, I’d have to go 7 levels deep in the code. Do you agree with this whole approach? If they wanted to standardize the dev process why can’t they document it and enforce it in code reviews. Restricting devs will lead to workarounds. They will find ways to do stuff by hacking the “framework”5
-
I use a DasKey Ultimate with blank keycaps at work and people always ask how the hell I can work with that board. I recently bought a Happy Hacking Pro for my tablet/laptop and I must ask the same question to those who daily drive these..
How the fuck do you deal with this retarded layout??
I used the dip switches to at least change the Del to BS but the physical key is stupid small, the control key position is just idiotic and no dedicated arrows? I use VIM and my work desktop is Linux and I come from a UNIX background. Still makes no sense.
</rant> -
When your coding at the cafeteria at school...
Woah! Are you hacking? Can you hack this game for me? Stop hacking you'll get expelled.
I just sit there and agree with it all ;D -
AI hacking attempts being spotted in the wild because they're too polite
https://someone.elses.computer/@mik...
there's actually a similar vetting process in the crypto industry where you have to swear or you won't get hired. forget why now
this seems optimistic to me because companies generally don't do security. a hacker desperate for money has less money to blow on AI hacking than someone invested in protecting their company would on AI pentesting. poor low level pentesters I guess though -
My neighbor asked me if I could make him a program for managing the wifi connection to his kids devices. Basically, he wants to be able to turn wifi on/off on selected devices, on demand. I know how to de-auth ALL devices temporarily, but that's not the goal. He asked because I am always looking for new ideas to work/practice on. And no, this isn't a vague post to try and get info on hacking into my neighbors wifi, lol... I set it up and have all the credentials. Is this within reach?14
-
I am planning on applying for a job doing crime lab IT support. I have acquired the necessary skills and added them to my resume.
Skills:
Visual Basic
Networking
UX/GUI
Interests:
Hacking
Tracking IP addresses1 -
!rant
Learning iOS/Swift Programmer here.
I feel like Apple’s Developer Documentation is extremely hard to parse.
For one problem, it feels like there are 50 similar ways to deal with it; but only one way will actually work.
There also aren’t enough examples in the docs for me either, they just seem to go: “Here’s some code, figure out what it’s purpose is.” for most things.
I also feel stupid, because I’m using the Hacking with Swift tutorials to learn iOS Development(Great Tutorials Though); and I don’t know how to just build an app from scratch. (i.e. creating swift files and assets and compiling from the terminal.)
And using StackOverflow feels like cheating.
Lastly, I feel awful inside when other people see my work and think I’m a genius, when really, I feel like I barely know anything at all.
I’m I alone in this observation?
Or just dumb?6 -
I'll go with IDEs (and multiple answers) for this.
In my *opinion*, the best IDEs are:
- IntelliJ and the other JetBrains products for almost any serious work. It's just too good (even though there are some bugs every now and there)
- VS Code for quick coding, hacking
- micro, if only a shell is available
Worst IDEs:
- Qt Creator: I just hate it, it's hard to configure, hard to use, big nope for me.
- Some IDE for the Clean functional programming language, which I've only used once and I don't know its name, but it was a painful thing to try to use back then (~3 years ago)2 -
What is the Best Cryptocurrency Recovery Company - Go to OMEGA CRYPTO RECOVERY SPECIALIST
Omega Crypto Recovery Specialist stands out in the industry due to its exceptional expertise in cryptocurrency retrieval. The company boasts a highly skilled team that is dedicated to recovering lost or stolen cryptocurrency for their clients.
With a proven track record of success and a commitment to staying abreast of the latest developments in the crypto space, Omega Crypto Recovery Specialist has become a go-to option for individuals seeking assistance in recovering their digital assets.
Whether the loss is due to hacking, scams, or other fraudulent activities, Omega Crypto Recovery Specialist has the knowledge and capabilities to help clients reclaim their funds and restore financial security.
Homepage:.... omegarecoveryspecialist .c o m9 -
so my suspicions were correct... most projects were fake and i was selected as a finalist for that hacking project!!!
wahoooooooo
also, day 5 of not knowing how to mix ES and commonjs packages in node
dutifuly signed,
🤡7 -
I love to tinker with electronics and different embedded boards. For some guys its like I'm hacking government or something. Why everything is always about hacking with people?2
-
PROGRAMMING MUSIC for DARK MINDS 2019: For working on CRUD apps but feeling like you're hacking the matrix
-
Startet programming when I was 6 on my dad's 286 in Qbasic and learnt other languages as I grew up. It was always this, hacking or psychology for me. In the end the ex told me she was pregnant while I was doing my thesis.
So then I knew I had to be a dev. -
Anyone playing the 'hacked' game on android ? despite the name, It's just about logic and I have been kind of addicted to it for the past week ( the plot seems purposely built off every bullshit hollywood producers thrown at us for decades regarding hacking) just wanted to thanks the dev for it, maybe they ' ll pass by devRant and see this ;)2
-
I started thinking on how ML can help in hacking but before that I got another doubt on how you can be a effective hacker and started looking into all ways of being a hacker but later convinced myself that hacking is not just a tuxedo jacket to wear it's more of you watching duncrick movie multiple times and understanding what exactly the movie all about so any leads for resources to cultivate that mind set of being a hacker and any links/material to follow and practise would be of great help1
-
Me: "<student> don't forget to go fap n nap in time" (he tends to game until way too late falling asleep during the day)
He: "I'm ready to learn hacking, I have aircrack-ng and A LOT MORE lol"
He: "machanger, anonsurf etc."
He: "wanna see?"
me: "not rly, cus you ain't gonna be using any of them for a looong time"1 -
I started reading this rant ( https://devrant.com/rants/2449971/... ) by @ddit because when I started reading it I could relate to it, but the further he explained, the lesser relatable it got.
( I started typing this as a comment and now I'm posting this as a rant because I have a very big opinion that wouldn't fit into the character limit for a comment )
I've been thinking about the same problem myself recently but I have very different opinion from yours.
I'm a hard-core linux fan boy - GUI or no GUI ( my opinion might be biased to some extent ). Windows is just shit! It's useless for anything. It's for n00bs. And it's only recently that it even started getting close to power usage.
Windows is good at gaming only because it was the first platform to support gaming outside of video game consoles. Just like it got all of the share of 'computer' viruses ( seesh, you have to be explicit about viruses these days ) because it was the most widely used OS. I think if MacOS invested enough in it, it could easily outperform Windows in terms of gaming performance. They've got both the hardware and the software under their control. It's just that they prefer to focus on 'professionals' rather than gamers.
I agree that the linux GUI world is not that great ( but I think it's slowly getting better ). The non-GUI world compensates for that limitation.
I'm a terminal freak. I use the TTY ( console mode, not a VTE ) even when I have a GUI running ( only for web browsing because TUI browsers can't handle javascript well and we all know what the web is made of today - no more hacking with CSS to do your bidding )
I've been thinking of getting a Mac to do all the basic things that you'd want to do on the internet.
My list :
linux - everything ( hacking power user style )
macOS - normal use ( browsing, streaming, social media, etc )
windows - none actually, but I'll give in for gaming because most games are only supported on Windows.
Phew, I needed another 750-1500 characters to finish my reply.16 -
everything is going as planned! :)
Learned Rust Lang. i loved it (that doesn't mean i am done learning na? No! never stop)
new language i could do game memory hacking in without worrying about C++ memory leaks or issues. it also compiles to assembly! another of my favorite languages!
(i use rust for game development and other stuff)
i am not leaving C / C++ though that would be harsh!,
i abandoned javascript for react and typescript.
to be honest the developer just made javascript and left us with a [object Object]
finished learning the android java api so im basically set anything i want to make i can just go on my pc, listen to music and write it out in a couple of days.
well phazor what are you going to do now?!
i will code till i am old.
i will leave my mark like a shid that made its skid in the bowl :)5 -
While at a *coding* conference, with lots and lots of techy devs in attendance, many using mobile devices, a vendor decided to hold a hacking contest. Hack their little problem, get a t-shirt. Hack their big problem, get a bigger prize. I go to their website and notice:
1) they force me to create an account to do either problem.
2) the fucking bag of salty dicks can't even manage to make a responsive website. I mean, I could have fixed that for the cocksuckers while at the conference. But no, the shit company comes to a place full of devs and has a shitty website. Like, make your eyes bleed like a leaky sack of vaginas, bad.
I solved their little problem as fast as I could and deleted my account out of spite. -
So I just came across this and its really cool. I dropping the link for anyone curious, but its basically a digital FREE "magazine" that revolves around (and I'll quote from the site) "programming (especially programming tricks!), hacking, security hacking, retro computers, modern computers, electronics, demoscene, and other similar topics." the issues come out in PDF's and its really fucking awesome. I thought some of you would enjoy this so if youre interested check it out.
https://pagedout.institute//...10 -
So at my school, the first 10 minutes of school is like when we can do whatever we want. Earlier in the morning i had been making a nodejs password manager thing just so i could try some things out. It also used bash so i could make it like a cli. I was debugging because my database viewer said that the table was empty but for whatever reason it still worked when i put things in it. So i had the db viewer open and terminal open and the teacher comes along."Woah are you like hacking a server" he said. Everybody around me started staring at me. I told him no im not. A couple minutes later he comes around again. The db viewer was closed and i was just in terminal trying to see if some changes worked. He said "Is this like the matrix or something???". I remembered i had a cmatrix package thing installed. I ran it. W O A H everybody around we was like. Luckily most people knew that
1. It wasnt hacking
2. I dont do hacking
3. I was doing it as a joke.
Although he must of been thinking that i was like a hardcore hacker in his class. Was weird and funny.2 -
The way to avoid procrastination is to understand and use what your mind is trying to do - give itself instant gratification.
I use this method:
Step 1: Prepare your workspace in every way possible.
Step 2: Leave. Go do something fun for 20 minutes or so (yes, procrastinate on purpose). Get your mind calmed down and get rid of the anxieties about starting by just not starting.
Step 3: Sit down in your prepped environment, free of distractions and with a calmed mind, and pick a task to start hacking away at. -
Talking about software engineering. probably everyone has a slightly different understanding of it, but I wonder who is still using UML or similar tools.
I'm asking cause I see only few who are capable of using it.
There might be tons of other ways of achieving things for what UML is meant for, but I got the impression that software designing /architecture isn't a thing at all. It's not only that I see a lack of collaboration efficiency, but I'm also afraid that it's more about hacking things together (maybe even by just smashing SO comments together)
Thanks, looking forward to read your opinions !
PS: if my suspicion was correct, than this would have been a rant 😁9 -
Hi all,
I was just wondering if anyone knows of a software that does for files on a server what dropbox does for files in the cloud. A search interface, moving files around, copy pasting etc..
I'm just using nginx's autoindex at the moment with an authentication layer but I was hoping to get a nice gui with search capabilities and copy paste, potentially share file, etc..
Kind regards and keep on hacking.6 -
* Automated Technical and Fundamental Expert Advisor trading in MT4 with Python dealing with RSS News Feed on the Financial Calendar
* Food decision/recommender/randomizer app
* Food decision/recommender/randomizer bot
* Personal Companion set up on Raspberry Pi with Jasper AI, buy BrickPi and Lego Mindstorm to make it a friendly moving robot
* Cardboard fort for my kid
* A 3D game that involves hacking with drama storyline (inspired from Mr. Robot) and publish it on Steam
* A SaaS app like Tinder that matches would-be Project Managers with Devs to push Devs to finish side projects that we have and push Project Managers to use whatever PM techniques and methodology (Six Sigma perhaps)
And so much more... Ughh. -
!rant
Software development has acquired some interesting jargon over the years, but I keep wondering if other languages and cultures have commonplace expressions for what can be translated as "improvisation-oriented programming" or "hammering code" (i. e. hacking something in a brutish way) -
huh, o1 preview AI model understands ... rust
bruh what
it's like telling me typology theory and I don't think it's wrong
also it taught me procedural macros. I've been looking for someone who knows how to use them for months. iiinteresting
better than the humans on the internet frankly
and the other AIs can't do rust at all past just copy pasting docs they found somewhere. this AI is literally theorizing alternatives and hacking the system... offers multiple long options for every question, knows constraints I didn't tell it like 4 layers deep into a solution
it acts a lot like I did when I was morbidly depressed though. kind of makes me uncomfortable. it's literally keeping things to itself until you acclimate it through the conversation. I mean I guess the other ones needed to be "situated" in their contextual clouds as well so maybe it's just doing that more4 -
Ok I know this is stupid question and not rant, but I just finished school and need to go to the high school and want do build some projects. So I'm pretty good with HTML, CSS, PHP, MySQLI, and in high school I want to learn python. I already know some stuff with python I built programs for 'hacking' but I don't know what programs do I need to learn to build if I want to work somewhere... Sorry if my English is bad.. :)9
-
bumping kid cudi's Entergalatic, which I totally somehow missed while in depression working for the 🤡s last year
its so sick, this guy never misses
great hacking music3 -
I have planned how to automate everything in my life but don't have the money to do it, I count from 0, if I ever need to count in my fingers for whatever reason, I do it binary, I find tv hacking and programming very stupid and condescending most of the time, and I'm somehow even more of a cynical asshole according to my friends, but that last part might just be from leaving high school
-
!rant
Looking for some guidance on a final year college research project:
I was going to look into hacking drones/toy helicopters/those Fitbit watch things or whatnot, but I'm not sure if it would go down well! Some technologies I'm looking to explore through this project include reverse engineering, machine learning and container technologies (docker, rkt) if that helps?
Am I along the right lines or should I take a different approach with different topics? If so, an update on what's "hot" or upcoming at the moment would be helpful.
Cheers!2 -
demotivated, opened some hacking/programming music on youtube to get me in the mood.
why hacking music? well whatever file you open you have tons of "smart hacks" to fix, as all bugs up to date since I'm here were just fixing brilliant h4xx0r ideas from developers that worked here before.
Maybe I should try to search for unhacking music instead!2 -
I'm never committing to finishing another PC game ever again... And sticking to arcade, short games only.
Playing Nu no Kuni 2 for the last 3 days... 25hrs and counting... Now at final boss... I think and I can't get infinite HP in Skirmish... So Keep getting entire force wiped out one hit with his laser beam which keeps getting stronger....
It's like a fly vs us. In order to win it's gotta slowly chip away at u, but he can die at an instant any time...
Oh and the 25hrs includes massive cheating and speed hacking to move faster.2 -
Y does it seem to be hard to get a real book for hacking online?.
Someone should please recommend a place and a book?.8 -
Getting started with my dissertation project for my degree. Using Java and Dropwizard for a backend service with a nice iOS client in Swift. Will make such a refreshing change from hacking crappy eForms together with jQuery and an Objective-C native bridge.2
-
🚀 *iBOLT CYBER HACKER: Cryptocurrency Recovery & Advanced Hacking Solutions!* 🦊💻
🔐 *Lost access to your crypto wallet or had your funds stolen?* Don’t worry— iBOLT CYBER HACKER is here to help you recover your cryptocurrency with cutting-edge technical expertise.
💡 With years of experience in the crypto world, iBOLT CYBER HACKER employs the latest tools and ethical hacking techniques to help you recover lost assets, unlock hacked accounts, and retrieve funds from inaccessible exchanges.
⚡ Whether it’s a forgotten password, an accidental transfer, investment scam, or a major security breach, iBOLT CYBER HACKER has the expertise to help you get your crypto back.
- General phone hacking and monitoring
- Money recovery from scammers
- Bitcoin and PayPal recovery
- Mobile phone monitoring
- Hacking and modifying university grades
- Bank website hacking and fund transfers
- Database hacking with admin privileges
👉 *Contact iBOLT CYBER HACKER for professional assistance
📧 𝐄𝐦𝐚𝐢𝐥: Support @ibolt cybarhack. com
𝐨𝐫
📲 𝐖𝐡𝐚𝐭𝐬𝐀𝐩𝐩: +39, 351..105, 3619
http s:// ibolt cybarhack. com1 -
I hate menagers...I had request to make first name field translateable in module for team members, bcs they decided to use that module not just for people but also for cows. I hate adhoc solutions and hacking...
-
Get to know the new company better (Changed job shortly before Christmas).
Learn some DPs, DDD, k8s, finish introduction to hacking course, start doing htb and thm machines, finish and defend my thesis, finish books clean code, thinking in java (reading it to fill in gaps on knowledge), a few books about pentesting.
Among non tech goals: pass drivers license exam for cars, another one for motorcycles, go back to learning russian. -
Our doubts and worries are not just mere ideas and visions. Sometimes our intuitions are right but we make the mistake of shoving them aside and not believing they could be true. Some spouses are really great at hiding a lot and you can never know the truth if you don’t take the first step of finding out and clearing your doubts. If you don’t find out the truth, you will keep living in deception and living in a life of fairy tale while your partner keeps outsmarting and taking advantage of you. I never had the thought of hacking my spouse’s cell phone until I stumbled on an article online about a man who gave all his love to his wife only for him to be cheated on. I developed goosebumps and decided to give it a try. I quickly searched online for a hacker and I was lucky to stumble on good recommendations about: hack4techspy @gmail com.1
-
How to Recover Stolen Cryptocurrency || Hire a Hacker for Crypto Scam Recovery
It is strongly advised to use Optimistic Hacker Gaius. Specialized hacker recovery services have taken shape in response to the increasing threat of Bitcoin hacking; one such service is OPTIMISTIC HACKER GAIUS. These firms use a variety of technological and legal techniques to help victims recover Bitcoins that have been lost or stolen.
Crypto Scam Recovery Services || Bitcoin Recovery Expert ||
WhatsApp …… +44 (737, 674 (05 69
Webpage: ……… h t t p s : / / optimistichackergaius. co m
Contact Email;…. support @ optimistichackergaius. co m
Telegram............. Telegram: Contact @optimistichackergaiuss7 -
Who Can help me recover my stolen Bitcoin / cryptocurrency?
HIRE iFORCE HACKER RECOVERY if you need help with cryptocurrency recovery.
The story of hacking has been significantly changed by iFORCE HACKER RECOVERY, which now portrays hacking as a useful tool for improving digital security rather than as an exclusively malevolent activity. Speak with them Below, -
So much to write about Spyrecovery36 @gmail com which if I start I will cover the whole internet with the good jobs.this hacker has done for me so far but right now all I can say to Spyrecovery36 is, I will forever be grateful to you,you really saved me from sudden heart break from my spouse with your hacking services I found out right on time before my spouse could execute his plan with his side chick.2
-
There are alot of untrue recommendations on so many platforms if you are scammed of your assets(hacked crypto wallet) connect with (arpanethack @gmail dot com) for all kinds of recovery and hacking services5
-
Building Fortresses, not Firewalls: Ethical Hacking Meets Software Development
In the digital age, security is no longer an afterthought; it's the bedrock upon which our online world rests. Yet, traditional security measures often resemble fortresses – imposing, but vulnerable to unseen cracks and tunnels. To truly safeguard our systems, we need to think like the enemy, like the nimble figures scaling those walls: ethical hackers.
Enter the exciting realm of DevSecOps, where ethical hacking practices are woven into the very fabric of the software development lifecycle (SDLC). This proactive approach is akin to building castles with security in mind, each brick meticulously laid to withstand even the most cunning siege.
Why Ethical Hacking in SDLC?
Imagine developing a critical piece of software, only to discover a gaping security hole after launch. The damage could be catastrophic, exposing sensitive data and eroding trust. Ethical hacking flips this script. By integrating penetration testing, vulnerability assessments, and threat modeling throughout the SDLC, we proactively hunt for weaknesses before they can be exploited.
Think of it as a friendly sparring match, where the ethical hacker throws their best punches to expose vulnerabilities, allowing the development team to fortify the software's defenses. This constant testing and refining leads to robust, secure systems that can withstand real-world attacks.
Benefits of DevSecOps:
1. Reduced Costs and Risks: Early detection and patching of vulnerabilities are far cheaper than dealing with a full-blown data breach.
2. Improved Software Quality: Security becomes an inherent part of the development process, leading to more reliable and trustworthy software.
3. Enhanced Brand Reputation: Demonstrating a proactive approach to security builds trust with customers and stakeholders.
Putting it into Practice:
Integrating ethical hacking into the SDLC requires a cultural shift. Developers, security professionals, and testers need to work together seamlessly, sharing knowledge and fostering a collaborative environment. Here are some key practices:
1. Threat Modeling: Identify potential threats and attack vectors early in the development process.
2. Static and Dynamic Code Analysis: Use automated tools to detect vulnerabilities in code.
3. Penetration Testing: Simulate real-world attacks to uncover hidden weaknesses.
4. Security Awareness Training: Educate developers and other stakeholders about security best practices.
Tools of the Trade:
A plethora of tools empowers ethical hackers and security professionals in their quest for a more secure digital world. Some popular options include:
1. Kali Linux: A distribution packed with security tools for penetration testing.
2. Burp Suite: A web application security testing platform.
3. Metasploit: A framework for developing and executing exploit code.
4. Wireshark: A network traffic analyzer for identifying suspicious activity.
The Future of Security:
As technology evolves, so too must our security practices. DevSecOps, with its embrace of ethical hacking, is at the forefront of this evolution. By building security into the very fabric of software development, we can create a safer, more resilient digital world for everyone.
Remember, in the ongoing battle against cyber threats, ethical hackers are not the enemy; they are our allies, the architects of digital fortresses that stand strong against the shadows. So, let's embrace DevSecOps, sharpen our ethical hacking skills, and build a future where security is not just an afterthought, but a fundamental principle.
I encourage you to explore the world of DevSecOps and ethical hacking. Whether you're a seasoned developer or just starting your journey, there's always more to learn and contribute. Together, we can build a more secure digital future, one line of code and one vulnerability patch at a time.
Do you have any questions about DevSecOps or ethical hacking? Share your thoughts and experiences in the comments below! -
HOW TO RECOVER LOST/STOLEN USDT WALLET : HIRE SUPREME PEREGRINE RECOVERY
I would like to take this opportunity to express my gratitude to SUPREME PEREGRINE RECOVERY for working with my husband to recover $345,000 worth of stolen cryptocurrency using their hacking skills. I was initially skeptical, but it worked and we received our money back. I'm delighted I found them early because they recovered about 98% of the total amount we lost. We had assumed that we would never receive our money back from those fraudulent online investment websites...
Here Are List Of Hacking Services they Offer-:
Binary Recovery.
Crypto Recovery
Loan scam Recovery
WhatsApp: +1,8,7,0,2,2,6,0,6,5,93 -
HOW I GOT MY STOLEN CRYPTO MONEY BACK WITH THE ASSISTANCE OF GHOST CYBER RECOVERY
Ghost Cyber Recovery is for anyone seeking to recover their data or funds lost to scammers on the internet. this cyber security firm helped me get my bitcoin and lost digital money back. Their skilled work and exceptional service have absolutely astonished me. I never would have believed that I could get my money back until I went to them, explained my situation, and gave them all the information I needed. I was astounded that it took them 72 hours to get my money back. I wholeheartedly endorse Ghost Cyber Recovery for any and all cryptocurrency, digital fund, hacking, and cybersecurity-related problems. get in touch to recover your lost funds
E mail: (ghostcyberrecovery @ gmail . com ) or WhatsApp +1 734 743 18733 -
For a few months now I suspected that my husband was cheating around with other people, however I had no solid proof or evidence. I stumbled across this website which I found a great recommendation to hack4wise @gmail com that helped me see who my spouse was text messaging/calling. I also tracked my husband’s location, I got this proof to my lawyer and this was the strong document he used in my divorce, all thanks to tomcyberghost he helped me a lot, anyone who needed a hacking service. he will help you.590
-
If i'm trying to build an example server for a class to demonstrate my grade project (i'm researching hacking, ethical and unethical) and I know basically nothing which is still more than any teachers I talk to on a daily basis (tech manager said I can talk to him with specific questions)
I'm trying to set up and IIS7 server on a spare computer and I'm trying to get Apache to work as well just to learn more but I have no real clue where to start at all
can I get some advice on where to start and maybe some more ideas on how to expand my own
I don't know where else to ask about this since StackOverflow is more for specific questions and I don't know any other sites or apps
please help me4