Do all the things like ++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatarSign Up
Get a devDuck
Rubber duck debugging has never been so cute! Get your favorite coding language devDuckBuy Now
Search - "hackerman"
When you "fix" a bug not by actually fixing the bug but by disabling the user's ability to cause the bug.13
Alexa (in another room): ***ALARM***
Me: Hey Google, broadcast "Alexa, stop"
Mother: WiFi isn't working. I am unable to cast YouTube on TV.
Me: Did you try turning all of them off and back on?
Mother: No, let me do that. Good idea.
*Feels like a hackerman 😎*16
When I Made Passworts visible in Chrome and the teacher sent me home...
...It was Friday!
She sent me home because she was really fu**ing scared of what I did and even called my Parents9
Found this guy at my school who was trying to impress n00bs around the place by using Inspect Element in Chrome to change the content of webpages. He was claiming that he hacked the website 😂😂😂 I'm still crying15
How to hide your important files from people without making Hidden folders
1. Go to Desktop and create a new folder
2. Name the folder Internet Explorer
3. Change the folder icon to Internet Explorer
4. Keep it in a corner of the desktop
Now, no one will open internet explorer :D11
Recently I've been upgrading ubuntu. It took almost midnight.
Suddenly my area witnessed low voltage.
That woke up my dad.
(Now the funny part)
He looked at my laptop. Ordered me to stop whatever is running on it.
Naturally, I asked why!
Next morning, I came to know my dad thought those gibberish commands running on terminal caused that voltage to drop.
I laughed like hell...
(Me infornt of dad - hackerman)
(Not that funny tho)
I searched the Internet to get the font Style Name which is used in Devrant. However, i was unsuccessful. So, i just copied the devRant APK to my desktop, renamed it to .zip, went to /assets/Resources/fonts/ , and here we are with Comfortaa-Bold.ttf!33
When you're just coding away in some Coffee Shop and some random guy/girl asks you
"are you trying to hack the wifi" smh13
I guess that is what you get for bringing up security issues on someones website.
Not like I could read, edit or delete customer or company data...
I mean what the shit... all I did was try to help and gives me THIS? I even offered to help... maybe he got angry cause I kind of threw it in his face that the whole fucking system is shit and that you can create admin accounts with ease. No it's not a framework or anything, just one big php file with GET parameters as distinction which function he should use. One fucking file where everything goes into.21
Client : *turns of their computer*
Us : Why did you shut the SSH connection?
Client : Weird things were happening I thought we were being hacked!
But what the fuck we told you we were doing tests you stupid ass2
And the title of hackerman goes to he who is now running macOS Sierra inside of VMWare on Windows 😂18
I'm sure it's been said a million times before, and will be said a million times after, but:
*Right clicks website*
*Selects Inspect Element*
*Changes something for giggles*
*Someone sees over your shoulder*
"OMFG DID YOU JUST HACK THE INTERNET!"4
Long story short, I'm unofficially the hacker at our office... Story time!
So I was hired three months ago to work for my current company, and after the three weeks of training I got assigned a project with an architect (who only works on the project very occasionally). I was tasked with revamping and implementing new features for an existing API, some of the code dated back to 2013. (important, keep this in mind)
So at one point I was testing the existing endpoints, because part of the project was automating tests using postman, and I saw something sketchy. So very sketchy. The method I was looking at took a POJO as an argument, extracted the ID of the user from it, looked the user up, and then updated the info of the looked up user with the POJO. So I tried sending a JSON with the info of my user, but the ID of another user. And voila, I overwrote his data.
Once I reported this (which took a while to be taken seriously because I was so new) I found out that this might be useful for sysadmins to have, so it wasn't completely horrible. However, the endpoint required no Auth to use. An anonymous curl request could overwrite any users data.
As this mess unfolded and we notified the higher ups, another architect jumped in to fix the mess and we found that you could also fetch the data of any user by knowing his ID, and overwrite his credit/debit cards. And well, the ID of the users were alphanumerical strings, which I thought would make it harder to abuse, but then realized all the IDs were sequentially generated... Again, these endpoints required no authentication.
So anyways. Panic ensued, systems people at HQ had to work that weekend, two hot fixes had to be delivered, and now they think I'm a hacker... I did go on to discover some other vulnerabilities, but nothing major.
It still amsues me they think I'm a hacker 😂😂 when I know about as much about hacking as the next guy at the office, but anyways, makes for a good story and I laugh every time I hear them call me a hacker. The whole thing was pretty amusing, they supposedly have security audits and QA, but for five years, these massive security holes went undetected... And our client is a massive company in my country... So, let's hope no one found it before I did.6
Oh boy. Not even a full week into the new semester and my CTE teacher thinks I'm a hacker.
I'm taking this horribly dreary Excel and Access class (yes, Microsoft proprietary mess, but easy A), and our teacher has this program that allows her to monitor our screens, freeze them, take them over, etc. Problem is, she doesn't know how to use it.
Today class was going on as usual, when magically another students screen popped up on everyone elses. It wasn't bad, just Pandora and Excel, but my teacher flipped. She claimed that someone hacked the program and was broadcasting their screen to everyone else, not taking the time to think she might of just pressed the wrong button.
As a joke, I set my desktop to "Big Brother Is Watching You", poking fun at her ability to see everything we do. Moments later, she's arrived at the conclusion I was the hacker the whole time.
Soon enough, the people I sit near by start exclaiming they've seen me coding in class, and because I was coding, I must be the hacker. If you've read my first rant you can already see where this mess is going.
She says she'll give me a one time pass because it was a first time incident, despite the fact I did NOTHING.
Another thing that happened was that a teacher was trying to record her lectures on her computer so we could watch them to learn and have more time for other stuff. No biggie, I'll help her out.
The screen recorer software she was given was shit, so I got her OBS and did some fiddling around. The first time it didn't load, so I tried a ton of stuff. Used different versions (64/32 bit), downloaded previous releases, poked around driver settings, and found out her DirectX was ancient and since it was a school computer there was nothing I could do.
She let out a sigh, and thanked me for trying.
Then she pulls out a desk camera (a camera that has like a bendy pole from it, points down, and records your desk. Think of a lamp) and says "this will have to do"
Bitch, you had something usable the entire time. Don't waste my time, I was trying to help you.
TL;DR: My first rant ever here literally happened again7
Regular Person = Regular Person;
Regular Person + Google = Hackerman;
Why are people so lazy they can't google their problem before calling help desk?
I hate mental lazyness!4
Really happy about this one! I cannot go into details yet but hopefully will write a blogpost about it when I may disclose it :)29
I hate it when people invent some bullshit hacker story to look cool and expect everyone here to be stupid enough to believe it. It's even more annoying when you know where those people are from and how the same people in that country don't give a fuck about anything except getting food to survive. Then you look at the profiles and it's all made-up humble brag stories about shit that never happened. Then you see a few guys calling the person out on his/her bullshit only to get their comments "hidden" later.
Sure, the police would break into your place and throw you in prison for hacking. Suuuure, some random person thought you were a hacker and would run into the police. I mean people are getting robbed in this country and no one goes to prison but SURE, SUUUUURE. Suuuuuuuure, hackerman. Hackidy-hackidy-hack. What's next, you're a schizo and you hate people? Do you have a fucking start-up now? How fucking original. What a fucking asperger, anti-social, unicorn, poseidon fuck you are. You must be really special.
Fucking hate the pretentious little fucks in this country. This is why you're all poor, deluded pieces of shit. Live in the real world. How untalented and ugly can you be to do dumb shit like this for a few upvotes? This is the same internet behavior as the losers I know in real life. Development is not all about hacking and if you really are as elite as you say you are, you wouldn't be posting all your "evil hacking stories" in the first place.
Peasants, peasants everywhere. I hate liars. I fucking hate them. What angers me the most is the fact that I do respect some of the people here and this kind of bullshit is an insult to their intelligence.
Whatever, people will lie and we can't do shit about that. I just wanted to vent. Drama-rama hackidy-hack-hack.
Mom: Oh cool! So you can hack sites and accounts now?
Me: No mom.. I'll be making stuff, not breaking it.
Mom: Well what's the fun in that 😐
"Can you get me free in app purchases?"
"Well i mean lucky patcher is kind of a gray area but I guess if y-"
"Can't you just have it with the command prompt?"
"I don't know CMD, I know Java."
"But you said you could code!"6
Teacher: Write a program to print fibonacci series up to 8 terms
Me: *hardcodes 0,1,1,2,3,5,8,13*
Teacher: *runs the programs*
Teacher: *checks the code*
So after my phone got stolen I am now using a series30 Nokia device, problem was synching contacts dumped from Google contacts. Run a Python script that modified the vcf into a format compatible with the series 30, never felt more of a hacker man than this
Thought Amazon servers went bonkers seeing these names. Later realized these are episode names for TV series, Mr Robot.
When you redirect every movie link to XXX links on your rip-off netflix school project and nobody suspects a thing17
I accidentally surpassed(?) my user permissions and closed some of my classmates browsers and locked up a terminal for me
In school we have 2 primary operating systems: Windows and Ubuntu. Windows is hell in general and but not as hell as the firefox installation on Ubuntu.
"Just loaded this page. Now wait half a minute so that I can render it"
"Woah, woah, woah. Slow there. You just made an input event. Give me those 5 seconds to compute what you just did"
Executing "top" or "htop" shows you a long list of firefox processes with a cpu usage of 99.9%, since the whole school shares that linux environment.
Anyway, one day it was way more servere than normally and I way forced to kill my firefox instances. So I pressed CTRL+ALT+T for that terminal, waited 5 minutes until it accepted input typed "killall firefox" with a delay of half a minute per character and smahed that enter key.
At this very point in time I could hear confusion from every corner of the room. "What happened to firefox?"
Around 30% of the opened browsers where abruptly stopped. I looked back to my screen noticed I was logged out. I couldn't login from that terminal for the rest of that day.
Our network admin, which happened to be there, since the server is just next door, said that this was just convenience, but the timing was too perfect so I heighly doubt that.
I felt like a real hackerman even if it was by accident :)8
It happened just now.
Yes, I put "there is no need to be upset 10 hours" on governmental terminal.
How? Well, I discovered that it was web ui, so random menu category -> random external governmental website with Google map on it -> you know the rest.5
Conversation between [C]oworker and... some kind of customer-side [P]roject manager.
P: Hey, our release 2.0 is ready, but somehow I can't add tag to master. Could you try, please?
C: Yeah, sure.... Done... We are missing tag for 1.2 still, should we add it?
P: Oh, right, I forgot about that.
C: Ok, found merge... Done.
P: *displaying repo in GitBlit* Uh, now the order is wrong. And date is the same. Can we do something about that?
Me: We can just push that tag with replaced date. *just guessing*
P&C: You can do that??
Me.thinking: Thats git... I would be suprised if we could not.
Me: *pushing tag* Check it now.
P: Whoa, nice!5
Me trying to get an edge in Bloodborne be like,
Spent the whole afternoon figuring out what to do with all the hex values in the save game file.
I'm too lazy to grind out blood echoes (in game equivalent of money, for those who don't know), not that I had any difficulties with it (all those times playing monster hunter finally paid off).
*copy saves to flash drive
*open in hex editor
*find current amount of blood echoes in hex value
.....1109 instances found
*tries to find a pattern
*tries to change the value in the game hoping it would reduce the search
*repeat until evening5
Had to use a cmd window for adb to push some files to my phone so I could flash them and everyone is staring at me...
It's just a cmd window people... #Hackerman4
So, there was an art student yesterday at my dorm complaining about free speech etc. She told me that they where trying to bring the schools proxy down.
I was pretty impressed because it's an art student!
She then proceeded to tell me she had downloaded kali linux and was learning html...3
So my story has some little backstory.
I got into computers and technology because of my dad. He was very enthusiastic when I was little and when I grew older and started my apprenticeship as a software developer he was really proud. Note that he never learned anything like that. He just loved computers and games.
Now to the story itself.
I learned more and more, also about networking and came to the conclusion that our slow internet and rare internet problems probably come from stock/weird configurations. But my dads proud probably told him thats a thing he still has to do as the dad. But it annoyed me so much that I booted into kali linux, loaded an exploit to get the web admin passwort and cracked it within a minute. 😎
Finally I was able to configure everything correctly ( channels were spammed from neighbours so I switched to very unused and the disturbions got less ).
TL;DR: Dad didnt want me to configure our router and didnt give me the admin password, so I booted Kali Linux and used an exploit to get it myself 😎😎3
A bit different than wk93, but still connected and a fun story.
Back in high school when it began to digitalize everything, so began our teachers journey with technology. We, as IT class were into these things, but as far as I can say, others in the school including both teachers and students were like cave mans when it came to IT.
Most of them kept the different wifi networks password on the windows desktop, in a file 'wifipassword.txt'. When we were on robotics seminar, we had to use a teacher's laptop. The wifi network was incredibly fast and powerful,, yet so poorly configured that even the configuration page user/pass was the default admin/admin, because the IT admin wasn't the most skilled one.
We got the idea to sell the password of the wifi network to other students. Not much, for about 1 dollar a week. The customer came to us, we took the phone, took note of the MAC address, entered the password, and if the guy were to stop paying every week, we just blacklisted that MAC on the next robotics course.
Went well for months, until a new sysadmin came and immediately found it out, we were almost fired from the school, but my principal realized how awesome this idea was. You may say that we were assholes, and partially that is true, I'd rather say we made use of our knowledge.2
Guys once a friend of my dad asked me if I could help him with his printer because he couldnt connect it and he told me he would pay me a little money. So I thought to myself sure why not it will probably be quite easy and guess FUCKING WHAT... it was xD I just turned on the windows setup for printers on his PC and connected the printer with one button press and I entered a code the printer printed out. He gave me ten bucks and I was there for 5 minutes. Easiest ten bucks of my life xD
Secretly installed Automate app on my friend's Android phone to mess with him. (For those who don't know, with Automate you can automate anything on an Android device).
Made a 'flow' that would read his incoming sms's, and send an email to me with his exact location if I sent him an SMS saying 'where are you?'.
Was funny to mess with him and tell him his exact location even though we were miles apart.
Cleared it up for him a while later but it made me feel like #hackerman8
Interesting thing. Ya know how when turning on your phones hotspot it has to verify that you are in fact allowed to use a hotspot. Well if you have Unlimited Data like myself, hotspotting is not allowed. HOWEVER, if you spam the hotspot button, it after several tries, gives up and lets you hotspot. THIS IS MY LITTLE TRICK. NO BUG BOUNTY. BESIDES, youd need my carrier.11
So I found a thing. On my laptop, I am able to create a hotspot. So someone can connect to it and I can share my internet access. Couldn't I theoretically impersonate a wifi name, by setting up the hotspot to use the SSID of the target network, then the clients that already have access to the target network would feed me the network credentials? If so, how would I go about capturing the creds?14
I am such a 1337 Hackerman. I always use dark theme, Terminal is always opened with black and green theme, and loud sunthwave music blasting from my computer. No wonder everyone around me thinks that I am a haxxor.
EDIT: I also forgot to add that I keep playing old school roguelike Terminal games like Dwarf Fortress and Cataclysm: Dark Days Ahead. I also am a big fan of the Commodore machines. Jesus Christ, I am quite a geek, huh?1
What did I do in my laste moments of 2017?
Found out I could change settings in my printer via FTP / telnet from my computer.3
When you can't hack even a toaster so you use www.hackertyper.com to look cool at school but as you "write" the code you realize it's probably written in C or C#...5
😂😂😂 lol oh no what will we do when hackers takeover the world by printing an endless stream of planetary gears. Shame on you Harvard for such a poor picture choice.
|> E-Mail-Address is already taken!
|> Verification code sent!
I am a hacker!2
Every morning I start visual studio code from cmd... So I wanted to make a script to open that specific folder and start it in code...
The time I spent trying to make this thing is longer than the time it would take me to start code every morning.
Guess I'm no hackerman :/9
Years ago I was working in local cinema as a student job from time to time and used to sleep after shifts at my uncle's. Uncle did not had internet but there were so many wlans all around. Since I had nothing to do for hours after shift, I downloaded Backtrack linux at home, made live dvd of it and saved a two articles of "how to hack wifi" to text files.
It took me 4 hours to break WEP, since I was total lame, and it was the only one WEP around. They also had mac restrictions set to router, so I changed my mac address to one of their devices, logged in to router and added our mac address. For my uncle it was complete magic but since he is total geek to linux he liked it.
Fast forward weeks later. When I came to my uncle's house he was downloading like ton of linux distributions. Literally each one. Gigabytes of data. I told him not to do so because sooner or later neighbour will notice, but he did not care. Guess what, he notices, probably slow internet and (maybe) bigger bills, I do not know, but owner just changed protocol to WPA2, not changing password. So the story continued for almost 2 years. Felt a bit sorry for neighbour but did not expect such an outcome. I just wanted to watch youtube videos and scroll social networks, keeping low profile so no one notice.1
So I'm trying to check in on a flight via Wizz Air. The passport expiry requires you to use the calendar they have, doesn't accept input. Unfortunately it locks itself into 2019 regardless of what I do.
Gf sees me open the console and set the content myself. "What the fuck that is so illegal you bad boy. Oh my god that's fucking amazing!!1!1!".
Don't know if I should tell her what I did and how anything in a browser par trying to read Google Play Stores review info with a web crawler isn't all that difficult (fuck that frustrated me, gave up on that in the end.. their ToS don't allow it anyway..)
Ah well. Guess I'm a Hacker to somebody in the world now...
Bet the diff between a beginner developer and an intermediate developer is where to get code snippets either from old codebases or remote resources.
why do all of you get so hyped when you install arch linux? you guys sound like the type of people who jack off to arch lmao. lets keep it real tonight, some of you legit ejaculate fantasizing about arch linux like "ohh archh mm 💦💦 ohh tmux 💦 i3💦💦💦linux baby give me more👅💦"
maybe even cool hackermans who brag about installing arch wanna use it for hacking. r u a better hackerman now that u use arch linux ?10
Our ISP, that also offers us Television is smart, very smart... “One option is to provide an anonymous mailbox (eg. Gmail, Hotmail”
Wtf... Gmail != anonymous.
I was about to report a vulnerability I found in their system, with that I could access the whole digibox, recover recordings, copy the on demand things, and watch films.2
So a while back I had found a hole in a website's security, one that I has used pretty frequently. I was able to change my cookies and become any user I wanted. The only caveat was that I had to log in as a user in order to get things started. But once I was in I could basically be anyone I wanted to be just by changing a few numbers in the user ID of the cookie. They also did all of their user processing on the client side. Even password checks.
A couple weeks back I decided to go back in to see if anything had changed since then. It did! But not in the way I had thought.
So these guys decided that instead of fixing their security hole, they would have users just contact their people directly in order to get a new account.
Wow that's so much fucking overhead for basically being a lazy shit and not fixing the security holes. I mean how bad is your architecture if you can't go in and fix this?
Not only that I found that they actually stripped all of the users of their original subscriptions. So now if you want to get back on your subscription you'll have to fork over another $399. So that means going to their shitty form filling out your name, your number, email, and just hope that someone contacts you via phone call.
I'm glad I dropped this service. They clearly can't get their shit together.
So this is what a cyber criminal looks like.
"Norwegians are a favourite for cyber criminals"
"And we are easier to fool than Swedes and Danes, if we're to believe the thieves. The only ones more exposed than us are oil rich Saudis" 🤷♂️
What will I do without stack overflow?
Oh yeah, *inserts* "cache:"
Crisis averted 😎
Colleague calls me a hacker because I'm locked out of the account that is used for an automation. I know the passphrase he encrypted it with and decrypted it in SQL. Got the hex code back and flipped it into ASCII (by hand because i don't want to put it on the internet).
Now I have access, but I think I feel like I've done something really wrong by doing it. My colleague that is gone for 2 weeks would want me to have done it though.. end of quarter.. all his reports rely on it.
Damn.. this paranoia 😌3
Clueless child thinks he got hacked.
So me and my friend were just messing around in class and he says to this other guy that he "hacked him" as a joke. He showed him a CMD shortcut of the file saying "[guys name] OS SYSTEM." He fucking fell for it. He actually thought a cmd renamed shortcut was his OS system and my friend could access it. He tried to grab his computer and delete it. My friend thought he was joking so he opened it and the kid actually screamed. We burst out laughing and make a scene. The teacher got kinda triggered so we stopped haha.9
> Be me
> Fresh out of school
> Do some volunteer work for 1 year before starting to work
> Start work at local hospital
> One day get assigned new task
> "We have this directory where there is a file for every employee who has a key - File contains legal stuff"
> Current naming scheme "MaxMustermann"
> Desired naming scheme "Max Mustermann"
> Task: rename every file.
> 1974 Files
> Hol up buddy
> A repetetive automatable task?
> I know this
> Im a hackerman
> Let's write a script....
> *SMASHES WINDOWS BUTTON*
> No results
> I could have guessed that
> *SMASHES WINDOWS BUTTON*
> No Java compiler
> OH no
> *SMASHES WINDOWS BUTTON*
> "tHe eXEcUTIon oF poWeRsheLL sCriPts Is dIsAbLeD"
> *SMASHES WINDOWS BUTTON*
> "YOu dO noT haAV thE rEqUiReD peRmIsSionS To oPeN tHis proGrAm"
> Wait this is windows.
> Windows ships with .NET
> *SMASHES WINDOWS BUTTON*
> No results
> mfw I have to rename 1794 files by hand.
( Please send help )7
I wish it was as easy as:
> hack FBI
Cannot hack, root privileges needed
> sudo hack FBI
Context: at my current job I work as a product photographer as well as studio admin. On side I go online to different brands websites in search for product images (if we haven't the product in store yet).
Now the banger, I searched for some peacoat colored pants but the brand didn't put it out yet. Pulling out some Super AI hacks I changed some stuff and things in the URL (color ID + small amount of ?doThisAndThatPhP) and... BOOM result! Right color, high Res image. The Color isn't searchable or shown via Google or the brands page, but the image is already on their server 🤔*yoinking the image*
Just wanted to share it with you guys 👌 none at my coworkers speak computer 😔
Sadly that's all I've implemented so far and I don't have a lot of time for these things :-/
But damn puppeteer is cool!
shit I mixed up kissmanga and kissanime...
Hackerman strikes back. Always thought the new knowledge about stego tools, reversing, enumeration, privesc were just my private amusement. But could now use it, hopefully resolving a severe crash by dropping our binary into radare2 (cutter) and ghidra, identifying some dangerous code.
Also it gives you new angles to look at things. E.g. the vectors your code might expose...4
The music which I listen while programmimg <3
It makes me feel like HACKERMAN while im only doing HTML/CSS stuff 😂
By the way... What music do you listen while programmimg?2
Just a little questiom. What's the movie or TV series where you've seen a hacking scene which is probably very close to reality?6