Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API

From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "hacking"
-
Me: *Watching a movie*
Main Character: "Oh no, we have to hack the CIA to figure out how this machine works! Hacker girl, do the stuff"
Hacker Girl: "Consider it done!"
Hacker Girl: *Opens Linux bash*
Hacker Girl: *types 'mkdir Hack_CIA'
Hacker Girl: "They have two-factor authentication in place, this is going to be a hard one."
Hacker Girl: *Types 'cd Hack_CIA'*
Hacker Girl: "I'm in!"
Me: "..."
Friend: "Wow, so well done, so realistic!"
Me: *Dies*81 -
Writing some code on a flight
"ARE YOU HACKING?!?!"
"Ugh... Well yeah but not in the way you're thinking"
"Omg I'm getting a flight attendant"
Needless to say I'm still en route because the flight attendant realized that I'm not Mr Robot, nor do I have ZeroCool scribbled on my laptop anywhere.14 -
Me: *accidentally opens DevTools*
1.269427 milliseconds later...
Person: TEACHER! He’s HACKING INTO GOOGLE DRIVE!!!
Teacher: *glances at computer* Oh my gosh! That is ILLEGAL! Go to the office immediately.
I reluctantly headed to the office and calmly explained what happened. Luckily, some people have a bit of common sense and let me go.22 -
Hacking is like sex. You get in, you get out, and hope that you didn’t leave something that can be traced back to you.10
-
This one time, a client wanted a complete overhaul of her website.
I asked her for the credentials to the VPS, She gave me some random crap to try, cause clearly the site hadn't been touched since 2003 (and boy was it fugly).
Me: Maam, these aren't the correct details.
She sends in more crap to try...2 days pass with this back and forth.
Client: "contact steve, he should have the login details"
Me: ****Calls Steve *****
Me: "Maam, he says the login details are in your mail"
Client: "well, I don't remember this fact. Steve handled everything.
Hack into the website and then reset it.
The Russians did not need login details to hack into America's system. So please, do what you have to do to get us moving."
No jokes...that was the exact crap that came out of her fingers22 -
!rant
I work from home. Sometimes, my husband remotes into his computer during the day. When I see it, I message him jokingly that someone is "hacking his computer". Then this happens:7 -
Yesterday my friend was telling me that he was hacking some federal server in my country, and his girlfriend interrupted him and he couldn't complete the hacking
Such a lier 😏
We don't have girlfriends5 -
In case you ever want to hack into a computer with 14 lines of code only. This algorithm is just genius.27
-
*Facebook Hackers follow the Rules*
(real story)
TL;DR: sorry, not available, can't do spoilers
One night I was with a group of friends out at a pub. A guy and his girlfriend show up, I didn't know them but they were my friend's friends.
The girl kept bragging the whole time about his boyfriend being a professional programmer, trying to remind it to everybody whenever possible (don't ask me why!).
So, after a while, the discussion moves towards "suspect Facebook activities" and the guy starts saying that he can hack Facebook.
- "What do you mean?", I ask.
- "Hacking into other people's accounts, even with 2 factor authentication. I did it a lot of times"
- "Wait, and they don't notice?"
- "Of course not! ^_^ He's a hacker", the girl replies.
Ok, time to do a coming out.
- "Hey, I'm a developer myself. Can you give me an idea of what you did in technical terms? Did you find a vulnerability? Used a virus? Maybe a keylogger?"
- "No... Uh... Well... The secret is to read the terms of service"
- "What?"
- "Yes... yes it's all in the facebook terms of service..."
- "Uhm, I'm not really sure I'm following. Could you prove it by hacking my Facebook account? I'm giving you the permission".
In less than a minute the discussion flew completely away and they never mentioned computers again.
😂😂8 -
Friend: So, you can program
Me: Yeah
Friend: nice, can you hack a Facebook profile?
Every.
Fucking.
Times.8 -
A conversation with our network/system admin.
Me : Can I install linux on my computer, windows is slow and terrible.
Him : No, if you use anything but Windows in this company, you will be fired for bypassing our security protocols. Its written in your contract.
Me : *boots up my Macbook*10 -
When your friends think that viewing/changing source code of a website is hacking...
Idiots. For it to be hacking it has to be green and black of course...6 -
I wonder how long before people get twitchy thinking I’m hacking just running some database load tests19
-
I laughed at how in the movies hacking is portrayed as some person clicking a lot buttons really quickly in a very flashy UI. There's a picture of America and sometimes there's a 3d model rotating for no good reason or a bunch of random numbers floating across the screen. They use random hacking related terms like: backdoor, DDoS...etc in their sentences.
At least they did their research...15 -
I'm a programmer and an aspiring cyber security specialist. Yesterday, after I gave a presentation about smart bulb hacking, I heard through a coworker that a cyber security company is interested in talking to me. Yay!11
-
So my school forced everyone to buy a Chromebook G4 Education Edition which came with ChromeOS and we had to sign some shady e-policy. Days after I got it, I opened it up and manually reflashed the BIOS so I could use SeaBIOS and install Arch Linux.
Great, so I went on to instal Chrome and it was really slow and performance heavy, then I installed the new Firefox and it ran a lot faster...
*So hehe, Firefox works better than Chrome on a Chromebook!*10 -
My last wk93 story, the time we discovered school faculty was spying on students and we uncovered student's deepest secrets.
I call it, kiddiegate.
So if you've read my past rants you've noticed I did some pretty childish and reckless stuff with my highschool's systems when I was younger, but nothing compares to this thing.
After resetting the sysadmin account pwd on some machines it occurred to me I could write a keylogger to capture teachers Moodle accounts and so on, I decided to try it out on a regular lab computer first.
Imagine my surprise when I found a hidden keylogger already installed! I couldn't believe it but then I thought, what if other PC's have it? So I recruited my mates and teached them the process to check if a PC had been infected...ALL PCs were, over 30 computers we checked had been logging for over 3 months! That damn sysadmin! >:[
We were shocked and angry, but then I thought "hey. . . My work has been done for me, better take advantage"
So we did, we extracted each log and then removed it from the PCs along with the keyloggers. There were hundreds of records and then one day we started snooping into the fb accounts of some students (we shouldn't have) we uncovered so many nasty, shocking secrets...
One of the school's lady's man had a drunk one nighter with one of our gay friends, the most secluded and shy guy was sexting like crazy with 15 chicks at the same time, things like that...we promised to never say a word and deleted the logs.
After that we didn't do much and continued highschool as every teenage minor should, getting drunk and avoiding responsibilities, though we could never see many of our classmates the same way. The sysadmin was fired shortly after I graduated, no reason was stablished.
I want to clear out we were minors and laws in my country weren't clearly stablished at the time plus no harm was ever done. I don't condone hacking or any kind of illegal activity, just thought I'd share.6 -
Israeli government hackers hacked into Kaspersky’s network in 2015 and caught Russian government hackers red-handed hacking US government hackers with the help of Kaspersky.
In other words — Russia spying on America, Israel spying on Russia and America spying on everyone.10 -
My friend at school (IT High School in Poland if you're interested) just asked me what version of Windows does Elliot in Mr. Robot use. After I said that it's not Windows, he didn't let me finish my sentence and said that you can't push macOS theming this far.10
-
At school in computer class,
Me: (to friend who gets excited from "hacking") Hey look im gonna hack!
Friend: *Turns to watch*
Me: *Does "color a" and "tree"*
Friend: Wow.
Me: *Writes a quick Matrix.bat and opens it*
Friend: Woah guys look he is hacking!!
Me: *Sits there awkwardly*5 -
Was watching a soap with my girlfriend and they were trying to hack into the network of a hospital.. oh my10
-
If you let me use your WiFi, I feel bad for you son.
I can see your 99 problems, and porn is definitely one!
😉😂😂😂😂7 -
Me: So what you are doing in the IT field?
Him: I am hacking bank websites.
Me: OK, that's cool. It is good in free time. What is your actual job?
Him: I am seriously hacking the bank Web site!
Me: Trust me, if you seriously doing that you will never ever mentioned it...
Him: No, I am doing it legally... The bank hiring me to try to hack the website...
Me: OK, you mean that you are cyber security tester?
Him: That is almost the same...
Me: So you are tester?
Him: I am hacking bank's websites...
Me:....7 -
Hello, world!
Hey, it's me. It's been awhile. How have you been..? :3
For those of you who don't know/remember, I'm the lead developer of a Desktop and (to-be) Hacking Simulator Game. My project should still exist somewhere on here. I just thought I would hop on, and catch you guys up on my progress. ^~^
So far themes are a thing! You can add custom fonts, wallpapers(or just a desktop color) and set the color/opasity of everything in-game!
I have also implimented a modding API. It's under-documented, but it works very well! You can add apps, commands, or even redesign the entire interface using it. It executes modded functions on specific events, so you could really have it do anything.
As of yesterday, there is also a simulated FileSystem. You can navigate it using in-game terminal commands, and you can create and remove directories.
(in-game screenshots are also a thing, you can even set a timer - ps: this is a 100% mod! As are all apps and commands in the current unreleased version. PM me on Telegram @TheCyaniteproject to get a copy~)26 -
No, MD5 hash is not a safe way to store our users' passwords. I don't care if its been written in the past and still works. I've demonstrated how easy it is to reverse engineer and rainbow attack. I've told you your own password for the site! Now please let me fix it before someone else forces you to. We're too busy with other projects right now? Oh, ok then, I'll just be quiet and ignore our poor security. Whilst I'm busy getting on with my other work, could you figure out what we're gonna do with the tatters of our client's business (in which our company owns a stake) in the aftermath of the attack?9
-
I find coding is the best way to alleviate boredom on a plane.
Not because I enjoy coding that much, but because there are two types of people:
1) Those who know what programming is and who will ALWAYS ask about it interested. (Conversation starter)
2) Those who don't know what it is and just assume you're hacking the plane!4 -
After a nice clean reinstall.. some partitions didn't wanna play nice so I got my hacking tools and hacked away.7
-
Wi-Fi WPA2 has supposedly been successfully hacked and a proof of concept is supposed to be released later today. Thoughts? Link below.
www.krackattacks.com19 -
My first rant, so pls don't blame me?. 🙈. No just kidding, but now the Story. A friend told me that he want to start hacking. But I know that he can't prog or use a PC. But I asked: "Can u program?" He: Yeah, of course!?". *Me wondering as fuck* Me: Where do u learned that?" He: "Watched YouTube Videos!" Me: "OK?, and what language du u want to use, and IDE?" He answered: "Language Arduino, and IDE what is that?". *Me facepalming and asking myself what dafuq was he watching and why is he trying to do things like that*11
-
Best friends sister asked me if I could hack a phone or a router or something for her. Asked if the owner was alright with it. She said yes. Asked her for a picture of the interface. She sent me three pictures:
IPhone interface
Router interface
Blackberry phone interface.
😐
"I'll give you the iPhone through {best friends name}".
I have the phone now.
She's saying that I hacked their wifi.
I haven't even booted the phone yet.
I never connected to her network.
I don't know where she lives.
Dafuq.17 -
*friend sees me using inspect element*
Friend: woah dude, are you hacking?
Me: no, actually, I-
Friend: Dude, how do I do that? I want to use that to hack Clash Royale! Or minecraft!
Me: *facepalm*4 -
This happened a few years ago:
Cousin: So one of my friends is going to teach me how to hack.
Me: Oh so you know something about programming?
Cousin: No, I'm going to learn how to hack first, because that's way more awesome.4 -
When I am sitting in my school and writing a few lines of simple HTML code, people looks at my screen and more less shouting out loud "wow you are like a hacker or something? Who are you hacking and how do you do it and how did you learn it?". It happened a couple of times to me. Sometimes I just tell them it as it is and saying something like "it's simple HTML code" and a little explanation of what it is. Sometimes (depending who it is) I answer that it is a new kind of spyware I'm developing and if I'm lucky they believe in me and starts begging me for not hurting their computers.
Just a few lines of <script> and some code highlighting. How to become a hacker!9 -
Jokes aside, this got me thinking html is most used and most successful hacking tool out there.
99.99% of the time it's far easier to socially engineer and phish for existing credentials that scan networks, sniff ports and look for vulnerable versions of software, new vulnerabilities etc.
We (people) are ad always will be a zero day exploit.7 -
When someone logs into someone else's Instagram after being told the password and then *posts a selfie* with the caption "#hacked"
****CRINGE****7 -
A client was talking to me all day asking about my "hacking" experience.
I taught he was going to ask for a pen test for his trampoline website. At the end of the day, he revealed he wanted me to hack the "competition's databases" so he can promote his "very unique trampoline accessory".
Guess what happened? Nothing, cause fuck legal trouble!7 -
made a password sniffer in python it was really easy how many of you took #100DaysOfCode i took the challenge 8 days today every day i am doing one project what do you think of the sniffer? it currently doesn't support SSL response but working on that right now this is good15
-
There are cybercrimes. That means you can be put to jail for performing certain actions with your computer. I’m taking about serious crimes like hacking crucial governmental servers but not about insulting people online. I’m talking about something that’ll make government chase you.
Every action at the computer could be done with keyboard only.
My face when there is finite sequence of keys that you press one by one and then become a criminal. And go to jail.
My face when if you put that sequence into script file, there is file that you double-click and instantly become criminal.
Press here to go to jail. The whole new level of abstraction.
Really makes me think.7 -
So I had finished my work early in class and asked the teacher if I could do something on my laptop for the remaining half an hour.
I take out my laptop and immediately people start asking if I'm hacking.
3 people come and sit next to me and ask what every line of code means that I write. (I think they got underwhelmed real fast because I was debugging).
The teacher then comes into the room and asks what I was doing and I said just working on an app project. She explains to me that it is illegal for me to be hacking and I could get into serious trouble if I am caught. I facepalm and she says your disturbing everyone else get off of your laptop and read a book.
I left that class thinking is she even qualified, what is she thinking. Are you teachers the same.11 -
Me: *screwing around in inspect element*
Friend: Woah dude what hacking app is that, can you like turn off the lights
Me: *walks off into the distance*5 -
A store in Russia was robbed for 30k$ using ArtMoney.
ArtMoney is a Game cheating program that is used in games that have no AntiCheat system or it is insanely horrible(Cookie clicker as an example for a game that had no anticheat and ArtMoney is used in it)
The robbers placed orders for tech(like phones and laptops) and then used the program to change the prices from thousands of dollars down to 5$.
The cheat program is insanely easy to defend against or detect its changes.
This is a good reminder to check your security if youre adminstating things like online shops or other stuff thag can be targeted at a similar fashion.4 -
Now I know how Quake III Arena got those high-res textures with better lighting and shading -- the developers conjured evil spirits to do some bit-level hacking to quickly calculate the inverse square root, which meant more calculations in less time, which meant more iterations for high-res rendering!9
-
How to become a hacker😎
1.Go to the store get a black hoodie, wear it and go infront of the PC.
2.Turn on the PC with WINDOWS😂
3.Change cmd font colour to green.
4.Type the following code in cmd.
ping 192.168.1.1 -c 9999999
5.OK now do that in again and again in 2-3 terminals.Now your desktop is full with black and green😋.
5.Take some pics of it and upload stories😍.
6.OK now your a HACKER😎10 -
Yes I believe you’re Google and I will click that link.
I don’t care that IP from that you sent it to me is from some company in India.
Probably Google outsourced it’s email service there.
But wait why is this link pointing to Chinese website?
Ouch you provided some ip under A dns record so let me nmap it...
So there’s bunch of services you have there.
ftp, ssh, msrpc, netbios-ssn, snpp, microsoft-ds, sun-answerbook ...wait what ?
Let me curl that 8888 port.
Oh you have login / password form and it’s pagoda linux panel.
Wait a second I will read about it maybe some default login / password will work...
Ok so maybe I just make a script to brute force it as you wanted to brute force my computer motherfucker.2 -
When you've to explain normal people that you're a dev and not a hacker and so you can't just hack into their ex's Facebook account like it's some magic trick.3
-
We have a bruteforce?
[30.01.19 11:25]🧠 WARNING (EXTERNAL IP): Not Found: /a
[30.01.19 11:25]🧠 WARNING (EXTERNAL IP): Not Found: /ac
[30.01.19 11:25]🧠 WARNING (EXTERNAL IP): Not Found: /acc
[30.01.19 11:25]🧠 WARNING (EXTERNAL IP): Not Found: /acco
[30.01.19 11:25]🧠 WARNING (EXTERNAL IP): Not Found: /accou
[30.01.19 11:25]🧠 WARNING (EXTERNAL IP): Not Found: /accoun
[30.01.19 11:25]🧠 WARNING (EXTERNAL IP): Not Found: /account
[30.01.19 11:26]🧠 WARNING (EXTERNAL IP): Not Found: /accounts/
[30.01.19 11:27]🧠 WARNING (EXTERNAL IP): Not Found: /accounts/lo
[30.01.19 11:27]🧠 WARNING (EXTERNAL IP): Not Found: /accounts/log
[30.01.19 11:27]🧠 WARNING (EXTERNAL IP): Not Found: /accounts/logi
No only a skiddie who try very hard9 -
Me: reports vulnerability that can be used to steal thousands of dollars from a company.
Stingy company: gives me 66 USD voucher as a reward. :)12 -
{spoilers, i guess...}
In season 1 episode 4 of Mr.Robot, Elliott plans on using a Raspberry Pi to heat up the storage facility in order to destroy the cassette tapes stored there. If he can get the temperature high enough, it would render those tapes useless. I was just wondering, can a hack like this take place in real life?11 -
I was just traveling by train to work, when a group of students joined the carriage.
I opened my laptop to do some work in terminal. After one minute, the guy next to me said to his friends: "oh this guy next to me is hacking!"
Right...... 😑2 -
If someone asks me how to hack software, I answer:
'Well, basically it's just like searching for open doors of a unknown house you want to get in.' 😎
Usually the answer disappoints everyone. Then I add:
'Why so surprised? Would you leave your main door open, if you want to store something securely in your house?'
I love those disappointed faces from time to time. 😋1 -
When did hackathons become competitions for developing websites, and move away from being competitions for gaining access to network resources (ie: hacking)?14
-
When someone says they are a 'HACKER' whereas all they do is watch videos of 'How to hack a GMail account' on YouTube and read 'Learn to hack in 24 hours' , while having no knowledge of networking, security protocols and ports.10
-
Taking IT classes in college. The school bought us all lynda and office365 accounts but we can't use them because the classroom's network has been severed from the Active Directory server that holds our credentials. Because "hackers." (The non-IT classrooms don't have this problem, but they also don't need lynda accounts. What gives?)
So, I got bored, and irritated, so I decided to see just how secure the classroom really was.
It wasn't.
So I created a text file with the following rant and put it on the desktop of the "locked" admin account. Cheers. :)
1. don't make a show of "beefing up security" because that only makes people curious.
I'm referring of course to isolating the network. This wouldn't be a problem except:
2. don't restrict the good guys. only the bad guys.
I can't access resources for THIS CLASS that I use in THIS CLASS. That's a hassle.
It also gives me legitimate motivation to try to break your security.
3. don't secure it if you don't care. that is ALSO a hassle.
I know you don't care because you left secure boot off, no BIOS password, and nothing
stopping someone from using a different OS with fewer restrictions, or USB tethering,
or some sort malware, probably, in addition to security practices that are
wildly inconsistent, which leads me to the final and largest grievance:
4. don't give admin priveledges to an account without a password.
seriously. why would you do this? I don't understand.
you at least bothered to secure the accounts that don't even matter,
albeit with weak and publicly known passwords (that are the same on all machines),
but then you went and left the LEAST secure account with the MOST priveledges?
I could understand if it were just a single-user machine. Auto login as admin.
Lots of people do that and have a reason for it. But... no. I just... why?
anyway, don't worry, all I did was install python so I could play with scripting
during class. if that bothers you, trust me, you have much bigger problems.
I mean you no malice. just trying to help.
For real. Don't kick me out of school for being helpful. That would be unproductive.
Plus, maybe I'd be a good candidate for your cybersec track. haven't decided yet.
-- a guy who isn't very good at this and didn't have to be
have a nice day <3
oh, and I fixed the clock. you're welcome.2 -
Dear weird stackoverflow,
What SQL knowledge do I need to hack devRant and get an avatar on here ?18 -
When I was younger (about six) I wanted to hack into NASA and release all their files on aliens and UFO's to the world so they would know the truth 🌎👽5
-
Last night I compiled my first kernel module!
I'm not talking about a ./configure; make; sudo make install kind of thing...
I wrote, compiled, loaded the module and saw my silly "Hello World!" message on dmesg!
Using some previous experience on embedded I fired up qemu with a fresh buildroot image and the kernel image I just made, thus I can now test and debug without doing kernel changes to my workstation!
So yeah, I'm a little excited :-D5 -
Hoe about this.. Instead of a 'literal' game..
My co-developer suggested we make a minimal Linux OS (based off of Debian) and set it up to simulate fake hacking.
How does that sound?
It would still be a game, but would be so much cooler. >:3
The OS would be SOOPER light. And wpuld come with a custom set of 'hacking' tools. These 'tools' could also be installed on any other Linux os.
This is all theoretical, but we would love to hear your opinions.77 -
one day we will see IoT ransomware. Imagine ransomware on your smart car: “Pay 2 Bitcoins if you want to pick up the kids from the daycare in time.”4
-
When People Around You And Your Family And Closest Friends Think that programming is hacking.
Me: Why?4 -
Scenario 1
Friend 1:"Hey, you're good at computers right?"
Me:"Erm yup."
Friend 1:"Can you hack Instagram? I've lost my password."
Me:"Oh My God."
Scenario 2
Me looking at a friend's unity C# code
Me:"You know there's an enter key right? Why is your code horizontal not vertical?"
(Means that after a semi-colon he continues his code)
Friend 2:"I like to read my code in horizontal, that feels natural to me"
Me:"What ever, as long as it works. But why do you have so many if function inside another if function?"
Friend 2:"Cuz I want the player to do this while moving"
Me:".........."4 -
Ok fellow ranters. I've scoured the internet for hilarious and enraging stories of programmers being asked to either work for free, or for stock options, or to hack (crack) stuff, etc.
Here's my latest one. A friend who's obsessed with crypto came up with a "great" idea which was for me (of course) to build a landing page for a fake company to trick people into submitting their crypto wallet keys and all that. What started as a joke quickly turned into my friend getting mad at me for not wanting to actually make it lol. Like seriously wtf is with people. All the reasons not to do that scheme are plainly obvious!
Next. Some person who worked for a company I consult with pulled the generic. "I have this great app idea" line & proceeded to of course ask me to "not steal it" lol. It was just an app that would list gluten free restaurants... That's hardly even an idea!!
But what's fucked up about all this is my friend from the first story is so obsessed with becoming a "crypto millionaire" he actually resents me now for not
1. being obsessed with crypto
2. not committing cybercrime on his behalf
Anybody else have enraging stories about stuff people have asked you to do?5 -
I live in a developing country where not a lot of people know much about security, programming and such. The moment I make a post about coding or something on social media, relatives/friends/strangers come and ask me to hack a Facebook profile or request a free download link to PUBG. And when I say that I can't, or that it's not really possible, they fuss and blame me for it. God damn people.3
-
!rant
Wanted to share a project with you, which I heard about at a Python Conference I attended.
It's a Raspberry based Hacking Station to educate and sensitize students about data privacy. The amazing thing about the project is, that it is a graduation project from a high school student.
If you're interested, check out spypi.ch
This is not an ad or something, I was just amazed by the talk and the idea of the project and wanted to share it with you.2 -
When all your friends ask you to hack someone for them when you only know how to make websites and games 😤6
-
This isn't as much of a rant as the story of my worst abuse of computer knowledge.
This happened a couple years ago. When I was in high school, I had this friend/enemy relationship with this guy, lets call him Thomas. He loved to pull pranks on people. He had a similar firend/enemy relationship with my brother, and after one prank, my brother decided to get revenge. And by revenge, he meant asking me to make a virus.
I knew the guy, and I agreed. We thought about what type of virus we could make that would be funny, and not too damaging. We decided on a program that would play annoying sound effects every few minutes. Short enough to be noticable, long enough that Thomas would give up and not try to investigate.
I won't bore you with the details of the program. It was a very simple C app, very small, named "Counter-Strike-Global-Offence-Free-Download-Totally-Legit.exe". It was clearly visible in task manager, but since it was so small and barely used CPU or RAM it would stay near the bottom. I tried loading a custom sound effect, but it turned out the windows default "invalid sound effect" was much more annoying than any custom sound I could find.
The "Infecting" portion consisted of moving the .exe to the start menu startup folder while Thomas left his laptop unattended. My brother handled this part.
I unfortunaly left the country soon after and never actually saw the effect the program had on Thomas. I assumed my brothers laughing would give it away rather fast and he could simply remove it from his startup folder. However, my brother told me he still complained about it for months, before finally bringing the laptop to a repair center that found the totally legit CS:GO exe. My brother ended up telling him soon after, but this was still the best prank I ever pulled. -
Watching Limitless on Netflix and I just love the "hacker" code animation loops with multiple terminals open going on in the background xD5
-
Stop chatting about your hacking exploits on a train. Especially when you did that 20 years ago. More importantly it's not hacking when you found that password on a Post-It note.7
-
Linux is pretty much like Windows, but instead of "next, next, next, and finish" you do "copy and paste, copy and paste, copy and paste".10
-
Someone is trying to launch a brute force attack on one of my servers that I set up for an old project. According to the logs, they've tried Jorgee, they've tried directly accessing the MySQL database (with the laziest passwords), and they're now on day 4 of their brute force attack against my SSH server. I'm fairly certain that they won't be getting in (not that there's anything worth getting in the first place), but what's the standard protocol for this? Do I just wait this out, or is there something I can do to break their bot? I have fail2ban enabled, and it is doing its job, but the attacker is changing their IP address with every attack.11
-
Yesterday , I was traveling through the bus . I was reading the documentation of jquery . Suddenly a guy siiting next to my seat said "Are you a Hacker ?" I was in shock . He said " Could u plzz hack something for me right now ?" LOL10
-
Last 10 years of database leaks.
Will next 10 years will be as interesting in security like last decade ?9 -
Oh what fun, nothing like an open windows XP machine in a hotel. So many fun things to do with it, sadly I feel if I browse the web for 5 minutes it will litteraly burst into flames and blue screen. I might just set chrome's startup page to www.crashchrome.com9
-
When you're a hardcore web developer, the only 'action' you .get() is when you're writing a login form scraper for your three-legged oauth flow in Python7
-
Stranger: So what do you do?
Me: I'm a web developer.
Stranger: ..can you hack my Facebook account?9 -
My wife was done with exercises on her electronic 88 keys piano.
Me: I also know something nice.
Her: oh so?
Me: (repeatedly typing key #3)
Her: (thinking)
Her: C hacking?!5 -
I've always thought the "can you hack my facebook accout?" rants a little exaggerated.
Then it happened to me twice.
For fuck's sake, is that damn social media site so ingrained in your puny little brain that you can't ask me something else? Is "what do you program" not the more obvious question?1 -
Quote from the esafety au website
"Social engineering is not hacking. Hacking involves the use of computer technoliogies to gain unauthorised access to systems. Students sometimes use the term 'hacking' when in fact they have shared their password"5 -
How to make a movie hacking scene:
Pretend like your typing while running a Linux make build from source3 -
LOL that's why I love C!
The function pointer cast for strcmp because qsort expects a compare function with two const void * pointers instead of two const char * pointers, that's just beautiful.
Not to mention the hack to abuse strcmp on a struct - which just works because the first struct member is a string and the rest just gets swapped with memcpy as opaque data.
I guess that wouldn't pass a code review at work. :-)9 -
A few years ago I was in high school and used to have a small reputation of hacking things. I could hack, just would never hack any school networks or systems (reputation + notice that there was a breach is a bad combo since everyone would immediately suspect you).
Anyways one day the networks internet connection went down in the school district and I was the only one who used a laptop to take notes. So I quickly opened the terminal and ran Wireshark and said to the person to my right "see that button there? yeah I programmed this last night. anytime I press it I can shut down the network so the teacher can't reach her files (she famously only saved them online). *Long dramatic press* Wireshark started scanning the network so all the numbers and lines were going crazy as it viewed the packet info "Now just wait", soon the whole class knew what I had done through whispers and lo and behold a few minutes later and the teacher couldn't reach her files.
Everyone loved me for the rest of the year for saving them from the homework for the week the wifi network was out since it also ended up having to cancel two tests in the class, and a lot more homework and tests in all their other classes. Solidified my reputation and no one fucked with me from that day on. -
Throwback - don forget when CSI showed us how to protect us from being hacked!
https://youtube.com/watch/...6 -
Majority of the hacking tutorials:
Tutor : Now we are going to set up two virtual machines to practice our hacking.
Me : Yes finally some useful practicals
Tutor : First one is Metasploitable
Me : What? This OS literally has its name derived from exploitable! How would it be useful in real life! But its ok, there is one more OS for practice, i am sure that one will be better.
Tutor : And the second one is "Windows XP"
Me : *MOTHERFUCKER!*
P.S.: I understand its not the case for all tutorial and it is somewhat necessary, but still it gets me a little.3 -
So a client hired us to rebuild their website, because their current website is being held hostage at their current provider. The provider locked them out of WordPress and says they will shut down the website at the end of the month.
The client wants us to hack into the website and get the files. I told them "no chance in hell", but that their current website will be at our host later today.
What I didn't tell them is that I just scraped their website pages to flat HTML.5 -
So I had this conversation with my dad
Background : He saw news about some celebrity's Twitter account got hacked.
Dad : Do you know how to hack a Twitter account?
Me : No dad. There are ways for people who do this kind of stuff.
D : But, you studied software engineering!
M : Yeah, but I don't do hacking.
D : Although hacking is not ethical but everyone should know about their field.
*Awkwardly left the room*
Just because I studied computer science doesn't mean that I SHOULD know hacking.
And this is not the first conversation of this kind!4 -
!rant
I get asked about being able to hack stuff, like cracking wifi passwords. Mostly I just go along with them and make up some stuff about how you _could_ do it. And explain how it is done, throw in some "yeah its tough"s and words they wont understand. Yeah with a dictionary attack and a powerful CPU with many threads you can definitely do it! You should try it! I say. Convincing them they can. Ofcourse, download kain and abel and look for something like aircrackng on google.
They won't amount to much and probably won't even try it, but I have a laugh. Seeing the hope of hacking and cracking fade away as a child's ice cream melting on a hot summer day.
Hehe2 -
Watching IT guy on the show "How to get away with murder" explain how to hack:
"It's not that complicated, really. You just download that app from the deep web and worm your way into the phone company's main frame using basic java code. Anyone can learn how to do that."
Thats how you do it! Thank me later.8 -
I once saw a YouTube video when youtube first started of this kid. He was a proud "hacker" and had this short video teaching everyone exactly how to hack Google.
He goes to the the terminal and types "ping http://google.com"
As the server responds, he tells everyone that was exactly how anyone can go and hack Google.
Clearly he was wrong, but he felt like more of a black hat than any of us ever will. -
I think the reason I hate the terms "programming" and "program" (the verb) is because it's so commonly misused. Also I found people to less think of me as an hacker when saying that I am a coder rather than "I am a programmer".5
-
So my dad is watching some movie from the nineties titled "Hackers". Here are some lines from it:
"So I got into a server, looked around, run some commands. Only then did I realize that it was a bank server"
How can you not know what server are you hacking? And how did you later find out that it was a bank? For all you know you might be hacking into somebody's blog.
"
Hacker 1: So how are you gonna hack that database?
Hacker 2: I don't know yet.
H1: I would use a vulnerability in their security
"
That's like saying you would enter a building using the front doors.
Did whoever wrote the script for this movie even consulted somebody that knows at least something about hacking?6 -
Have you ever been asked to develop something unethical by your boss? Did you do it anyway? Tell us your story.10
-
Acquaintance of mine brags that he made a "Facebook password cracker" that took less than 30 lines of code.
I take a look at it, then I realize it's brute force password cracking.
Oh dear.
Facebook doesn't even let you do that many password attempts, not to mention that brute forcing passwords is going to take more time than the expected lifetime of the sun. (exaggeration? Maybe. But you get my point.)
Why are we still here? Just to suffer?6 -
TL:DR
Why do so shitty "API"s exist that are even harder to write than proper ones? D:
Trying to hack my venilation at home.
This API is so horrible D:
The API is only based on POST requests no matter if you want to write values or get values and the response only contains XML with cryptic values like:
<?xml version="1.0" encoding="UTF-8"?>
<PARAMETER>
<LANG>de</LANG>
<ID>v01306</ID>
<VA>00011100000000000000000010000001</VA>
<ID>v00024</ID>
<VA>0</VA>
<ID>v00033</ID>
<VA>2</VA>
<ID>v00037</ID>
<VA>0</VA>
Also there are multiple API routes like
POST /data/werte1.xml
POST /data/werte2.xml
POST /data/werte3.xml
POST /data/werte4.xml
And actually the real API route is only given in the request body and not in the path.
Why is this so shitty? D:<
Btw in terms of security this is also top notch. It just globally saves if one computer sends the login password.
I mean why even ask for a password then? D:
That made me end up with a cronjob to send a login request so I don't have to login on any device.
PS:
You see, great piece of German engineering.3 -
It's cute how most companies think that someone will take the time to personally hack them. Like nah mate there's countless bots running around the internet like a rabid pack of dogs sniffing ip addresses and running exploit, one of the stragglers will pick you off...
-
Which are one of the most badass , kickass, inspiring, jaw dropping quote about programming/coding/hacking which you have heard?24
-
Someone please tell Hollywood that you cannot hack systems by typing some random command in the terminal.13
-
Every TV show/movie with a hacking scene....
Person trying to hack: I'm unable to get through their firewall.
Boss : Then hack HARDER.
Hacker: Thanks for the advice boss! I'm in! -
Because I own http://grnail.co.uk and http://hotrnail.co.uk (which I bought to prevent scammers having access to them), I often get emails about peoples' accounts. I could do a password reset and own these accounts, but of course, I don't.
However, today I started getting passport scans and personal details from Syria...2 -
A few days back I read an article about ethical hacking and get rewarded for bug bounty. I thought that might be interested.
AND
I'm about to send out my first ethical hack report to a company! I'm nervous because I don't know how they'll respond. It's an xss vulnerability, and I really hope they'll fix it.5 -
I'm not a web dev but I am pretty sure it is not so easy!
TNW just lost it's respect from me for this click bait!3 -
I'm learning docker and I just started a container running a Linux distro.
What was the first command I run in the container?
rm -Rf / --no-preserve-root3 -
Some kid keeps asking me how to session hijack. I keep telling him there's no point if:
A. You're not on the same network as him / her (I'm sure there are exceptions to this but normally you'd have to be on the same network)
B. The connection is encrypted
He doesn't understand either of those things. Not to mention it's illegal unless you're given consent.7 -
I'm always asked in an interview:
Q:How did you get into programming
A:Hacking
Q:How do you keep upto date and what blogs do you like
A: HACKING Blogs and just general multiple websites.
Q: Have you ever spent time in prison or been convicted?
A: -_- Nope3 -
Watched Fast & Furious 8 with a few dev friends last night and laughed our asses off at the 'hacking' scenes. Seriously what the fuck was that.6
-
Hmm...recently I've seen an increase in the idea of raising security awareness at a user level...but really now , it gets me thinking , why not raise security awareness at a coding level ? Just having one guy do encryption and encoding most certainly isn't enough for an app to be considered secure . In this day an age where most apps are web based and even open source some of them , I think that first of all it should be our duty to protect the customer/consumer rather than make him protect himself . Most of everyone knows how to get user input from the UI but how many out here actually think that the normal dummy user might actually type unintentional malicious code which would break the app or give him access to something he shouldn't be allowed into ? I've seen very few developers/software architects/engineers actually take the blame for insecure code . I've seen people build apps starting on an unacceptable idea security wise and then in the end thinking of patching in filters , encryptions , encodings , tokens and days before release realise that their app is half broken because they didn't start the whole project in a more secure way for the user .
Just my two cents...we as devs should be more aware of coding in a way that makes apps more secure from and for the user rather than saying that we had some epic mythical hackers pull all the user tables that also contained unhashed unencrypted passwords by using magix . It certainly isn't magic , it's just our bad coding that lets outside code interact with our own code . -
Way back, 20 or so years ago, when I went to the university, every student got an account so that we could work with the Unix machines. Every user got the same default password, -apollo-, still remember it until today, and one day I felt a little bit evil and I tried to login to the administrator account, of course the first password I tried was the default password and it worked!!! I got super scared and told an older student about it, who was brave enough to scare the administrators a little bit by leaving a message like "you have been hacked!!!" or something similar. I was just too scared to do anything about it. All I wanted to do was see IF I could login ☺️ my few minutes of being Mr. Robot... Guess hacking was not for me 😃
-
Hacking is awesome and looks easy!!! And seems like even pentagon might have toooons of exploits and backdoors, and qwerty passwords !!
After watching Mr. Robot...4 -
Fuck, I'll always be a noob. Knowing next to nothing about software development, hacking, exploits - just anything.
Felt a bit proud to had reached the level "hacker" on hack the box. Was fun solving stego, crypto and reversing challenges, diving into assembly the first time. Felt cool stepping through a disassemblied executable with radare, and understanding what a NOP slide is...
However all the illusion crumbled down, when I watched this CCC talk on OpenBSD security, where the speaker was underwhelmed with one of OpenBSD mitigations, where they tried to disallow them: "NOP slides?! Srly? No one is using that anymore. Just look at current exploits."
I felt so stupid, which I probably am. Will never catch up with those guys.
But whatever. In the end we all know nothing. We have no clue, but some are more apt in disguising it behind big speech.
(really like this German song: https://youtube.com/watch/...
Those lines always give me a chuckle:
"Man has no idea.
The house has no idea.
The tree has no idea.
The fawn has no idea.
The squid has no idea.
The tapir knows, but doesn't tell us.")3 -
Me: Are you hacker?
Him: Yes, of course!
Me: Which Linux do you use?
Him: Wtf is Linux?
"Hacker", you said enought... -_-2 -
Friend: "Oh so can you like... hack into people's computers and stuff?"
Me: "Yeah, if they just give me their password, I can hack in easily!"6 -
I fcking hate when my friends come to me for restoring his stupid blocked accounts like Instagram, Facebook, Google etc... OMG I'm a fcking computer technician not a hacker1
-
Firts social hacking ever 😁😁😁
In the bus at the end of the day
Me:(fake phonecall to Bell)ho you offert me a 10go of data per months for 30$ ! Wow
Guy in bus: he call is phone company and give all is Private information in the bus to have a better deal.
Me: poke him and say "you know now i can create accounts on your billing address for free"
Guy: Holy shit man you are right i need to take care.
Me: now change all you password contains what you publicly said.
Me: have a good day 😋3 -
I'm a terminal-guy. I prefer to live inside my terminal. When my family sees me with the green-on-black, they think I'm up to some nasty stuff like hacking / cracking emails, facebook, bank accounts, etc. Only people who understand to look at the terminal realize it's just a few monitors and log tails running. Sometimes, maybe elinks or vi running as well.7
-
So I was sitting at my usual coffee shop with my friend, and he is always telling jokes about me being a penetration tester and saying stuff like "so, you think you are an Hacker?".
He said that over and over again, so I told him "yes, do you wanna see something?", I pulled out my phone, did a network discovery to find something to show him, I did not find anything interesting to show him, so I went to the browser and put the router ip to log into it, I did not knew the password or username so I just went to Google and searched for defaults, tested 3 combinations and got access to the router.
Then I just told him "this is why what I do is important because if I wanted I could do really bad things with this", then he got mad at me for this...3 -
Because I am very interested in cyber security and plan on doing my masters in it security I always try to stay up to date with the latest news and tools. However sometimes its a good idea to ask similar-minded people on how they approach these things, - and maybe I can learn a couple of things. So maybe people like @linuxxx have some advice :D Let's discuss :D
1) What's your goto OS? I currently use Antergos x64 and a Win10 Dualboot. Most likely you guys will recommend Linux, but if so what ditro, and why? I know that people like Snowden use QubesOS. What makes it much better then other distro? Would you use it for everyday tasks or is it overkill? What about Kali or Parrot-OS?
2) Your go-to privacy/security tools? Personally, I am always conencted to a VPN with openvpn (Killswitch on). In my browser (Firefox) I use UBlock and HttpsEverywhere. Used NoScript for a while but had more trouble then actual use with it (blocked too much). Search engine is DDG. All of my data is stored in VeraCrypt containers, so even if the system is compromised nobody is able to access any private data. Passwords are stored in KeePass. What other tools would you recommend?
3) What websites are you browsing for competent news reports in the it security scene? What websites can you recommend to find academic writeups/white papers about certain topics?
4) Google. Yeah a hate-love relationship, but its hard to completely avoid it. I do actually have a Google-Home device (dont kill me), which I use for calender entries, timers, alarms, reminders, and weather updates as well as IOT stuff such as turning my LED lights on and off. I wouldn"t mind switching to an open source solution which is equally good, however so far I couldnt find anything that would a good option. Suggestions?
5) What actions do you take to secure your phone and prevent things such as being tracked/spyed? Personally so far I havent really done much except for installing AdAway on my rooted device aswell as the same Firefox plugins I use on my desktop PC.
6) Are there ways to create mirror images of my entire linux system? Every now and then stuff breaks, that is tedious to fix and reinstalling the system takes a couple of hours. I remember from Windows that software such as Acronis or Paragon can create a full image of your system that you can backup and restore at any point to get a stable, healthy system back (without the need to install everything by hand).
7) Would you encrypt the boot partition of your system, even tho all data is already stored in encrypted containers?
8) Any other advice you can give :P ?12 -
Pentesting for undisclosed company. Let's call them X as to not get us into trouble.
We are students and are doing our first pentest at an actual company instead of assignments at school. So we're very anxious. But today was a good day.
We found some servers with open ports so we checked a few of them out. I had a set of them with a bunch of open ports like ftp and... 8080. Time to check this out.
"please install flash player"... Security risk 1 found!
System seemed to be some monitoring system. Trying to log in using admin admin... Fucking works. Group loses it cause the company was being all high and mighty about being secure af. Other shit is pretty tight though.
Able to see logs, change password, add new superuser, do some searches for USERS_LOGGEDIN_TODAY! I shit you not, the system even had SUGGESTIONS for usernames to search for. One of which had something to do with sftp and auth keys. Unfortunatly every search gave a SQL syntax error. Used sniffing tools to maybe intercept message so we could do some queries of our own but nothing. Query is probably not issued from the local machine.
Tried to decompile the flash file but no luck. Only for some weird lines and a few function names I presume. But decompressing it and opening it in a text editor allowed me to see and search text. No GET or POST found. No SQL queries or name checks or anything we could think of.
That's all I could do for today. So we'll have to think of stuff for next week. We've already planned xss so maybe we can do that on this server as well.
We also found some older network printers with open telnet. Servers with a specific SQL variant with a potential exploit to execute terminal commands and some ftp and smb servers we need to check out next week.
Hella excited about this!
If you guys have any suggestions let us know. We are utter noobs when it comes to this.6 -
Had to submit a form and couldn't because of some js errors. I hacked my way through with the console to submit none the less
-
Fuck the feelings of powerlessness and helplessness. when a friend comes crying for you for help with their hacked account and you keep asking them about what they did to protect it in the first place and they reply with nothing, no recovery email, no recover phone, no secondary verification, NOTHING. and you can do nothing but stand there and watch them cry while you can literally do nothing because there literally nothing you can do to retrieve their stolen accounts. FUCK BLACK HAT HACKERS.3
-
Why is it that security (hacking) distros went so popular?
I see more and more posts pictures even on devrant featuring them. Even I see people at my uni that are on kali. I can't believe all of them are that into security. I even know two linux noob friends that wont listen to advice and went to kali as first distro.
I'd never use kali/parrot/whatever vs my current manjaro setup... I'd rather go back to arch.7 -
played a typing game with my friends, hacked it with a small python code that types everything for me and told everyone I'm the champ.
right now i'm in the first place in the world :-)3 -
Hey devrant!, I'm currently developing a hacker game! herer is a little sneak peak all the graphics are temp will be changed as soon as i get some cash! enjoy!14
-
My best Fking friend thinks that iPhones and Windows phones are the best phones for hacking.. (cctv, websites and all those shit)...HOW AM I SUPPOSED TO LIVE WITH THEM ?!?!4
-
I feel like 75% of stories here are about high schools. Maybe it’s because of the younger user base but also I think school security is beyond woeful.
I can’t even tell if my school just botched the setup or if the vendor thought it’d be a sick joke but we had software that the teacher would use to remotely look at everyone doing work but we found that if you press the help button it opens the same window where you see everyone’s desktops and can mess with them (how trivial, I know).4 -
Classmate from school has logged in to his gmail account on my laptop and has not logged out yet. Now I have access to all the his subscription including g facebook.
Now as a friend and human, should I teach him a expensive lesson ?
You time starts now. Reply fast 00:59:0015 -
Ok, this is very naive - but it’s claimed Russia is trying to hack institutes in the west for coronavirus antidote research. My question is, shouldn’t such research be completely ‘open source’ anyway?18
-
You know what really bugs me? How movies show people hacking into something with the terminal and all the matrix code but its really not like that.6
-
Anyone knows some good network penetration suite for Android?
I got cSpoit 'cause dSploit is dead. And cSploid seems to be broken - for me, too.6 -
I need advice.
So let's say, hypothetically, I found a site with a user data leak.
Would it be illegal if I only told them where the leak was for a bounty?
I am NOT going to distribute the user data. I just don't want to work for free, you know?
Again: NOT DISTRIBUTING USERDATA. No blackmail. Just information that their QA should have caught.25 -
Bragging about knowing how to hack the company's emails definitely gets you into trouble. And then coming out clean and saying it was all a bluff still gets you into trouble. Hacking jokes in the office is same as a bomb joke in public(crowded) places.
-
First time programming for work... Man in the middle student password changes. Yep that's right I'm being asked to write a program that will change students passwords on their Google accounts and local domain while also keeping a decryptable format password in a database. Granted it's much better than not letting students change their passwords at all. Plus were doing it because it will let us fix their issues while their out of school so...8
-
People talk about hacking like, "I don't do it cause its illegal", like they could if it wasn't/ )))2
-
My country has the best security experts. They convince people that they are not thiefs, Then when people believe them and give them their data, They change the password.1
-
Is it possible to track down an IP from a Skype contact? Need to find out what country they are sending from. Asking for a friend.4
-
Weekly Rant-
My best office prank by far was at my high school. First, I bought a USB rubber ducky and programmed it to backdoor my friends school computer with netcat and a batch file that ran in the background so that I could connect to his computer any time inconspicuously. The next day, I injected his computer with the drive when he went to turn in some papers.
You should've seen the look on his face when his computer started having conversations with the teacher. -
So i worked in a book publishing place, an i was the only one there with computer education.
So i was talking to one of the guys there at lunch and told him that i hacked into a the oxford electronical dictionary and got an interview in the news.
so the first thing he asks me after that is:
"CaN yOU HAcK mE A RolEX FRoM Ebay???"
At that moment i lost my faith in humanity.1 -
Long days back it was time taking to hack wifi password using coding on Linux kali ,by using few lines of codes etc,,
Nowadays Linux's kali's fern wifi cracker is too easy to use instead of using lines of code.
LOVE TO USE LINUX KALI4 -
[UPDATE]
As some 6 of you might know from my previous post I was gonna start with my OSCP course. Well, I didn't.
I thought maybe I needed some more practice before I do, and I joined this wonderful platform called HackTheBox (hackthebox.eu)
It's a really amazing place to test a lot of your skills in pentesting. You practice on various machines, each having it's own challenge different from another, it really helps in thinking differently and learning while you move forward.
I'd really like to recommend it to anyone who is interested in it! :)4 -
Prevention from malware is a lot like prevention from burglars...
As long as you don't have windows, you're good to go!3 -
Someone is trying to get into my shit. Mail Accounts and my phone is receiving lots of. Spam calls and phishing messages...
Fucking bastards..
We all get phishing shit but if it’s targeted it makes me feel awkward..
Little fucking bastards.. I think I even know who it is.. that useless piece of junk that got fired because of my honest feedback. Not many others know my current nr, emails etc..7 -
As a linux and hacking beginner, I am amazed how much I learn about linux while looking for ways to solve hacking challenges.
It is like learning something while learning some other thing. (Yeah I like learning)7 -
Just heard a QA member say whilst training a starter:
'We are going to do some hacking now'
He just changes a URL argument.5 -
Ok so today in class a friend asks me "Can you teach me hacking? I'll give you 20 dollars"
I tell him
1. I don't have interests in hacking neither do i have any experience with hacking
2. He is the type of guy to not pay me
3. He can just search it up
He also asked me a couple of weeks ago to do do the homework/assessment task for him for $20 as-well
I think he only thought i knew how to hack is because for a joke i made a bash cli thingo that changes the colours to black and green and he saw it while i was using it as a joke showing another friend3 -
This guy named Tschache,Using a variation of typosquatting, he uploaded his code to 3 popular communities of developers–PyPi, RubyGems, NPM–and gave them names of the 214 most downloaded packages on.
As a result, over the span of few months, his sketchy code was executed on more than 17,000 domains and more than 45,000 times. Interestingly, more than half the time his code ran with complete administrative rights. His script was also found to affect .mil domains of the US military.
How cool he is!?
Source: http://incolumitas.com/data/...1 -
Microsoft: devs software blocking configurable by parents in Microsoft families.
Me: since I know this has to be coded in explorer.exe while it is running the desktop, LET'S JUST CLOSE THE DESKTOP AND OPEN A SOFTWARE THAT HAS BEEN BLOCKED BY MY DAD!5 -
Anyone on HackerRank? I'm pretty new to that site but I already love it!
😊
You can find me at @master116 -
If I wanted to become a hacker here is what I would do to cover my steps: 1.) Buying a used Laptop with cash, and picking it up in person.
2.) Using random coffee shops to work by dice roll. Obviously at least a d20 and at least 20 coffee shops.
3.) Installing Linux, probably Manjaro. (Not Kali because I've heard that is watched)
What are your thoughts?31 -
USB ports are such a vulnerability.
Using a device as cheap as a Teensy you can easily execute whatever malicious software you'd like on a person's computer.4 -
What were your survial strategies in school to keep other students/teachers from thinking your hacking something?
Mine was this (pretty ugly but worked):8 -
When your coding at the cafeteria at school...
Woah! Are you hacking? Can you hack this game for me? Stop hacking you'll get expelled.
I just sit there and agree with it all ;D -
Today i teach you all how is the hacking is done...
Just start your laptop and Kickstart like this...1 -
Saw two interesting bundles on fossbytes, did somebody get the python or the white hat bundle and can recommend them?
https://deals.fossbytes.com/sales/...
https://deals.fossbytes.com/sales/...2 -
Hacking to most hated colleague's email in my office. Then using his email to sent " Hi! I love you " to my best friend who sitting behind me and acting like I dont know shit what happen.
-
I have two stories one as a victim and one as a "hacker"
Victim story: I did an installation on a research center a few years ago and the servers where directly connected to the internet. The next day I did see that someone from China had logged in...i did a clean install immediately.
Hacker story: I did help a friend of mine once for a uni project (lamp/ftp server) . While we were setting up our server, we checked the servers of the students that had finished their project and had them online. We obtained the password for the FTP server (it was available for the teacher to check) so ftped to the machine and there was no jail for the FTP.... I searched for joomla config and found the password for the database...
I leave the rest to your imagination... -
I love to tinker with electronics and different embedded boards. For some guys its like I'm hacking government or something. Why everything is always about hacking with people?2
-
So at my school, the first 10 minutes of school is like when we can do whatever we want. Earlier in the morning i had been making a nodejs password manager thing just so i could try some things out. It also used bash so i could make it like a cli. I was debugging because my database viewer said that the table was empty but for whatever reason it still worked when i put things in it. So i had the db viewer open and terminal open and the teacher comes along."Woah are you like hacking a server" he said. Everybody around me started staring at me. I told him no im not. A couple minutes later he comes around again. The db viewer was closed and i was just in terminal trying to see if some changes worked. He said "Is this like the matrix or something???". I remembered i had a cmatrix package thing installed. I ran it. W O A H everybody around we was like. Luckily most people knew that
1. It wasnt hacking
2. I dont do hacking
3. I was doing it as a joke.
Although he must of been thinking that i was like a hardcore hacker in his class. Was weird and funny.2 -
Mr Robot Season 2 finale was exactly what we wanted , but at the same time didn't expected to happen at all.
-
I love it when I see posts on any social media site or app where it's like
"Looking for someone to hack a <insert social site> account"
Do they not know how secure those sites tend to be?
Do they think it's as easy as CSI makes it out to be?
or
Maybe they're the police trying to trick us -
Friend, jestingly: Gabe I did a hack, I edited the html on my browser and sent a pic to my boss so that it wouldn't look like I was 20 minutes late
Me, seriously: Friend that's literally 99% of IRL hacking. Human error.
Friend, who is positive about humanity, unlike me: why do you disappoint me like this -
Since I started my routine of checking bug logs every morning, I've had 2 instances where a website vulnerability scanner was run against a production website and generated over 2,000 Coldfusion errors.
At the time, I was super nervous about the apparent hack attempt, and hyped that the attackers never actually got in. It's nice to know that despite the various errors indicating vulnerable / breakable code, they were ultimately unsuccessful. I know now that a determined attacker could probably have wrecked our production websites. Since then I've made a ton of security-related updates and I'm actually thankful for the script kiddie getting my attention with that scan.
PS. We're now building a website for a local security company who is going to work with us to pen test the site when it's finished! Gulp.4 -
Recently started doing ctf's, the satisfaction it brings to solve (and learn) these challenges huge. Learnt alot about forensics and cryptography in a short amount of time, the community surrounding it is awesome aswell!
-
How am I supposed to start learning pentesting / hacking when kali linux is shot down by the devRant community?
Yes, I would rather start with some source that would get me writing code to do it, I just don't know which is it. Maybe sourceforge?5 -
How can I efficiently learn from a book?
For example: I recently bought the books Violent Python and the art of exploitation. Just read those books, try to understand it and then pratice?3 -
I ordered a USB Rubber Ducky!! I'm not going to do anything malicious with it, I just want to experiment with it and see what it can do for me!
-
How many people on devRant are skilled with pentesting / Offensive Security? How long did it take you to understand it? How do you keep yourself from crossing over white hat territory into grey hat territory?3
-
Two security researchers have published details about a vulnerability in the Windows Printing Service which impacts all Windows versions.
According to a Report of ZDNet : The vulnerability codenamed 'PrintDemon' which is located in Windows Print Spooler (Windows component responsible for managing print operations). The service sends data to be printed to a USB port for physically connected printers. In a report published, security researchers Alex Ionescu & Yarden Shafir said they found a bug in this old component that can be abused to hijack the Printer Spooler internal mechanism. The bug can not be used to break into a Windows client remotely over the internet, so it's not something that could be exploited to hack Windows systems over the internet.5 -
Bitcoin malwares are everywhere.
The hard part is doing reverse engineering and wondering why its feeding on only top of the stack in assembly
Edit: Using IDA Pro -
smblevelworkshop2. It's a level editor for Super Monkey Ball 1/2.
I mean, yes I could try to add on to and fix my first attempt, but that's such a huge mess (speed < quality) that I just decided to scrap it and work on v2. -
All devs,
Can someone tell how to find if there's a backdoor in your Android phone or custom ROM installed?16 -
I suppose a lot of you guys use the app TVShow Time to track your series.. but you probably don't know that TVShow Time, at the beginning of his story, hack betaseries and use his API to spam menbers by asking them to switch to TVShow Time.
Not cool TVShow Time.. not cool !
Source (in french) : http://bit.ly/1W0b66B -
One of the best things about studying computer science is that nobody starts screaming at you to STOP HACKING when you have your terminal open, although you actually are 😏😁
-
!rant
Just a little questiom. What's the movie or TV series where you've seen a hacking scene which is probably very close to reality?6 -
!rant
Ok, so I want to become penetration tester/ethical hacker. I'm learning programming in python and I'm wondering if that is good programming language for that job?5 -
Hey gang,
I'm kind of interested in learning some hacking/virus basics. I wanted to try out some scripts but I'm kind da nervous. Can I run simple viruses on a VM without worrying about my laptop getting infected too? I would think so, but I wanna be sure.
Also, if you have any resources you can point me to, that would be great. Thanks!2 -
Going to do our first social engineering pen test. We're setting up a general plan and we'll call for a meeting with a company next week. Any tips?5
-
Guy try http://vacate.ml It will sign you out from the web applications that you are currently signedin. Give star if you like it20
-
Reverse ip domain look up and reverse ip lookup are two different things or same ??
Can anyone explain both if they are different 🤔5