Tuesday, 30 June 2020

Top 13 Free Websites to Learn Hacking this 2018

Phrack Magazine: Digital hacking magazine. Hakin9: E-magazine offering in-depth looks at both attack and defense techniques and concentrates on difficult technical issues. Exploit DB: An archive of exploits and vulnerable software by Offensive Security. The site collects exploits from submissions and mailing lists and concentrates them...

Monday, 29 June 2020

Re:(2) 250 million customers for your business / 250 млн клиентов для Вашего бизнеса

Business group EN Hello  [ldqvely]We want to offer you a database of 250 million e-mail addresses of customers from all over the World for price $500[xqozj] to sell them your products and services. [jmqsqzz] As well as bonuses and much more. [ypwpzrww] Business...

Thursday, 11 June 2020

What Is Keylogger? Uses Of Keylogger In Hacking ?

What is keylogger? How does hacker use keylogger to hack social media account and steal important data for money extortion and many uses of keylogger ?Types of keylogger? ===================Keylogger is a tool that hacker use to monitor and record the keystroke you made on your keyboard. Keylogger is the action of recording the...

ASIS CTF Quals 2015 - Sawthis Writeup - Srand Remote Prediction

The remote service ask for a name, if you send more than 64 bytes, a memory leak happens.The buffer next to the name's is the first random value used to init the srand()If we get this value, and set our local srand([leaked] ^ [luckyNumber]) we will be able to predict the following randoms and win the game, but we have to see few details more...

How To Hack Any Whatsapp Account In 2020

The article will also be broken down into different subtopics and subcategories. This to make it easy for those who are just interested in skimming through the article to pick the part of WhatsApp hack they are most interested in. Just incase you don't have enough time to go through the entire article.Search queries like these are a common...

Wednesday, 10 June 2020

Why (I Believe) WADA Was Not Hacked By The Russians

Disclaimer: This is my personal opinion. I am not an expert in attribution. But as it turns out, not many people in the world are good at attribution. I know this post lacks real evidence and is mostly based on speculation.Let's start with the main facts we know about the WADA hack, in chronological order:1. Some point in time (August - September...

John The Ripper

"A powerful, flexible, and fast multi-platform password hash cracker John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3)...

Many Ways Of Malware Persistence (That You Were Always Afraid To Ask)

TL;DR: Are you into red teaming? Need persistence? This post is not that long, read it ;)Are you into blue teaming? Have to find those pesky backdoors? This post is not that long, read it ;)In the previous post, I listed different ways how a Windows domain/forest can be backdoored. In this new post, I am digging a bit deeper, and list the...

BTC

Doge

LTC

BCH

DASH

Tokens

SAMPAI JUMPA LAGI

SEMOGA ANDA MEMPEROLEH SESUATU YANG BERGUNA