hacking

  1. psy0p

    Hacking Encryption Methods

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  2. psy0p

    Exploits / Buffer Overflows

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. Jeremys

    Anonymity Check each AntiDetect browser and choose the worst one

    An interesting technical article on the topic of antidetect browsers (list), how they work and what they burn. For the review, the author took 4 Linken Sphere browser (10% discount for CPARIP promo code), AntBrowser, Aezakmi (15% discount for CPARIP promo code) and Indigo (aka "multilogin"), he...
  4. Tasken

    Anonymity How to properly setup RDP/VPS

    Hello all, I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port...
  5. xanix

    Hacking Different methods for Database hacking

    Database Hacking Database contains mission critical data of the corporate firm, which makes it an obvious target by hackers. Password guessing – Once the hacker gains control of web server, he looks for the application configuration files which typically contain the database server name...
  6. Otto

    Hacking 6 Methods of hacking two-factor authentication

    Two-factor authentication (2FA) has long been known for the security it can bring to organizations and their customers. The combination of what you know, what you have, and what you are is the heart and soul of 2FA and helps explain ITS relative reliability. Even so, attackers are known to have...
  7. Tasken

    News Spain suspects Russian security services of involvement in cyberattack on employment service

    On March 9, the computer systems of the National Employment Service were attacked by a ransomware virus-it encrypts files in the system, depriving users of access. The Spanish intelligence service suspects Russian special services in the attack on the Spanish State Employment Service (SEPE)...
  8. Core

    Anonymity Types of phishing

    Types of phishing What is it? Phishing is a type of email distribution under the name of a popular brand or social network administration. The goal is to get encrypted user data. This is a subspecies of social engineering that relies on users ' poor knowledge of Internet security. In practice...
  9. Dorblue

    News REvil Member: Some partners have access to ballistic missile launch systems

    One partner also has access to the systems of a US Navy cruiser, another to the devices of a nuclear power plant, and another to the systems of a weapons factory. The REvil cybercrime group operates on a "ransomware-as-a-service" business model, in which attackers offer malware to partners who...
  10. sanok

    News iPhone 12 finally hacked

    The updated Unc0ver 6.0.0 jailbreak utility for iPhone supports hacking from iOS 11 to iOS 14.3, iOS 14.4 does not. The team of hackers of the Apple mobile platform with the experience of Unc0ver has released a jailbreak that works on iOS from version 14 to 14.3 with support for all iPhone...
  11. Tasken

    News APT32 has been attacking Vietnamese human rights activists with spyware for years

    The attacks are part of an ongoing campaign aimed at spying on Vietnamese human rights activists, bloggers and non-profit organizations. The Vietnamese hacker group APT32 (also known as OceanLotus and SeaLotus) organized a series of spyware attacks targeting Vietnamese human rights defenders...
  12. Core

    News Conversations of Clubhouse users last weekend "leaked" to a third-party site

    The company assured that it has blocked the hacker and is taking additional measures. The social network Clubhouse announced the leak of conversations of some users who were in a closed room. The reason for this was a hacker attack that was launched on February 20. An unknown user was able to...
  13. Otto

    Hacking Brutedum - brute force attacks ssh, ftp, telnet etc.

    #1 BruteDum is a SSH, FTP, Telnet, PostgreSQL, RDP, VNC brute forcing tool with Hydra, Medusa and Ncrack. BruteDum can work with aany Linux distros if they have Python 3. Features of BruteDum SSH, FTP, Telnet...
  14. Serafim

    News The US told about the North Korean malware AppleJeus for stealing cryptocurrency

    The Lazarus Group has developed several versions of the AppleJeus malware to attack individuals and companies around the world. The FBI, CISA, and the U.S. Treasury Department have released detailed information about malicious and fake cryptocurrency trading apps used by North Korean hackers to...
  15. Soldier

    News The victims of the recently disclosed attacks on Centreon users were 15 organizations

    Hackers attacked only users of the free version of Centreon, which ended support for five years ago. According to the French software manufacturer Centreon, none of its paid customers were victims of the hacking campaign, which became known earlier this week. Recall, according to a recent...
  16. Serafim

    News North Korean hackers tried to break into Pfizer's computer systems

    The attackers were looking for information about the vaccine and technology for treating coronavirus infection. Representatives of the National Intelligence Agency of the Republic of Korea reported that North Korean hackers tried to break into the computer systems of pharmaceutical giant Pfizer...
  17. Core

    News In Florida, a hacker changed the levels of chemicals in tap water

    Fortunately, the attack was stopped in time, and the dangerous levels of chemicals did not have time to get into the water. An unknown hacker gained unauthorized access to the computer system of a water treatment plant in the city of Oldsmar (Florida, USA) and changed the levels of chemicals to...
  18. Tasken

    Cryptocurrency 85% Dogecoin rally shows Wall Street Bets aren’t done with DOGE yet

    Dogecoin rallied by more than 85%, suggesting Wall Street Bet’s crypto wing may have decided that they weren’t done with DOGE yet. After gaining the spotlight due to a 980% pump on Jan. 28, Dogecoin (DOGE) briefly entered the top 10 ranking by market capitalization for the first time since 2015...
  19. Gap

    News ESET reported a hack of the android emulator NoxPlayer

    NoxPlayer is designed to run Android applications on computers running Windows and Mac operating systems. The antivirus company ESET announced the disclosure of its experts of a new attack on the supply chain, the object of which was the mechanism for updating the popular application for gamers...
  20. Soldier

    News The strategy of double extortion is gaining popularity among cybercriminals

    Experts have recorded 550 reports of double extortion on the sites of data leaks of various extortionate groups. In 2020, ransomware operators resorted to a double-extortion strategy, in which attackers steal victims ' unencrypted files and then threaten to publish them if a ransom is not paid...
Top Bottom