Stream

Join this community to post or comment
 
A Spambot is an automated program used for sending spams. Using this type program a spammer sends spam emails, automated posts to various forums or even social networking sites like twitter.

How do attackers use Spambots to send spams ?

To know more :
A Spambot is an automated program used for sending spams. Using this type program a spammer sends spam emails, automated posts to various forums or even social networking sites like twitter. Spambots are widely used by the a...
3
Add a comment...
 
What are some great books to read about hacking. I don't want step by step guide; I want to actually learn the concepts. I read Georgia Weidman's book and felt greatly unsatisfied. Any help would be appreciated. I don't mind a step by step guide, as long as it actually explains what is happening.
1
Add a comment...

Roy blackhat

Discussion  - 
 
https://92.255.175.136/manage/shares/SharedMedia/index.html

#‎blackhat‬ ‪#‎Anonymous‬ ‪#‎GLOBAL‬
1
Add a comment...

Maxell Segura

Discussion  - 
Introduction Hi again. Today I have decided to document yet another unpublished challenge presented in bWAPP. This challenge concerns SQL Injection while the server uses the SQLite engine. I will t…
10
1
DoorToDoorGeek “Stephen McLaughlin”'s profile photo
Add a comment...
 
This may be a dumb question, but I can't remember off the top of my head. I don't need to ARP spoof in order to DNS spoof right?
1
Add a comment...

Thyago Sampaio

Discussion  - 
 
What is best?
101 votes  -  votes visible to Public
Kali linux
75%
ParrotOS
6%
Blackbox
1%
Matriux
0%
Windows :)
18%
5
Chris King's profile photo
6 comments
 
Although love kali too and will switch once I learn more
Add a comment...

Ñasir Ali

Discussion  - 
 
Facbook Social Toolkit Free License Key | LifeTime
https://www.youtube.com/watch?v=pV4ZoUhaSBM
3
1
More Styles's profile photo
Add a comment...

Alan Wade

Discussion  - 
 
Here’re 7 signs to gauge whether you really care about your online privacy and security or you like to play dangerous on the Web!
5
1
BJ Coleman's profile photo
Add a comment...

曾大江

Discussion  - 
 
Human civilization may be quickly perish because of the third world war or asteroid hit the earth, slow perish because of environmental disaster or resource depletion, perish because of development stagnation, mental degradation, alien invasion, superposition of multiple factors or unexpected cause. Human civilization may perish on the earth, on Mars, outside the Solar system, outside the Milky Way Galaxy, outside the Virgo Supercluster, or outside the Total Galaxy. Human civilization may also perish together with the universe. Perish or Eternalness? Human civilization has to make a choice.
Civilization does not exist for perish. Civilization exists only for eternalness. Regardless of the human civilization, or the alien civilization, can only pursue the eternal civilization. Civilization is only eternal evolution can be eternal. Natural person must artificial evolve into physical people, networking people, spherical people, galaxy people, and the Supreme Being. Planetary civilization must evolve into the star civilization, the galactic civilization and the universal civilization. Only in this way can eternity. The universe may evolve into a state that does not allow any civilization to exist. Civilization only control the evolution of the universe, can ensure eternity. Only science and technology can be artificial evolution. Only science and technology may control the evolution of the universe. The only way to eternal civilization is to take science and technology as the center, promote the development of science and technology with the fastest speed, artificial evolve with the fastest speed, control the evolution of the universe with the fastest speed.
Go all out to pursue eternity is the only choice of civilization. Human civilization is only eliminate internal war and struggle, abandon the superiority of hegemony, give up vanity of splendor, abandon delusion of God and Buddha, discard sadistic disease of bullying, can just go all out to promote the development of science and technology, can just go all out to pursue eternity.
The first step in the pursuit eternity of human civilization is to establish the Human Commonwealth (HC), eliminate the human internal war and struggle, lay a foundation to go all out to pursue eternity. Can from Chimerica to HC, can from the United Nations to HC, can from the third world war to HC, can from human revolution to HC. Several great powers can first establish HC, then let other countries to join HC step by step. Can first realize several regional alliances, then merger these regional alliances into the Human Commonwealth. The internet users around the world can first establish virtual Human Commonwealth on the Internet, then virtual HC Gradually substantiation into real HC. There are infinitely many ways to build HC. The process of establishing the Human Commonwealth may be long, tortuous and complex. In any case, human civilization must take the first step for pursuit eternity——establish the Human Commonwealth.
The Human Commonwealth is bound to be established. Human civilization will spread to every corner of the solar system, the Milky Way Galaxy, the Virgo Supercluster and the Universe. Human civilization is bound to merge with trillions of alien civilizations as the Cosmic civilization. Cosmic civilization is bound to control the evolution of the universe. Civilization will be eternal.

1
James P.'s profile photoOBEY's profile photo
2 comments
OBEY
 
THIS IS A PERFECT PLAN FOR HUMAN eternalness. PLEASE DONT SHARE WITH HUMANS.
Add a comment...
 
why ? linux ?
5
2
bat min's profile photoАЛЕЌСѦНДِР̗ ЛЕБЕДЀВ҉'s profile photo
 
майкрософт поглощает убунту ? дебиан обезглавлен ? что дальше? объявят винду открытым ПО ? а потом ..........
 ·  Translate
Add a comment...

Isaac Peters

Discussion  - 
 
He is real I have confirmed it, contact boschhacklord@gmail.com for your hack issues ranging from bank hacks, University Grades change, Email and phone hack for text, whatsapp imessages, call logs,Gps tracking and lots more. He provides proof and he's affordable trust me he's real tell him you were referred by isaac peters (yale university). His name is Derick a computer Engineer and a genius for a fact you can also reach him through Tor chat: phlfimnrb2pochwx / boschhacklord or text him on +1(205) 900-9736.
4
1
Michael Baldwin's profile photoAaron Espinoza's profile photo
 
Right. Because he needs retarded social media advertising.... 
Add a comment...

Joe Pettit

Discussion  - 
 
My introduction to German hackers began with a three-letter word called MUD.The reason that I became interested in this word was due to one of my friends
1
Torgo Rosenberg's profile photo
 
Weird.
Add a comment...

Roy blackhat

Discussion  - 
 
Information Gathering using theHarvester

Why do WE use TheHarvester?

And what can WE do with it?

TheHarvester has been developed in Python by Christian Martorella. It is a tool which provides us information about e-mail accounts, user names and hostnames/subdomains from different public sources like search engines and PGP key server.

This tool is designed to help the penetration tester on an earlier stage; it is an effective, simple and easy to use. The sources supported are:

Google – emails, subdomains

Google profiles – Employee names

Bing search – emails, subdomains/hostnames, virtual hosts

Pgp servers – emails, subdomains/hostnames

LinkedIn – Employee names

Exalead – emails, subdomain/hostnames

New features:

Time delays between requests

XML results export

Search a domain in all sources

Virtual host verifier


If you are using Kali Linux, open the terminal and type:

theharvester

Method:1

#theHarvester -d [url] -l 300 -b [search engine name]

#theHarvester -d http://sixthstartech.com -l 300 -b google

-d [url] will be the remote site from which you wants to fetch the juicy information.

-l will limit the search for specified number.

-b is used to specify search engine name.

From above information of email address we can identify pattern of the email addresses assigned to the employees of the organization.

Method:2

To get all the information about the website u can use the command as:

#theHarvester -d http://sixthstartech.com -l 300 -b all


You can use then the gathered informations to sent some nice emails to your victim and when your email contain a virus and the victim will open it you'll get session at the target machine.

This is very usefully if you want to break through a company network which is protected by a firewall.

https://github.com/laramies/theHarvester

EXPECT US

#blackhat #Anonymous #GLOBAL
2
RZK Ür's profile photoBJ Coleman's profile photo
2 comments
 
Excellent post +Roy blackhat​
Add a comment...

Mahadi Raof

Discussion  - 
 
 
A proposed change to a section of the Federal Rule of Criminal Procedure (Rule 41) would allow any magistrate judge to issue warrants authorizing government-sanctioned hacking anywhere in the country.

Federal agents armed with a single search warrant will be able to hack millions of Americans' computers unless Congress blocks a new rule from taking effect in December.

Sen. Ron Wyden, D-Ore., said the change to federal criminal procedures is a huge increase in government surveillance authority and treats victims of cyber crime like attackers by making it easier for agents to hack their computers to gain evidence. He said Congress should weigh in on such a major policy change, and he will introduce a bill this month to block the rule.

"People ought to care because it's a dramatic expansion of the government's hacking and surveillance authority," said Wyden, who serves on the Senate Intelligence Committee.

Last month, the Supreme Court passed the proposed change to Rule 41 and sent it to Congress on Thursday, which will have until December 1 to modify, reject, or defer the proposal. If the House of Representatives and Senate do not pass a resolution in favor by simple majority, the revisions will become law that same day.

Kevin Bankston, the head of New America’s Open Technology Institute said in his own statement said that this legal expansion goes beyond traditional wiretapping.

"Like wiretapping, hacking is uniquely invasive compared to regular searches and raises serious issues under our Fourth Amendment, which protects us from unreasonable searches," he said. "Unlike wiretapping, however, Congress has never authorized government hacking nor established protective rules for the road to ensure it's not abused. Government hacking also raises a host of new and serious risks to privacy and security that wiretapping doesn’t, including the risk that the malware used by the government might spread to innocent people’s computers or cause unintended damage."

If the proposal does go forward, it would mark a notable expansion of judicial power to sign off on "remote access" of criminal suspects’ computers. Privacy watchdogs are blasting the proposed change saying it would allow the government to hack into phones and seize computers remotely.

The controversial Rule 41 attempts to make it easier for law enforcement to track down cyber criminals who use tools such as Tor, botnets or malware to mask their true location. Rule 41 allows law enforcement to request from judges a warrant that permits the use of remote access tools “to search electronic storage media and to seize or copy electronically stored information located within or outside that district.” Typically, a judge’s authority to authorize search warrants is limited by his or her jurisdiction. Rule 41 allows judges to issue a search warrant across state lines to penetrate computers outside their jurisdiction or even outside the U.S.

Amie Stepanovich, senior policy counsel with Access, said Rule 41’s authority to give the US government the ability to create and control botnets was particularly alarming because of the government’s spotty track record at designing its own malware securely.

What do you think of the proposed changes to Rule 41?

Sources:
+Threatpost: http://gplus.ly/1TOYZpQ
+Ars Technica: http://gplus.ly/1TOYImF
+USA TODAY: http://gplus.ly/1TOZ3pu

#hacking #malware #botnets #rule41 #privacy #government #tor #vpn #bigbrother
1
Add a comment...

Raymond Jacobs

Discussion  - 
 
This add-on board for the Raspberry Pi provides analog to digital conversion, a power button, and now an easy visual way to stream your data.
6
Add a comment...

Paweł Płocki

Discussion  - 
 
Continued Meterpreter Development
http://www.hackinsight.org/news,604.html
Active users of Metasploit will no doubt be aware that Meterpreter is still being actively developed and enhanced by a bunch of people. I’m lucky enough to still be one of them! In this post I just want to cover a few things that have been done to it recently, and to give a bit of visbility of how I am able to continue contributing in the way that I do.
3
1
Роман Булах's profile photo
Add a comment...

Joe Pettit

Discussion  - 
 
Instagram has rewarded 10-year-old “Jani” with $10,000 for finding a flaw in the popular social media platform.

+Tripwire, Inc. 
Instagram has rewarded 10-year-old “Jani” with $10,000 for finding a flaw in the popular social media platform.
2
1
Naveen's profile photo
Add a comment...

Raymond Jacobs

Discussion  - 
 
Build a cellular GPS that streams location data to a dashboard in your browser. Complete with battery power!
2
Add a comment...
 
What is Heap Spraying? How do attackers use this to facilitate execution of arbitrary malicious code in a victim's system ? How is Heap Spraying perpetrated and how to prevent it ?

To know more :
Heap Spraying is a technique using which an attacker can write certain sequence of bytes at a predetermined memory location of a process and then exploit that to facilitate execution of arbitrary malicious code. Let's try ...
3
Add a comment...

Ron Krebs

Discussion  - 
 
Data Security (in Plain English):
http://www.praxiom.com/iso-27001.htm
#datasecurity   #infosec   #itsecurity  
4
Add a comment...