What do you need to accomplish my script kiddie friend?
I can't help you if you don't ask the right questions.
I don't even normally reply to these shit threads but I'll give you a chance because I'm drunk anon
Cain and Abel fag. just go to somewhere with a public network and steal personal info. emails, passwords, anything that people don't want everybody so see you can probably get by using cain and abel CORRECTLY
sqli is all you need then.
I'm not good at it myself. I am the basement dwelling exploit developer.
On a sidenote, why do you want to breach databases? Played watchdogs recently?
ITT: teenagers who use windows and a single drunk fat fuck who can't even install gentoo.
OP, you couldn't even hack into your neighbour's WiFi. You will never be good enough to break into a large corporation who actually pay people with actual degrees and experience to defend against fucking retarded skiddies and wannabe 1337 4n0nym0u5 m3mb3r5
Ehh... Please, please don't try hitting big sites.
Here's what you should do:
>get a physical book on sqli you won't read a pdf and you know it
>after reading said book go to vulnhub and download something sqli related
>work on that for about 8-12 months
>go try your skill in the wild
...ahhhh I knew if I was patient the OP would deliver topkek.
You go, buddy. Stick it to the man.
I didn't even steal anything yet fucker.
For a skiddie the easiest way is to use a rat. Google it and you'll get pages upon pages of precious information.
He's right tho
>not realizing most of the large databases have been released online anyways.
Seriously. Like that adobe leak with 7 million users and passwords on TPB
Also OP, don't try it. If you're still asking "How do I hax0rz" you're not ready yet.
then head over to vulnhub and get another vm and start hacking.
You're given a a fucking axe while you're standing in a forest of trees and you ask "HOW DO I CHOP TREE?"
THEN DO IT. you faggots are all talk and questions. Just mess with that shit for fucks sake.
OP got his answer you faggot.
I'll be here all night. Unless the thread dies in which case I'll vanish in to the night and god forbid you fucking 1337 H4xx0rZ would actually have to use google for you retarded questions
>ITT: teenagers who use windows and a single drunk fat fuck who can't even install gentoo.
So which one are you? One of the teenagers or the single drunk fat fuck? I'm going to guess the latter.
Dude... Really? You're really asking me this?
Have you heard of VPNs? google that shit right now and also find out what a proxy is or TOR before you start RATdumping your schools computers.
Just set up your fucking rat in a vm setup and get comfy with it. It's just like sticking a thumb up your butt. It'll get better the more you do it anon.
I hacked a porn site once by entering
>' or 1=1
in the password field.
Shit was so l33t.
>the single drunk fat fuck
that would be me.
A few of my friends use windows for their sqli testing. Not because they want to but because thats what the job requires.
I've used metasploit for some general faggotry and testing of my exploits. It's a great tool.
If you lack the skills to penetrate the system though a computer might I suggest just using the phone and social engineer the information out of some one. Way less technical and most times is way faster than a 10,000 Jiga bit connection!
People like you are faggots.
>There's a perfectly good hammer right here MR. faggot
>NO! I DON'T WANT TO USE THAT HAMMER BECAUSE I CAN SEE SOME MINERAL DEPOSITS THAT CONTAIN IRON AND A TREE fROM RIGHT HERE
>GIVE ME A FEW FUCKING MONTHS AND I'LL HAVE THE SAME THING READY tO USE
your a faggit
be a 1" y/o script kiddie, get into politics, learn politcs, social engeneering, wait years, thrive, lose, get up again, get inot the real stuff (internal working of the stuff, politics, economics, banking systems, internal info, business secrets) and then quietly either fix the problems like a hacker and/or leak information to the press without being identifiable (time is your best friend, those system last long, be patient) and/or do research papers - but in your own name.
and NEVER. EVER brag about it.
Keep it to yourself. You're doing this for yourself
Mitnick tauch us : social engeneering the the best tool, always.
Information is power.
At some point in your journey you will be able to face a challenge, that very challenge that keeps all these corrupt system running. You know the problem, so you know how to gain personal profit, ignore them and keep a socially satisfying social position, even as a anarchist pysicist, you may be a well regarded economist, you may alos be sitting close to a military doing dealing with cyversecurity issues of on very important wolrd power.
What do you ? You discover the one element that keeps those corrupted system alive : having a well regarded social position or fiking it. This is how systems actually don't get fixed.
I you think you can fix it. Fix it. You you need to gather data and then leak it later, do that. If you think you shoul go public to achiev most important impact, do that. (But you can only do it once,so choose in conscience, your objectif is to inflict maximum damage to the system and to expose it so that it gets fixed)
If that were true I would've been vanned ages ago.
TOR+Proxychains and you're good to go. and if you're ratting people you shouldn't even give a fuck.
Your ISP sure as fuck won't care.
>Dilon the hacker
Those were lulzy times. What happened to the kid after he tricked /b/ into sending his neighbor a shitload of pizzas?
I don't use Linux. In fact I hate working with Linux.
Skiddies on here I assume know all about havij etc for sqli? Some useful tools and firefox add-ons out there, but they are all f*cking useless if you at least don't make the effort to learn the basics.
Use someone else's sh*t tools or learn enough to build your own?
Remember this shit?
learn the philosophy and then get forgotten, act alone, never do the same trick twice, observe, download any uselfull information you can gather, never use the same pattern
if you are alone, nobody can get you, you are part of a non-existing organization
we are legion
no idea what happened. maybe he runs 4chan now. truly an elite member of the alliance.
this guy broke criminal law to extract and transmit information from banking system you will never access through the digital networks
this guy broke cirminal law to extract information and transmit corrupted work method from state system
social engeneering is the one most powerful tool
as mitnick taugh us
google vulnhub and take your pick.
and before you do that find out what a vm is.
If you're legit worried about "getting caught" when you're using a vm on your own system I salute you. You are truly the tinfoil king.
Seriously, Linux is not the be all and end all. Yeah a lot of techies love it, and yeah it has some huge benefits over other OS etc. But I just don't like it. Best tool for hacking? Probably my browser.
What Is a Hacker?
There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term ‘hacker’. Hackers built the Internet. Hackers made the Unix operating system what it is today. Hackers make the World Wide Web work. If you are part of this culture, if you have contributed to it and other people in it know who you are and call you a hacker, you're a hacker.
The hacker mind-set is not confined to this software-hacker culture. There are people who apply the hacker attitude to other things, like electronics or music — actually, you can find it at the highest levels of any science or art. Software hackers recognize these kindred spirits elsewhere and may call them ‘hackers’ too — and some claim that the hacker nature is really independent of the particular medium the hacker works in. But in the rest of this document we will focus on the skills and attitudes of software hackers, and the traditions of the shared culture that originated the term ‘hacker’.
There is another group of people who loudly call themselves hackers, but aren't. These are people (mainly adolescent males) who get a kick out of breaking into computers and phreaking the phone system. Real hackers call these people ‘crackers’ and want nothing to do with them. Real hackers mostly think crackers are lazy, irresponsible, and not very bright, and object that being able to break security doesn't make you a hacker any more than being able to hotwire cars makes you an automotive engineer. Unfortunately, many journalists and writers have been fooled into using the word ‘hacker’ to describe crackers; this irritates real hackers no end.
The basic difference is this: hackers build things, crackers break them.
Why the aggression faggot? I'm not claiming to be a master hacker, someone asked a question, I gave my answer.
Also, no I'm not currently empoyed in a security position, and sqli is probably what I'm best at, but I'm always learning. Who knows, maybe one day I'll HAVE to use linux.
>not currently empoyed in a security position
That's what you get for focusing on sqli alone.
also you do realize you're missing hundreds of attack vectors by limiting yourself to sqli alone? right?
this guy has his own nacrissistic little pride
even if you kids got information of the inside working of a bank, you wouldn't be able to spot it or identify its value.
... and how do you get off the record information ? Its not recorded. It's oral.
if you ever really can climb the iron door of a buliding and get into an office to download information ... well ...
you will feel that your exploit was worth it.
I don't want intricate details because I don't want to do it but I've seen lots of DOX dumps through TOR and I get curious. How does somebody get that much information on somebody?
Would they have to break in to multiple systems and databases to compile all the information? I always presumed they just found addresses through e-mails being located on mailing lists for things such as a football club or another hobby.
Focus tends to be on sqli becuase it's what I'm used to and it's easy to get into the rut of sticking to what you know. Sqli like everything has it's limitations. I want/need to focus on other things but there's so much to learn it's a lifes work.
No. No I don't.
Several ways. I think the TOR doxdump for example gets a shitload of its info by dumpster diving and phishing. ofc there are some 1337 h4xx0r who hack emails and such.
If you really want to know how that shit goes down try it yourself. Pick a random target and start gathering. If you can dumpster dive all the better.
hackers enhance and fix
crackers just use and make personal profit
any system is hackable and almost eveyrthing can be fixed
the error is always human, either the conceptor or the user, but it can be fixed
civil disobedience shows that somet times rules don"t mean don't do. They sometimes mean : listen to the spirit, understand its goal, and if you must break the formal rule to attain its original purpose, don't get caught.
Want to join my elite hacking team? I like your shades!
Those guys are anonymous.
Sure as fuck *I* am not part of that group of idiots.
This one time anonymous hacked my girlfriend's email and found porn.
Then some anon decided to send those to all her friends.
Weird how those anonymous guys just happen to do stuff I'd like to do, huh?
SQL injection is a single method, usually used to deface a website. If you think that makes it the best tool for hacking, just... wow.
I'd hazard an opinion that metasploit is a better tool than fucking internet explorer.
Did you manage to get root access to any servers with your browser yet, skiddie?
sqli can do far more than deface faggott. DB's, PW, Emails, Payment details...
I won't even react to your standard newfaggotry 'Look what a great hacker I am' bravado bullshit. I don't need to prove myself to this tea drinking foggott.
thats all you need my friend..goodnight
>taking advice from a guy who gets busted by the partyvan
Fucking stupid fucking "hackers" like you make me cringe the fuck out everytime stupid ass pretentious little cunts who think they're all dark and edgy by claiming to hack when in reality they can't do shit like stfu you're not part of anonymous you're not dark or part of any group except for the group of dumbass 12 year olds who pretend to hack shut the fuck up
hacking tools are readily available on windows.
> open a note pad file
>paste this in
echo Starting vital windows processes, do not Close.
timeout /t 2 /nobreak >nul
>save file as hacktool.bat
find it and run it.
I don't but if you go through it, and read it really highlights how to use tor to cover your tracks and stay undetected and uses examples of recent publicized hackers and how they went wrong nad how they got caught. interesting read.
1: Look up domain owners name. If you don't know how to do that-goto reddit or kill yourself.
2: Research said individual, everything. Create email acct that reflects.
3: Call provider from someone you secretly hate's phone. Insist you are individual, insist the email they have on file is wrong and provide new(be creative
4: Call back and get password reset.
I'm not intending to do anything illegal. But I am interested in general encryption and concealment - more for security than anything.
Just because Jollyroger's tips didn't prevent him from getting vanned, doesn't mean they aren't useful - at least as building blocks.
But if you know a better guide, I'm interested.
Not to burst your bubble but this is the "information age" and people who hold the information are powerfull.
Not your average script kiddies or the rest of the 99% of the haxx0r community. But even the script kiddie has more power than you.
If they're arrogant about it thats because they have the right to be. They took the time to research shit that you use every day but won't bother even finding out how it works.
You're just another scared bastard too stupid to read a book and so you're angry at the people who have done so.
Now get the fuck out of this thread and go lurk trap threads.
i cut my bangs today
i concealed my dna in a plastic bag. the bag is set to be transported to the transfer station.
As fucked up as it sounds:
or alternatively use google and find some shit that wasn't written by a mongoloid who got vanned. You could even google the titles of the "chapters" for better and more up to date info on those subjects.
also /g/ has a almost daily "WAAH WAAH MUH ENCRYPTION HURR!" thread.
Head on over to that if its up.
no not that, I know what hacking is and shit it doesnt matter what you use, what Im saying is those kids that you say something they dont like then they say they're gonna hack you and shit, i just want to murder them all
Should any pain find you:
Let it strengthen your faith in God.
you can hack into computers really good with a machete
you can hack into buildings with a machete
you can hack into security systems with a machete
hell, you can even hack into people's lives
The best hacking tools: what you make yourself, and never release.
>For emails just scrape threads where people post their email thinking they'll get money on paypal
I remember using all of the emails in one of those threads; I just signed them up to as many newsletters as possible e.g. The Autistic Society Weekly Newsletter.
If people will be stupid with their personal information...
Why is it that people keep spouting that shit?
Sure you can make highly customized tools but in the context of this thread the newbies are looking for easy to use or relatively easy to use general tools.
You're the second douche to post this crap. You work in infosec or just parroting crap you've read about?
All things are prophesied.
Numbers are infinite.
and how long does it take you to create a fake paypal?
You sir are the cream of the crop. This picture is for you.
Reality is relative.
typed it up once typing it again:
>buy a physical copy of a book because you wont read a pdf and you know it
>read the fucking thing
>you now know the basics
That's the BEST way to learn programming.
If you're one of those hasty fucks who can't even read a single book try codeacademy or something.
as a newfag the mole and havij work neat
only work needed is common sense + dorks
The pursuit of happiness is just that.
If you want to be happy, then be happy.
It really is that simple.
>exchange 100-250 dollar into bitcoins
>use tor and go to tcf
>buy registration to use forum for 50 dollar
>buy 50k emails for 50 dollar
>buy 10 domain through that website (package so its around 25-30 dollars and anonymous)
>make 10 fake shopping sites (have some knowledge)
>spread those sites through those emails
>aquire data and sell asap (the fresher the better)
>sells credit card info or fullz
>cc = 5 dollar
>50k = atleast 1000-5000 hits with cc
>sell that within a week on their forum
Enjoy your hacking life and buy fake money, use drop points.
God is tree connecting us the leaves.
God is also the wind, grass, and sky.
The seen, unseen, known, and unknown.
The seed, tree, leaves, and sun.
We count every coin twice because they have two faces.
They count every coin twice because we have two faces.
The Hour Is Always Now
Do not try to understand death.
Enjoy loving and life instead.
Energy is free and infinite.
Reality is relative.
e=mc^2 = π =e=i=∞
Perfect circles and spheres have infinite amounts of points.
How many circles can you fit in this picture?
As many as you can measure.
>bot spams on skiddie thread
Lying to yourself:
We lye to ourselves as quietly as a burning candle.
They lay betwixt the smoke and the water.
Our lie the flame.
Our mind the wick.
Our body the wax.
companies sell email lists to marketers all the time unless specifically mentioned especially sites they are partnered with.
I don't really understand what you mean by
>How did anonymous send emails to other people?
but I guess what you're looking for is email spoofing.
Love wholly the Holy infinite God.
Should any pain find you:
Let it strengthen your in God.
I haven't heard about that but email lists of all sorts are sold all around the web.
And then there are things like:
and a million noncommercial haxx0r made ones.
Attempt to augment your mind and you corrupt your soul.
Use Imminent Monitor. Buy a good crypter, crypt the file, infect popular torrent files and spread the virus to torrent sites. have made $5k in past 2 months just by selling info every once in awhile. very simply script kiddy stuff but it gets the job done
Fight only if you must.
Fight to protect your God given rights.
Black and white is a lie.
There are only shades of grey and absence of light.
How often do you look at plants and not realize that they are living beings?
Aliens are real.
The forsaken are those who have forsaken their own soul.
Marijuana is medicine for a sick soul and too serious a mind.
All will stand before God.
Whose eye do you think that is?
Perspective is subjective.
Up is down all around.
Well... Since the bot killed the thread I'm just gonna carry on drinking.
But before I go.
All h4xx0r wannabes USE GOOGLE the information is out there. All you have to do is find it and apply it.
Good luck to the few who don't give up when the shit gets hard.
While on subject, are there any good books for this kinda shit I can download?
I've searched on tpb and most good books are years old.
I guess what I am asking, in a more clear, less retarded way are
>plz gimmie links to hacking tutorial torrents
I'm still learning the basics for Kali but I would love some books to download, like for example violent python. Please and thank you /b/
Is there any way to find out friends hidden Facebook login emails? I'm well aware of linking my Facebook account to Hotmail or Yahoo and finding the emails that way, but there are still heaps that don't show up
The Hour Is Always Now
lol read this.. http://instagrampics.mobi/10-sex-things-men-don-t-care-about/?789
You already reside within the realm of Satan.
You thought there would be suffering in Heaven?