Command & Control Server Explained & Tutorial Using Havoc
Reddit » Hacking
by /u/pwnguide
14h ago
https://pwn.guide/free/cnc-server submitted by /u/pwnguide [visit reddit] [comments ..read more
Visit website
Issues with building a SMS to WhatsApp service
Reddit » Hacking
by /u/stonetelescope
14h ago
I figure someone here might know all the issues involved, so please excuse me if this is the wrong forum. I want to build a service that people can use to post and receive messages through their WhatsApp account, but do so using only SMS. The goal here is to help people with dumb phones still use WhatsApp. I think some combination of Whapi.cloud and Twilio can be used to make this happen, but I'm afraid all the messages coming from SMS would ultimately have to be sent from only one account. I want the service to actually use the sender's registered account to send and receive messages, but th ..read more
Visit website
How to work a ramhammer exploit into a potential camo pattern
Reddit » Hacking
by /u/astro2xl
14h ago
I'm experimenting with potential camo patterns to put on something I'm writing about, and someone suggested using the rowhammer exploit. how might such a thing convert to a image or other pattern? submitted by /u/astro2xl [visit reddit] [comments ..read more
Visit website
APT44: Unearthing Sandworm [PDF]
Reddit » Hacking
by /u/DrinkMoreCodeMore
14h ago
submitted by /u/DrinkMoreCodeMore [visit reddit] [comments ..read more
Visit website
How reliable is Whonix? Someone I know is a bit paranoid and just learning how to keep their privacy intact. Does Whonix leak any data, TCP or UDP? Is it risky using TOR over VPN? Do they have to set up their own firewall rules to block UDP, DNS, SMTP etc. ?
Reddit » Hacking
by /u/ChonkyKitty0
14h ago
So they worry that Whonix might have a hiccup like any software at times and leak their IP address. How big is this chance? Do they have to manually set up their own firewall rules and other configs on Whonix to be sure it doesn't leak any packets? By leaking I mean sending packets out without going through the VPN and TOR tunnel? How worried should they be? They heard that TOR does not support UDP. So what would Whonix do if they by mistake ran a UDP program? Would it like "Well, TOR doesn't accept UDP, so I'll just send those packets without any encryption at all with the exposed IPs!". Als ..read more
Visit website
How does doxxing from online games work?
Reddit » Hacking
by /u/FrostedEsti
14h ago
So recently, I was playing games online, Minecraft specifically and there was these two players having a heated argument. Give it a few minutes, and theres an address in the chat with someone's full name. How does that work? This was two complete strangers who have never had an interaction before this. submitted by /u/FrostedEsti [visit reddit] [comments ..read more
Visit website
Spoof USB thumb drive as a printer for Print to PDF
Reddit » Hacking
by /u/newswimmerdoe
14h ago
Hello! ​ Is there any way to spoof a USB drive, as a printer for Print to PDF purposes? Just plug in, open print menu, click or set the printer as default printer, and then every time a print job runs, it goes through the selected USB spoofed printer, and is saved as a PDF on the filesystem? Most likely cannot run anything on the computer itself. But USB can be plugged in and the computer does recognize connected printers. submitted by /u/newswimmerdoe [visit reddit] [comments ..read more
Visit website
Windows shortcut example malware
Reddit » Hacking
by /u/Coolst3r
14h ago
I decided to test if this would work or be detected now i need feedback. Please be honest and tell me what you think thank you. https://github.com/s-b-repo/eternal-green so far no detection despite not being obfuscated and being open. submitted by /u/Coolst3r [visit reddit] [comments ..read more
Visit website
Alternatives to auto run for flash drive based malware?
Reddit » Hacking
by /u/liquid_the_wolf
2d ago
Hello everyone! I’m currently working on a project for one of my college courses involving a flash drive based keylogger. I’ve gotten the keylogger working, but I am stuck on the next step. One of my goals is to make the program start automatically upon insertion of the flash drive into a windows pc without user interaction. The answers I’ve found online say it “can’t be done” since auto run is disabled on newer windows versions. Auto play seems to be a dead end too because it requires human interaction. All other answers require prior configuration of the computer itself. A solution must be ..read more
Visit website
Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters
Reddit » Hacking
by /u/SCI_Rusher
2d ago
submitted by /u/SCI_Rusher [visit reddit] [comments ..read more
Visit website

Follow Reddit » Hacking on FeedSpot

Continue with Google
Continue with Apple
OR