How would it be done? What programs would be used to recover the passwords and emails even if encrypted, would it be possible to mass DDOS to lower security, but even after that how would you go?
Forum Thread: Hacking a Secured Server Like Facebook?
- Hot
- Active
-
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
2 days ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 2 Replies
3 wks ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
3 wks ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
2 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
2 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
2 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
3 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
3 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
3 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
3 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
3 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
4 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
4 mo ago -
Forum Thread: How to Run and Install Kali Linux on a Chromebook 18 Replies
5 mo ago -
Forum Thread: How to Find Admin Panel Page of a Website? 13 Replies
6 mo ago -
Forum Thread: can i run kali lenux in windows 10 without reboting my computer 4 Replies
6 mo ago -
Forum Thread: How to Hack School Website 11 Replies
6 mo ago -
Forum Thread: Make a Phishing Page for Harvesting Credentials Yourself 8 Replies
6 mo ago -
Forum Thread: Creating an Completely Undetectable Executable in Under 15 Minutes! 38 Replies
7 mo ago -
Forum Thread: Hacking with Ip Only Part [1] { by : Mohamed Ahmed } 5 Replies
8 mo ago
-
How To: Make Your Own Bad USB
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Run Kali Linux as a Windows Subsystem
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Use Ettercap to Intercept Passwords with ARP Spoofing
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Find Passwords in Exposed Log Files with Google Dorks
-
How To: Use Command Injection to Pop a Reverse Shell on a Web Server
-
Hack Like a Pro: How to Find Directories in Websites Using DirBuster
-
How To: Scan, Fake & Attack Wi-Fi Networks with the ESP8266-Based WiFi Deauther
-
Hack Like a Pro: How to Spear Phish with the Social Engineering Toolkit (SET) in BackTrack
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How To: The Essential Skills to Becoming a Master Hacker
-
How To: Use Google to Hack(Googledorks)
-
How To: Dox Anyone
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
BT Recon: How to Snoop on Bluetooth Devices Using Kali Linux
20 Responses
nothing is impossible in this world nothing but mate you cant do none of them with fb
ofc there are many bugs getting exploits every mounth but they are not that huge one plus even tho some one would know they are not gonna tell you or go scream every where that they found bug on fb
so mind your before asking such question.
Regarding the DDOS, I doubt. With the recent case of the Great Cannon, you would probably required even or more power than that today. An amount of traffic that only huge organization may even try to handle.
About exploiting Facebook servers, nobody can tell. Of course it wouldn't be as easy as sinking an OS, due to the fact that the comunication itself is encrypted and you have very little or no space to act on the web requests that you can craft. Such an organization must have bleeding edge security, never stopping controls and flawless incident response.
However, YouTube latest hack and Ashley Madison leak are the proof that on the internet, you can't predict anything.
Like, anything.
I roll wit CiUFFY on this one..
You start blasting away with UDP cannons, pretty sure : Connection Terminated! You have been logged attempting to steal my cookies. Sending the Cookie Monster Now!
Could of DRDoS off Bit Torrent nodes... (Slowly putting light to my secret stash)
Welcome to the UDP world. Sadly?, they patched BT Blasting last week.
Monkeys wear slippers and red dinner jackets??!!..
Do we have archive images for the Cookie Monster?
Oh, monkeys, I know right? Mind blowing.
BTW M2M Threat Intel Platforms are looking for you and your posts...
I'm gonna take note of that, ah, thanks!
Still working on something else ;-)
Makes sense but I would think somthing like MASS couple thousand Computer DDOS would lower security and leave invulnrabilities, but even after that what program would you use Togo to the next step, like When your hacking a small server on a redneck website what programs would you use and how would you execute it to get data
I guess you want to make another example.
It's not a shield which slowly rips apart if you hit it hard.
Websites that can't handle the traffic just go down until they can prevent further attacks, so that yoyu can't access them. Software diesn't brake if you DDOS it, it just doesn't respond. You want it to work to compromise it.
I know almost nothing of how to compromise information from a server after lowering its security, need help with that :D
Only heard about NITO
UDP attacks? First time I've hear of those, how do they work?
I'm just curious on how to extract information from a server, such as passwords, even a very light server filled with invulnrabilities such as a self made forum, like steps
Sounds like you need to set up a test lab and get to work learning the craft. OTW has posts on setting up and training, or Im sure people here can help you out. You need some Vuln ISO.s to practice with.
Alright thanks man :D gonna check him out
No worries, just remember to keep your arms and legs inside the ride until it has come to a complete stop and then exit to the left.
Thanks guys really helped.
I'm loving the awesome idea generation in the comment section!
We should also keep in mind that social engineering is a huge success in many major hacks. Take for instance the 4chan redirection hack.
The attackers called many different corporations, netflix, amazon, etc. giving little pieces of information about an individual to reset their password, and finding out more information through their account.
Once they gathered enough information about the DNS owner, they were then able to redirect the 4chan website to their twitter page. It required no searching for exploits or bugs.
Hope this helps!
That's extremly smart, can you also grab the persons ip and trace it and than filter out white pages with the zip code and the name, get their phone number and than sms spoof, or send a RAT?
Because facebook sends the reset code through the phone
Fairly vague, but I'll do my best. There's many ways to carry out a hack. In this scenario, reconnaissance is critical, as it is with near every hack.
A mass DDoS is just referred to as a DDoS; it simply means you're using many computers, usually part of a botnet, to deny anyone from trying to connect to the servers. A DoS uses just a single machine.
Furthermore, a DoS attack doesn't really lower security per sé. It's just overloading the servers with so much information that they can no longer cope. Think of a DoS like trying to enter a shop, and there's just someone standing in the doorway not allowing you to get through. That's really all it is.
ghost_
Share Your Thoughts