How would it be done? What programs would be used to recover the passwords and emails even if encrypted, would it be possible to mass DDOS to lower security, but even after that how would you go?
Forum Thread: Hacking a Secured Server Like Facebook?
- Hot
- Active
-
Forum Thread: How to Track Who Is Sms Bombing Me . 4 Replies
2 mo ago -
Forum Thread: Removing Pay-as-You-Go Meter on Loan Phones. 1 Replies
2 mo ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 3 Replies
2 mo ago -
Forum Thread: moab5.Sh Error While Running Metasploit 17 Replies
3 mo ago -
Forum Thread: Execute Reverse PHP Shell with Metasploit 1 Replies
4 mo ago -
Forum Thread: Install Metasploit Framework in Termux No Root Needed M-Wiz Tool 1 Replies
5 mo ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 35 Replies
6 mo ago -
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
7 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
7 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
7 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
9 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
9 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
10 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
10 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
10 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
10 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
11 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
11 mo ago
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Make Your Own Bad USB
-
How To: Build a Beginner Hacking Kit with the Raspberry Pi 3 Model B+
-
How To: Detect When a Device Is Nearby with the ESP8266 Friend Detector
-
How To: Detect Misconfigurations in 'Anonymous' Dark Web Sites with OnionScan
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
Hack Like a Pro: How to Find Directories in Websites Using DirBuster
-
How To: Spy on Traffic from a Smartphone with Wireshark
-
How To: Use Kismet to Watch Wi-Fi User Activity Through Walls
-
How To: Enumerate SMB with Enum4linux & Smbclient
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How To: Use SpiderFoot for OSINT Gathering
-
Hack Like a Pro: Reconnaissance with Recon-Ng, Part 1 (Getting Started)
-
How To: Beginner's Guide to OWASP Juice Shop, Your Practice Hacking Grounds for the 10 Most Common Web App Vulnerabilities
-
How To: The Best-Selling VPN Is Now on Sale
-
How to Hack Wi-Fi: Disabling Security Cameras on Any Wireless Network with Aireplay-Ng
-
Mac for Hackers: How to Get Your Mac Ready for Hacking
-
How To: Mine Twitter for Targeted Information with Twint
-
Hack Like a Pro: How to Fingerprint Web Servers Using Httprint
-
How To: Install & Lock Down Kali Linux for Safe Desktop Use
20 Responses
nothing is impossible in this world nothing but mate you cant do none of them with fb
ofc there are many bugs getting exploits every mounth but they are not that huge one plus even tho some one would know they are not gonna tell you or go scream every where that they found bug on fb
so mind your before asking such question.
Regarding the DDOS, I doubt. With the recent case of the Great Cannon, you would probably required even or more power than that today. An amount of traffic that only huge organization may even try to handle.
About exploiting Facebook servers, nobody can tell. Of course it wouldn't be as easy as sinking an OS, due to the fact that the comunication itself is encrypted and you have very little or no space to act on the web requests that you can craft. Such an organization must have bleeding edge security, never stopping controls and flawless incident response.
However, YouTube latest hack and Ashley Madison leak are the proof that on the internet, you can't predict anything.
Like, anything.
I roll wit CiUFFY on this one..
You start blasting away with UDP cannons, pretty sure : Connection Terminated! You have been logged attempting to steal my cookies. Sending the Cookie Monster Now!
Could of DRDoS off Bit Torrent nodes... (Slowly putting light to my secret stash)
Welcome to the UDP world. Sadly?, they patched BT Blasting last week.
Monkeys wear slippers and red dinner jackets??!!..
Do we have archive images for the Cookie Monster?
Oh, monkeys, I know right? Mind blowing.
BTW M2M Threat Intel Platforms are looking for you and your posts...
I'm gonna take note of that, ah, thanks!
Still working on something else ;-)
Makes sense but I would think somthing like MASS couple thousand Computer DDOS would lower security and leave invulnrabilities, but even after that what program would you use Togo to the next step, like When your hacking a small server on a redneck website what programs would you use and how would you execute it to get data
I guess you want to make another example.
It's not a shield which slowly rips apart if you hit it hard.
Websites that can't handle the traffic just go down until they can prevent further attacks, so that yoyu can't access them. Software diesn't brake if you DDOS it, it just doesn't respond. You want it to work to compromise it.
I know almost nothing of how to compromise information from a server after lowering its security, need help with that :D
Only heard about NITO
UDP attacks? First time I've hear of those, how do they work?
I'm just curious on how to extract information from a server, such as passwords, even a very light server filled with invulnrabilities such as a self made forum, like steps
Sounds like you need to set up a test lab and get to work learning the craft. OTW has posts on setting up and training, or Im sure people here can help you out. You need some Vuln ISO.s to practice with.
Alright thanks man :D gonna check him out
No worries, just remember to keep your arms and legs inside the ride until it has come to a complete stop and then exit to the left.
Thanks guys really helped.
I'm loving the awesome idea generation in the comment section!
We should also keep in mind that social engineering is a huge success in many major hacks. Take for instance the 4chan redirection hack.
The attackers called many different corporations, netflix, amazon, etc. giving little pieces of information about an individual to reset their password, and finding out more information through their account.
Once they gathered enough information about the DNS owner, they were then able to redirect the 4chan website to their twitter page. It required no searching for exploits or bugs.
Hope this helps!
That's extremly smart, can you also grab the persons ip and trace it and than filter out white pages with the zip code and the name, get their phone number and than sms spoof, or send a RAT?
Because facebook sends the reset code through the phone
Fairly vague, but I'll do my best. There's many ways to carry out a hack. In this scenario, reconnaissance is critical, as it is with near every hack.
A mass DDoS is just referred to as a DDoS; it simply means you're using many computers, usually part of a botnet, to deny anyone from trying to connect to the servers. A DoS uses just a single machine.
Furthermore, a DoS attack doesn't really lower security per sé. It's just overloading the servers with so much information that they can no longer cope. Think of a DoS like trying to enter a shop, and there's just someone standing in the doorway not allowing you to get through. That's really all it is.
ghost_
Share Your Thoughts