How would it be done? What programs would be used to recover the passwords and emails even if encrypted, would it be possible to mass DDOS to lower security, but even after that how would you go?
Forum Thread: Hacking a Secured Server Like Facebook?
- Hot
- Active
-
Forum Thread: How to Hack Wireless Password Through MAC Address and IP Address 25 Replies
3 days ago -
Forum Thread: Complete Guide to Creating and Hosting a Phishing Page for Beginners 50 Replies
1 wk ago -
Forum Thread: HELP I Created an Apk for Hacking My Phone Using Kali Linux in Virtual Box How Can I Install That Apk on My Phone 18 Replies
2 wks ago -
Forum Thread: Mitm attack problem 2 Replies
3 wks ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 32 Replies
1 mo ago -
Metasploit Error: Handler Failed to Bind 40 Replies
1 mo ago -
Forum Thread: How to Know if You Are a Script Kiddie? 9 Replies
1 mo ago -
Forum Thread: How to Identify and Crack Hashes 8 Replies
1 mo ago -
Forum Thread: How to Hack School Website 8 Replies
1 mo ago -
Forum Thread: Whenever I Try "Airmon-Ng Start wlan0" There's an Error? 16 Replies
1 mo ago -
Forum Thread: How to Fix 'Failed to Detect and Mount CD-ROM' Problem When Installing Kali Linux 14 Replies
1 mo ago -
Forum Thread: Awesome Keylogging Script - BeeLogger 30 Replies
2 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 27 Replies
2 mo ago -
Forum Thread: Create and Use Android/Meterpreter/reverse_tcp APK with Msfvenom? 121 Replies
2 mo ago -
How to: Minecraft DoS'Ing with Python. 1 Replies
3 mo ago -
Forum Thread: Tools for Beginner Hacker 3 Replies
3 mo ago -
Forum Thread: How to Embed an Android Payload in an Image? 9 Replies
4 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 46 Replies
4 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 11 Replies
4 mo ago -
Forum Thread: Fix Initramfs Problem 5 Replies
4 mo ago
-
How To: Dox Anyone
-
Hack Like a Pro: How to Hack Facebook (Facebook Password Extractor)
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
BT Recon: How to Snoop on Bluetooth Devices Using Kali Linux
-
How To: Fuzz Parameters, Directories & More with Ffuf
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
Android for Hackers: How to Turn an Android Phone into a Hacking Device Without Root
-
How To: Create a Persistent Back Door in Android Using Kali Linux:
-
How To: Use SQL Injection to Run OS Commands & Get a Shell
-
How To: Brute-Force FTP Credentials & Get Server Access
-
Hacking Windows 10: How to Dump NTLM Hashes & Crack Windows Passwords
-
Tutorial: Create Wordlists with Crunch
-
How To: Perform Advanced Man-in-the-Middle Attacks with Xerosploit
-
How To: Make Your Own Bad USB
-
How To: Extract Bitcoin Wallet Addresses & Balances from Websites with SpiderFoot CLI
-
How To: Embed a Metasploit Payload in an Original .Apk File | Part 2 – Do It Manually
-
How To: Hack Networks & Devices Right from Your Wrist with the Wi-Fi Deauther Watch
20 Responses
nothing is impossible in this world nothing but mate you cant do none of them with fb
ofc there are many bugs getting exploits every mounth but they are not that huge one plus even tho some one would know they are not gonna tell you or go scream every where that they found bug on fb
so mind your before asking such question.
Regarding the DDOS, I doubt. With the recent case of the Great Cannon, you would probably required even or more power than that today. An amount of traffic that only huge organization may even try to handle.
About exploiting Facebook servers, nobody can tell. Of course it wouldn't be as easy as sinking an OS, due to the fact that the comunication itself is encrypted and you have very little or no space to act on the web requests that you can craft. Such an organization must have bleeding edge security, never stopping controls and flawless incident response.
However, YouTube latest hack and Ashley Madison leak are the proof that on the internet, you can't predict anything.
Like, anything.
I roll wit CiUFFY on this one..
You start blasting away with UDP cannons, pretty sure : Connection Terminated! You have been logged attempting to steal my cookies. Sending the Cookie Monster Now!
Could of DRDoS off Bit Torrent nodes... (Slowly putting light to my secret stash)
Welcome to the UDP world. Sadly?, they patched BT Blasting last week.
Monkeys wear slippers and red dinner jackets??!!..
Do we have archive images for the Cookie Monster?
Oh, monkeys, I know right? Mind blowing.
BTW M2M Threat Intel Platforms are looking for you and your posts...
I'm gonna take note of that, ah, thanks!
Still working on something else ;-)
Makes sense but I would think somthing like MASS couple thousand Computer DDOS would lower security and leave invulnrabilities, but even after that what program would you use Togo to the next step, like When your hacking a small server on a redneck website what programs would you use and how would you execute it to get data
I guess you want to make another example.
It's not a shield which slowly rips apart if you hit it hard.
Websites that can't handle the traffic just go down until they can prevent further attacks, so that yoyu can't access them. Software diesn't brake if you DDOS it, it just doesn't respond. You want it to work to compromise it.
I know almost nothing of how to compromise information from a server after lowering its security, need help with that :D
Only heard about NITO
UDP attacks? First time I've hear of those, how do they work?
I'm just curious on how to extract information from a server, such as passwords, even a very light server filled with invulnrabilities such as a self made forum, like steps
Sounds like you need to set up a test lab and get to work learning the craft. OTW has posts on setting up and training, or Im sure people here can help you out. You need some Vuln ISO.s to practice with.
Alright thanks man :D gonna check him out
No worries, just remember to keep your arms and legs inside the ride until it has come to a complete stop and then exit to the left.
Thanks guys really helped.
I'm loving the awesome idea generation in the comment section!
We should also keep in mind that social engineering is a huge success in many major hacks. Take for instance the 4chan redirection hack.
The attackers called many different corporations, netflix, amazon, etc. giving little pieces of information about an individual to reset their password, and finding out more information through their account.
Once they gathered enough information about the DNS owner, they were then able to redirect the 4chan website to their twitter page. It required no searching for exploits or bugs.
Hope this helps!
That's extremly smart, can you also grab the persons ip and trace it and than filter out white pages with the zip code and the name, get their phone number and than sms spoof, or send a RAT?
Because facebook sends the reset code through the phone
Fairly vague, but I'll do my best. There's many ways to carry out a hack. In this scenario, reconnaissance is critical, as it is with near every hack.
A mass DDoS is just referred to as a DDoS; it simply means you're using many computers, usually part of a botnet, to deny anyone from trying to connect to the servers. A DoS uses just a single machine.
Furthermore, a DoS attack doesn't really lower security per sé. It's just overloading the servers with so much information that they can no longer cope. Think of a DoS like trying to enter a shop, and there's just someone standing in the doorway not allowing you to get through. That's really all it is.
ghost_
Share Your Thoughts