How would it be done? What programs would be used to recover the passwords and emails even if encrypted, would it be possible to mass DDOS to lower security, but even after that how would you go?
Forum Thread: Hacking a Secured Server Like Facebook?
- Hot
- Active
-
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 7 Replies
8 hrs ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 2 Replies
15 hrs ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
22 hrs ago -
How to: Crack Instagram Passwords Using Instainsane 37 Replies
6 days ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
1 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
1 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
2 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
2 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
2 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
2 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
3 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
3 mo ago -
Forum Thread: How to Run and Install Kali Linux on a Chromebook 18 Replies
4 mo ago -
Forum Thread: How to Find Admin Panel Page of a Website? 13 Replies
5 mo ago -
Forum Thread: can i run kali lenux in windows 10 without reboting my computer 4 Replies
5 mo ago -
Forum Thread: How to Hack School Website 11 Replies
5 mo ago -
Forum Thread: Make a Phishing Page for Harvesting Credentials Yourself 8 Replies
5 mo ago -
Forum Thread: Creating an Completely Undetectable Executable in Under 15 Minutes! 38 Replies
7 mo ago -
Forum Thread: Hacking with Ip Only Part [1] { by : Mohamed Ahmed } 5 Replies
7 mo ago -
Forum Thread: Problem with Airmon-Ng and VM 3 Replies
7 mo ago
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Dox Anyone
-
Hack Like a Pro: How to Use Netcat, the Swiss Army Knife of Hacking Tools
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Spy on Traffic from a Smartphone with Wireshark
-
How To: Use Ettercap to Intercept Passwords with ARP Spoofing
-
How To: Perform Advanced Man-in-the-Middle Attacks with Xerosploit
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
Hack Like a Pro: How to Compile a New Hacking Tool in Kali
-
How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
How To: Hack Apache Tomcat via Malicious WAR File Upload
-
How To: Hunt Down Social Media Accounts by Usernames with Sherlock
-
How to Hack Wi-Fi: Creating an Evil Twin Wireless Access Point to Eavesdrop on Data
-
Advice from a Real Hacker: How to Know if You've Been Hacked
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
20 Responses
nothing is impossible in this world nothing but mate you cant do none of them with fb
ofc there are many bugs getting exploits every mounth but they are not that huge one plus even tho some one would know they are not gonna tell you or go scream every where that they found bug on fb
so mind your before asking such question.
Regarding the DDOS, I doubt. With the recent case of the Great Cannon, you would probably required even or more power than that today. An amount of traffic that only huge organization may even try to handle.
About exploiting Facebook servers, nobody can tell. Of course it wouldn't be as easy as sinking an OS, due to the fact that the comunication itself is encrypted and you have very little or no space to act on the web requests that you can craft. Such an organization must have bleeding edge security, never stopping controls and flawless incident response.
However, YouTube latest hack and Ashley Madison leak are the proof that on the internet, you can't predict anything.
Like, anything.
I roll wit CiUFFY on this one..
You start blasting away with UDP cannons, pretty sure : Connection Terminated! You have been logged attempting to steal my cookies. Sending the Cookie Monster Now!
Could of DRDoS off Bit Torrent nodes... (Slowly putting light to my secret stash)
Welcome to the UDP world. Sadly?, they patched BT Blasting last week.
Monkeys wear slippers and red dinner jackets??!!..
Do we have archive images for the Cookie Monster?
Oh, monkeys, I know right? Mind blowing.
BTW M2M Threat Intel Platforms are looking for you and your posts...
I'm gonna take note of that, ah, thanks!
Still working on something else ;-)
Makes sense but I would think somthing like MASS couple thousand Computer DDOS would lower security and leave invulnrabilities, but even after that what program would you use Togo to the next step, like When your hacking a small server on a redneck website what programs would you use and how would you execute it to get data
I guess you want to make another example.
It's not a shield which slowly rips apart if you hit it hard.
Websites that can't handle the traffic just go down until they can prevent further attacks, so that yoyu can't access them. Software diesn't brake if you DDOS it, it just doesn't respond. You want it to work to compromise it.
I know almost nothing of how to compromise information from a server after lowering its security, need help with that :D
Only heard about NITO
UDP attacks? First time I've hear of those, how do they work?
I'm just curious on how to extract information from a server, such as passwords, even a very light server filled with invulnrabilities such as a self made forum, like steps
Sounds like you need to set up a test lab and get to work learning the craft. OTW has posts on setting up and training, or Im sure people here can help you out. You need some Vuln ISO.s to practice with.
Alright thanks man :D gonna check him out
No worries, just remember to keep your arms and legs inside the ride until it has come to a complete stop and then exit to the left.
Thanks guys really helped.
I'm loving the awesome idea generation in the comment section!
We should also keep in mind that social engineering is a huge success in many major hacks. Take for instance the 4chan redirection hack.
The attackers called many different corporations, netflix, amazon, etc. giving little pieces of information about an individual to reset their password, and finding out more information through their account.
Once they gathered enough information about the DNS owner, they were then able to redirect the 4chan website to their twitter page. It required no searching for exploits or bugs.
Hope this helps!
That's extremly smart, can you also grab the persons ip and trace it and than filter out white pages with the zip code and the name, get their phone number and than sms spoof, or send a RAT?
Because facebook sends the reset code through the phone
Fairly vague, but I'll do my best. There's many ways to carry out a hack. In this scenario, reconnaissance is critical, as it is with near every hack.
A mass DDoS is just referred to as a DDoS; it simply means you're using many computers, usually part of a botnet, to deny anyone from trying to connect to the servers. A DoS uses just a single machine.
Furthermore, a DoS attack doesn't really lower security per sé. It's just overloading the servers with so much information that they can no longer cope. Think of a DoS like trying to enter a shop, and there's just someone standing in the doorway not allowing you to get through. That's really all it is.
ghost_
Share Your Thoughts