Loading...

Follow Reddit - Hacking on Feedspot

Continue with Google
Continue with Facebook
or

Valid

An underaged close family member of my girlfriend ran away from home and the police aren’t doing a lot because they can’t track her because of privacy or something.

Because the police aren’t doing anything, I decided to try and help. I’m not really used to doing this kind of stuff, but I know my way around a computer and can understand YouTube tutorials. After watching one of said tutorials, we got her to click on a link and got her IP address. It is known she is using WiFi on a phone because her cellular is off, so I figured that would make it easier. From here, I don’t know what to do, but any guidance in the right direction would be helpful.

submitted by /u/KILZONSEV
[visit reddit] [comments]
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Reddit - Hacking by /u/drunkpolishbear - 3h ago

I am creating a web CTF for the discord I am on and I was wondering if anybody had any tips for creating your own CTF as this is one of the first ones I have created. At first I want it to be easy but I would like the last few challenges to be quite harder. Thanks for your time!

submitted by /u/drunkpolishbear
[visit reddit] [comments]
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

I’m looking for a way to determine all linked gmail accounts back to one user. I am trying to find all of their hidden sock puppets but I uncover more every day and I am starting to feel a bit overwhelmed by how many different emails this particular troll owns. Any way I can figure this out ethically? Or would I need to resort to dirty tactics to get the truth? Not saying I would but I just need a solid answer. Do reverse email searches really work? From my experience they don’t, but maybe I’m just using a bunk service. Besides I just want to be able to see a list of linked gmail accounts to a visible gmail account. Thanks for your help guys. Probably not possible but here is to hoping.

submitted by /u/9000sins
[visit reddit] [comments]
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Reddit - Hacking by /u/echo_awesomeness - 5h ago

Hey there! I'm assuming that you already know this, google has colaboratory project where we can train over ML models and what not. It's a jupyter notebook but on a powerful machine.

It's basically a linux machine that means I can run any program on it. I had an idea the other day of running a Minecraft server on it but due some firewalls I can't connect to it. It is running but I just can't connect. I managed to ssh into it using some tunneling tricks(that i found online).

The question is can I "bypass" the firewall and connect to the mc server?

submitted by /u/echo_awesomeness
[visit reddit] [comments]
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

So I've tried to scan wifis with captive portals, though I only get my device and the router (scanned with: network mapper app, fing, and others) what's the cause for that and is there a way around it?

submitted by /u/ThisIsAron
[visit reddit] [comments]
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

I'm looking at running Evil Twin on an Android hotspot, either through Termux or a full Linux install in UserLand.

What I'm finding online is that a captive portal must be set up in order to "social engineer" a user trying to log onto the network.

What I'm wondering is, why, in theory, can't something simply capture the credentials supplied for the password to the network on initial connection?

Instead of waiting for a user to manually enter a password into a captive portal, why not set up the matching network name and require a password, as normal, but capture the password their device tries to supply? Obviously they'd error on connecting to the hotspot, but now you'd have the Wi-Fi credentials.

I don't have any proof of concept, just the concept.

submitted by /u/rm-rf_iniquity
[visit reddit] [comments]
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview