A subreddit dedicated to hacking and hackers. What we are about: constructive collaboration and learning about exploits, industry standards, grey and white hat hacking, new hardware and software hacking technology, sharing ideas and suggestions for small business and personal security.
An underaged close family member of my girlfriend ran away from home and the police aren’t doing a lot because they can’t track her because of privacy or something.
Because the police aren’t doing anything, I decided to try and help. I’m not really used to doing this kind of stuff, but I know my way around a computer and can understand YouTube tutorials. After watching one of said tutorials, we got her to click on a link and got her IP address. It is known she is using WiFi on a phone because her cellular is off, so I figured that would make it easier. From here, I don’t know what to do, but any guidance in the right direction would be helpful.
I am creating a web CTF for the discord I am on and I was wondering if anybody had any tips for creating your own CTF as this is one of the first ones I have created. At first I want it to be easy but I would like the last few challenges to be quite harder. Thanks for your time!
I’m looking for a way to determine all linked gmail accounts back to one user. I am trying to find all of their hidden sock puppets but I uncover more every day and I am starting to feel a bit overwhelmed by how many different emails this particular troll owns. Any way I can figure this out ethically? Or would I need to resort to dirty tactics to get the truth? Not saying I would but I just need a solid answer. Do reverse email searches really work? From my experience they don’t, but maybe I’m just using a bunk service. Besides I just want to be able to see a list of linked gmail accounts to a visible gmail account. Thanks for your help guys. Probably not possible but here is to hoping.
Hey there! I'm assuming that you already know this, google has colaboratory project where we can train over ML models and what not. It's a jupyter notebook but on a powerful machine.
It's basically a linux machine that means I can run any program on it. I had an idea the other day of running a Minecraft server on it but due some firewalls I can't connect to it. It is running but I just can't connect. I managed to ssh into it using some tunneling tricks(that i found online).
The question is can I "bypass" the firewall and connect to the mc server?
So I've tried to scan wifis with captive portals, though I only get my device and the router (scanned with: network mapper app, fing, and others) what's the cause for that and is there a way around it?
I'm looking at running Evil Twin on an Android hotspot, either through Termux or a full Linux install in UserLand.
What I'm finding online is that a captive portal must be set up in order to "social engineer" a user trying to log onto the network.
What I'm wondering is, why, in theory, can't something simply capture the credentials supplied for the password to the network on initial connection?
Instead of waiting for a user to manually enter a password into a captive portal, why not set up the matching network name and require a password, as normal, but capture the password their device tries to supply? Obviously they'd error on connecting to the hotspot, but now you'd have the Wi-Fi credentials.
I don't have any proof of concept, just the concept.