hacking

  1. Carding 4 Carders

    Losses from hacking the DeFi Uranium Finance project amounted to $50 million

    A hacker who hacked the decentralized project Uranium Finance two years ago, recently transferred 3.1 million BUSD stablecoins from the BNB Chain network to Ethereum, and then laundered part of it through the cryptomixer Tornado Cash. The analytical company PeckShield reported that the attacker...
  2. Carding 4 Carders

    Chinese hackers Storm-0062 are involved in hacking Atlassian Confluence

    Three weeks of unpunished access: what were the group's goals? Microsoft said that a Chinese hacker group known as "Storm-0062" (aka DarkShadow, Oro0lxy) exploited a critical vulnerability in the Atlassian Confluence Data Center and Server starting on September 14, 2023. Atlassian has notified...
  3. Carding 4 Carders

    Avalanche Stars Arena Smart contract lost $2.9 million as a result of hacking

    A social app created by analogy with the Friend social network.tech and deployed in the Avalanche blockchain protocol, was subjected to a hacker attack. As a result of hacking, assets worth $2.9 million were withdrawn from the smart contract. Experts from PeckShield, a blockchain security...
  4. CarderPlanet

    The world's first hacking rules have provoked an aggressive response from cyberbands

    The Red Cross has proposed common rules for cyber warfare, but hackers think differently. The International Committee of the Red Cross (ICRC) has published the world's first rules of cyber warfare for civilian hackers fighting for their country. This decision comes amid the active entry of...
  5. CarderPlanet

    Hacking a gas station via Bluetooth

    It turns out that some pumps in USA are controlled via Bluetooth, so especially smart hatskers thought up using Bluetooth to exploit the vulnerability [no details], gaining access to a free gasoline pump. So an attacker from Detroit stole 3,000 liters of gasoline by hacking a gas station via...
  6. Carding

    Hacking by estimate: Spanish extortionists disguise themselves as clients of architectural organizations

    A clear and well-thought-out social engineering campaign is paying off — dozens of firms ' data is encrypted. Spain's National Police are warning of an ongoing "LockBit Locker" ransomware campaign targeting architecture companies in the country through phishing emails. "A wave of emails sent...
  7. Carding

    Secret War for Data: How Cellebrite Balances Power and Responsibility in the World of Smartphone Hacking

    The covert use of hacking technology raises questions about fairness and transparency. Cellebrite, a company known for its smartphone hacking technology, is calling on government agencies and security services to keep the use of its products secret. This is reported by TechCrunch. The company...
  8. Carding

    Remote hacking: Researchers found a backdoor in 1952 Citrix NetScaler devices

    NCC Group warns that even patches may not save you. Cybersecurity company NCC Group said in a report that nearly 2,000 Citrix NetScaler instances were compromised. Attackers exploited the recently discovered critical vulnerability CVE-2023-3519. Presumably, it was useful for installing web...
  9. Carding

    Mac in danger: The shadow market offers easy hacking of Apple PCs

    Perhaps silent cyberpirats are already running rampant on your macOS 13.2. Cybersecurity company Guardz has discovered an HVNC tool designed to hack Mac computers. The main purpose of such software is to steal confidential information and user accounts. According to Guardz, HVNC (Hidden...
  10. Lord777

    Hacking is an art form: how to learn how to hack systems and networks from scratch

    A hacker is a person who searches for and exploits vulnerabilities in computer systems and networks to achieve their goals. Hackers can be of different types: white, gray, or black hats. White hats are ethical hackers who help protect systems from attacks. Gray hats are hackers who break the law...
  11. Lord777

    How to Become a Black Hacker and Why It's a Bad Idea: Everything You Need to Know about Cybercrime

    Hacking is the art and science of breaking into computer systems and networks in order to gain unauthorized access to information or resources. Hackers are divided into different types depending on their motives and methods. The best-known and brightest members of this digital fraternity are...
  12. Tomcat

    CIA protected its top-secret hacking tools with 123ABCdef

    Many have heard of Joshua Schulte, who is accused of leaking "top-secret" hacking tools from the CIA. Schult is currently under arrest, and his case is being investigated by the court. During a recent meeting, several interesting details emerged regarding the practices of the American...
  13. B

    Useful resources for pentesters and hackers

    Hacking manuals: ▪️http://www.ehacking.net/ ▪️http://www.securitytube.net/ ▪️http://www.hacking-tutorial.com/ ▪️https://www.offensive-security.com/ ▪️http://breakthesecurity.cysecurity.org/ ▪️http://www.spacerogue.net/wordpress/ ▪️https://www.youtube.com/user/Hak5Darren...
  14. Carding 4 Carders

    34 sites for hacking practice

    Good morning everyone, in touch Pavluu. I bring to your attention a selection of sites for the practice of hacking. We have collected the most famous projects here. 1. bWAPP bWAPP stands for Buggy Web Application. This resource is open source specifically to show what an unsafe web resource...
  15. Tomcat

    How to protect your ip cameras from hacking?

    The IP video surveillance camera industry has grown tremendously over the past few years. The technology of installing video surveillance based on IP cameras is becoming simpler and easier, and more and more people choose to do it on their own. Camera firmware update Most modern IP cameras are...
  16. Hacker

    The simplest site hacking

    The article is written for those for whom a hacker is a person who has green numbers running on the monitor. You won't be able to crack anything serious with this method, or you will. Preparation. 1. Tools. We will need only 3 of the set. Moreover, even demo versions are suitable: a)...
  17. Hacker

    Hacking websites

    1. Tools We will need only 3 of the set. Moreover, even demo versions are suitable: a) Xspider - scans the server and site for open ports based on its vulnerability database. The demo version doesn't say where exactly they were found, but it answers questions about what they are. That's enough...
  18. Hacker

    Hacking a PC by IP

    1.) Preface. In order to use this method, you need to decide whether you really need it, or whether you just want to entertain yourself and prove that you are the best. The latter was an incentive for me to do all this, but now I understand a lot, and most importantly, I understand that hacking...
  19. Teacher

    15 fun facts about cyber attacks and hacking sites of well-known companies

    Hello, running in the shadows! Hello, random carders. If someone still thinks that cyber attacks are a concept from science fiction novels and in no way applies to real life, then they are really mistaken. In fact, even behind the guise of a modest programmer, a formidable hacker can hide, who...
  20. B

    Operating Systems For Hackers

    ✔️ Backtrack5r3 ? Link : https://linux.softpedia.com/dyn-postdownload.php/c230432fe1fe505590023b5beaf41c36/5f2d2982/2505/0/1 ✔️ Kalilinux ? Link : https://cdimage.kali.org/kali-2020.2/kali-linux-2020.2-installer-amd64.iso ✔️ Knoppix ? Link : http://www.knopper.net/knoppix-mirrors/ ✔️...
Top