BadB
Professional
- Messages
- 1,652
- Reaction score
- 1,555
- Points
- 113
HACK AN ATM.
In this topic, there is a hacker in a mask. We reveal hacker secrets and how to protect yourself from them, talk about the difference between hacking and carding, who carders are and how carders work, why hackers are considered the elite of the cybercriminal world, top hackers and top hacker attacks, where to buy equipment for hacker hacking and how much it will cost, what each element of a hacker's computer is responsible for, how to hack an ATM, how to hack Wi-Fi or just a friend's profile on social networks, what is the notorious hacker group Anonymous, how to protect your computer from hackers, is it easy to hack credit cards and steal PIN codes, why the Russian authorities want to block Telegram, about DDoS attacks and much more.
Can a real hacker in real life hack the server of a thermal power plant, factory, hospital or other critical infrastructure? Yes, no problem. Even a nuclear power plant!
Top hacker apps, hacker programs for Android, top hacker attacks, top hacker programs for PC and other programs for hackers, what hackers can do, how to become a hacker, top hacker forums, a full course on cybersecurity and other hacker tricks - in a candid confession of a hacker.
Why does the story of the Russia24 TV channel "Hackers from our yard" about the Carder Planet forum have little in common with reality, and what is the most truthful film about hackers? - I think these are the series "Breaking" and "Mr. Robot", our guest answers.
An exclusive interview with a hacker from the darknet only for our forum!
Contents:
Pavlovich:
Why are you wearing a mask?
Hacker:
I wear a mask because I hide my identity from other people. I act and work via the Internet, using all types of anonymity.
Pavlovich:
What do you do?
Hacker:
I test various personal Internet and offline systems for security.
Pavlovich:
Are you a hacker?
Hacker:
Well, more like a penetration tester.
Pavlovich:
So these are hacking attempts to order?
Hacker:
These are hacks to order.
Pavlovich:
Why do people order hacks?
Hacker:
This could be to eliminate competitors, or to obtain various databases, or simply to obtain important and useful information. Compromising material, incriminating evidence, and so on. People simply do not care about the security of their sites, Internet resources, and projects. Therefore, almost any site or server can be hacked. Hacking is done in two ways. This is either hacking the server, or hacking the site itself.
Also, there can be different sites located on the server. If the server is run by a bad system administrator, hacking one site located on this server can lead to leaks of all data from other sites located on the same server. I provide two types of services. Either hacking a specific site, full testing of the site, full testing of web applications, also server testing and further assistance, elimination.
Or if your site is so flawless, you think that it is awesome and that no one can hack it, then you can, in fact, compromise. That is, I will be paid only for the vulnerabilities I find.
Pavlovich:
In the hacker community, there are so-called white hat hackers, the so-called white hats, who are engaged in ethical hacking. If they find some critical quirk, they inform the software manufacturer or the site owner about this discovery and, accordingly, help him eliminate it. There are so-called Black Hat hackers who are engaged in all sorts of dirty tricks. And what kind of hacking do you do? Are you White Hat or Black Hat?
Hacker:
I used to do White Hat, mostly White Hacking, but I wasn't particularly keen on Black Hacking. But nowadays there are people who aren't ready to pay and throw away extra money on various other things, on testing their products.
Pavlovich:
How much do White Hat hacker services cost today in the post-Soviet space, let's say, and specifically AI?
Hacker:
Usually White Hat hackers set their own price, and then employers, real people who need their services, choose themselves,
Pavlovich:
Have you broken any influential structures that could give you a name as a security specialist?
Hacker:
Yes, I have hacked more than one bank, I hacked Sberbank once, but then, of course, I had little, a little knowledge, and I had problems with the encoding, I was not able to fully enumerate the database and decrypt it.
Pavlovich:
Do you use any means of anonymization, hiding your location and so on in order to remain unpunished, I did all this so that you would not be found.
Hacker:
Many blackhackers do not hide anything at all and simply work from their real IP address.
Pavlovich:
Blackhackers work from their IP address? Well, yes. Why? Are they those who have been there for 10 years, who do not think about it?
Hacker:
No, the joke is that usually CIS admins do not look at this. They just see that there is an IP address, and usually some left-wing hackers have a dynamic IP address. And it is constantly changing. Today it is Vasya Pupkin's, tomorrow it is Fedya's.
Pavlovich:
And you mean, like when you go online from a mobile phone, you have a new IP every time, right?
Hacker:
Well, yes, like a mobile phone.
Pavlovich:
This is also a certain risk, because you can request IP logs from the provider and they will see that at the moment a subscriber with such-and-such number was sitting from such IP.
Hacker:
In theory, yes, but no one does this, because there are too many hassles.
Pavlovich:
I want to tell you, in Belarus they do this very seriously and more than one such carefree hacker, young or not so young, has been caught doing this.
Hacker:
But I often hacked Belarusian sites and sometimes I even sinned by not using anonymization tools. And so I usually use either VPN or my personal private proxies, but most often I use SSH tunnels. SSH is a protocol for remote server management via console, via command line.
Pavlovich:
So you mean that you connect to someone else's previously hacked server, right? Yes. And then you perform further hacks from it.
Hacker:
Usually these are either servers, or routers, or webcams, it doesn't matter.
Pavlovich:
Or just private users' computers or not?
Hacker:
Usually private users' computers are connected via Wi-Fi modems. Via routers? Yes, via routers.
Pavlovich:
And you're no longer hacking the end user's computer, but their router?
Hacker:
Yes, because there's no point in hacking the end user's computer. If you hack the end user's computer, you won't be able to connect to it. Well, you can, but there are some tricks to it.
Pavlovich:
Is an additional layer of security needed in this case, such as a VPN server?
Hacker:
Sometimes yes, sometimes no. If these are some purchased SSH servers or public ones, then, of course, it is necessary. But in general, it is ideal to use double or even triple tunneling. And, as I already said, to have your own servers. That is, you set up your own servers and understand how everything is arranged there. You do not save logs anywhere, for example.
And even if some government services or agencies gain access to these servers, they will not find the logs.
Pavlovich:
The ones you hacked from.
Hacker:
Exactly.
Pavlovich:
What do you do more? That is, do you hack individual sites, or servers that host a whole bunch of user sites?
Hacker:
In fact, I prefer to hack a site, but I also conduct audits of servers. Hacking servers, in fact, consists of scanning all open ports, looking at what services are running there. And if there are any vulnerable services, they can be hacked.
Pavlovich:
So one of the security rules for your server, for example, is to close all unused ports. Yes, exactly. What are the most common mistakes that system administrators make when setting up their own or a client's server?
Hacker:
Well, as a rule, system administrators neglect to update the operating system in a timely manner. They also launch various services under root. Root is a superuser.
Pavlovich:
Well, that is, maximum rights in the system, right?
Speaker?:
Yes.
Hacker:
And also if the server is maintained by a good system administrator, then it will be possible to gain access only using 0day or one day exploit?
Pavlovich:
Zero day and one day, yes. Zero day, what is it?
Hacker:
Zero day vulnerability is a vulnerability that almost no one knows about, except for a certain circle of people.
Pavlovich:
Well, how much is there, well, I get it, that is, this is a vulnerability that hackers know about, but the software manufacturer, the same Microsoft, Adobe, and so on, they don’t know about yet. And at this time, while the software manufacturer doesn’t know, it is possible to hack with it, right? Look, that is, okay, you found the seeds and vulnerabilities, that is, but you, for example, don’t need it, can you sell it?
Hacker:
Of course you can, they pay big money for seeds and vulnerabilities.
Pavlovich:
Well, how much is big, for some people a thousand dollars is big, for others a million is small.
Hacker:
No, well, look, it depends on what kind of vulnerability you are.
Pavlovich:
I read that seeds and vulnerabilities for the same, for iPhones, yes, they are sold for amounts from 50 to 250 thousand dollars and higher. So these are real numbers?
Hacker:
Yes, sometimes these are real numbers, but usually such vulnerabilities are sold jointly.
Pavlovich:
Oh, so several people buy them at once?
Hacker:
Yes, several people buy one vulnerability, and then they resell it.
Pavlovich:
I heard that government agencies have entered this market now, both Russian and American, and so on. And before the government money came, that is, the seeds cost much less, and since there is demand and big money that no one counts, that is, they heated up the market, that is, now the prices are much higher than they were there 10 years ago.
Hacker:
Yes, I think that in this way the states are trying to limit hackers with low income from these vulnerabilities.
Pavlovich:
Well, if we touch on it, then there is another version, that is, they buy up seeds and vulnerabilities in order to arrange a cyber war with other states or spy on them. Well, yes, and you can do that. They say that sites made on ready-made CMS are impossible to hack. Or if it is possible, then it is much more difficult, because there are entire teams developing them. Is that true at all?
Hacker:
Well, as they say, what one programmer can do in one year, two programmers can do in two years. Therefore, programmers in the same team who create CMS like Joomla, Wordpress, ModX, they make mistakes, they also make mistakes. But it is the creators of plugins who make the most mistakes.
Pavlovich:
That is... Ah, these additional programs, applications, yes, making life easier.
Hacker:
In essence, plugins, they are used in CMS to increase the functionality. The same comments to leave. Also, if you do not update the CMS version in time, you can get unpleasant... Consequences.
Pavlovich:
Yes, consequences from hackers. I studied statistics before our meeting and saw that about 30% of all websites in the world are written on the WordPress engine for free. That is, how vulnerable are WordPress sites, because 30% is a lot. Is WordPress easily broken?
Hacker:
WordPress breaks very easily. The thing is that many administrators and owners of these sites forget to update the version of WordPress. Over time, a whole bunch of Internet security experts find new vulnerabilities in the old version of WordPress. And, in fact, old WordPress is very easy to hack.
Pavlovich:
That is, in order to protect your site on WordPress, you just need to promptly update the engine itself, the version of WordPress when a new one comes out. And also all the installed plugins that you use.
Hacker:
Yes, it is important. But it is also important that you need to review the plugins that you install. That is, just, for example, in the same Google or Docgo, look for information about this plugin.
Pavlovich:
Well, that is, do not install anything extraneous that you do not need, yes, do not install a bunch of left-hand plugins. And if you install something that was not left-hand, compromised earlier, yes, it was not hacked earlier. How many WordPress sites can you hack in an hour?
Hacker:
Yes, you can hack about 200 of these sites in an hour, without much effort.
Pavlovich:
Do you use any auxiliary programs for testing your victims there, both those ordered there for money, for example, and those you just hack for the sake of sport, yes, or do you do everything manually?
Hacker:
Well, in general, I prefer to do everything manually, test, but auxiliary programs are very often used for blackhacking. For example, Acunetix, Netsparker scanners.
Pavlovich:
So scanners of what, vulnerabilities? Yes, but they... Open ports?
Hacker:
But no, an open port scanner is, say, maskan or nmap. If I am asked to test a site for free, of course, I will launch the program and, without straining myself, see what it gives me, and also help fix these vulnerabilities.
Pavlovich:
Have you even thought about your plans for the future? Or do you intend to hack and hack all your life?
Hacker:
No, of course, I am interested in the field of information security, but I am not ready to devote my entire time to it. Now, for the near future, I have already opened my own school.
Pavlovich:
You are talking about your hacker school. This is a school that is not on television, right? Do you use YouTube, some webinars or messengers for this? In what form does this happen?
Hacker:
Unfortunately, if these videos, texts and similar material are uploaded to YouTube channels, the YouTube channels will simply be blocked forever. There have already been many such cases. I conduct my training directly in Telegram, and there I teach everything I know, everything I know.
Pavlovich:
How many students were in the first group in your hacker school?
Hacker:
Well, as soon as I opened the school, I launched it in only 3 chats. It is a very narrow circle, and in principle, my entire first stream is completely full and turned out to be full. There are still many who wanted to, who never managed to get into my school. How much does training in your school cost? My training consists of three courses. A person pays $200 for each course.
Pavlovich:
That is, 3 courses are 600 dollars, right? In my time, for example, there were carders and hackers, right? Carders are people who mainly commit fraud using credit cards. And hackers were such an elite in our time. Why did you choose hacking and not carding? For example, For example, carding, I know, brings in much more money than hacking.
But at the same time, I think that hackers are intellectually superior to carders, because many carders often do not even have a technical education or skills for this.
Hacker:
In fact, anyone can do carding, it does not require much intelligence. The thing is that carders mainly cooperate with hackers. Where do those same carders get their full cards? Full cards are complete information about the owners.
Pavlovich:
Well, full info, I understand.
Hacker:
Yes, full cards come from, bank cards, where do carders get them from. They buy them from us, from hackers.
Pavlovich:
And as for credit cards and dumps, that is, the information from the plastic strip of a bank card, that is, have you hacked, have you gotten credit cards and dumps?
Hacker:
Yes, I have, but in most cases of the sites I hacked, the problem was that only the first four digits and the last four digits were visible. Before, in 2008, almost no one had such protection, because they were not afraid of anyone, were not afraid of the authorities, were not afraid of hackers.
Now, if the authorities find out that all the entered card data is simply visible on your site.
Pavlovich:
Well, that is, the cards are stored in full, in open form, right? They write out a very large fine and you are simply done for. That is, now it is much more difficult to hack credit card numbers, steal them or dumps?
Hacker:
No, in fact, this is not true. Now they use such a thing as phishing. Phishing comes from the English word fishing. That is, we essentially take, lure the victim to third-party sites, they enter their data there, thinking that this is a real online store.
Pavlovich:
That is, the site is made, it turns out, like, repeats, say, the Lamoda store, for example, or the Sberbank site, but at the same time it belongs to the hacker.
Hacker:
Well, either it repeats the contents of the site, or there is an online store there that sends bricks of equal weight instead of a laptop.
Pavlovich:
What methods do you prefer, do you accept payment for your services?
Hacker:
Oh, I love accepting payment for my services only in cryptocurrency. Sometimes, of course, in Kiwi and Webmoney, but I prefer Bitcoin or Dugikoin. But in general, any cryptocurrency that is on the exchange will do. That is, mainly crypto, right? Yes, mainly Bitcoin and Dugikoin.
Pavlovich:
Why crypto?
Hacker:
The thing is, no one knows who the owner of this wallet is.
Pavlovich:
But does this provide more anonymity?
Hacker:
Yes, and then this money can be withdrawn in parts to drop cards.
Pavlovich:
Which countries' computers do you hack most often?
Hacker:
Most often, I hack Russia, Ukraine, the USA, Belarus. Why these countries? It's much easier to hack a website if you know the language the website is written in. What do you earn the most from? I earn the most from BlackHat hacks, that is, from Here, one small BlackHat brings me from 3,000 to 20,000 dollars, depending on what I hack. I can also, for example, hack your server, I see that this server is not backed up, so, well, it is not done, or I did not find a backup on this server.
Then I just take, erase all your data, copy it to my computer and simply deface your website, and then extort a lot of money for... For recovery. Yes. Yes.
Pavlovich:
How old were you when you hacked for the first time and what was it?
Hacker:
I was probably 9 or 10 years old. The thing is, I had a computer since birth and my parents put a password on it so that I couldn't use it. Naturally, I was already starting to program, study systems, computer security.
I was interested in all this and I just went and booted into safe mode, then used an exploit that I found on the Internet, created a new user, elevated its rights to the level of neosystems, hid it, and when, say, my parents don't see, I just logged into my computer and using this hidden user.
Pavlovich:
Are there unhackable targets on the Internet or can everything created by man still be hacked?
Hacker:
Of course, everything created by man can be hacked or broken. The only question is how much time you are willing to sacrifice for this, the most important thing is your knowledge. If you know how this system is structured, even if you don’t know, but you have information that you can get, you can read how it is structured, and already understanding how it is structured, you logically understand where it is vulnerable. Almost all systems are vulnerable, especially from the same DOS. No one is protected from the same DOS. What
do you mean? And what is DOS? A DOS attack is Deny of Service. It is an attack from one computer to some site. It sends different packets to this site, and the site processes, processes, processes, queues these packets, and then it simply overloads and cannot process, respond.
And essentially the site becomes unavailable to others.
Pavlovich:
So it turns out that at the same time many visitors go to my site?
Hacker:
Well, yes, a lot of visitors come to your site, but there are not a lot, but a really big lot. Imagine that 4 million users opened your page in one second, what will your site be?
Pavlovich:
Well, most likely... It will open only for...
Hacker:
200 thousand users, for the rest it will just load. And it's good if it loads in 30-40 seconds, but in most cases it will just crash. This is called DDoS. That is, in fact, this is DDoS for many devices. They form in the bootnet. My hacker colleagues are engaged in DDoS and they get paid for the site due to the number of hacked users' computers spent on it.
In fact, an American's computer, installing a virus on it, costs from $15. Installing viruses on a CIS citizen's computer costs $2.5. 15 and 2.5? Yes. Usually DOS attacks cost from 3 to 19 thousand dollars.
Pavlovich:
Is it easy to hack a thermal power plant, nuclear power plant, or some other critical infrastructure?
Hacker:
In general, yes, it's very easy. We just take the ports we need to hack, scan them, and see what's on those ports. Then we just turn on a regular hydra and go through the passwords. Usually, careless system administrators set very weak passwords or don't set them at all. Last time, when I hacked a thermal power plant and a concrete plant, I had full access to those resources, to those things.
And I could even stop the cooling system.
Pavlovich:
Why are you wearing a mask with an American flag? After all, most hackers wear a Guy Fawkes mask, like anonymous hackers, you know? Why are you wearing a US mask?
Hacker:
Well, my mask, in essence, symbolizes mockery of people, mockery of system administrators who are confident in their abilities, mockery of ordinary site owners who do not delve into the practical part, know only the theory of how everything works, who want to do everything quickly and give too little time, do not pay programmers. In essence, I show that for every smart guy there is an even smarter one.
Do you know anyone from the hacker group Anonymous? Well, in general, in fact, the hacker group Anonymous as such does not exist. Anyone can join this hacker group. It is just a rabble of people who have one idea, who unite for each idea. And usually they either get to some sites, or also conduct hacker audits on some systems.
Pavlovich:
But these are adults, independent hackers.
Hacker:
Usually some schoolchildren sit in Anonymous, they have nothing to do, they just download software, let's say, for the same DOS, and it already has a Trojan. And so hackers steal information from these schoolchildren, and they also exploit their work and get full access to their computers.
Pavlovich:
Which countries are considered the strongest hackers in the world?
Hacker:
Well, in general, the strongest hackers are considered to be from the CIS and third world countries. The thing is that these people don’t have much at the beginning of their lives. They don’t have rich daddies or mommies. They just take it and start surviving. They survive, their imagination turns on. And they start thinking, and their brains get pumped up.
Pavlovich:
Have you had to survive too?
Hacker:
From the point of view of American life, yes.
But otherwise, I don’t need anything.
Pavlovich:
Did you have a complete family? Dad, mom?
Hacker:
I won’t answer such questions.
Pavlovich:
What education do you have?
Hacker:
I studied to be a system administrator. I also studied to be a programmer. Usually, it’s just online education, I’m self-taught.
Pavlovich:
Is it easy to hack Wi-Fi?
Hacker:
Well, I know about 15 ways to do this. In general, yes, it’s easy. But if it has WPA2 or WPA3 encryption, which only work in some places in Japan, then hacking takes much longer than hacking simple WEPA or WPA.
Pavlovich:
What do you think about the accusation of Russian hackers interfering in the US elections?
Hacker:
I think that interference in these elections was not only from the Russian hackers. In general, the US system is so vulnerable that even if it is protected in several states, each state has its own voting system, and hacking at least one state, the system of one state allows you to significantly change, influence the vote.
In principle, yes, countries are at war with each other, this affects people living in different countries, and in fact, due to the carelessness of system administrators and programmers working in US government agencies, residents who believe in the government suffer. And what can you say about ATMs, is it easy to hack? Well, in general, yes. An ATM is a system that was banned back in the 80s.
In fact, almost all modern ATMs now have Windows XP, and Windows XP has more vulnerabilities than a cat's block.
Pavlovich:
Well, do you need physical access to the ATM or can you do it all over the Internet?
Hacker:
Well, in general you can do it over the Internet if the ATM is connected to... if it has an IP address and it is connected to a real network. But in general, there is a lock on the ATM, which is in the top cover. It can easily be opened with regular lock picks or the same pin, if you are a pro. You open the lock, look there, there is usually a router, there is the ATM itself and you can insert a cross-cable there.
Pavlovich:
Some third-party device and reprogram it.
Hacker:
Well, you can, no, it's a little more complicated. First, you insert the same Raspberry Pi, it's a mini-computer with a Wi-Fi sensor, close it, leave everything as it was and go, for example, around the corner. You catch the Wi-Fi that you know, that is, you raised your Wi-Fi network and you are connected to the ATM. From the same phone, from the computer, you connect to it, hack it quickly, and then you just take and withdraw all the money that is in the ATM, or intercept the PIN codes saved in these ATMs
and so on.
Pavlovich:
How do hackers communicate with each other, do they use some kind of encrypted channels over the phone, Telegram, Jabber?
Hacker:
Usually hackers just communicate like ordinary people, but most often they use Telegram, Jabber, but they use their own Jabber. Their servers, they connect to their servers. Usually these servers, they are like theirs, but they are like hacked, someone else's. How safe is Telegram and why do the Russian authorities want to shut it down so much? Well, because without physical contact or without access to the device where Telegram is installed, it is practically impossible to get information about secret chats.
This is what scares the authorities. That is, if you use Telegram, then only secret chats? Well, you can use regular ones, in principle, Telegram, thanks to its MT Pro, is protected from the usual banal man-in-the-middle attacks, a person in the middle. Do you know any other hackers in real life? Of course I know, some of them are my students, but I don't have much contact with them.
In general, every hacker is afraid of being exposed, I myself am taking a great risk recording this interview. How difficult is it to get equipment for hacking? Well, look, if you have money, you can just go, open the same Alibaba and order everything you need from Alibaba. Well, I read about the same encoders that were used in your book.
Pavlovich:
Well, that's for rewriting credit cards.
Hacker:
Well, not only credit cards, they can also rewrite hotel cards. Well, this equipment is generally not difficult to get.
Pavlovich:
Okay, and what about your hacker's computer, let's say, and mine, right, how are they different? What kind of computer does a hacker need?
Hacker:
Well, look, everything that is on a computer should be at its maximum. Let me explain why. The thing is that the hard drive, as usual, stores Rainbow tables for brute force, for very fast password guessing.
Pavlovich:
Okay, this is what the hard drive is for, right?
Hacker:
A video card, let's say, if you don't have Rainbow, you need video cards or ASICs. These are devices that guess the hash very quickly. And you can also mine cryptocurrency on them. They, in fact, also guess the cache and mine.
Pavlovich:
Okay, hard drive, video card, what else?
Hacker:
A powerful processor is needed to carry out, say, attacks on Wi-Fi. Sometimes it is also used for brute force. The processor is also used to scan networks. But in general, this is one of the most unenviable things. RAM. But RAM there, in fact, should be at least 8 gigs. Better 16 or even more.
Pavlovich:
And Wi-Fi modules?
Hacker:
Wi-Fi modules? Well, a hacker usually has 2 or 3 of them. The thing is that the more Wi-Fi modules, the more Wi-Fi access points, you can hack a certain number of points using PixyDust. You can also be connected to several Wi-Fi at once, then select the IP address that you will use or carry out the same management for Latak. Bluetooth cards are also necessary, because the same bborn vulnerability, with its help you can hack absolutely any device that has Bluetooth.
Pavlovich:
Don't you think that by hacking you can get jailed sooner or later?
Hacker:
No, what are you saying, I use all means of anonymity constantly. Besides, I already told you about my server. If I send an SMS with a certain code to a certain phone number, all my important information, which is stored exclusively on the server, will be deleted. Everything on my laptop is very well encrypted. And in fact, if someone breaks into my door, I have a video camera there, I will receive a message on my phone, I will be able to view this video camera, what is happening there.
If some government breaks down my door, I will simply send an SMS to my server, a GSM module is connected to it, which receives SMS, if there is a special text, an electromagnetic emitter is launched and all equipment within a radius of 15 meters simply fails.
Pavlovich:
Which of today's films about hackers most accurately characterizes the lifestyle of hackers, their work?
Hacker:
Well, in general, from films, I would say more TV series. This is the series "Breaking" and the series "Mr. Robot". "Mr. Robot". Yes. In principle, they show most of all how hacker audits are conducted.
Pavlovich:
How much time does it usually take you to test one site or server?
Hacker:
Well, in general, on average, a server with up to 5 sites is tested in 6-7 hours. And usually some store, it is tested in 2-3 days.
Pavlovich:
What mistakes do professional programmers make most often from a hacker's point of view?
Hacker:
Well, in general, programmers make quite a lot of mistakes due to the human factor, especially if it is a self-written engine, for example. A very common mistake is transmitting information in unencrypted form. Since you transmitted information in poorly encrypted form, let's say you encoded this secret code for registration, a regular BS 64, then this code can be decrypted and forged, replaced.
Thus, you can greatly harm the system.
Pavlovich:
What foreign languages do you know?
Hacker:
In fact, I know Russian, English and two more languages.
Pavlovich:
What programming languages do you know?
Hacker:
I am very proficient in PHP, JavaScript and C Sharp. Then I just know Python, Python, Ruby, C, C++ well and I know Assembler and Perl normally.
Pavlovich:
Do you have a girlfriend?
Hacker:
I have a girlfriend, although I have not changed her for the last 8 months.
Pavlovich:
Quick question, quick answer. What music do you listen to?
Hacker:
Well, I prefer Pink Floyd, I prefer Blonde Redhead, Buckethead, rock music, classical music, I like Beethoven, Bach.
Pavlovich:
Unusual. A lot of money, but with the prospect of going to jail, or less, but legally?
Hacker:
Of course, a lot of money, but with the prospect of going somewhere and giving a bribe to get out of it.
Pavlovich:
What do you dream about?
Hacker:
I dream of living a quiet life, so that no one bothers me.
Pavlovich:
How much money do you need to be happy?
Hacker:
I need $ 3,000 a day.
Pavlovich:
What is happiness for you?
Hacker:
For me, happiness is just peace of mind, support from people who will not betray you, and good human relationships.
Pavlovich:
Alcohol or drugs?
Hacker:
Drugs.
Pavlovich:
What do you regret in life?
Hacker:
In general, I regret that I was born at my time, if I had been born 20-30 years earlier, then I would have had a completely different life.
In this topic, there is a hacker in a mask. We reveal hacker secrets and how to protect yourself from them, talk about the difference between hacking and carding, who carders are and how carders work, why hackers are considered the elite of the cybercriminal world, top hackers and top hacker attacks, where to buy equipment for hacker hacking and how much it will cost, what each element of a hacker's computer is responsible for, how to hack an ATM, how to hack Wi-Fi or just a friend's profile on social networks, what is the notorious hacker group Anonymous, how to protect your computer from hackers, is it easy to hack credit cards and steal PIN codes, why the Russian authorities want to block Telegram, about DDoS attacks and much more.
Can a real hacker in real life hack the server of a thermal power plant, factory, hospital or other critical infrastructure? Yes, no problem. Even a nuclear power plant!
Top hacker apps, hacker programs for Android, top hacker attacks, top hacker programs for PC and other programs for hackers, what hackers can do, how to become a hacker, top hacker forums, a full course on cybersecurity and other hacker tricks - in a candid confession of a hacker.
Why does the story of the Russia24 TV channel "Hackers from our yard" about the Carder Planet forum have little in common with reality, and what is the most truthful film about hackers? - I think these are the series "Breaking" and "Mr. Robot", our guest answers.
An exclusive interview with a hacker from the darknet only for our forum!
Contents:
- Why are you wearing a mask?
- What are you doing?
- Why do people order hacks, how does hacking happen?
- What types of hackers are there, black hats, white hats.
- How much does hacking cost? Did you hack Sberbank?
- Do you use anonymization tools, what is ssh?
- What do you prefer to hack, how do you choose your victim?
- What are the most common mistakes made by system administrators?
- Zero-day exploits, what are they, can they cost $250k?
- Are Ready-Made CMS Safer, How to Hack WordPress?
- How many WordPress sites can you hack in an hour, how do you test?
- What auxiliary programs do you use when hacking?
- What are your plans for the future, hacker school?
- Why did you choose hacking?
- Did you get credit cards, how?
- How to steal a credit card now, what is phishing?
- How do you accept payment, why mainly cryptocurrency?
- In which countries do you work most often, and why?
- What do you do to earn the most money?
- How old were you when you first hacked the site you hacked?
- Is there anything that can't be hacked, what is DDOS, botnet?
- Is it possible to hack a nuclear power plant or thermal power plant?
- Why is there an American flag on your mask, who is the hacker group Anonymous?
- Which countries have the strongest hackers, why?
- What is your education?
- Is it easy to hack Wi-Fi?
- What do you think about the interference of "Russian hackers" in the US elections?
- Are ATMs vulnerable and how do they get hacked?
- How do hackers communicate with each other?
- Is Telegram safe, how safe is it?
- Do you know any hackers personally?
- Is it difficult to get equipment for hacking, what kind of computer does a hacker need?
- Aren't you afraid of prison, why?
- The most truthful film about hackers.
- How long does one hack take?
- The most common mistakes made by programmers.
- What foreign languages do you know?
- What programming languages do you know?
- Do you have a girlfriend?
- Quick poll: music, dreams, how much money do you need to be happy, what is your happiness, alcohol or drugs, what do you regret?
Pavlovich:
Why are you wearing a mask?
Hacker:
I wear a mask because I hide my identity from other people. I act and work via the Internet, using all types of anonymity.
Pavlovich:
What do you do?
Hacker:
I test various personal Internet and offline systems for security.
Pavlovich:
Are you a hacker?
Hacker:
Well, more like a penetration tester.
Pavlovich:
So these are hacking attempts to order?
Hacker:
These are hacks to order.
Pavlovich:
Why do people order hacks?
Hacker:
This could be to eliminate competitors, or to obtain various databases, or simply to obtain important and useful information. Compromising material, incriminating evidence, and so on. People simply do not care about the security of their sites, Internet resources, and projects. Therefore, almost any site or server can be hacked. Hacking is done in two ways. This is either hacking the server, or hacking the site itself.
Also, there can be different sites located on the server. If the server is run by a bad system administrator, hacking one site located on this server can lead to leaks of all data from other sites located on the same server. I provide two types of services. Either hacking a specific site, full testing of the site, full testing of web applications, also server testing and further assistance, elimination.
Or if your site is so flawless, you think that it is awesome and that no one can hack it, then you can, in fact, compromise. That is, I will be paid only for the vulnerabilities I find.
Pavlovich:
In the hacker community, there are so-called white hat hackers, the so-called white hats, who are engaged in ethical hacking. If they find some critical quirk, they inform the software manufacturer or the site owner about this discovery and, accordingly, help him eliminate it. There are so-called Black Hat hackers who are engaged in all sorts of dirty tricks. And what kind of hacking do you do? Are you White Hat or Black Hat?
Hacker:
I used to do White Hat, mostly White Hacking, but I wasn't particularly keen on Black Hacking. But nowadays there are people who aren't ready to pay and throw away extra money on various other things, on testing their products.
Pavlovich:
How much do White Hat hacker services cost today in the post-Soviet space, let's say, and specifically AI?
Hacker:
Usually White Hat hackers set their own price, and then employers, real people who need their services, choose themselves,
Pavlovich:
Have you broken any influential structures that could give you a name as a security specialist?
Hacker:
Yes, I have hacked more than one bank, I hacked Sberbank once, but then, of course, I had little, a little knowledge, and I had problems with the encoding, I was not able to fully enumerate the database and decrypt it.
Pavlovich:
Do you use any means of anonymization, hiding your location and so on in order to remain unpunished, I did all this so that you would not be found.
Hacker:
Many blackhackers do not hide anything at all and simply work from their real IP address.
Pavlovich:
Blackhackers work from their IP address? Well, yes. Why? Are they those who have been there for 10 years, who do not think about it?
Hacker:
No, the joke is that usually CIS admins do not look at this. They just see that there is an IP address, and usually some left-wing hackers have a dynamic IP address. And it is constantly changing. Today it is Vasya Pupkin's, tomorrow it is Fedya's.
Pavlovich:
And you mean, like when you go online from a mobile phone, you have a new IP every time, right?
Hacker:
Well, yes, like a mobile phone.
Pavlovich:
This is also a certain risk, because you can request IP logs from the provider and they will see that at the moment a subscriber with such-and-such number was sitting from such IP.
Hacker:
In theory, yes, but no one does this, because there are too many hassles.
Pavlovich:
I want to tell you, in Belarus they do this very seriously and more than one such carefree hacker, young or not so young, has been caught doing this.
Hacker:
But I often hacked Belarusian sites and sometimes I even sinned by not using anonymization tools. And so I usually use either VPN or my personal private proxies, but most often I use SSH tunnels. SSH is a protocol for remote server management via console, via command line.
Pavlovich:
So you mean that you connect to someone else's previously hacked server, right? Yes. And then you perform further hacks from it.
Hacker:
Usually these are either servers, or routers, or webcams, it doesn't matter.
Pavlovich:
Or just private users' computers or not?
Hacker:
Usually private users' computers are connected via Wi-Fi modems. Via routers? Yes, via routers.
Pavlovich:
And you're no longer hacking the end user's computer, but their router?
Hacker:
Yes, because there's no point in hacking the end user's computer. If you hack the end user's computer, you won't be able to connect to it. Well, you can, but there are some tricks to it.
Pavlovich:
Is an additional layer of security needed in this case, such as a VPN server?
Hacker:
Sometimes yes, sometimes no. If these are some purchased SSH servers or public ones, then, of course, it is necessary. But in general, it is ideal to use double or even triple tunneling. And, as I already said, to have your own servers. That is, you set up your own servers and understand how everything is arranged there. You do not save logs anywhere, for example.
And even if some government services or agencies gain access to these servers, they will not find the logs.
Pavlovich:
The ones you hacked from.
Hacker:
Exactly.
Pavlovich:
What do you do more? That is, do you hack individual sites, or servers that host a whole bunch of user sites?
Hacker:
In fact, I prefer to hack a site, but I also conduct audits of servers. Hacking servers, in fact, consists of scanning all open ports, looking at what services are running there. And if there are any vulnerable services, they can be hacked.
Pavlovich:
So one of the security rules for your server, for example, is to close all unused ports. Yes, exactly. What are the most common mistakes that system administrators make when setting up their own or a client's server?
Hacker:
Well, as a rule, system administrators neglect to update the operating system in a timely manner. They also launch various services under root. Root is a superuser.
Pavlovich:
Well, that is, maximum rights in the system, right?
Speaker?:
Yes.
Hacker:
And also if the server is maintained by a good system administrator, then it will be possible to gain access only using 0day or one day exploit?
Pavlovich:
Zero day and one day, yes. Zero day, what is it?
Hacker:
Zero day vulnerability is a vulnerability that almost no one knows about, except for a certain circle of people.
Pavlovich:
Well, how much is there, well, I get it, that is, this is a vulnerability that hackers know about, but the software manufacturer, the same Microsoft, Adobe, and so on, they don’t know about yet. And at this time, while the software manufacturer doesn’t know, it is possible to hack with it, right? Look, that is, okay, you found the seeds and vulnerabilities, that is, but you, for example, don’t need it, can you sell it?
Hacker:
Of course you can, they pay big money for seeds and vulnerabilities.
Pavlovich:
Well, how much is big, for some people a thousand dollars is big, for others a million is small.
Hacker:
No, well, look, it depends on what kind of vulnerability you are.
Pavlovich:
I read that seeds and vulnerabilities for the same, for iPhones, yes, they are sold for amounts from 50 to 250 thousand dollars and higher. So these are real numbers?
Hacker:
Yes, sometimes these are real numbers, but usually such vulnerabilities are sold jointly.
Pavlovich:
Oh, so several people buy them at once?
Hacker:
Yes, several people buy one vulnerability, and then they resell it.
Pavlovich:
I heard that government agencies have entered this market now, both Russian and American, and so on. And before the government money came, that is, the seeds cost much less, and since there is demand and big money that no one counts, that is, they heated up the market, that is, now the prices are much higher than they were there 10 years ago.
Hacker:
Yes, I think that in this way the states are trying to limit hackers with low income from these vulnerabilities.
Pavlovich:
Well, if we touch on it, then there is another version, that is, they buy up seeds and vulnerabilities in order to arrange a cyber war with other states or spy on them. Well, yes, and you can do that. They say that sites made on ready-made CMS are impossible to hack. Or if it is possible, then it is much more difficult, because there are entire teams developing them. Is that true at all?
Hacker:
Well, as they say, what one programmer can do in one year, two programmers can do in two years. Therefore, programmers in the same team who create CMS like Joomla, Wordpress, ModX, they make mistakes, they also make mistakes. But it is the creators of plugins who make the most mistakes.
Pavlovich:
That is... Ah, these additional programs, applications, yes, making life easier.
Hacker:
In essence, plugins, they are used in CMS to increase the functionality. The same comments to leave. Also, if you do not update the CMS version in time, you can get unpleasant... Consequences.
Pavlovich:
Yes, consequences from hackers. I studied statistics before our meeting and saw that about 30% of all websites in the world are written on the WordPress engine for free. That is, how vulnerable are WordPress sites, because 30% is a lot. Is WordPress easily broken?
Hacker:
WordPress breaks very easily. The thing is that many administrators and owners of these sites forget to update the version of WordPress. Over time, a whole bunch of Internet security experts find new vulnerabilities in the old version of WordPress. And, in fact, old WordPress is very easy to hack.
Pavlovich:
That is, in order to protect your site on WordPress, you just need to promptly update the engine itself, the version of WordPress when a new one comes out. And also all the installed plugins that you use.
Hacker:
Yes, it is important. But it is also important that you need to review the plugins that you install. That is, just, for example, in the same Google or Docgo, look for information about this plugin.
Pavlovich:
Well, that is, do not install anything extraneous that you do not need, yes, do not install a bunch of left-hand plugins. And if you install something that was not left-hand, compromised earlier, yes, it was not hacked earlier. How many WordPress sites can you hack in an hour?
Hacker:
Yes, you can hack about 200 of these sites in an hour, without much effort.
Pavlovich:
Do you use any auxiliary programs for testing your victims there, both those ordered there for money, for example, and those you just hack for the sake of sport, yes, or do you do everything manually?
Hacker:
Well, in general, I prefer to do everything manually, test, but auxiliary programs are very often used for blackhacking. For example, Acunetix, Netsparker scanners.
Pavlovich:
So scanners of what, vulnerabilities? Yes, but they... Open ports?
Hacker:
But no, an open port scanner is, say, maskan or nmap. If I am asked to test a site for free, of course, I will launch the program and, without straining myself, see what it gives me, and also help fix these vulnerabilities.
Pavlovich:
Have you even thought about your plans for the future? Or do you intend to hack and hack all your life?
Hacker:
No, of course, I am interested in the field of information security, but I am not ready to devote my entire time to it. Now, for the near future, I have already opened my own school.
Pavlovich:
You are talking about your hacker school. This is a school that is not on television, right? Do you use YouTube, some webinars or messengers for this? In what form does this happen?
Hacker:
Unfortunately, if these videos, texts and similar material are uploaded to YouTube channels, the YouTube channels will simply be blocked forever. There have already been many such cases. I conduct my training directly in Telegram, and there I teach everything I know, everything I know.
Pavlovich:
How many students were in the first group in your hacker school?
Hacker:
Well, as soon as I opened the school, I launched it in only 3 chats. It is a very narrow circle, and in principle, my entire first stream is completely full and turned out to be full. There are still many who wanted to, who never managed to get into my school. How much does training in your school cost? My training consists of three courses. A person pays $200 for each course.
Pavlovich:
That is, 3 courses are 600 dollars, right? In my time, for example, there were carders and hackers, right? Carders are people who mainly commit fraud using credit cards. And hackers were such an elite in our time. Why did you choose hacking and not carding? For example, For example, carding, I know, brings in much more money than hacking.
But at the same time, I think that hackers are intellectually superior to carders, because many carders often do not even have a technical education or skills for this.
Hacker:
In fact, anyone can do carding, it does not require much intelligence. The thing is that carders mainly cooperate with hackers. Where do those same carders get their full cards? Full cards are complete information about the owners.
Pavlovich:
Well, full info, I understand.
Hacker:
Yes, full cards come from, bank cards, where do carders get them from. They buy them from us, from hackers.
Pavlovich:
And as for credit cards and dumps, that is, the information from the plastic strip of a bank card, that is, have you hacked, have you gotten credit cards and dumps?
Hacker:
Yes, I have, but in most cases of the sites I hacked, the problem was that only the first four digits and the last four digits were visible. Before, in 2008, almost no one had such protection, because they were not afraid of anyone, were not afraid of the authorities, were not afraid of hackers.
Now, if the authorities find out that all the entered card data is simply visible on your site.
Pavlovich:
Well, that is, the cards are stored in full, in open form, right? They write out a very large fine and you are simply done for. That is, now it is much more difficult to hack credit card numbers, steal them or dumps?
Hacker:
No, in fact, this is not true. Now they use such a thing as phishing. Phishing comes from the English word fishing. That is, we essentially take, lure the victim to third-party sites, they enter their data there, thinking that this is a real online store.
Pavlovich:
That is, the site is made, it turns out, like, repeats, say, the Lamoda store, for example, or the Sberbank site, but at the same time it belongs to the hacker.
Hacker:
Well, either it repeats the contents of the site, or there is an online store there that sends bricks of equal weight instead of a laptop.
Pavlovich:
What methods do you prefer, do you accept payment for your services?
Hacker:
Oh, I love accepting payment for my services only in cryptocurrency. Sometimes, of course, in Kiwi and Webmoney, but I prefer Bitcoin or Dugikoin. But in general, any cryptocurrency that is on the exchange will do. That is, mainly crypto, right? Yes, mainly Bitcoin and Dugikoin.
Pavlovich:
Why crypto?
Hacker:
The thing is, no one knows who the owner of this wallet is.
Pavlovich:
But does this provide more anonymity?
Hacker:
Yes, and then this money can be withdrawn in parts to drop cards.
Pavlovich:
Which countries' computers do you hack most often?
Hacker:
Most often, I hack Russia, Ukraine, the USA, Belarus. Why these countries? It's much easier to hack a website if you know the language the website is written in. What do you earn the most from? I earn the most from BlackHat hacks, that is, from Here, one small BlackHat brings me from 3,000 to 20,000 dollars, depending on what I hack. I can also, for example, hack your server, I see that this server is not backed up, so, well, it is not done, or I did not find a backup on this server.
Then I just take, erase all your data, copy it to my computer and simply deface your website, and then extort a lot of money for... For recovery. Yes. Yes.
Pavlovich:
How old were you when you hacked for the first time and what was it?
Hacker:
I was probably 9 or 10 years old. The thing is, I had a computer since birth and my parents put a password on it so that I couldn't use it. Naturally, I was already starting to program, study systems, computer security.
I was interested in all this and I just went and booted into safe mode, then used an exploit that I found on the Internet, created a new user, elevated its rights to the level of neosystems, hid it, and when, say, my parents don't see, I just logged into my computer and using this hidden user.
Pavlovich:
Are there unhackable targets on the Internet or can everything created by man still be hacked?
Hacker:
Of course, everything created by man can be hacked or broken. The only question is how much time you are willing to sacrifice for this, the most important thing is your knowledge. If you know how this system is structured, even if you don’t know, but you have information that you can get, you can read how it is structured, and already understanding how it is structured, you logically understand where it is vulnerable. Almost all systems are vulnerable, especially from the same DOS. No one is protected from the same DOS. What
do you mean? And what is DOS? A DOS attack is Deny of Service. It is an attack from one computer to some site. It sends different packets to this site, and the site processes, processes, processes, queues these packets, and then it simply overloads and cannot process, respond.
And essentially the site becomes unavailable to others.
Pavlovich:
So it turns out that at the same time many visitors go to my site?
Hacker:
Well, yes, a lot of visitors come to your site, but there are not a lot, but a really big lot. Imagine that 4 million users opened your page in one second, what will your site be?
Pavlovich:
Well, most likely... It will open only for...
Hacker:
200 thousand users, for the rest it will just load. And it's good if it loads in 30-40 seconds, but in most cases it will just crash. This is called DDoS. That is, in fact, this is DDoS for many devices. They form in the bootnet. My hacker colleagues are engaged in DDoS and they get paid for the site due to the number of hacked users' computers spent on it.
In fact, an American's computer, installing a virus on it, costs from $15. Installing viruses on a CIS citizen's computer costs $2.5. 15 and 2.5? Yes. Usually DOS attacks cost from 3 to 19 thousand dollars.
Pavlovich:
Is it easy to hack a thermal power plant, nuclear power plant, or some other critical infrastructure?
Hacker:
In general, yes, it's very easy. We just take the ports we need to hack, scan them, and see what's on those ports. Then we just turn on a regular hydra and go through the passwords. Usually, careless system administrators set very weak passwords or don't set them at all. Last time, when I hacked a thermal power plant and a concrete plant, I had full access to those resources, to those things.
And I could even stop the cooling system.
Pavlovich:
Why are you wearing a mask with an American flag? After all, most hackers wear a Guy Fawkes mask, like anonymous hackers, you know? Why are you wearing a US mask?
Hacker:
Well, my mask, in essence, symbolizes mockery of people, mockery of system administrators who are confident in their abilities, mockery of ordinary site owners who do not delve into the practical part, know only the theory of how everything works, who want to do everything quickly and give too little time, do not pay programmers. In essence, I show that for every smart guy there is an even smarter one.
Do you know anyone from the hacker group Anonymous? Well, in general, in fact, the hacker group Anonymous as such does not exist. Anyone can join this hacker group. It is just a rabble of people who have one idea, who unite for each idea. And usually they either get to some sites, or also conduct hacker audits on some systems.
Pavlovich:
But these are adults, independent hackers.
Hacker:
Usually some schoolchildren sit in Anonymous, they have nothing to do, they just download software, let's say, for the same DOS, and it already has a Trojan. And so hackers steal information from these schoolchildren, and they also exploit their work and get full access to their computers.
Pavlovich:
Which countries are considered the strongest hackers in the world?
Hacker:
Well, in general, the strongest hackers are considered to be from the CIS and third world countries. The thing is that these people don’t have much at the beginning of their lives. They don’t have rich daddies or mommies. They just take it and start surviving. They survive, their imagination turns on. And they start thinking, and their brains get pumped up.
Pavlovich:
Have you had to survive too?
Hacker:
From the point of view of American life, yes.
But otherwise, I don’t need anything.
Pavlovich:
Did you have a complete family? Dad, mom?
Hacker:
I won’t answer such questions.
Pavlovich:
What education do you have?
Hacker:
I studied to be a system administrator. I also studied to be a programmer. Usually, it’s just online education, I’m self-taught.
Pavlovich:
Is it easy to hack Wi-Fi?
Hacker:
Well, I know about 15 ways to do this. In general, yes, it’s easy. But if it has WPA2 or WPA3 encryption, which only work in some places in Japan, then hacking takes much longer than hacking simple WEPA or WPA.
Pavlovich:
What do you think about the accusation of Russian hackers interfering in the US elections?
Hacker:
I think that interference in these elections was not only from the Russian hackers. In general, the US system is so vulnerable that even if it is protected in several states, each state has its own voting system, and hacking at least one state, the system of one state allows you to significantly change, influence the vote.
In principle, yes, countries are at war with each other, this affects people living in different countries, and in fact, due to the carelessness of system administrators and programmers working in US government agencies, residents who believe in the government suffer. And what can you say about ATMs, is it easy to hack? Well, in general, yes. An ATM is a system that was banned back in the 80s.
In fact, almost all modern ATMs now have Windows XP, and Windows XP has more vulnerabilities than a cat's block.
Pavlovich:
Well, do you need physical access to the ATM or can you do it all over the Internet?
Hacker:
Well, in general you can do it over the Internet if the ATM is connected to... if it has an IP address and it is connected to a real network. But in general, there is a lock on the ATM, which is in the top cover. It can easily be opened with regular lock picks or the same pin, if you are a pro. You open the lock, look there, there is usually a router, there is the ATM itself and you can insert a cross-cable there.
Pavlovich:
Some third-party device and reprogram it.
Hacker:
Well, you can, no, it's a little more complicated. First, you insert the same Raspberry Pi, it's a mini-computer with a Wi-Fi sensor, close it, leave everything as it was and go, for example, around the corner. You catch the Wi-Fi that you know, that is, you raised your Wi-Fi network and you are connected to the ATM. From the same phone, from the computer, you connect to it, hack it quickly, and then you just take and withdraw all the money that is in the ATM, or intercept the PIN codes saved in these ATMs
and so on.
Pavlovich:
How do hackers communicate with each other, do they use some kind of encrypted channels over the phone, Telegram, Jabber?
Hacker:
Usually hackers just communicate like ordinary people, but most often they use Telegram, Jabber, but they use their own Jabber. Their servers, they connect to their servers. Usually these servers, they are like theirs, but they are like hacked, someone else's. How safe is Telegram and why do the Russian authorities want to shut it down so much? Well, because without physical contact or without access to the device where Telegram is installed, it is practically impossible to get information about secret chats.
This is what scares the authorities. That is, if you use Telegram, then only secret chats? Well, you can use regular ones, in principle, Telegram, thanks to its MT Pro, is protected from the usual banal man-in-the-middle attacks, a person in the middle. Do you know any other hackers in real life? Of course I know, some of them are my students, but I don't have much contact with them.
In general, every hacker is afraid of being exposed, I myself am taking a great risk recording this interview. How difficult is it to get equipment for hacking? Well, look, if you have money, you can just go, open the same Alibaba and order everything you need from Alibaba. Well, I read about the same encoders that were used in your book.
Pavlovich:
Well, that's for rewriting credit cards.
Hacker:
Well, not only credit cards, they can also rewrite hotel cards. Well, this equipment is generally not difficult to get.
Pavlovich:
Okay, and what about your hacker's computer, let's say, and mine, right, how are they different? What kind of computer does a hacker need?
Hacker:
Well, look, everything that is on a computer should be at its maximum. Let me explain why. The thing is that the hard drive, as usual, stores Rainbow tables for brute force, for very fast password guessing.
Pavlovich:
Okay, this is what the hard drive is for, right?
Hacker:
A video card, let's say, if you don't have Rainbow, you need video cards or ASICs. These are devices that guess the hash very quickly. And you can also mine cryptocurrency on them. They, in fact, also guess the cache and mine.
Pavlovich:
Okay, hard drive, video card, what else?
Hacker:
A powerful processor is needed to carry out, say, attacks on Wi-Fi. Sometimes it is also used for brute force. The processor is also used to scan networks. But in general, this is one of the most unenviable things. RAM. But RAM there, in fact, should be at least 8 gigs. Better 16 or even more.
Pavlovich:
And Wi-Fi modules?
Hacker:
Wi-Fi modules? Well, a hacker usually has 2 or 3 of them. The thing is that the more Wi-Fi modules, the more Wi-Fi access points, you can hack a certain number of points using PixyDust. You can also be connected to several Wi-Fi at once, then select the IP address that you will use or carry out the same management for Latak. Bluetooth cards are also necessary, because the same bborn vulnerability, with its help you can hack absolutely any device that has Bluetooth.
Pavlovich:
Don't you think that by hacking you can get jailed sooner or later?
Hacker:
No, what are you saying, I use all means of anonymity constantly. Besides, I already told you about my server. If I send an SMS with a certain code to a certain phone number, all my important information, which is stored exclusively on the server, will be deleted. Everything on my laptop is very well encrypted. And in fact, if someone breaks into my door, I have a video camera there, I will receive a message on my phone, I will be able to view this video camera, what is happening there.
If some government breaks down my door, I will simply send an SMS to my server, a GSM module is connected to it, which receives SMS, if there is a special text, an electromagnetic emitter is launched and all equipment within a radius of 15 meters simply fails.
Pavlovich:
Which of today's films about hackers most accurately characterizes the lifestyle of hackers, their work?
Hacker:
Well, in general, from films, I would say more TV series. This is the series "Breaking" and the series "Mr. Robot". "Mr. Robot". Yes. In principle, they show most of all how hacker audits are conducted.
Pavlovich:
How much time does it usually take you to test one site or server?
Hacker:
Well, in general, on average, a server with up to 5 sites is tested in 6-7 hours. And usually some store, it is tested in 2-3 days.
Pavlovich:
What mistakes do professional programmers make most often from a hacker's point of view?
Hacker:
Well, in general, programmers make quite a lot of mistakes due to the human factor, especially if it is a self-written engine, for example. A very common mistake is transmitting information in unencrypted form. Since you transmitted information in poorly encrypted form, let's say you encoded this secret code for registration, a regular BS 64, then this code can be decrypted and forged, replaced.
Thus, you can greatly harm the system.
Pavlovich:
What foreign languages do you know?
Hacker:
In fact, I know Russian, English and two more languages.
Pavlovich:
What programming languages do you know?
Hacker:
I am very proficient in PHP, JavaScript and C Sharp. Then I just know Python, Python, Ruby, C, C++ well and I know Assembler and Perl normally.
Pavlovich:
Do you have a girlfriend?
Hacker:
I have a girlfriend, although I have not changed her for the last 8 months.
Pavlovich:
Quick question, quick answer. What music do you listen to?
Hacker:
Well, I prefer Pink Floyd, I prefer Blonde Redhead, Buckethead, rock music, classical music, I like Beethoven, Bach.
Pavlovich:
Unusual. A lot of money, but with the prospect of going to jail, or less, but legally?
Hacker:
Of course, a lot of money, but with the prospect of going somewhere and giving a bribe to get out of it.
Pavlovich:
What do you dream about?
Hacker:
I dream of living a quiet life, so that no one bothers me.
Pavlovich:
How much money do you need to be happy?
Hacker:
I need $ 3,000 a day.
Pavlovich:
What is happiness for you?
Hacker:
For me, happiness is just peace of mind, support from people who will not betray you, and good human relationships.
Pavlovich:
Alcohol or drugs?
Hacker:
Drugs.
Pavlovich:
What do you regret in life?
Hacker:
In general, I regret that I was born at my time, if I had been born 20-30 years earlier, then I would have had a completely different life.