Create an account

Very important

  • To access the important data of the forums, you must be active in each forum and especially in the leaks and database leaks section, send data and after sending the data and activity, data and important content will be opened and visible for you.
  • You will only see chat messages from people who are at or below your level.
  • More than 500,000 database leaks and millions of account leaks are waiting for you, so access and view with more activity.
  • Many important data are inactive and inaccessible for you, so open them with activity. (This will be done automatically)


Thread Rating:
  • 698 Vote(s) - 3.42 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Hacking questions 2

#1
How to not get caught hacking?
Use a vpn or proxy

Can i hack a hacker?
Yes

Can hacking be ethical?
Yes

Hacking is illegal?
Yes in some countries

Hacking is a cyber crime?
Yes if you evade 3rd party systems without authorization.

Hacking is not a crime?
No only if you evade 3rd party systems without authorization.

Hacking is illegal?
No

Hacking is always wrong?
No

Hacking is generally defined as...
Cut systems with tools and use your human capabilities

Hacking with powershell?
Yes it's possible.

Hacking with javascript?
Yes it's possible.

Hacking for defense?
Yes and you can make money

Hacking near me?
Wifi

Hacking without code?
Yes, command line

Hacking without internet?
Yes, you can hack hardware
Reply

#2
Quote:How to not get caught hacking?
Use a vpn or proxy
^ That barely scratches the surface.

Here's my non-exhaustive setup:

Quote:* DNS servers encrypted.
* Running both Tor over VPN (triple-layer encryption) & VPN over Tor.
* 14 eyes countries restricted from the exit node.
* WebGL, WebRTC, Canvas and Font fingerprinting disabled.
* Tor Itself running In a controlled/sandbox environment.
* Bridges applied to the entry/guard node (changing every day or so).
* Tor entry and exit nodes heavily configured.
* Overall uniqueness operating on a 1:20 ratio.
* AES-Twofish-Serpent encryption on all drives.
* Full disc encryption x 2, encrypted volumes x2, stored data x1 layer.
* Anti-keylogging software.
* Internal wireless network monitoring- auto scan at 2 minute Intervals.
* Local/Internal/non-routable IP address & device MAC address scanning.
* IDS/IPS active monitoring.
* Executing only performed via VMs (NAT connection to Host) Live CD.
* ISP Transparent DNS Proxy Interception bypassed.
Reply

#3
Quote:(11-10-2022, 12:33 PM)nganha2410 Wrote:

[To see links please register here]

thanks for share........ 30 chater

Cool
Reply

#4
Quote:(06-25-2023, 04:18 PM)Sud0nym Wrote:

[To see links please register here]

Quote: (10-22-2022, 05:57 PM)hacxx Wrote:

[To see links please register here]

How to not get caught hacking?
Use a vpn or proxy

You seem very knowledgeable. But how does this make sense exactly? I would be concerned my country's LE would subpoena the VPN provider for logs. And I don't think it's as simple as "choosing a good VPN". I personally believe that if you can't verify that logs are being deleted with your own two eyes, then you have to assume that they aren't. I just thought I'd bring it up in case you had some insight to share. I'm open to learning if that's just not the case.

Also... why not Tor?

Have a read at @mothered post, the perfect combination to stay 101% anonymous.

For normal users a combination of vpn + tor should be enough.

I use:
Computer > VPN (1) > Tor (3) > "Glype Proxy" (1)
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

©0Day  2016 - 2023 | All Rights Reserved.  Made with    for the community. Connected through