![]() ![]() He loved them, and always wanted to go outside and play with them, let them, wrestle with the goats, etc. I grew up on a ranch, and I figured he enjoyed getting out of the city, and being around my ranch animals. He was a bit of a bully and loner in middle school, and that didn't change in highschool either, but he was a friend of mine and would come over and hang out. I decided to "hack" a different friend's computer I'd known since I was about 5 or 6 (we went to middle school together, and he also went to the same highschool as I). My preferred trojan was NetDevil and literally anything they could do, I could do once I had access. So long as you "socially engineered" them to install a server, and got their IP address, you could literally take over their computer using your client of choice. In any case, we started dabbling with Trojans like Sub7 and NetDevil. It was kind of fun to get my friends' AIM passwords, email passwords etc, mess with them as an outsider, and watch innocent drama unfold the next day at HS (we never did anything truly malicious, nor did we tell anyone what we were up to). My new friend and I took a liking to "hacking" (really we were just script kiddies). This reminds me of a story back from when I was a freshman in highschool in 2005 or so. Play nice, support each other and encourage learning. We are not tech support, these posts should be kept on /r/techsupportĭon't be a dick. Low-effort content will be removed at moderator discretion from security firms/pen testing companies is allowed within the confines of site-wide rules on self promotion found here, but will otherwise be considered spam. Spam is strictly forbidden and will result in a ban. Sharing of personal data is forbidden - no doxxing or IP dumping No "I got hacked" posts unless it's an interesting post-mortem of a unique attack. "How does HSTS prevent SSL stripping?" is a good question. Intermediate questions are welcomed - e.g. Offering to do these things will also result in a ban.Asking how to get into your "girlfriend's" instagram. ![]() This is not the place to try to find hackers to do your dirty work and you will be banned for trying. Discussion around the legality of issues is ok, encouraging or aiding illegal activities is not Hacking can be a grey area but keep it above board. "TeenagerĪrrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering". ![]() Guides and tutorials are welcome here as long as they are suitably complex and most importantly legal!īans are handed out at moderator discretion.Īnother one got caught today, it's all over the papers. This sub is aimed at those with an understanding of hacking - please visit /r/HowToHack for posting beginner links and tutorials any beginner questions should be directed there as they will result in a ban here. What we are about: quality and constructive discussion about the culture, profession and love of hacking. A subreddit dedicated to hacking and hacking culture. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |