Suppose you’ve used de-authentication attack to capture WPA handshake and you’ve got a .cap file with the handshake. Now you’ve used hashcat and provided an extensively rich dictionary of 1.3 gb of wordlist which...
The end result of hashcat submitted by /u/Dope-guy-2912
What is the hardest and most complex area of Hacking?
As The Title said,what is the hardest and most complex area of Hacking,What I mean by area is specialisity(Reverse engineer,Exploit developpement,Malware analysis,pwd,Web Hacking....)? submitted by /u/Pretend_Cellist8188
NSA’s TAO hacked Huawei: China officially confirms
China has officially confirmed that the US spy agency NSA hacked into Huawei's headquarters and carried out repeated cyberattacks. The Chinese State Security Ministry report accuses the NSA of systematic attacks on the telecoms giant and other targets...
How are people finding out address from a gamer tag or ip address in general
So there is these YouTube videos where they mess with people by reading there name and address on xbox, but how are they doing this like an ip address can only give you a general location unless you are...
FBI chief: China has bigger hacking program than all the competition combined
FBI Director Chris Wray revealed that China has a cyberespionage program that surpasses all of its major competitors combined. Wray emphasized that even if the FBI focused solely on China, Chinese hackers would still outnumber their cyber personnel...
One of the FBI’s most wanted hackers is trolling the U.S. government
Russian hacker Mikhail Matveev, also known as "Wazawaka" and "Boriselcin," is one of the FBI's most wanted hackers. He has been indicted by the U.S. government for being a prolific ransomware affiliate and carrying out significant attacks against...
I feel so fucking lost
I have depression, and mild autism, my life is just the same in day in day out. I was recently homeless and now I have a place to stay (sharehouse) I just want an IT job, it's the only...
Name and Shame time
A few months ago, I found cybersecurity vulnerability for Caltex. I found their whole rewards system vulnerability scanner and source code (basically confidential data for all you normies). I went through their bug bounty program, I spent hours on...
Chinese hackers have unleashed a never-before-seen Linux backdoor
submitted by /u/CodePerfect
38TB of data accidentally exposed by Microsoft AI researchers
submitted by /u/sagitz_