Posted on 01-09-2014
Filed Under (reddit) by ali-okan-yuksel

As most people know by now, iCloud has/was breached and several 100 celebrities had their nudes leaked. From the brief research I’ve done, iCloud is apparently supposed to delete photos from the cloud when you delete them from your phone or whatever. This is obviously not the case and I know iCloud also stores text messages so the same rule probably applies there.

If anybody has any articles or information related to the iCloud breach, whether old or new (I’m assuming this is a 0day), please post it here. I’m quite interested to see how it was done. Nobody is socially engineering 150+ celebrity apple accounts, I don’t care who you are.

submitted by sevaaraii
[link] [8 comments]

(0) Comments    Read More   
Posted on 01-09-2014
Filed Under (reddit) by ali-okan-yuksel

I am really scared to post this query simply based on the fact that I could anger someone on here and get all kinds of Hacking anger brought down upon me.

I respect you all.

I am writing a Tech Noir film and would like to really get some authenticity in regards to what exactly a hacker does when they are working. I am not asking how to do anything like hack into someones computer or anything, I just want to know what it looks like visually.

I also would like to know about the lifestyle and community.

Thanks and sorry if this is the worse place to put this

EDIT: Wow you guys are great. Im sorry I thought you guys would be so terrifying. I never thought I would get such good help.

submitted by Neato_Orpheus
[link] [61 comments]

(0) Comments    Read More   
Posted on 01-09-2014
Filed Under (reddit) by ali-okan-yuksel

Hello hackers. Aspiring penetration tester here looking to learn about hacking, I’m very curious about it all and find hacking incredibly fascinating. I’m not here to ask “how to hack” because I know you guys get that question tons and I’ve already read some helpful info in this subreddit to help get me started. Although there are some questions I have that I see haven’t been asked before (or at least I don’t think so). What would I do about getting certifications to help get me to where I want to be for pentesting? I’m currently taking a networking class to help get me the CCNA, which I know is important for network security. I’ve looking into the CEH, but I was told by a classmate its nothing special, is that true? What do you guys know about the OSCP and the OSCE? I want to aim for those at some point but I’m still a noobie. I’d like to know about any cert I’d need for pentesting really. Its still kinda far down the road though for me, but I want to learn. I’m still learning HTML and CSS, then after that I’m going to move onto Ruby, PHP, Python, Jquery, Sql, Perl, and C. What else would you recommend learning for pentesting? I had started setting up a virtual lab for pentesting and stuff but I feel I should get my programming/scripting down beforehand. Although I’d probably still try to learn some stuff anyways. Any info and advice you guys can give me would be awesome, thanks.

submitted by sheeptaku
[link] [3 comments]

(0) Comments    Read More   
Posted on 01-09-2014
Filed Under (reddit) by ali-okan-yuksel
(0) Comments    Read More   
Posted on 01-09-2014
Filed Under (reddit) by ali-okan-yuksel

Hello everyone!

I’ve found a couple of posts talking about how to hack WITH Android things like dSpolit and various other tools. However a lot of the examples and video’s that deal with doing MITM attacks target PC’s rather than phones. So I was wondering about doing the same thing on phones. While I understand that a MITM attack on a phone would be the same as on a computer, but I was wondering if things like session hijacker would work if the user was using Apps instead.

In other words, if I am on my phone using apps like WhatsApp, Gmail, Facebook, Snapchat, etc. instead of my browser… what tools could someone use to sniff my WhatsApp/Snapchat messages/pictures, does such a tool exist?

Are there any tools out there for specifically targeting phones that don’t involve physical access to the phones? Or installing a program (either iOS or Android).

submitted by ellimistx99
[link] [5 comments]

(0) Comments    Read More   
Posted on 01-09-2014
Filed Under (reddit) by ali-okan-yuksel

I doubt this is the place for it but, maybe you guys can direct me the right way. I’m looking for a subreddit for making devices such as an rfid jacker and devices like that. Any help is appreciated.

submitted by bsizzle
[link] [comment]

(0) Comments    Read More   
Posted on 01-09-2014
Filed Under (reddit) by ali-okan-yuksel

I am trying to find some decent to good hackers that can hack emails and steam accounts. Some people on steam have stolen items from me, and sold them to other people, SO I am trying to get those items back, any help is appreciated (if you have any programs or ways that i could hack them, I would appreciate that :) pm or comment here )

submitted by OfficialRedditMod
[link] [comment]

(0) Comments    Read More   
Posted on 01-09-2014
Filed Under (reddit) by ali-okan-yuksel

When news outlets put out something like “Celebrities phone gets hacked and nude are leaked” or something like that, what does that actually mean? Are these devices actually getting “hacked” or is it just “news outlets” being news outlets. And if these device are actually getting “hacked” how do people do it?

(Also posting on r/howtohack)

submitted by corabrickdog
[link] [5 comments]

(0) Comments    Read More   
Posted on 01-09-2014
Filed Under (reddit) by ali-okan-yuksel

I’ve seen many websites claiming to have downloadable programs for token generators, for sites such as Myfreecams and Chaturbate. I assume most of these are just scams but are any of them real? Is it possible to create a token generator for these sites? I would think not as everything is controlled on their end but then again nothing is totally secure. Anyone have any thoughts?

submitted by gaoual13
[link] [1 comment]

(0) Comments    Read More   
Posted on 01-09-2014
Filed Under (reddit) by ali-okan-yuksel

currently i do most of my pen testing of backbox which is a ubuntu derived hacker friendly os. i want to know what i will gain from upgrading to kali linux.

thanks is advance from your opinion

submitted by direwolf126
[link] [comment]

(0) Comments    Read More