Hacking

The seedier side of all of the above forums.

OpenBullet 2 V0.2.4

[img]https://i.imgur.com/ezKfPGU.png[/img]

Install the Microsoft .NET 6 (desktop apps version) from Download .NET 6.0

Download Link :
https://bit.ly/3DymySV

VirusTotal:
https://www.virustotal.com/gui/file/e323d90f08c638baba3b8ffd06be2be209ec...

Password Unrar is 1

n/a

I wanna Buy a Wifi Hacking Software

I wanna buy a wifi hacking software any anyone have this?

Youtube Channel worth Following

This channel I've found has some really good tutorials by an industry expert in Cyber Security.

Hacking With Phil On Youtube, Brought to you by the Crafty Foundation

Have a watch, lemme know what you think.

[+] Poisoning the ARP table with Python

Okay I know it's been ages since I've posted anything here or practiced/learning hacking in general. I figured I'd throw this in. One of the basic things to be able to do as a hacker is to become the router to someone va ARP spoofing (aka ARP poisonng). That way you can have the ability to intercept/sniff traffic between two hosts. While the original tool that does this is great it should be fun to understand how it works; and even improve it, which is what I'll do.

So let's assume you used netdiscover to scan the network you're on for a victim's MAC address, you have it on hand and you want to fool the victim's ARP table so that the gateway becomes you instead of the actual router for the network. Then Scapy becomes your tool to the rescue. Now the issue with the way ARP spoofing is traditionally done is you open two terminals, then on one terminal you're spoofing the gateway for the victim, and on the other you're fooling the gateway to think it has the victim's MAC address. The issue with this is that due to the nature of how the packets are being sent, the timing is off and your ARP response packets used to fool the victim wont be sent through the NIC doing the poisoning in a fluid manner. What will happen is that the victim will have its connection continuously dropping because the router will reconfigure the ARP responses to match the default. This is trouble for the hacker because this gives evidence of tampering and subversion will just be at risk.

So I figured why not have the packets sent within the same program that way the packets can flow in a proper manner so that the victim will keep the poisoning consistent? So I made this after 3 hours of procrastination and much needed effort using Python3:

#!/usr/bin/python3
import scapy.all as scapy
from optparse import OptionParser
import subprocess
import re

#This is to get the arguments
def getParams():
        parser=OptionParser()

[+] Buildng an ARP scanner on Python

I should say that all the knowledge I gained from creating this is from a very good instructor named Zaid Sabih, owner of Zsecurity you can check out his website and support him by purchasing his course at some point, he goes into better detail than I do and has more then 180,000 students to date here https://zsecurity.org/ and here https://www.udemy.com/learn-python-and-ethical-hacking-from-scratch/

Often times you may want to identify hosts on a LAN and maybe you want to say for example dos a target or perform some sort of ARP spoofing to do something related to capture traffic. To understand this you obviously should know how to program in python, and should know a little bit about what the scapy module is used for, you can refer to its documentation here: https://scapy.readthedocs.io/en/latest/

To start off, everything I'm about to explain can simply be done in the three following lines:

#!/usr/bin/python3
import scapy.all as scapy
scapy.arping(ip)

But for the sake of understanding how things work, I've put together a script to help curb your understanding here is a simplified version to start you off:

#!/usr/bin/python3
import scapy.all as scapy

def scan(ip):
        arp_packet= scapy.ARP(pdst=ip)  ##create ARP packet object with its pdst field having the ip
        ##can also do arp_packet.pdst = ip
       
        #print(arp_packet.summary())            ##print summary for ARP request
        #scapy.ls(arp_packet)                   ##print out the contents of the arp packet
        #arp_packet.show()
       
        #to send the packet to the entire network you'll need to
        #set the destination mac to the broadcast mac address ff.ff.ff.ff.ff.ff
        broadcast = scapy.Ether(dst="ff:ff:ff:ff:ff:ff")        #create ethernet broadcast frame
        #print(broadcast.summary())                                                     #print summary
        #scapy.ls(broadcast)                                                            #examine broadcast packet contents
        #broadcast.show()

        #then combine the packet together using / because scapy allows you to do so

How stop making a wetransfer link work

Hi,
Is it possible to make a WeTransfer link stop working as someone who didn't create it or a shared link in general on facebook?
Thanks in advance

Is there a legitimate site than can disable icloud activation lock on an Apple Watch?

I purchased a used Apple Watch from a local seller. He assured me it was not locked to an icloud account. He entered a PIN which he gave me to unlock the phone and I could see the display worked and apps ran. I was unable to pair it to my iPhone right away because my iPhone doesn't have cell service and the Wi-Fi was down where I was. When I got home the watch won't activate after pairing because it is iclod locked. First, the seller was telling me he has to talk to his sister because she set up the icloud account. Now he is just ignoring me. I tried buying an activation unlock through appleiphoneunlock.uk which had good reviews (if they are legitimate reviews) but the have not been able to unlock it and I have a strong suspicion that they will never be able to unlock it.

Reverse engineering hacked SB6141

Hi, first post, obligatory apology if I'm doing it wrong. I'm not experienced with this stuff, but I'm learning linux and I'm using Kali linux right now to practice getting good with it.

I've got a hacked SB6141 which gets download speeds of around 200 mbps. I bought it off a guy who says he's been running it for 7 years, but doesn't want to tell me how he did it. I'm trying to figure out what he did to make it work. When I look at the snmpwalk results, which only worked one time, every other time I tried to run it it timed out, I'm seeing 42 down and 30 up. However, it is always around 200. I suspect, now that I watched the Defcon 18 presentation on Docsis, that what's been done is they've changed the DNS so the modem is anonymous and flashed a custom config file so that the speed is high. However, I don't think that was done using haxorware or anything else, because the box has not been opened that I can tell.

Couple of things:

1. When I go to the modem GUI (a pathetic thing on Comcast), the IP address is the standard IP for this modem, and the MAC matches the MAC on the sticker. However, the seller told me he'd changed the MAC to something with mostly 1s and 0s in it, though he may have said the 1s and 0s just to make me think hes a l33t hacker.

2. None of the regular ports are open except for 80 for http. There are two udp ports open for snmp and snmp trap (161 and 162). Nothing else is accessible, so I can't access the modem through Putty in any way that I know of (like port 22 and ssh).

3. I also know that he's changed the community from public to private (as the snmpwalk did not work until I put private in as a guess).

4. Given that the modem itself reports on the GUI the MAC address on the box, and I can access the GUI through the default IP, I suspect that he is actually spoofing the default IP address and MAC so that it looks legit, but that on the "inside" it's using something else and has different DNS servers.

Questions:

Andriod Hacking

hi i want to hack an android phone but i dont have access to the target phone. can you help me regarding this.

please contact me directly on [email protected]

Syndicate content