Okay, I know my question might sound a bit weird, but I am in a situation where I need knowledge on the subject (btw, if someone can assure me that there was never a Discord or Google data breach since 2018, even unknown to the public, I would be grateful).
I have done a bit of research on what hackers look for in an email address, and it looks like any information is valuable to them, but a friend that knows about the subject has told me that it was possible that a hacker decides to do nothing to your account if you’re "broke or a child".
I was confused, because I think even in that case, it would be possible (and useful) for them to send emails to my contacts on my behalf or log me out and ask for ransom or something like that.
So, is it really possible that a hacker just gives up on your address, and if so, how likely is that ?
Get hidden information’s about your spouse,family and friends secretly without any trace with the help from this talented arabian hacker Amir through Whatsapp +1 (919) 346-4965
What if a hacker steals my cookies for example using BeEF or something else. What can they do with this information? Can they get any passwords or something?
A hacker A is following a victim B on his Private Instagram account, and he find out a way so that anyone who is not following B also can see B’s pics.
Will Instagram reward such bugs?
I think sometimes it is best to look into different research scheme , get information on which is the best place to get this programmer guys , I was once a victim and I vowed never to contact again . I work in a place where we do mostly marketing and I always like to get information by any means . My colleague in the office was always was always having treasures and most customers , I kept wondering how , until we had lunch together sometime , I asked him whats up with that . They only thing I heard was , He uses the services of Greyhatzhackers to gain access to emails of competitors , and then he gives their customers a better deal ( and that was it ) It sounded strange and weird to me until I gave it is a shot . haha He told me that all I needed to do was add ATGmaiilDOTco m to their name and I should be able to get with them . I was scared because I know most times these things are illegal but 2 weeks later , this is me now smiling and getting more customers too . haha God bless this hacker guys . lol
I got a confirmation code without trying to log in which is what prompted me to investigate this. The account is just a Ubisoft account with 1 free game on it; I somehow doubt there would be motivation to employ sophisticated hacker techniques.
I know about Tor services and VPN, but I don’t think those would spoof my own IP address. When I look at the log-in history for my account, it says my very own IP (at least, an IP with the same first and last segment) failed a login attempt 15 minutes ago and I definitely don’t remember doing anything remotely related to that account in the last 12 hours. Did a hacker actually spoof the correct first and last numbers of my IP, or is this more likely some sort of bug? How would they even know the right IP to spoof in the first place
we currently have a hacker in a project who uses MySQL injections to get access and read parts of the database. He sent us accurate screenshots of his successful attacks by showing the database architecture. He uses well-known tools so there is somewhere a variable that is unsecure. However, the project is a large project and we want to find the one or more variables as fast as possible. How can we find and monitor a hacker in a project? Our first approach was to scan the server log but this doesn’t show successful or not successful attempts but only all requests. (In the meantime the developers are already looking for those variables, but this is a huge project)
According to my understanding a hacker has two options to spy on someone. He can trick the user into installing the spyware himself or if that doesn’t work he has to find a service that the target is using which has vulnerabilities that he can exploit. If he finds a vulnerability that allows him to gain a shell he has access to the whole system. This is known as an intrusion and can be detected by intrusion detection systems. The antivirus does not detect this. This is like picking a lock of a door (not breaking it). It does not make any permanent changes to the system. If the hacker gets disconnected here he has to repeat the whole process again.
After gaining access to a system the hacker has to install spyware to spy and a backdoor to gain easy access to the system. This modifies the system and these modifications can be detected by antivirus.
Is this correct?
I have 2FA on ALL of my accounts. But my password was leaked in 7 breaches. Unfortunately I have used the same password for most of the accounts.
Is it possible for him/her to bypass the 2FA?
I want to understand how the robots.txt file can be use by an attacker. I know we can have a list of paths and directories , that’s all or we can find more informations ?