Hacking

!hacking

@lemmy.ml
Create post
Do these methods work to view private IG profiles ?

Do these methods work to view private IG profiles ?

https://inscaptions.com/how-to-see-private-accounts-on-instagram-using-inspect/

https://techcult.com/how-to-access-private-instagram-inspect-element/

I don’t know anything about programming, and sadly I can’t differentiate between rubbish webpages and the real deal when it comes to stuff like that..

I also read about a couple of ios shortcuts that claim to be able to download private Instagram posts if you have the link to it.. is it true?

I Will Fucking Piledrive You If You Mention AI Again

I Will Fucking Piledrive You If You Mention AI Again

Open link in next tab

I Will Fucking Piledrive You If You Mention AI Again — Ludicity

https://ludic.mataroa.blog/blog/i-will-fucking-piledrive-you-if-you-mention-ai-again/

I Will Fucking Piledrive You If You Mention AI Again

I Will Fucking Piledrive You If You Mention AI Again

Open link in next tab

I Will Fucking Piledrive You If You Mention AI Again — Ludicity

https://ludic.mataroa.blog/blog/i-will-fucking-piledrive-you-if-you-mention-ai-again/

Hacking Millions of Modems (and Investigating Who Hacked My Modem)

Hacking Millions of Modems (and Investigating Who Hacked My Modem)

Open link in next tab

Hacking Millions of Modems (and Investigating Who Hacked My Modem)

https://samcurry.net/hacking-millions-of-modems

Two years ago, something very strange happened to me while working from my home network. I was exploiting a blind XXE vulnerability that required an external HTTP server to smuggle out files, so I spun up an AWS box and ran a simple Python webserver to receive the traffic from the vulnerable server.

Hacking Millions of Modems (and Investigating Who Hacked My Modem)
Giving Away Steam Account (I'm Locked Out)

Giving Away Steam Account (I'm Locked Out)

So I have an old Steam account I had for years. Will give away account information to someone if you think you can get in.

Here's the situation: I changed my email to a forwarding service. so it's randomwords_characters@jepepla.com However, the forwarding service shut down and is no longer functioning, so I'm locked out of the account. I don't even know the email address that was generated for me because the service is gone. However if there's anyone here that thinks they can get in, I'm happy to send along the login information I do have. DM me if interested.

Iphone event log to check potential hack

Iphone event log to check potential hack

Apologies is this seems somewhat weird, I was using the reddit app on my iphone when I clicked on a tag in my search history and at the same time I noticed my flash go off on my phone. I suppose this could have been some strange hardware issue in my phone, but I suspected it took a photo. I checked my photo stream and there was nothing new. There is no log of events on my phone I know of, but I wondered if it was intentional. Curious if anyone here has any idea if it could have been something intentional (it taking a photo), or maybe some log info source I could check to see if it was legitimate hack.

Best fuzzing tool

Best fuzzing tool

I'm trying to find a good fuzzing tool for testing my web applications and was wondering what people would recommend. I'm trying to find one that is open source, free, and doesn't use proprietary stuff. It seems like Google's OSSFuzz is the closest option to what I'm looking for, but it uses Google cloud :/

Bluetooth security flaws reveals all devices launched after 2014 can be hacked

Bluetooth security flaws reveals all devices launched after 2014 can be hacked

Security researchers have discovered new Bluetooth security flaws that allow hackers to impersonate devices and perform man-in-the-middle attacks.

The vulnerabilities impact all devices with Bluetooth 4.2 through Bluetooth 5.4, including laptops, PCs, smartphones, tablets, and others.

Users can do nothing at the moment to fix the vulnerabilities, and the solution requires device manufacturers to make changes to the security mechanisms used by the technology.

Research paper: https://dl.acm.org/doi/pdf/10.1145/3576915.3623066

Github: https://github.com/francozappa/bluffs

CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-24023

New plugins coming soon on aluminum-ice/pwnagotchi: ntfy, Mastodon, handshake-m

New plugins coming soon on aluminum-ice/pwnagotchi: ntfy, Mastodon, handshake-m

cross-posted from: https://lemmy.cat/post/5756727

Over the last few weeks I've been working on a number of plugins which I hope will be available in the next pwnagotchi release.

  • nfty: send and receive notifications and alerts to devices via ntfy service.
  • mastodon: periodically post status updates of your pwnagotchi on Mastodon
  • handshake-m: view and manage handshake captures via web UI.
  • wpa-cracked-insert: generates a .pcap.cracked file for displaying passwords in webgpsmap.

These plugins are also initially available on my own repo with more info on how to use them: https://codeberg.org/retiolus/pwnagotchi-plugins

I hope this kind of thing will give the project some new energy :)

TV hardware hacking

TV hardware hacking

Hey all,

I am looking into hacking TVs. Its well known they run linux most of the time, so we should be able to do some fun stuff with them.

I've found some guides, clips and other reference material online, but it isn't much. Do any of you guys have some reference material to help me on my learning journey?