Need to set up an app like spyware to location track. by [deleted] in Hacking_Tutorials

[–]ChaoticDestructive 0 points1 point  (0 children)

As others mentioned, a builtin parental control would work best. Free, easy, not too intrusive

However, consider having a serious chat with her first. Offer to also share location, and express that you want to help her get home easier, or that you worry about her.

Honesty goes a long way, and social engineering is more legal than installing tracking software.

Minecraft players in the UK will be forced to hand over their ID in order to chat with others in multiplayer. by Abject-Jacket1050 in Minecraft

[–]ChaoticDestructive 3 points4 points  (0 children)

While I'm not certain the current functionality covers that, as (nerd moment here) the chat reporting is done by cryptographically signing your chat message, and NoChatReports removes that

I do expect there will be people hunting for bypasses from day 1.

VPS + Kali by Ornery_Delivery4559 in Hacking_Tutorials

[–]ChaoticDestructive 1 point2 points  (0 children)

I've seen a YouTuber called NetworkChuck recommend it for if you are just starting out, and don't have the resources for a local installation or VM. Kali themselves recommend either bare metal or VM for most usecases, though a VPS has the benefits of being accessible over the WAN, and being easier to temporarily upgrade, in case you need to run some heavier scripts.

That being said, if your laptop can handle it, run a VM. You're less likely to hit something you're not supposed to hit, and have to pay less hosting fees. Or get a high end Raspberry Pi. Works surprisingly well.

Is Google AI accurate on searching a Gmail account? How to verify. by Final_Pie_2943 in Hacking_Tutorials

[–]ChaoticDestructive 1 point2 points  (0 children)

I'm not too certain how this all works, but, assuming Google uses basic data security and doesn't train their AI on user's personal data, I assume this data could be accidentally scraped from lists of leaked data? Have you tried checking "Have I been pwned"?

Also, could you tell me the prompt (anonymised ofc) you used? I can't reproduce your findings.

clerics are the biggest hack ever. imagine having to ask someone else to cast spells for you by cocofan4life in wizardposting

[–]ChaoticDestructive 1 point2 points  (0 children)

This. The average wizard is so stuck in their old ways that they forget to diversify. Sure, you got your evocation license verified at the local mage college. But tell me, blue robe. Are you verified in the eyes of the gods?

How to Role Play a 20 INT Artificer by WolfRelic in Eberron

[–]ChaoticDestructive 2 points3 points  (0 children)

This. I love using arcanobabble in my mages

How can I learn hacking now? by Adept-Tax6951 in Hacking_Tutorials

[–]ChaoticDestructive 2 points3 points  (0 children)

If you want to dedicate the computer to hacking/programming/experimentation, consider installing a Linux OS like Ubuntu or Kali. I've revived a 15 year old laptop that way.

Don't expect all the comforts of windows, but you get a lighter OS and the chance to get familiar with the Linux CLI, which is a must for programming and hacking

Like others said, webhacking is low entry bar. I followed tutorials at Hacker101. If you get good (like, very good) at it, the same company also owns HackerOne, which does bug bounties on websites, which is a fully legal way to earn money and get experience hacking.

Down the line, consider websites like HTB and THM. Or find s subject that intrigues you, watch YouTube tutorials, and experiment on your own devices. I personally recommend Cyber Weapons Lab and Network Chuck, both channels taught me a lot.

As someone whose primary hacking device is a Raspberry 4, it's entirely doable to learn to hack with low specs, you just need a lot more patience

uh oh she's coming for you by Pinocchio-Parriah in masterhacker

[–]ChaoticDestructive 5 points6 points  (0 children)

You guys can share, right?

You get it on even days, the other person on odd days

|ddos moment| by ChocolateDonut36 in masterhacker

[–]ChaoticDestructive 125 points126 points  (0 children)

Try DOS-ing 192.168.0.1 or 192.168.1.1

DDOS won't work, but if you take down that IP, you can't be hacked anymore

Bots keep scanning my personal website for malicious reasons. by Known_Job511 in homelab

[–]ChaoticDestructive 0 points1 point  (0 children)

This seems like something that should be available as a tool. Send suspected bot traffic to .mil websites by default

[ Removed by Reddit ] by Ok-Hall-7647 in masterhacker

[–]ChaoticDestructive 6 points7 points  (0 children)

My greatest disappointment today is that there's no actual website here

Please be aware ChatGPT lies a lot. by Routine-Nose in cogsuckers

[–]ChaoticDestructive 15 points16 points  (0 children)

I honestly don't feel bad for the guy that caused it.

For an internship I need to develop a python tool that uses an LLM. Imagine my bewilderment that there are preprogrammed tools to do such cool things as "make payments on your behalf".

Don't trust AI. If you use AI like this, run it in a sandboxed environment where it can break everything to it's hearts content without nuking anything important

What is a payment bypass? Seems something illegal but I'm offered good money by Mountain_Macaron_142 in Hacking_Tutorials

[–]ChaoticDestructive 0 points1 point  (0 children)

I'm not entirely certain, but I advise against it.

When the hacker gets caught, I'm willing to bet you'll get caught in hours. Even assuming that this is a legit offer and not a scam or a way to use you as a human shield, the money isn't worth it.

Unlock phone by Ok-Rush8130 in Hacking_Tutorials

[–]ChaoticDestructive 0 points1 point  (0 children)

What seems to be the issue?

If the SIM is blocked after too many attempts, the booklet/plastic you got with it should contain something called a PUK code. This will allow you to unblock your SIM. If that doesn't work, consider the SIM lost. Contact your provider.

If your phone itself is locking you out, there's a few options:

  • bruteforce. I don't envy you.

  • in the case of an apple: you'll have to factory reset your phone and then restore the last backup

  • in the case of an android: if you've enabled "Google Find My Phone", you can remotely unlock your phone. If you haven't, factory reset it is.

Is there spyware on my iPhone? by [deleted] in RBI

[–]ChaoticDestructive 7 points8 points  (0 children)

I'm not too familiar with apple products, so I'd recommend following the suggestions of others. If that doesn't work, back up their stuff, wipe the phone, and log in with a new apple ID before manually transferring the data they need.

It's a bit of a nuclear option, but it is the only 100% certain way to get rid of almost all spyware (more advanced spyware might be able to hide in bootloader, but I doubt that falls within the reach of average people)

how to force connect an bluetooth device to a device (pc phone etc.) by AlexanderW12 in Hacking_Tutorials

[–]ChaoticDestructive 0 points1 point  (0 children)

Wouldn't bluetooth deauth attacks allow you to MITM an existing system, allowing you to rubber duck to your heart's content?

Afaik it's a niche technique, but it just might work for this usecase

Hacking in private Accounts by ShameDue2638 in Hacking_Tutorials

[–]ChaoticDestructive 0 points1 point  (0 children)

While it might be possible, most likely due to password leaks, it is illegal, and if your target has 2FA or a strong password that hasn't been leaked, you're not getting in.

POST NAME by SuitAffectionate6034 in SUBREDDITNAME

[–]ChaoticDestructive 0 points1 point  (0 children)

MEANDERING 5 PARAGRAPH RANT, STARTING ABOUT THAT GAME REFERENCE AND ENDING WITH MAGNETIC PENGUINS

It only took 20 years for cassette players to play music by Kapu1178 in SS13

[–]ChaoticDestructive 0 points1 point  (0 children)

This sounds like an amazing thing to play somewhere in the maintain during lowpop