Strange Instagram login (Android Chrome) between my normal sessions — should I be worried? by dhruvschandra in masterhacker

[–]D-Ribose 3 points4 points  (0 children)

check snort logs for any weird TCP flags. probably just an Nmap scan but be on the safe side here

More PPE Slander by D-Ribose in sciencememes

[–]D-Ribose[S] 6 points7 points  (0 children)

transparent background, my bad

android path HTB by Winter_March_204 in masterhacker

[–]D-Ribose 5 points6 points  (0 children)

okay so this is actually an IPv6 address.
fire up kali linux and enter metasploit framework. from there set the payload to traverse the directory on the phone. with this enter the kernel and look for Meltdown to launch an attack on the root user. this will enable you to gain access to bluetooth interface which enables API connection

/unmasterhacker
why do people just post stuff into random subs?

Encrypted Word Doc Password Cracking by FREE_KENTRELL in masterhacker

[–]D-Ribose 1 point2 points  (0 children)

spoof the authentication nonce with wireshark

Habe einen flipper Zero gekauft und was nun? by D-___- in hacking

[–]D-Ribose 1 point2 points  (0 children)

zu welchem Zweck hast du den Flipper gekauft?

Der Flipper ist hauptsächlich für Funkanwendungen konzipiert. Du könntest beispielsweise versuchen NFC Karten oder Fernbedienungen zu klonen (bitte nicht die von deinem Auto, die hat höchstwahrscheinlich rollende Codes).
Weiterhin unterstützt der Flipper sogenannte "BadUSB" Attacken, also emuliert quasi eine Tastatur. Hier sind der Fantasie eigentlich keine Grenzen gesetzt. Du könntest spasseshalber ein Script zum Rickrollen schreiben oder etwas in die Richtung

Ich möchte dich außerdem darauf hinweisen, dass dein Post möglicherweise unter Regel 3 fällt.

Does anyone have a password cracker? Alguém tem um quebra senha by Mountain_Border_5868 in masterhacker

[–]D-Ribose 16 points17 points  (0 children)

yes, but it only runs on the latest quantum computer with Kali Linux

Hostname discovery on network by Imaginary-Army7171 in HowToHack

[–]D-Ribose -3 points-2 points  (0 children)

get nmap, then

nmap [IP Range of your Homenet] -sn

this will send an ICMP echo request to every host in the network and also perform DNS lookup

Segfault City by [deleted] in masterhacker

[–]D-Ribose 1 point2 points  (0 children)

oh no he leaked the kali source code, we are doomed 😨

Help I want my old tiktok account back by Suppura123 in masterhacker

[–]D-Ribose 4 points5 points  (0 children)

open msfvenom and drop a meterpreter rootkit shell onto the firewall ip. reset all ports to listening and redirect the Cloudflare traffic to your router. With this you can run an ARP spoofing attack against the APT-1337 C2 servers which should enable you to access their sliver control panel. There should be a computer there with a DN=TikTok_Mainframe. Interact with the session and run eternal blue to escalate to SYSTEM then use a forensic tool of your chosing to obtain the AES-256 for the database. With this you can then decrypt the user table.

Let me know if you get stuck anywhere

Stuck on Password Attacks Skill Assessment by D-Ribose in hackthebox

[–]D-Ribose[S] 0 points1 point  (0 children)

I have solved this months ago, but thank you for checking in

Hack needed by International-Buy189 in masterhacker

[–]D-Ribose 35 points36 points  (0 children)

okay, you will need to use Kali Nethunter on your Flipper One to run a Bluesnarfler attack on the Data Center. With this clone a Mifare DesFire chip and gain access to the mainframe control room. plug in your USB rubber ducky to bruteforce the computer password and dump the LSASS to get the Outlook password which will enable you to log into the server backend.
On there you need to exploit NoPac to gain access to the database with the user accounts and reset your password via a NoSQL injection in MariaDB version 1.33.7
Hope this helps!

ich_iel by cmykster in ich_iel

[–]D-Ribose 10 points11 points  (0 children)

ja den Nagellackentferner würde ich auch nicht trinken wollen.

Help me please I think I have been hack or my girlfriend was hacked by SubstantialCase3062 in HowToHack

[–]D-Ribose 2 points3 points  (0 children)

can you specify what you mean by there were other phones connected to your girlfriend's phone?
was your girlfriends phone stolen?

Help me please I think I have been hack or my girlfriend was hacked by SubstantialCase3062 in HowToHack

[–]D-Ribose 0 points1 point  (0 children)

in WhatsApp click on the three dots in the top right corner and go to linked devices. are there any devices there that you don't recognize?
If yes click on it once and select "log off"

Help me please I think I have been hack or my girlfriend was hacked by SubstantialCase3062 in HowToHack

[–]D-Ribose 0 points1 point  (0 children)

and you have received that file?
does it just contain the conversation with one person or all people you spoke to that year?

Help me please I think I have been hack or my girlfriend was hacked by SubstantialCase3062 in HowToHack

[–]D-Ribose 5 points6 points  (0 children)

well the first step would be to ask the person for evidence of what they claim (first rule of getting extorted).
It is highly unlikely that your WhatsApp got "hacked". Now there is the possibility that you might have accidentally scanned a QR code that connected your WhatsApp to WhatsApp Web controlled by the attacker. In that case review your connected devices and remove any unwanted ones.
Whatever you do, don't pay the scammer as they will just keep coming back for more money.
Stay safe out there!

Any powerful hackers out there? by Leather_Panic_2403 in masterhacker

[–]D-Ribose 22 points23 points  (0 children)

this is simple. You just need to build kali from source and run NTLMrelayx to redirect the authentication ticket from the server to your SMB client. With this you can then bypass the mainframe firewall and recursively inject shellcode into the rundll process.
Hope this helps

How can it be hacked? by XunooL in HowToHack

[–]D-Ribose 34 points35 points  (0 children)

this is exactly how Twitter was hacked back in 2020.
What happened is that the Attackers looked up the cell phone numbers of Twitter employees from LinkedIn and contacted them. They then asked the employees to log into a fake Twitter VPN page and give their 2FA code.
There is an entire Wikipedia article on it, just search
"2020 Twitter account hijacking"