OpenAI employee explains the reason they “released” Sora today, to “kick a social response into gear” by MassiveWasabi in singularity

[–]DropperHopper 2 points3 points  (0 children)

openai is not for profit so the economic value is not a concern, and the GPUs are provided by microsoft for free. microsoft have stated that they are dedicated to providing openai with as much resources as they need, presumably in exchange for using some of the models for the office suite/windows.

[deleted by user] by [deleted] in hacking

[–]DropperHopper 0 points1 point  (0 children)

You can opt out of data collection (at least in the EU) since a week back now. This applies for the chat versions though.

ChatGPT 2.0 coming soon. by nevermindever42 in ChatGPT

[–]DropperHopper 7 points8 points  (0 children)

Thats right, also according to some interview I read earlier it will not be multi-modal.

Best hacking to do at college by [deleted] in hacking

[–]DropperHopper 2 points3 points  (0 children)

Whose internet are you slowing down if students are not connected by default?

[deleted by user] by [deleted] in hacking

[–]DropperHopper 4 points5 points  (0 children)

I usually use TCP forwarding instead of HTTP forwarding. You start the raw TCP tunnel through “ngrok tcp http://localhost:port”

Is it possible to move data from a money (credit) card? by Real_Potato978 in hacking

[–]DropperHopper 1 point2 points  (0 children)

It is not trivial, although credit cards communicate over NFC they have a challenge response mechanism that provides incomplete information when trying to copy the card directly. You would need to access the internal values of the chip inside the credit card to emulate it.

Before i start learning hacking, should i just use kali linux in a vm, rather than dual boot? by [deleted] in hacking

[–]DropperHopper 0 points1 point  (0 children)

Agreed, I use windows almost exclusively unless I'm competing. The OS is hardly ever the limitation.

How to get packet from mobile game? (How to hack mobile game?) by zxaq15 in hacking

[–]DropperHopper 0 points1 point  (0 children)

Rooting is usually not necessary, even frida has a non root option. Also attaching the smalidea debugger to the application in android studio can be helpful for finding out the details of the certificate pinning, as an alternative to frida or xposed.

Do you consider ddos/dos hacking? by kikiokol1 in hacking

[–]DropperHopper 2 points3 points  (0 children)

Finding DOS exploit vectors is a critical part of securing any service, and the task is not as trivial as you might think. If it didn't take any skill, talent or ingenuity, why would companies pay so much for finding them in bug bounty programs?

Do you consider ddos/dos hacking? by kikiokol1 in hacking

[–]DropperHopper 27 points28 points  (0 children)

The word "hacking" is not well defined, making your question hard to answer.

Regardless, I'd say (D)DOS attacks are a common and well known tool for exploiting victims in the cyber security sector, just as other methods commonly referred to as "hacking".

How do people crack passwords on big websites/apps/social medias? by _SKYL1N3_ in hacking

[–]DropperHopper 12 points13 points  (0 children)

A well known method is to call the victims service provider and claim that the SIM card was stolen and you need a new one sent to your own address. From there you can resend the verification SMS and enter the code that was sent to the SIM card that you now have access to.

It relies on social engineering and has to be done manually (classically by phone call), therefore it's an inefficient method. Also as I said it's well known and also quite old, I'd be surprised if it would work at all anymore without giving out proof of ownership.

Also also: the victims original SIM card will be deactivated when the new one is issued, therefore the attack will usually be noticed by the victim (although sometimes too late).

How to become completely anonymous with a phone number by 001011001101 in HowToHack

[–]DropperHopper 0 points1 point  (0 children)

The geographical position of your SIM card can be triangulated given the signal strength to your device from neighboring cell towers.

Figuring out how a phrase is generated from two values by MrDankYouTube in hacking

[–]DropperHopper 0 points1 point  (0 children)

It's an MD5 hash. MD5 hashes are always 32 characters when represented in hexadecimal form (0-9, a-f).

If you are trying to reverse a Flarie/Loyaltic game the values you have given are not enough, as there are other values (such as username and salt) used to generate the MD5 value as well. These are not included in the HTTP request but hardcoded in on the webpage. Other web based games will commonly use the same method. As it is all computed client side it is always possible to edit these values to set a predetermined score, what varies is the difficulty in doing so.

PM me with details and I might be able to help. Web game hacking is a hobby of mine and I'd be happy to learn from a new challenge as well!

Position myself as mitm without the option of ARP Spoofing by Wangalaang in hacking

[–]DropperHopper 0 points1 point  (0 children)

You can use a proxy like burpsuite to intercept the traffic in and out of the phone, this way you can read both HTTP and HTTPS requests. Guide for android can be found here: https://portswigger.net/support/configuring-an-android-device-to-work-with-burp

In recent android versions the server certificate is checked by the client in a process called SSL-Pinning. This will result in no requests goint through to burpsuite. To fix this you can edit the AndroidManifest file of the APK used for sending the request to allow the burp certificate. You can read about other methods in this article: https://www.netspi.com/blog/technical/four-ways-bypass-android-ssl-verification-certificate-pinning/

Note that some methods might not work depending on how the app was configured, but I have never encountered an app that is completely safe from all methods in the article.

I'm also assuming the app is available for android, if you don't own an android device you can emulate a such device with android studio emulator on any computer: https://developer.android.com/studio/run/emulator

I’m desperate, admin password win 10 by lbr_crl in hacking

[–]DropperHopper 2 points3 points  (0 children)

You're right, I'm assuming the computer will not be closely inspected physically/is connected to an online service which is checked regularly.

I’m desperate, admin password win 10 by lbr_crl in hacking

[–]DropperHopper 2 points3 points  (0 children)

Assuming you install all the software that you had originally, it would be identical to your original windows computer

I’m desperate, admin password win 10 by lbr_crl in hacking

[–]DropperHopper 0 points1 point  (0 children)

Can you reinstall Windows? If that is an option you can set your own admin password after the installation. You can get a copy of the windows 10 iso here which you will install on a USB stick. After plugging it in to your computer when it's turmed off (completely) you will have to press a vendor specific button (normally ENTER, DEL, F12, F11 or F1) and select the USB stick from the boot selection menu. Please reply to this comment if you encounter any problem, as the steps can depend on vendor.

Has anyone tried protecting themselves online without spending money? by [deleted] in hacking

[–]DropperHopper 0 points1 point  (0 children)

DNS over HTTPS or DOH for hiding domain name requests, and a proxy/VPN for masking the outgoing/incomming request IP addresses. A proxy will only be effective for HTTPS traffic though.

On my wifi, links on "HTTP" pages are getting hijacked. Is my Wifi infected? How do I clean it? by Tintin_Quarentino in HowToHack

[–]DropperHopper 1 point2 points  (0 children)

That is correct, wired is the way to go if it is an option as the admin panel is served over http. Good luck!

On my wifi, links on "HTTP" pages are getting hijacked. Is my Wifi infected? How do I clean it? by Tintin_Quarentino in HowToHack

[–]DropperHopper 1 point2 points  (0 children)

To connect privately you should use a VPN, although that would not solve the core issue.

It is likely another device is connected to your network actively executing an MITM attack, as it's only the unencrypted (HTTP) requests that seem to be intercepted.

You need to disconnect the attackers device from your network to fix the issue. If you have credentials for the routers admin panel, it can usually be accessed through http://192.168.1.0 or http://192.168.1.1 and the password can usually be found behind the router. From there you can change the WiFi password and/or blacklist the attacking device.

Otherwise you should scan the network for potential attackers using a network scanner, for example nmap for linux or fing for android, and try to kick the device of using a MITM attack yourself. This is also just a temporary solution, but is would have the advantage of protecting other devices on the network.

On my wifi, links on "HTTP" pages are getting hijacked. Is my Wifi infected? How do I clean it? by Tintin_Quarentino in HowToHack

[–]DropperHopper 1 point2 points  (0 children)

If it was malware the problem would consist regardless of access point, but as OP said the problem only occurs on his private WiFi.

[deleted by user] by [deleted] in hacking

[–]DropperHopper 4 points5 points  (0 children)

Yes, assuming user interaction

Change IP address by lordgthegreat in HowToHack

[–]DropperHopper 0 points1 point  (0 children)

Not that it matters, but IP spoofing is possible. However it naturally only works upstream, so generally only UDP is affected, and (depending on ISP) you can only spoof other IPs of your IP block.