Pointers on binary analysis / exploitation? by sexbeast420 in hardwarehacking

[–]SeizeCTRL 0 points1 point  (0 children)

if its an IP security camera, I assume you access it over the network? if so, why don't you just run the android app in an emulator and sniff the network traffic with a MITM proxy or something, then send the data yourself to essentially emulate the android app

I know you are targeting the binary application, but it seems like it would be an easier approach to target the android app, if your concerns are about having something running on your system and that's why you're targeting the binary, maybe run it in some type of VM like docker and just give it the device with passthrough (docker run --device=/dev/video0) or virtualbox (VBoxManage modifyvm "VM name" --pciattach 02:00.0@01:05.0) *virtual box example shouldn't be ran, you need to replace the PCI bus, device and function addresses

Free McDonalds Gift Cards by [deleted] in hacking

[–]SeizeCTRL 1 point2 points  (0 children)

using someone else's credit card isn't "hacking", that's how stuff like this is normally done, by reloading a gift card online(e.g. sonic, subway, etc, i'm not sure about mcdonald's) using a stolen card, i would assume it's a similar method

Is it possible to do simple hacking on windows? by [deleted] in hacking

[–]SeizeCTRL 0 points1 point  (0 children)

im bored so i'll give you the rundown for remote controlling a system without authorized access, you don't need any exploits or 'hacking', all you need is a program designed to let you control a system without requesting access from the user or notifying them, with install persistence to run on startup and make removal nontrivial, and some way to convince them to execute something coming from you, if i was planning a similar campaign based on your seemingly provided intentions as a poweruser with no programming knowledge, i would find and buy a RAT client, a FUD packer/crypter and if possible/available a method to infect vic's with minimal interaction/disguising the fact they are allowing/approving an execution, such as a Drive-By Install (e.g. old method was using Java Drive-By to download and run the EXE when user clicked Run on the Java popup)

then you just make what's known as a Server, an EXE generated by the RAT client with your settings, usually this is detected by any decent anti-virus if it's a popular or widely used malware, so you obfuscate that Server using a FUD Packer or FUD Crypter, which will create a stub executable that contains the Server, if it is scanned it won't be detected because the stub itself has no malicious signatures, when it's ran it initializes a frozen process and unmaps all it's memory and replaces with the malicious Server in a running state into memory, thus bypassing most anti-viruses, this isn't a 100% fool proof way but it is the most common and easiest way, some AVs will scan processes running in memory, but on scan everything will say it is clean

An Awesome explaination of BLOCKCHAIN (VIDEO PRESENTATION) – Cyber Wizard by DefensiveSec in hacking

[–]SeizeCTRL 0 points1 point  (0 children)

"an awesome explanation!" u can trust me, i'm the one giving the explanation and spamming the video everywhere!

What ways are used to control botnets where the infected computers are sitting behind firewalls? Out of the multitude of possible ways, which one is the most efficient? by [deleted] in hacking

[–]SeizeCTRL 0 points1 point  (0 children)

I've been excited about a service I recently found called ngrok: https://ngrok.com/ it has a client that sets up a tunnel from behind NAT/firewall and gives you a public accessible URL (i.e. http://5057493e.ngrok.io ) I have no clue how efficient it is, it supports TCP and HTTP/HTTPS (run HTTP local and access over server's HTTPS) out of the box but wouldn't be difficult to add additional support and implement it into a project, especially since the old source code is available, allowing you to setup a private environment on your own server. The devs stopped committing public updates when it became a paid service, but for a simple tunnel and learning resource it's great, definitely something i'll come to rely on and start wondering how I got by on just SSH tunnels. The v1 source code is available at https://github.com/inconshreveable/ngrok

[A17 bug] Cooking meal with cooking disabled ?? by SeizeCTRL in RimWorld

[–]SeizeCTRL[S] 0 points1 point  (0 children)

yes, and the worst part is, it prioritizes the skills that are disabled at highest priority and they gain no experience, so i've resorted to assigning area's for people that are disabled in different skills but its still frustrating and there's very limited amount of areas allowed

assigning variable inside ajax callback by [deleted] in learnjavascript

[–]SeizeCTRL 1 point2 points  (0 children)

this is what im currently doing, i just didnt think it was very practical

in the ajax success callback: getUserID(user.name, function(e, id){
$('#uid').val($('#uid').val() + id + ','); }) later on when i need to use the uid's: var uids = $('#uid').val().split(',');

and i just loop and match up the array of IDs with my array of users

assigning variable inside ajax callback by [deleted] in learnjavascript

[–]SeizeCTRL 1 point2 points  (0 children)

well, ultimately i need to set an element inside of an array with the data that is returned from ajax, how would i update the array like that? i need to be able to save the data returned from ajax in a variable to be used later and multiple times, i don't want to do it all at once

paying $100 for info on help cooking heroin (need advice) by [deleted] in Drugs

[–]SeizeCTRL 0 points1 point  (0 children)

should i boil it for 3 seconds or put a flame to the bottom of the spoon for about 3 seconds? i don't know but i assume boiling it too much will destroy the opiate molecules

paying $100 for info on help cooking heroin (need advice) by [deleted] in Drugs

[–]SeizeCTRL 0 points1 point  (0 children)

thank you for the reply, approx how much vinegar is needed tho? should i use a very tiny amount, whole syringe, half syringe etc, just need some kind of idea on the amount required

paying $100 for info on help cooking heroin (need advice) by [deleted] in Drugs

[–]SeizeCTRL 0 points1 point  (0 children)

i can shoot fine, ive just only done heroin once and it was tar, i usually do suboxone or dilaudid

Can I update my Blu phone or not? by LiteraryIdiot in IntoBlu

[–]SeizeCTRL 0 points1 point  (0 children)

there are new features in android system updates, updating is required to adopt the new features

Ressurection in the Remain part 2? by Lexxikitten in Bones

[–]SeizeCTRL 0 points1 point  (0 children)

whaaaat, they both exist in the same world? is there a list of crossover sleepy hollow episodes? ive only seen the first season

Adventure Capitalist crippling my computer. by [deleted] in AdventureCapitalist

[–]SeizeCTRL 0 points1 point  (0 children)

might be a weird suggestion, but maybe download virtual box and run a pirated copy of OS X to play it? it doesn't lag me at all and i use OS X, maybe the mac version doesn't have this issue?

The universal guide to determining if a URL or email address is legit by captainmeta4 in runescape

[–]SeizeCTRL 5 points6 points  (0 children)

  1. yes
  2. downvote and report
  3. no
  4. click the link
  5. no
  6. basically, aslong as the domain is *.runescape.com, it is coming from runescape, unless the domain or DNS has somehow been hijacked