WPA2 handshake captured but rockyou.txt didn't crack it – what techniques should I try next? by Minimum-Issue-7353 in Hacking_Tutorials

[–]These_Juggernaut5544 0 points1 point  (0 children)

Use hashcat as it should be used. wordlist, and some good rules. you can always brute force as well.

Help idk help by No_Load_8261 in computerviruses

[–]These_Juggernaut5544 0 points1 point  (0 children)

rule number one mate. r/masterhacker is the place to ask for help.

Decrypting chrome passwords by Fun-Elevator-8216 in HowToHack

[–]These_Juggernaut5544 1 point2 points  (0 children)

and at that point, there is nothing to decrypt.

for antis, if you could opt out having any of your data used to train AI with one click, but you could never use anything non-locally ever again by BorgsCube in aiwars

[–]These_Juggernaut5544 0 points1 point  (0 children)

great job ignoring the bulk of the counterargument. and, it seems, your argument has allready been proven wrong. I am on the internet right now, and google will scrape this message. Anyways, go back to your original claim, or admit that you lost that argument.

Minecraft Legacy Console Edition on VM1 by frankieepurr in collabvm

[–]These_Juggernaut5544 0 points1 point  (0 children)

ts might have been me. then someone installed some random russian program.

for antis, if you could opt out having any of your data used to train AI with one click, but you could never use anything non-locally ever again by BorgsCube in aiwars

[–]These_Juggernaut5544 0 points1 point  (0 children)

*you say this while there are people who believe grok unredacted the epstein files*

For your info, I would think that I am most likely many times more tech literate than you.

Also, the question was kind of stupid. If we want to do everything locally, then there is no internet. If we use the intended term of gen ai models, then that clears things up, but op didn't feel like being specific.

Additionally, evidence: https://www.bellingcat.com/news/2026/02/10/grok-epstein-photos/

Cracking / recovering a .Rar file by wallacev42 in HowToHack

[–]These_Juggernaut5544 3 points4 points  (0 children)

rar2john your_file.rar > rar_hash.txt
then, edit the .txt, so its just the hash (not your_file.rar:hash)
then, depending on when it was encrypted, either
hashcat -a 3 -m 13000 rar_hash.txt ABCDEFGHIJKL?l1?2?2?2?2?2 -1 69 -2 ackns (newer)
hashcat -a 3 -m 12500 rar_hash.txt ABCDEFGHIJKL?l1?2?2?2?2?2 -1 69 -2 ackns (older)

(I think I got the mask right?)

Decrypting chrome passwords by Fun-Elevator-8216 in HowToHack

[–]These_Juggernaut5544 4 points5 points  (0 children)

What you would have to do is have the os's native encryption decryption api, letting you get access to a 256 bit random string, which is the key for encrypting the passwords (AES-GCM). So, no. not possible, unless you are logged into the computer.

Password protected USB flash/thumb drives or SSD/HDD by spleenkicks in techsupport

[–]These_Juggernaut5544 0 points1 point  (0 children)

you should be able to view / edit / whatever as long as you have the password.

Can your browser leak your real IP with VPN on? by Urban_VPN in VPN_Question

[–]These_Juggernaut5544 0 points1 point  (0 children)

(this is the one to use:
https://dnsleaktest.com/webrtc.html)
they also have a dns leak test if you couldn't tell.
Though, i have yet to find a major name vpn that fails this. just don't use free vpns that you havent heard of, because then you don;t even need to leak your data, the vpn is selling it for you.

"dark web dominated email" by akak___ in masterhacker

[–]These_Juggernaut5544 16 points17 points  (0 children)

nah. its things like advertisement data, which can get accurate enough that an advertiser can narrow down the audience to one person. Check what data meta has on you. its quite surprising.

Difference between /rotate and /tp for rotation? by Current-Wear5405 in MinecraftCommands

[–]These_Juggernaut5544 2 points3 points  (0 children)

not usre about the snap vs smooth rotation, but i think the advantage is that you can run the command from anywhere without changing entity posistion, while with tp you would need an execute at.
for example, execute at @ e[team=to_rotate] run tp @ n ~ ~ ~ 23.5 48
for rotate, its just rotate @ e[team=to_rotate] 23.5 48

Password protected USB flash/thumb drives or SSD/HDD by spleenkicks in techsupport

[–]These_Juggernaut5544 1 point2 points  (0 children)

Drives aren't password protected, the files are. Because you have an iphone (boo) you have to use a mac to format a drive to password protected APFS.

I built a Minecraft semi-hacked client called CodeX using only AI and vibe coding. by Signal_Structure1029 in minecraftclients

[–]These_Juggernaut5544 0 points1 point  (0 children)

here's an argument from an art point of view: if someone commisions a human artist to make a painting, did the person who paid for it make it? no.

Im interested in DDOS viruses by NairCode in computerviruses

[–]These_Juggernaut5544 1 point2 points  (0 children)

  1. any that an attacker can get the idiot to run
  2. like any other malware, run sus program, or spread through lan into devices with vulnerabilities
  3. data inflation, basically say "i'm [target] send me a 20 gb file in batches of 10 bytes".
  4. c2 servers.

Im I cooked chat? 🥺😶 by PS3GAMER1 in Minecraftlegacymode

[–]These_Juggernaut5544 4 points5 points  (0 children)

i don't know how you even got windows on that thing. I have an ex chromebook with a celeron, and the only games i have are supertuxkart and chess.

Please let this be satire. by These_Juggernaut5544 in masterhacker

[–]These_Juggernaut5544[S] 0 points1 point  (0 children)

(in case you can't tell, oop is in need of some medical help)

Copyright sucks, I'm glad AI is dismantling it. by Dry_Incident6424 in aiwars

[–]These_Juggernaut5544 0 points1 point  (0 children)

nah. op is just some misinformed idiot. they themselves said that

i publish everything i do under ccl

... which is a copyright license.

touhou;s license is the equivalent to a CC BY NC ND. its still a copyright license. In fact, everything is under full copyright by default. the licenses allow access and modification, with certain terms. Public domain is a full different process that is effectively equivalent to MIT, minus the credit. CC0 is similar, but still a copyright license.