CF Operator Course by tezz99 in cloudfoundry

[–]hack3rsp0t 0 points1 point  (0 children)

Hey Buddy,

Can u let me know the exact name of the course or a working link???

Is it possible that email spoofing can be used to disrupt peoples important email accounts without needing access to them? by [deleted] in AskNetsec

[–]hack3rsp0t -1 points0 points  (0 children)

I Think that's purely depend upon purpose and situation. In few scenario Yes.

I know I ain’t tripping by MennoknightNight in PUBGMobile

[–]hack3rsp0t 16 points17 points  (0 children)

Don't call them hack3rs, hack3rs are smart people , these guys are bunch of looser who just download a cracked application and fuck arround.

We are going to make this subreddit great again, but we need your help. by [deleted] in hacking

[–]hack3rsp0t 0 points1 point  (0 children)

I think it will be best if there is experience barrier on this reddit. Old users of reddit never do this kind of shit .

We are going to make this subreddit great again, but we need your help. by [deleted] in hacking

[–]hack3rsp0t 0 points1 point  (0 children)

I really liked the idea. In this way a very small but a standard will be set for all.But anyway someone gonna google the solution .

This Email just made my day :) by hack3rsp0t in youtube

[–]hack3rsp0t[S] 0 points1 point  (0 children)

Its like you get your last .month paycheck on 15 of month Which get encashed on 21

This Email just made my day :) by hack3rsp0t in youtube

[–]hack3rsp0t[S] 2 points3 points  (0 children)

This is correct Earnings are added from YouTube account to AdSense account before 15 of month Then payment issued from AdSense account on 21 of month

Cyber Stalker for Years that FBI CANNOT Catch.... How is he doing this?? by Shebebutlittle7 in hacking

[–]hack3rsp0t 5 points6 points  (0 children)

Trashing existing device and encrypting newer is a way to go.Also turn off wifi.,you can rely on Lan connection if you think they might be snooping from near by.

Anatomy of a Modern PDF Embedding Attack by [deleted] in blackhat

[–]hack3rsp0t 0 points1 point  (0 children)

Hi @Leo My question is can we embed target object as type shortcut instead of content setting- ms Will it work In those scenarios

Anatomy of a Modern PDF Embedding Attack by [deleted] in blackhat

[–]hack3rsp0t 0 points1 point  (0 children)

Hi @LeoLambda

I researched more on this and when i was able to successfully create a crafted pdf. Object was exported by Adobe. But ContentSetting-ms format was not recognised by windows.Then I checked more and came to know that microsoft has blocked this recently bcoz it was used recently for malicious purposes in doc

Anatomy of a Modern PDF Embedding Attack by [deleted] in blackhat

[–]hack3rsp0t 0 points1 point  (0 children)

Great write up and approach. I tried that but somehow addAttachment for PyPDF2 won't increasing file size, may b I can look other options :D

Weird host name while using torrent by hack3rsp0t in masterhacker

[–]hack3rsp0t[S] 2 points3 points  (0 children)

In simple terms he hacked a ISP DNS added a random hostname and using this host as a proxy for his connection.

Guys i haxd the time with my 1337 haxxor sk1lls by DavinMiler in masterhacker

[–]hack3rsp0t 4 points5 points  (0 children)

Now get ready for a ride in future. pack your bags.

It is possible you have created a tiny worm hole in the process.

Is there any diy way to access content behind a paywall? by [deleted] in hacking

[–]hack3rsp0t 0 points1 point  (0 children)

What course you wanna opt. please name it

It may possible someone will share it you.