Thanks @Dev for the rank & pfp
Posts: 647
Threads: 22
Joined: Nov 2023
Hi all!
I'm curious to know how the massive data leaks and breach happen and i'm interested to learn it. How do the hackers gain access to data of the large companies that have complex security measures? I'm really interested to understand and learn it all
Posts: 11,478
Threads: 226
Joined: Jun 2023
There should be some good guides to look at on the boards man, take a look!
"Universal appeal is poison masquerading as medicine. Horror is not meant to be universal. It's meant to be personal, private, animal"
Posts: 2
Threads: 0
Joined: Nov 2023
read these zines religiously, dozens and dozens of times, and then apply it to the real world
Posts: 122
Threads: 16
Joined: Jun 2023
well, it can be phishing, malware, some weak or leaked credentials, outdated software or libraries that present vulnerabilities, misconfigurations, etc, or there are also some public log data sometimes, that are not well configured not to be seen. There is a lot of extra information in the other sections, the community provides several useful resources for you to learn and understand better, good luck! This forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason: Scraping | Contact us via https://breachforums.rs/misc.php?action=help&hid=27 if you feel this is incorrect.
Thanks @Dev for the rank & pfp
Posts: 647
Threads: 22
Joined: Nov 2023
Nov 20, 2023, 11:58 PM
(This post was last modified: Nov 21, 2023, 12:14 AM by baphometmahomet.)
(Nov 20, 2023, 03:49 PM)DredgenSun Wrote: There should be some good guides to look at on the boards man, take a look!
Can you provide some references please?
(Nov 20, 2023, 04:09 PM)poleeksperimentov Wrote: read these zines religiously, dozens and dozens of times, and then apply it to the real world
Thanks for the links! They're great and I've read through them. I'm interested to know how they scan the IP without getting blocked
(Nov 20, 2023, 04:10 PM)TechMasterX123 Wrote: well, it can be phishing, malware, some weak or leaked credentials, outdated software or libraries that present vulnerabilities, misconfigurations, etc, or there are also some public log data sometimes, that are not well configured not to be seen. There is a lot of extra information in the other sections, the community provides several useful resources for you to learn and understand better, good luck!
Can you please provide some references? I also wanna know how outdated or vulnerable libraries are exploited and how to bypass browser's security features
Posts: 11,478
Threads: 226
Joined: Jun 2023
(Nov 20, 2023, 11:58 PM)baphometmahomet Wrote: (Nov 20, 2023, 03:49 PM)DredgenSun Wrote: There should be some good guides to look at on the boards man, take a look!
Can you provide some references please?
(Nov 20, 2023, 04:09 PM)poleeksperimentov Wrote: read these zines religiously, dozens and dozens of times, and then apply it to the real world
Thanks for the links! They're great and I've read through them. I'm interested to know how they scan the IP without getting blocked
(Nov 20, 2023, 04:10 PM)TechMasterX123 Wrote: well, it can be phishing, malware, some weak or leaked credentials, outdated software or libraries that present vulnerabilities, misconfigurations, etc, or there are also some public log data sometimes, that are not well configured not to be seen. There is a lot of extra information in the other sections, the community provides several useful resources for you to learn and understand better, good luck!
Can you please provide some references? I also wanna know how outdated or vulnerable libraries are exploited and how to bypass browser's security features
Just look through the 'cracking' subsections, there's plenty of info and examples there!
"Universal appeal is poison masquerading as medicine. Horror is not meant to be universal. It's meant to be personal, private, animal"
Thanks @Dev for the rank & pfp
Posts: 647
Threads: 22
Joined: Nov 2023
(Nov 21, 2023, 01:12 PM)DredgenSun Wrote: (Nov 20, 2023, 11:58 PM)baphometmahomet Wrote: (Nov 20, 2023, 03:49 PM)DredgenSun Wrote: There should be some good guides to look at on the boards man, take a look!
Can you provide some references please?
(Nov 20, 2023, 04:09 PM)poleeksperimentov Wrote: read these zines religiously, dozens and dozens of times, and then apply it to the real world
Thanks for the links! They're great and I've read through them. I'm interested to know how they scan the IP without getting blocked
(Nov 20, 2023, 04:10 PM)TechMasterX123 Wrote: well, it can be phishing, malware, some weak or leaked credentials, outdated software or libraries that present vulnerabilities, misconfigurations, etc, or there are also some public log data sometimes, that are not well configured not to be seen. There is a lot of extra information in the other sections, the community provides several useful resources for you to learn and understand better, good luck!
Can you please provide some references? I also wanna know how outdated or vulnerable libraries are exploited and how to bypass browser's security features
Just look through the 'cracking' subsections, there's plenty of info and examples there!
Thanks! I thought that was for cracked accounts and didnt pay much attention but those tabs are gems
Posts: 11,478
Threads: 226
Joined: Jun 2023
(Nov 22, 2023, 09:49 PM)baphometmahomet Wrote: (Nov 21, 2023, 01:12 PM)DredgenSun Wrote: (Nov 20, 2023, 11:58 PM)baphometmahomet Wrote: (Nov 20, 2023, 03:49 PM)DredgenSun Wrote: There should be some good guides to look at on the boards man, take a look!
Can you provide some references please?
(Nov 20, 2023, 04:09 PM)poleeksperimentov Wrote: read these zines religiously, dozens and dozens of times, and then apply it to the real world
Thanks for the links! They're great and I've read through them. I'm interested to know how they scan the IP without getting blocked
(Nov 20, 2023, 04:10 PM)TechMasterX123 Wrote: well, it can be phishing, malware, some weak or leaked credentials, outdated software or libraries that present vulnerabilities, misconfigurations, etc, or there are also some public log data sometimes, that are not well configured not to be seen. There is a lot of extra information in the other sections, the community provides several useful resources for you to learn and understand better, good luck!
Can you please provide some references? I also wanna know how outdated or vulnerable libraries are exploited and how to bypass browser's security features
Just look through the 'cracking' subsections, there's plenty of info and examples there!
Thanks! I thought that was for cracked accounts and didnt pay much attention but those tabs are gems
There's something for everyone in this place dude
"Universal appeal is poison masquerading as medicine. Horror is not meant to be universal. It's meant to be personal, private, animal"
Posts: 5
Threads: 0
Joined: Nov 2023
(Nov 20, 2023, 04:09 PM)poleeksperimentov Wrote: read these zines religiously, dozens and dozens of times, and then apply it to the real world
thank you, very interesting
Posts: 198
Threads: 7
Joined: Oct 2023
in most case:
sqli > db dump
idor > sensitive information dump
|