how leaks and breach happen
by baphometmahomet - Sunday November 19, 2023 at 06:46 PM
#1
Hi all! 

I'm curious to know how the massive data leaks and breach happen and i'm interested to learn it. How do the hackers gain access to data of the large companies that have complex security measures? I'm really interested to understand and learn it all
Reply
#2
There should be some good guides to look at on the boards man, take a look!
"Universal appeal is poison masquerading as medicine. Horror is not meant to be universal. It's meant to be personal, private, animal"
Reply
#3
read these zines religiously, dozens and dozens of times, and then apply it to the real world
Reply
#4
well, it can be phishing, malware, some weak or leaked credentials, outdated software or libraries that present vulnerabilities, misconfigurations, etc, or there are also some public log data sometimes, that are not well configured not to be seen. There is a lot of extra information in the other sections, the community provides several useful resources for you to learn and understand better, good luck!

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Scraping | Contact us via https://breachforums.rs/misc.php?action=help&hid=27 if you feel this is incorrect.
Reply
#5
(Nov 20, 2023, 03:49 PM)DredgenSun Wrote: There should be some good guides to look at on the boards man, take a look!

Can you provide some references please?

(Nov 20, 2023, 04:09 PM)poleeksperimentov Wrote: read these zines religiously, dozens and dozens of times, and then apply it to the real world

Thanks for the links! They're great and I've read through them. I'm interested to know how they scan the IP without getting blocked

(Nov 20, 2023, 04:10 PM)TechMasterX123 Wrote: well, it can be phishing, malware, some weak or leaked credentials, outdated software or libraries that present vulnerabilities, misconfigurations, etc, or there are also some public log data sometimes, that are not well configured not to be seen. There is a lot of extra information in the other sections, the community provides several useful resources for you to learn and understand better, good luck!

Can you please provide some references? I also wanna know how outdated or vulnerable libraries are exploited and how to bypass browser's security features
Reply
#6
(Nov 20, 2023, 11:58 PM)baphometmahomet Wrote:
(Nov 20, 2023, 03:49 PM)DredgenSun Wrote: There should be some good guides to look at on the boards man, take a look!

Can you provide some references please?

(Nov 20, 2023, 04:09 PM)poleeksperimentov Wrote: read these zines religiously, dozens and dozens of times, and then apply it to the real world

Thanks for the links! They're great and I've read through them. I'm interested to know how they scan the IP without getting blocked

(Nov 20, 2023, 04:10 PM)TechMasterX123 Wrote: well, it can be phishing, malware, some weak or leaked credentials, outdated software or libraries that present vulnerabilities, misconfigurations, etc, or there are also some public log data sometimes, that are not well configured not to be seen. There is a lot of extra information in the other sections, the community provides several useful resources for you to learn and understand better, good luck!

Can you please provide some references? I also wanna know how outdated or vulnerable libraries are exploited and how to bypass browser's security features

Just look through the 'cracking' subsections, there's plenty of info and examples there!
"Universal appeal is poison masquerading as medicine. Horror is not meant to be universal. It's meant to be personal, private, animal"
Reply
#7
(Nov 21, 2023, 01:12 PM)DredgenSun Wrote:
(Nov 20, 2023, 11:58 PM)baphometmahomet Wrote:
(Nov 20, 2023, 03:49 PM)DredgenSun Wrote: There should be some good guides to look at on the boards man, take a look!

Can you provide some references please?

(Nov 20, 2023, 04:09 PM)poleeksperimentov Wrote: read these zines religiously, dozens and dozens of times, and then apply it to the real world

Thanks for the links! They're great and I've read through them. I'm interested to know how they scan the IP without getting blocked

(Nov 20, 2023, 04:10 PM)TechMasterX123 Wrote: well, it can be phishing, malware, some weak or leaked credentials, outdated software or libraries that present vulnerabilities, misconfigurations, etc, or there are also some public log data sometimes, that are not well configured not to be seen. There is a lot of extra information in the other sections, the community provides several useful resources for you to learn and understand better, good luck!

Can you please provide some references? I also wanna know how outdated or vulnerable libraries are exploited and how to bypass browser's security features

Just look through the 'cracking' subsections, there's plenty of info and examples there!

Thanks! I thought that was for cracked accounts and didnt pay much attention but those tabs are gems
Reply
#8
(Nov 22, 2023, 09:49 PM)baphometmahomet Wrote:
(Nov 21, 2023, 01:12 PM)DredgenSun Wrote:
(Nov 20, 2023, 11:58 PM)baphometmahomet Wrote:
(Nov 20, 2023, 03:49 PM)DredgenSun Wrote: There should be some good guides to look at on the boards man, take a look!

Can you provide some references please?

(Nov 20, 2023, 04:09 PM)poleeksperimentov Wrote: read these zines religiously, dozens and dozens of times, and then apply it to the real world

Thanks for the links! They're great and I've read through them. I'm interested to know how they scan the IP without getting blocked

(Nov 20, 2023, 04:10 PM)TechMasterX123 Wrote: well, it can be phishing, malware, some weak or leaked credentials, outdated software or libraries that present vulnerabilities, misconfigurations, etc, or there are also some public log data sometimes, that are not well configured not to be seen. There is a lot of extra information in the other sections, the community provides several useful resources for you to learn and understand better, good luck!

Can you please provide some references? I also wanna know how outdated or vulnerable libraries are exploited and how to bypass browser's security features

Just look through the 'cracking' subsections, there's plenty of info and examples there!

Thanks! I thought that was for cracked accounts and didnt pay much attention but those tabs are gems

There's something for everyone in this place dude Big Grin
"Universal appeal is poison masquerading as medicine. Horror is not meant to be universal. It's meant to be personal, private, animal"
Reply
#9
(Nov 20, 2023, 04:09 PM)poleeksperimentov Wrote: read these zines religiously, dozens and dozens of times, and then apply it to the real world

thank you, very interesting
Reply
#10
in most case:
sqli > db dump
idor > sensitive information dump
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Telegram Opsec Guide Synaptic 50 2,457 2 hours ago
Last Post: pavaia
  PwnForums IP Address/ Nameservers unret 2 79 3 hours ago
Last Post: justscyprus
  EvilCrowRF web custom firmware / C1101x2 + esp32 / bruteforcer/ jam / rolljam / kaiju H4rDw4Y 13 2,833 3 hours ago
Last Post: newxiao1
  FREE 3 UNCENSORED HACKING LLM QaboosbinSaidAlSaid 75 2,697 6 hours ago
Last Post: killerdiller27
  Largest Discord User History Archive - 10m+ Users Mega 332 43,366 10 hours ago
Last Post: nezperce

Forum Jump:


 Users browsing this forum: 1 Guest(s)