Archive for the ‘hack’ Tag

The Phishing Guide Part 2 : Man-in-The-Middle

Saturday, June 17th, 2017

For a Phishing attack to be successful, it must use a number of methods to trick the customer into doing something with their server and/or supplied page content. There are an ever increasing number of ways to do this. The most common methods are explained in detail below, will include:

Man-in-the-middle Attacks

• URL Obfuscation Attacks

• Cross-site Scripting Attacks

• Preset Session Attacks

• Observing Customer Data

• Client-side Vulnerability Exploitation

I will go into more deatil about others in anouther post but today we are going to learn how to do Man-in-the-Middle attack

Man-in-the-middle Attacks One of the most successful vectors for gaining control of customer information and resources is through man-in-the-middle attacks. In this class of attack, the attacker situates themselves between the customer and the real web-based application, and proxies all communications between the systems. From this vantage point, the attacker can observe and record all transactions. This form of attack is successful for both HTTP and HTTPS communications. The customer connects to the attackers server as if it was the real site, while the attackers server makes a simultaneous connection to the real site. The attackers server then proxies all communications between the customer and the real web-based application server – typically in real-time. In the case of secure HTTPS communications, an SSL connection is established between the customer and the attackers proxy (hence the attackers system can record all traffic in an unencrypted state), while the attackers proxy creates its own SSL connection between itself and the real server.

Read the rest of this entry »

Guide to Steal From ATMs in The 1990s

Friday, June 2nd, 2017

 

NOTE: There has been a few files written about how to ‘RIP OFF’ ATM’s of  some sort but this file will not contain technical shit on the card tracks or a xxxyyyooo17ss type of format. This text will tell you how to rip off ATM’s without all of that technical stuff that you can’t really use because most of the stuff are too hard. So I give you methods on how you can defeat ATM’s with things you may or may not need to pay a-lot for! This file is real unlike a file I came across that a user uploaded on Blitzkrieg called KRAD#1 which I feel was written by 10year olds. That file is totally SHIT! Now there was a-lot of Valid writers on the subject of ATM’s but I feel they were on the subject of PINs & PANs which is very hard to do right. Read the rest of this entry »

Guide to Making Money Scamming Told by Prisoners

Wednesday, May 31st, 2017

      America is the land of opportunity – everyone knows that. Unfortunately, for a growing number of Americans, it is also the land of swindles, scams, cons and frauds. According to a recent Louis Harris Poll, 9 out of 10 Americans are hit by scammers each year. We are all susceptible to scams. This is the reason for publishing ScamNews, an informative, entertaining newsletter designed to show you how these fraudulent activities are perpetrated on the public. The material we have chosen to use comes from many sources, including the following:

. Real con artists, men and women, who reveal the secrets behind their plans to relieve you of your money and otherassets.

. Criminals in prison. We talk to people behind bars who tell of scams and fraud that led to their prison time. Some of their scams are old, some are as recent as the 6 o’clock news.

. Prosecutors, police, judges and attorneys.

We describe law citings from cases of scammers caught in the act. They give descriptions of the crimes, sentences received, and potential profit as well as potential loss to the victims. The final two sections will come from the readers. Business Scams will be from people who have been encouraged to swindle consumers as part of their job ‘duties’. While many of these practices are borderline legal, the majority are not. As one business owner put it bluntly, “Every dollar out of your pocket is a dollar in mine.” Reader Stories is as the name implies. Material is supplied by the average consumer and/or swindler. We encourage readers who have been victimized by scams and con- artists to write their own stories and submit them. While it probably won’t get you your money back, it may help save someone else from being conned. ScamNews is especially interested in getting stories from people who have committed cons. After all, that is where it begins.

We realize, of course, that not everyone who has pulled off a scam is a career shyster. Some do it out of financial need and it’s a one-time shot, others are inadvertently conned into helping a pro do his thing. These stories are written and edited for our readers’ protection. Names are never used except with the subject’s permission or in cases that have been resolved in the courts. Read the rest of this entry »

GUIDE TO (mostly) HARMLESS HACKING

Saturday, May 20th, 2017

GUIDE TO (mostly) HARMLESS HACKING

Beginners’ Series #2, Section 2.

Hacking into Windows 95 (and a little bit of NT lore)!
____________________________________________________________

Important warning: this is a beginners lesson. BEGINNERS. Will all you
geniuses who were born already knowing 32-bit Windows just skip reading this
one, OK? We don’t need to hear how disgusted you are that not everyone
already knows this.

PARENTAL DISCRETION ADVISED! Read the rest of this entry »