a random tech banner

/tech/ - Technology

Buffer overflow


New Thread
X
Max 20 files0 B total
[New Thread]

Page: Prev [1] [2] [3] [4] [5] Next | [Index] [Catalog] [Banners] [Logs]


Hey, i'm looking for someone who could spare me some BTC. I need it, in order to hire an hacker,  who''ll steal.... Even more BTC. When you sent BTC to my wallet, you'll get an cut of what hacker steals (max 33%).

BTC wallet: 361WKh1FeVqFHtSir7VszBGvrZ8TxQXnnm
10 replies omitted. Click to expand viewer


> do blockchain analysis on your wallet

> money laundering

> payouts from official government wallets

> connections to pedophile .onion sites

kill yourself


Blackhats For Bitcoin:

http://7vxqssmoa6hlrz2vgjw74huxjak3wazvwxa2pevgqnz6h55sir3fqvid.onion/index.html

Your number one darknet cybercrime solution.



thumbnail of techkhan.png
thumbnail of techkhan.png
techkhan png
(75.29 KB, 640x576)
Buy a thinkpad x230 and install heads. Write protect the flash chip. Put nail polish on the screws and take high resolution pictures to ensure signs of tampering. Do NOT use a HDD or SSD. They have DMA so a malicious firmware could do a lot of damage, use of USB is preferred since they do not have DMA. Completely remove the microphone, sound card, webcam and the WWAN card from the laptop. Remove the fan to prevent binary acoustic data transmission. Replace the default wifi card with a supported atheros card. Disable wifi when not in use, preferably by physically removing the card. Make your own independent Linux distro from scratch. Most Linux distros value convenience over security and will thus never have good security. Your only option is to make your own. Use musl instead of glibc, Libressl instead of openssl, sinit instead of systemd, oksh instead of bash, toybox instead of gnu coreutils to reduce attack surface. Enable as little kernel modules as possible. Use a hardened memory allocator. Apply strong SELinux and sandboxing policies. Restrict the root account heavily to make sure it never gets compromised. Disable JavaScript and CSS in your browser. Block all FAGMAN domains in your hosts file. Monitor all network requests. Do not use a phone. Never speak near anyone who owns a phone, they are always listening. Never use any non-corebooted technology made after 2006. Never leave your devices unattended. Tape triple layer aluminum foil all around your room as tempest shielding. Type really quietly as defense against audio keylogging. Use ecc ram to minimize rowhammer and rambleed. Encrypt everything multiple times with various different encryption implementations. Compile everything from source. Use hardened compilation flags. Always read through the source before installing something if possible. Only use the internet when absolutely necessary.


thumbnail of 1600709662254.jpg
thumbnail of 1600709662254.jpg
1600709662254 jpg
(187.57 KB, 900x1200)
 >>/14995/
> Back when 8chan died I tried looking for alternatives 


> and there was this danknet one that was fully peer to peer
See most people aren't going to through all the trouble to do that. Imageboards work best because
1) no registration required
2) you can write, post, see updates almost instantly instead of waiting for TOR to load up

That's what I think at least

> I grew to hate tech culture more during this time.
Just take a break from things, even things you enjoy. You should be getting your energy and spirits up afterwards







Hi everyone,
So I got scammed and sent money into some shady crypto brokerage. Noticeable amount, it'll take months for me to recover from that.
Now I want to try and have revenge. 

So far:
• Their website runs on a separate VPS
• Only SSH and HTTP/S ports are open
• I've found where the admin panel must be located, it requires basic HTTP auth
• The API is exposed but there is nothing useful, the real stuff seems to be in the admin panel
• I've started bruteforcing ssh "root" user, and "admin" panel user with rockyou list; I don't think that will work tho

Any ideas what could I try next? I'll go to sleep now but I'd be delighted to read your suggestions in the morning, thanks!



Hi, 

   I was hacked by a neighbour with friends whom decided to share my webcam footage for years, since I moved in the building when I was 12 we were neighbours.

I need to know what I need to know to find out who exactly hacked my camera, where that information is, and what I can do to know whom to give.. retribution to. 

If you know a hacking service then I'd consider that. 

The neighbour laughed when my father suddenly died and decided to spill the beans. But I don't think he is capable nor do I think he is worth my time in getting information from. He laughed the whole time, meanwhile he hits on children. I was stupid then and shrugged it off, I was 15 at that time basically. 

I need to know what you can share, what you would do, anything would help. 

My email is [email protected]. 

You can also reply here. 

Any information can be useful information. Any information you need, I can find my way to supply. I have friends still there, and they are willing to help.But we need more direction on how to attack and get the people who decided to share my webcam footage with people whom came to.. do more than just stalk me. 

Thank you,
Again anything will help,
Ionixx
IPS from the time when your webcam was in hjacked state know all of the info... Probably, your webcam had some ip port, so you just need to find it (probably some default for this model) and get info from ips, probably it could be done by police order. But there is a nonzero chance that time had passed and all info is vanished. So, goodluck, slowpoke.

holy meds schizo webcams dont typically store footage forever and sure as hell dont have a nice control panel on the world wide web where you can download years worth of footage



thumbnail of 655f41583536c000e76f0bf75f56f7bd-imagejpeg.jpg
thumbnail of 655f41583536c000e76f0bf75f56f7bd-imagejpeg.jpg
655f41583536c000e76f0... jpg
(41.56 KB, 659x659)


thumbnail of luuuv_mpv.png
thumbnail of luuuv_mpv.png
luuuv_mpv png
(1.25 MB, 1600x1400)
Friendly discussion about mpv configuration, encoding, image manipulation, video/audio downloading tools and other FOSS programs related to media consumption.
1 replies omitted. Click to expand viewer


thumbnail of svt-av1-psy.png
thumbnail of svt-av1-psy.png
svt-av1-psy png
(122.58 KB, 1220x140)
SVT-AV1-PSY had a major release. Update your scripts https://github.com/psy-ex/svt-av1-psy/releases/tag/v3.0.2

'''Changes from mainline
> --frame-luma-bias has been changed to --luminance-qp-bias, following mainline's implementation.
(...)

Quality & Performance
> --psy-rd can now be used with all tunes.

> --psy-rd has been optimized to slighly increase encoding speed.

> High quality svt-av1-psy psy-rd has been added, and is activated at --psy-rd>=0.6 while using presets 6 and slower. It can considerably increase the strength of psy-rd, greatly increasing visual quality at no rate cost. It's been implemented hrough some careful mode decision changes that occur when psy-rd influence is significant enough. The reason behind not implementing by default and limiting it to slower presets (=0.6.

> --spy-rd levels have been added for greater control over the visual tradeoff that spy-rd pathways provide. The available levels are 0/1/2: 0 is default, with spy-rd disabled. 1 is fully enabled spy-rd (intra mode decision sharpness and interpolation sharpness modifications) and 2 is partially enabled spy-rd (interpolation sharpness modifications only).

> --sharp-tx 1 --psy-rd 0.5 has been made default to increase high fidelity encoding performance.

> --noise-norm-strength 1 is now default. It provides a decent visual quality increase with minor tradeoffs. The recommended strength for tune 0/3 is still --noise-norm-strength 3.

Features
> --sharp-tx has been added and enabled by default; it disables conventional transform optimizations to provide a sharper output overall. In 2.3.0-B, it was enabled by default for tune 0/3. It has the effect, although unintended at the time, of making psy-rd much stronger, which is why it has been kept default. However, for improved user control, we've decided to make it a user controllable setting.

> --hbd-mds has been added as a setting. It can be used to change the bit-depth of the mode decision pipeline. By default, it respects presets defaults. At 1/2/3, it forces 10-bit+ (HBD) mode decision, 8/10-bit hybrid mode decision and full 8-bit mode decision. It has been made available because on faster presets, especially with psy-rd, forcing 10-bit mode decision can make a huge difference to quality.





Do any of you know where i can find ATM malware or do you guys know anything bout ATM jackpotting
i robbed ATMs using force b4 and know bout their insides.
im also a student in a compsci.



thumbnail of Matrix_Synapse_Tor_ArchLinux_Guide.pdf
thumbnail of Matrix_Synapse_Tor_ArchLinux_Guide.pdf
Matrix_Syn... pdf
(2.72 KB, 0x0)
hey guys i need help setting up matrix server/room accessible via element on mobile. i would need to have media support and a .onion link, e2e encryption. im setting up from ubuntu linux and the only thing i found so far is the doc down below


thumbnail of deepwebs.jpeg
thumbnail of deepwebs.jpeg
deepwebs jpeg
(8.67 KB, 735x386)
Anyone interested to have old school hacker chat anonymously? And I really mean it, truly anonymously. Anonymous deep webs chat using SSH, that's right, no web / js soykaf.
ysdr3c3j7odl3p2zu5vdyaphf5x65l4hc3i2hmuy4vx4svibnxonvsqd on the onion network and port is 1337 protocol SSH as mentioned earlier.
11 replies omitted. Click to expand viewer
 >>/15110/
>  What if the whole point is to keep absolute noobs out?

That defeats the point of anonymity. Anonymity comes in numbers. Less users = less diffusion of your identity.








Post(s) action:


Moderation Help
Scope:
Duration: Days

Ban Type:


0 replies | 0 file
Refresh
New Thread
Max 20 files0 B total

Page: Prev [1] [2] [3] [4] [5] Next | [Index] [Catalog] [Banners] [Logs]