BlogHide Resteemsresteemedbillykeed (65)in hacking • 7 years agoHuman The Weakest LinkThe short video below might make you rethink how you use computers, mobile and technology. The bad guys got the mad skills and the government always playing catch up. We are all vulnerable to…resteemedshitcoinloard (25)in hacking • 7 years agoEstablishing 'reverse_http' MSF Connections Over Onions (no port forwarding)This solution doesn’t seem to be very well documented and I finally got around to testing it myself, so I’m dropping a quick demo. Reverse meterpreter connections require port forwarding, which…resteemedranuganteng (43)in hacking • 7 years agoCreating the Ideal Setting for Hacking on Mobile Devices@ranuganteng - For whatever reason, you want to set up a mobile device for hacking – or debugging. Search for a device that offers a solid base for mounting, hacking, debugging and testing. Also try…resteemedranuganteng (43)in hacking • 7 years agodelete postdelete postresteemedranuganteng (43)in hacking • 7 years agodelete postdelete postresteemeddhumphrey (61)in hacking • 7 years agoSocial Engineering - Everything You Need to KnowIn today's world of strong encryption and near-impenetrable software, more and more hackers are turning to social engineering to get things done. Before I get any further, let's define "social…resteemedbobross (38)in hacking • 7 years agoCIA can see your password! they have been infecting Wi-Fi routers for years: 'Home routers from 10 manufacturers, including Linksys, DLink, and Belkin, allow the CIA to monitor and manipulate incoming and outgoing traffic and infect connected devices.'Leaks and Tools from CIA and NSA keeps popping up on the internet these days. Quite scary what they are capable of doing! List of from wikileaks of effected wifi devices: Home routers from…resteemedabdelrazek1337 (25)in technology • 7 years agoHow to Become a HackerMost of us have a strong desire to become a hacker, but really don’t know where to start. If you are in a similar situation, this article will surely help you out. On a regular basis, I get a lot of…resteemedadnandillawar (29)in hacking • 7 years agoSouth Korean firm pays $1m to unlock filesIt is believed to be a record amount, although it is worth noting that many ransom payments are never made public. Nayana's chief executive revealed that the hackers initially asked for $4.4m…