Leaderboard


Popular Content

Showing content with the highest reputation since 10/20/2019 in all areas

  1. 1 point
    My hacking achievements and blog [interesting vulnerabilities exploited] Take a look at my hacking blog, have found vulnerabilities in a very unique way (found information disclosure) it's not your ordinary XSS or SQLI, so enjoy my post https://z0mbys.livejournal.com/266.html If youre interested in learning and for more things of course, join my server https://discord.gg/upr4CMJ
  2. 1 point
    HQ Leak This eBook is being sold on HackForums currently for $89.99 Don't Leech! Leechers will get reported ! Method: In this guide, I will show you how to make a huge amount of money (in Bitcoin) by abusing a new G2A Instant Refund Method that is being sold on HackForums. Read this eBook first as it's a core of my method: G2A Instant Refund Exploit eBook: https://anonymousfiles.io/iAEBuQNw/ G2A Instant Refund Exploit allows you to get any product from https://www.g2a.com/ completely for free. To make this method work, you will need some Bitcoin(because you will have to send a payment for these products, which will be returned to your wallet instantly after making a purchase - this is how this exploit works, but I won’t describe too much here,as everything is described in that eBook.) Many people are using this method just to get free games from G2A, when the best thing to do is to purchase Steam Giftcards instead. Steam Giftcards can be easily sold for Bitcoin on https://paxful.com/ for example. You can’t use VPN - because otherwise g2a won’t allow you to create an order. If we count the time for your Bitcoin transactions to get confirmations and the time you have to wait to create a new order, it's easy to calculate how much can you make daily with this method. So if you can’t change your IP every order, you can use it like 7-8 times per day. 7 * 5 products * 100 $ Giftcard = 3500$ So now you have Steam Giftcards worth $3500. Now what you need to do, is go to https://paxful.com/buy-bitcoin/steam-wal...00#content And sell your giftcards for real money. As you can see, for $100 Steam Giftcard, you will get $62.5 BTC. So if you buy $500 worth of Steam Giftcards, 7 times per day with G2A Instant Refund exploit, you can make ~$2200 BTC. Of course you can go for smaller amounts if you are scared that your BTC won’t be refunded or something, but so far I haven’t experienced any issues. Here’s a link to 50 EUR Steam Wallet Giftcard: https://www.g2a.com/steam-gift-card-50-e...0000258078 and the $100 one https://www.g2a.com/steam-gift-card-100-...0000258074 Some people are using this method to purchase Amazon giftcards, but there is one problem with Amazon - if g2a contacts them and say that these giftcards were stolen (by using exploit), they can remove your balance from your Amazon account and cancel your pending orders. If you purchase steam giftcards and sell them for Bitcoin on paxful.com, there is nothing g2a or paxful can do.
  3. 1 point
    NEW 'Off The Hook' ONLINE Posted 10 Oct, 2019 5:17:31 UTC The new edition of Off The Hook from 09/10/2019 has been archived and is now available online. "Off The Hook" - 09/10/2019 Download the torrent here!!!! View the full article
  4. 1 point
    NEW 'Off The Hook' ONLINE Posted 26 Sep, 2019 5:31:09 UTC The new edition of Off The Hook from 25/09/2019 has been archived and is now available online. "Off The Hook" - 25/09/2019 Download the torrent here!!!! View the full article
  5. 1 point
    Hello out there, missing binrev radio, rfa, bland inquisitor, dual parallel, stankdawg...please come back guys if just for once a month, come on guys i know its like years ago, but times are changing and still the same.
  6. 1 point
    I think my wife would kill me if I started putting together a step-by-step in our garage...
  7. 1 point
    Good stuff. I have a question and a comment. When a given CO serves multiple exchanges, is there a way to know which of those exchanges the announcement (and presumably other nearby test numbers) will be in, short of dialing them all? I don't believe there is, but just thought I would check. I hear *67 being dialed at the beginning of each call. If the purpose of this is to block caller id, I question the usefulness of this. I believe that dialing *67 just sets a flag saying not to display your caller id, but it still gets passed and recorded AFAIK. Of course, one can always use a VOIP or other service that does not pass caller ID (or better yet, lets you set whatever caller id you wish). Incidentally, I did try 9901 and 9902 for the exchanges in my CO (I am also served by Verizon NY, but in the 716 NPA). For one of the exchanges 9901, I get "Welcome to Verizon!" and instructions to press different touch tones depending whether I want repair, busy verification, etc. I doubt that this is a "main" public number, given that my CO is a WECO 5ESS Remote located a ways from the main office. AsteriskPhreak
  8. 1 point
    I lost access to an old hard-drive that crashed and needed to be destroy'ed. I was wondering if someone can throw me a grandcentral invite at infinite51@gmail.com Thanks Gents
  9. 1 point
    The link you provided only goes to a "buy custom recordings" page. Where do we get the Pat Fleet set?
  10. 1 point
    I have a valid working Google GrandCentral invite up for auction on eBay. AUCTION LINK
  11. 1 point
    Require Window Hardisk revovery tools , That can recover deleted files after the disc has been formatted.
  12. 1 point
    That is funny!!! drive to the store... the one with buttons on it... LOL for realsies! Can you ask her to make some funny answering machine messages we could put on our local machines?
  13. 1 point
    I think I started a similar thread some time ago. Someone (The always helpful Ohm I think ) told me to try TestDisk. Worked well for me and if you did not overwrite any data you might be able to restore your partition table.
  14. 1 point
    Did you just make up bullshit terms?
  15. 1 point
    Do not use any electronic device with a processor, yes, sell everything you own.. even your car and phones. You're unqualified, stupid... and from the looks of it, a blatant liar. Overwritten data cannot be recovered, the bits are irreparably lost, no company will be able to recover the data. The part of the disk untouched may be recoverable, but if the NTFS metadata was damaged... there will be no index of the files on the disk, basically the disk equivalent of a memory leak, bad pointer management. Go away! you're now a chef.. that's your new profession, bake me a cake as fast as you can!
  16. 1 point
    Sorry I should have explained further. When you add a phone number and label it as a cell phone, GrandCentral will auto-log you in the voicemail (GrandCentral's voicemail that is) when you call from your own phone. The easiest way to protect yourself from this is to label your cell phone as a non-cell phone. So for example, on my GrandCentral, my main number is my cell phone, however it's labeled as my "home phone" on GrandCentral, even though it's really a cell. This way I always have to enter a password, even from my own phone, thus preventing a spoofing intrusion as well.
  17. 1 point
    Pardon me if this seems kinda n00bish but couldn't someone still get in my spoofing your home number? Just sounds like security through obscurity to me.. Of course it might be more difficult for someone to find your home number than your cell number but still...
  18. 1 point
    Agreed! I had seen Jane's picture a number of times, but never had seen Pat's picture before. RIP Jane Barbe! :cry: Allison Smith has a good voice, but nothing like these two!
  19. 1 point
    This has nothing to do with DNS, I think you mean DHCP settings. Here is an idea to get him off of your network. Turn off DHCP, clear client list, and shrink your subnet down to only allow for however many computers you have on your network. For example, if you have 5 computers on the network, configure your router's ip as 192.168.1.1 255.255.255.248. Then you will have 192.168.1.2-6 (5 IP's left for computers). This will shut him down. Then monitor your network for duplicate IP's. Or maybe he will give up and buy his own connection. By the way, what kind of dwelling do you live in? One thing I forgot to mention earlier is also change the internal IP range to something other than the default 192.168.x.x. Change it to some random 10.x.x.x network. This way it will be vary hard for him to jump back on.
  20. 1 point
    Can I get a .img of ur hd pl0x? Sure I'll just attach the image to a PM then, shall I? What could you possibly be planning on doing with 750GB of encrypted data anyway? >.>
  21. 1 point
  22. 1 point
    I use PGP Desktop's whole disk encryption instead. The decryption key is required to boot, and as soon as the computer is off, the hard-drive is completely inaccessible. That paired with the Windows XP memory dump feature (If enabled in the registry, pressing ctrl+scroll+scroll causes a BSOD, and the OS crashes -- instant shutdown ), keeps my computers nice & secure from potential "prying eyes". If I was really paranoid, I could set up a UDP client/server system whereby a key combination on any computer would knock em all off. It would have to be something quite obscure though, cause I'd hate to hit it while gaming. (I've had problems like that before )
  23. 1 point
    I'm not sure How much this would help but check the sites below http://www.planetmotox.net/monster_packs.php http://www.motox.info/showthread.php?t=1297 I had these in my bookmark, they might not be the exact thing you looking for,
  24. 1 point
    I dont have the charger for the computer, and it just died before I could get the info, so give me a day or so to get a charger for it then I can give you the info you need. and thx for the advice. moral police....
  25. 1 point
    i no what he means his saying that livinded said bebo is a game, and bebo is like myspace. and his saying that livinded is being rude to me telling me that know one is going to help me wasting their time on a script. when im posting in a nubiehq place.
  26. 1 point
    My town is served by a GTD-5, but I'm new to the phreak scene and not really sure what different things to try or record. If you guys have anything you'd like to know or try, let me know and I'll record it.
  27. 1 point
    Hi ths is ma first time here, umm i need some help about bebo is there anyway to add sound or something extra to bebo with perl? thanxx cyaz
  28. 1 point
    Hey I don't have a rootbeer, so I am going to ruin you're happiness.
  29. 1 point
    I usually do all my phreaking with my Digital Blue Mixman MP3 Producer Music Mixer
  30. 1 point
    Or even sites like pricewatch.com You can still find most of the older AMD Duron's and whatknot for $30-40.
  31. 1 point
  32. 1 point
    No, this particular box is running Windows.
  33. 1 point
    You might say that.
  34. 1 point
    strom: i think it's standard cosndiered standard etiquette that if you change the menu options on your PBX, you must have a message that says "please listen closely, as our menu options have changed"
  35. 1 point
    Yeah, I don't think AT&T had much choice in the matter. "You will cooperate with us," says the NSA, "or Bad Things will happen."
  36. 1 point
    after stearing at the image and trying four different numbers thats right 4 attempts 317-278-1529 you will hear a weird beeloop sometimes you are now in the conference
  37. 1 point
    Did you read my post? Fortunately, in this case, there is no thousands block pooling and the entire prefix is assigned to the switch.
  38. 1 point
    http://www.binrev.com/forums/index.php?showtopic=16467 I made a thread about this same thing last week or so. It's got more info in it. MODS: Please move to *nix forum.
  39. 1 point
    FreeSCO works well, as mentioned. I've had an old 486 running FreeSCO for several months without a reboot for anything other than software updates or adding more interfaces. It's been running over 3 months unattended, with several power outages and the like, so it's reasonably stable.
  40. 1 point
    try setting up freesco and privoxy or some other proxy package of your choice. www.freesco.org has several proxy packages that will work
  41. 1 point
    The port number is largely irrelevant because almost all programs use TCP ports 1024-65355 for connections due to those BELOW 1024 are reserved. FTP runs over 20/21 but ever notice that your FTP transactions (data transfers) are typically carried over high number ports?
  42. 1 point
    All it shows is i60? I imagine that's the beginning of an ip address, you could try sniffing your own connection, to see what's going on
  43. 1 point
    I work with a lot of ex-employees of WorldCom and I heard a funny story about this guy maybe 6 months ago. I guess a little bit before he got indicted he had decided that the company was loosing WAY too much money due to the amount of coffee the average employee drank. He set a new rule that stated that managers and supervisors had to monitor how much of the company supplied coffee each employee consumed in a day. This all in an effort to find the myserious coffee thief that was putting WorldCom into bancruptcy. It turns out he knew all about coffee theft but claimed to have no idea about all that money "missing" .
  44. 1 point
    droops, whats going on with infonomicon? I'm not complaining, I'm just wondering.
  45. 1 point
    morgan webb is hotter though. espically in person
  46. 1 point
    It really would have been had I not seen it done better by Leo Laport before. Kevin even asked alot of the same questions and had him demo the same CID spoof that he did. When I first saw the broken I thought it was ok, I still do, but I lost a lot of respect for Kevin when I found out that he was regurgitating other hard work without giving proper credit. On the other hand, he has done a million times more than my ass has ever done so I give him credit for that. Morgan Webb > Sarah Lane
  47. 1 point
    I visited the haXXXor site, and amazingly found something interesting... Can anyone verify the truth or nontruth of this? I'm a little skeptical about this, because cash is anonymous and has no information about the person spending it, nor the person recieving it. Why would a system like yowcow be different. <obDigitalCashRant> We have cash, which for all intents and purposes is anonymous. The cash can be tracked through the system, but individuals making use of it can not be. Cash is also property. Why can we not have the equivilant of this in the electronic world? The algorithms exist, and have existed for a long time. Places like egold could in theory come close, but the partners it works with ensure that personally identifiable information exists, and egold does not guarantee that you have access to your money in all cases except a court order. At their discretion, they can deny you access to your property, so it's not at all the same. This sort of thing tends to bother me, on so many levels... </obDigitalCashRant>
  48. 1 point
    same goes for fark, it's really bad when it's big computer news, and the site gets farkdotted
  49. 1 point
    Gold coins? Oh yes, multi hundred dollars coins would be SO much better. Yea, and I mean, really, Mao China and Stalinist USSR, I mean, was it REALLY that bad? Sure, I mean, the government just killed millions of people, but only if they were terrorists. Man, im SO glad we dont have it that bad here. *Disclaimer: Don't reply to this attacking me. Because if you do so you take everything I say seriously. Which would be sad.
  50. 1 point
    people have been saying our society is bound to collapse any minute now for YEARS, i doubt any shit's gonna hit the fan anytime soon, probably in a couple hundred years, but we're here to stay for the short term at least.....until we run out of oil...but thats a differnet story