Discover and read the best of Twitter Threads about #Hacking

Most recents (24)

This is a curated list by @Hacker0x01 of Burp plugins!

ActiveScan++
Autorepeater Burp
Autorize Burp
BurpSentinel
Flow
Headless Burp
Logger++
WSDL Wizard

#cybersecurity #bugbountytips #hacking #webappsec #webhacking #pentesting

THREAD ๐Ÿ‘‡
@Hacker0x01 ActiveScan++: ActiveScan++ extends Burp Suiteโ€™s active and passive scanning capabilities. Designed to add minimal network overhead, it identifies application behavior that may be of interest to advanced testers.
portswigger.net/bappstore/3123โ€ฆ
@Hacker0x01 Autorepeater Burp: Automated HTTP request repeating with Burp Suite.
github.com/nccgroup/AutoRโ€ฆ
Read 13 tweets
Hoax Email Blast Abused Poor Coding in FBI Website
The FBI confirmed today that its fbi.gov domain name and Internet address were used to blast out thousands of fake emails about a cybercrime investigation
> krebsonsecurity.com/2021/11/hoax-eโ€ฆ by @briankrebs #hacking #infosec Image
According to an interview with the person who claimed responsibility for the hoax, the spam messages were sent by abusing insecure code in an FBI online portal designed to share information with state and local law enforcement authorities. Image
Late in the evening on Nov. 12 ET, tens of thousands of emails began flooding out from the FBI address eims@ic.fbi.gov, warning about fake cyberattacks. Around that time, KrebsOnSecurity received a message from the same email address.
Read 4 tweets
@Jeremy_Hunt As you know my @NHSuk care has been #blocked #hacked undermined from 1998 when my notes went 'missing'-looking back in the notes I do have, my low WBC, thyroid, immune, autoimmune conditions were covered up from 2001 #UKcorruption @EHRC @GOVUK
yumpu.com/xx/document/viโ€ฆ
@Jeremy_Hunt You ignored me from 2011-I paid for German medical care 2012-15 BUT #MI6 @GOVUK with @JointCtteNSS covering up-sadistically doctored my blood tests, blocked that care too from May 2014 @gmcuk putting my life at risk AGAIN
#UKCorruption @EHRC

opendemocracy.net/en/ournhs/whatโ€ฆ
Read 19 tweets
@Jeremy_Hunt As you know my @NHSuk care has been #blocked #hacked undermined from 1998 when my notes went 'missing'-looking back in the notes I do have, my low WBC, thyroid, immune, autoimmune conditions were covered up from 2001 #UKcorruption @EHRC @GOVUK
yumpu.com/xx/document/viโ€ฆ
@Jeremy_Hunt You ignored me from 2011-I paid for German medical care 2012-15 BUT #MI6 @GOVUK with @JointCtteNSS covering up-sadistically doctored my blood tests, blocked that care too from May 2014 @gmcuk putting my life at risk AGAIN
#UKCorruption @EHRC

opendemocracy.net/en/ournhs/whatโ€ฆ
Read 19 tweets
@Jeremy_Hunt As you know my @NHSuk care has been #blocked #hacked undermined from 1998 when my notes went 'missing'-looking back in the notes I do have, my low WBC, thyroid, immune, autoimmune conditions were covered up from 2001 #UKcorruption @EHRC @GOVUK
yumpu.com/xx/document/viโ€ฆ
@Jeremy_Hunt You ignored me from 2011-I paid for German medical care 2012-15 BUT #MI6 @GOVUK with @JointCtteNSS covering up-sadistically doctored my blood tests, blocked that care too from May 2014 @gmcuk putting my life at risk AGAIN
#UKCorruption @EHRC

opendemocracy.net/en/ournhs/whatโ€ฆ
Read 19 tweets
As you know my @NHSuk care has been #blocked #hacked undermined from 1998 when my notes went 'missing'-after this๐Ÿ‘‡looking back in the notes I do have it seems my low WBC, thyroid, immune, autoimmune conditions were covered up from 2001
#UKcorruption @EHRC
yumpu.com/xx/document/viโ€ฆ
CC Dick Neil Basu @MetCC @GCHQ @sajidjavid
@ukhomeoffice @NCA_UK @actionfrauduk #MI5 #MI6 @CQCProf @ict22 @MattHancock @DHSCgovuk @Jeremy_Hunt Why did you not respond to๐Ÿ‘†letter asking yet again for my #HumanRights-leave the #torture for another 3 yrs to date? #UKCorruption @EHRC
Read 18 tweets
As you know my @NHSuk care has been #blocked #hacked undermined from 1998 when my notes went 'missing'-after this๐Ÿ‘‡looking back in the notes I do have it seems my low WBC, thyroid, immune, autoimmune conditions were covered up from 2001
#UKcorruption @EHRC
yumpu.com/xx/document/viโ€ฆ
CC Dick Neil Basu @MetCC @GCHQ @sajidjavid @ukhomeoffice @NCA_UK @actionfrauduk #MI5 #MI6 @CQCProf @ict22 @MattHancock @DHSCgovuk @Jeremy_Hunt Why did you not respond to๐Ÿ‘†letter asking yet again for my #HumanRights-leave the #torture for another 3 yrs to date? #UKCorruption @EHRC
Read 18 tweets
Last October, a hacker gained control of a Bluetooth-enabled chastity cage and sent an unusual message to its users: โ€œYour cock is mine now.โ€ How secure are smart sex toys? @jduffinwolfe looks at how our private moments can come under threat. thewalrus.ca/your-sex-toy-mโ€ฆ 1/6
Sales of smart sex toys have surged this past year, as have security violations. Why is this happening? More here: thewalrus.ca/your-sex-toy-mโ€ฆ 2/6 #cybersecurity #hacking An illustration of an open pink eye surrounded by purple, bl
These devices risk a variety of breaches, from the nonconsensual gathering, release, or use of personal data to the easy discoverability of Wi-Fi or Bluetooth signals by other networked devices nearby. thewalrus.ca/your-sex-toy-mโ€ฆ 3/6 #Hacking #CyberSecurity
Read 6 tweets
Side Tweets about Hacking and Cryptocurrencies
#Monero #Bitcoin #Zcash #Hacking
I am misusing other people's toys. I've taken multiple cloud training classes recently. Many of the courses require you to set up your own cloud accounts.
Not all; some are managed by the training lab provider. Well, I used a bogus email to register. I never provided them with personal information. The lab is spun up for 24 hours. I have access to provision new infrastructure under their account. Let's mine some crypto!
Generate a new wallet.
Configure a 96 core machine with 1Tb of ram and 16 Telsa GPUs, because I'm not paying for it. I could easily spin up my attack infrastructure and hack away. Run my favorite mining software pasting in the new wallet.
Read 6 tweets
I truly wish more folks from the #infosec community took an active interest in our financial markets.

Many of us have been hacktivists, digital protesters, and advocates for change ever since we entered our first BBS board.

This is something we can understand...and change.
For those of you who are interested enough to read past the first tweet, I've been a pentester for going on 7 years, and have been obsessed with #hacking and #infosec ever since I was a teenager.

And I've felt more of a connection to people who think like that than anyone else.
For whatever reason, we seem to gravitate toward the idea of democratizing the internet and are huge advocates for freedom of speech, anti-censorship, and anti-authoritarian.

Somehow I have better relationships with nameless strangers on the internet than my family cuz of this.
Read 14 tweets
Day 4 Of #CyberSecurity/ #ethicalhacking for Beginners.

Vulnerabilities and attacks

A vulnerability is a weakness in design, implementation, operation, or internal control.

#SSOT #tech #hackers #hacking
Thread
1/13 Image
2/13
Backdoor
A backdoor in a computer system, a cryptosystem or an algorithm, is any secret method of bypassing normal authentication or security controls.
Denial-of-service attack

3/13
Denial of service attacks (DoS) are designed to make a machine or network resource unavailable to its intended users.
Read 13 tweets
Today I started compiling a list of twitter accounts of online media who write articles on #hacking, #cybersecurity, #pentest, #forensics, #osint etc

twitter.com/i/lists/144346โ€ฆ

In this thread๐Ÿงต I will tell you what project is behind each account on this list
@PenTestMag The online magazine devoted to penetration testing and IT security assessment pentestmag.com
@thehackersnews The most trusted, widely read, independent source for breaking news and tech coverage on #cybersecurity, #infosec, #hacking. thehackernews.com
@magcybersec Cybersecurity for everyone cybersecurity-magazine.com

@CyberSecurityM8 Source for cyber security news all around the globe cybersecuritymagazine.com
Read 15 tweets
1/17 ๐Ÿงต#CDNpoli #InfoSec #CDNmedia

To friends, a cautious warning; to nefarious actors, you're put on notice & the radar of #NatSec

During the writ my bank account was hacked repeatedly, likely to gain insight RE who might be paying me

On #Elxn44 day, $3,000 was stolen
2/17 ๐Ÿงต#InfoSec #CDNmedia

Soon after the #Elxn44 writ dropped, multiple IP addresses began #hacking my bank account

According to bank security (that happens to be the HQ for all #CDNpoli banking #NatSec security), every attack arose from @Rogers/@RogersHelps accounts
3/17 ๐Ÿงต#CDNpoli #InfoSec #CDNmedia

And by no means was it even typical hacking. It's the type that put #NatSec on full alert because it compromised bank security as well as my own security & overrode all the safeguards that banks have in place

Please let me explain...
Read 17 tweets
#Learn ๐Ÿ“š #Linux๐Ÿง:

A thread

Some useful Linux terminal keyboard shortcuts you should know to increase productivity. ๐Ÿ‘‡

#CodeNewbie #coder #computer #code #java #100DaysOfCode #golang #privacy #css #javascript #html #linuxfan #linuxwindows #linuxmint #linuxubuntu #linuxtips
1) Working With Processes๐Ÿ“ˆ
Use the following shortcutsโŒจ๏ธ to manage running๐Ÿƒ processes.
#linuxfan #linuxwindows #linuxmint #linuxubuntu #linuxtips #linux #programming #hacking #coding #python #cybersecurity #hacker #kalilinux #programmer #technology #coder #100DaysOfCode
2) Controlling the Screen๐Ÿ’ป
The following shortcutsโŒจ๏ธ allow you to control what appears on the screen.

#linuxfan #linuxwindows #linuxmint #linuxubuntu #linuxtips #programming #hacking #coding #python #cybersecurity #hacker #kalilinux #programmer #technology #100DaysOfCode
Read 10 tweets
The #UncleRat's FREE Courses & Labs Lists by @theXSSrat | Get Access For Free, & Mention Your Friends | LIKE RETWEET For Others ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ

#BugBounty #BugBountyTips #Hacking #Cybersecurity

Read This Thread ๐Ÿ‘‡
Read 8 tweets
1)The cross-chain interoperability protocol @PolyNetwork2 was attacked, and a total of more than 610 million US dollars were transferred to 3 addresses. The impact caused the transfer of large assets of the O3 Swap cross-chain pool.
2)The SlowMist security team has grasped the attacker's mailbox, IP, and device fingerprints through on-chain and off-chain tracking, and is tracking possible identity clues related to the Poly Network attacker.
3)With the technical support of SlowMistโ€™s partner Hoo and multiple exchanges, we found that the hackerโ€™s initial source of funds was Monero (XMR), which was then exchanged to BNB / ETH / MATIC on the exchanges.
Read 6 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!