Ghost1pm
Members-
Content Count
65 -
Last visited
-
ChrisGhostYT started following Ghost1pm
-
How you can get Databases and Passwords Yourself no Need to Leech
Ghost1pm replied to Ghost1pm's topic in Cracking Tutorials
Thanks everyone!!! -
Thank you all for reply!!! enjoy
-
[PART 1] introduction [HACKING :THE ELITE ART!!!]
Ghost1pm replied to Ghost1pm's topic in Cracking Tutorials
Appreciate the reply looks like I need to polish this and start working on part 2. -
[PART 1] introduction [HACKING :THE ELITE ART!!!]
Ghost1pm replied to Ghost1pm's topic in Cracking Tutorials
Read whole you will find it interesting it is kinda of unpolised but I will fix it when I will get time read and recommend. -
How you can get Databases and Passwords Yourself no Need to Leech
Ghost1pm replied to Ghost1pm's topic in Cracking Tutorials
thanks for sharing Your welcome!!! -
How you can get Databases and Passwords Yourself no Need to Leech
Ghost1pm replied to Ghost1pm's topic in Cracking Tutorials
It is just few lines :kek: :kek: :kek: -
Free laptop you say?!?!?! :kek: :kappa:
-
How you can get Databases and Passwords Yourself no Need to Leech
Ghost1pm replied to Ghost1pm's topic in Cracking Tutorials
Thank you all new tutorial coming soon. -
i would love to get to know about a new tools thanks.
-
How you can get Databases and Passwords Yourself no Need to Leech
Ghost1pm replied to Ghost1pm's topic in Cracking Tutorials
happy to help part 2 under construction in which i will provide an tool which will automatically fetch the fresh databases and password with proxies. Oh dang, I'm looking forward to that, I can't quite figure out how this works and stuff xd. will share soon. -
How you can get Databases and Passwords Yourself no Need to Leech
Ghost1pm replied to Ghost1pm's topic in Cracking Tutorials
happy to help part 2 under construction in which i will provide an tool which will automatically fetch the fresh databases and password with proxies. -
need new version mine is getting old now. thanks
-
Sentry MBA 1.4.2 - Cracked (Up to 2k bots)
Ghost1pm replied to TheReaper989's topic in Cracking Tools
thanks brother i was searching for this one. -
hello, ladies and gentleman today we are going to discuss what is an hacker. it's type and some Acronyms and words regarding it. This is an part 1 of the series "HACKING : THE ELITE ART for more check out cracked.to and if you want to suggest some changes or want to share any amazing method from your collection then check out my contact information at the bottom of this tutorial. -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- [hide] Introduction :- I will guide you from noob to high or intermediate level. "wait... does this mean I will be able to hack facebook or join the anonmous." - calm your horses there as for facebook. I will teach you more then just facebook and as for joining anonmous i don't think they have any vacant seats as of yet. p.s :- just wait for this comment section to flood with those extraordinary people who will comment anonmous is not a group you idiot you can't join it. okay...let's get started :- so, you want to become an hacker huh. but you are confused which path you should choose.I will point you in right direction. note:- hacking is nothing like they show in hollywood movies. there is no software which will do all the hacking for you in one click. if you were here for that software then here is the link for it. https://media.giphy.com/media/Zv6Apawffpa2k/giphy.gif basically there are three major type of hackers :- The first is Black Hat Hackers. This is the type you probably are here for this type is also known as The "crackers". Hackers in this category are always tempted to gain privileges of someone's system without the authorization or permission. Usually for their own gains. as a team they can be deadly and their impact can cause trouble to a far greater extent. this is the type who earns the most and are major target of the authorities and those billionaires and millionaires who they stole from believe me those rich faggots are more major threat to you as their ego is hurted because a kid with some tools was able to stole millons from them. enough about the threats now lets get on with the profits in this type of hacking you will either become rich or die trying. I guarantee you that if you stay low and not try to hack nasa or some nuclear power plant or worse try to sell virginity of a drug lord's daughter(it's the worse speaking as of experience lol). after the end of this series I promise. you will be able to earn enough money to purchase that good bike and impress that chick you like. "wait... so you will not tell me any bullshit like do not go the blackhat way???." - even if I do tell you that at the end of the Day you will do what you desire so it's my duty to protect you from any harm.as if there will be no bad guys them the ones which are good will grow in quantity and destroy the earth anyway. bullshit alert!!! think of it as the forest in which there are lions and other grass eating animals if there will be no lions then the grass eating animals will grow in quantity and will eat all the grass and when there will be no grass they will die eventually. so if you chose the blackhat way then your psychology should be :- If they are hacked then it's their fault. there is no place for guilt. white hat hackers :- so, you are the good guy and want to do some good in this world. yes, they are considered the good guys. they are the type who oppose the Black hat hackers and are called White hat hackers and are infact the heroes to many. They are also designated as "Ethical Hackers". In fact, Ethical Hacking is a career in today's world for many. To be an approved as an White hat hacker, you need to be certified. But who cares about a certificate, when you can prove your skills. I would advice you to become the white hat hacker because there are many opportunities as those big companies are investing millons of dollars to prevent the blackhats.anonmous consider themselves white hats. remember The only way to stop a bad guy with a gun is a good guy with a gun. Grey Hat Hackers :- As you can probably imagine, these are those categories of hackers who hacks for both good and bad. They usually do Black hatting for their malicious intentions and do White hatting with good intentions. In short, they help and harm. and there are many more definitions available ont the internet like these are the type of hacker who make the site owner aware of their vulnerabilities to show how good of hackers they are and want fame for themselves. They most of the time don't do the hacking for money or good of people consider them the one joker meant in the dark knight gotham deserve high class of criminals not the ones who work for money they that type. The majority of the people fall in this category. So they are typical hackers and still a potential threat!!! Other types of Hackers "whoa you motherf**ker I thought you meant there are only 3 types." - yeah there are only three types but these are subcategories of those 3 fundamental types. Elite Hacker - A grade rank meant to describe the the most skilled/ reputed hackers. They knew/ discover the hacking methods that are still unknown and that are not been fixed. Script Kiddie - A lower rank than the above one that designates someone that uses tools made by others to do some stuff and they don't even know a shit about the real hacking. Neophyte - A much lower rank that describes a person that is a newbie to this matter and is having a little a knowledge about this matter. Hacktivist - As the name rhymes to "Terrorist", they are the people who hacks to inject some religious, political anarchy. Green Hat Hackers- As the name indicates, they love green. They hack only for money. They will not think about the cause. They just want the money from their slaves. that's all the types there are if I left any please do the honor to mention in the comment section I will get to learn a new type. -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- Are you an rookie in hacking and don't know the basic terms. don't worry I got you covered. bullshit alert!!! now there are going to be two types of people while reading this first ones will be like sam. sam :- s**t I am out enough of this f***er i know everything i can hack accounts of kids who play minecraft!!! and other one will be like jhon. jhonny :- Looks like ghost1pm did really hard work writing them(i just googled it and pasted them btw)!!! I should check them out it will be good for me. be like jhonny!!! and I promise you that you will go places. as of sam he will roam around forums and will be like you got an R.A.T i got an dog lol. i was an bad joke I know. anyways here are the Acronyms. ACRONYMS R.A.T :- Remote Administration Tool or Remote Access Trojan(according to some extra ordinary people). DDoS :- Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple ips. Amplification of power in the attack COULD occur VPS :- Virtual Private Sever SE :- Social Engineering HTTP :- Hyper Text Transfer Protocol. The foundation of data communication for the World Wide Web. SSH :- Secure Shell, used to connect to Virtual Private Servers. FTP :- File Transfer Protocol. Used for transferring files over an FTP server. XSS (CSS) :- Cross Site Scripting Malware :- Malicious Software Skid :- Script Kid/Script Kiddie DDoS :- Distributed Denial of Service VPN :- Virtual Private Networ Nix :- Unix based operating system, usually referred to here when referring to DDoS'in SQL :- Structured Query Language. It usually goes along with a word after it, such as "SQL |njection." FUD :- Fully Undetectable -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- WORDS FUD :- Fully undetectable, can be used in many terms. Generally in combination with crypters, or when trying to infect someone. LOIC/HOIC :- Tool(s) used by many anonymous members to conduct DDoS attacks. It is not recommended to use these under any circumstances. Trojan :- A Trojan is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer. Botnet :- Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks. SQL Injection :- An SQL injection is a method often used to hack SQL databases via a website, and gain admin control of the site. Root :- Highest permission level on a computer, able to modify anything on the system without restriction. Warez :- Software piracy White Hat :- A "white hat" refers to an ethical hacker, or a computer security expert, who specializes in penetration testing and in other testing methods to ensure the security of a businesses information systems. (Good guy, per se) Rootkit (ring3 ringO) :- A powerful exploit used by malware to conceal all traces that it exists. Ring3 - Can be removed easily without booting in safemode. Ring0 — Very hard to remove and very rare in the wild, these can require you to format, it's very hard to remove certain ring0 rootkits without safemode. Script Kiddie :- A script kid, or skid is a term used to describe those who use scripts created by others to hack computer systems and websites. Used as an insult, meaning that they know nothing about hacking. IP Grabber :- A link that grabs someone’s IP when they visit it. DDoS :- Distributed denial of service. Flooding someones connection with packets. Servers or web-hosted shells can send packets to a connection on a website usually from a booter. VPS :- The term is used for emphasizing that the virtual machine, although running in software on the same physical computer as other customers’ virtual machines, is in many respects functionally equivalent to a separate physical computer, is dedicated to the individual customer's needs, has the privacy of a separate physical computer, and can be configured to run server software. Malware :- Software designed to do all kinds of evil stuff like stealing identity information, running DDoS attacks, or soliciting money from the slave. Phreak :- Phone Freaks. Hackers who hack cell phones for free calling. Free Long distance calling. Etc. Bot :- A piece of malware that connects computer to an attacker commonly using the HTTP or IRC protocal to await malicous instructions. Shell :- The common meaning here is a hacked web server with a DoS script uploaded to conduct DDoS attacks via a booter. ANSI Bomb :- ANS|.SYS key-remapping commands consist of cryptic-looking text that specifies, using ansi numeric codes to _redefine_keys. DOX :- Personal information about someone on the Internet usualy contains real name, address, phone number, SSN, credit card number, etc. Worm :- Software designed to spread malware with little to no human interaction. Deface :- A website deface is an attack on a site that changes the appearance of the site or a certain webpage Keylogger :- A software program that records all keystrokes on a computer's keyboard, used as a surveillance tool or covertly as spyware. Remote Administration Tool :- It's a general term for a hack that can let someone remotely control your computer with admin access. This is the end of part one of my series.i hope you enjoyed it as much I liked writing it .if you really liked it then give it an upvote and if you disliked it tell me in the comment section i will try to rectify the problem and most probabaly try to hire hitmen on you lol. chill i won't do a thing just enjoy the stay at cracked.to more parts will be up soon. for some more terms check out my thread KEYBOARD SHORTCUTS FOR BETTER CRACKING here https://cracked.to/Thread-Keyboard-Shortcuts-For-Better-Cracking "wait... i don't have a laptop you nincompoop how am i going follow your upcoming tutorials." - if that's the case then check out my tutorial on how to get a free laptop here. END WORDS :- if you did read all of that then give a pat on your back and if you really liked my continent then just write in the comment section :- "master please accept me as your apprintice" and you are in. thank you have a great day. - A series by Ghost1pm [/hide] -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- contact me here for anything but not how to lose virginity(guide under construction) My Discord :- DarkEth#8995 To pm me at cracked.to :- For donations to keep the bread and butter at my table to keep me fed up. BTC:- 17yFA5p4BQFKVp9Q8z82BxjRAGcw9E7AYk ETC:- 0x714b81624f1e4BFE590E8Be755d96e1018F2043a cracked.to creadits are also welcomed cracked.to to donate.
-
i want free laptop so much, i will write a song about you if it helps me :D gentleman your best wishes is enough.