Skip to main content

Questions tagged [black-hat]

Black hat hacking is the act of using computer security hacking for illegal means, usually to compromise high value computer systems. It is the opposite of white hat hacking.

1 vote
1 answer
143 views

Does black hat always equal illegal? [closed]

I often hear of black-hat hacking discussed as if it was synonymous with illegal hacking. In other words, an act of hacking is black-hat iff it is illegal. Our own tag wiki for black-hat defines it as ...
Robert Columbia's user avatar
-1 votes
4 answers
770 views

Do black hat hackers or even hacktivists use penetration testing tools?

I was reading digital forensics as part of my curriculum and came across some tools used for hacking (ethical hacking aka pentration testing). There is a bunch of tools out there. I was wondering if ...
sweetpoision10's user avatar
0 votes
1 answer
713 views

What can my ISP see regarding my VPN tunnel? [duplicate]

I use the free version of proton VPN because it has such a nice interface. From my understanding, when I connect to one of their VPNs located in the US, my information passes through an encrypted ...
thinksinbinary's user avatar
2 votes
0 answers
3k views

how to create random request time delay in sqlmap?

How can i configure sql-map to try payloads at random time delay? as an example time between first and second request can be 0.10s and second and third might 0.25 and so on. i know there is --delay ...
thunder's user avatar
  • 21
29 votes
9 answers
10k views

How can an administrator secure against a 0day before patches are available?

I'm working on a thesis about the security hacker community. When a 0day is published, how can an administrator secure his application/website between the time the 0day is published and the patch is ...
K.Fanedoul's user avatar
3 votes
0 answers
959 views

What reason would you use the decoy scan option for Nmap?

I'm confused as to why you would use the -D option for Nmap. Is there any 'white hat' reason for using it? Or is it used particularly for malicious purposes?
ssharma's user avatar
  • 171
39 votes
4 answers
11k views

Is demanding a "donation" before disclosing vulnerabilities black hat behavior? [closed]

We have been contacted by an "independent security researcher" through the Open Bug Bounty project. First communications were quite OK, and he disclosed the vulnerability found. We patched the hole ...
Jacco's user avatar
  • 7,712
1 vote
2 answers
316 views

Do the 'bad guys' create honeypots?

I know companies, governments, and other organizations create honeypots (ex: SQLi pages, Open Access Points, Open Ports, etc.) to lure in the bad guys. Are there any examples of the bad guys creating ...
Peter's user avatar
  • 45
-2 votes
2 answers
369 views

I developed a very disruptive program with major implications. What next? [closed]

Long story short and without giving away too many details, I and my business partner came up with an idea for a program. It essentially bypasses the monetization feature of another piece of software ...
user152225's user avatar
0 votes
1 answer
433 views

Penetration Testing Methodologies

I have some issues regarding the concept of black, grey and white hat. Where and in what penetration testing methodology I can find the black, grey or white hat concept definition?
Lucian Nitescu's user avatar
7 votes
3 answers
4k views

Why aren't ransomware deployers arrested? [closed]

Why aren't people who use ransomware to extort money from people arrested? Using ransomware is illegal, presumably. The idea that Bitcoin is anonymous is a myth. Given this, it seems like they ...
Christopher King's user avatar
2 votes
0 answers
388 views

OpenPGP smartcards compromised by blackhat 2015 simcard hack?

This blackhat was a new sidechannel attack in the SIM-card AES encryption announced. I am currently using the OpenPGP smart/SIM-card version 2.1 to store my PGP-private keys, which is the same model ...
JThree's user avatar
  • 131
0 votes
0 answers
59 views

Could someone compare basic anonymity vs basic computer hacker anonymity? [duplicate]

So, let's say one just doesn't want the government/corporations to know what they are doing online. Let's say, for example, that they just don't trust the NSA, FBI, Google, etc. So what are the steps ...
user3695903's user avatar
3 votes
1 answer
274 views

Mentioned On A Blog By A "Hacker" - Should I Care?

Some (insert noun here) who seems to be a black hat hacker thinks that I am his #1 enemy and has posted some of my information on his blog. He is mad because I am advertising for others. The ...
SameOldNick's user avatar
2 votes
2 answers
2k views

How much are 0-days worth? [closed]

I got discussing this topic with someone recently and we couldn't reach a consensus so I thought I should ask here. There are commonly thrown around figures regarding the cost of buying a remotely-...
NULLZ's user avatar
  • 11.5k

15 30 50 per page