Questions tagged [black-hat]
Black hat hacking is the act of using computer security hacking for illegal means, usually to compromise high value computer systems. It is the opposite of white hat hacking.
25
questions
1
vote
1
answer
143
views
Does black hat always equal illegal? [closed]
I often hear of black-hat hacking discussed as if it was synonymous with illegal hacking. In other words, an act of hacking is black-hat iff it is illegal. Our own tag wiki for black-hat defines it as ...
-1
votes
4
answers
770
views
Do black hat hackers or even hacktivists use penetration testing tools?
I was reading digital forensics as part of my curriculum and came across some tools used for hacking (ethical hacking aka pentration testing). There is a bunch of tools out there. I was wondering if ...
0
votes
1
answer
713
views
What can my ISP see regarding my VPN tunnel? [duplicate]
I use the free version of proton VPN because it has such a nice interface. From my understanding, when I connect to one of their VPNs located in the US, my information passes through an encrypted ...
2
votes
0
answers
3k
views
how to create random request time delay in sqlmap?
How can i configure sql-map to try payloads at random time delay?
as an example time between first and second request can be 0.10s and second and third might 0.25 and so on.
i know there is --delay ...
29
votes
9
answers
10k
views
How can an administrator secure against a 0day before patches are available?
I'm working on a thesis about the security hacker community.
When a 0day is published, how can an administrator secure his application/website between the time the 0day is published and the patch is ...
3
votes
0
answers
959
views
What reason would you use the decoy scan option for Nmap?
I'm confused as to why you would use the -D option for Nmap. Is there any 'white hat' reason for using it? Or is it used particularly for malicious purposes?
39
votes
4
answers
11k
views
Is demanding a "donation" before disclosing vulnerabilities black hat behavior? [closed]
We have been contacted by an "independent security researcher" through the Open Bug Bounty project. First communications were quite OK, and he disclosed the vulnerability found. We patched the hole ...
1
vote
2
answers
316
views
Do the 'bad guys' create honeypots?
I know companies, governments, and other organizations create honeypots (ex: SQLi pages, Open Access Points, Open Ports, etc.) to lure in the bad guys. Are there any examples of the bad guys creating ...
-2
votes
2
answers
369
views
I developed a very disruptive program with major implications. What next? [closed]
Long story short and without giving away too many details, I and my business partner came up with an idea for a program. It essentially bypasses the monetization feature of another piece of software ...
0
votes
1
answer
433
views
Penetration Testing Methodologies
I have some issues regarding the concept of black, grey and white hat.
Where and in what penetration testing methodology I can find the black, grey or white hat concept definition?
7
votes
3
answers
4k
views
Why aren't ransomware deployers arrested? [closed]
Why aren't people who use ransomware to extort money from people arrested?
Using ransomware is illegal, presumably.
The idea that Bitcoin is anonymous is a myth.
Given this, it seems like they ...
2
votes
0
answers
388
views
OpenPGP smartcards compromised by blackhat 2015 simcard hack?
This blackhat was a new sidechannel attack in the SIM-card AES encryption announced.
I am currently using the OpenPGP smart/SIM-card version 2.1 to store my PGP-private keys, which is the same model ...
0
votes
0
answers
59
views
Could someone compare basic anonymity vs basic computer hacker anonymity? [duplicate]
So, let's say one just doesn't want the government/corporations to know what they are doing online. Let's say, for example, that they just don't trust the NSA, FBI, Google, etc.
So what are the steps ...
3
votes
1
answer
274
views
Mentioned On A Blog By A "Hacker" - Should I Care?
Some (insert noun here) who seems to be a black hat hacker thinks that I am his #1 enemy and has posted some of my information on his blog. He is mad because I am advertising for others. The ...
2
votes
2
answers
2k
views
How much are 0-days worth? [closed]
I got discussing this topic with someone recently and we couldn't reach a consensus so I thought I should ask here. There are commonly thrown around figures regarding the cost of buying a remotely-...