Sent Pics Being Blackmailed Scam
So you or someone you know sent revealing pics to someone online pretending to be an attractive girl or guy that wanted to see you and now you've got some gross person saying they will blackmail you.
DO NOT PAY
Report their on the platform they are blackmailing on and block all contact. Do not respond to their demands, don't get one last word in about how much you hate them just block contact and move on.
That's it. Blackmail scammers have very little reason to actually send your pictures to anyone. Blackmail is a crime and a scammer sending your nude pictures to people is a sex crime.
If you already sent money to the scammers, contact your bank or credit card company. You may not be able to recover the money, unfortunately. But, you should not send more. The scammers will ask for more money until they can't get anymore from you. It's a hard lesson on scams but one you can recover from.
If you are still concerned about the potential blackmail after following the steps above, please understand that this is a scam and a crime. You are not alone and you should not be afraid of reporting it. Call your local police department.
If the police haven't been able to help you feel more secure or you want to know more about sex crimes, this website contains resources including chat lines:
https://www.rainn.org/resources
And, remember that no level of embarrassment is worth your life. Life is full of weird and embarrassing moments and they are temporary and not worth taking your life over. If a scam or sextortion or anything else has caused you to consider suicide, speak to someone you trust immediately, a police officer, family, a friend or contact the suicide hotline in your country.
So you or someone you know sent revealing pics to someone online pretending to be an attractive girl or guy that wanted to see you and now you've got some gross person saying they will blackmail you.
DO NOT PAY
Report their on the platform they are blackmailing on and block all contact. Do not respond to their demands, don't get one last word in about how much you hate them just block contact and move on.
That's it. Blackmail scammers have very little reason to actually send your pictures to anyone. Blackmail is a crime and a scammer sending your nude pictures to people is a sex crime.
If you already sent money to the scammers, contact your bank or credit card company. You may not be able to recover the money, unfortunately. But, you should not send more. The scammers will ask for more money until they can't get anymore from you. It's a hard lesson on scams but one you can recover from.
If you are still concerned about the potential blackmail after following the steps above, please understand that this is a scam and a crime. You are not alone and you should not be afraid of reporting it. Call your local police department.
If the police haven't been able to help you feel more secure or you want to know more about sex crimes, this website contains resources including chat lines:
https://www.rainn.org/resources
And, remember that no level of embarrassment is worth your life. Life is full of weird and embarrassing moments and they are temporary and not worth taking your life over. If a scam or sextortion or anything else has caused you to consider suicide, speak to someone you trust immediately, a police officer, family, a friend or contact the suicide hotline in your country.
RAINN
National Sexual Assault Hotline - RAINN
What To Expect When You Contact RAINN Since 1994, RAINN’s victim service programs have helped over 5 million survivors of sexual violence and their loved ones with support and resources that promote healing, hope, and courage. When you contact RAINN’s National…
If you want to learn new tech skill. I want to share this with any one who want to gain knowledge in HTML,CSS , JavaScript, React Js , Node Js . join this mentorship program
https://www.tgoop.com/ETHICALHACKERSCOMMUNITY2
https://www.tgoop.com/ETHICALHACKERSCOMMUNITY2
Telegram
Ethical Hackers Vol. 2
Acquire Content-Rich Courses and Tutorials here For Free.
Strictly for Educational purposes only💯
Strictly for Educational purposes only💯
Why Bruteforcing passwords does not work: how to calculate the amount of time it takes!
Written By @vimicito
I have recently been presented with a randomly allocated password of which I was curious to know: how much time will this take to crack by a bruteforce method?
First order of business is to look at the password (
If you are in doubt about the character set and the exponent as number of characters, consider a simpler passcode — a 4 digit PIN code. The character set is 0-9 for each digit, i.e. 10 possible states per digit. Those combinations can go from 0000 to 9999, both inclusive. This gives you 10.000 possible combinations, or
Next assumption I make will be based on the usage of the CUDA hashcat suite, a demonstration of which can be found here. Let's also assume that this password was stored as an MD5 hash in a database. This is because it's by far the easiest to crack, clocking in at several billions of hashes computed every second (abbreviated to GH/s as we continue), and it's the hashing algorithm shown in this video. In the video, Mike Pound has achieved around 33.5GH/s across the various GPU's.
The means by which this password is stored does matter, as it will determine our GH/s rate. Since we're using the weakest hashing format available for this exercise, we can conclude that all the other ones will make things slower still.
Okay, so let's say that our computer can crack MD5 hashes at 10GH/s (it's a simpler consumer desktop that does not have 4 fancy graphics cards in SLI in it), this will make our calculations easier. We need to divide this
Note however that the subtraction shortcut can only be used for numbers that have a matching base. In other words, if one of your numbers is decimal (base-10) and your other is binary (base-2), this won't work and you'll have to convert one to the other's numbering system first.
Now we have our amount of seconds we need to crack this password, which brings us into the time domain. This still very large number needs to be sliced up into larger chunks of time. 60 seconds for a minute, 60 minutes for an hour, 24 hours for a day, and 365 days for a year to be exact.
The calculation
There are other means of getting a WiFi password, such as WPS and evil twin attacks. But I hope that this post made clear that bruteforcing is not viable for passwords with even a moderately large length. Why not ask for the password instead? Frame it well and people may be willing to give it to you in under 5 minutes.
Written By @vimicito
I have recently been presented with a randomly allocated password of which I was curious to know: how much time will this take to crack by a bruteforce method?
First order of business is to look at the password (
gpjs2nuw43wy5
in this case, randomly generated) and determine its character set. In this password it is safe to assume that the character set will probably only include lowercase alphabetic characters, but it does have some numbers in it. This will result in our initial conclusion: 13 lowercase alphanumeric characters, i.e. (26+10)^13
possible combinations. Its result is around 1.7e+20
, and this will be the number we can base all our further calculations on. Even with a single uppercase character in your initial password, you'll have to account for uppercase anywhere else in your target password. This will result in your initial conclusion being (26+26+10)^13
instead, making it much more difficult to crack.If you are in doubt about the character set and the exponent as number of characters, consider a simpler passcode — a 4 digit PIN code. The character set is 0-9 for each digit, i.e. 10 possible states per digit. Those combinations can go from 0000 to 9999, both inclusive. This gives you 10.000 possible combinations, or
10^4
.Next assumption I make will be based on the usage of the CUDA hashcat suite, a demonstration of which can be found here. Let's also assume that this password was stored as an MD5 hash in a database. This is because it's by far the easiest to crack, clocking in at several billions of hashes computed every second (abbreviated to GH/s as we continue), and it's the hashing algorithm shown in this video. In the video, Mike Pound has achieved around 33.5GH/s across the various GPU's.
The means by which this password is stored does matter, as it will determine our GH/s rate. Since we're using the weakest hashing format available for this exercise, we can conclude that all the other ones will make things slower still.
Okay, so let's say that our computer can crack MD5 hashes at 10GH/s (it's a simpler consumer desktop that does not have 4 fancy graphics cards in SLI in it), this will make our calculations easier. We need to divide this
1.7e+20
by 1e+10
, or 10 billion. The cool thing about scientific notation is that you can just subtract the value behind e
for a division, so we end up with 1.7e+10
. Easy, and at big numbers like this super useful!Note however that the subtraction shortcut can only be used for numbers that have a matching base. In other words, if one of your numbers is decimal (base-10) and your other is binary (base-2), this won't work and you'll have to convert one to the other's numbering system first.
Now we have our amount of seconds we need to crack this password, which brings us into the time domain. This still very large number needs to be sliced up into larger chunks of time. 60 seconds for a minute, 60 minutes for an hour, 24 hours for a day, and 365 days for a year to be exact.
The calculation
1.7e+10/60/60/24/365
will end up in the number of years it will take to crack this password, ending our exercise. The number we end up with is a manageable, but still excessively large 540.9
years. Bruteforcing a password this large is not feasible with current GPU hardware, even with the weakest hashing algorithm MD5.There are other means of getting a WiFi password, such as WPS and evil twin attacks. But I hope that this post made clear that bruteforcing is not viable for passwords with even a moderately large length. Why not ask for the password instead? Frame it well and people may be willing to give it to you in under 5 minutes.
YouTube
Password Cracking - Computerphile
'Beast' cracks billions of passwords a second, Dr Mike Pound demonstrates why you should probably change your passwords...
Please note,at one point during the video Mike suggests using SHA512. Please check whatever the recommended process is at the time…
Please note,at one point during the video Mike suggests using SHA512. Please check whatever the recommended process is at the time…
Forwarded from Ethical Hackers Vol. 2 (EH Community Feed)
Create a Discord bot that scans and deletes malicious files uploaded on your Discord server with few lines of code: Example (https://github.com/GDATASoftwareAG/vaas/blob/main/typescript/examples/discordbot)
Forwarded from Ethical Hackers Vol. 2 (LESHII413)
KitPloit - PenTest Tools!
Email-Prediction-Asterisks - Script That Allows You To Identify The Emails Hidden Behind Asterisks
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBmB5GMJbTCNbXT-Z-8jVvPbukaFRZMJqyWX_Tki-ZJgoj8UeItC5iYjQKnQCyyZ204ycjDZtkgsJre2ekNx41TD6nTY2DbSPo3gFdNXhxd7ewvYExBXySuWtIEMtvbd95m1MqtH3fPUFSdE37-eKu-QHB_2pvKfXWKDETIcyoySdfEfhhunHw5CYJ/w640-h300/email-prediction-asterisks_1_email-asterisks.png
Email prediction asterisks is a script that allows you to identify the emails hidden behind asterisks. It is a perfect application for osint analysts and security forces. It allows to intelligently predict, using Intelx leaks, which emails are related to the person we are looking for. It also allows you to automatically obtain information from emails for manual analysis through a CSV dataset that is generated with the results.
Example of email with asterisks on Twitter
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBmB5GMJbTCNbXT-Z-8jVvPbukaFRZMJqyWX_Tki-ZJgoj8UeItC5iYjQKnQCyyZ204ycjDZtkgsJre2ekNx41TD6nTY2DbSPo3gFdNXhxd7ewvYExBXySuWtIEMtvbd95m1MqtH3fPUFSdE37-eKu-QHB_2pvKfXWKDETIcyoySdfEfhhunHw5CYJ/w640-h300/email-prediction-asterisks_1_email-asterisks.png
DEMO
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJPgxqI6BOolQ-x-0ptlYbA7CwM2H-Bh0Lha5icXO80DG-xqHHJbI5tJO-12JWSrUPQ3wnK7Ui90Gwd-OPFk0pn41nWed5AzxERxICl-mOF9yAjP0BHQwEOfpncMb0hzpO6Ea6kY3JLFBfYpjnUk2pzQFTeFzvrGJTNvCXk9g46A1LjmCHtw9WJ3Yc/w640-h342/email-prediction-asterisks_2_demo.gif
Installation
It's necessary to install the intelx library for python
git clone https://github.com/Quantika14/email-prediction-asterisks
pip3 install -r requiriments.txt
git clone https://github.com/IntelligenceX/SDK
pip3 install SDK/Python
You must put your api key here
# Directory: m/key.py
intelx = "HERE"
emailrep = "HERE"
Autor
* Twitter: @JorgeWebsec
* web: www.quantika14.com
Download Email-Prediction-Asterisks
Email-Prediction-Asterisks - Script That Allows You To Identify The Emails Hidden Behind Asterisks
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBmB5GMJbTCNbXT-Z-8jVvPbukaFRZMJqyWX_Tki-ZJgoj8UeItC5iYjQKnQCyyZ204ycjDZtkgsJre2ekNx41TD6nTY2DbSPo3gFdNXhxd7ewvYExBXySuWtIEMtvbd95m1MqtH3fPUFSdE37-eKu-QHB_2pvKfXWKDETIcyoySdfEfhhunHw5CYJ/w640-h300/email-prediction-asterisks_1_email-asterisks.png
Email prediction asterisks is a script that allows you to identify the emails hidden behind asterisks. It is a perfect application for osint analysts and security forces. It allows to intelligently predict, using Intelx leaks, which emails are related to the person we are looking for. It also allows you to automatically obtain information from emails for manual analysis through a CSV dataset that is generated with the results.
Example of email with asterisks on Twitter
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBmB5GMJbTCNbXT-Z-8jVvPbukaFRZMJqyWX_Tki-ZJgoj8UeItC5iYjQKnQCyyZ204ycjDZtkgsJre2ekNx41TD6nTY2DbSPo3gFdNXhxd7ewvYExBXySuWtIEMtvbd95m1MqtH3fPUFSdE37-eKu-QHB_2pvKfXWKDETIcyoySdfEfhhunHw5CYJ/w640-h300/email-prediction-asterisks_1_email-asterisks.png
DEMO
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJPgxqI6BOolQ-x-0ptlYbA7CwM2H-Bh0Lha5icXO80DG-xqHHJbI5tJO-12JWSrUPQ3wnK7Ui90Gwd-OPFk0pn41nWed5AzxERxICl-mOF9yAjP0BHQwEOfpncMb0hzpO6Ea6kY3JLFBfYpjnUk2pzQFTeFzvrGJTNvCXk9g46A1LjmCHtw9WJ3Yc/w640-h342/email-prediction-asterisks_2_demo.gif
Installation
It's necessary to install the intelx library for python
git clone https://github.com/Quantika14/email-prediction-asterisks
pip3 install -r requiriments.txt
git clone https://github.com/IntelligenceX/SDK
pip3 install SDK/Python
You must put your api key here
# Directory: m/key.py
intelx = "HERE"
emailrep = "HERE"
Autor
* Twitter: @JorgeWebsec
* web: www.quantika14.com
Download Email-Prediction-Asterisks
Forwarded from Ethical Hackers Giveaway☠️ (H5)
Okay so many of you always asking how to start in ethical hacking i am a "Beginner" so today i will tell you 10 steps to become Ethical hacker. ~Stay tuned~
Anonymous Poll
95%
Yeahhhhhhhhh
8%
Nooo i know better
🔰ROADMAP TO BECOME A HACKER (AN ETHICAL HACKER)🔰
Step 1 - Get hands on Linux/Unix => LINUX/UNIX is an open-source operating system that provides better security to the computer systems. As a hacker, there is no skipping LINUX because it is one of the most used OS for hacking and provides ample tools for hackers. Some of the common Linux distributions are, Red Hat Linux, Kali Linux, Ubuntu, BackTrack, etc. Kali Linux is one of the most used Linux systems and is specially customized for hacking.
Step 2 - Learn simple Programing language => start with learning python or C . Although it's not so important but its comes handy And let you use your brain more .
Step 3 - Learn networking concepts => You should have a knowledge of various networks, protocols since it is beneficial in exploiting vulnerabilities. Thus learning various networking concepts and various networking tools such as Wireshark, Nmap, etc will be really beneficial. Trust me, Hacking is all about playing around the Network
Step 4 - Learn how to be Anonymous => As a hacker, this is one of the important steps that one should know. As a hacker, you might do a lot of this, some might be legal, some might be without permission. Thus it is necessary to know how to be anonymous and how one can hide their identity online, So that there will be one trace left and no one can backtrace you.
Step 5 - Explore the hidden web => The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor, etc to be accessed.
You've no doubt heard talk of the “dark web” as a hotbed of criminal activity — and it is. But not everything is illegal, the dark web also has a legitimate side. Thus it is necessary to know a bit about what it is and how it works.
Step 6 - don't forget about cryptography =>Cryptography, also called the art of secret writing, It is something that as a hacker you should master. Encryption and Decryption are important skills in hacking. Encryption is widely used in several aspects of information security in authentication, confidentiality, and integrity of the data. Information on a network is always encrypted such as passwords, packets sent over the network, etc. Thus, as a hacker, it is necessary to identify the encryption and break it.
Step 7 - Dive Deep into Hacking => Once you have good knowledge about the topics discussed thus far, it's time to dive deep. Trying diving deep into hacking concepts and learning topics such as vulnerability assessment, penetration testing, SQL injections, and much more. In the field of hacking, learning is never-ending because security changes every day with new updates in the system.Thus you need to be updated with the latest tools and ways to crack a system or secure a system.
Step 8 - Experimenting and Practicing is the Key => After learning some concepts, sit back and nail them. Keep practicing them in various environments and various scenarios. Set up your own lab for experiment purposes. Use these labs to test various tools, attacks, and much more.
Step 9 - Keep discussing things with Elite Hackers => join us on discord and telegram that will help you to join discussions with other hackers in the world. This will help in exchange and sharing of knowledge and work as a team.
Last step but most important one => This is not one week or year process there is no limit of learning so keep patient & keep learning
❗There is very thin line to between Ethical or Unethical actions. With great power comes great responsibility.❗
☮️ALL THE BEST FOR YOUR JOURNEY ☮️
Step 1 - Get hands on Linux/Unix => LINUX/UNIX is an open-source operating system that provides better security to the computer systems. As a hacker, there is no skipping LINUX because it is one of the most used OS for hacking and provides ample tools for hackers. Some of the common Linux distributions are, Red Hat Linux, Kali Linux, Ubuntu, BackTrack, etc. Kali Linux is one of the most used Linux systems and is specially customized for hacking.
Step 2 - Learn simple Programing language => start with learning python or C . Although it's not so important but its comes handy And let you use your brain more .
Step 3 - Learn networking concepts => You should have a knowledge of various networks, protocols since it is beneficial in exploiting vulnerabilities. Thus learning various networking concepts and various networking tools such as Wireshark, Nmap, etc will be really beneficial. Trust me, Hacking is all about playing around the Network
Step 4 - Learn how to be Anonymous => As a hacker, this is one of the important steps that one should know. As a hacker, you might do a lot of this, some might be legal, some might be without permission. Thus it is necessary to know how to be anonymous and how one can hide their identity online, So that there will be one trace left and no one can backtrace you.
Step 5 - Explore the hidden web => The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor, etc to be accessed.
You've no doubt heard talk of the “dark web” as a hotbed of criminal activity — and it is. But not everything is illegal, the dark web also has a legitimate side. Thus it is necessary to know a bit about what it is and how it works.
Step 6 - don't forget about cryptography =>Cryptography, also called the art of secret writing, It is something that as a hacker you should master. Encryption and Decryption are important skills in hacking. Encryption is widely used in several aspects of information security in authentication, confidentiality, and integrity of the data. Information on a network is always encrypted such as passwords, packets sent over the network, etc. Thus, as a hacker, it is necessary to identify the encryption and break it.
Step 7 - Dive Deep into Hacking => Once you have good knowledge about the topics discussed thus far, it's time to dive deep. Trying diving deep into hacking concepts and learning topics such as vulnerability assessment, penetration testing, SQL injections, and much more. In the field of hacking, learning is never-ending because security changes every day with new updates in the system.Thus you need to be updated with the latest tools and ways to crack a system or secure a system.
Step 8 - Experimenting and Practicing is the Key => After learning some concepts, sit back and nail them. Keep practicing them in various environments and various scenarios. Set up your own lab for experiment purposes. Use these labs to test various tools, attacks, and much more.
Step 9 - Keep discussing things with Elite Hackers => join us on discord and telegram that will help you to join discussions with other hackers in the world. This will help in exchange and sharing of knowledge and work as a team.
Last step but most important one => This is not one week or year process there is no limit of learning so keep patient & keep learning
❗There is very thin line to between Ethical or Unethical actions. With great power comes great responsibility.❗
☮️ALL THE BEST FOR YOUR JOURNEY ☮️
Forwarded from Ethical Hackers Giveaway☠️ (H5)
🔰MEGA DROP!!! 🔰
♻️CEH v11 Study material ♻️
💬Content_type - Premium
❗PRICE: Free!
🔗 LINK: https://mega.nz/folder/GlYgkazA#D_pWUewe-96m9IJIz8ibvw
=== @Ethical_Hackers_Giveaway ===
♻️CEH v11 Study material ♻️
💬Content_type - Premium
❗PRICE: Free!
🔗 LINK: https://mega.nz/folder/GlYgkazA#D_pWUewe-96m9IJIz8ibvw
=== @Ethical_Hackers_Giveaway ===
mega.nz
File folder on MEGA
🔰UDEMY COURSE 🔰
🔴COMPLETE INTRODUCTION TO C++
🔴PRICE - FREE FOR 500 USERS
🔗 Link --
https://www.udemy.com/course/the-complete-introduction-to-c-programming/?couponCode=8E6406203AD9D72AF631
===@Ethical_Hackers_Giveaway===
🔴COMPLETE INTRODUCTION TO C++
🔴PRICE - FREE FOR 500 USERS
🔗 Link --
https://www.udemy.com/course/the-complete-introduction-to-c-programming/?couponCode=8E6406203AD9D72AF631
===@Ethical_Hackers_Giveaway===
Udemy
The Complete Introduction to C++ Programming
Learn all the Basics of C++ by practice and the creation of various basic C++ applications
Forwarded from Deleted Account
The_Hacker_Playbook_2_Practical_Guide_To_Penetration_Testing_PDFDrive.pdf
23.2 MB