Hello guest, if you read this it means you are not registered. Click here to register in a few simple steps, you will enjoy all features of our Forum.
Rules have been updated! Here

Tags
Author: adi - Replies: 0 - Views: 8117
Hacker Allegedly Hijacked Phone Numbers and Stole Millions of Dollars Worth of Crypto
Back on July 12th in California, a college student was arrested for being a participant in a group of crooks that allegedly hacked numerous cell phone numbers and stole over $5 million in Bitcoin and other cryptocurrencies.

With the assistance of his unnamed collaborators, 20-year-old Joel from Boston, MS hacked around 40 victims.

This was actually the very first case ever reported from individuals using SIM hijacking or SIM swapping, a technique that has been gaining popularity, to allege
Author: MaskedUser - Replies: 10 - Views: 9886
Basic Steps of Hacker or Ethical Hacker
1. Scanning Open Ports , Misconfig in Web App etc etc

2. Checking Vulnerabilities via Vulnerabilities Scanner

3 . Gaining Access Exploiting Vulnerabilities

4. Maintaining Access via FUD Malware

5 . Clearning Tracks / Logs to be Anonymous.

The most Important thing is to Be Anonymous in all these Activities which itself is a crime according to Cyber Laws.
How to be Anonymous :

Pre Activitity before trying all of them is to change mac address / Identity of Network Interface Card