Create an account

Very important

  • To access the important data of the forums, you must be active in each forum and especially in the leaks and database leaks section, send data and after sending the data and activity, data and important content will be opened and visible for you.
  • You will only see chat messages from people who are at or below your level.
  • More than 500,000 database leaks and millions of account leaks are waiting for you, so access and view with more activity.
  • Many important data are inactive and inaccessible for you, so open them with activity. (This will be done automatically)


Thread Rating:
  • 385 Vote(s) - 3.42 Average
  • 1
  • 2
  • 3
  • 4
  • 5
How hackers receive their stolen information?

#11
Quote:(03-13-2019, 07:49 PM)Nyx Wrote:

[To see links please register here]

Quote: (03-13-2019, 02:36 PM)mothered Wrote:

[To see links please register here]

Quote: (03-13-2019, 01:30 PM)Cyb3rNuX Wrote:

[To see links please register here]

Isn't that risky, as anyone can see source code and FTP information or attacker's email in it?

Not at all.

In terms of the email, the logs are sent In the form of a text file, directly to a random email account that was created using fictitious details whilst connected to a dedicated device with unidentifiable details, hooked onto a neighbor's AP using a VPN- It's server located on the other side of the globe. MAC address Is also spoofed. No risk whatsoever.

Yep this is the answer. So long as you make sure none of your own information is being passed on while creating the email account you''ll likely be safe.

While connected to a VPN and connected to internet (that isn't your own) then you'd sign up for an email address at something like ProtonMail (based in Switzerland, any non 14 Eyes email provider would work though) under a completely anonymous handle (ex: [email protected]). As long as you don't use any personal information that could be used to identify you then it'd be incredibly hard for anyone to trace the account back to you.

And if you're using a FUD logger that is obfuscated they're probably not going to be able to even break it open to obtain the email address in the first case. They'd need to be fairly closely watching their packet sniffer to catch when the information is transferred since like @mothered mentioned he sets his to only relay information once an hour.

Very well said.

ProtonMail Is certainly a good option. I've been using It for years, and It serves It's purpose extremely well.
Reply

#12
Quote:(03-13-2019, 07:49 PM)Nyx Wrote:

[To see links please register here]

Quote: (03-13-2019, 02:36 PM)mothered Wrote:

[To see links please register here]

Quote: (03-13-2019, 01:30 PM)Cyb3rNuX Wrote:

[To see links please register here]

Isn't that risky, as anyone can see source code and FTP information or attacker's email in it?

Not at all.

In terms of the email, the logs are sent In the form of a text file, directly to a random email account that was created using fictitious details whilst connected to a dedicated device with unidentifiable details, hooked onto a neighbor's AP using a VPN- It's server located on the other side of the globe. MAC address Is also spoofed. No risk whatsoever.

Yep this is the answer. So long as you make sure none of your own information is being passed on while creating the email account you''ll likely be safe.

While connected to a VPN and connected to internet (that isn't your own) then you'd sign up for an email address at something like ProtonMail (based in Switzerland, any non 14 Eyes email provider would work though) under a completely anonymous handle (ex: [email protected]). As long as you don't use any personal information that could be used to identify you then it'd be incredibly hard for anyone to trace the account back to you.

And if you're using a FUD logger that is obfuscated they're probably not going to be able to even break it open to obtain the email address in the first case. They'd need to be fairly closely watching their packet sniffer to catch when the information is transferred since like @mothered mentioned he sets his to only relay information once an hour.

Thank you both very much, I really appreciate those answers.
Reply

#13
Quote:(03-14-2019, 12:54 AM)Cyb3rNuX Wrote:

[To see links please register here]

Quote: (03-13-2019, 07:49 PM)Nyx Wrote:

[To see links please register here]

Quote: (03-13-2019, 02:36 PM)mothered Wrote:

[To see links please register here]

Not at all.

In terms of the email, the logs are sent In the form of a text file, directly to a random email account that was created using fictitious details whilst connected to a dedicated device with unidentifiable details, hooked onto a neighbor's AP using a VPN- It's server located on the other side of the globe. MAC address Is also spoofed. No risk whatsoever.

Yep this is the answer. So long as you make sure none of your own information is being passed on while creating the email account you''ll likely be safe.

While connected to a VPN and connected to internet (that isn't your own) then you'd sign up for an email address at something like ProtonMail (based in Switzerland, any non 14 Eyes email provider would work though) under a completely anonymous handle (ex: [email protected]). As long as you don't use any personal information that could be used to identify you then it'd be incredibly hard for anyone to trace the account back to you.

And if you're using a FUD logger that is obfuscated they're probably not going to be able to even break it open to obtain the email address in the first case. They'd need to be fairly closely watching their packet sniffer to catch when the information is transferred since like @mothered mentioned he sets his to only relay information once an hour.

Thank you both very much, I really appreciate those answers.

It's good to read the Information we've provided Is of benefit.
Reply

#14
thank you sharing this thread.. lot of info.
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

©0Day  2016 - 2023 | All Rights Reserved.  Made with    for the community. Connected through