I am trying to make a Spectrum default wordlist. Characteristics include 12 min 15 max all lowercase and the last three character and number word patterns is 2 words (real) lowercase no uppercase followed by 3 number. words can be 4,5,or 6 letters long. How do I set the pattern on crunch to make this list?
The question was asked which is worse Ransom or Unprepared. Unprepared and here is why. I teach senior citizens how to spot e-predators on social media ie.Facebook. because they are at the highest risk level for e-fraud like romance and FB lottery scams. I teach how to look for clues like names, titles, contact info, pronoun switches, language tells, reverse image look ups, ect. I teach how to protect the three main things Name, Date of birth, SS number. because these are the minimum pieces of info to pull a credit card on you. This also is important because of everything else that is attached to this like friend and family and this weakness makes it easier to phish those people too.
Very, very good content! Would love to piggy back on this in a way to show what Windows admins using Intune, maybe defender for Endpoint, can do to help minimize some of these openings.
Estoy un paso más cerca de ti ALVARO URIBE VELEZ(aplica para todos los narcotraficantes y asesinos del MUNDO) ..... algun día te tendremos tras las rejas¡
@@garcand yep definitely "educational purposes". We learned that never click button. Even if you do just turn off your wifi, and then click on these buttons.
Just realize that making this content is tough and we are all putting ourselves out here to try to make this easier for you. Try to keep the comments constructive, that's what's nice about hacker culture is people are generally trying to help you grow.
A friend with weed is a friend indeed but a friend with Hash is better... Hash power to mine Bitcoin eh ohhhh😄 What's shocking is to realise that if I understood any of this ... never mind😑
Hey Null Bytes (and everyone) I just wanted to say that I agree with the point that though ppl have their concerns about things that are shown here and other places because it is giving 'ideas' to ppl that may do bad things with this knowledge.... The point is that these things already DO EXIST with already bad minded ppl and even worse groups of ppl working together to attack 'unwitting' ones running some network(s) at some place. So even if you were to be 'informing' someone of something they can use for bad (should it be in their heart to do so) the point is that there are even worse things going on by extremely well 'educated' and even 'masterminded' wrong-doers' that do these things as a 'way of life' and may even be working for ppl that are paying them to be very good at doing what is bad. Thus 'talking to middle schoolers' and opening up thir eyes to realities doesn't mean they are going to be PH.D kind of hackers 'over night' nor will they have that kind of knowledge ALONG with very important 'experience'
I really like how these videos share new methods and experiments to really understand how things work, rather it be malware or trojan-responses down to simple XML attacks and so forth to help me better understand how I can better protect a company or my networks.
Linux is a Kernel Ubuntu, Kali, Parrot are all OS that communicates with the same kernel. Debating about which one of those is better is like having 3 identical cars in different colors and trying to say which one is better. It's the same engine same tires same everything that matters. I doubt anyone ever installs a stripped-down base OS of Kali or a stripped base OS of Parrot they always install the one with preinstalled tools where they won't be using 90% of the tools included. You can install the tools that come with Kali on Ubuntu & you can do the same thing the same way. most "Real hackers" create custom distros in ubuntu or some other OS anyway so the debate is really stupid.