top of page


Öffentlich·16 Mitglieder

Facebook Hack V 6.2 By Anonymous

Assistant U.S. Attys. Deirdre Eliot and Greg Staples maintain that Willman worked as an anonymous tipster, not as a police informant, and that his new declaration should be enough for the court reconsider his status.

Facebook Hack V 6.2 By Anonymous

I will explain the mathematical rationale for some standard advice, including clarifying why six characters are not enough for a good password and why you should never use only lowercase letters. I will also explain how hackers can uncover passwords even when stolen data sets lack them.

That is more than 62 trillion times the size of the first space. A computer running through all the possibilities for your 12-character password one by one would take 62 trillion times longer. If your computer spent a second visiting the six-character space, it would have to devote two million years to examining each of the passwords in the 12-character space. The multitude of possibilities makes it impractical for a hacker to carry out a plan of attack that might have been feasible for the six-character space.

You can check whether any of your passwords has already been hacked by using a Web tool called Pwned Passwords ( ). Its database includes more than 500 million passwords obtained after various attacks.

The reason is obvious: hackers could access the computer containing this list, either because the site is poorly protected or because the system or processor contains a serious flaw unknown to anyone except the attackers (a so-called zero-day flaw), who can exploit it.

For added safety, a method known as salting is sometimes used to further impede hackers from exploiting stolen lists of username/fingerprint pairs. Salting is the addition of a unique random string of characters to each password. It ensures that even if two users employ the same password, the stored fingerprints will differ. The list on the server will contain three components for each user: username, fingerprint derived after salt was added to the password, and the salt itself. When the server checks the password entered by a user, it adds the salt, computes the fingerprint and compares the result with its database.

Many computations must be done to establish the first and last column of the rainbow table. By storing only the data in these two columns and by recomputing the chain, hackers can identify any password from its fingerprint.

LulzSec, one of the other major hacker groups, is now compromised. Key members have been arrested and its leader Sabu is now working with the FBI. Still, Anonymous will continue on. Groups come and go, but the concept cannot be arrested. It's more like a bunch of individually owned businesses operating under a franchise. Ideas for attacks and operations are left up to people and groups to come up with and promote. If they do well and have wide-ranging support, they take place.

The users of these boards, united together by their views and thoughts, formed the first entity that can be called Anonymous. You have to understand the motivation behind what attracted people to imageboards like these, in order to understand the motivation of the current day Anonymous. Without a check on free speech, people could say and post whatever they wanted. This free marketplace of ideas grew and prospered as more and more people started posting and discussing topics openly. Soon the sense of "anonymous" was born. The idea that you don't have to be someone to be anyone.

Want to start making money as a white hat hacker? Jump-start your hacking career with our 2020 Premium Ethical Hacking Certification Training Bundle from the new Null Byte Shop and get over 60 hours of training from cybersecurity professionals.

Great write up on the history. The name anonymous serves as both a blessing and a curse as anyone can claim it. More and more it is becoming an easy scapegoat for nefarious deeds that stand in direct conflict with the roots of the movement. Understanding the roots really brings to light how bizarre it would be to think that the people behind the movement for freedom of information would want to shut down power or the internet. This is the same movement that helped bring unfettered access to the web in Egypt when the governments tried to shut it off.I think your description of chaotic neutral is spot on, though I get the sense that there is a set of fundamental moral values that drives the true core of the movement (even of a few individual outliers take it too far).

Great piece here! I look up to Anon not because of their methods, but because of their motives. Their methods are sketchy, but it is insane to think that these hacking incidents are worth over 100 years in prison. While Congress is busy working on reforming DNS and making the internet unstable, I think we really need to look more into the crime and punishment section of reform. This image ( ) embodies everything that is wrong with our legal system: it isn't written for a digital age. If someone vandalized a billboard, they won't get much time. If someone vandalizes a web page, they get years. If someone blocks traffic anywhere, even at #occupy protests where they obstruct passage, it's called a protest. If someone DOS attacks a web site, it's a crime. The same thing can be repeated for many more topics, such as piracy and information theft. The fact that it is digital should not affect the penalty.

The problem with Anonymous is, who are they. Are they really people trying to keep information free, or are they a Chinese hacking group probing US sites in preparation for a cyber attack?Or maybe Anonymous is just what they claim to be, But because of the high profile leaks, attempts by rouge members to extort money, or 'shut down' sites that don't agree with their particular ideology has given the government the excuse it needs to crack down on the chaotic nature of the Internet.In vowing to fight against information security, they have become what they are fighting against. An elite group of unknown people who believe they don't have to answer to anyone. (Sounds like Wall Street).For every action, there is a reaction. And the reaction is not always proportional to the initial action.My other problem is, I have difficulty trusting anyone wearing a mask. And anyone who says that they don't have the same issue, ask yourself this. What is the fist thing that comes to your mind when someone with their face covered confronts you?

I was trying to say that without a face, without a leader to turn into a dictator, the anonymous movement IS the means. So if you want the end they promote, you might as well agree with anonymous. Which is why until is would appear that the goals of the movement have changed, it doesn't matter who they are it matters what they say and do.

But that lack of organization is also turning into their downfall. Rogue members or persons claiming to be members are committing crimes under the name Anonymous. The average member of the public, while not completely trusting the government, does tend to believe what they see on tv. Some hacks they have performed have people people lives at risk. I live in a high crime city and while we don't blindly trust the police department to always have our best interests at heart, when ever there is a gang shooting (almost daily), the police are who we call. And when they are compromised, we feel compromised by proxy.

I think you can say that corruption is everywhere, but the fluid nature of anon allows for this argument to be made: since anonymous is a movement promoting certain goals and ideals and is not a group of its own anyone, even people who claim to be "anonymous", who act in contradiction of anon's principles are not actually anonymous. Things get hairy and semantic at about this point so I don't want to get into it, but I hope you see what I'm saying...

Many of the exposed email addresses are linked to cloud storage services. If hackers were to launch successful phishing attacks on these users, they could gain deeper access to personal photos and business information.

Yahoo disclosed that a breach in August 2013 by a group of hackers had compromised 1 billion accounts. In this instance, security questions and answers were also compromised, increasing the risk of identity theft. The breach was first reported by Yahoo while in negotiations to sell itself to Verizon, on December 14, 2016. Yahoo forced all affected users to change passwords and to reenter any unencrypted security questions and answers to re-encrypt them.

This database was leaked on the dark web for free in April 2021, adding a new wave of criminal exposure to the data originally exfiltrated in 2019. This makes Facebook one of the recently hacked companies 2021, and therefore, one of the largest companies to be hacked in 2021.

In November 2018, Marriott International announced that hackers had stolen data about approximately 500 million Starwood hotel customers. The attackers had gained unauthorized access to the Starwood system back in 2014 and remained in the system after Marriott acquired Starwood in 2016. However, the discovery was not made until 2018.

In October 2016, hackers collected 20 years of data on six databases that included names, email addresses and passwords for The AdultFriendFinder Network. The FriendFinder Network includes websites like Adult Friend Finder,,,, and

Quora, a popular site for Q&A suffered a data breach in 2018 exposed the personal data of up to 100 million users.The types of leaked data included personal information such as names, email addresses, encrypted passwords, user accounts linked to Quora and public questions and answers posted by users. There was no evidence discovered that anonymously posted questions and answers were affected by the breach.

In late 2016, Uber learned that two hackers were able to access the names, email addresses, and mobile phone numbers of 57 million users of the Uber app. They also got the driver's license numbers of 600,000 Uber drivers. In addition, the hackers were able to access Uber's GitHub account, where they found Uber's Amazon Web Services credentials.


Willkommen in der Gruppe! Hier können Sie sich mit anderen M...
Gruppenseite: Groups_SingleGroup
bottom of page