HomeBlogAbout
2226.1k

hacking: security in practice


Public description

A subreddit dedicated to hacking and hackers.

Constructive collaboration and learning about exploits, industry standards, grey and white hat hacking, new hardware and software hacking technology, sharing ideas and suggestions for small business and personal security.#### Description A subreddit dedicated to hacking and hacking culture.

What we are about: quality and constructive discussion about the culture, profession and love of hacking.

This sub is aimed at those with an understanding of hacking - please visit /r/HowToHack for posting beginner links and tutorials; any beginner questions should be directed there as they will result in a ban here.

Guides and tutorials are welcome here as long as they are suitably complex and most importantly legal!

Bans are handed out at moderator discretion.

  • Read our rules
  • Read our wiki

Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...

Damn kids. They're all alike.

###Rules:

  1. Keep it legal Hacking can be a grey area but keep it above board. Discussion around the legality of issues is ok, encouraging or aiding illegal activities is not

  2. We are not your personal army. This is not the place to try to find hackers to do your dirty work and you will be banned for trying. This includes:

    • Asking someone to hack for you
    • Trying to hire hackers
    • Asking for help with your DoS
    • Asking how to get into your "girlfriend's" instagram
    • Offering to do these things will also result in a ban
  3. No "how do i start hacking?" posts. See /r/howtohack or the stickied post. Intermediate questions are welcomed - e.g. "How does HSTS prevent SSL stripping?" is a good question. "How do I hack wifi with Kali?" is bad.

  4. No "I got hacked" posts unless it's an interesting post-mortem of a unique attack. Your nan being phished doesn't count.

  5. Sharing of personal data is forbidden - no doxxing or IP dumping

  6. Spam is strictly forbidden and will result in a ban. Professional promotion e.g. from security firms/pen testing companies is allowed within the confines of site-wide rules on self promotion [found here]
    (https://www.reddit.com/wiki/selfpromotion), but will otherwise be considered spam.

  7. Off-topic posts will be treated as spam.

  8. Low-effort content will be removed at moderator discretion

  9. We are not tech support, these posts should be kept on /r/techsupport

  10. Don't be a dick. Play nice, support each other and encourage learning.

###Recommended Subreddits:

  • /r/HowToHack
  • /r/AskNetsec
  • /r/netsec
  • /r/security
  • /r/infosec
  • /r/securityCTF
  • /r/pwned
  • /r/malware
  • /r/ReverseEngineering
  • /r/privacy
  • /r/Piracy
  • /r/Tor
  • /r/onions
  • /r/lockpicking

The most common phrases the members use:

testing testing
apple devices
phone call

Similar subreddits:

Website