View Single Post
Old 01-22-2014, 04:19 PM   #10
Scripter
_Al_GO_RYTHMIC
 
Scripter's Avatar
 
Join Date: May 2013
Posts: 644
Battle Record: 1-3



Rep Power: 0
Scripter drags down this site on a Masaii-levelScripter drags down this site on a Masaii-levelScripter drags down this site on a Masaii-levelScripter drags down this site on a Masaii-levelScripter drags down this site on a Masaii-levelScripter drags down this site on a Masaii-levelScripter drags down this site on a Masaii-levelScripter drags down this site on a Masaii-levelScripter drags down this site on a Masaii-levelScripter drags down this site on a Masaii-levelScripter drags down this site on a Masaii-level
Default

Quote:
Originally Posted by Witty View Post
Are you asking me to help you hack me?

No, just do it.
okay what you dont get is that the attack I was trying requires the victim to download a file, which when clicked and ran gives access to their files.
other ways would take much longer since I would have to scan your ports and find vulnerable software on your pc.
Just as I said before I am at home lol

This technique is often used on download sites.
__________________
http://www.youtube.com/user/toadill

Ⓖⓔⓣ ⓘⓝ ⓣⓗⓔ ⓑⓞⓦⓛ
I CAN’T LIVE WITHOUT
╔══════╦═╗╔═╦═══╦═╦═══╗
║░╔╗╔╗░║░║║░║╚══╣░║░╔═╝
║░║╚╝║░║░╚╝░╠══╗║░║░╚═╗
╚═╝░░╚═╩════╩═══╩═╩═══╝
¸.•*¨*•♫♪¸.•*¨*•♫♪¸.•*¨*•♫♪¸.•*¨*•♫♪

◕MUSIC◕LOVE◕LIVE◕LAUGH◕
☯█▄█ █ █▀█ █▄█ █▀█ █▀█ ♬
♬█▀█ █ █▀▀ █▀█ █▄█ █▀▀ ☯
❤ ♡ ❤ ♡ ❤♡ ❤ ♡ ❤ ♡ ❤ ♡ ❤♡

Last edited by Scripter; 01-22-2014 at 04:21 PM.
Scripter is offline   Reply With Quote