Follow us on Twitter!
It is never to LATE to become what you never WERE.
Wednesday, April 23, 2014
Navigation
Home
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
Learn
Communicate
Submit
Shop
Challenges
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Other
Members Online
Total Online: 28
Guests Online: 24
Members Online: 4

Registered Members: 82885
Newest Member: ConiBE
Latest Articles
View Thread

HellBound Hackers | Computer General | Hacking in general

Page 2 of 2 < 1 2
Author

RE: Breaking into peoples personal computers


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 07-05-08 19:58
If you have physical access to the computer, the computer is as good as owned. In terms of obtaining initial remote ownage of a system, the two methods that I have had most success with are Social Engineering and Phishing.

I am always trying to learn more about finding and exploiting naturally occurring technical vulnerabilities in order to increase the number of systems I can compromise and explore.


Page 2 of 2 < 1 2