Welcome to Incels.is - Involuntary Celibate Forum

Welcome! This is a forum for involuntary celibates: people who lack a significant other. Are you lonely and wish you had someone in your life? You're not alone! Join our forum and talk to people just like you.

Cyber Incel Revolt?

Deviance

Deviance

Cyberbullying the Bullies
Joined
May 2, 2018
Posts
81
It's pretty easy to hack a chad or stacy's computer and have access to all of his or her social media accounts, emails, nudes, etc. There's a lot of potential to do all kinds of stuff... Their life revolves around social media anyways. What do you guys think?
 
JFL if you arent mr.robotmaxxing in 2018
 
on a serious note though this sounds like a fun way to run the incel rebellion
 
i would if i was higher iq
 
Easy?

Maybe if you have physical access to their comp and place a keylogger.
 
Through my adolescence I dreamed of getting nudes from my crushes, but never managed to.

I had a "hacker" friend once who managed to invade the MSN of one of them and showed me some conversations of her female friends talking about how I was ugly and she should avoid me. No joke.
 
Easy?

Maybe if you have physical access to their comp and place a keylogger.

It's easy to do it remotely with phishing. Basically you just trick them into opening a malicious document or file. You'd be surprised how many people fall for a well crafted phishing email. Afterwards you have remote access and can do whatever you want, even take pictures with the webcam (but the light will turn on and it'll spook them).

Another way is to just phish for credentials. It's possible to just phish for their facebook or instagram credentials by tricking them into entering those credentials in a phishing website. Most people have the same passwords for all their accounts anyways.

It's actually not that hard to do. It's mostly a matter of being persistent and really wanting to learn it... But you have to be motivated. You have to really want to learn it. I can show you some tutorials if anyone is serious.
 
It's easy to do it remotely with phishing. Basically you just trick them into opening a malicious document or file. You'd be surprised how many people fall for a well crafted phishing email. Afterwards you have remote access and can do whatever you want, even take pictures with the webcam (but the light will turn on and it'll spook them).

Another way is to just phish for credentials. It's possible to just phish for their facebook or instagram credentials by tricking them into entering those credentials in a phishing website. Most people have the same passwords for all their accounts anyways.

It's actually not that hard to do. It's mostly a matter of being persistent and really wanting to learn it... But you have to be motivated. You have to really want to learn it. I can show you some tutorials if anyone is serious.

Most big sites like facebook are going to be hardened against XSS and CSRF attacks. Facebook owns all the domains of similar spellings.
 
It's pretty easy to hack a chad or stacy's computer and have access to all of his or her social media accounts, emails, nudes, etc.
Is it possible to learn this power
 
Most big sites like facebook are going to be hardened against XSS and CSRF attacks. Facebook owns all the domains of similar spellings.

XSS and CSRF are rarely used.

Phishing exploits human stupidity, and there is nothing they can do to fix that. Nothing they can do to stop people from infecting themselves or handing over their passwords ;-)

For example, you can impersonate an email from their boss, teacher, university, coworkers, friends, etc.

For hacking their computer, you're tricking them into running malware basically. Then using the malware to dump their credentials or keylog it.

For credentials, they will never own all domains, especially since nowadays there are so many odd TLDs like .online, .rocks, .store, .tech etc. For example, currently, facebookportal.me is available. So is faceboook.fun. A lot of times phishing sites are hosted on hacked websites with completely irrelevant domains, and yet stupid people still fall for it.
 
Last edited:
you must be a good hacker. I'm friends with a guy who calls himself a good hacker (maybe he is bullshitting me) he says it's not easy, not these days anyway

I do believe the way Mr Robot gets passwords in the tv show is he uses a program that tries like 100 passwords a minute, it was very impressive
 
reminds me of guccifer. sounds harmless enough but the guy got sent to jail. but very interesting. how do you get virus malware though? tricking people to click on to something is easy but where would you even get that? not that I'm going to do it I'm illiterate in terms of programming let alone hacking.
 
I'm interested in learning more.
 
Last edited:
reminds me of guccifer. sounds harmless enough but the guy got sent to jail. but very interesting. how do you get virus malware though? tricking people to click on to something is easy but where would you even get that? not that I'm going to do it I'm illiterate in terms of programming let alone hacking.
Yes, but he hacked into some major high profile people. You think cops will give a damn if some chad gets hacked? Happens wayyy too often for them to care. Also, if you use proper precautions like Tor, it will be very very hard for them to catch you.

What you're looking for is a "remote administration tool" or RAT for short. There are paid versions, cracked paid versions, and open source (free). Paid and cracked RATs are easier to use, but may be backdoored. I prefer open source, but it's harder to use and may require using the command line. Some good examples:
Open source:
Meterpreter (Metasploit)
Pupy
PowerShell Empire

Paid/Cracked:
nj rat
jRAT (AKA Adwind)
Zyklon HTTP

You don't actually have to be technical to do this. Plenty of people (including kids) do this without even knowing how to code.
 

Similar threads

Sasukecel
Replies
101
Views
2K
stranger
stranger
Grodd
Replies
26
Views
244
Grodd
Grodd
R
Replies
3
Views
178
Acorn
Acorn
Clownworldcell
Replies
6
Views
452
Emba
Emba
Gogetacel
Replies
22
Views
356
AlexDelarge
A

Users who are viewing this thread

shape1
shape2
shape3
shape4
shape5
shape6
Back
Top