TEMPLATE ERROR: Invalid data reference post.isFirstPost: No dictionary named: 'post' in: ['blog', 'skin', 'view'] By Nick Powell

Thursday, April 3, 2014

How to Internet Shopping without being tracked

Anonymous purchases are one more step in enhancing your privacy. Making an anonymous purchase can shield your identity, credit card, and give companies very little data about you. Anonymous purchases can withold your identity, and prevent large amounts of fraud. Purchasing items anonymously isn’t only used for criminals and illegal items as perceived by the public. Anonymous purchases are made to shield your identity, and keep your data to you. In this day an age with the N.S.A.and many other data harvesting giants, the least amount of data you give out, the better.

Why do I want to purchase items anonymously?

When purchasing items online, physical or digital, you give out a lot of data. Names, addresses, phone numbers, date of birth, gender, emails, and many other pieces of sensitive information. When you input it into the website, it just disappears and says “Congratulations”, or “Order Received”. You don’t actually see where your data goes. What if the website isn’t trusted, what will they do with that data?  If the website isn’t trusted, can they steal your card data? Or even if the website is trusted, will they sell that information to a third party? Is the data you just entered into that website online kept to them? Many valid questions may circulate when purchasing items online. With so many scams and fraudsters on theinternet, how can you decide if a website is trusted or not?

Why you do want anonymity when purchasing

You may want to shield your credit card data from hackers or unknown websites. You may not feel safe inputting your sensitive information into the website. You may not want an item to show up on a bill of yours. You may want to shield your identity from the internet. or you simply may just want some privacy, or anonymity!

3 ways to purchase physical goods anonymously

 1. Mask Me – Mask Me is a FREE disposable credit card service from the privacy company, Abine. You attach a credit card to their free disposable credit cards and it allows you to make %100 legal purchases online with a masked card. With a masked card you can save your identity, and credit card information. Also, the cards can NEVER be charged without your consent. You choose how much you want to add to a card, and that much will be on the card (you can refill cards or get new ones each time). You can choose to obtain a new card whenever needed. Also, on your credit card statement ALL charges will show up as ABINE,INC. You don’t use any of your real data (you can mask your address and use all of ABINE,INC’s info), and it masks your credit card provider from seeing what you do!
Other method:
Anonymity is very important to many internet users. By having your "e-identity" exposed online, you can be stuck with a number of unwanted issues, such as:
  • Privacy invasion.
  • Internet tracking.
  • Exposure to being hacked.
However, what if we wanted to spend money anonymously? This is actually a hard task when it comes to the internet. To purchase something on the internet, you need to have a debit or credit card. Alternatively, you can use a PayPal account, but that also needs a debit or credit card to activate and use. In real life, we can use cash to purchase something anonymously.
When you purchase something with a credit or debit card, the serial number of the item you bought is stored by the bank for statements and customer purchase records. This means anyone who has access to that information knows what you are purchasing.
Also, if you are using PayPal, you are likely not safe. PayPal uses your real information, and the average person does not use safe practices. Lets say you bought something online, the person you purchased from will have your name and address already. What if your security question is "Mother's maiden name" or "First house"? This information is easy to obtain when your PayPal holds accurate information.
In today's Null Byte, I am going to show you how to get around the anonymous spending dilemma.


  • Money for a prepaid debit card (at least 10 dollars will cover cost and put money on the card)
  • A PayPal account with real information and your bank account linked to it
  • Another shipping address (Optional)


To do any method of anonymous online spending, we first must purchase a prepaid debit card and activate it. They can be found at any gas station or supermarket.
  • During activiation DO NOT enter your social security number.
  • Pay for the card in cash.
  • Do not register the card with any of your real information, such as address and name.
For added anonymity, you may want to use Tor to anonymize your traffic and spending accounts, not just who is spending the money.

Anonymous PayPal Method

To spend cash anonymously on the net in the easiest, most universal way would be to use PayPal. Let's go through the steps to do it. For this example, lets purchase something from eBay.


  1. Open up your PayPal account with a fake name, address, etc. Make its information match the fake stuff that you enter when registering the debit card.
  2. Create an eBay account with the same information. This will be your spending and receiving account.
  3. Purchase something on eBay with your new PayPal account, and have it shipped to a friend's house under your fake name (to avoid the question being asked, packages are delivered according to address, not name). 


  1. Sell something on your fake PayPal account.
  2. After you receive payment and mail the goods, have your real PayPal and eBay accounts post an ad for a piece of paper.
  3. Sell the paper for the amount of money the goods were sold for to your fake account. This allows for a nice, natural-looking transfer. Anonymous.
You could also invest money into BTC, which is all anonymous.

By Nick Powell

Wednesday, March 12, 2014

PS4 Real Potential explained - Low Level

Everything is new and not much has been explained.This is just a transition. The normal transition any console generation has to do but this one is harder since the PS3 and Xbox 360 generation is still alive and kicking. 

So it will take longer. But expect the real next gen and real PS4 potential to be available in 2015.Thats the date where you will see whats going to happen with the next gen consoles. Most people just likes to talk and do some weird comparisions with PC but its just wrong. 

This is just a hint and from there just wait to see the reality in 2015 and the coming years. 

The PS4 system is the most advanced and complicated custom x86 system AMD has ever created. They said it , but some people ( most people ) just thinks they can laugh out about it with the ¨supercharged architecture¨ thing. 

And for the worse by just looking at todays performance and games , that is just nothing.

The PS4 has got 2x API overload but thats the lower limit.At some situations it can be up to 10x. The PS4 has an APU-HSA, The CPU can help the GPU in situations of extreme loads. Also using the parallelism system and the GDDR5 memory bandwidth for system and video. Something unique in technology for gaming.

So according to this real technological specs it can be said a safe value would be 5x times : 1.84 TFLOP x 5 = 9.2 TFLOPS.

Its know most people will likely laugh about it, but thats just reality. Thats the PS4 raw power most people thinks impossible.

Not only that raw power is real, but the PS4 is using different OS, Drivers and API that doesnt have the PC limitations for its graphics cards and game coding. 

Here comes why the PS4 will be the first x86 machine to be fully programmed at low level aka ¨Direct to the Metal¨ . This means the coding goes straight to te hardware in a direct way.

Any GPU for PC doesnt have the power its supposed to get by looking at the specs ( Teraflops this case ) .

Lets explain this with some reference :

- Nvidia GTX 780TI : 5.04 Teraflops 

- Nvidia GTX TITAN: 4.49 Teraflops

- AMD R9 290X : 5.63 Teraflops

And the ridiculous PC GPU that is being compared with the PS4 power is :

- AMD Radeon HD 7870 : 2.60 Teraflops

But there you have the PS4 with a RAW power of about 9.2 Teraflops or maybe some more. 


Optimization in its glory. DIRECT TO METAL.

By Nick Powell

Sunday, February 9, 2014

How to DoS Attack Tutorial

Simple Denial-of-Service (DoS) attacks are pretty straightforward. You just pick a system, select an open port, and then start sending lots of traffic. If you want some help (you probably will), you can find other hackers or infect zombies. At its core, this kind of attack is really pretty straightforward and simple. The real question here is whether you have enough scale to overwhelm your target system.

Find a Service to Target

The first step to mounting a DoS is to find a service you can target. This would be something with open ports, something with vulnerabilities, and certainly something that will accept incoming connections. Some of these services include:
  • Web servers
  • DNS servers
  • Email servers
  • FTP servers
  • Telnet servers
These services almost always accept incoming connections. Oftentimes, they even accept unauthenticated connections. Once you’ve found a service to attack, the next step would be to overwhelm that service.

Overwhelm the Service

Ideally, it should be a service that doesn’t have a maximum limit to the number of connections. The best way to find out whether a service doesn’t have an upper boundary on number of connections is to send it a few hundred thousand connections and then observe what happens.
But to achieve optimal effect, you have to send specific queries and information. For example, if you’re targeting a Web server with a search engine, don’t just request a web page or slap F5 a bunch of times. Instead, request a complex search query or something that’s going to consume a significant amount of horsepower to resolve.
If doing that just once already has a noticeable impact on the backend, then doing that a hundred times a second would probably bring that server down. You can do the same thing against a DNS server. You can force it to resolve complex DNS queries that aren’t cached. Do it often enough to bring that service down.
For an email service, you can send lots of large email attachments if you can get a legitimate account on its server. If you can’t, it’s pretty easy to spoof that kind of attack.
Those are some simple service-based Denial-of-Service attacks that you can mount almost universally. Again, it’s just a matter of finding the services that will allow you to do this.
Now, if you really can’t target specific services, you can simply flood a host with traffic. That can still work, except that the attack might not be as elegant and would certainly require a bit more traffic.
So now, let me show you how to mount a simple DoS attack using the environment I’ve set up just for attacks.

Mounting a DoS Attack

Let’s assume that we’ve already done the network footprinting and scanning and enumeration processes. So we have a pretty good idea of what’s going on in the network we’re targeting. Typically, I use a paper notebook and screen cam a lot of it to gather a lot of screenshots.
In this particular case, I’m going to show you a window that appeared in one of my videos. It was on the Advanced Port Scanner. In that video, we found a bunch of different systems on the network.
One particular system,, wound up being a Windows 2008 Domain Controller, as well as a Web server and a couple of other things.

Let’s assume this is the system we’d like to attack. Knowing that it has all of those things, I know that I could mount a Denial of Service attack against it if I wanted to shut down the authentication process or Web service and all that kind of stuff.
I’ll now proceed and launch my favorite tool for attacking systems like this. It’s called the Low Orbit Ion Cannon or LOIC.

First, I’ll specify the IP address of the server I want to attack, which in this case is Then I’ll Lock on to it. After that, I’ll choose a port that I know is open and that accepts incoming connections. For example, I’ll choose port 80 to mount a Web-based attack. I’ll then select TCP to specify which resources I want to tie up. Finally, I’ll click on the button to start mounting the attack.

You’ll then see the Requested data increasing rapidly. That means the attack has begun.

Depending on the situation, one client attacking this way may or may not immediately affect the performance of the server. But a Denial of Service attack doesn’t have to stop with just one client.
In a typical DoS attack, you would mount this attack against different ports at different times and try to footprint whether your actions are affecting services, impacting them in a noticeable way, or, better yet, able to shut the server down.
If not, you could scale this up by running the Low Orbit Ion Cannon on a dozen machines or even a hundred machines at the same time. A lot of this can be scripted. Meaning, you can capture the traffic and replay it at the command line on different targets or play it as part of a script from different attackers, which could be your peers, your zombies, or both.
This is the easiest tool to understand because it’s pretty darn obvious what it’s doing. It may start to slow down a little bit, partially because you’ll be consuming resources on the client and also because the server itself would either be running out of resources or starting to defend itself against your attack.
Some hosts can be configured to look for patterns to identify attacks and start defending itself. To counter their defense you could, for example, stop the attack momentarily (by clicking the same button you clicked to mount the attack) and change the port you’re attacking. To add a little confusion, you could slow the attack a little bit.
In our example, we’ll change the port from port 80 to port 88. If you review the screenshot on the Advanced Port Scanner you’ll see that port 88 is also open. Once you’re done changing the settings, you can resume the attack by clicking the attack button again.

With that, you’ll be attacking a different port, which amounts to a different service, at a slightly different way, and at a different speed. Speed is really only important if you’re attacking from one client. If you have a hundred different clients attacking at the same time you can slow things down at each individual client and still be able to mount quite an effective attack.
That is how an attack would look like when you do this kind of DoS. The only thing I want you to be cognizant of here is that I’m only showing things to you from one machine. It would look the same on each individual machine if I did it from hundreds or thousands of machines.

Distributed Denial of Service Attack

A Distributed Denial of Service (DDoS) attack would be practically that same attack carried out by many different people at exactly the same time. A DDoS attack is only complex in terms of scale. The actual attack itself, from the perspective of each attacker, is exactly what you just saw.
One reason why some people use malware to launch these attacks is because malware can be timed to launch the attacks at exactly the same moment.

By Nick Powell

Tuesday, January 14, 2014

Battlefield 4 External NoRecoil + NoSpread + NoBreath

Working on Win 7 x64
Full Screen or Windowed Mode
Use at your own risk

how to use:
1. rename the hack
2. start bf4.exe
3. load hack and enjoy

- No Recoil
- No Spread
- No Breath


By Nick Powell

Sunday, December 15, 2013

Playstation 4 and Xbox One Emulators possible

Consoles use of x86 chips will aid emulator development—unless Microsoft and Sony get better at locking down hardware.

A new generation of developers could make games for the Xbox One and PS4 available beyond the console.
Emulators have long been popular among gamers looking to relive the classic titles they enjoyed in their youth. Instead of playing Super Mario Bros. on a Nintendo console, one can go through the legally questionable yet widespread route of downloading a copy of the game and loading it with PC software that emulates the Nintendo Entertainment System.
Emulation is typically limited to older games, as developing an emulator is hard work and must usually be run on hardware that’s more powerful than the original console. Consoles from the NES and Super NES era have working emulators, as do newer systems such as Nintendo 64, GameCube and Wii, and the first two PlayStations.
While emulator development hit a dead end with the Xbox 360 and PS3, that may change with the Xbox One and PS4, according to software engineer Ben Vanik.
Vanik writes Javascript code by day for his full-time gig as a software engineer, while pursuing all other sorts of challenging projects in his spare time. He’s one of the few people to have even tried building an Xbox 360 emulator, although his version isn’t ready for general use. (For emulator development, he writes in C and C++.)
Vanik doesn’t have specific plans to develop an Xbox One or PS4 emulator, but is intrigued by the possibility. He is excited that both new consoles use AMD x86 CPUs, similar to the chips in most laptops and desktops (except that PCs generally use Intel’s x86 chips). The new consoles both use AMD Radeon graphics processing units as well, which is also good news because AMD’s “Mantle” API makes it easier for developers to write code for the chips. Finally, Vanik expects that the hardware virtualization readily available in today’s PCs will let emulators run without needing a computer four times as fast as the console.
“It would be easier to create a PS4 or Xbox One emulator within the next year or so than it would be to create a PS3 or Xbox 360 emulator that ran at the speed of the device,” Vanik told Slashdot in a phone interview.
All of Vanik’s optimism is based on one big caveat—that Microsoft and Sony aren’t able to lock down their consoles in ways that would make it impossible to hack into the systems.
Similar to jailbreaking or rooting a phone, developers hack consoles to let them run homebrew programs or other software that isn’t sold by the consoles’ original makers. That’s not what Vanik does, but he relies on such hacks.
“The big thing for writing an emulator is finding the information and reverse engineering it,” he said. “I don’t think it’s been the case that an emulator has been written without there first being some hardware hacks on the system such that people could put mod chips in and run homebrew.”
Until you have homebrew you can’t really have emulators, he added, “because people like me who are writing emulators are looking at the homebrew. The people who get Linux running on these things, I look at their code to see what the CPU registers are that they’re flipping as they’re doing things, and that’s what I use to build the emulator.”
Once Linux is running on an Xbox One or PS4, “an emulator won’t be too far behind,” Vanik said. So what’s the problem? “My worry with this generation is that maybe Sony and Microsoft have gotten really good at preventing homebrew.”
Enterprising hackers were able to break into the Xbox 360 and PS3. The fact that good emulators for these consoles don’t exist had to do with their PowerPC architecture, not a lack of access to the systems, Vanik added. But the Wii U does not yet have homebrew, and the Nintendo 3DS has also held firm against outside exploration.
“Every time a new [Nintendo] DS or Game Boy was released it was always hacked almost immediately and this is the first one that hasn’t been,” Vanik said. “It’s been on the market forever now at this point and no one’s done it yet, so I’m a little worried that companies are getting better at preventing us honest consumers from doing what we want with our hardware.”

Honest Work—But Is It Legal?

Vanik wasn’t joking about being an “honest consumer.” His goal isn’t to play games he hasn’t paid for, but to preserve video game history and to solve complex computer-programming challenges.
“I’m not a fan of piracy. I’m not a fan of stealing things, and software,” he said. “But I feel as a consumer, if I own a copy of this Super Mario World cart and I want to play it on a piece of hardware I own, I should be able to do that.”
The lack of backwards compatibility in new consoles makes it hard for gamers to play old titles—except those that game companies have re-released so that consumers can pay for them a second or third time. “All of those games that were created, all of those works of art and terrible shooters and stuff, they are gone,” Vanik said.
He’s also inspired by the engineering challenge: “An emulator is one of the most complex things that you can write as a piece of software… It touches on so many components of a system to a depth that most people, most engineers will never actually experience.”
Vanik’s Xbox 360 emulator is called Xenia, and is available only as source code. When compiled, the software can load the logos and menus of a few games, but not actually play them yet. A couple of years ago, Vanik wrote a series of in-depth blog posts describing the challenges of building a 360 emulator. He owns “several” Xbox 360s.
Vanik previously created a PlayStation Portable emulator, but stopped developing it after he got a couple of games to run on the platform. The fun was in proving that a PSP emulator could be created, not in the tedious process of ensuring compatibility with every game, which is challenging because each one uses a different subset of a system’s capabilities.
Vanik hasn’t released anything more than his source code because he doesn’t want to be mobbed by people looking for perfect compatibility for random games: “The second you say you have an emulator, you have a bunch of people asking you where they can pirate games and ‘How do I get it to work on my system?’”
Although video gamers playing their childhood favorites on an emulator are unlikely to end up the target of a police raid, doing so is likely illegal. One common belief is that if you own a physical copy of a game, it’s ok to download a digital copy and play it on an emulator. Not so, says Nintendo. While technically you can make a copy of a game you own for “archival purposes,” you’re at greater risk of outlawry when you download a copy from the Internet.
“There is a good deal of misinformation on the Internet regarding the backup/archival copy exception,”Nintendo’s website says. “It is not a ‘second copy’ rule and is often mistakenly cited for the proposition that if you have one lawful copy of a copyrighted work, you are entitled to have a second copy of the copyrighted work even if that second copy is an infringing copy.”
But that’s not the case, the website adds: “The backup/archival copy exception is a very narrow limitation relating to a copy being made by the rightful owner of an authentic game to ensure he or she has one in the event of damage or destruction of the authentic.” Whether or not you own the game, or possess a Nintendo ROM for a limited amount of time, “it is illegal to download and play a Nintendo ROM from the Internet.”
Copyright lawyer Ed Komen of Sheppard Mullin told Slashdot that “there’s always been a distinction in the copyright law between the physical copy of a work and the protected work itself.”
“You could own a copy of a book and have the right to resell the book, lend it, give it away, throw it away, burn it, whatever,” he said. “But that wouldn’t necessarily give you the right to scan it and send out multiple copies to your friends so they wouldn’t have to purchase their own copy.”
Even creating an emulator could potentially be illegal, Komen added: “The term emulator means you’re trying to mimic something else, and if you mimic it too closely you might actually be infringing what you’re emulating.”
Re-using code may constitute a copyright violation, which is why developers attempt to reverse-engineer code instead of re-using any of it. But the story doesn’t end there, because the Digital Millennium Copyright Act has prohibitions on circumventing digital locks. Thus, even reverse engineering code might be illegal if, in the course of reverse engineering, the developer accesses protected parts of the original system. “It’s not really a copyright infringement but it’s an infringement of a different part of the copyright statute called the anti-circumvention provisions,” Komen said.
Vanik regrets that emulation exists in a gray area. “It’s kind of disappointing because it’s just like people who preserve old books,” he said. “These are important pieces of our culture and the continued efforts of these companies to prevent that culture from being retained for history is disappointing.”
Nintendo, on the other hand, believes that “the introduction of emulators created to play illegally copied Nintendo software represents the greatest threat to date to the intellectual property rights of video game developers.”

A “Threat” That Isn’t Going Away

While it exists in murky legal waters, emulation development won’t stop—even though it seemed to have hit a dead end in the last console generation.
An emulator consists of many components: The CPU and graphics chip have to be emulated, as do audio systems, disc drives, controllers, and more. Even a working emulator may not be able to play more than a few games until work has been done to ensure compatibility with each title.
“If you think of all the different features that a GPU would have, it can do environment mapping and cube mapping and 2D textures and all these different shader commands,” Vanik said. “Each game uses a different subset of those features. There might be 1,000 different instructions on the CPU and each game uses a different set of 200 of them.”
If you search online for “Xbox 360 emulator” or “PS3 emulator,” you’re more likely to get a virus than an actual emulator. The PowerPC-based architecture of those systems is difficult to emulate on x86-based computers. “You’ve got to build this really fast and efficient translation layer from the PowerPC chip to the x86, and every single memory access you have to do you have to flip it around,” Vanik said. “It’s a real challenge to make that fast.”
Although the PS4 and Xbox One leverage 8-core CPUs, they’re not that fast compared to today’s high-end PCs; they only seem ultra-fast because games are given near-complete control over the systems. “They can touch any byte in memory they want, they can use every little piece of hardware at the same time,” Vanik said. On PCs, the Direct3D and OpenGL APIs required to interact with graphics chips are “too high-level for doing an efficient emulation of the graphics.”
AMD’s Mantle API “will make doing the GPU stuff really easy” by providing more direct access to the hardware, Vanik suggested, because Mantle “gives you the same exact access that you’d get if you were a software developer writing a game for the PS4, which is really cool.” As an emulator author, he would probably write a Mantle GPU core for this new project and tell followers that they need to buy an AMD GPU to actually perform a full emulation.
Hopefully, Nvidia will start supporting Mantle or create their own API that allows low-level access to their own hardware—but until that happens, emulators of Xbox One and PS4 are more likely to run well on PCs with AMD graphics chips, at least in Vanik’s thinking.
A translation layer between PowerPC and x86 is also unnecessary in this new console generation, thanks to the x86 chips in the Xbox One and PS4. Moreover, Vanik believes that technology such as AMD’s andIntel’s hardware-assisted virtualization for PCs will make it easier to run emulators at full speed.
“I see an emulator for these next-gen systems being similar to a piece of software like VMware or Xen or Hyper-V, where you’re actually building the machine to run as if it was a virtual machine. Normally, emulators are software executables that prop up their own little environment and play in a little sandbox,” he said. Hardware-assisted virtualization could help run emulator code “natively on the machine with hardware acceleration.”
With the Xbox 360, “you basically needed [a PC] four times faster [than the console] to run at the speed the 360 does because of this PowerPC to x86 translator that has to emulate all these hardware instructions.”
While the original Xbox (released in 2001) used an x86 chip, there wasn’t much interest in emulating the console because it had few exclusives that couldn’t be played on the PS2 or PS2 emulators. There won’t be any lack of interest for this latest console generation, and the common architecture between the Sony and Microsoft systems may allow respective emulators to share quite a bit of code.
As for the Wii U, it uses a PowerPC chip just as the Wii did, but talk on the Dolphin forums indicatesthere’s no development underway to let Dolphin support Wii U games. Building an emulator is a complicated task that often takes collaboration by many people. A forum comment written by Dolphin developer Pierre “delroth” Bourdon two months ago illustrates just how frustrating emulator development can be.
“Dolphin is not fun anymore for me, mostly because of its community, partly because of the code (code can be fixed with proper development methodology, proper development methodology cannot be fixed if other devs are not willing to fix it),” Bourdon wrote. “Also partly because taking on too many reponsibilities [sic](website dev, release manager, infrastructure maintainer, money management, …) means you get burned out much more quickly – and frankly the 4.0/4.0.1 fiasco did not help (not being able to find people to test 4.0.1 after asking around for about 3 days was the last straw).”
Dolphin succeeded as a Wii emulator in large part because the Wii’s active homebrew community made it relatively easy to find proper documentation of the system. That hasn’t happened with the Wii U. And as noted earlier, Vanik worries the same state of affairs will plague the PS4 and Xbox One. Until the new consoles are jailbroken and have active homebrew communities, emulation will have to wait. But Vanik, and surely others, will be ready when that day comes.
“For me, personally,” Vanik said, “it is a labor of love.”


By Nick Powell

Friday, December 6, 2013

Playstation 4 Game Dumps

According to doskias on a Chinese BBS some Sony PlayStation 4 / PS4 Game Backups have surfaced on Internet torrent sites and TTG Tracker with details below , as follows:

  • Killzone Shadow Falls: 37.4GB
  • Knack: 39.3GB
  • Battlefield 4: 32.5GB
  • AC4 Black Flag: 20.22GB

Reportedly ASUS Black 12X BD-R 2X BD-RE 16X DVD+R 12X DVD-RAM 8X BD-ROM 8MB Cache SATA Blu-ray Burner BW-12B1ST/BLK/G/AS drive was used for ripping the PS4 / PlayStation 4 games.

Both games contain single PKG that contains whole data, as well as "RIF" file that is used for storing purchase data to activate digital contents from PSN Store.

This seems interesting and today I've got my Killzone SF and COD Ghost from gamestop. I tried loading them on my PS3′s BD-ROM it couldn’t read them. Maybe it was too obvious lol, however it seems that PC's BD-ROM could read them.

Update: Two more games are released as well. Can't really reveal the original source because they're so strict about their security. My friend is the one of the members over there.

Update #2: UP9000-CUSA00190_00-KZ4RELEASE000041

It looks just like the one of those PS3′s typical PKG files..

From PS3 scene profiteer GaryOPA: The problem with the new PS4 setup, is EACH DISC contains an unique LICENSE.RIF file that tracks the 'actual disc' itself on what PS4's it is used, and when it is first used, etc.

So a dump of disc if running on ODE, or CFW would be missing the 'unique tracking' codes, and would never activate on a PS4 console.

It is hard to do right now as you need to disassemble a PS4 to prove this 'unique tracking' code, but you can't play the same ACTUAL DISC in TWO PS4's at ONCE.

Of course this brings up the 'USED GAME' re-sell cause again, since the PS4 game discs use RIF just like PSN activate, Sony can at a push of a button disable your LICENSE for JUST that ONE ACTUAL GAME DISC, blocking the use of used game disc on OTHER systems.

The way 'gamediscs' are setup now they are basically PSN store versions on a 'disc'.

100% the same files, one giant PKG, a parma.sfo and rif file.

It does make a big of sense, management wise, handling game discs and digital psn is the same both from publisher and sony and os side. They could also now quickly release a PSN game that becomes a hot-selling into a retail gamedisc, just throw the file onto a disc.

They could now also release a time-limted or demo-gamedisc at the retail level but it really wouild be the full same gamedisc, you just input a code online or activate the FULL version from the PSN store. 

Yep, t is possible the way PS4 games are lay out, you could basically burn your own, or install with usb stick, just then you need a 'full license' file activated from the PSN store to play it.

Nope, PS3 does not see them correctly, they more like normal PC Blu-Rays now, see this image from news post.

Update #3: Following up on his previous update, below are some additional details from Sony PlayStation 4 hacker SKFU (via skfu.xxx/2013/11/ps4-game-dumps-hdmi-fail-more.html):

PS4 - Game Dumps, HDMI Fail & more...

Sleeping sucks, you miss news of different timezones for sure. So, what did happen while I slept?

1) PS4 Game Dumps

According to an A9VG member, PS4 games can be dumped with a common PC Blu-Ray drive. It seems that already a few games were dumped, inlcuding Killzone, Knack, Battlefield4 and AC4. As soon as I get access to a disc or dump myself, I will do an analyse of the containing files.

2) HDMI Fail

What happens if you force students to build your Next-Gen console under pressure? Well, they might return you faulty HDMI jacks.

IGN, Kotaku and many more individual users report that their PS4 video output stopped working. The console apparently is unusable for those who experienced it.

3) For those who already received a console

Sadly i'm still looking for a PS4 unit, if you can help me to get one contact me.

In case you got a unit for yourself, here are some examples of what has to be tested:

  • Before powering up the unit for first time, make a 1:1 dump of the HDD
  • Explore the HDD dump
  • Dump a game disc
  • Burn the dump to an empty BD
  • Check if the PS4 recognizes the disc
  • Check any files which can be transfered from PS4
  • Savegames, etc
  • Install a modified firmware
  • Use my PS4FwTool
  • Extract 2 firmwares
  • Rebuild a new firmware based on both output
  • Possible brick! Do at your own risk!
  • Recovery menu should bring you back in case of faulty firmware, but only do this if you actually are aware of the risk and know what you do!
  • Sniff anything
  • Use SKFU's Proxy and/or Wireshark to check the network behavior
  • Find unencrypted traffic transfers
  • Modify the Companion Tool (iOS/Android)
  • Intercept game traffic between Companion Tool and PS4 game etc.

Happy hacking.

By Nick Powell

Wednesday, November 20, 2013

How to get real credit card information

There is several ways on how to get real credit card information.

You can get it from hacking emails, you can get it by phishing, with fake sites, etc.

But there is another way that is well known and 100% effective.

The problem is you dont get the full details you would need to purchase at most online sites, so you need to get the rest of the information with other tricks any real hacker would know how to get them.

You need to work or have contacts inside any retail shop, restaurant or any place where the manipulation of credit cards are easy to do.

There you just need to scan and copy the front and back of the card. Of course it needs to be fast and not seen at all by the customer. This can be achieved pretty easy.

The problem is if the person that does this gets caught, will be bad.

But most people that does this works in different places and changes their jobs really often.

So there is no problems at all.

This is the most easiest way to get real credit card information but of course wont be full details as i just said.

You will get the holder name, account number, CVV code and expiration date, bank name and phone number.

For the rest of the information you need to use your tricks that every real hacker even begginers knows how to get those.

And there you have a full detail to use online. Most of the times these credit cards are not enroled so you need to do this as well when you try to use it online by just entering the information you have from the holder.

There is a lot more ways on how to get real credit card information and i will post them in the future.

By Nick Powell

Tuesday, November 19, 2013

Hackworld Official Facebook Page

Here you can go to the HackWorld Official Facebook Page.

Official Facebook Page

I will post stuff there that i wont post on the blog so you should check it daily.

By Nick Powell

Monday, November 18, 2013

The Truth About Hacking Gambling Sites

This is something i wanted to share as a lot of people wonders how a gambling site could be hacked.

The truth is that is possible.

There is many ways on how the word ¨hacking¨ can be used.

There is hackers that steals personal information like credit cards with full details , full bank logins, even they clone credit cards to cashout in ATMs.

There is hackers that just steals from websites and keeps all for themselves.

This is all illegal hacking and you know you need to be really smart to do it. Actually nowadays these kind of people are rare to find and most of the times they are working for the big enterprises or even the most powerful governments in the world.

But there is another way of hacking that doesnt means you are stealing, but you are cheating the site.

One known way to hack a gambling site is to cheat them.

Now you could think this is stupid since the gambling is well known because no one can cheat the house.

But is possible.

The best games for doing this are the multiplayer games. It can be achieved in some casinos that allows these types of games with a tight rule:

The games you need to play must allow you to play with friends you can invite to join the game.

You know real people is playing and you also know them. You are not only playing against a random house winner software that doesnt even have a life.

When you know you are playing with real people , you know you can beat a software, doesnt matter how smart it could be. And the best part is you are having fun with your friends.

I wont explain this too much, because this is something only some people knows how to control and this is why its not yet totally fixed by the gambling sites.

But i can give you an idea.

You know all this when you play multiplayer games such as BlackJack or Roulette ( other games with same concept works )
  • There is a time when you should play tight and or tighter
  • You can take advantage of the mistakes other players make.
  • If you have a very large stack you shouldnt do these mistakes.
  • You should adjust your play according to stack size
  • When to steal
  • You can play more tables and win more
Now , what if you know everyone that is playing with you in the same table. This is actually totally possible to do online, since Gambling sites checks IP, computer addresses, macs, everything but as this is the internet you could have friends worldwide and making new friends every day and there they cant never know you know each other.

Maybe you are getting close to the idea now?

I will just end this saying... you all deposit the same amount of money, and it must be a good amount.

Now you can figure this out.

I will be posting more about this in the future, i like to see what you all have to say and what you think can be done.

I hope you like this since it is for real and is the truth about hacking and cheating gambling sites.

By Nick Powell

Hack Valid Credit Card Numbers With CVV Explained

Hello Everyone

I write to explain to anyone that please dont email me asking on how to hack the hotmail server to receive free credit card details as i dont try this. Its a known hack but i didnt try it yet.

I get emails saying stuff like if you need to enter the CVV, if you will receive full information or not, if you will get credit cards with full balance, if you need hacked credit cards to retrieve valid cards and it goes on like this.

It´s explained pretty well so in case you want to try it, read everything carefuly and from there you will have success.

I post this since i receive hundreds of emails asking on how to use the hotmail hack to retrieve real working credit card numbers posted at this page:


Now please read everthing there and try to understand how it works. I can help about any other blog issues you may have. I just want to keep my inbox clean.

By Nick Powell