Jump to content

digininja

Global Moderators
  • Posts

    3,788
  • Joined

  • Last visited

  • Days Won

    155

Contact Methods

  • Website URL
    https://digi.ninja
  • ICQ
    0

Profile Information

  • Gender
    Male
  • Location
    Sheffield, UK
  • Interests
    Hacking, Coding, Climbing

Recent Profile Visitors

21,391 profile views

digininja's Achievements

  1. No. If it has Karma activated then try to connect to an ESSID that isn't there. If you connect then it could be a pineapple.
  2. I've no idea what Omicron is, but to do that you would need to also be the DHCP server so you can tell users to use you as the DNS server. After that, just look at dnsmasq or bind, both fairly easy to set up and host whatever domains you want.
  3. Is postgresql started? Have you run the command it says to run in the screenshot?
  4. If netcat can't connect then you've got something messed up in either NAT or routing. Metasploit won't bind to your public IP if that isn't an IP on your local machine as it doesn't know which interface to bind to, you bind it to the IP that the NAT rule comes in to. Forget Metasploit for now, get it working with netcat, then move back to Metasploit
  5. If you have problems, use netcat to set up a listener on your end and see if the other computer can connect to it with netcat. If they can't then routing is messed up.
  6. That sounds right. It assumes your ISP isn't blocking things and gives you a public facing IP.
  7. It depends what their firewall is doing. If it allows all outbound connections then they don't need to disable anything, if it blocks things then they might need to.
  8. In a reverse connection, the target is connecting back to you so the have to be able to reach your listener. That means you need to set up whatever routing and NAT is required to make this happen.
  9. Something like this will give you the IDs of the phones they are using. https://youtu.be/UjwgNd_as30 But if the police aren't investigating even after a shooting, I doubt they'll do much extra if you go Sherlock Holmes and take a bunch of computer data to them.
  10. digininja

    CSGO & faceit

    As others have said, we won't help you cheat on specific games. If you are interested in general discussion on how cheating and anti-cheat systems work, then there may be someone who has knowledge about it. If c0ncept is known to cheat, try asking them for specifics, not us.
  11. Glad you got to the bottom of it.
  12. Nmap's OS fingerprinting is not always accurate, especially when it says it is only 87% sure, so I'd not put much weight on that. The easiest thing to do is to change the wireless password and then see what happens. Only change the password on devices one or two at a time and see if it comes back. If it does, check on the last few you updated. If it is someone who managed to get your key, as long as you pick a good strong one this time you should be able to keep them off. At least for a while. Did you do any check of things like HTTP headers from the web server? Banner grabbing or info in the HTML header may tell you the OS or give some indication about the device.
  13. What type of vulnerabilities do you want? Your best option may be to install OpenWRT on a raspberry pi and then create a few vulnerabilities yourself. That will be cheaper and more consistent than trying to bulk buy specific devices.
  14. I don't know what the current state is but that paper is from 2016 and I remember when MAC randomisation started some vendors messed it up and didn't really randomise it. It should be a lot better by now. There were also tales of Apple being able to decode iPhone random MACs if you paid them cash. Don't know if it was true, but if they did it, someone else would have worked out how to decode them as well.
×
×
  • Create New...