Jump to content

digininja

Global Moderators
  • Content Count

    3,551
  • Joined

  • Last visited

  • Days Won

    103

About digininja

  • Rank
    Hacker

Contact Methods

  • Website URL
    https://digi.ninja
  • ICQ
    0

Profile Information

  • Gender
    Male
  • Location
    Sheffield, UK
  • Interests
    Hacking, Coding, Climbing

Recent Profile Visitors

18,782 profile views
  1. Not if you want to be safe.
  2. Reformat your machine and stop playing with things you don't understand.
  3. So give us your reasoning for thinking bad things are happening. Explain what Pegasus and obliteration are and then you might get some help. Dumping pages of text with no real context is unlikely to get anything back.
  4. Please give some context to this or I'll lock it as being too vague and looking a lot like spam.
  5. Use a good VPN and make sure you do full certificate checks when authenticating. Only visiting HTTPS based sites, and again, checking certificates, will also help.
  6. Depends if you've got permission.
  7. First, it depends on your location and local laws, check those as they may limit what you can do. In the UK, and I'd guess the USA, it depends how you use it. If you use it in a lab at home and don't attack anyone else, it's fine, if you use it against a client where you have a contact, that's fine, if you use it in school or the local shopping centre to attack random strangers, that's not fine.
  8. digininja

    joomla

    Check their advisories for known issues. Why are you particular interested in the login panel? If it is secure enough is a question only you can answer. Do a risk analysis, work out your threats and then decide
  9. digininja

    joomla

    Why? What version?
  10. Any decent router/modem would not have the admin interface listening on the WAN side so default creds or not, they would not be able to access it to do any damage. If you can get on to it in some way then yes, you could potentially install stuff and do damage, but that assumes it is vulnerable to an attack, there is an exploit available, and that there is something interesting that can be done after exploitation.
  11. First, it should not be possible to connect to a router from the outside, the admin interface should be locked down to internal only. If you aren't doing anything to do with the internet then there is no traffic to sniff. If all you are doing is writing a document in word then there is no network traffic generated. If setup correctly, HTTPS covers all the connection, from first visiting the site, through logging in, and all your surfing. All of it would be encrypted and not visible. This assumes the site is setup correctly though.
  12. Yes and no. I'm going to assume web traffic here as it is easier to start with. If a remote user gets access to your router then you have a lot of problems. Depending on the router the may be able to redirect traffic through things like DNS attacks and so your traffic to site X would go to their site rather than the real one so they would see the traffic. But, if you are using HTTPS and it is set up correctly with HSTS or you don't accept invalid certificate warnings, then all they would probably be able to see is encrypted traffic which isn't much good to them. The is a lot more to it than that but there is your starting point.
×
×
  • Create New...