Jump to content

Forkish

Active Members
  • Posts

    421
  • Joined

  • Days Won

    18

Everything posted by Forkish

  1. If we’re ever at a pub together, the first round is on me.
  2. I’ll check it out and see what I can do. thank you.
  3. This question is hypothetical and posed as done with legal limits, 'Legal Eagle' if you will What would be the best way of injecting a minero miner while they surfed on your bandwidth on an offered access point?
  4. remember, sslsplit is different then sslstrip which is more practical for browsers.
  5. If you’re on a laptop/desktop, install uMatrix by Gorhill. I suggest then globally blacklisting everything and slowly whitelisting things that are needed. it can be a pain at times but know that the time spent refreshing certain websites a few extra times will be worth it. If you’re on an iPhone I suggest the browser Brave, which is opensource (github here https://github.com/jcs/endless) and allows for some great global control such as script & xhr control, cookie wiping , built in https-everywhere and user agent control. plus it’s wicked quick.
  6. This is tasty stuff right here. You want some sauce?
  7. copied from: https://www.ceos3c.com/2018/03/01/payloads-hacking-lingo/ Read this, they’re good.
  8. i don’t even know what a reverse shell works but I assume you would bounce your connection off of different systems obfuscating your true IP…?
  9. really? the fact you don’t own any of the products, yet contribute and help out people with what you can blows my mind. that may not be saying much but god damn..
  10. Interesting, What was the brand:model?
  11. Congrats!!! …on rendering your rearview mirror practically useless.
  12. What size is that? It doesn’t help that it’s on a comically small ‘puter.
  13. I was planning on using a modded neatgear with tomatoUSB/VPN (i don’t have to use the vpn, just part of the firmware build). I’ve also got an extra ddwrt wrt1900ac (have to unbrick the softbrick) but ddwrt’s vlan’s are like an iPhone headphone, easily tangled if touched wrong. The rest of my network runs through ddwrt routers. So if I need to figure one out I surmise I can figure the rest out.
  14. ..oh, that’s different. Here’s what you need to do..
  15. For a vlan to work properly, does the end router need to be vlaned as well? What happens if your end router can’t vlan? Or if you’ve got a switch somewhere that is just a dumb switch? Does that muck it all up? I’ve want to vlan (can vlan be a verb?) my roku and chromecast but I like my subneted, daisychained, convoluted setup.
  16. I’d suggest an additional step of blacklisting everything, checking logs and whitelisting slowly what you deem safe. SWIM offers up these extremely extraneous optional steps: wrap everything with a circut board in foil, in 50cal ammo boxes wrapped in foil, all put in your oven/microwave/farthest corner of your property. tip: don’t forget your car stereo with that sweet bluetooth feature. extra tip: office max’s return policy is 14 days, so just return all boxed and pretty. They don’t check to see if it’s infected! extra tip tip: walmarts return policy is 14 days also, but their laptop generaly don’t have bluetooth. extra extra tip tip: desktop tower’s wireless modules are much easier to remove before your initial start up. extra extra tip x 5: when you’re done, you’ll have a lucious collection of wireless cards/boards by the time you’re convienced everything is clear ect.. if your modem is comcast, take it in a get a new one easy peasy. Slowing removing tamper stickers are finicky (but a bit easier made with an old giftcard sanding into a silky smooth shovit and gingerly used in conjuction with a hairdryer) when swapping router cases before returning the maybe infected stuff.... ...so sayeth the Interwebs..
  17. If the SSID is being prodcasted, you could try the Signal Strength module. Walk around until you can determine a direction in which the suspect SSID signal gets stronger and see where that takes you.
  18. I’m going to be on a boat (not fun ‘n sun, more sit and zone out) without cell service for a few hours and I thought I’d ask if there are some good primers on linux, powershell, stuff to see what I might not know. Got a windows 10 laptop with a little non-pineapple router and a few usb sticks. Some which have a few linux distros (arch, mint, kali, and one other) I’m going to try to boot up on. Suggestions on some listening material?
  19. This may not help much but TCPdump can be about as verbose as it gets and p0f is a fantastic passive traffic identification module. It can be a little overwhelming learning the signatures but it’s a start.
  20. I saw in the status module, under the wan menu you can see your public IP. What would it take to pipe that to the welcoming pineapple screen?
  21. So you would want all the vpns to use the same protocol and the user to use a different protocol or the same? colo?
  22. I like the idea of mulitiple vpns. Tell me if I’m understanding this. Extreme example: If I daisychain 5 subnet routers to use VPNs connecting to different servers (maybe using different protocols), would all connections made to a subnetted router come out of the tunnel at the server specified by that specific router’s vpn? Would then all connection made to any router after the assigned gateway would create the layers of the encapsulation and any traversed gateways would be the increasingly obfuscated/encrypted stream? e.g. I’m connected to the innermost VPNed AP with my ipad, running a system level vpn to a netflix friendly server. Netflix thinks I’m where my says I am even though the data has gone through 5 vpn gateway/servers.
  23. Your defined principles amongst the discoverable makes me think of ‘compromising subnet’ or ‘concurrent-vexworking’. All of which need work.
  24. It’s called multi-wan. There!’s a few openwrt programs to not only make it happen but to get the most from it.
×
×
  • Create New...