Jump to content

Dave-ee Jones

Dedicated Members
  • Posts

    1,488
  • Joined

  • Last visited

  • Days Won

    40

Everything posted by Dave-ee Jones

  1. Context. You just lost your job because "someone implanted messages on your phone". You're now trying to replicate the exact same thing. The jail thing aside - even if you do replicate it it only proves it can be done - not that it was done. For all we know those messages were actually yours, your work colleagues found them and you were fired, and now you're trying to find a way back into your job because.. ..and you like money. For all we know.
  2. Hate to say it, but that's a very silly thing to say. You've got plenty to lose - and then there's jail on top of it. If that's what you're looking for I think you've come to the wrong forums as 99% of us don't do that sort of thing. Hope it all turns out well, though.
  3. Yeah, that makes sense. Yeah you could make a test environment with an old AP that isn't configured to encrypt data and show her how to see traffic and identify what kind of traffic it is. Obviously, that can get quite in-depth as you need to know different kinds of traffic and how to read (sometimes) at the bit-level. But yeah, that's definitely an option. In terms of web development sites, I usually use w3schools for quick Googles. They have exercises and quizzes as well which could be useful. Not sure about that one. But I would say whatever you hack into make sure it's not someone else's - unless they give permission, of course. Good parenting ?
  4. That's pretty cool. Having being brought up in a techy-fam I can appreciate it. The answer to your question depends on what you want them to learn. For example, if they're more interested in programming (Scratch being the beginner-side) then you could teach them neat little scripts using specific programming languages. A more specific example might be a network-scanning Javascript script. Or you could teach them about how people abuse their use in certain areas (memory-leaking to crash a computer, abusing the "Notepad Loop" in batch/cmd). Keep in mind that "hacks" are..realised?..from learning something. So if you learn enough about networks you can know what they're restricted to and what they can't do, and you can work out ways around certain things to do something that another person wouldn't think possible. You could teach them workarounds for Windows security, like the classic sticky-keys method to get an elevated command prompt as well. Linux is probably the funnest to work with, though. I would recommend teaching her how to make a website, though. For me it's surprisingly useful and teaches you a fair bit about multiple languages at once (CSS, HTML, JS, and if you go deeper potentially C++, PHP etc.), and the difference between server-side and client-side script. Keep in mind that if she's not brought up to respect other people's belongings she may abuse this privilege. (I'm not questioning your parenting here, just giving a fore-warning). I know that's one of the things that restricted my learning from my own parents. What you teach them is your responsibility, and while their responsibility is not abusing that privilege it still has potential to cause damage. She sounds like a very bright child though ? And with that much of a headstart, too! Yes, I read the story. ?
  5. I can see this being a double-edged sword, as well. Just be careful.
  6. Couldn't you do that by logging into a Mac/PC with your Apple ID and sending an iMessage to yourself? That would show it's possible to send messages from something other than an iPhone. Showing that you can send as anyone is a bit more difficult, as you'd basically need to re-create the hack that the hacker used. Google?
  7. Glad to hear it's not working out, honestly. I don't want my car stolen anytime soon. Ever. That's true, however it's been done more cleverly. https://www.wired.com/2015/08/hackers-tiny-device-unlocks-cars-opens-garages/ TLDR; Capture the first code before the car does, and let the second code go through (requires 2 presses on the fob) - the first code is still valid and can be replayed at any time by the device that captured it.
  8. Only a 4-month-long thread about people complaining. ?
  9. Sorry, buddy. No one here is going to help you hack into your dad's router just so you can play games or watch videos without doing your chores. We all need to do our chores, otherwise bad things happen.
  10. Sneaked past me, eh? Might have to increase my knowledge-base and post more often. I've been slacking off a lot lately - with a good excuse, though. Work getting busier and busier.
  11. Dave-ee Jones

    PC world

    Someone watches too much Fortnite.. Anyway, all you need is an old laptop or PC and give it the good ol' Kali boot. If you're looking to have a PC that runs a bunch of virtual machines I would suggest buying something along these kind of specs: Processor: Intel i5, Intel i7 with a speed around 2.5 - 3.5 GHz RAM: Try and aim for around 1-2 GB per Linux VM and 2-4 GB per Windows VM (bear in mind the host, assuming it's Windows, needs probably 4 GB minimum) Storage: SSD/HDD, doesn't really matter in this situation. Try and keep around 60-80 GB of storage per Windows machine. Linux machines are generally smaller, but I don't deal with them often so I couldn't give you exact numbers. GPU: On-board motherboard graphics are generally fine unless you're hash-cracking, playing games or mining. In which case it varies heavily in what GPU you need. Keep in mind these are optimum specs. You could get by with an older laptop or an i3 machine but you wouldn't be able to manage as many VMs (if any).
  12. I have a different opinion about the TETRA being a USB attack tool, haha. I think you meant to talk about the Bash Bunny there? I'll finish it for you (copy+paste what you said but rename the title, ha): Bash Bunny (100$) Designed for Penetration Testing A great option if you want to do network hijacking, intelligent exfiltration, keystroke injection and have a dedicated shell access. Ethernet, Storage, HID and Serial emulation Multiple payloads selection through a 3-way switch Boots in less than 7 seconds
  13. I know I do at home, haha. I go, "what in the world are these 5 unknown devices..." and then glance at my brand new Switch.. "Well, that's 1.."
  14. That's just Apple being Apple. And it depends on the MAC changer. I've had a few that don't affect much at all, and then I've had a really good one (the one that is used by Nethunter for Android) that does work properly, causing even the smartest routers to believe you're a completely different device. Of course, I don't recommend doing this for small networks as one day the admin's going to log onto the router and go "hmm, 21 unknown devices.." and get really paranoid and lock the network down even more.
  15. Yes, many business grade routers have web dashboards that show data usage per device, some even showing what they were browsing. Some examples (for SMB) are Ubiquiti, Aerohive and Fortinet (Fortigate). Taking Fortinet as an example, it can view data usage, what websites were being browsed, can control whether users can upload a Facebook post, view Facebook posts, use Facebook Chat etc. so it's pretty full on stuff but I wouldn't recommend it unless you have highly-qualified internal IT or an external IT service (preferably local). It's highly in-depth. A "simpler" solution would be to put the company WiFi on a separate VLAN so anything connected to it cannot connect to internal services like file shares (where your data is more than likely kept). This limits it to just internet access, which is useful for everything - including emails. Data leaks are a common problem but if your a small business (~5-30 people) then it would be easier to control them in a social sense rather than a limiting-their-access sense. What I'm saying is, if you hire them as a small business of 15 people or so you have to be able to trust them with access to your data. They're part of your business now, and if you, along with them, are planning to make money for the business they more than likely need access to business data. That's just how it is. Hope what I've said helps!
  16. I hate to say it but I don't think this is correct.. The AP can only see what your phone is programmed to send with it's connection broadcast. I've spoofed my own MAC many times, usually with a randomiser for each WiFi. There would be no point randomising your MAC for every WiFi network you connect to if it only broadcasts the true MAC.
  17. Multiple possibilities. 1. The card you're writing to might not support the same frequency for the gate 2. The cloner didn't clone everything broadcasted - only specific data that it could handle 3. Perhaps the clone tag is broadcasting something extra as well Did you try formatting the second card first? Newer systems have protective systems against cloning as well. If they didn't you can imagine how easy it would be to carry around 10 clones of 10 different people's credit cards.
  18. Sorry, no one will help guide you into the right direction of hacking/piggybacking someone else's WiFi/connection. It's illegal and we don't support that. You'll have to go somewhere else to find that information.
  19. Eh, I have some problems with mine now and again. It's not overly stable for long-term purposes but short-term it's a good solution. I've probably been using mine for my home Windows PC for about 3-4 months or so it and for the most part it's okay, just inconsistent. Long term just get a PCIe adapter.
  20. Hoi! I'm looking for a secure alternative to phpMyAdmin. Anyone know of any? I've done a bit of a Google but it seems alternatives like Adminer (which apparently has a "beautiful" UI) and SQLBuddy (which doesn't even have an SSL certificate on their website) are a bit outdated..But I can't find much else? There's phpMiniAdmin, but I'm not sure if they made it any more secure or not. Thanks!
  21. I have that with large 9dB antennas. Not sure of the range in metres, though. Drivers are very hard to work with in Linux, Windows works fine though.
  22. Well, the exploits you're thinking of, anyway. Tell the router to accept VPN connections based on their IP or whatever? That's provided the router can do VPN.
  23. I like your first programming language choice! I've recently been playing with it (even made a NAS-like web server with full role-based access) and it's awesome. Why are you getting a lot of login attempts? If it's all pre-programmed with CURL it should work everytime consistently. My guess is Netflix has a timeout and CURL's trying to login but Netflix says "Login to what? You've timed out you can't type anything in here!" while it waits 5 minutes to reset the form. Think of it this way - when you login to a website, after 5-6 attempts of failed logins what happens? Either there's a CAPTCHA or it says "You've had too many attempts. Please try again later." in which case it locks down the form so you can't submit it for a while. If it's a CAPTCHA your CURL program won't see that and therefore it won't submit the form properly. So both cases are a problem for your CURL program.
  24. Sending screenshots (or other files) across Bluetooth wouldn't be a huge problem - you might have to send it a few kBs at a time (Windows/Android/iOS more than likely does that).
×
×
  • Create New...