Jump to content

theUNK0WN

Active Members
  • Posts

    125
  • Joined

  • Last visited

  • Days Won

    3

Everything posted by theUNK0WN

  1. What do you mean by "why" ? I would assume that the wireless card can only send/receive data on supported 2.4ghz frequencies.
  2. Unless the person is GOVT., then they've hacked you at some point without you even knowing. I'd suggest factory resetting your iPhone, removing permissions from apps that requires information like - Location, Contacts, Messages, etc., and turning off Location settings. If you do the above, this *should* put some limitations to people from "tracking" you. You may also need to consider that the person really could not have had access to your phone and they're tracking you another way. If you're really concerned about your safety, you should go to your local police department and get a restraining order or something. Edit: If you're really paranoid like me (hurhurhur), just get a burning phone - change numbers / sim cards from time to time.
  3. Yet, the biggest vulnerability in security is yourself. 🤔 On topic ... I use Debian-based OS with my own code and some imported "tools". For emails, I have a lot of them. For all other stuff, let's just say it's "NULL". Don't want to give away my secrets 😉 but for internet privacy - proxy chains.
  4. I don't own a ducky (bb ftw) but have you searched the forums =/= www for a solution before pinging Darren? Have you tried lurking around the discord? Maybe someone there has an answer but you best bet is to search it yourself first.
  5. I would have assumed our "rights" would have applied for US (.com) YouTube, is what I actually meant but doesn't seem to be the case because they're a privately owned company (lol?). Yep. Definitely sounds like big brother ops. 🤷‍♂️
  6. Well, it depends on a lot of things honestly. Keep in mind OP is asking for advice about computer monitoring for his daughter. So, I would assume OP's daughter is on the young side. Not sure how young but I would assume young enough to not know things about scams, theft, gambling, twerking, drugs, etc. If a popup gets blocked and she asks about it, just tell her (half) the truth - bad people trying to steal information. 🙃 Honestly, majority of popups nowadays are either scams/malware or nudity. On topic, I don't think RDP will be useful in this case, since you can only view the session if the other user is signed-out. As suggested above, Veyon looks like a good tool to use but if you want to be a little inconspicuous, run a privileged msf session 😎
  7. Reading a bit further down, I believe its something about taking down "easily searchable" videos on Youtube relating to "hacking". In my opinion, I think if its educational (enough) they wouldn't remove /ban the video/user(?) 🤷‍♂️ ; but if YouTube (Google) wants to remove all-sorts of content relating to "Hacking" then big brother must be seriously raging 😒 *Isn't that violating first amendment? >.> *I wonder if this is related to the incident when YouTube was shutdown ...
  8. Whatever cellular device you have, your question may be answered on xda-developers site. Like b0n3z said above, unlocking the bootloader is your first step to rooting a device, if the manufacturer even allows you to.
  9. @UnLo@Forkish RE: 400GB microSD card UPDATE ... So, a 400GB SanDisk microSDXC card will work on the pineapple after formatting it to FAT32. I used the built-in 'Disk' Utility manager on my Linux OS (since Windows cannot format exFAT over 32GB...), inserted it into my nano and reads 366.7GB/393.7GB* --- SUCCESS! 🙂 I didn't try adding any modules but since my nano reads the 400GB microSDXC, I'll assume that it will add modules and all other data just like having a 16GB microSD card, except with larger space.
  10. Ya'know ... I literally had the same idea few days ago >.> hmmmmmmmmm ..... Buy one and test it out for us? 😛
  11. If that's what they're asking, I usually look at the *signal level of the ssid to see how close i am to the box.
  12. The login credentials should match this image: If you have something different, that would *normally* be the cause of a failed authentication. What does your database.yml display?
  13. ./crunch 12 12 -t 0MGSM2@@@@@@ -o (output destination).lst I'm sure a line of code is missing from the command but gives you a general idea of what it'll look like when creating the worldlist.
  14. I've yet to watch this TV series. It's a shame it's been discontinued ?
  15. I dunno maybe they could be onto something .... *shrugs* I never really trusted using public pen-test OS, especially Kali since it's popular. That's why you should create your own ;).
  16. It's probably because the ports are literally filtered / closed on the target you're attempting to scan. I'd wait a while before trying again, then maybe a port might open - usually 80.
  17. Windows 10 should be able to randomize your MAC upon joining a network each time, depending on how its setup in 'Settings'. If not, then go with the program venom posted above. I have it and honestly does the job! It even keeps the address after restart.
  18. I'm curious as to what images were shown. What did you search initially? Because when I searched "unmarked black wifi router with four antennas", nothing relating to the Tetra or nano pops up.
  19. I'm confused here. Are you attempting to use a Windows payload to exploit a MAC OS? Or are you implying that you're using MAC OS to exploit a Windows machine?
  20. Interesting! I will have to read up this when I have time.
  21. Personally, I haven't tested any exfiltration payloads (yet) but I have noticed that one of my payloads takes more time than I actually thought to carry out and complete. When the LED turns 'green', give it a few more seconds as their might be some delay in gathering, compiling and exporting data into the loot folder.
  22. .... OK, I'm going to address some issues with what you're seeking here. From what I can tell from reading the above, it seems like you're wanting to look for a way to "spy" / "monitor" (hacker for hire?) on your "competitors" during the cooking fair, which has already been stated "illegal" on your other thread. There is absolutely no way you can stop your competitors, employees nor guest from using their personal mobile devices in public. It is their right. Please, consider the advice given on the previous thread you've created and discuss it with your staff / peers. Assuming of course, your scenario is true because its starting to look as if you have other means of intent. Now, if your story is true and you're literally *that* "paranoid" about it, just hire some event security staff and implement a rule "No photos or video recording" while participating in the fair. People being people, some will abide by it and others won't. Like I said, it's their right to use personal mobile devices ... You have to think of something else other than "monitoring" everyone that comes near the fair. *It's not impossible to do but without knowing / having specific information to look for (if you already have), it will be like hunting for a needle in a hay stack. From what I've learned when I created an account on this site, you will not receive help with any forms of "illegal" activity as what you're describing above. TL;DR: No. illegal. * ------------------------- Also, if your "scenario" is just an example of what you're wanting to do on your home network "my wifi router ?", then you should consider consulting with your ISP about monitoring data. Then again, you're able to encrypt traffic so you might just be out of luck. Which also brings back the point of this post:
  23. There are ways to monitor, just not "legally" since they're "private" mobile devices. In other words, you need to ask employees permission to "monitor" data on their "private" mobile devices. There are ways "around" this "legally" (contract trap sort-of-thing?) but I'd rather not say ... One I can mention is creating / updating the EULA, Terms & Conditions, Privacy policy, Code of Conduct, etc. when being connected to the company's network.
  24. Yeah, it's if you're using it on Windows for WiFi >.> (it really is). Seriously though, monitor mode doesn't start like it should. It stays on a "fixed" channel, even when specifying which channel to listen on. There seems to be a bug where it displays "-1" channel, which can be fixed but isn't permanent. Packet injection works but looks entirely different; there are some cases where it doesn't go through, even when it displays it does ... Honestly, it's just a headache to me. Oh and if you're not using Kali (I don't) you have to install / use a Linux kernel that's version 4.2 and under. Anything that's kernel higher than that, you'll have installation issues ... Well, I haven't tested any other version higher than 4.2 but I'm assuming it wouldn't work. All in all, Alfa AWUS036ACH *does* work but isn't really "stable" as most people think. Personally, I'd just stick to 802.11/b/g/n instead of attempting to mess around with a/an/ac for a while. *Might want to have a look at this thread: Alfa AWUS036ACH Kali Configuration Guide this was posted earlier this year. I came across this literally just yesterday and have not had the time to overlook it.
×
×
  • Create New...