Jump to content

theUNK0WN

Active Members
  • Posts

    125
  • Joined

  • Last visited

  • Days Won

    3

Posts posted by theUNK0WN

  1. Unless the person is GOVT., then they've hacked you at some point without you even knowing.

    I'd suggest factory resetting your iPhone, removing permissions from apps that requires information like - Location, Contacts, Messages, etc., and turning off Location settings.

    If you do the above, this *should* put some limitations to people from "tracking" you.

    You may also need to consider that the person really could not have had access to your phone and they're tracking you another way. If you're really concerned about your safety, you should go to your local police department and get a restraining order or something.

    Edit: If you're really paranoid like me (hurhurhur), just get a burning phone - change numbers / sim cards from time to time.

    • Like 1
  2. On 7/15/2019 at 6:06 PM, M4sh1lo said:

    Your best tool for security is yourself...

    Yet, the biggest vulnerability in security is yourself. 🤔

    On topic ... I use Debian-based OS with my own code and some imported "tools". For emails, I have a lot of them. For all other stuff, let's just say it's "NULL". Don't want to give away my secrets 😉 but for internet privacy - proxy chains.

  3. On 7/3/2019 at 6:47 AM, Dice said:

    A pop-up blocking a site ... will only make her curious and want to try that same site on another computer

    Well, it depends on a lot of things honestly. Keep in mind OP is asking for advice about computer monitoring for his daughter. So, I would assume OP's daughter is on the young side. Not sure how young but I would assume young enough to not know things about scams, theft, gambling, twerking, drugs, etc.

    If a popup gets blocked and she asks about it, just tell her (half) the truth - bad people trying to steal information. 🙃 Honestly, majority of popups nowadays are either scams/malware or nudity.

    On topic, I don't think RDP will be useful in this case, since you can only view the session if the other user is signed-out. As suggested above, Veyon looks like a good tool to use but if you want to be a little inconspicuous, run a privileged msf session 😎

  4. Reading a bit further down, I believe its something about taking down "easily searchable" videos on Youtube relating to "hacking".

    Quote

    Similarly, he said, if he were to attempt to make a Wi-Fi penetration test video more easily discoverable via search, by adding a tag like "hack neighbors Wi-Fi," it would be demonetized (denied ad revenue) or taken down.

    In my opinion, I think if its educational (enough) they wouldn't remove /ban the video/user(?) 🤷‍♂️ ; but if YouTube (Google) wants to remove all-sorts of content relating to "Hacking" then big brother must be seriously raging 😒

    *Isn't that violating first amendment? >.> *I wonder if this is related to the incident when YouTube was shutdown ...

  5. @UnLo@Forkish

    RE: 400GB microSD card UPDATE ...

    So, a 400GB SanDisk microSDXC card will work on the pineapple after formatting it to FAT32. I used the built-in 'Disk' Utility manager on my Linux OS (since Windows cannot format exFAT over 32GB...), inserted it into my nano and reads 366.7GB/393.7GB* --- SUCCESS! 🙂 

    I didn't try adding any modules but since my nano reads the 400GB microSDXC, I'll assume that it will add modules and all other data just like having a 16GB microSD card, except with larger space.

    IMG_018.jpg

     

    SD.thumb.png.8b4fe4dc42b7f7cc0732ed1713831d54.png

    • Like 1
    • Upvote 1
  6. On 1/3/2019 at 8:53 PM, Forkish said:

    Amazon has 400GB sd cards for $88. I want to get one, that way I can hold all my recons & logs FOR-EV-VER!!

    Ya'know ... I literally had the same idea few days ago >.> hmmmmmmmmm .....

     

    6 hours ago, UnLo said:

    I'd start with a 128gb and make sure it can read that before going that big. 

    Buy one and test it out for us? 😛

  7. 3 hours ago, biob said:

    Are you asking... how to locate an Access point by walking around and taking measurements?

    If that's what they're asking, I usually look at the *signal level of the ssid to see how close i am to the box.

  8. Windows 10 should be able to randomize your MAC upon joining a network each time, depending on how its setup in 'Settings'.

    If not, then go with the program venom posted above. I have it and honestly does the job! It even keeps the address after restart.

  9. 10 hours ago, squathub said:

    exploit(windows/smb/ms08_067_netapi) > use exploit/windows/smb/ms08_067_netapi

    set PAYLOAD windows/meterpreter/bind_tcp

    I'm confused here. Are you attempting to use a Windows payload to exploit a MAC OS? Or are you implying that you're using MAC OS to exploit a Windows machine?

  10. Personally, I haven't tested any exfiltration payloads (yet) but I have noticed that one of my payloads takes more time than I actually thought to carry out and complete.

    When the LED turns 'green', give it a few more seconds as their might be some delay in gathering, compiling and exporting data into the loot folder.

    • Upvote 1
  11. .... OK, I'm going to address some issues with what you're seeking here.

    From what I can tell from reading the above, it seems like you're wanting to look for a way to "spy" / "monitor" (hacker for hire?) on your "competitors" during the cooking fair, which has already been stated "illegal" on your other thread. There is absolutely no way you can stop your competitors, employees nor guest from using their personal mobile devices in public. It is their right. Please, consider the advice given on the previous thread you've created and discuss it with your staff / peers. Assuming of course, your scenario is true because its starting to look as if you have other means of intent.

    Now, if your story is true and you're literally *that* "paranoid" about it, just hire some event security staff and implement a rule "No photos or video recording" while participating in the fair. People being people, some will abide by it and others won't. Like I said, it's their right to use personal mobile devices ... You have to think of something else other than "monitoring" everyone that comes near the fair. *It's not impossible to do but without knowing / having specific information to look for (if you already have), it will be like hunting for a needle in a hay stack. From what I've learned when I created an account on this site, you will not receive help with any forms of "illegal" activity as what you're describing above.

    TL;DR: No. illegal.

    * -------------------------

    Also, if your "scenario" is just an example of what you're wanting to do on your home network "my wifi router ?", then you should consider consulting with your ISP about monitoring data. Then again, you're able to encrypt traffic so you might just be out of luck. Which also brings back the point of this post:

    On 8/3/2018 at 4:03 AM, Rkiver said:

    Company Wifi? Just blacklist the devices if they are privately owned ones and not company ones so they can't connect.

     

    Problem solved.

     

     

  12. 4 hours ago, zhenweefusion said:

    The phone are private but i would like to know is there any ways to monitor ? 

    There are ways to monitor, just not "legally" since they're "private" mobile devices. In other words, you need to ask employees permission to "monitor" data on their "private" mobile devices.

    There are ways "around" this "legally" (contract trap sort-of-thing?) but I'd rather not say ... One I can mention is creating / updating the EULA, Terms & Conditions, Privacy policy, Code of Conduct, etc. when being connected to the company's network.

  13. Yeah, it's if you're using it on Windows for WiFi >.> (it really is).

    Seriously though, monitor mode doesn't start like it should. It stays on a "fixed" channel, even when specifying which channel to listen on. There seems to be a bug where it displays "-1" channel, which can be fixed but isn't permanent. Packet injection works but looks entirely different; there are some cases where it doesn't go through, even when it displays it does ...

    Honestly, it's just a headache to me. Oh and if you're not using Kali (I don't) you have to install / use a Linux kernel that's version 4.2 and under. Anything that's kernel higher than that, you'll have installation issues ... Well, I haven't tested any other version higher than 4.2 but I'm assuming it wouldn't work.

    All in all, Alfa AWUS036ACH *does* work but isn't really "stable" as most people think. Personally, I'd just stick to 802.11/b/g/n instead of attempting to mess around with a/an/ac for a while.

    *Might want to have a look at this thread: Alfa AWUS036ACH Kali Configuration Guide this was posted earlier this year. I came across this literally just yesterday and have not had the time to overlook it.

×
×
  • Create New...