traffic

  1. chushpan

    Sniffers and more. Choosing a tool for intercepting and analyzing traffic.

    The content of the article: Theory Wireshark CommView Intercepter-NG SmartSniff tcpdump Burp Suite Conclusion Traffic analysis is the most important step in penetration testing (or even hacking). In packets transmitted over the network, you can find a lot of interesting things, for example...
  2. Father

    Without packages and money: phishing Mail sites become leaders in traffic

    How holidays and trustfulness of citizens affect the activity of scammers. Despite an extensive information campaign and warnings, fraudulent schemes that mimic the services of the postal service continue to operate successfully. Akamai found a significant increase in the activity of such...
  3. Father

    We extract traffic and installs

    The first rule of financial literacy is not to sit on general purpose forums. 99% of people are not capable of anything. Of the remaining percentage, 99% of people do not do what you are interested in. With the remaining ones, you can use the coincidence of many random factors make a big deal...
  4. Father

    Rhadamanthys is back: Traffic accidents have become a new bait for data theft

    Even simple phishing schemes can be effective if they appeal to human weaknesses. An updated version of the malicious information-stealing software called Rhadamanthys is being used in phishing campaigns targeting the oil and gas sector. Cofense cyber expert Dylan Duncan reports that hackers...
  5. Teacher

    How do I send traffic from GitHub?

    Hi everyone. In this article, I will make it as clear as possible and briefly describe how to pour traffic from GitHub. Let's start by preparing an account for the strait. 1) First , we need to buy a proxy. I use faceless, but I think simple ones will also work, ala pia 2) After that, proceed...
  6. Teacher

    Detecting OpenVPN sessions in transit traffic

    A group of researchers from the University of Michigan published the results of a study on the ability to identify (VPN Fingerprinting) connections to OpenVPN-based servers when monitoring transit traffic. As a result, we identified three ways to identify the OpenVPN protocol among other network...
  7. Lord777

    EU introduces new rules for intercepting web traffic

    The European Union is working on updating the eIDAS regulation, which regulates electronic identification and trust services for electronic transactions in the European single market. This is an important piece of legislation in the era of digitalization, and its updating is logical given the...
  8. Carding

    A series of TunnelCrack attacks aimed at intercepting VPN traffic

    A group of researchers from New York University has developed two methods of attacking VPNs, presented under the name TunnelCrack. The identified vulnerabilities allow an attacker who controls the victim's wireless access point or local network to redirect requests to the target host to their...
  9. Lord777

    One of the ways to extract traffic in 2023

    Let's start, I think, with the basics and the very beginning. Current file types for infection at the moment: Name.exe A regular encrypted file, usually disguised as a token. Personally, I use a dropper and inflate the file itself to 20-50 MB. I put the launch in 20-30 seconds, since some...
  10. CarderPlanet

    Sniffing https traffic

    Are you sure it's impossible? You are wrong. With the help of the sslstrip program, you can replace https with http, and already calmly sniff traffic in its open form. For kompukters! (With Kali Linux of course) The first command turns on packet forwarding echo "1"> / proc / sys / net / ipv4 /...
  11. Lord777

    Free traffic from Telegram

    We get free traffic from Telegram! Introduction Many wondered how to quickly, and most importantly, promote their project, channel, bot for free. Now you will learn how to get fast, and most importantly effective traffic to your product or project using bots for communication. At the same time...
  12. Lord777

    Carding Method Traffic

    This is the purchase of goods in online stores with these cards. They are obtained by hackers by breaking into shops. There is a direction of offline carding, there is an online one. Online is the most common, real is already dying. In online there is driving in things and driving in info goods...
  13. Father

    Chasing traffic

    So, hello, today I will share my method, how I drive traffic to various phishing sites, how I do 500 miner / stealer launches, etc. Here I will not disclose the "top" methods of driving traffic. Here I will tell you about what everyone has forgotten, but from this you can have a huge profit...
  14. Mutt

    Capture and modify TCP / IP traffic on the fly with Trudy

    There are several excellent tools for capturing network traffic. So, Scapy and Wireshark are excellent solutions for organizing passive sniffing, and Scapy, moreover, is capable of sending additional packets. In case you need to intercept traffic in the Man-in-the-Middle position, you can use...
  15. Father

    Traffic С-L

    Hello again. In front of you is my treasure of knowledge gained over several years and an almost ideal way to extract cash from our favorite products (lotto and cannabis). We will buy visitors on exchanges and send them to our products so that they have already made purchases there, and we...
  16. Teacher

    Traffic from Facebook. The realities of the outgoing year.

    Hello everyone! Today I want to raise a discussion of such a fat and complex source of traffic as FB. Many who have come across him know that this is a difficult and difficult rival, into which billions of investments are poured every year, a large part of which goes to antifraud. Why do I...
  17. Hacker

    Sniffing traffic on a VPN

    At the end of a terrible spring, I was already depressed. Tired of the daily monotony. All tired... no development... These thoughts in my head were eating me up. I didn't have to strain my head for inventing any topic for a long time, because I knew that I always had an influx of "online...
  18. CreedX

    How to wrap all OS traffic in Tor

    Online anonymity has been hotly debated lately. It's not a secret for anyone that data on visits to Internet resources from a local device can be collected at different levels in order to build a "model" of a user, which can later be used against him (or could ). Therefore, it is not surprising...
  19. Lord777

    Get traffic from banners on Casual Dating in the Netherlands

    Affiliate program: ProfitSoical Platform: Exoclick AdFormat: Banner GEO: NLD Offers: benaughty.com, naughtydate.com, gibmirsex.com SOI mob / web $ 4 ROI: 20.11% A short story about how I tested the banner in dating. For me dating is about stability. Probably one of the eternal verticals, where...
  20. Lord777

    Malicious traffic research

    This article will tell you how to analyze and detect malicious network interaction on the network. The information is provided for review. Here we will discuss the main tools for analyzing network traffic and consider the sources of examples for practice. Network Interaction Analysis For the...
Top