NordVPN, hundreds of access points Dozens of countries, even High Speed "streaming" access points, and direct to TOR access points that encrypt your entire connection stream, they even accept Bitcoin. They have a Canary, and even still have no logging.
I think they check whether the password was leaked on HaveIbeenPwned.com and prevent you from using a password that has been. If it's a generic password (GitHub123!) then it needn't to be yours, but if it's tied to you, time to change your password everywhere you used it (even it wasn't yours, you should)
>This is really suspicious, and it confirms my intuitions that Nord is too good to be true.
>Don't trust NordVPN!!!!
You're a fool to consider this evidence or proof that your intuition is right.
Mullvad () if you are wanting something that'll keep you anonymous. They get you to create an account number which is the only identifier.
It costs €5 ($5.50) for a month. They have the option for you to mail them cash to further protect your identity. They are definetly worth checking out.
I uploaded the file to any.run and it seems like it downloads and executes a RAT. OP if you are reading this check for C:\Users*yourusername*\avrt\assignedaccessproviderevents.exe.exe also run a Windows Defender and MalwareBytes scan just to make sure :)
Also don't ask why I opened Chrome in the middle of the sim lol
Firefox/Chrome = Brave Gmail = ProtonMail YouTube = BitChute Twitter/Reddit = Gab Google = DuckDuckGo/StartPage/Qwant WikiPedia = InfoGalactic FaceBook = Minds
https://alternativeto.net/list/818/how-to-live-without-google/
Do you have proof they cooperate with the NSA? Other than suspicion?
Just because Google, Verizon and AT&T cooperate. Doesn't mean every single company in the entire United States is also complicit. Some companies do still have lawyers who do their job and cite the constitution when issued one of those National Security letters.
I mean, it's not like HideMyAss where we have proof they sold someone out. Who did PIA sell out?
Hi there,
You're on the right track with that! This requires to subscribe to a malicious Filter via user interaction.
However we're aware of other implications and are already working on a fix for this.
You can find our official statement for this here: https://adblockplus.org/blog/potential-vulnerability-through-the-url-rewrite-filter-option
Cheers,
-Jessy
The other nice thing about Mullvad is the transparency. Unlike others, ownership and management is known, they operate on EU rules and do not keep logs. There are no gimmicks, no discounts, tricky plans etc. just plain service at a fixed price.
Be aware it is also necessary to OPT-OUT in order to prevent "[sharing] my account information with Facebook to improve my Facebook ads and products experiences", and can only be done in the first 30 days of registering.
Just my 2c:
You should never stop learning in this field. If you stop learning, you're falling behind.
When you get stuck on OverTheWire, try not to ask someone for the answer. Instead, lookup the manuals for the tools you're allowed to use (man ifconfig
for example). Get used to not knowing something and having to find the answer for yourself.
Relevant quote to internalize:
I was using an application for OSX called "Charles", which has some of the oddest branding I've seen:
It worked pretty well; I set up a whitelist so that only requests to our API would be allowed through, and I set it up to redirect all requests to that API to a local server I had set up (with the SSL certificate that would allow the request to go through, since they had moved to our SSL endpoints).
So, I wasn't able to sniff the traffic from their app directly (since it was using our own SSL endpoints), so I spun up a local server instead to log the request details and be able to develop this without alerting the author.
Someone posted a link to An IPFS copy in r/IPFS_hashes. Apparently it is mirrored to IPFS here.
I'm not sure if that is the actual leaked code, though.
If you want a cheap alternative to rubber duckies, look into badusb. $15 arduino leonardo in a usb form factor. I've used it to write a script that can open an admin ps terminal and potentially download/execute a payload.
Find an FM transmitter for the car like this one: https://www.amazon.com/Transmitter-Adapter-adapter-Built-Players/dp/B076X3GSMH and set it to 98.1FM and hide it somewhere as close to the antenna of the radio as possible. Depending on the strength of the FM transmitter it will cause a lot of static and interference and force your manager to use another station. Connect to an ipod and play grindcore/deathmetal on repeat for an even more annoying effect.
That’s your 50% paranoia. Even if it was a full 1.5M sq ft of datacenter how does that impact your trust with NordVPN? You narrowed down a leased IP address to a city that has several of the state’s largest data centers and are blatantly assuming or implying its collusion with the NSA? Physical proximity is not enough evidence to run a company through the mud because you are paranoid. It’s also not enough to discredit it though, to your point.
It's absolutely a malicious file. Here is the link so the sandbox report for the executable linked inside the js file.
Well for NordVPN its both a no logging VPN and is based in Panama so it would be almost impossible to crack the encryption to look at your data. However, the bigger and more technologically advanced nations such as America, Japan, etc do have both the skill, time and resources if they choose to. However, you would have to do something to make yourself stand out and put ”heat” on you.
Short answer: Yes, but it would take you fucking up for them to actually want to waste the time and resources to bother.
Because pal, a logless VPN is a single point of failure. In a secure design, you never want a single point of failure if you can avoid it. A Tor connection creates three; or in other words, to catch you, three separate servers, all in different countries, would all have to simultaneously agree to log you and share your information with each other and more importantly the end authority. If even one link refuses, they can't trace you. Furthermore, Tor servers don't log requests to try to prevent abuse; since it's an open network, and not a commercial enterprise, the Tor network doesn't need to keep temporary logs to detect that. You'll find a lot of logless VPNs do that in the fine print, like for example, I believe ProtonVPN does to prevent abuse of its free plus trial with new protonmail accounts.
>Please do some research before you end up like this kid in the article.
Look buddy, you're not going to bullshit your way past me. I don't want to risk sounding rude or mean, I really don't, but you're either severely misinformed, or way out of your depth. Or perhaps both.
VyprVPN isn't all that great according to /u/thatoneprivacyguy . Some bad stuff like logging, and 14 eyes country when you break it all apart.
That's right, on Android serving ads means "full network access", because that's the only choice there is, either full access or none at all.
I find the permissions better explained on Google Play:
Version 2.0 can access: In-app purchases Camera take pictures and videos Other view network connections full network access
Also the description is pretty clear:
> Laser For Cats: New Prank is a simulator game for grown cats and kittens! Laser dot appears on game screen, cat sees it and tries to catch! Tease cats with a colored dot, make fun of your kitten! Cats love to play with laser dot! Play with cats to make them purr! If cat is bored, the app Laser for Cat will cheer him (or her) up! Happy cat is the guarantee for joy house! > Attention! Laser For Cats: New Prank is a joke, a simulator game! The phone camera cannot project an image or laser beam on any surface! The laser dot appears ONLY on screen!
But of course people will only look at the pictures, which is why they don't show what the game actually looks like.
Can't provide logs you don't have.
:
Q. Do you keep ANY logs which would allow you to match an IP-address and a time-stamp to a user of your service? If so, what information and for how long?
A. NordVPN is continuously committed to our zero log policy, which means we do not log any of our users’ activity, nor the IP addresses or timestamps.
According to the service’s website, only the username, user email, and payment information are recorded.
Being "quite familiar with computers" is not close to knowing enough to safely hack your bully. you are about a decade away from being a hacker.
don't send the trojan. you have no idea what you are doing and it will be traced back to you.
if you are seriously interested in IT and hacking related stuff, pick up a linux distribution and set up a web server, mail server, dns server... etc. learn some networking protocols. pick up TCP/IP Illustrated.
in the mean time, spread rumors to the girls in your school that the bully has herpes and leave it at that.
Mullvad. You can mail them cash with no return address to fund a randomly generated account number that you provide. And it's only 5 euro a month.
Express is easy pretty secure and very fast but it will run you 100usd a year. You can pay in Bitcoin.
First of all: Use a password manager. Just go download something like this. AND DO NOT REUSE PASSWORDS, PLEASE. What makes it hard for me is that the email you got is something so many people get. It is not specified to a person, so this hints to either the password being slightly similar to any older one or you have a keylogger on your device. The later is really, really unlikely. The best thing to do is update websites where you used the same/similar password and replace them with a generated password. Yes, for each site. Most importantly: we do not know the hashing algorythm. SHA1? MD5? Hell, the may have used the caesar cipher \s.
For peoplet that want to learn about proper password storage: https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html
Because they are aggressive, good at what they do and often times very reckless. Andy Greenberg wrote a very good account of the activity of a single Russian military intelligence unit in the fanatic book Sandworm
[[email protected]]~% nmap whitehouse.gov zsh: no manners found: nmap whitehouse.gov [[email protected]]~% please nmap whitehouse.gov
Starting Nmap 6.40 ( http://nmap.org ) at 2015-10-23 05:36 NST ...
Don't remind me about that or i'll get sucked in. It's still active. Maybe I'll just check it out to see if they added any new endgame content...
http://orteil.dashnet.org/cookieclicker/
Also - cookie clicker is not the old days.
Downloaded the .7z file from the post over in /r/netsec
There is also https://isleaked.com/en.php, it'll give you the first two characters of the password.
From that I've determined that my password came from DreamHost, it's the only place I used that email with that password.
:edit: link to OPs post with dump: https://www.reddit.com/r/netsec/comments/2fz13q/5_millions_of_gmail_passwords_leaked_rus_most/cke79w3
Seems more like a "Just because I can" then something overly practical. Kali on android seems like a more practical approach....less suspicious to see someone playing with their phone. https://www.kali.org/tutorials/kali-linux-android-linux-deploy/
If you want "Secure Messaging"
​
One of the first things you see when you visit its website is a 2015 quote from the NSA whistleblower Edward Snowden: “I use Signal every day.
and apparently it's true.
I don't think a russian based vpn is a good idea.
maybe vpn chaing?
The biggest problem is afaik. that the user leaks information. Quite a few high profile people have been catched that way . (silkroad admin?)
What about badusb protection? Some kind of tripwire automatic shutdown?
Also I would not suggest IR LEDs for blinding cameras. That's just bullshit. This way you're going to attract as much attention as possible. And you don't even if it works.
Qubes is nice, but what do you want to accomplish? I would say it is not worse or better than whonix or qubes+whonix.
Also, avoid PureVPN (no logs? well, you better read the news and not the advertisment. I hope they die, but chanves are that other/similar providers have the same issue. use multiple vpns in a chain, multiple providers)
I would not use a 3g card in a laptop as it has always the same imei which registeres in the network. just the provider changes. Use a burner phone as mobile hotspot or public access points.
You are talking about information harvesting (which is done by advertisment companies) but don't include anything about browser safety (noscript, ublock origin, umatrix, privacy badger..)
A keylogger is the first thing an abusive hacker boyfriend would install, which makes changing passwords futile. Besides threatening with contacting employers and authorities, wiping or replacing PC and phone should be the first step. Backed up personal files should be virus tested just to be sure. AFTER THAT you should change passwords. If you have current evidence of a breached account, change the password immediately. Use a phone as keylogging them is not as easy.
Remembering too many unique passwords can be exhausting but your password security relies on you NOT giving out your default phrase to anyone. Use a password manager like https://keepassxc.org/ which stores your password as encrypted file on your pc instead on someone elses computer (e.g. cloud). With a sufficient passphrase even the best haxor can't breach the file without years of computing time, making it "save" to back it up on your personal cloud. This enables you to give out unique passwords for every account making the inevitable breach of one account far less dangerous. (just make sure to never lose that file >.< )
NordVPN is the way to go. They do not track or keep any records of where/when you connected using their services. As far as my research lead me, NordVPN is widely used in commercial and government sites for it's reliability, security, and price.
Here's PC MAG take on the service along with reviews for other top notch VPN services for around the same price.
Just because the movie is about Assange doesn't mean Assange made it or had anything to say about it. He has actually been against the movie since it was in production. 0/10, do your homework.
https://wikileaks.org/First-Letter-from-Julian-Assange.html
http://www.hollywoodreporter.com/news/wikileaks-sabotages-fifth-estate-own-649685
"I cannot permit this film any claim to authenticity or truthfulness. In its current form it has neither, and doing so would only further aid the campaign against me." - Julian Assange
I bought this digital lock from amazon with the hope of teaching myself how to hack. There’s a USB Mini plug on the bottom that can be used to gain access.
What type of firmware/files should I be searching for on the lock? How would I access those files/firmware from a computer? What type file would be need to run in a brute force on this lock?
I have no idea what I’m doing but would like to learn. Any help or tips is appreciated!
Good idea, though watch out! There are a few case makers that make stuff like this. I like camera accessory cases. They're waterproof and designed to hold pieces of similar size.
Stuff to watch out for:
Plastic gets staticky (have you ever noticed animal hair in the outside of plastic bins?). So if you use this method, line the inside with antistatic bags, or wrap sone of your equipment in antistatic bags like that, but they make all different types.
You might want to shave off that logo. DeWalt is a high target of thievery, someone will think that is full of expensive tool accessories and nick it. So paint it, sticker it. Anything to make it not DeWalt.
Hard cases suck to carry around after a while, personally. Hence why I do a soft side, waterproof, camera accessory bag.
The ability to set a block of text as "code". This gives it monospacing and can even colour based on what language. This is so useful if I'm writing/saving/copying/noting commands I type into the command line of a terminal.
It also supports markdown.
Check this out: https://www.notion.so/Code-blocks-69df2788f65345bbbe18596cfa1750fe
SSDs have more blocks available than they present to the user at any one moment, for wear-levelling purposes. If you write zeros to every visible sector, there can still be gigabytes of your private data left alone in sectors the drive had rotated out for wear-levelling. These can then be read out by an attacker by rewriting the wear-levelling map, or by connecting to the storage chips directly (bypassing the controller).
Many SSDs have special erase commands available which should erase all data, including spare blocks, but it's hard to verify the correct operation of these.
http://www.makeuseof.com/tag/securely-erase-ssd-without-destroying/
You're correct, they targeted a version of Firefox that was in the Tor Browser Bundle. Users who didn't have the most up to date Firefox (after the 0 day was patched) were vulnerable.
Here's a more detailed explanation. https://www.wordfence.com/blog/2016/11/emergency-bulletin-firefox-0-day-wild/
The biggest threat to tor anonymity is still the end users browsing habits.
It actually is from Microsoft, here's an article about it. It's also open source, so you're right it can be found on Github.
I had this trouble as well, I started personally by setting up Kali Linux in a virtual box which offers a whole host of tools pre-installed. I then primarily looked at Metasploit and downloaded Metasploitable 2 (which is an easily hackable virtual PC) but this has led me down various paths, such as learning to hack databases, hack websites as well as lots of other things.
You can find lots of beginners guides on the Kali website as well, but not legitimate targets that you can practice on. Vulnhub can help with finding free, virtual OS's to download and practice on, without worrying about breaking the law.
Unfortunately, I'm still an utter noob at this so cant help with any technical questions but can try and help with any setup questions you may have.
Kali Linux - https://www.kali.org/ Metasploitable 2 - https://www.vulnhub.com/
Check out cybrary.it.
Free courses from CompTIA Security+ all the way to CISSP.
Currently working through the Ethical Hacker course (for CEH) then I'm going onto the forensics course.
All good stuff and all totally free!
So which IP are you scanning, your public IP (assigned from your ISP) or your private IP (handed out by your home router)? The public IP is probably hitting your home router and not giving us correct information. Go to a command prompt and type ipconfg (on windows) or ifconfig (mac / linux). The IP address it gives there is the one you want to scan.
In this case - you own all the hardware involved and are scanning your own services so legally this is fine. I am not a lawyer but I've heard port scanning referred legally to jiggling a door handle to see if a door is unlocked.
I would recommend using Nmap or the GUI Zenmap. https://nmap.org/zenmap/
More info on the legal considerations when scanning things you don't own https://nmap.org/book/legal-issues.html
Not sure about this, but I know that there are methods to inject your .exe into already running and trusted processes such as explorer.exe or svchost.exe for example.
http://www.codeproject.com/Articles/4610/Three-Ways-to-Inject-Your-Code-into-Another-Proces
Tell us a bit about the device. If it's Android or iOS based device in your possession, there are easy and legal ways to do it, like the Fake GPS Location app or with something like Frida if needed. If it's some other kind of device or a device not in your possession, spoofing it requires some dedicated SDR hardware.
With the latter case, if you're not carefully following RF lab protocols, there's a chance you might get some unwanted law-enforcement attention.
Get something like this, charge it, connect to bluetooth, plug in the transmitter and literally will be small and annoying enough all day to make the place bearable.
Good luck.
Buy a decent book on pen testing using kali. A great starting point for beginners: https://www.amazon.com/Basics-Hacking-Penetration-Testing-Second/dp/0124116442
I'm 30 years old and currently working 30% in pen testing, and 70% with developing electronic warfare systems at the most reputable cyber security company in Scandinavia. I wish I had found this interest at your age! If you put some effort into it and have a genuine interest in the field, the possibilities are truly endless.
It might be a boring answer, but seriously.. Read! Don't get stuck playing around with tools, but read up on the subject as well. The book I linked is a very easy read, and will get you started with the practical aspects very quickly. Once you have the basics down you might also want to check out "The Hackers Playbook 2". If you find reading tedious I suggest enrolling in a course on udemy.com, that way you can alternate reading with video lectures.
Good luck! The industry needs more young and hungry minds :)
Total Commander. It's a dual-pane file manager. Those who've used it on Windows (first as "Windows Commander" and later "Total Commander") since 1993 will feel at home.
It has optional free plugins for Dropbox, Google Drive, OneDrive, FTP, SFTP, FTPS, WebDAV, SMB (Windows shared folders), direct wifi transfer, and more.
It can take advantage of root too, if your phone is rooted, so you can browse and edit system files, if you want to.
From hacker news: >To be clear, by "blocked" Flash we really mean enforced click-to-activate. User choice is always a #1 priority at Mozilla.
>We regularly block vulnerable plugins. What made this block different was that we did it before Adobe made an update available. Now that Adobe has released an update, it is no longer true that every version of Flash Player is blocked in Firefox.
Reinstall your windows, don't save the files if you can avoid it. Also change your router password in the router admin and reset your router to factory settings (before changing the pass). Then install Mbam premium and Kaspersky IS 2018.
Btw you can check your firewall under start > allow an app through windows firewall to see if the exe is allowed there. Probably have some remote desktop tool installed.
Change all your passwords / private keys that might have appeared on screen and activate 2 factor if you have crypto. NOT VIA PHONE. Use google auth.
After win 10 is back and up to date and all is installed, load wireshark in case there's something in your GPU and it didn't take care of it. It will show all traffic. See if there's a funky IP in there.
In windows, use PIN access (option in win 10 https://lifehacker.com/add-a-pin-lock-to-windows-10-to-make-your-microsoft-acc-1741622891) that will make it impossible for remote log on.
Yeah companies like PureVPN and HideMyAss said that they dont have logs but when court ordered to hand over the logs they had indeed logged everything.
But then theres companies that have proved in court they indeed do not have any logs they could hand over. At least PIA proved in court that they indeed do not have logs. ExpressVPN servers were seized by turkish police because they didnt believe they dont have logs. And indeed they did not have any logs.
NordVPN have been audited twice by third parties and both times confirmed that they indeed do not keep any logs.
So be picky when you choose your VPN provider.
It looks like that uses SiriusXM's guardian feature which uses more than just a basic satellite radio. It's similar to OnStar with two way communication via the cell networks.
Note that this is an archaic method that hasn't worked for years. See this discussion for further information.
Fixed formatting.
Starting Nmap 6.00 ( http://nmap.org ) at 2014-05-22 16:11 IST Nmap scan report for john.com (162.252.156.212) Host is up (0.16s latency). rDNS record for 162.252.156.212: perfora.net Not shown: 995 filtered ports PORT STATE SERVICE VERSION 21/tcp open ftp ProFTPD 22/tcp open ssh Linksys WRT45G modified dropbear sshd (protocol 2.0) |ssh-hostkey: 1024 34:47:0f:e9:1a:c2:eb:56:eb:cc:58:59:3a:02:80:b6 (DSA) 80/tcp open http Apache httpd |_http-methods: No Allow or Public header in OPTIONS response (status code 200) |_http-title: John.com 81/tcp open http Apache httpd | http-auth: | HTTP/1.1 401 Authorization Required | Basic realm=WebDAV |_http-title: 401 Authorization Required |_http-methods: No Allow or Public header in OPTIONS response (status code 401) 443/tcp open http Apache httpd |_http-methods: No Allow or Public header in OPTIONS response (status code 200) |_http-title: John.com Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: storage-misc Running (JUST GUESSING): Linksys Linux 2.6.X (86%)
I can save you from reading the rest of the comments and say that nobody knows. It's the same theories about being raided by the FBI and some still believe that it's secure to use.
This is the fork of Truecrypt plans on having active development after the TrueCrypt audit is complete. https://ciphershed.org/
https://ghostbin.com/paste/jrr89
this is the actual "noob's guide", I didn't see it in that article, it was originally posted in those instructions, I guess ibtimes decided to remove it from the "instructions"
Check out the following books:
TCP/IP Illustrated, Volume 1: The Protocols: The Protocols v. 1 (Addison-Wesley Professional Computing) https://www.amazon.co.uk/dp/0321336313/ref=cm_sw_r_cp_api_i_HsfhDb3TC15DK
By Gary A. Donahue Network Warrior (2nd Edition) https://www.amazon.co.uk/dp/B00NBJPIV8/ref=cm_sw_r_cp_api_i_ltfhDbJCDDXG7
Don't put all that trust into these companies, especially if they operate in the US of A, the land of freedom. They claim to keep no logs but are willing ti suck dick if the authorities tell them to do so. Remember IPVanish kept a "strict zero logs policy". HideMyAss and PureVPN were also involved in shady activities with cops.
They say they didn't keep information, which was proven as a lie but worse of all is that they could have lied to the authorities and kept the information, but no, they advertise as a no logs policy (charging you more for that) and will happily screw over their customers. Keep that in mind whn you trust a VPN provider.
Keyloggers worked how they are programmed. The most simple would be a global keyboard hook, which in layman's terms is like your program asking the operating system to be notified and allowed to handle the event every time a key is pressed. For your first example after typing "password12345" and the backspace twice the program would know every key pressed and in what order and could decide to display it however it wants, be it "password123" or "password12345<backspace><backspace>"
Your second example would fool a rudimentary keylogger like one that operates as I've just described, however, a more robust malware has many options when it comes to password stealing/interception. They can inject code into other processes, monitor network communications, alter web pages, or look on your hard disk to steal stored passwords and cookies.
Edit: Actually the most simple (stupid) key loggers I've seen use GetAsyncKeyState and actively poll every key to see if it is pressed. It seems to be a pretty bad way of doing it.
It's not 2004 anymore :D
You can get a wifi adapter that is capable of monitor mode etc. and is no larger than your mouse USB.
If you really need a big antenna than put it inside of something I guess.
You might be interested in reading Practical C Programming. This book is about C (obviously) but it has really helped me understand what good code is supposed to look like. It looks very much like yours! I recommended it to all.
Wow how the hell did you get all this data? Surely you didn't try each and every VPN yourself? I'd love to also see stats about whether the VPN is blocked in countries like China/Iran. My experience is almost everything except the big names like Astrill are blocked in China, which also makes me think Astrill somehow has a deal with China... Astrill is one of the few that use non standard protocols which helps a lot in China too.
EDIT: Also you said in the FAQ it helped you choose a VPN service, so which one did you choose?
Sent. If anyone else wants it. Just search for havij pro on TPB, not allowed to link it.
Edit: Apparently some people don't know that TPB stands for The Pirate Bay, so to make it clear:
(0. Install an adblocker so the nasty ads don't spook you)
1. Install a torrent client. I suggest Deluge
2. Go to the piratebay.
3. Search for Havij Pro
4. There is only one torrent uploaded in 2013.
5. Download
6. ???
7. Profit
also ignore the DNS records that show up.... concentrate on the IP only. Maybe the hosts file on your MAC points to this IP for this domain... to hide its tracks.
Pretty sure you have some malware on your machine.
If you want detailed info on domains, IPs, routing etc. use https://www.robtex.com/en/advisory/dns/gov/gpo/www/
Top left -> enter something -> all the info you ever need
Extracting the hash and throwing it against a good dictionary is really the best way to go about it. Hashcat is fast, churning through a 3GB dictionary on my machine in a couple of hours. If you can get a dictionary that's more comprehensive, that's even better.
I googled around for you, and this is a pretty good description of the process. It certainly explains it better than I could, with pictures and everything.
I run Hashcat on my Mac rather than on a Kali virtual machine. Being able to take advantage of the GPU makes a world of difference in speed - but it does bog the machine down quite a bit while it's running, so that's a tradeoff you'd have to consider. If you happen to be on a Mac as well, it can be installed quite easily with Homebrew. If you're on Windows, surely there's something out there you can download and install.
I wouldn't try brute-forcing it; that honestly would take forever. If it's not in the best dictionary you can find, you're probably better off finding some other way to get at the files that were archived. They might still exist somewhere in a folder on someone's PC, or in a backup, or on Dropbox or something. Depends on what the file is.
Anyway, good luck.
NordVPN. It's a little expensive compared to others, but I think it's well worth the money.
They have a very strict "No Logs" policy. They're based in Panama (not subject to US or UK laws). They have well over 400 servers to connect to around the world (52 countries), some of which are either double-encrypted, VPN-to-TOR, anti-DDoS, or specialized for fast TV streaming. About 30,000 proxies to use. They regularly put out blog articles on how you can stay safe and more private online. Native clients for Mac, Windows, iPhone, Android. Works on Linux (no native client, but OpenVPN support). Can connect up to 6 devices simultaneously on 1 account. Allows P2P, so you can torrent over their servers and stay protected. Can pay with BitCoin for the more paranoid users. The list goes on...
tl;dr: Overall it just checked all the boxes of things I was looking for in a VPN service provider. No logs. Not US based. Ton's of servers to pick from. Good security.
PM me if you'd like a referral code to get a 20% discount.
My company has been receiving mails like this. You've probably got pwned somewhere and somebody has your old password that they found in an account dump, i suppose. You can check which of your accounts got compromised: https://haveibeenpwned.com/ If you have changed your password everywhere, you should not be too concerned.
Because some people actually browse official website
"Hindu Goddess of time and change ? Philippine martial art? Cool word in Swahili ? None of the above. “Kali” is simply the name we came up with for our new distribution. "
Try Kali Nethunter ( https://www.kali.org/kali-linux-nethunter/ ) its better than installing individual apps and the images are available for almost all nexus devices and all the one plus one. Also its free and open source!!
They have loads of free courses, so why not start with those and see if you like them? They seem pretty good to me, covering aspects of cyber attacks outside of terminal commands, actually profiling a company/target and compiling reports for them, as well as getting down to analysing network traffic, crafting packets etc.
You can do a few things. But the easiest one is to download this app https://www.fing.io. and run it while you are connected to your WiFi. This will tell you what devices are connected to your network and also some additional information about them. If you don't recognize any of the devices then your are probably right. You can also whitelist the Mac address of your devices and allow only the registered devices.
This is a 5 years old apache bug, exploitable only on outdated apache hosts (apache 1.3) owned by bad servAdmins who use the
<Limit GET POST>
require valid-user
</Limit>
directive to disable dir access.
You're lame, it's referenced in each and everyscript-shitties contest out there.
In fact it's not even a bug
http://httpd.apache.org/docs/2.2/mod/core.html#limit
Anyone doing a collaborative analysis?
I've started a page here: https://hackmd.io/OwVgbAZghsBMsFoDGSCMEEBYAmYwIE50NUDsDYIwpYoAOVIA
Feel free to contribute. Alternatively, if an effort is already underway please do tell me where....
Unless you have bought one of these recently it'd be fucking useless. ITs unrealistic not because of technical difficulties, but because the target audience is tiny. Maybe if you were trying to pull another Stuxnet and had a very specific target
This is so wrong. VPNs are not like bouncers. They don't hide your data from ALL government snooping. If used properly, VPNs hide your data from one entity and expose it to another... whomever monitors the exit node.
Even if the VPN declares they don't monitor traffic, it only takes a court order to change that. For example: HideMyAss claimed they did not log data. They were served a warrant to gather data on a member of LulzSec who was using their service. HideMyAss promptly complied and the person was exposed.
But even court orders are unnecessary. Companies are often incentivized via side channels, specifically using economic pressure (ex: no more VISA / Mastercard processing until you cooperate.) Basically... they have to choose between protecting their business and protecting you.
Just don't be an idiot. VPNs are better suited for bypassing overzealous corporate firewalls to access your Facebook, or accessing your Google services from China (although Baidu works nicely if that's an option for you.)
There are a lot of posts lately of people receiving versions of the email you got.
It is a scam. As others have stated, they probably use old breaches to get an email-password combination and take advantage of people's bad habit to reuse passwords.
You could check haveibeenpwned.com to see if a site you had an account was breached in the past. If so, make sure to never use that same password and try to avoid using same passwords for different accounts. A password manager might be of help.
https://sourceforge.net/projects/worawita/
"Bruter is a parallel network login brute-forcer on Win32. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of Bruter is to support a variety of services that allow remote authentication."
And...you know...free
You're really overthinking this. Just create a Linux Live CD, boot from that while having your HDD disconnected and then plug the drive in. Use some virus scanner from Linux to make sure it's not infected.
> if I had a correctly set up VPN, what are the chances that it would be compromised over public wifi?
I feel like this is the most relevant question.
A few years ago NordVPN had a security breach on a few of their servers which showed how VPNs can replace one security risk with a different one. If the VPN is not secure there is no point in using it. I feel like OP is wondering what the risks are of a VPN being compromised compared to that of a public Wifi being compromised
I wouldn't dismiss NordVPN just because they are popular. Sure, maybe their marketing strategy seems a bit aggressive, but so far there haven't been any instances of leaks or logs or anything that would seem to compromise their security. These kind of baseless accusations can be thrown at any vpn service and I don't understand why anyone would believe them without proper evidence.
What VPNs are you using on your phone? Because if they're free you should change those to paid ones like NordVPN or ExpressVPN. They can be used on multiple devices simultaneously so whichever you go with should be an improvement over a free VPN because you can't be sure how those keep themselves afloat. Unless of course they're open source and you can clearly check if they're collecting your data.
I’d also consider using a VPN. Hesitant to recommend one, everyone has different opinions; but Nord and IPVanish have been good for me.
Other simple things: use several usernames for different things and NEVER use the same password for ANYTHING. I generally try to use 20-character PW’s with mixed bag of alpha/numeric/special. And change the important ones (social media, financial, network) every 3 mos or so. Keep a password wallet on your phone (there are free apps, or spring the few bucks to buy one).
Also, always always always make sure that the sites you visit aren’t phishing sites. Verify the proper web address in browser before entering sensitive info.
If you really want to take it to the next level: start eliminating/reducing your online footprint. Change your name on social media (ie Facebook). Search around Reddit for “data miners”; there are lists posted. Go through the opt out procedure for all of them. Takes about 3 hours, but you can quickly ghost yourself by doing so. Maintain discipline going forward with what you share online and with who/where.
Also create several throwaway emails addresses that you can use for non-important stuff. Like rewards cards and stuff.
Hope this helps you.
There are already Android apps that detect fake base stations and other shenanigans. I haven't used either, but SnoopSnitch ~~and AIMSICD~~ look legit
https://theintercept.com/2016/03/03/nsa-is-mysteriously-absent-from-fbi-apple-fight/
Here is an interesting article that kind of goes into what you are talking about. Apparently the FBI did ask the NSA for help, but wouldnt comment on whether they did or could.
For de-googled phones, they do offer an official .apk download: https://signal.org/android/apk/
It checks for updates on its own, and includes a work-around for the lack of push notifications by using a persistent notification icon.
edit: I had it working that way on GrapheneOS, LineageOS and even Waydroid on the Pinephone which all had no gapps installed.
I could be completely wrong here, but a couple of things come to mind...
One is the level of sophistication. If the code and methods in the code look like nothing that's been seen before and not an iteration upon previously seen exploits, it would raise a possibility of being a government sponsored program. For example, the Duqu trojan was supposed to be written in some sort of obscure programming language.
http://www.zdnet.com/blog/security/kaspersky-duqu-trojan-uses-unknown-programming-language/10625
Another is the specificity of the target and purpose of attack. For example, Stuxnet was targeting a specific type of industrial controller connected in a specific network configuration.
It's a phishing mail. Don't reply at all, nothing good can come of it. Just let it sit in your spam box, or flag it as spam if it's not there yet.
If you have an unfulfilled sense of curiosity - you could check your email address on https://haveibeenpwned.com/ to see if/where your emailadress has been breached. I am not saying this is how your address ended up on the phisherman's list, but it is something to do while you fend off the urge to reply.
Seriously don't reply, it will only confirm your particular emailadres is active and operated by someone who doesn't know better than to stay away from scammers.
If you just want to test it, go here instead, since that's a more user-friendly interface using the same data. I haven't implemented the API myself, so I can't say why you're experiencing issues
Yeah exactly, though Tails is specifically written for anonymity (e.g. memory is flooded with zeroes during shutdown) whereas this is just running in memory.
As for USB vs SSD it depends on what you're going to be using it for I guess. Running from USB with persistence is great for a temporary situation or an on-the-go kali where you need to install (and therefore save to persistence) a few extra tools.
However if this is to be your main pen-testing machine that you'll be using (even as a newbie) you'll probably want a more permanent solution. USB flash drives aren't intended for all the IO that can come with running it with persistence so while it's absolutely fine in the short-mid term, long term there are better options (to which an external HD is a decent solution, but your machine IO will always be limited by the speed of the USB, so try and get USB 3.0!)
Finally and to complicate things further, if you are just looking for an on-the-go solution over a main desktop, there is also kali nethunter should you have a spare android device or be willing to tinker with your main one. I personally have a "spare" oneplus one with it on and it's great for OTG.
Ultimately it's the classic answer "it depends", as in it depends on what it's primary use is and how/where you're going to use it, and what your budget is :). If you just want to tinker then a USB with persistence is a great way to start (even the 16gb) then going forwards and with added familiarity with the distro you can come up with the solution that's best for you.
Edit: Sorry my responses are slow, I don't have the karma to comment so have to get the mods to manually approve each time.
grep -e '[^\ ]{8,}' YourWordList.txt > NewWordList.txt
That should create a wordlist from your current wordlist with only the words greater than 8 chars long.
Edit: source: http://serverfault.com/questions/107958/grep-to-find-files-that-contain-a-string-greater-than-x-characters-long
Edit Edit: Also, you can use john to feed your cracking program of choice a wordlist (usually.. I know you can for aircrack-ng at least), and you can tell john to skip the words under 8 chars, and you can also use john's word mangling to expand on your password list. I don't have a link off hand, but if you're interested; google and such.
Last I knew they offered a "bridge." The bridge will offer a localhost address to your email client (Thunderbird, Apple Mail, and Outlook 2016 were supported last I checked) and then the bridge handles the data transfer to/from ProtonMail. Seems to be available to paid users.
https://www.amazon.com/dp/B01LY35HGO/ref=cm_sw_r_cp_apa_fabc_SVv3FbC7YRVD9
https://www.amazon.com/dp/B008200LHW/ref=cm_sw_r_cp_apa_fabc_cWv3Fb7BKSSQ0?_encoding=UTF8&psc=1
And then my razer blade 15 with kali installed on it !
I think that NordVPN is good, they've been audited about not keeping logs and they're based in Panama which doesn't have any laws about keeping logs. You can pay using crypto currencies. I don't know of any security issues and you should be safe as long as you're not downloading weird files from shady websites.
Get a VPN, like PIA (Private Internet Access) if you're that worried. Gives you an IP from pretty much anywhere in the world that you chose. Chances are he's lying, and you can always go to the cops with screenshots of his threatening behaviour. Sounds a nasty little bully boy.
I recommend Mullvad VPN. Works flawlessly, never had a problem, account is up in less than five minutes. They accept various payments options, such as bitcoins. They don't need any information from you on sign up either. Iirc you can even snail-mail them cash for a connection.
NordVPN write logs to a blank disc, and are Panama based so they don’t have to comply with information requests anyway. There’s probably other companies that do this as well.
Also a lot of VPN companies share IPs between users so finding you is a bit trickier for them.
Mullvad continues to impress me, is run professionally, as anonymously as possible (will even take USD in the mail lol).
The guy who runs it is a prinipled pro privacy dood, but doesn't openly rock the boat much which is pretty much exactly what you're looking for in a VPN operator.
They properly responded to a PGP encrypted support email I sent in < 1 hour, the only time I ever had an issue. Lots of servers, very fast, accept cash/btc, claim not log sigificantly, and I'm inclined to believe them.
Ipredator is run by TPB guys and has been solid for me as well. Not as fast and more limited geo options for servers (just SE).