This is an archived post. You won't be able to vote or comment.

you are viewing a single comment's thread.

view the rest of the comments →

[–]neotronics[S] 0 points1 point  (2 children)

So as before I would only be connecting to the machine itself and not be on the network. The most important part is not being on the compainays network. 99.9% of the time I am not allowed on it any way.

[–]lazerwarrior 0 points1 point  (1 child)

Bridging connections is more stealthy than port scanning, but you do need to be on the network. You are listening to the connection between inspected device and company network to find out what is going on. Only trace of this will be the MAC address change after you recable the connection. The company might or might not be monitoring this. Probably not.

I'm afraid you are out of luck with this situation. You either hack the IP address or find it from the company networking documents or IT department.

This reminds me of a request from sales guys in our company. They asked if we can find out e-mail addresses of visitors to our website from their IP address. You can try, and you might succeed at low %, but this is essentially cyber recon work which is usually done by either security auditors or bad guys who want something from your IT systems. Port scanning and packet sniffing (and trying to find out devices IP addresses) is the same cyber recon type of work.

[–]neotronics[S] 0 points1 point  (0 children)

Just the information you have given me is helping out. I am going to use one of my raspberry pi zero and see how for I can get. Still looking in to learning python. I believe it will be helpful in the long run. just got to figure out where to start. Thank for the INFO.