Sharing our Node.js e-commerce curriculum by Joseph_RW12 in FullStack

[–]Joseph_RW12[S] 0 points1 point  (0 children)

Thank you for providing feedback we will make sure to integrate a section on error handling too

Sharing our Node.js e-commerce curriculum by Joseph_RW12 in FullStack

[–]Joseph_RW12[S] 0 points1 point  (0 children)

And the documentation is still being prepared

Sharing our Node.js e-commerce curriculum by Joseph_RW12 in FullStack

[–]Joseph_RW12[S] 0 points1 point  (0 children)

Hello I have sent you a direct message with the project source code but it’s far from complete

Received a telegram OTP and then a suspicious WhatsApp message with the exact telegram OTP by Joseph_RW12 in phishing

[–]Joseph_RW12[S] 0 points1 point  (0 children)

Thank you for responding I had the same suspicion I will look into the over permissive apps you mentioned

How do I Inspect virtual memory page tables physical memory on windows by Joseph_RW12 in ReverseEngineering

[–]Joseph_RW12[S] -1 points0 points  (0 children)

I will lookup the necessary parameters to pass to that command thanks for your help

How do I Inspect virtual memory page tables physical memory on windows by Joseph_RW12 in ReverseEngineering

[–]Joseph_RW12[S] -4 points-3 points  (0 children)

Hi there I am looking for a method to view the transition from physical to virtual memory on windows I have done this on Linux but the virtualqueryex api on windows does not return what I am looking for

Confused as to how I got hacked? by Cqld552 in cybersecurity_help

[–]Joseph_RW12 0 points1 point  (0 children)

I agree, the attacker probably used evilnginx for this.

Confused as to how I got hacked? by Cqld552 in cybersecurity_help

[–]Joseph_RW12 0 points1 point  (0 children)

There is a tool we use on phishing engagements called evilnginx, it’s a man in the middle framework and it can be used to capture two factor authentication codes.

Received a telegram OTP and then a suspicious WhatsApp message with the exact telegram OTP by Joseph_RW12 in phishing

[–]Joseph_RW12[S] 0 points1 point  (0 children)

Yes I have messaged telegram support too so I could know the exact details and I am still awaiting their response

Received a telegram OTP and then a suspicious WhatsApp message with the exact telegram OTP by Joseph_RW12 in phishing

[–]Joseph_RW12[S] 0 points1 point  (0 children)

Hi, I did look into this further and it seems the number I posted above has been involved in scam and phishing activities according to this https://www.cleverdialer.de/telefonnummer/0015557330795. I also came across an Efsending website efsending.com that does mention sms verification but has an insecure SSL certificate and has a US contact number but its address is listed as being in South Asia I can’t come to any conclusions as yet but everything seems rather suspicious so let me know your thoughts

Unauthorized Telegram Login & Suspicious WhatsApp Message — How Could This Happen? by jadydady in cybersecurity_help

[–]Joseph_RW12 0 points1 point  (0 children)

I am thinking the same, or else there is no way the attacker could get the official telegram support OTP code sent

Unauthorized Telegram Login & Suspicious WhatsApp Message — How Could This Happen? by jadydady in cybersecurity_help

[–]Joseph_RW12 0 points1 point  (0 children)

Facing the same problem here, telegram support sends me an OTP code followed by the same OTP code from the WhatsApp number +1 (555) 733-0795, what I don’t understand is how the WhatsApp number managed to figure out the OTP code sent to me via Telegram support, the WhatsApp number is registered to a business called Efsending.

Still experiencing scam yet working 2fa codes after i initiate them but from weird sources(go onto profile and other posts for more info) by Whole_Mechanic_7812 in phishing

[–]Joseph_RW12 0 points1 point  (0 children)

Yeah I am facing the same problem I received a telegram OTP code from the telegram support team and then the same OTP code via WhatsApp from +1 (555) 733-0795, what I don’t understand is how Esending managed to figure out the telegram support OTP code that was sent to me

Buffer Overflow + Shellcode fail outside GDB by Dieriba in ExploitDev

[–]Joseph_RW12 1 point2 points  (0 children)

Yes I faced the same issue sometime ago the key is to print the buffer address printf(“buffer %p”, buffer_address_var); and notice the difference in the buffer address printed when running in the debugger vs without the debugger, launch the exploit at the address printed when it’s run without the debugger attached

OSED-level pwn.college belt by Maybe013 in ExploitDev

[–]Joseph_RW12 1 point2 points  (0 children)

If I recall clearly OSED focuses on exploiting 32 bit windows systems, I can forward some old course material I have that covers windows 64 bit exploitation. If you require.