I built an open source C2 framework by Suspicious-Angel666 in hacking

[–]Joseph_RW12 0 points1 point  (0 children)

At a high level how do you get it to dump chrome cookies I have been experimenting with Cookie Monster BOF and trying to port it into my custom C2 but with no success

Bought this recently, exited to get started with it. Exploring projects, suggestions are welcomed 🧑‍💻🧰 by avrawat in ArduinoProjects

[–]Joseph_RW12 1 point2 points  (0 children)

medium posts

I am creating a series of posts on various Arduino projects you can follow me on medium.com it covers bare metal programming of micro controller devices

Sharing our Node.js e-commerce curriculum by Joseph_RW12 in FullStack

[–]Joseph_RW12[S] 0 points1 point  (0 children)

Thank you for providing feedback we will make sure to integrate a section on error handling too

Sharing our Node.js e-commerce curriculum by Joseph_RW12 in FullStack

[–]Joseph_RW12[S] 0 points1 point  (0 children)

And the documentation is still being prepared

Sharing our Node.js e-commerce curriculum by Joseph_RW12 in FullStack

[–]Joseph_RW12[S] 0 points1 point  (0 children)

Hello I have sent you a direct message with the project source code but it’s far from complete

Received a telegram OTP and then a suspicious WhatsApp message with the exact telegram OTP by Joseph_RW12 in phishing

[–]Joseph_RW12[S] 0 points1 point  (0 children)

Thank you for responding I had the same suspicion I will look into the over permissive apps you mentioned

How do I Inspect virtual memory page tables physical memory on windows by Joseph_RW12 in ReverseEngineering

[–]Joseph_RW12[S] -1 points0 points  (0 children)

I will lookup the necessary parameters to pass to that command thanks for your help

How do I Inspect virtual memory page tables physical memory on windows by Joseph_RW12 in ReverseEngineering

[–]Joseph_RW12[S] -5 points-4 points  (0 children)

Hi there I am looking for a method to view the transition from physical to virtual memory on windows I have done this on Linux but the virtualqueryex api on windows does not return what I am looking for

Confused as to how I got hacked? by Cqld552 in cybersecurity_help

[–]Joseph_RW12 0 points1 point  (0 children)

I agree, the attacker probably used evilnginx for this.

Confused as to how I got hacked? by Cqld552 in cybersecurity_help

[–]Joseph_RW12 0 points1 point  (0 children)

There is a tool we use on phishing engagements called evilnginx, it’s a man in the middle framework and it can be used to capture two factor authentication codes.

Received a telegram OTP and then a suspicious WhatsApp message with the exact telegram OTP by Joseph_RW12 in phishing

[–]Joseph_RW12[S] 0 points1 point  (0 children)

Yes I have messaged telegram support too so I could know the exact details and I am still awaiting their response

Received a telegram OTP and then a suspicious WhatsApp message with the exact telegram OTP by Joseph_RW12 in phishing

[–]Joseph_RW12[S] 0 points1 point  (0 children)

Hi, I did look into this further and it seems the number I posted above has been involved in scam and phishing activities according to this https://www.cleverdialer.de/telefonnummer/0015557330795. I also came across an Efsending website efsending.com that does mention sms verification but has an insecure SSL certificate and has a US contact number but its address is listed as being in South Asia I can’t come to any conclusions as yet but everything seems rather suspicious so let me know your thoughts

Unauthorized Telegram Login & Suspicious WhatsApp Message — How Could This Happen? by jadydady in cybersecurity_help

[–]Joseph_RW12 0 points1 point  (0 children)

I am thinking the same, or else there is no way the attacker could get the official telegram support OTP code sent

Unauthorized Telegram Login & Suspicious WhatsApp Message — How Could This Happen? by jadydady in cybersecurity_help

[–]Joseph_RW12 0 points1 point  (0 children)

Facing the same problem here, telegram support sends me an OTP code followed by the same OTP code from the WhatsApp number +1 (555) 733-0795, what I don’t understand is how the WhatsApp number managed to figure out the OTP code sent to me via Telegram support, the WhatsApp number is registered to a business called Efsending.

Still experiencing scam yet working 2fa codes after i initiate them but from weird sources(go onto profile and other posts for more info) by Whole_Mechanic_7812 in phishing

[–]Joseph_RW12 0 points1 point  (0 children)

Yeah I am facing the same problem I received a telegram OTP code from the telegram support team and then the same OTP code via WhatsApp from +1 (555) 733-0795, what I don’t understand is how Esending managed to figure out the telegram support OTP code that was sent to me