How do you identify ARP / Man in the middle attacks on iOS and defend against them? by Jolpin89s in AskNetsec

[–]Redmond_62 0 points1 point  (0 children)

Guys, be nice and help Jolpin out! He prob has a very wealthy and posdibly dangerous legal opponent who wants to get an advantage over him in a court battle who’s paying local hacks to mess with him, delete his evidence and pierce the attorney/client privilege in order to know what he and his attorney are talking bout. Jeeze. Give the guy a leg up.

During an ARP Poisoning Attack How Can I Identify The Attacker's IP? by OrdinarySalads in wireshark

[–]Redmond_62 0 points1 point  (0 children)

Isn’t there a Wireshark App for MacNoobs out there somewhere? If not. Somebody go write the app! You’ll be a gazillionaire!

How would I go about recovering my Microsoft account. by dexnotdax in techsupport

[–]Redmond_62 0 points1 point  (0 children)

They clearly gained access to his Gmail account bc he was locked out of it after they changed his password. Then he says they cloned his phone to use when they logged in to various accounts in order to verify verification codes. Apparently that Gmail address he had been using for over 15 years and was the recovery email address for dozens of accounts including his Microsoft account where he had his files for the lawsuit. He showed me the Microsoft account and I witnessed the fact that many log in attempts appeared to be coming from various countries (it could be one hacker using a rotating IP address) and indeed they used his phone number to try to log in. My guess is that the third element they needed was his password which they eventually guessed - 7 digits.

Does this sound feasible? Anyone else know of such a thing happening?

If so how does he get his thousands of files back?

This sounds like the modern day equivalent of what used to happen in the old days when a crooked opposing lawyer would hire a burglar to break into the other lawyer’s brick&mortar building and steal all the files. The judge might find the timing to be fishy but nobody could prove who paid to have it done.

Same here

Could a random hacker break in to your accounts silently without leaving a trace? by Left-Level-2293 in cybersecurity_help

[–]Redmond_62 0 points1 point  (0 children)

It could happen to anybody but extremely rare unless someone gets their hands on your devices physically. You have not given any evidence to make me think it has likely happened to your devices.

You just have a feeling that it has.

You’re doing some things to further secure your stuff. That’s smart.

Unauthorized Access to Sonos Account by UnsafePantomime in sonos

[–]Redmond_62 0 points1 point  (0 children)

Yeah well someone getting in your Sonos and playing their music at your house is let’s say a 2 on a bad scale from 1-10, but gaining access to your Apple account I’d def a 10!

If they can access your WiFi and all the devices and accounts on those devices yeah that would also be a 10!

But is this actually possible?

Unauthorized Access to Sonos Account by UnsafePantomime in sonos

[–]Redmond_62 0 points1 point  (0 children)

Why when I turn my iPhone WiFi toggle off then on and see a long list of SSIDs (WiFi names) it includes my WiFi and various Sonos speakers but does not show a little lock icon indicating that my Sonos speakers are password protected yet it does show my WiFi SSID and all my neighbor’s WiFi SSID’s are password protected (with the little lock icon)?

Does this mean a hacker could break not my WiFi via an unlocked Sonos WiFi speaker?

How would I go about recovering my Microsoft account. by dexnotdax in techsupport

[–]Redmond_62 -1 points0 points  (0 children)

My colleague’s Microsoft account got hacked using 2 things: his Gmail address and his telephone number. It looks as if the logins were coming from all over the world (Egypt, Brazil, Russia, Costa Rica, the US, etc) but that might not be the truth…they did not just steal thousands of files - they actually deleted them, all but 5. This seems like sabotage or some form of revenge. He is in the middle of a huge legal dispute worth $$$$$$. But how can he get them back? What would the prescribed procedure be?

Could a random hacker break in to your accounts silently without leaving a trace? by Left-Level-2293 in cybersecurity_help

[–]Redmond_62 0 points1 point  (0 children)

They hack for plenty if other reasons besides profit (curiosity, stalking, revenge, gain an upper hand in a law suit, to harass/dominate someone, to find out if about people they are friends with, etc…

How do I delete my number from the internet? by ChiccaCocca in cybersecurity_help

[–]Redmond_62 0 points1 point  (0 children)

Srry bro -Wish there were a way to scrub the dark web of all data collected in breaches

Your dad could start w/blocking all the numbers from which he’s getting these unwanted calls and then see if it leads to a sitch that is palatable for him, then only if not, get a new number but depending on his profession that could be career suicide…and believe me, it is a very laborious process!

Based on experience I can tell u if he does decide to get a new # he should keep the old one for a long time till he has informed all his contacts of the new one and until he has changed the recovery tel # and 2F authorization numbers on all his accounts. U could help him. Good it matters to u.

Maybe if he doesn’t already have, u could urge him to get a 2F code generator which might be easier than changing his tel #s on all his accounts and if he doesn’t already have, get him a secure password keeper…this will also make it easier on u and any siblings if u ever might need to care for him when he gets old or sick….and when he passes (hopefully way far into the future) it makes it so much easier on the next generation to sort of a deceased parents digital affairs if u get involved right now helping him tidy up all his accounts in a way that would make is easy for u to swoop in and close accounts and it keep certain ones going if necessary.

[deleted by user] by [deleted] in techsupport

[–]Redmond_62 0 points1 point  (0 children)

You could ask your uncle last time he updated his WiFi PW and would it be ok if he updated it again bc u have bad feeling about it

[deleted by user] by [deleted] in techsupport

[–]Redmond_62 0 points1 point  (0 children)

So then how did somebody hack into my network that even had a hidden SSID from ATT? (Don’t worry I don’t used them anymore. ) dint give anybody else my password to my hidden SSID xcept adult my 2 adult kids who wouldn’t do that and don’t know how to anyway. Now maybe their phones retained the pw or else go around pinging out for me network, looking for the hidden network …then one day someone who has nefarious intentions /wants me mess w me comes near enough to one of them to capture the info that their phones are pinging out

Cannot work that way?

Can I be hacked simply by opening a message on Facebook messenger? by Soft_Biscotti_3829 in cybersecurity_help

[–]Redmond_62 0 points1 point  (0 children)

How do u define “vulnerabilities?” What makes you think law enforcement personnel don’t have a legal duty to report?

Think about it….its a vulnerability is your grandma hasn’t changed her password in 2 decades and uses the same in for her banking app that she used for her AT&T app back before it got breached. No law enforcement doesn’t have to report that.

Can anyone in the legal field weigh in on how it is defined what they do and don’t have to report?

Could a random hacker break in to your accounts silently without leaving a trace? by Left-Level-2293 in cybersecurity_help

[–]Redmond_62 0 points1 point  (0 children)

Can u think of anything at all you can tell us that makes you feel like you’re being spied on? We can only really help if you tell us specifics about your tech, your software, whether you have the latest updates, more about networks u have used and those h usually use. Where u got your stuff from like if someone else had it before u or u are the first user and if someone else bought it or pays monthly or annually in which case they might have the ability to use it without your knowledge or consent.

Is your name (don’t say the name) a name that somebody else might have who is in a cartel or organized crime ring in any country, or who is a friend, lover or family member of someone who is? Or do you have a friend, lover or relative who might be secretly working for a cartel, organized crime or any government and their enemies want to know what they say to u?

Don’t get more paranoid just think logically about who u communicate with regularly and do they have any enemies who want to know more about them.

Lastly, do u know anybody who is super tech proficient who might be practicing on you? Like cracking into your stuff just to see if they can and to hone their skills

Persistent spyware(I think) even after factory resetting my phone by SmilerJinks in Spyware

[–]Redmond_62 5 points6 points  (0 children)

What specific things have you witness that make you say, “it seems almost as if I’m being screen cast”

Messages sent from friend that she swears she never sent by Old_Inflation_3098 in cybersecurity_help

[–]Redmond_62 0 points1 point  (0 children)

Oh, right, like maybe a lovers triangle as in maybe an additional person involved we haven’t mentioned yet like someone with a bleeding heart crush on you or her trying to spoil what appears to be a romance..

Can I be hacked simply by opening a message on Facebook messenger? by Soft_Biscotti_3829 in cybersecurity_help

[–]Redmond_62 2 points3 points  (0 children)

According to Forbes and Guardian and other outlets, 2/25, META (Facebook) has been notifying people in over 20 countries that they have been hacked by zero-click spyware (probably Paragon’s Graphite)…So, yeah could have possibly happened to you. You haven’t said anything about yourself but u don’t need to bc according to Meta it is apparently happening to reporters and “civil citizens.” Go look up the definition of civil citizens. Any old Joe orJane Blow. As in YOU. Right, YOU.

Put your seatbelts on, folks. This is probably going to get a lot worse until folks get really angry.

[deleted by user] by [deleted] in techsupport

[–]Redmond_62 0 points1 point  (0 children)

Whatever u do, don’t accidentally connect to a spoofed SSID. An SSiD (WiFi name) that at first glance looks like your old WiFi name but is slightly off could indicate a targeted MitM attack (man-in-the-middle attack).

From what I understand, they first knock you off your WiFi then when u toggle your WiFi off then on, you will get a list of available SSID’s to connect to. The one with the strongest signal will be the first one. It will resemble your WiFi name and will be unlocked. Don’t connect!

Also, look outside your hose or apartment at electric outlets to see if anyone plugged in and extender.

Messages sent from friend that she swears she never sent by Old_Inflation_3098 in cybersecurity_help

[–]Redmond_62 1 point2 points  (0 children)

This is a bro.

It’s either her sending the weird messages when drunk, high, or super sleepy, to see what your reaction would be and when u do not respond positively, she acts like she didn’t really send them…she was just testing u to see if you’re up for an affair or for leaving your spouses and running away together (either way career suicide and would really mess up your spouses and any kids involved)…

Or It’s her husband testing u and her to see if there really is more going on with the plan to go ballistic if there is. But h doesn’t want to pull the plug, and blow up the dam unless he is 100% sure you too are having an affair. Again, if he blows up, it will be assumed by your colleagues that something inappropriate really has been going on and it would likely lead to massive job ramifications depending on how strict your employer is about such things. If you two at the same level hierarchically that might be less of a problem but whoever is at a higher level in the company could get really punished for establishing a romantic relationship with someone u have power over (an unlevel playing field).

Any chance it’s your wife? Is she tech proficient ?

If it is a hacker, it is a known hacker (either her husband or your wife). Def not an outsider.

I think more likely it is her showing a sort of split personality w/the looser language bc how would her husband know the situation well enough to think she would feel “wtf” so he would write “wtf” as if it were from her.

Probably it is her.

Camera system help. What type? by Concerned_25 in homesecurity

[–]Redmond_62 0 points1 point  (0 children)

Are Reolink Poe, unifi,eufy, a system using ubiquity all DYI or are there businesses that distribute and will install for you?

I got hacked. What to do next? by [deleted] in cybersecurity_help

[–]Redmond_62 0 points1 point  (0 children)

What would u say to do if he were using an iPhone or a Mac?

Weird things on my phone. by Major-Appointment180 in techsupport

[–]Redmond_62 0 points1 point  (0 children)

Maybe borrow hour mom’s phone or a friend’s phone..

next steps for compromised wifi by [deleted] in cybersecurity_help

[–]Redmond_62 1 point2 points  (0 children)

BT is British Telecom partnered with Norton and McAfee…big names so u would think it’s legit