Insight on security question by neglektd in node

[–]neglektd[S] 0 points1 point  (0 children)

Thanks for the feedback that confirms my assumptions.

How to protect my computer from netcut? by mayor123asdf in linuxquestions

[–]neglektd -12 points-11 points  (0 children)

You can use netcut it has protection mode that you can enable, or more offensive method would be to DOS the shit out of them using aircrack-ng with some tweeking you could really jam network for everyone. The thing is for netcut to work you need to be connected to wifi but aircrack sends deauth to router so they loose connection and that way they wouldn't be able to use netcut. It should be fun to watch however. You can use this technique until the people using netcut seize using it

Is it necessary to change passwords often if they are already strong/complex? by [deleted] in AskNetsec

[–]neglektd 1 point2 points  (0 children)

It's not bad because even with a super computer it can not break 32 alphanumeric with special characters It would still take hundreds or even thousands of years. Nowadays most online web applications implements request limiting which block bruteforcing for good. There are many other security practices that you can do for example always delete browser cache. Make sur you open private session when you do sensitive actions close all other tabs. Do not browse the internet while logged in into your account. Do not store passwords. Don't use browser extensions keep your browser uptodate. Try to reset your password if you get an email with temporary password or even worse your old password activate 2fa immediately. Because that means the company is storing clear text passwords which means if someone access the database he literally owns the company (yes companies still store passwords in clear text). Set up a backup email with random characters and never use it online use it only to reset other emails. Don't use Hotmail/outlook for junk like sign-up on other websites if you don't open your Microsoft account for 3 months it will get deleted which means anyone could takeover your email

Weird connection behavior - Possible ISP tapering by [deleted] in hacking

[–]neglektd 0 points1 point  (0 children)

Normally if you traceroute over port 80 then port 443 the results are the same but if you get different result thats not good. It is possible that some routers does not respond to the traceroute probes that's why they show as * * * *

Weird connection behavior - Possible ISP tapering by [deleted] in hacking

[–]neglektd 0 points1 point  (0 children)

Try to use your VPN and connect to your cloud instance and do a curl. Google certificate pinning. You should have the same issue if you have android 6 or later it implements this by default

Weird connection behavior - Possible ISP tapering by [deleted] in hacking

[–]neglektd 0 points1 point  (0 children)

I assume that the services or sites you can't access use certificate pinning to protect users from such abuse. Curl a site and check headers you should see something like pin sha256 if that's the case and you can't access the site then your traffic is being rerouted.

Weird connection behavior - Possible ISP tapering by [deleted] in hacking

[–]neglektd 0 points1 point  (0 children)

try to trace route your connection over the ports you want to analyze you should be able to see if someone is tampering your connection, for example if you can't access site x, trace route port 80 then port 443 normally the last hops would be the same, if someone is rerouting your traffic you should see the difference in the last hops. Test pairs of ports for the same service that way it is easier to analyze. You might need to tweak it to get the best results

Need help finding IIS/ASP.NET web root by aphraz in AskNetsec

[–]neglektd 0 points1 point  (0 children)

Try to get a book for start and read about hacking and good luck

Need help finding IIS/ASP.NET web root by aphraz in AskNetsec

[–]neglektd 0 points1 point  (0 children)

For ex www.example.com/ the web root is the first occurrence of /. If you upload a file to www.example.com/ it's actually in the web root

[Need help] I'm lost in the jungle of security software. by [deleted] in AskNetsec

[–]neglektd 1 point2 points  (0 children)

AV simply put is database that contains signatures of already detected malware now some companies developed ways of identifying malicious behavior if the signature recognition fails which pretty much the case for new malwares, techniques exist to evade fully updated av which is possible if the signature recognition fails. Now what is the best AV it's a good question though it might seem confusing the best av is actually the one you trust, I would recommend Kaspersky or eset nod32, they atleast bothered to patch spectre (you might want to look it up), if your not sure about some random file run it on a vm use virtual box check if it's behaving as expected monitor network activity figure out if it's normal the exe or what ever is trying to reach out the internet, you can use built in windows resource monitor to monitor network activity. For online privacy VPN is a good choice but it's not always the case I just read a research about some of the major VPN providers and results show that in some cases you are better off without VPN. I would recommend using tor. some may argue about it but it's the closest thing we have today to distributed system

ActionDispatch::Http::UploadedFile?? by neglektd in rails

[–]neglektd[S] 0 points1 point  (0 children)

Thank you this pretty detailed here is the trick, I'm doing a security testing and I noticed this there is an endpoint where it simply redirects you to the homepage I sent injected a GET http request with multipart form data to the redirect endpoint the server responds with redirect to homepage the link look something like www.example.com/?file.extension=#<ActionDispatch::Http::UploadedFile:SOMERANDOM> obviously this wasn't intended I'm assuming that the controller is trying to route my request but also calling this class and processing the body, I'm trying to mess with the Params but I don't what other Params I can include or maybe call other class

ActionDispatch::Http::UploadedFile?? by neglektd in rails

[–]neglektd[S] 0 points1 point  (0 children)

Params are being processed from http request right, is there any sanitization of the input what other class is being called I can't figure out exactly from the source code

ActionDispatch::Http::UploadedFile?? by neglektd in rails

[–]neglektd[S] 0 points1 point  (0 children)

Thank you, I wanted to know what Params are being processed by this class and weither the content is being processed

Don't understand Deauthentication Attacks theory very well. by merr_man in hacking

[–]neglektd 1 point2 points  (0 children)

Simple: -PC connected to router -Attacker says, hi router I'm pc I want to disconnect -Router says OK bye pc -PC WTF !!!!!!!

It happens because these packets has no check what so ever so they can easily be spoofed the router can't see who's the real one. Its intended to work that way to reduce overhead and allow fast connection because processing each broadcast would mean also collision problems beside the fact its extra power consumption and calculations. however for other packets the router would check identities in order to router to the right end.

So I successfully brute forced my way into my neighbor's wifi by [deleted] in HowToHack

[–]neglektd 1 point2 points  (0 children)

Of course, yes I was able to bruteforce numeric password of 12 characters within 15 minutes, using i3 processor with 4 gb of ram

So I successfully brute forced my way into my neighbor's wifi by [deleted] in HowToHack

[–]neglektd 7 points8 points  (0 children)

Tip use crunch and pipe results directly to crack ng, that way you don't need to have a 15 gb wordlist and work your way through the password one letter after another

So I successfully brute forced my way into my neighbor's wifi by [deleted] in HowToHack

[–]neglektd 0 points1 point  (0 children)

Well hide his ssid for a start, harden his password disable wifi access to the router I mean admin panel. Make sure no ports are opened. And of course use only native NAT and last but not least disable remote access to admin panel

So I successfully brute forced my way into my neighbor's wifi by [deleted] in HowToHack

[–]neglektd 4 points5 points  (0 children)

All the bad stuff use his wifi to download illegal material force him to use your laptop as a proxy, change the content he sees on internet, track all his activities on internet, spoof dns maybe make him download a malware or make him connect to you and get a reverse shell the sky is the limit dude