Skip to main content

Questions tagged [spoofing]

The tag has no usage guidance.

0 votes
0 answers
20 views

Victim loses internet connection during arp spoofing against it

The point is as follows. VirtualBox is installed on my laptop. It has a Kali Linux virtual machine installed with which I want to perform ARP spoofing on my phone. In the Kali Linux network settings, ...
Timur's user avatar
  • 1
1 vote
0 answers
38 views

Can a server identify that I am using a modified user-agent? [duplicate]

I have a work laptop A that connects, via Google Chrome, to Google Workspace for access to things such as email, Google Drive, calendar, etc. The current IT policy is to block connections from ...
Jon Bentley's user avatar
4 votes
1 answer
501 views

Is there a way to make Vivaldi fake-report the OS to webpages as Windows instead of Linux?

I run Linux and Vivaldi. Various webpages are able to tell that I run Linux, and I'm unsure if this is done from sniffing the User-agent header anymore. Regardless of how it is done these days, I ...
Stan's user avatar
  • 105
0 votes
1 answer
812 views

Is it possible for HDDs to have a fake/spoofed capacity similar to what is done with fake high size flash drives?

You often see or hear about these insane flash drives with 2TB capacity that sell for ridiculously low prices that actually are 16GB or 32GB flash drives but keep overwriting data so it looks like ...
jooleer's user avatar
0 votes
0 answers
2k views

Powershell equivalent to curl --resolve

I need to use powershell to check the https response code of a call where the DNS entry isn't setup or points at an IP that cannot be reached. The command is run on the same server as the IIS hosting ...
galmok's user avatar
  • 101
0 votes
0 answers
45 views

Windows 10: Can't get Rid of Malware Popups Notifications Spoofing Antivirus [duplicate]

I'm using Windows 10 Home, and I'm this popup, that keeps coming up at random times, at least hourly: And, just a few minutes ago, this: I have disabled all popups in Internet Options. I ran ...
MSIS's user avatar
  • 115
0 votes
2 answers
2k views

VirtualBox Spoofing CPU Frequency

I would like to spoof as much information about my host (Windows 10 x64) on my guest (Windows 10 x64) as possible in VirtualBox. I'm already spoofing the CPU brand string using this. However, applying ...
Salvage's user avatar
  • 101
0 votes
1 answer
87 views

Public network spoofing DNS response?

Running dig @a.nic.ch google.com whilst connected to some public accessible network I got the following response: ; <<>> DiG 9.18.0 <<>> @a.nic.ch google.com ; (2 servers found)...
Richard's user avatar
  • 101
-1 votes
1 answer
3k views

How to manually change processor ID?

Looking for a way to manually spoof my Processor ID. I found that it's located in DMIEDIT although I'm unable to edit it directly through DMIEDIT. On DMIEDIT it says it's a DWORD data type although I ...
spaz's user avatar
  • 1
0 votes
1 answer
180 views

unauthorized access to dovecot services

Recently i was enable mail-relay to 3rd party tool, suddenly i found 1000 of emails are going as a spam everyday to unknown users i disable the mail-relay ,but still we facing some one login our ...
Ana Mal's user avatar
0 votes
1 answer
2k views

Why is Nmap failing to bind my source IP?

I was trying to perform a Nmap scan using this IP spoofing command: nmap -e eth0 -S 1.2.3.4 192.168.200.130 where 1.2.3.4 is the source IP that I want to use and 192.168.200.130 is the IP address of ...
nim123's user avatar
  • 1
0 votes
1 answer
297 views

How would a hacker be able to spoof their IP when logging into a private FTP server?

If, somehow, someone gains access to one of the users on my FTP server, I would still be able to see their IP address and trace it to them. However, I fear that it might be possible for them to spoof ...
Crabby Fish's user avatar
1 vote
0 answers
4k views

How to spoof GPU vendor id and device id in VMWare?

I am trying to run a particular game in a VMWare machine (which is able to run many other games), but this game has an arbitrary check which prevents launching if the GPU you're using is unrecognized. ...
pete's user avatar
  • 166
0 votes
2 answers
542 views

E-Mail Spoofing without valid SPF entry

is it actually possible to spoof an email if the sender domain has not a valid SPF-Entry without providing a Reply-To / Error-To / Return-Path field in the email metadata?
1337's user avatar
  • 1
0 votes
0 answers
546 views

High CPU load on SYN flood

When being under SYN flood attack, my CPU reach to 100% in no time by the kernel proccess named ksoftirqd, I tried so many mitigations but none solve the problem. This is my sysctl configurations ...
iTaMaR's user avatar
  • 103

15 30 50 per page
1
2 3 4 5
7