Skip to main content

Questions tagged [spoofing]

A kind of attack in which one system, program, or user successfully masquerades as another.

1 vote
2 answers
186 views

Bank scammer and banking app

There are plenty of scammers trying to get access to my bank account. Usually they call me claiming they are from my bank’s fraud department, and try to convince my that there is a problem with my ...
gnasher729's user avatar
  • 2,489
0 votes
0 answers
80 views

How to avoid non-in-person "handshakes" and spoofing due to compromised URL data on NFC card

I am designing a system that allows users to purchase my NFC cards and sign up for an account on my online SaaS website. The System For the sake of explanation, assume the website is hosted at domain ...
user512716's user avatar
0 votes
0 answers
92 views

Detecting SMS spoofing when there is multiple routing

How can SMS spoofing be detected? I know we can find it by message centre, but what if in the case of multiple routing?
Gayatri Kandula's user avatar
1 vote
2 answers
129 views

Isolating encrypted and unecnrypted Windows installations and protecting the boot loader

I want to use my PC both for gaming and for stuff like keeping cryptocurrency wallets, online banking, etc. I need to install games as admin but of course I don't want them to be able to access my ...
Vlad's user avatar
  • 111
0 votes
0 answers
86 views

What is the best way to demonstrate spoofing?

I use this tutorial to spoof with Kali Linux on VirtualBox: https://www.geeksforgeeks.org/ssl-stripping-and-arp-spoofing-in-kali-linux/ However got some errors ip route: Route information 10.1.80.121 ...
Alex Anonym's user avatar
3 votes
1 answer
353 views

Modern VPNs and average MITM attacks

I am trying to untangle a number of concepts (all of which i am unfamiliar with) in this question, but they all point to a seemingly basic question; With modern tunneling protocols, SSL ciphers and ...
myol's user avatar
  • 175
1 vote
1 answer
279 views

How to prevent hackers from using my phone number to make accounts?

It seems a hacker is using my phone number to make fraudulent account, and I would like to prevent that. Usually, if a person has your phone number, they're not able to make an account because a ...
user3041883's user avatar
0 votes
1 answer
580 views

Would a spoofed SMS message show up in the same chat history as a legitimate SMS?

I received an odd SMS message from xfinity earlier. The message looks real, and the link they provided is real, but they said I ordered a movie through their service, which I did not. I am wondering ...
Zaku's user avatar
  • 101
0 votes
1 answer
3k views

SMS spoofing in the US

Long story short(ish), I have a friend who's been in a relationship with this girl for a while. When they started she had just moved across country and was in something open with some other dude. She ...
Arkyris's user avatar
1 vote
1 answer
354 views

Windows 10 Update - Man In The Middle Attack - Tamper Update [duplicate]

I am connecting to a wi-fi network and blocked all IP addresses in this network with a regular Windows 10 firewall. The only available IP addresses are: 192.168.1.1 = gateway 192.168.1.102 = my own ...
Minerva Developer's user avatar
1 vote
2 answers
384 views

How to block personal devices on corporate network

Currently we are working to secure our internal LAN and due to this we are planning to stop mobile devices (such as personal laptops and mobile phones) to connect on corporate network. Our key area of ...
ZAHID HASEEB's user avatar
9 votes
3 answers
4k views

Can an SSH server in password mode be impersonated if I ignore the fingerprint warning?

Assume that I never check the server fingerprint when logging in to an SSH server. This means that certain configurations of SSH can be impersonated. For example, I can log into a server that only has ...
personal_cloud's user avatar
0 votes
0 answers
119 views

Retrieving Android phone's identifiers

I will be publishing a fingerprinting app that shows its user how much access to their Android phone's identifiers it has. I haven't started writing it because I need to understand how can any Android ...
CurtisB's user avatar
  • 33
0 votes
1 answer
106 views

Using another's text number to commit ongoing fraud [duplicate]

Some Vietnamese refugee families have been Bitcoin defrauded by someone using an 805 text number. Lookups say it belongs to a party in Tennessee. I want to know if it is possible that scammers in ...
Hugh Giblin's user avatar
0 votes
1 answer
108 views

what if I just simply rename of a file instead of using right to left override

I'm browsing the ATT&CK and I understand the meaning of right-to-left override that it is using non-printing unicode character, but what is the different if I just simply rename a file like this: ...
Vu Tan's user avatar
  • 1

15 30 50 per page
1
2 3 4 5
20