Questions tagged [spoofing]
A kind of attack in which one system, program, or user successfully masquerades as another.
298
questions
1
vote
2
answers
186
views
Bank scammer and banking app
There are plenty of scammers trying to get access to my bank account. Usually they call me claiming they are from my bank’s fraud department, and try to convince my that there is a problem with my ...
0
votes
0
answers
80
views
How to avoid non-in-person "handshakes" and spoofing due to compromised URL data on NFC card
I am designing a system that allows users to purchase my NFC cards and sign up for an account on my online SaaS website.
The System
For the sake of explanation, assume the website is hosted at domain ...
0
votes
0
answers
92
views
Detecting SMS spoofing when there is multiple routing
How can SMS spoofing be detected? I know we can find it by message centre, but what if in the case of multiple routing?
1
vote
2
answers
129
views
Isolating encrypted and unecnrypted Windows installations and protecting the boot loader
I want to use my PC both for gaming and for stuff like keeping cryptocurrency wallets, online banking, etc. I need to install games as admin but of course I don't want them to be able to access my ...
0
votes
0
answers
86
views
What is the best way to demonstrate spoofing?
I use this tutorial to spoof with Kali Linux on VirtualBox: https://www.geeksforgeeks.org/ssl-stripping-and-arp-spoofing-in-kali-linux/
However got some errors
ip route:
Route information
10.1.80.121 ...
3
votes
1
answer
353
views
Modern VPNs and average MITM attacks
I am trying to untangle a number of concepts (all of which i am unfamiliar with) in this question, but they all point to a seemingly basic question;
With modern tunneling protocols, SSL ciphers and ...
1
vote
1
answer
279
views
How to prevent hackers from using my phone number to make accounts?
It seems a hacker is using my phone number to make fraudulent account, and I would like to prevent that.
Usually, if a person has your phone number, they're not able to make an account because a ...
0
votes
1
answer
580
views
Would a spoofed SMS message show up in the same chat history as a legitimate SMS?
I received an odd SMS message from xfinity earlier. The message looks real, and the link they provided is real, but they said I ordered a movie through their service, which I did not. I am wondering ...
0
votes
1
answer
3k
views
SMS spoofing in the US
Long story short(ish), I have a friend who's been in a relationship with this girl for a while. When they started she had just moved across country and was in something open with some other dude. She ...
1
vote
1
answer
354
views
Windows 10 Update - Man In The Middle Attack - Tamper Update [duplicate]
I am connecting to a wi-fi network and blocked all IP addresses in this network with a regular Windows 10 firewall. The only available IP addresses are:
192.168.1.1 = gateway
192.168.1.102 = my own ...
1
vote
2
answers
384
views
How to block personal devices on corporate network
Currently we are working to secure our internal LAN and due to this we are planning to stop mobile devices (such as personal laptops and mobile phones) to connect on corporate network. Our key area of ...
9
votes
3
answers
4k
views
Can an SSH server in password mode be impersonated if I ignore the fingerprint warning?
Assume that I never check the server fingerprint when logging in to an SSH server. This means that certain configurations of SSH can be impersonated. For example, I can log into a server that only has ...
0
votes
0
answers
119
views
Retrieving Android phone's identifiers
I will be publishing a fingerprinting app that shows its user how much access to their Android phone's identifiers it has. I haven't started writing it because I need to understand how can any Android ...
0
votes
1
answer
106
views
Using another's text number to commit ongoing fraud [duplicate]
Some Vietnamese refugee families have been Bitcoin defrauded by someone using an 805 text number. Lookups say it belongs to a party in Tennessee. I want to know if it is possible that scammers in ...
0
votes
1
answer
108
views
what if I just simply rename of a file instead of using right to left override
I'm browsing the ATT&CK and I understand the meaning of right-to-left override that it is using non-printing unicode character, but what is the different if I just simply rename a file like this: ...