var unreadAlerts = '1';
You have one unread private message from dkota titled Welcome to the Forum!

Looking for advice by true criminal minds!
#1
Hi im new here.

Let me explain you the story...i will set up a wifi in a famous island in the best spot of the island which every rich and drunk tourists will pass by. Many will look for free wifi because they have change country/continent no internet...i will be there for them Heart.

What you suggest me do to steal some money, i dont know a lot and i could not have my hands on the pc how can i get something of these millioners ?? i know some shit by kali but cant figure out something useful.

Im open for dm's from true criminals if you can figure out smthg and collab to do the job and split the money!
Report
#2
WiFI MITM won't yield much as in the modern age, any sensitive websites or apps that you would be sending sensitive information to, typically uses HTTPS.

You could try to steal credit card information. But if you are asking for advice for something like this, then you probably don't have the required technical understanding to be able to identify whales that are there, and target them specifically for their wealth. Not saying that as an insult at all, so please don't take it that way. But if you are asking the question of how to do something like that. Then you will probably end up getting caught for lack of technical understanding that is required to have proper operational security. For example, if you don't know what a MAC address is, or the technical details of how it is formatted, for example the first half being the identifier for the NIC manufacturer issued by IEEE, then you could not spoof your mac address correctly or at all and have that lead you to being identified. Same thing if you are using NetworkManager and forgetting to spoof your hostname for DHCP hostname leakage. And so on. Unless you have a good understanding of the technologies that you are using to pull off whichever hack that you do against these targets, then you will most likely fuck up and get caught eventually.

My suggestion is that if you want to go down this path of black hat shit. Then play the long game and invest significant time and effort into educating yourself on the required topics, and then once you are more knowledgeable, then the ways in which you could exploit those targets, would be apparent, or at least easy to brainstorm.
Reply Quote // Report
#3
Kasekie Wrote: WiFI MITM won't yield much as in the modern age, any sensitive websites or apps that you would be sending sensitive information to, typically uses HTTPS.

You could try to steal credit card information. But if you are asking for advice for something like this, then you probably don't have the required technical understanding to be able to identify whales that are there, and target them specifically for their wealth. Not saying that as an insult at all, so please don't take it that way. But if you are asking the question of how to do something like that. Then you will probably end up getting caught for lack of technical understanding that is required to have proper operational security. For example, if you don't know what a MAC address is, or the technical details of how it is formatted, for example the first half being the identifier for the NIC manufacturer issued by IEEE, then you could not spoof your mac address correctly or at all and have that lead you to being identified. Same thing if you are using NetworkManager and forgetting to spoof your hostname for DHCP hostname leakage. And so on. Unless you have a good understanding of the technologies that you are using to pull off whichever hack that you do against these targets, then you will most likely lick up and get caught eventually.

My suggestion is that if you want to go down this path of black hat shit. Then play the long game and invest significant time and effort into educating yourself on the required topics, and then once you are more knowledgeable, then the ways in which you could exploit those targets, would be apparent, or at least easy to brainstorm.


Yeah check! there i will be, they have not special forces of police that can crash the door and arrest me... Also i will hotspot by fake name/number internet. Now for MAC adress yeah until they get me caught...it will take long time and the situation i am its a bit strange (luckily)....if something turn to arrest, they must try to find who got this pc in that block and before they search the block for the pc they will inform me so.... I dont care so much about this. I care more about the way. Yeah by MITM not much things i can do... even if i get their cc information nowdays with 3d secure cant do much.
Reply Quote // Report


Quick Reply
Message
Type your reply to this message here.





Users browsing this thread: purely_cabbage
var thread_deleted = "0"; if(thread_deleted == "1") { $("#quick_reply_form, .new_reply_button, .thread_tools, .inline_rating").hide(); $("#moderator_options_selector option.option_mirage").attr("disabled","disabled"); }