I was watching this guy on youtube and at 3:50 he talked about an interceptor. Please explain what this is and how to make one.
Forum Thread: What Is an "Interceptor"
- Hot
- Active
-
Forum Thread: How to Track Who Is Sms Bombing Me . 4 Replies
1 mo ago -
Forum Thread: Removing Pay-as-You-Go Meter on Loan Phones. 1 Replies
2 mo ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 3 Replies
2 mo ago -
Forum Thread: moab5.Sh Error While Running Metasploit 17 Replies
3 mo ago -
Forum Thread: Execute Reverse PHP Shell with Metasploit 1 Replies
4 mo ago -
Forum Thread: Install Metasploit Framework in Termux No Root Needed M-Wiz Tool 1 Replies
5 mo ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 35 Replies
5 mo ago -
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
6 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
7 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
7 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
9 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
9 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
9 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
10 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
10 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
10 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
11 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
11 mo ago
-
How To: Scrape Target Email Addresses with TheHarvester
-
Steganography: How to Hide Secret Data Inside an Image or Audio File in Seconds
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
Hack Like a Pro: How to Crack Passwords, Part 1 (Principles & Technologies)
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
How To: Use Kismet to Watch Wi-Fi User Activity Through Walls
-
How To: Enable Monitor Mode & Packet Injection on the Raspberry Pi
-
How To: Intercept Images from a Security Camera Using Wireshark
-
How To: Set Up a Headless Raspberry Pi Hacking Platform Running Kali Linux
-
How To: Use Ettercap to Intercept Passwords with ARP Spoofing
-
How To: Install Kali Linux as a Portable Live USB for Pen-Testing & Hacking on Any Computer
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How To: Easily Detect CVEs with Nmap Scripts
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
-
How To: Gain Complete Control of Any Android Phone with the AhMyth RAT
-
How To: Detect When a Device Is Nearby with the ESP8266 Friend Detector
-
How To: Identify Web Application Firewalls with Wafw00f & Nmap
-
How To: Use Metasploit's WMAP Module to Scan Web Applications for Common Vulnerabilities
-
How To: Wardrive with the Kali Raspberry Pi to Map Wi-Fi Devices
6 Responses
He stated he run the trojan in a virtual machine, so it would not harm his system. He then sniffed for network traffic and saw that screenshot were taken fron his pc to the attacker's server. He then used probably some proxy to DoS him with very large fake screenshots, making his server crash. If you want my guess, he used something like wireshark and paros to get this done.
Funny vid btw. Wannabe scammer got pwned.
How this wouldn't harm his computer because I heard of something called pivoting so the hacker can hack the computers on his network or am I wrong?
But how did he use the proxy and managed to swap out the picture?
Well how could you DoS someone with a picture?
look @ 4:26 ... well if the pic is 850 MB and scammer's server was on a poor connection, it could possibly either clog it, or crash it because it can't handle so much data. We'd need more info on his setup, but let's say it's a custom trojan built by the inexperienced scammer... totally possible to DoS it with a single hhuge image.
Hilarious.
Share Your Thoughts