- Joined
- Mar 5, 2024
- Posts
- 145
- Reaction
- 4,224
- Points
- 505
Huhu
You do not have permission to view the full content of this post. Log in or register now.
Yes beh miss muna ba ako? Haahahanew account mo 'to?
yes. sobrang na miss ko mga tutorials mo.Yes beh miss muna ba ako? Haahaha
di po advisable arp poisoning (these days), for education purpose only!
bad opsec po yan sa mga amateur.
mapupunta sa badness enumeration ang inyong device, yung apple devices may mitigations dito (protection frames, and automatic static arp entry/immunity) pero makikita nila (apple company) at matatandaan nila mga device na ginamit pang häçk, tapos kung may paymet apps ka pwedeng maalala or matugma nila ito (metadata, credit profiling).
kung pc naman kahit palitan/spoof mo pa ang mac naanounce padin ang ating original mac, tapos lilitaw yan sa ipv6 mac leakage which leads to detection again. bukod pa doon identified nadin ang inyong device at user location as per Exposure Notification. kung harmless naman or learning purpose on your own network goods pero sa mga nagbabalak outside, keep that in mind. ang mitigation dito is static arp entry pero need ito ng root sa ibang phone or set by manufacturer (sa ibang android) pero default mitigated by iphones/macs. Apple devs are aware of this issue kaya ginawaan nila ng auto static arp, randomized/auto-change mac upon detection, atbp. kasi flaw na LAN protocol ang arp attacks.
just like port scanning, ingat lang po kayo sa paggamit ng mga tools sa panahon ngayon. dahil minsan pag nag port scan (kahit di naman mahigpit dati) may chance na iblock ka na ng cloudflare pag napunta sa dnsbl/abuseipdb lalo sa mga naka static IP, same din yan sa wifi/local networks, may list din ng mga abusong mac address/devices pero di ganon kahigpit (kasi they assume your device may be tunneling the attacker).
so far. goods naman yung info ni TS, sharing is caring. sometimes we learn from mistakes and experiences, that's the häçker
yown oh more knowledge thanksdi po advisable arp poisoning (these days), for education purpose only!
bad opsec po yan sa mga amateur.
mapupunta sa badness enumeration ang inyong device, yung apple devices may mitigations dito (protection frames, and automatic static arp entry/immunity) pero makikita nila (apple company) at matatandaan nila mga device na ginamit pang häçk, tapos kung may paymet apps ka pwedeng maalala or matugma nila ito (metadata, credit profiling).
kung pc naman kahit palitan/spoof mo pa ang mac naanounce padin ang ating original mac, tapos lilitaw yan sa ipv6 mac leakage which leads to detection again. bukod pa doon identified nadin ang inyong device at user location as per Exposure Notification. kung harmless naman or learning purpose on your own network goods pero sa mga nagbabalak outside, keep that in mind. ang mitigation dito is static arp entry pero need ito ng root sa ibang phone or set by manufacturer (sa ibang android) pero default mitigated by iphones/macs. Apple devs are aware of this issue kaya ginawaan nila ng auto static arp, randomized/auto-change mac upon detection, atbp. kasi flaw na LAN protocol ang arp attacks.
just like port scanning, ingat lang po kayo sa paggamit ng mga tools sa panahon ngayon. dahil minsan pag nag port scan (kahit di naman mahigpit dati) may chance na iblock ka na ng cloudflare pag napunta sa dnsbl/abuseipdb lalo sa mga naka static IP, same din yan sa wifi/local networks, may list din ng mga abusong mac address/devices pero di ganon kahigpit (kasi they assume your device may be tunneling the attacker).
so far. goods naman yung info ni TS, sharing is caring. sometimes we learn from mistakes and experiences, that's the häçker way.
di po advisable arp poisoning (these days), for education purpose only!
bad opsec po yan sa mga amateur.
mapupunta sa badness enumeration ang inyong device, yung apple devices may mitigations dito (protection frames, and automatic static arp entry/immunity) pero makikita nila (apple company) at matatandaan nila mga device na ginamit pang häçk, tapos kung may paymet apps ka pwedeng maalala or matugma nila ito (metadata, credit profiling).
kung pc naman kahit palitan/spoof mo pa ang mac naanounce padin ang ating original mac, tapos lilitaw yan sa ipv6 mac leakage which leads to detection again. bukod pa doon identified nadin ang inyong device at user location as per Exposure Notification. kung harmless naman or learning purpose on your own network goods pero sa mga nagbabalak outside, keep that in mind. ang mitigation dito is static arp entry pero need ito ng root sa ibang phone or set by manufacturer (sa ibang android) pero default mitigated by iphones/macs. Apple devs are aware of this issue kaya ginawaan nila ng auto static arp, randomized/auto-change mac upon detection, atbp. kasi flaw na LAN protocol ang arp attacks.
just like port scanning, ingat lang po kayo sa paggamit ng mga tools sa panahon ngayon. dahil minsan pag nag port scan (kahit di naman mahigpit dati) may chance na iblock ka na ng cloudflare pag napunta sa dnsbl/abuseipdb lalo sa mga naka static IP, same din yan sa wifi/local networks, may list din ng mga abusong mac address/devices pero di ganon kahigpit (kasi they assume your device may be tunneling the attacker).
so far. goods naman yung info ni TS, sharing is caring. sometimes we learn from mistakes and experiences, that's the häçker way.