I thought that was Lance Manion!Oh no Ord, they found out your real name is Trevor McNeil.
Upvote
0
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature currently requires accessing the site using the built-in Safari browser.
I thought that was Lance Manion!Oh no Ord, they found out your real name is Trevor McNeil.
To be honest, there's ways around a lot of that.
An IP by itself is probably the most valuable piece of information... but I'm calling bs on the claim that they did anything with just a username.
Particularly if the signup email (and the password*) doesn't yield any additional leads via a tool like, say, Maltego.
*Any respectable site should be storing your pass as a hash, but... I'm not sure I'd say that's a respectable website. A lot of times home-grown stuff are either not well versed on security, or willfully disregard it. It's also possible to bypass the hashing process sometimes, such that if you have a known hash for a pw somebody uses -- you can manipulate the traffic to send and compare the hash directly rather than attempting to find a collision that will result in the known hash.
Usually you're looking for IP information to match with other websites... I'm not sure the method used for getting somebody's IP off of, say facebook, but I know people do it w/o getting them to click on a link.
And while it's dynamic with a lease time ... I know my "raw" IP (I'm often connected through VPN) usually doesn't change more than once a week, if that. The lease just gets renewed w/o switching the IP.
In that way if you have an "educated guess" on facebook, you can cross-check the IPs to verify.
But it seems to me the easiest route is to attack the email account with either pw (or hash) from the website you're working off of. From that you can usually find all sorts of stuff they've signed up for and log into other websites they've joined since most will just have you verify email to change pw.
It also does give you the ISP of the person and depending on how crazy you are, you can pursue that route.
I don't know, my limited experience with pen testing is directly involved in java programming (for the eventual social engineering hack) and setting up the network. The network infrastructure is extremely complicated since we have to exfiltrate to secure servers in order to maintain legal privacy, but we can't use those until the moment of exfil or the hapless SysAdmins will just ip block, so all the action happens over 3rd party VPS through our central servers through users VPNing in from home/hotel/starbucks/anywhere, and then throw in anal security b/c foreign intel would love nothing more than for us to do all the work for them.
So while I'm well versed in the techniques we usually use for social engineering (facebook, job ads = software info, spearfishing, etc.), and the techniques we use for migration + escalation (SQL is such a huge hole but plenty of others are out there) ... it's a bit different ball game to yank thousands of people's SSNs and CC#s out of a government agency than it is to stalk 1 user on a website. But amateurs have been successful doxing idiots off sites like 4ch, facebook, etc. when they're not careful with their IP, usernames, registered email, etc.
That said I doubt anybody on that website has even heard of Maltego, and their only exposure to Nmap or Metasploit were the Matrix movies.
Edit: And I forgot the most damning thing you can do with somebody's IP is go straight after their box; or at least the router. The router alone will give you man-in-the-middle attacks which can easily be used to access any SSL sessions they initiate (hello bank account) ... and with that, you definitely have somebody's identity.
Or they could just hack the computer directly starting with NMap to see what services you're running and/or a null session. Depending on how your windows passwords are stored, escalation can be trivial =/
And at that point you're talking about compromising the entire website, not just a user account. Possible - it happens as you know. I kinda doubt any of the normal users on BWI are capable of it though.
I kinda doubt the normal users on BWI are capable of making toast.And at that point you're talking about compromising the entire website, not just a user account. Possible - it happens as you know. I kinda doubt any of the normal users on BWI are capable of it though.
I'm working off the assumption that the owner would be complicit in these actions.
Usually you're looking for IP information to match with other websites... I'm not sure the method used for getting somebody's IP off of, say facebook, but I know people do it w/o getting them to click on a link.
And while it's dynamic with a lease time ... I know my "raw" IP (I'm often connected through VPN) usually doesn't change more than once a week, if that. The lease just gets renewed w/o switching the IP.
In that way if you have an "educated guess" on facebook, you can cross-check the IPs to verify.
But it seems to me the easiest route is to attack the email account with either pw (or hash) from the website you're working off of. From that you can usually find all sorts of stuff they've signed up for and log into other websites they've joined since most will just have you verify email to change pw.
It also does give you the ISP of the person and depending on how crazy you are, you can pursue that route.
I don't know, my limited experience with pen testing is directly involved in java programming (for the eventual social engineering hack) and setting up the network. The network infrastructure is extremely complicated since we have to exfiltrate to secure servers in order to maintain legal privacy, but we can't use those until the moment of exfil or the hapless SysAdmins will just ip block, so all the action happens over 3rd party VPS through our central servers through users VPNing in from home/hotel/starbucks/anywhere, and then throw in anal security b/c foreign intel would love nothing more than for us to do all the work for them.
So while I'm well versed in the techniques we usually use for social engineering (facebook, job ads = software info, spearfishing, etc.), and the techniques we use for migration + escalation (SQL is such a huge hole but plenty of others are out there) ... it's a bit different ball game to yank thousands of people's SSNs and CC#s out of a government agency than it is to stalk 1 user on a website. But amateurs have been successful doxing idiots off sites like 4ch, facebook, etc. when they're not careful with their IP, usernames, registered email, etc.
That said I doubt anybody on that website has even heard of Maltego, and their only exposure to Nmap or Metasploit were the Matrix movies.
Edit: And I forgot the most damning thing you can do with somebody's IP is go straight after their box; or at least the router. The router alone will give you man-in-the-middle attacks which can easily be used to access any SSL sessions they initiate (hello bank account) ... and with that, you definitely have somebody's identity.
Or they could just hack the computer directly starting with NMap to see what services you're running and/or a null session. Depending on how your windows passwords are stored, escalation can be trivial =/
I kinda doubt the normal users on BWI are capable of making a glass of water.I kinda doubt the normal users on BWI are capable of making toast.
I kinda doubt the normal users on BWI are capable of making toast.
Most likely, they'd pour the water into the toaster.I kinda doubt the normal users on BWI are capable of making a glass of water.
Most likely, they'd pour the water into the toaster.