DJ SUBSTANCE
1 min readSep 3

--

this is relevant, not spam, written like someone who passed 8th grade, thank you. However I just thought id share that the ways you mention are almost kinda outdated now . for instance you mention MITM, AND WIRELESS . This would require the attacker to a) be very close in prox, and know your network name and your hosts mac they would also likely have to hack a presecured wifi router . The days of WEP and WPS attacks are pretty much over, i have yet to see someone crack wpa3. You mention keylogger, anyone running windows 7-11 is going to have defender and AV (inline) on, which is going to require you to code a super stealth keylogger, spoof a mail and make it look legit or get the target to d/l your exe and run it . Good Luck! I am def. not knocking your effort here i wish more people wrote as good as you and had as much knowledge. However lastly with every social media and email service using MFA or 2ndary auth on your cell phone - out of curiousity. let me know next time you or someone you know gets their accts hacked. Your methods are all 100% accurate, its just highly unlikely to pull off in this fasion. Command Control type setup or backdoor and rev SSH tunnel a VNC session ,. check out site: screenleap.com its like teamviewer but no bloat

just one ravers opinion

dj substance

--

--

DJ SUBSTANCE

twenty years professionally as a Network Engineer, more recently I have focused on red teaming mostly, but I am always up for learning and exchanging info