View Single Post
Estel's Avatar
Posts: 5,028 | Thanked: 8,613 times | Joined on Mar 2011
#105
Originally Posted by stevomanu View Post
As far as i know inboxs are PRIVATE but if you cant thats a big shame , also when are we looking at these tutorials ..
But what do You want, citation You quoted tells everything. Anyway, I think that information for educational purposes isn't illegal, but funniest thing is that he DID a almost newbie-proof tutorial for phishing based attack, few pages ago

Still, doesn't try that in home (or outside). Phishing anyone by false web page (even false router prompt) isn't running wifite to crack WEP. If, by any chance, attacked person get more experienced assistance (have pro cousin, son, uncle or whatever) - or just isn't idiot @ the moment of attack, You can get into real troubles very soon. Including meeting with some blue girls and guys. In both meanings of "blue"

Without additional preparations, You leave dozens of traces there, that can be retrieved even months (@ some cases) after attack from victim computer. You've been warned.
__________________
N900's aluminum backcover / body replacement
-
N900's HDMI-Out
-
Camera cover MOD
-
Measure battery's real capacity on-device
-
TrueCrypt 7.1 | ereswap | bnf
-
Hardware's mods research is costly. To support my work, please consider donating. Thank You!

Last edited by Estel; 2011-07-05 at 21:26.
 

The Following User Says Thank You to Estel For This Useful Post: