Impersonating iOS Password Prompts

This is an interesting security vulnerability: because it is so easy to impersonate iOS password prompts, a malicious app can steal your password just by asking. Why does this work? iOS asks the user for their iTunes password for many reasons, the most common ones are recently installed iOS operating system updates, or iOS apps that are stuck during installation…. Continue reading Impersonating iOS Password Prompts

GPS Spoofing Attacks

Wired has a story about a possible GPS spoofing attack by Russia: After trawling through AIS data from recent years, evidence of spoofing becomes clear. Goward says GPS data has placed ships at three different airports and there have been other interesting anomalies. "We would find very large oil tankers who could travel at the maximum speed at 15 knots,"… Continue reading GPS Spoofing Attacks

Are there any cyber investigators that help individuals locate the source of spoofed death/bodily harm texts?

For the past two and a half years I’ve been getting text messages threatening my life and detailing disgusting acts of physical torture planned for my wife and our dogs.

The texts have been spoofed to my cell phone, one hun… Continue reading Are there any cyber investigators that help individuals locate the source of spoofed death/bodily harm texts?

Posted in Uncategorized | Tagged

Is it possible to Spoof Another Machine’s MAC Address on LAN?

Is it possible to Spoof Another Machine’s MAC Address on LAN?

I know we can spoof mac address of machine that we are currently on, using macchanger or ifconfig wlan0 ether de:ad:be:ef:ca:fe. But I want to make another host on LAN to pret… Continue reading Is it possible to Spoof Another Machine’s MAC Address on LAN?

Why can’t I force an application to close active session by spoofing the Source IP address?

I am trying to get my head around the setup above. A simple netcat session between two hosts and a pentesting machine is trying to get that established session to be terminated by only knowing source and destination IP:port… Continue reading Why can’t I force an application to close active session by spoofing the Source IP address?

Posted in Uncategorized | Tagged