[ cyb / tech / λ / layer ] [ zzz / drg / lit / diy / art ] [ w / rpg / r ] [ q ] [ / ] [ popular / ???? / rules / radio / $$ / news ] [ volafile / uboa / sushi / LainTV / lewd ]

tech - God bless the AMD

2nd chances
Name
Email
Subject
Comment
File
Password (For file deletion.)

BUY LAINCHAN STICKERS HERE

STREAM » LainTV « STREAM

[Return][Go to bottom]

File: 1447010698283.png (2.72 MB, 1920x1080, P3VjROv.png) ImgOps iqdb

 No.13710

The most ridiculous thing you can do
>>

 No.13711

A lot.

>>

 No.13717

File: 1447015357267.jpg (65.45 KB, 523x592, 0 out of 10 smug.jpg) ImgOps Exif iqdb

Email their ISP and tell that the person with this IP address is making bomb threats on your forum

>>

 No.13720

If that ip access a site you own, you can make them paranoid.

>>

 No.13722

>>13710
Metasplert Hail Marry

>>

 No.13735

make chienese hackers ddos them for until they move.

>>

 No.13737

its funny the different responses you get to this question based on the know how of the community. not any super hacker guy but from what I understand thats kind of the first thing you have to know to start doing anything. So it's fairly important.

so I guess the correct answer to this question would be everything? its like asking how much damage can you do to someones house once you know where it is. it kind of depends how far you are willing to go and what knowledge you have available to you.

>>

 No.13748

>>13737
Some people wouldn't suggest burning the house, instead they'd suggest toilet papering. Funnier, less damage involved, and less probable to get you in jail.

>>

 No.13749

>>13710
TBH, in post-dialup days email address and social media account id is more important than an IP address. Most home routers now days have no Internet facing ports open by default to hack. On the other hand using their email address and social media account you can social engineer them to open a malicious link or download a malicious program.

But to answer your question, with an IP address you can find out the location of their ISP exit node, i.e. their country/city of origin. If they have any ports open on their router you can try default credentials for the router or run any available exploits for the router model.

>>

 No.13753

>>13737
If you wanna fuarrrk with people remotely, yes that's important information, but if you're using wireshark to capture packets, say in a coffee shop, all you need to know is the BSSID and you can set up a rouge AP for MitM attacks.

>>

 No.13755

>>13753
how could one do this?

for learning and testing on my own machines

>>

 No.13757


>>13755
>>13753
1 actually be the WLAN access point
1b or unencrypted WLAN and ARP poisoning
1c or wlan with soykaf encryption you can break and ARP poisoning
2 now targets traffic gets routed over your machine
3 breaking into their HTTPS is a bit tricky, either you have a fake cert for *.facebook.com or whatever that IS SIGNED by a root cert authority trusted by their system who abused their power, or they get a big fat warning and you just tell them to click on "stfu i know what im doing trust this fake cert so he can read eyverthing". the "explanation" text is notoriously bas even on firefox you have to like click a tiny arrow to read wtf is going on, but the reason browsers make such a huge fuss about certs that are self signed or something is because of situations like that

>>

 No.13916

>>13757
The book black hat python describes how to do this.

>>

 No.13963

>>13916
ah nice, we only did it in school in a VM once and for that we had metasploit or something other commerical installed



Delete Post [ ]
[ cyb / tech / λ / layer ] [ zzz / drg / lit / diy / art ] [ w / rpg / r ] [ q ] [ / ] [ popular / ???? / rules / radio / $$ / news ] [ volafile / uboa / sushi / LainTV / lewd ]