About the cyberstalker..
Gonna ask around on the other Chan’s about it
Thought I’d ask here
Thanks anyways
About the cyberstalker..
Gonna ask around on the other Chan’s about it
Thought I’d ask here
Thanks anyways
Ya
2 years now
I did serve in the Great Meme War of 2016 and did two tours (Primaries and General Election)
so it could be Dem black hats..
Or it could be some weirdo who has no life at all.
Was considering writing a program and leaving it out in the unprotected zone like a shared network folder with a canary token in it.
But most hacker fags use virtual machines and hide behind proxy chains.
So I’d have to put a dummy notice on the program that said a certain cpu instruction set was not present yada yada to the effect that the program doesn’t work in a virtual machine to get the pirate to use it on native machine.
It would have to be pretty convincing to pull that off lol
Idk that’s a more complex canary token but tbh it should be legal because if the hacker uses it that is after they stole it from me so I should be in the clear legally?
Ya no doubt
They all look the same
Women that go with them dudes have the leisure of ditching them at will given the fact that there are so many beta clones.
Soy milk included
So if a hacker were hiding behind a proxy and using a virtual machine and lets say they pirated a certain file from someone else’s computer..
How to trace this hacker.. with a canary token on steroids?
Let’s say this canary token runs script that does macchanger and tcpdump so the host -vm MAC address change or errors throws out the hosts originating IP Address?
Kind of like an arp echo?
Wonder if that would work..
Yeah I’m sure that will work especially since proxies are several ms in delay and host to vm is instant so in a flood scenario of mac changes the original IP address should spill out in the tcp dump..
🐇
BIGLY