Hej Sup Forums, is it possible to sniff out mobiles without touching them? I life right beside a school...

Hej Sup Forums, is it possible to sniff out mobiles without touching them? I life right beside a school, so there should be a lot of nudes wandering arround!

That's called being a pedo you fucking idiot.

How fucking lonely are you, kid?

More

Your point being?

Bumping for interest.
In the same idea, is there an easy way to sniff out a smartphone password protected while having access to it?

up

Hackers never teach how to hack.

You can try reddit r howtohack

You're a pedophile who has watched too many shitty action movies.

Stop investing so much energy into porn, and get a hobby.

I'd rather you do heroine than invade people's privacy.

Not even OP or a pedo, but you're retarded.
Porn is a hobby. Just because it's not your hobby, doesn't make it not a hobby.

You could set up free(open wifi) just call it (*school name* free wifi) set up a redirect for facebook in the router setting so that it redirects to phishing site that you set up. Also block the facebook ips used on app so as to force them to use the web site

Profit?

Or maybe he's trying to make hacking his hobby lmfao

Brilliant!
>pic as reward

I didn't mean to provoke an emotional response.

A "hobby"(even porn) is fine until it starts involving other people.

Also, I might be retarded, but how can you assume such a margin of intellectual difference between us that you can label me as such?

>misunderstanding technology this badly

Be me have multiple qualifications in It
Be an IT technician
Be told he doesn't understand something he's done before (minus the blocking of app)
Kill your self

Femtocell. You'll need to do some research.

Doubt that would work as 3g onwards is encrypted and 2g is disabled by default on newer devices

This will work, sort of, but they'll get certificate errors and shit. OP can try XSS using a redirect to whatever page they entered, or just add an element with the script to each page ala "upside down ternet". That doesn't capture mms and phone calls, though, so a femtocell with a cantenna would work better for a single carrier, so long as OP doesn't afraid of programming.

I don't think it makes a difference because the encryption is to the "tower". It works much the same as a stingray, except it's not out of the box and will still route calls over IP.

It's pretty retarded to do what was described. Once they're on the same wifi as you they're already unsecure. Any handful of simple programs will allow you to just snatch their cookies straight from out of the air and use them to 'log into' the websites as them.

You can try. Replay attacks aren't a sure bet, though, and some services are encrypted to the device. Cookies that are transmitted via SSL aren't going to look like anything but gibberish. The script injections bypasses the entire certificate chain and allows you to manipulate things a little more easily.

That would be the best way but you wouldn't have there email and password witch is what is useful to get in to there other accounts.

Yeah, I was right. 3g and 4g do not use end-to-end encryption; they simply encrypt to the edge device (such as a cracked femtocell).

I don't think you understand how unsecure wifi is. You can take the cookie the device is sending to the router and have your computer send it to the router instead, gaining access to the website as the user. It doesn't matter that the cookies are encrypted. You don't have to decrypt them to use them. This is why you should NEVER do any form of online banking via wifi. Always use a hardline.

Yeah, that's the biggest downside. I never wanted to do anything truly malicious so it never mattered to me though. Making silly posts on peoples' facebook walls as themselves was enough.

You have to know that the cookie is the cookie. If they're using ssl, you won't. Wi-Fi has nothing to do with end-to-end encryption, dipshit. You'll know they're making connections and to which sites, but not what the data is.

Kek I do remember reading this story about cell towers in the US that were not registered to any one but repeated cell signals to real ones. Could try that op

You have no idea how SSL/TLS works. You won't even be able to tell what is a cookie and what isn't in the encrypted packets. You only see seemingly random bits in an http stream. There is no way you can pull a cookie out of that.

FUCKING THANK YOU. That skiddie wannabe acts like it's not 2017 where most sites use ssl/tls by default, not to mention all the multifactor authentication that's been implemented (though it's not the default for most of these yet).

You can avoid certificate errors by just forwarding requests to a new domain with that just looks really similar (that hosts the phishing website). Also, if you control the WiFi, you can just impersonate the certificate authorities and modify DNS returns.

I've been wanting to find a femtocell to play with, but they're expensive, (fairly) heavily monitored, and need to transmit over IP. Even with a VPN, Tor, proxychains, etc. I wouldn't run a hacked edge device on my own network.

There have been load of cases where ssl/tsl encrypted cookies have been stolen I doubt it would be user friendly but there are several was of it being done if you control the WAP (just google it like I did)

Yeah, but the ternet/iframe injection is a more elegant solution, considering it will have the exact url as expected.

I see a future in which you can not go within 500 yards of a school, let alone live right next to one

It's easy op, just break ssl

Yes, but I guarantee all those cases used some kind of XSS (loaded on the client machine), not packet sniffing from the AP.

...

Fun fact: it's not illegal to ask questions about how to commit a crime. Once he starts purchasing equipment with his credit card and they pull his search history without a warrant (because the isps can simply sell it now), he will be guilty of conspiracy. They'll wait until he commits the crime and use all of that shit in sentencing, though.

Is so easy that your average donut munching pig can do it.

They have $20,000 stingrays at their disposal, which (usually) require warrants for use. They don't route traffic via mitm, afaik, so any calls connecting to them drop and sms/mms don't reach their destination. They also cannot intercept 3rd party apps, like Facebook private mode, which locks a conversation to the device initiated on, but neither can a cracked femtocell.

Unless he lives in the UK in which case GCHQ is monitoring all forms of digital communication.

Good point. I know nothing of the wireless standards and legal practices of the UK.