traffic

  1. H

    Crypto drainer - traffic help

    I read a post on here by @Friend about crypto drainers and I signed up with one ( cryptograb ) I bought a couple domains and set up some drainers. One for EVM ( eth, polygon, etc ) and one for TON ( telegrams crypto ) The only thing is I’m having trouble getting traffic to my site. I have...
  2. Carding Forum

    Spam. Fat traffic for stealers etc.

    So, friends, it's no secret that the world is currently in a rather difficult situation in every sense, a pandemic, a virus, the economy has gone to hell, etc. There's suddenly nothing to do, or even worse, hands are scattered and they themselves do not know where to stick themselves in such a...
  3. Tomcat

    Other traffic sources

    We will not analyze social networks as a source of traffic in arbitrage Facebook, Instagram, Vkontakte, LiveJournal and the top in the CIS, it is not very interesting), but we will share unfamiliar foreign social networks. Where to look for an audience for Asian traffic? Are you interested in...
  4. Tomcat

    Traffic to porn through comments

    Let's get started Let's say we completely “accidentally” ended up on a well-known site. Let's say we didn't watch the video we liked, but immediately went to the comments under it. What will we see there: Or: We become interested in what kind of ladies these are and we go to their profile...
  5. chushpan

    Sniffers and more. Choosing a tool for intercepting and analyzing traffic.

    The content of the article: Theory Wireshark CommView Intercepter-NG SmartSniff tcpdump Burp Suite Conclusion Traffic analysis is the most important step in penetration testing (or even hacking). In packets transmitted over the network, you can find a lot of interesting things, for example...
  6. Father

    Without packages and money: phishing Mail sites become leaders in traffic

    How holidays and trustfulness of citizens affect the activity of scammers. Despite an extensive information campaign and warnings, fraudulent schemes that mimic the services of the postal service continue to operate successfully. Akamai found a significant increase in the activity of such...
  7. Father

    We extract traffic and installs

    The first rule of financial literacy is not to sit on general purpose forums. 99% of people are not capable of anything. Of the remaining percentage, 99% of people do not do what you are interested in. With the remaining ones, you can use the coincidence of many random factors make a big deal...
  8. Father

    Rhadamanthys is back: Traffic accidents have become a new bait for data theft

    Even simple phishing schemes can be effective if they appeal to human weaknesses. An updated version of the malicious information-stealing software called Rhadamanthys is being used in phishing campaigns targeting the oil and gas sector. Cofense cyber expert Dylan Duncan reports that hackers...
  9. Teacher

    How do I send traffic from GitHub?

    Hi everyone. In this article, I will make it as clear as possible and briefly describe how to pour traffic from GitHub. Let's start by preparing an account for the strait. 1) First , we need to buy a proxy. I use faceless, but I think simple ones will also work, ala pia 2) After that, proceed...
  10. Teacher

    Detecting OpenVPN sessions in transit traffic

    A group of researchers from the University of Michigan published the results of a study on the ability to identify (VPN Fingerprinting) connections to OpenVPN-based servers when monitoring transit traffic. As a result, we identified three ways to identify the OpenVPN protocol among other network...
  11. Lord777

    EU introduces new rules for intercepting web traffic

    The European Union is working on updating the eIDAS regulation, which regulates electronic identification and trust services for electronic transactions in the European single market. This is an important piece of legislation in the era of digitalization, and its updating is logical given the...
  12. Carding

    A series of TunnelCrack attacks aimed at intercepting VPN traffic

    A group of researchers from New York University has developed two methods of attacking VPNs, presented under the name TunnelCrack. The identified vulnerabilities allow an attacker who controls the victim's wireless access point or local network to redirect requests to the target host to their...
  13. Lord777

    One of the ways to extract traffic in 2023

    Let's start, I think, with the basics and the very beginning. Current file types for infection at the moment: Name.exe A regular encrypted file, usually disguised as a token. Personally, I use a dropper and inflate the file itself to 20-50 MB. I put the launch in 20-30 seconds, since some...
  14. CarderPlanet

    Sniffing https traffic

    Are you sure it's impossible? You are wrong. With the help of the sslstrip program, you can replace https with http, and already calmly sniff traffic in its open form. For kompukters! (With Kali Linux of course) The first command turns on packet forwarding echo "1"> / proc / sys / net / ipv4 /...
  15. Lord777

    Free traffic from Telegram

    We get free traffic from Telegram! Introduction Many wondered how to quickly, and most importantly, promote their project, channel, bot for free. Now you will learn how to get fast, and most importantly effective traffic to your product or project using bots for communication. At the same time...
  16. Lord777

    Carding Method Traffic

    This is the purchase of goods in online stores with these cards. They are obtained by hackers by breaking into shops. There is a direction of offline carding, there is an online one. Online is the most common, real is already dying. In online there is driving in things and driving in info goods...
  17. Father

    Chasing traffic

    So, hello, today I will share my method, how I drive traffic to various phishing sites, how I do 500 miner / stealer launches, etc. Here I will not disclose the "top" methods of driving traffic. Here I will tell you about what everyone has forgotten, but from this you can have a huge profit...
  18. Mutt

    Capture and modify TCP / IP traffic on the fly with Trudy

    There are several excellent tools for capturing network traffic. So, Scapy and Wireshark are excellent solutions for organizing passive sniffing, and Scapy, moreover, is capable of sending additional packets. In case you need to intercept traffic in the Man-in-the-Middle position, you can use...
  19. Father

    Traffic С-L

    Hello again. In front of you is my treasure of knowledge gained over several years and an almost ideal way to extract cash from our favorite products (lotto and cannabis). We will buy visitors on exchanges and send them to our products so that they have already made purchases there, and we...
  20. Teacher

    Traffic from Facebook. The realities of the outgoing year.

    Hello everyone! Today I want to raise a discussion of such a fat and complex source of traffic as FB. Many who have come across him know that this is a difficult and difficult rival, into which billions of investments are poured every year, a large part of which goes to antifraud. Why do I...
Top