JP-Morgan-McKinsey
Member
- Messages
- 3
- Reaction score
- 2
- Points
- 3
Hello, teacher, I am a beginner Japanese. Thank you very much for your helpful replies to my recent post.
I have a few questions about applying IP-spoofing and session-high jacking to card games.
Q. Regarding obtaining a geo-targeted IP, rather than purchasing a high-end Socks5 ISP that can only narrow it down to an area within the same city at best and hoping that the IP is nearby the legitimate owner, if you could port scan the legitimate owner's IP, invade through a vulnerable open port, gain administrative privileges, and embed a proxy or VPN server on some connected device, wouldn't that raise the auto-VBV limit regardless of whether it's a 3DS card or not?
→This would mean stealthily establishing a relay point for my communications on the target device. However, this is technically difficult, and since there aren't many devices in average homes that can install a proxy server that's always connected 24/7, I've determined that it's currently difficult to implement immediately.
→Most home Wi-Fi routers have their administrator passwords set to the default. By remotely embedding my VPN profile (which I would naturally choose to be clean and geographically consistent with the target) into this (most home routers don't allow you to install a VPN server from the administrator screen, but you can), I can have the target "use" my VPN or proxy IP in reverse, so that both I and the target use the exact same exit network.
Q. How can I overwrite the stolen cookies in my browser, which is connected using an IP address that's geographically consistent with the stolen target's cookies? Many IT security articles urge users to take measures against session hijacking attacks, describing them as a serious threat. However, paradoxically, this means that many platforms are already taking measures against these attacks. How do many sites distinguish between malicious users using overwritten cookies and malicious ones? (Would overwriting cookies be counterproductive and actually increase the risk score?)
I have a few questions about applying IP-spoofing and session-high jacking to card games.
Q. Regarding obtaining a geo-targeted IP, rather than purchasing a high-end Socks5 ISP that can only narrow it down to an area within the same city at best and hoping that the IP is nearby the legitimate owner, if you could port scan the legitimate owner's IP, invade through a vulnerable open port, gain administrative privileges, and embed a proxy or VPN server on some connected device, wouldn't that raise the auto-VBV limit regardless of whether it's a 3DS card or not?
→This would mean stealthily establishing a relay point for my communications on the target device. However, this is technically difficult, and since there aren't many devices in average homes that can install a proxy server that's always connected 24/7, I've determined that it's currently difficult to implement immediately.
→Most home Wi-Fi routers have their administrator passwords set to the default. By remotely embedding my VPN profile (which I would naturally choose to be clean and geographically consistent with the target) into this (most home routers don't allow you to install a VPN server from the administrator screen, but you can), I can have the target "use" my VPN or proxy IP in reverse, so that both I and the target use the exact same exit network.
Q. How can I overwrite the stolen cookies in my browser, which is connected using an IP address that's geographically consistent with the stolen target's cookies? Many IT security articles urge users to take measures against session hijacking attacks, describing them as a serious threat. However, paradoxically, this means that many platforms are already taking measures against these attacks. How do many sites distinguish between malicious users using overwritten cookies and malicious ones? (Would overwriting cookies be counterproductive and actually increase the risk score?)