Quantcast
[ 3 / biz / cgl / ck / diy / fa / g / ic / jp / lit / sci / tg / vr / vt ] [ index / top / reports / report a bug ] [ 4plebs / archived.moe / rbt ]

Due to resource constraints, /g/ and /tg/ will no longer be archived or available. Other archivers continue to archive these boards.Become a Patron!

/g/ - Technology


View post   

[ Toggle deleted replies ]
File: 13 KB, 544x184, googlelogo_color_272x92dp.png [View same] [iqdb] [saucenao] [google] [report]
59626258 No.59626258 [Reply] [Original] [archived.moe] [rbt]

Ey /g/

Say you are using google chrome and you stumble across a page that could not be found... Do you think google chrome saves the address of the website and then sends it to google so it can find something to add to it's DNS?

>> No.59626271

Yes, I think so.

>> No.59626283

>>59626271
How would one go about checking this out?

>> No.59626297

>>59626283
I don't know.

>> No.59626308

>>59626297
Ok.

>> No.59626314

>>59626297
Ok.

>> No.59626379

yes, there is a special team set up for every single individual who browses the internet, dedicated to studying, analyzing, and archiving every little thing they do
they operate 24/7, and phone in to hq to report every hour, even when the subject they're assigned to is idle

>> No.59626385

>>59626297
Ok.

>> No.59626434

>>59626379
>yes, there is a special team set up for every single individual who browses the internet, dedicated to studying, analyzing, and archiving every little thing they do
Lmfao, never heard of automation?

>> No.59626456

>>59626297
Ok.

>> No.59626477

Probably. Take a packet capture and then try hijacking suspected google ssl connections and see if the domain you're accessing is being sent back to them. Generate a certificate and trust it, then route the domain you suspect to a local web server with the cert you made. Let me save you some time and tell you it's probably happening.

>> No.59626533

>>59626297
Ok.

>> No.59626564

>>59626477
>Probably. Take a packet capture and then try hijacking suspected google ssl connections and see if the domain you're accessing is being sent back to them. Generate a certificate and trust it, then route the domain you suspect to a local web server with the cert you made. Let me save you some time and tell you it's probably happening.
Thanks man, that's some good information! Just what I was looking for

>> No.59626575

>>59626297
Ok.

>> No.59626595

>>59626564
this is called a man in the middle attack. there are probably tutorials on how to do this from any number of pentesting live linux distros. search away.

>> No.59626613
File: 6 KB, 250x164, 1481866050622.jpg [View same] [iqdb] [saucenao] [google] [report]
59626613

>>59626434
never heard of satire

>> No.59626669

>>59626595
>a man in the middle attack
Even better! Do you know what tools are most important for this? (suggestions)

>> No.59626670

>>59626297
Ok

>> No.59626687
File: 2 KB, 125x82, 1490739612875s.jpg [View same] [iqdb] [saucenao] [google] [report]
59626687

>>59626613
>>never heard of satire

>> No.59626705

>>59626297
Ok.

>> No.59626783

>>59626669
-openssl
-a web server with ssl support
-iptables
there are some others utilities you'll probably find in a pentest distro that will decrypt the ssl connection using the private key you generate.
This is a very commonly done attack. Lots of documentation out there. Just learn how it's done and apply it to the google domain you suspect is receiving the URL you're trying to access. You can start by capturing packets with wireshark.

>> No.59626796

>>59626687
quit mocking me! My hemorrhoid is flaring up. I've been through enough today.

>> No.59626847

>>59626796
Ey! Hope your day get's better, my bad, just having a bit of 4chan fun.

>> No.59626991

>>59626783
Nice! Thank you thank you!

>> No.59627026

>>59626847
Thanks for that anon. I too am having fun.

shadilay

>> No.59627033
File: 307 KB, 1636x1024, 1419399621717.png [View same] [iqdb] [saucenao] [google] [report]
59627033

>> No.59627454

>>59626297
Ok.

>> No.59627817

>>59626297
Ohkay

>> No.59628349

>>59626297
Ok.

>>
Name (leave empty)
Comment (leave empty)
Name
E-mail
Subject
Comment
Password [?]Password used for file deletion.
Captcha
Action