this post was submitted on 11 May 2025
4 points (62.5% liked)

Hacking

2140 readers
1 users here now

This is the community for all things hacking and cybersecurity, try keeping it legal. That said I don't take any responsibility for anything that happens/comes from this group but I will try being the best mod that I can to prevent anything from happening.

founded 5 years ago
MODERATORS
 

Hey everyone yesterday I was at a grocery store and I noticed suspicious WiFi networks and Bluetooth networks. I am quite tech savvy so I decided to investigate thinking it was probably just some skid. But when I opened Wireshark I saw the mac addressees for Cisco Merkari (A relatively advanced DPI program) , along with multiple other enterprise grade tools such as Fortinet and VMware. I have collected pcaps for both my Bluetooth and WiFi interfaces with Wireshark(available upon request). Does anyone have any idea could this be a government contractor? Or could it just be spoofed cause its relatively easy to spooph Mac addresses.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 2 points 1 month ago (1 children)

I see that you're investigating this on parrot. It has a lot of tools, so be careful to not to do anything ilegal by accident. Some places have really strict laws about that.

[–] [email protected] 2 points 1 month ago* (last edited 1 month ago) (1 children)

Will do the reason I happened to have parrot is I was fixing a family members WordPress site considering they haven't updated there site in 601 days. I checked the PHPmyAdmin portal and it is a nightmare. I am currently working on making a test VM(libvirt) with a custom .tst top-level domain (for test environments) based on fedora server 41 with customized selinux policy and attempting to create a immutable style filesystem probably f2fs eventually( kinda like chromeos, with a/b partitions , I might use particle os) in the future I want to add DM verity and find a provider that accepts custom secure boot certificates. I can assure you by my knowledge everything any tool on parrot has been used on localhost or authorized domains with consent of the owner. I'm currently using parrot to learn how to securely setup a server. I've recently taken lots of inspiration from the grapheneOS project especially with there hardening by zeroing kernel and user space memory, and hardware mte. This is just so I can be the best I possibly can at defensive security while I'm interested In offensive security I prefer to study defensive security.

[–] [email protected] 1 points 1 month ago* (last edited 1 month ago)

Just be careful to not to do anything to computers you don't control or have permission to access. An underage person here port scanned a bank, which then got pretty expensive. (12 000€)

As far as I understand, a/b partitions are pretty common for immutable systems, like Android & immutable Linux distributions. Why did you choose f2fs instead of something like ext4 or zfs? It's Flash Friendly FileSystem, right, or does it mean something else too?