Suppose your neighbor is a sister paper. Beautiful single, you, technical dog, ugly family, group account. The success rate of the conventional approach like soy sauce is very low for you.
What you need to do is to understand her and then approach her. By collecting more information, we can help create opportunities.
Basic Information Collection
This is not technical. Everyone is available.
As long as a person lives in the world, there will be traces. The traces contain intelligence, and professional intelligence personnel are extremely curious and insightful.
She will put the garbage bag at the door and discard it when she leaves the door.
In the dark of night, you quietly stole the garbage bag and found the parcel inside. So you get her phone number and name.
What should I do if it is a pseudonym? You can use the mobile phone recharge software to check the name of the host in many regions by phone number.
Intermediate advanced techniques
The social engineering method, maybe you can get some information about her, graduation school, work unit, and so on.
Advanced Techniques
None of the items found above are enough, right?
A bit technical.
Set up a Wi-Fi hotspot in your house without a password and wait for her to hook up. Capture packets, get her frequently-used websites, get her Baidu search term, and get her speech on social networking websites. For some websites that do not use SSL or front-end password encryption, you can also get her account password.
WiFi phishing, the simplest and simplest method, is to use a notebook with a wireless network card. Compared to flushing firmware for a route, the notebook method can only be thought of in a few days. (Thanks for your praise)
There are many ways to set up WiFi in a notebook. I like to use connectify, which becomes a hot spot after installation.
If you are worried about signal problems, you can place your notebook on the windowsill closest to her home.
Don't worry, a Wi-Fi without a password can arouse her curiosity sooner or later.
To prevent other neighbors from connecting to the system, you can capture the package content to determine whether it is the sister paper next door and ban the MAC address.
After the sister paper is hooked up, you just need to open a packet capture software on your laptop.
Advanced Techniques
After a long period of monitoring, you have a deep understanding of her. Constellation, birthday, preferences, and so on.
You are her vro and can manipulate all data.
You can capture packets to change the package. Let all her webpages return a phishing page. The page content is a well-designed operator error page. With a reasonable prompt, the customer service phone number is your phone number.
There is another possibility that she may not be able to access the Internet by using your wifi, and may use her own WiFi. Then we can only find her house's Wi-Fi signal, and then drop the DOS. If you are not sure, you can find all DoS. Who is your neighbor, who is unlucky? You are a bad guy ...... (Method too nonsense)
The best way is to crack her wi-fi password and try ARP spoofing to return the error page. In this case, I did not say anything before.
More simply, if she has low IQ, she can change the error page to a brand computer or network card. This saves time for cracking. In short, she needs to be in a hurry and ask her to make a call.
If you think the mobile phone number is not reliable, you can use the business license of the downstairs noodle shop to open a 400, and transfer the call to your mobile phone.
She found that she could not access the Internet and called 400 as instructed.
You knocked on the door in 20 minutes and pretended to be surprised to say that I was living next to you!
Next, you will install an on-site service employee to repair the computer for her. The repair process must be forced. Use the most mysterious command prompt.
After calculating the time, let your computer shut down at a certain time, it would be good for her. Or you can remotely control your PC through your mobile phone to turn off bad software.
You can access the Internet. She would be very grateful. In addition, when chatting in the process and adding you as a neighbor, the two become familiar.
She may ask you to fix other problems with her computer. In the future, when the computer breaks down, she will definitely knock on your door.
High and advanced means
Change the package and replace the software she downloaded with a Trojan ...... Let her have something wrong with her computer. Knowing her privacy does not need to analyze data packets. Neither can you peat her with a camera. This is not detailed. It is too wicked.
Final Conclusion
Through so many efforts, you and her become more and more familiar. The final result must be ...... You still haven't caught up with her ......
Why? I already said it at the beginning. You think you will be able to catch up with girls by playing with a broken computer? Don't dream about it. This article is just about watching and playing.
Use WiFi phishing to catch beautiful sister-in-law paper from neighbors