Global Feed Post Login
Replying to Avatar Guy Swann

Scenario:

#Hacking #Bitcoin #Cypherpunks

Say you had 10 minutes (minus finding it and setting up) with someone’s MacBook, and you wanted to “infect” or pull as much information from it as possible without ANY logs showing that you’ve done anything to it, or plugged in any devices.

The MacBook is closed, asleep, and locked with the basic password.

What could you do, and could you ensure that there was no indication at all (no logs whatever) that suggested you had tampered with it?

If yes, what would you need to pull it off?

#asknostr

Avatar
Diacone Frost 1y ago

I think you actually get the most data from the exterior.

serial numbers (potentially figure out when and where they bought it)

company inventory numbers (if it's for work), where they work, etc.

stickers (are you into bitcoin, games, ...)

steal it and return it, gain trust and start phishing...

Reply to this note

Please Login to reply.

Discussion

No replies yet.