I have an assignment where i need to implement three attacks after socket connection with python. I already did socket connection and implemented ransomware and key logger. I need one more attack implementation. Can anyone suggest me one attack that i can perform on the client's/ victim's side besides these two?
What attacks can be performed on victim's machine after socket connection?
112 Views Asked by Ekiddy At
1
There are 1 best solutions below
Related Questions in PYTHON
- How to store a date/time in sqlite (or something similar to a date)
- Instagrapi recently showing HTTPError and UnknownError
- How to Retrieve Data from an MySQL Database and Display it in a GUI?
- How to create a regular expression to partition a string that terminates in either ": 45" or ",", without the ": "
- Python Geopandas unable to convert latitude longitude to points
- Influence of Unused FFN on Model Accuracy in PyTorch
- Seeking Python Libraries for Removing Extraneous Characters and Spaces in Text
- Writes to child subprocess.Popen.stdin don't work from within process group?
- Conda has two different python binarys (python and python3) with the same version for a single environment. Why?
- Problem with add new attribute in table with BOTO3 on python
- Can't install packages in python conda environment
- Setting diagonal of a matrix to zero
- List of numbers converted to list of strings to iterate over it. But receiving TypeError messages
- Basic Python Question: Shortening If Statements
- Python and regex, can't understand why some words are left out of the match
Related Questions in SECURITY
- HTTPS configuration in Spring Boot, server returning timeout
- HSM ZKA control mask values
- OWASP Amass Subcommands
- Is there a need for BPF Linux namespace?
- Error when trying to execute a binary compiled in a Kali Linux machine on an Ubuntu system
- When sanitize/encode while implementing tags system like on SO
- spring security version in spring-boot-starter-security
- I am currently trying to implement a rudimentary firewall from a video I watched but the nimda worm detection is not working and i do not know why?
- Is it possible for `sudo` to fail temporarily with the correct password? Hacking suspected
- Is it viable proxying all my mobile apps requests, to some kind knowing that a request is coming from a secure source
- What abilities should I concentrate on while bug hunting, and how can I improve the quality of my bug bounty reports?
- System.ArgumentOutOfRangeException: I passed this error in every single program
- How to prevent users from creating custom client apps?
- Does server-side content security policy exist for youtube video player API, app, mod apks and website?
- Can we pass a hostname/IP address as a query string in a GET request in REST API
Related Questions in CLIENT-SIDE-ATTACKS
- Client side securing token vulnerability circular dilemma
- Browser redirect from server side
- Site attacked: ${jndi:ldap:/93.95.216.134:1389/Exploit}
- Block https://example.com/livewire/message/xyz external access
- Why does client hijacking only works while the browser is online?
- Saving access token and refresh token to local storage but encrypted?
- Ways to secure API that do not require authentication, to be called only from one pre-defined consumer
- Stop api abuse before user is authenticated
- XSS PoC: Hide Rendered Characters in DOM
- What are the things that need to be considered while deleting a resource through api
- localhost javascript bundled is trying to be injected to my website by an user. (Reported by Sentry an error and performance tracking tool)
- Why should we include CSP headers in the HTTP response for an API?
- Best practice for securing a client side call to an API endpoint
- Does somebody knows about this: repo1.criticalnumeric.tech
- How to prevent hackers from modifying the product price in e-commerce
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
Popular # Hahtags
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?
Some ideas that I have right now are:
If you have root access, you can basically have fun with some files and change their permissions. Maybe create a new user to access those files only.
You can try making a virus that could for instance create multiple processes of itself and slow down the victim's machine.
You could also create a script that scans for files in a certain directory (ex: Downloads) and send them to your machine.
You could try to modify some browser settings (called browser hijacking).
I might add more ideas later. Good luck