Hey everyone yesterday I was at a grocery store and I noticed suspicious WiFi networks and Bluetooth networks. I am quite tech savvy so I decided to investigate thinking it was probably just some skid. But when I opened Wireshark I saw the mac addressees for Cisco Merkari (A relatively advanced DPI program) , along with multiple other enterprise grade tools such as Fortinet and VMware. I have collected pcaps for both my Bluetooth and WiFi interfaces with Wireshark(available upon request). Does anyone have any idea could this be a government contractor? Or could it just be spoofed cause its relatively easy to spooph Mac addresses.

  • ferric_carcinization@lemmy.ml
    link
    fedilink
    English
    arrow-up
    2
    ·
    22 days ago

    I see that you’re investigating this on parrot. It has a lot of tools, so be careful to not to do anything ilegal by accident. Some places have really strict laws about that.

    • localhostnotfound@lemm.eeOP
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      21 days ago

      Will do the reason I happened to have parrot is I was fixing a family members WordPress site considering they haven’t updated there site in 601 days. I checked the PHPmyAdmin portal and it is a nightmare. I am currently working on making a test VM(libvirt) with a custom .tst top-level domain (for test environments) based on fedora server 41 with customized selinux policy and attempting to create a immutable style filesystem probably f2fs eventually( kinda like chromeos, with a/b partitions , I might use particle os) in the future I want to add DM verity and find a provider that accepts custom secure boot certificates. I can assure you by my knowledge everything any tool on parrot has been used on localhost or authorized domains with consent of the owner. I’m currently using parrot to learn how to securely setup a server. I’ve recently taken lots of inspiration from the grapheneOS project especially with there hardening by zeroing kernel and user space memory, and hardware mte. This is just so I can be the best I possibly can at defensive security while I’m interested In offensive security I prefer to study defensive security.

      • ferric_carcinization@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        21 days ago

        Just be careful to not to do anything to computers you don’t control or have permission to access. An underage person here port scanned a bank, which then got pretty expensive. (12 000€)

        As far as I understand, a/b partitions are pretty common for immutable systems, like Android & immutable Linux distributions. Why did you choose f2fs instead of something like ext4 or zfs? It’s Flash Friendly FileSystem, right, or does it mean something else too?