Tracking software
by - Thursday, January 1, 1970 at 12:00 AM
Hey , I am looking for a software who can track behavior and data of users on a private Network.
I have full access to the network.
 please contact me whoever can help, appreciate it a lot.
Reply
You are going to have to be a little more specific about literally everything you sad.
What kind of data do you want to track (maybe log not track)? If you want keystrokes just install keyloggers in those computers. If you need extended access, install a RAT. Logging network traffic can be somewhat useful but unsure of what is it you want to do. Lacking lots of info.
Look morty I turned myself into an illegal border wall im illegal border wall riiiick!!!

Scrap deez nuts:
X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Reply
(June 15, 2022, 06:09 PM)locopoco Wrote: You are going to have to be a little more specific about literally everything you sad.
What kind of data do you want to track (maybe log not track)? If you want keystrokes just install keyloggers in those computers. If you need extended access, install a RAT. Logging network traffic can be somewhat useful but unsure of what is it you want to do. Lacking lots of info.


I want to find a bastard who leaking information.
Reply
(June 15, 2022, 06:11 PM)DonCorl1one Wrote:
(June 15, 2022, 06:09 PM)locopoco Wrote: You are going to have to be a little more specific about literally everything you sad.
What kind of data do you want to track (maybe log not track)? If you want keystrokes just install keyloggers in those computers. If you need extended access, install a RAT. Logging network traffic can be somewhat useful but unsure of what is it you want to do. Lacking lots of info.


I want to find a bastard who leaking information.

Then you need to log all the network traffic and start searching for common data exfil methods. There is no silver bullet to detection.
Look morty I turned myself into an illegal border wall im illegal border wall riiiick!!!

Scrap deez nuts:
X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Reply
What type of access do you have, and what is the protocol?

Is it you have access to a VPN Server or ?

https://pompur.in
Reply
(June 15, 2022, 06:15 PM)locopoco Wrote:
(June 15, 2022, 06:11 PM)DonCorl1one Wrote:
(June 15, 2022, 06:09 PM)locopoco Wrote: You are going to have to be a little more specific about literally everything you sad.
What kind of data do you want to track (maybe log not track)? If you want keystrokes just install keyloggers in those computers. If you need extended access, install a RAT. Logging network traffic can be somewhat useful but unsure of what is it you want to do. Lacking lots of info.


I want to find a bastard who leaking information.

Then you need to log all the network traffic and start searching for common data exfil methods. There is no silver bullet to detection.


I have the computers who we suspecting leaked the info , sorry for the false information.
I want to know  who did it , from which computer the information leaked.


(June 15, 2022, 06:17 PM)pompompurin Wrote: What type of access do you have, and what is the protocol?

Is it you have access to a VPN Server or ?


We have access for everything but this is not the case.

The case here is that individuals laptops are suspicious for data leakage. We got those laptops in our lab so we have full control over each one of them.

We are looking for digital forensics that can show us all the past activities in those laptops including deleted browser history, file transfers, emails, etc.
Reply
(June 15, 2022, 06:18 PM)DonCorl1one Wrote:
(June 15, 2022, 06:15 PM)locopoco Wrote:
(June 15, 2022, 06:11 PM)DonCorl1one Wrote:
(June 15, 2022, 06:09 PM)locopoco Wrote: You are going to have to be a little more specific about literally everything you sad.
What kind of data do you want to track (maybe log not track)? If you want keystrokes just install keyloggers in those computers. If you need extended access, install a RAT. Logging network traffic can be somewhat useful but unsure of what is it you want to do. Lacking lots of info.


I want to find a bastard who leaking information.

Then you need to log all the network traffic and start searching for common data exfil methods. There is no silver bullet to detection.


I have the computers who we suspecting leaked the info , sorry for the false information.
I want to know  who did it , from which computer the information leaked.


(June 15, 2022, 06:17 PM)pompompurin Wrote: What type of access do you have, and what is the protocol?

Is it you have access to a VPN Server or ?


We have access for everything but this is not the case.

The case here is that individuals laptops are suspicious for data leakage. We got those laptops in our lab so we have full control over each one of them.

We are looking for digital forensics that can show us all the past activities in those laptops including deleted browser history, file transfers, emails, etc.


Dump the drives and analyze with Autopsy, maybe in browser history or temp files is something useful. No guarantees but worth a shot.
Look morty I turned myself into an illegal border wall im illegal border wall riiiick!!!

Scrap deez nuts:
X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Reply
(June 15, 2022, 06:05 PM)DonCorl1one Wrote: Hey , I am looking for a software who can track behavior and data of users on a private Network.
I have full access to the network.
 please contact me whoever can help, appreciate it a lot.


Simply you can load all of these laptops direct in your ASS  :) :D :D :D
you will find the info you are looking for mixed with a brown shit
Reply


 Users viewing this thread: Tracking software: No users currently viewing.