Terminal service to localhost? ^^ that would give you another desktop, dunno if it would work though =/MariaLara wrote:What do you do if you have cmd and admin privileges but your desktop is being recorded? How would you get around that?
Hacking your school when you think its imposible
killer
if you have admin priv, kill the process that is recording your desktop.
DNR
DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
- bad_brain
- Site Owner
- Posts: 11636
- Joined: 06 Apr 2005, 16:00
- 19
- Location: In your eye floaters.
- Contact:
well, the question is which method is used for monitoring...a hardware or a software one. a hardware one can't be evaded because it simply records the monitor output (works kinda like reverse KVM), but if it's a software one the process can maybe be killed...the sign of a software one would be if the teacher can take over your system and interact on it from his box.
Find out what software it is... research it a little, find out how it works (in basic) and then find out how it works in the network your at (in basic as well, wont have to go deep for something like that).
Then simply make a small application (batch file or something easy) that kills the monitoring process, and starts a proxy tool that redirects the client request to another server, like the student sitting right next to you ^^
And to make it a little more stealthy, you could try to place all the files on an USB stick or something, and make an autostart file for it, so that they wont be able to see you doing it.
Then simply make a small application (batch file or something easy) that kills the monitoring process, and starts a proxy tool that redirects the client request to another server, like the student sitting right next to you ^^
And to make it a little more stealthy, you could try to place all the files on an USB stick or something, and make an autostart file for it, so that they wont be able to see you doing it.
"The best place to hide a tree, is in a forest"
hugs
exactly, at one college, they had the startup files secured on a 'blackbox' technology that plugged into the back of the computer. So I looked at the device and got the company name off of it and did research to by-pass it. It was as simple as removing it, only secured by the screws that held it in.
For software, I noticed that the admin would try to be clever and just put the software in a renamed folder, but the sub-folders still bearing the software file name were easy to find.
The weaknesses? Companies like to put their logo or name on their products and software needs files to keep their names and directories to work.
I think we had a little commo problem, but it looks like ya'll made up.
DNR
For software, I noticed that the admin would try to be clever and just put the software in a renamed folder, but the sub-folders still bearing the software file name were easy to find.
The weaknesses? Companies like to put their logo or name on their products and software needs files to keep their names and directories to work.
I think we had a little commo problem, but it looks like ya'll made up.
DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.