The kind of question asked by the Original Poster are some of those questions I classify as vague. Why?
No details are given about the machine, network, the person's role.
If this guy is bright enough, he can make the machine non-functional on the network and if he's the IT guy in there, the machine will be brought to him and he'll easily get to steal the data he intends to steal!
Funnily, a data thief comes to us to consult and we readily start giving advise - service libré.
You can try out dameware but you must have the login credentialsOn 10 July 2012 12:51, Mickey Mickey <michaelakunga@gmail.com> wrote:
Everything is posssiple if they created the security it means they feared someone coming to access behind the scenes that sounds hard but what if , what if eeeeehhh what if lets say a miracle didn't happen for them as they wanted, what if they did not do it perfectly, what if ..... what else remind me I have forgotten........! too bad that is the mind so if you keep asking yourself this questions you are about to break into somebody's data privacy which you have the right to as much as no one knows you did and doubts you did. so let me know how you progress.
On Tue, Jul 10, 2012 at 12:04 PM, Odhiambo Washington <odhiambo@gmail.com> wrote:
On Tue, Jul 10, 2012 at 11:58 AM, Joseph Maina <mainasoft00@gmail.com> wrote:simonwhat if the machine doesn't have VNC or Everything?On Tue, Jul 10, 2012 at 9:16 AM, Simon Mbuthia <simon.mbuthia@gmail.com> wrote:
VNC backdoor using UltraVNC which supports file transfer. Another backdoor that you could create is using Everything by Voidtools which gives you HTTP and FTP access to the computer running the tool.
On 10 July 2012 09:11, Shadrack Mwaniki <shadrack_mwaniki@yahoo.com> wrote:
Hi Skunks,I need to access data on a user machine anonymously without physically going on the machine to activateremote desktop or file sharing.The user uses a locan account and not connected to ADI need ideas on how i can achieve this
Anonymously doesn't exist on Windows unless the Guest Account is enabled, but even so, there could be layers of restrictions that would stop you from accessing files belonging to other users. It all depends on how the Local Security Policies of that machine is configured.
I suggest you simply drop this endeavor if you don't have the requisite knowledge.
--
Best regards,
Odhiambo WASHINGTON,
Nairobi,KE
+254733744121/+254722743223
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
I can't hear you -- I'm using the scrambler.
_______________________________________________
Skunkworks mailing list
Skunkworks@lists.my.co.ke
------------
List info, subscribe/unsubscribe
http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks
------------
Skunkworks Rules
http://my.co.ke/phpbb/viewtopic.php?f=24&t=94
------------
Other services @ http://my.co.ke
--
MICHAEL A. AKUNGA
Cell No: (+254) ( 0) 726 174 815
E-Mail: michaelakunga@gmail.com
michaelakunga@yahoo.com
Blog: http://michysoft.blogspot.com
Skype: michaelakunga
_______________________________________________
Skunkworks mailing list
Skunkworks@lists.my.co.ke
------------
List info, subscribe/unsubscribe
http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks
------------
Skunkworks Rules
http://my.co.ke/phpbb/viewtopic.php?f=24&t=94
------------
Other services @ http://my.co.ke
_______________________________________________
Skunkworks mailing list
Skunkworks@lists.my.co.ke
------------
List info, subscribe/unsubscribe
http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks
------------
Skunkworks Rules
http://my.co.ke/phpbb/viewtopic.php?f=24&t=94
------------
Other services @ http://my.co.ke