Scam the Scammer's
1) Avoiding blank screens by using Virtual Machines.
Example: VMware, Virtual box etc.
Scenario: Usually, scammer's try to blind/blank your screen by doing Screen sharing only on to second screen and thus you will be getting a blank screen. But if the Operating system is running on Virtual environment, this logic on second screen won't work.
2) Faking SMS verification on temporary phone numbers.
Scenario: Usually, scammer's ask for verification message on your phone number. In this case you can provide fake/temporary phone number. For this you can search for "temporary sms number" there will be lot of websites depending on your country.
3) Tracing IP of the scammer.
Find the IP of the scammer using wire-shark software or use traceroute commands etc.
4) Review the reviewers.
Scenario: A restaurant, motel, stores having much reviews is not the logic to say if it is good or not. See whether the reviewers count of reviews that they gave, this basically explains whether the reviewer a paid artist or not.
5) Spoof Media Access Control Address (MAC address).
Note: This is only temporarily address(can be persistent), you cannot change your original MAC address.
Example:
i) On Windows OS
Command prompt: getmac
Go to Device Manager => Network adapters =>
ii) On Linux
6) Install keyloggers, so as to save what Scammer types/keystrokes.
This help's in reverse tracking scammers credentials/personal details.
7) Use voice changers or mimicry.
8) Use calls bombarding
Example: scammerblaster.com
9) Find information on web.archive.org
No comments:
Post a Comment