So I am new. I recently had a long discussion with a tech support scammer the other day, in which (after I admitted to wasting his time), he completely broke character and told me their operation details. How much people they have scamming, where theyre located (Not india surprisingly) and other details. Anyways upon discovering he has 0 morals or any remorse, I decided I wanted to get involved.
Ive watched many videos of people syskeying, uploading rats, deleting files, etc and Im very interested.
I had a few questions that I hope you guys could help me out with.
I am using a bootable persistent volume of Kali Linux, then I plan on running a VPN through Kali, and downloading a Virtual Machine (VMWare? Virtual Box?) Is this sufficient enough to protect my identity? I plan on using anonymous calling programs also but I havent gotten that far.
Is there any limitations (id think there would be the OPPOSITE) with using Kali Linux instead of host being windows?
I know the trick of getting them to believe the pass isnt working, and then connecting to them then switching connection to host computer so they dont know what youre doing (Is there any tuts for this btw? Ive never used team viewer or any of the software they may try to use)
. Is there any other way I can gain access or dump files when they connect to me? I was thinking of creating a bait program or folder they’ll hopefully open and then using that, but I was just curious if anyone else had any other suggestions
Those are really my top 3 questions. Sorry for the wall of text but im antsy to get these guys!!