Posts
2483
Following
663
Followers
1488
"I'm interested in all kinds of astronomy."
@SecurityWriter Strong Dwayne Elizondo Mountain Dew Herbert Camacho vibes!
2
0
5
Narrator: "Here's how the hack actually works"
Narrator: *Not actually explaining how the hack works.*

Gotta love USA-style storytelling!
0
0
2
I think I should display this somewhere in a frame

https://youtu.be/My_13FXODdU?si=5l_PiCdfXbY3ohSx&t=540
1
2
4
repeated

The Best Security Is When We All Agree To Keep Everything Secret (Except The Secrets) - NAKIVO Backup & Replication (CVE-2024-48248) - watchTowr Labs https://labs.watchtowr.com/the-best-security-is-when-we-all-agree-to-keep-everything-secret-except-the-secrets-nakivo-backup-replication-cve-2024-48248/

0
3
0
repeated
Edited 6 months ago

There are numerous times where I think "if that person simply had better aim, the world would be so very different".

But then I remember that where we are right now globally is not down to one or two evil people - but the result of rot in many social, economic, and governmental systems. The people we think are making evil choices are avatars for the system, more than individuals.

We have to fix the systems.

EDIT: They're still evil assholes. I just mean they're replacable, not unique.

0
2
0
Computer History IBM 1130 System Engineering 1965

https://www.youtube.com/watch?v=SNqii4Hnu9A
0
0
0
[RSS] Pwn everything Bounce everywhere all at once (part 2)

http://blog.quarkslab.com/pwn-everything-bounce-everywhere-all-at-once-part-2.html

New pre-auth RCE exploit chains for old SOPlanning bugs #NoCVE
0
0
1
Edited 6 months ago
[RSS] Pwn everything Bounce everywhere all at once (part 1)

http://blog.quarkslab.com/pwn-everything-bounce-everywhere-all-at-once-part-1.html

Blast from the past: new, configuration independent exploitation method of CVE-2009-1151 (pre-auth RCE in phpMyAdmin)
0
0
1
repeated
@freddy IME a consultants (incl pentesters) are hired in large part to outsource responsibility. We all know testing can't be perfect, but if there was a test and still there was an exploited bug, you have a scapegoat.

Example: you discover 10 SQLi's, which is a lot. Dev fixes all of them bit doesn't go any further in root cause analysis. When the 11th SQLi gets exploited it will be the pentesters fault that it was not in the report, because a) people think in checkbox lists b) doing proper analysis is expensive c) the consultant is not "one of us" ...
0
0
0
repeated

Mildly amusing: this Aussie dude got fed up with people parking in his driveway so he installed a motion-activated sprinkler.

10
20
0
repeated
repeated

We found out that machines performed 7% better if we trapped them in an endless loop of profound existential anguish

2
6
0
@lcamtuf "given the opportunity to pretend to be an AI" is genius!
0
0
0
This is a pretty good summary of #pentest as a profession:

https://www.reddit.com/r/Pentesting/comments/1ixoq2g/pentesting_is_the_hardest_cybersecurity/

(I don't think comparisons to other fields makes much sense though)
1
0
2
@yeslikethefood @raptor For some time I went to IT expos for the target trialware
1
0
0
[RSS] Reverse Engineering PowerPoint's XML to Build a Slide Generator

https://merlinai.framer.website/blog/ppt-generator
0
0
1
Fediverse is protecting my mental health by not showing my own posts to me again
0
0
3
Show older