Skip to content

Supreme Court to decide whether ISPs must disconnect users accused of piracy

Technology
159 120 0
  • 494 Stimmen
    154 Beiträge
    73 Aufrufe
    Q
    Lets see.
  • 43 Stimmen
    2 Beiträge
    10 Aufrufe
    C
    From the same source, Blacklight is really good. https://themarkup.org/series/blacklight Blacklight is a Real-Time Website Privacy Inspector. Enter the address of any website, and Blacklight will scan it and reveal the specific user-tracking technologies on the site So you can see what's happening on a site before you visit it
  • Tech Company Recruiters Sidestep Trump’s Immigration Crackdown

    Technology technology
    3
    1
    43 Stimmen
    3 Beiträge
    10 Aufrufe
    G
    "Hey ChatGPT, pretend to be an immigration attorney named Soo Park and answer these questions as if you're a criminal dipshit."
  • $20 for us citizens

    Technology technology
    1
    0 Stimmen
    1 Beiträge
    6 Aufrufe
    Niemand hat geantwortet
  • Programming languages

    Technology technology
    1
    1
    0 Stimmen
    1 Beiträge
    5 Aufrufe
    Niemand hat geantwortet
  • 137 Stimmen
    16 Beiträge
    13 Aufrufe
    H
    My ports are on the front of the router. No backdoors for me, checkmate Atheists.
  • 1 Stimmen
    8 Beiträge
    14 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • Indian Government orders censoring of accounts on X

    Technology technology
    12
    149 Stimmen
    12 Beiträge
    9 Aufrufe
    M
    Why? Because you can’t sell them?