Skip to content

ICEBlock climbs to the top of the App Store charts after officials slam it

Technology
101 61 996
  • 1k Stimmen
    166 Beiträge
    2k Aufrufe
    semperverus@lemmy.worldS
    Here's a listing of all of the visa corporate critters [image: 88472dcc-687f-4932-a8b8-ccf0140cde5d.png] [image: 566db492-4695-4dc1-8041-819af5daaac8.png] If you can get ahold of their contact info via LinkedIn or business listings, maybe try calling them directly for answers since their service desk can't seem to give us any.
  • Enjoy YouTube, Reddit, Facebook & Wikipedia Anywhere with CroxyProxy

    Technology technology
    1
    0 Stimmen
    1 Beiträge
    7 Aufrufe
    Niemand hat geantwortet
  • 79 Stimmen
    3 Beiträge
    34 Aufrufe
    D
    Right? The surprise would be if they weren't doing that.
  • Ispace of Japan’s Moon Lander Resilience Has Crashed

    Technology technology
    2
    1
    37 Stimmen
    2 Beiträge
    31 Aufrufe
    M
    $ ls space?
  • Meta is now a defense contractor

    Technology technology
    54
    1
    361 Stimmen
    54 Beiträge
    670 Aufrufe
    B
    Best decision ever for a company. The US gov pisses away billions of their taxpayers money and buys all the low quality crap from the MIL without questions.
  • 21 Stimmen
    6 Beiträge
    62 Aufrufe
    sentient_loom@sh.itjust.worksS
    I want to read his "Meaning of the City" because I just like City theory, but I keep postponing in case it's just Christian morality lessons. The anarchist Christian angle makes this sound more interesting.
  • 131 Stimmen
    67 Beiträge
    567 Aufrufe
    I
    Arcing causes more fires, because over current caused all the fires until we tightened standards and dual-mode circuit breakers. Now fires are caused by loose connections arcing, and damaged wires arcing to flammable material. Breakers are specifically designed for a sustained current, but arcing is dangerous because it tends to cascade, light arcing damages contacts, leading to more arcing in a cycle. The real danger of arcing is that it can happen outside of view, and start fires that aren't caught till everything burns down.
  • 1 Stimmen
    8 Beiträge
    77 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.