Skip to content

ICEBlock climbs to the top of the App Store charts after officials slam it

Technology
73 46 0
  • What Does a Post-Google Internet Look Like

    Technology technology
    42
    93 Stimmen
    42 Beiträge
    4 Aufrufe
    blisterexe@lemmy.zipB
    I'm just sad I'm too young to have ever seen that old internet, and what it was like... Makes me more determined to try and steer the current internet back in that direction though.
  • 893 Stimmen
    134 Beiträge
    134 Aufrufe
    Y
    Yup, but the control mechanisms are going to shit, because it sounds like they are going to maybe do a half assed rollout
  • Why Silicon Valley Needs Immigration

    Technology technology
    4
    1
    36 Stimmen
    4 Beiträge
    14 Aufrufe
    anarch157a@lemmy.dbzer0.comA
    "Because theyŕe greedy fucks". There, saved you a click.
  • 137 Stimmen
    2 Beiträge
    11 Aufrufe
    treadful@lemmy.zipT
    https://archive.is/oTR8Q
  • 186 Stimmen
    18 Beiträge
    17 Aufrufe
    N
    Part of the reason for my use of "might".
  • 80 Stimmen
    27 Beiträge
    32 Aufrufe
    lanusensei87@lemmy.worldL
    Consider the possibility that you don't need to be doing anything wrong besides existing to be persecuted by a fascist regime.
  • The AI-powered collapse of the American tech workfoce

    Technology technology
    2
    1
    4 Stimmen
    2 Beiträge
    12 Aufrufe
    roofuskit@lemmy.worldR
    The biggest tech companies are still trimming from pandemic over hiring. Smaller companies are still snatching workers up. And you also have companies trimming payroll for the coming Trump recession. Neither have anything to do with AI.
  • 1 Stimmen
    8 Beiträge
    15 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.