Skip to content

ICEBlock climbs to the top of the App Store charts after officials slam it

Technology
82 51 0
  • Men are opening up about mental health to AI instead of humans

    Technology technology
    339
    523 Stimmen
    339 Beiträge
    22 Aufrufe
    spankmonkey@lemmy.worldS
    I'm aware of what you are saying and disagree. You apparently take disagreement personally as most of your comments in that post to various other users are hostile too. Please be aware of how you are approaching discourse.
  • Role of Email Deliverability Consulting in ROI

    Technology technology
    1
    2
    0 Stimmen
    1 Beiträge
    6 Aufrufe
    Niemand hat geantwortet
  • Best MS Office 365 Services in Saudi Arabia for Businesses

    Technology technology
    1
    2
    0 Stimmen
    1 Beiträge
    8 Aufrufe
    Niemand hat geantwortet
  • 469 Stimmen
    28 Beiträge
    14 Aufrufe
    C
    Corrupted politicians and greedy people don't want you know about this one neat truck to fix climate crisis.... Oh, too late.
  • Super Human In Transit - Living

    Technology technology
    1
    2
    0 Stimmen
    1 Beiträge
    9 Aufrufe
    Niemand hat geantwortet
  • Sunsetting the Ghostery Private Browser

    Technology technology
    8
    1
    33 Stimmen
    8 Beiträge
    13 Aufrufe
    P
    Sunsetting Dawn? Of course
  • Stack overflow is almost dead

    Technology technology
    5
    0 Stimmen
    5 Beiträge
    15 Aufrufe
    ineedmana@lemmy.worldI
    students When I was a student I despised the idea of typeless var in C#. Then a few years later at my day job I fully embraced C++ auto. I understand the frustration but unfortunately being wrong is part of learning
  • 1 Stimmen
    8 Beiträge
    15 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.