Skip to content

ICEBlock climbs to the top of the App Store charts after officials slam it

Technology
63 40 0
  • How not to lose your job to AI

    Technology technology
    16
    1
    9 Stimmen
    16 Beiträge
    12 Aufrufe
    rikudou@lemmings.worldR
    A nice "trick": After 4 or so responses where you can't get anywhere, start a new chat without the wrong context. Of course refine your question with whatever you have found out in the previous chat.
  • 1 Stimmen
    1 Beiträge
    7 Aufrufe
    Niemand hat geantwortet
  • The Trump Mobile T1 Phone looks both bad and impossible

    Technology technology
    42
    1
    139 Stimmen
    42 Beiträge
    32 Aufrufe
    S
    "Components" means in this case the phone and the sticker.
  • Matrix.org is Introducing Premium Accounts

    Technology technology
    1
    1
    0 Stimmen
    1 Beiträge
    8 Aufrufe
    Niemand hat geantwortet
  • You Can Choose Tools That Make You Happy

    Technology technology
    1
    1
    30 Stimmen
    1 Beiträge
    8 Aufrufe
    Niemand hat geantwortet
  • Stack overflow is almost dead

    Technology technology
    5
    0 Stimmen
    5 Beiträge
    15 Aufrufe
    ineedmana@lemmy.worldI
    students When I was a student I despised the idea of typeless var in C#. Then a few years later at my day job I fully embraced C++ auto. I understand the frustration but unfortunately being wrong is part of learning
  • 1 Stimmen
    8 Beiträge
    15 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • 0 Stimmen
    2 Beiträge
    0 Aufrufe
    T
    Wow, that's really concerning! It's crazy how these breaches can lead to such massive losses. If anyone's dealing with crypto fraud, I’ve heard Segev LLP is a solid firm that helps people and companies navigate these situations. Stay safe, everyone!