Skip to content

Firefox is fine. The people running it are not

Technology
206 106 54
  • Spotify X Mod APK

    Technology technology
    1
    2
    1 Stimmen
    1 Beiträge
    3 Aufrufe
    Niemand hat geantwortet
  • Fiat Punto 2 Hgt II (2) 130 16S ABARTH 3P "le grand travailleur"

    Technology technology
    1
    2
    0 Stimmen
    1 Beiträge
    4 Aufrufe
    Niemand hat geantwortet
  • FairPhone AMA

    Technology technology
    5
    14 Stimmen
    5 Beiträge
    37 Aufrufe
    alcan@lemmy.worldA
    Ask Me Anything
  • Fatphobia Is Fueled by AI-Created Images, Study Finds

    Technology technology
    14
    1
    15 Stimmen
    14 Beiträge
    57 Aufrufe
    K
    I pretty much agree. The only thing I would add is that it's not our place to tell others to lose weight or to point out their weight; people already know they are overweight and that it's unhealthy. We shouldn't be policing other people's bodies. It's also possible to be overweight and have body positivity; being overweight doesn't equate to being unattractive.
  • XMPP vs everything else

    Technology technology
    10
    1
    43 Stimmen
    10 Beiträge
    45 Aufrufe
    M
    Conversely, I have seen this opinion expressed a few times. I can’t judge the accuracy but there seem to be more than a few people sharing it.
  • YouTube might slow down your videos if you block ads

    Technology technology
    226
    1
    650 Stimmen
    226 Beiträge
    678 Aufrufe
    D
    [image: 24aa87b2-162d-4296-aaf7-31d42f30ed63.png]
  • Tech Company Recruiters Sidestep Trump’s Immigration Crackdown

    Technology technology
    1
    1
    1 Stimmen
    1 Beiträge
    12 Aufrufe
    Niemand hat geantwortet
  • 1 Stimmen
    8 Beiträge
    37 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.