Skip to content

Operation Narnia: Iran’s nuclear scientists reportedly killed simultaneously using special weapon

Technology
396 178 16.3k
  • hype is the product

    Technology technology
    1
    6 Stimmen
    1 Beiträge
    4 Aufrufe
    Niemand hat geantwortet
  • One Law to Rule Them All: The Iron Law of Software Performance

    Technology technology
    1
    1
    32 Stimmen
    1 Beiträge
    21 Aufrufe
    Niemand hat geantwortet
  • 117 Stimmen
    4 Beiträge
    59 Aufrufe
    V
    encourage innovation in the banking and financial system What "innovation" do we need in the banking system?
  • 390 Stimmen
    65 Beiträge
    1k Aufrufe
    Z
    Yes and no. Yes people are this stupid. But also bot networks. But also alt accounts. And many of those stupid people let the algorithm to pick them their political views, which is manipulated by both the bot activity and the platform holders.
  • Matrix is cooked

    Technology technology
    29
    1
    153 Stimmen
    29 Beiträge
    372 Aufrufe
    jadedblueeyes@programming.devJ
    The Matrix Foundation and Element/New Vector are different orgs, and it's Element with the government contracts
  • An earnest question about the AI/LLM hate

    Technology technology
    57
    73 Stimmen
    57 Beiträge
    467 Aufrufe
    ineedmana@lemmy.worldI
    It might be interesting to cross-post this question to !fuck_ai@lemmy.world but brace for impact
  • 1 Stimmen
    8 Beiträge
    79 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • 0 Stimmen
    2 Beiträge
    34 Aufrufe
    A
    I bet that information was already available to business owners. In other words, they totally knew it was you complaining about the toilet paper they used for example.