Skip to content

Operation Narnia: Iran’s nuclear scientists reportedly killed simultaneously using special weapon

Technology
266 133 0
  • Microsoft Tests Removing Its Name From Bing Search Box

    Technology technology
    11
    1
    54 Stimmen
    11 Beiträge
    0 Aufrufe
    alphapuggle@programming.devA
    Worse. Office.com now takes me to m365.cloud.microsoft which as of today now takes me to a fucking Copilot chat window. Ofc no way to disable it because gee why would anyone want to do that?
  • 2k Stimmen
    317 Beiträge
    15 Aufrufe
    M
    I have a perfectly fine moral framework According to what? Not everyone has the same beliefs and negative attitude toward it Not everyone thinks female circumcision is bad either. for some it can even have a positive impact. Lol I don’t believe in absolutist terms. Do you absolutely believe that? While your continued failure to comprehend my initial comment is astonishing Your initial comment is indicative of somebody who hasn't thought seriously about their worldview but feels confident about critiquing others.
  • 1 Stimmen
    1 Beiträge
    4 Aufrufe
    Niemand hat geantwortet
  • X launches E2E encrypted Chat

    Technology technology
    55
    2
    10 Stimmen
    55 Beiträge
    3 Aufrufe
    F
    So you do have evidence? Where is it?
  • 21 Stimmen
    41 Beiträge
    9 Aufrufe
    W
    that's because phone makers were pumping out garbage chargers with bare minimum performance for every single phone, isn't it?
  • The technology to end traffic deaths exists. Why aren’t we using it?

    Technology technology
    36
    43 Stimmen
    36 Beiträge
    9 Aufrufe
    M
    You’re seriously attempting to argue with me about whether or not transportation existed before cars?
  • 1 Stimmen
    8 Beiträge
    7 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • 66 Stimmen
    9 Beiträge
    10 Aufrufe
    F
    HE is amazing. their BGP looking glass tool is also one of my favorite troubleshooting tools for backbone issues. 10/10 ISP