Skip to content

Operation Narnia: Iran’s nuclear scientists reportedly killed simultaneously using special weapon

Technology
364 173 0
  • Strategies to Enhance the Efficiency of Livestock Conveyor Systems

    Technology technology
    1
    0 Stimmen
    1 Beiträge
    1 Aufrufe
    Niemand hat geantwortet
  • 141 Stimmen
    22 Beiträge
    7 Aufrufe
    P
    That would be 1 in 4 users and that's just not accurate at all. What you mean to say is 25% of Windows users still use windows 7. Its still an alarming statistic, and no wonder bruteforce cyberattacks are still so effective today considering it hasn't received security updates in like 10 years. I sincerely hope those people aren't connecting their devices to the internet like, at all. I'm fairly sure at this point even using a Debian based distro is better than sticking to windows 7.
  • 0 Stimmen
    1 Beiträge
    2 Aufrufe
    Niemand hat geantwortet
  • 461 Stimmen
    89 Beiträge
    12 Aufrufe
    M
    It dissolves into salt water. Except it doesn't dissolve, this is not the term they should be using, you can't just dry out the water and get the plastic back. It breaks down into other things. I'm pretty sure an ocean full of dissolved plastic would be a way worse ecological disaster than the current microplastic problem... I've seen like 3-4 articles about this now and they all use the term dissolve and it's pissing me off.
  • 50 Stimmen
    27 Beiträge
    11 Aufrufe
    S
    Brother I live in western Europe and of the 6 supermarkets in my smallish city, 4 offer the handscanner. It's incredibly common here, and very convenient.
  • 21 Stimmen
    6 Beiträge
    5 Aufrufe
    sentient_loom@sh.itjust.worksS
    I want to read his "Meaning of the City" because I just like City theory, but I keep postponing in case it's just Christian morality lessons. The anarchist Christian angle makes this sound more interesting.
  • 75 Stimmen
    8 Beiträge
    4 Aufrufe
    L
    Police: Arrest you for having an open beer in public Judge: sentences you to prison The PIC:
  • 1 Stimmen
    8 Beiträge
    7 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.