Skip to content

Operation Narnia: Iran’s nuclear scientists reportedly killed simultaneously using special weapon

Technology
336 159 0
  • 306 Stimmen
    49 Beiträge
    4 Aufrufe
    M
    If I saw that shit in a game I'd immediately assume they're being satirical or cringe on purpose.
  • 940 Stimmen
    196 Beiträge
    3 Aufrufe
    M
    In the end I popped up the terminal and used some pot command with some flag I can't remember to skip the login step on setup. I reckon there is good chance you aren't using windows 11 home though right?
  • 288 Stimmen
    46 Beiträge
    5 Aufrufe
    E
    NGL, it would be great if they could make it work and go fuck off into international waters. Unrelated, but did you know that if you put big enough holes in a ship it'll sink?
  • Power-Hungry Data Centers Are Warming Homes in Nordic Countries

    Technology technology
    3
    1
    12 Stimmen
    3 Beiträge
    3 Aufrufe
    T
    This is also a thing in Denmark. It's required by law to even build a data center.
  • 377 Stimmen
    58 Beiträge
    5 Aufrufe
    avidamoeba@lemmy.caA
    Does anyone know if there's additional sandboxing of local ports happening for apps running in Private Space? E: Checked myself. Can access servers in Private Space from non-Private Space browsers and vice versa. So Facebook installed in Private Space is no bueno. Even if the time to transfer data is limited since Private Space is running for short periods of time, it's likely enough to pass a token while browsing some sites.
  • 1 Stimmen
    8 Beiträge
    7 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • Windows Is Adding AI Agents That Can Change Your Settings

    Technology technology
    26
    1
    103 Stimmen
    26 Beiträge
    9 Aufrufe
    T
    Edit: no, wtf am i doing The thread was about inept the coders were. Here is your answer: They were so fucking inept they broke a fundamental function and it made it to production. Then they did it deliberately. That's how inept they are. End of.
  • 0 Stimmen
    7 Beiträge
    6 Aufrufe
    V
    Just downloaded it, thanks for the info!