Skip to content

Honda successfully launched and landed its own reusable rocket

Technology
170 106 1.9k
  • 0 Stimmen
    1 Beiträge
    0 Aufrufe
    Niemand hat geantwortet
  • 61 Stimmen
    9 Beiträge
    56 Aufrufe
    gsus4@mander.xyzG
    At least they're good at imagining all the ways in which you can hurt yourself way beforehand...and making sure you don't do them...or anything else
  • Google Keeps Making Smartphones Worse

    Technology technology
    203
    1
    764 Stimmen
    203 Beiträge
    3k Aufrufe
    S
    Some alternative for you for the keyboard: https://github.com/Helium314/HeliBoard https://app.futo.org/fdroid/repo/ https://keyboard.futo.org/ https://voiceinput.futo.org/ Edit: Check out their other apps too, you might find something you like https://futo.org/
  • Bumble's AI icebreakers are mainly breaking EU law

    Technology technology
    18
    1
    183 Stimmen
    18 Beiträge
    200 Aufrufe
    S
    This is just that zizek quote
  • Album 'D11-04' Out Now

    Technology technology
    1
    1
    1 Stimmen
    1 Beiträge
    16 Aufrufe
    Niemand hat geantwortet
  • 16 Stimmen
    7 Beiträge
    70 Aufrufe
    dabster291@lemmy.zipD
    Why does the title use a korean letter as a divider?
  • XMPP vs everything else

    Technology technology
    10
    1
    43 Stimmen
    10 Beiträge
    97 Aufrufe
    M
    Conversely, I have seen this opinion expressed a few times. I can’t judge the accuracy but there seem to be more than a few people sharing it.
  • 1 Stimmen
    8 Beiträge
    79 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.