Skip to content

Trump social media site brought down by Iran hackers

Technology
174 112 739
  • Palantir partners to develop AI software for nuclear construction

    Technology technology
    1
    0 Stimmen
    1 Beiträge
    13 Aufrufe
    Niemand hat geantwortet
  • 15 Stimmen
    1 Beiträge
    12 Aufrufe
    Niemand hat geantwortet
  • the illusion of human thinking

    Technology technology
    2
    0 Stimmen
    2 Beiträge
    22 Aufrufe
    H
    Can we get more than just a picture of an Abstract?
  • The world could experience a year above 2°C of warming by 2029

    Technology technology
    17
    1
    200 Stimmen
    17 Beiträge
    87 Aufrufe
    sattarip@lemmy.blahaj.zoneS
    Thank you for the clarification.
  • 0 Stimmen
    6 Beiträge
    38 Aufrufe
    L
    Divide and conquer. Non state-actors and special interest have a far easier time attacking a hundred small entities than one big one. Because people have much less bandwidth to track all this shit than it is to spread it around. See ALEC and the strategy behind state rights. In the end this is about economic power. The only way to curb it is through a democratic government. Lemmy servers too can be bought and sold and the communities captured that grew on them.
  • 1 Stimmen
    8 Beiträge
    40 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • 342 Stimmen
    43 Beiträge
    197 Aufrufe
    G
    highly recommend using containerized torrents through a VPN. I have transmission and openvpn containers. when the network goes down transmission can't connect since it's networked through the ovpn container. once the vpn is restored, everything restarts and resumes where it left off. ever since I've had this setup running, I haven't had a nastygram sent to me.
  • San Francisco crypto founder faked his own death

    Technology technology
    10
    1
    98 Stimmen
    10 Beiträge
    54 Aufrufe
    S
    My head canon is that Satoshi Nakamoto... ... is Hideo Kojima. Anyway, Satoshi is the pseudonym used on the original... white paper, design doc, whatever it was, for Bitcoin. There's no doubt about that, I was there back before even Mt. Gox became a bitcoin exchange, on the forums discussing it. I thought it was a neat idea, at the time... and then I realized 95% of the discussions on that forum were about 'the ethics of fully informed ponzi schemes' and such, very little devoted to actual technical development... realized this was probably a bad omen.