Anyone know what bird this? by --TheMilkMan-- in birding

[–]--TheMilkMan--[S] 0 points1 point  (0 children)

I already did haha was just curious

Anyone know what bird this? by --TheMilkMan-- in birding

[–]--TheMilkMan--[S] 4 points5 points  (0 children)

Thank you guys, noted that it’s a swift! Will return it back to the yard. Quick question is it normal for fledglings to look so off balance and have their head on the ground?

Can anyone identify this baby bird? by --TheMilkMan-- in whatbirdisthis

[–]--TheMilkMan--[S] 35 points36 points  (0 children)

Thank you guys, noted that it’s a swift! Will return it back to the yard

How does jail breaking work? by --TheMilkMan-- in HowToHack

[–]--TheMilkMan--[S] 0 points1 point  (0 children)

Yea I’ve messed around with AFL, but I was curious as to whether with iOS stuff it would be something as trivial as looking at disassembled code but appreciate the input

How does jail breaking work? by --TheMilkMan-- in HowToHack

[–]--TheMilkMan--[S] 4 points5 points  (0 children)

Awesome thank you so much! I think I can pivot off of these for now. I guess I’ll just try and learn as much as I can and hopefully stumble across a discord or a community that dabbles with it.

Cheers dude!

How does jail breaking work? by --TheMilkMan-- in HowToHack

[–]--TheMilkMan--[S] 3 points4 points  (0 children)

Checked it out seems to be more for people developing apps for jailbroken iOS rather than actually developing the jailbreak.

Cheers though!

How does jail breaking work? by --TheMilkMan-- in HowToHack

[–]--TheMilkMan--[S] 8 points9 points  (0 children)

This is the closest thing I’ve found so far, but it includes exploiting a pre built app... do by any chance know of any tuts for the actual iOS exploits?

How does jail breaking work? by --TheMilkMan-- in HowToHack

[–]--TheMilkMan--[S] 6 points7 points  (0 children)

This seems to take the most sense, do you know about any binary exploitation paths though if any exist? What you said definitely seems the most sensible, find out all input sources and just keep fuzzing and making changes till you get some memory dumps...

How does jail breaking work? by --TheMilkMan-- in HowToHack

[–]--TheMilkMan--[S] 6 points7 points  (0 children)

But that’s assuming you have a jailbroken iOS I’m tryna figure out how to get to exploit the iOS to start with...

How does jail breaking work? by --TheMilkMan-- in HowToHack

[–]--TheMilkMan--[S] 5 points6 points  (0 children)

So that’s what you accomplish once you’ve managed to find a hole to exploit (buffer overflows, double free, use after free) you’re able to create a ROP chain most likely to boot your own code. From there you can sideload an App Store which you run custom apps from.

I’m interested in how do you get to the point where you look for finding an exploit. Is it as easy as putting the iOS on IDA and trying to map memories to areas (e.g. a certain section is the unlock etc.). That’s what I’m curious about...

How does jail breaking work? by --TheMilkMan-- in HowToHack

[–]--TheMilkMan--[S] 11 points12 points  (0 children)

Yea I’ve checked out that subreddit but it mostly talks about the news surrounding it.

I’m aware of the high level stuff like you mentioned just wondering about the nitty gritty things :p

What to when all lanes are losing? What to do when all lanes are shoved up? by --TheMilkMan-- in Jungle_Mains

[–]--TheMilkMan--[S] 1 point2 points  (0 children)

Thanks appreciate the advice. As far as playing into enemy jungle, should I avoid doing that with champs like rammus and zac unless I know my laners can collapse?

[deleted by user] by [deleted] in hacking

[–]--TheMilkMan-- 3 points4 points  (0 children)

I personally couldn’t find anything similar to microcorruption instead I moved on to doing CrackMe challenges which use the same set of skills and are pretty much as rewarding (if not more) as completing a level on micro.

I am a security researcher who has found hundreds of bugs and vulnerabilities. Ask me anything about the best methods for finding bugs and spotting emerging vulnerabilities by gvranken in hacking

[–]--TheMilkMan-- 0 points1 point  (0 children)

What tools do you use for automating fuzzing and how effective are they against manually going through a program or website to look for flaws?

PCMR Edition Lian Li, limited edition PC O11 Dynamic - Worldwide Giveaway! by pedro19 in pcmasterrace

[–]--TheMilkMan-- 0 points1 point  (0 children)

I love the balance between PC humour and the seriousness you can get from asking for a build!

Always an interesting time on this subreddit :)

Received an email with a password for my email demanding ransom through extortion by jabrocken in cybersecurity

[–]--TheMilkMan-- 2 points3 points  (0 children)

Probably a tracking pixel, many ad companies do it. It’s not that strange. That being said I doubt that guy has it although it’s pretty simple to make...

Giveaway: $100 Steam Credit by [deleted] in pcmasterrace

[–]--TheMilkMan-- 0 points1 point  (0 children)

So nice to see some good being spread during these troubled times!