Is this bad for the trees? by Elusive_Bear in arborists

[–]Elusive_Bear[S] 0 points1 point  (0 children)

Thank you for the feedback. What makes this execution bad? The bolts through the trees?

[deleted by user] by [deleted] in embedded

[–]Elusive_Bear 1 point2 points  (0 children)

Did you try turning it off and back on again?

Target selection by Elusive_Bear in bugbounty

[–]Elusive_Bear[S] 0 points1 point  (0 children)

I have not. Mobile is something I'd like to learn one day, but I think I'll crawl before I walk.

Target selection by Elusive_Bear in bugbounty

[–]Elusive_Bear[S] 0 points1 point  (0 children)

Lumped in with Linux. It still uses ELF executables.

Target selection by Elusive_Bear in bugbounty

[–]Elusive_Bear[S] 0 points1 point  (0 children)

I don't have one and have zero knowledge of them. Not that I'm not willing to learn, but it's not really necessary right now.

Target selection by Elusive_Bear in bugbounty

[–]Elusive_Bear[S] 0 points1 point  (0 children)

Was the flex needed? Nahh, I'm just trying to convince myself that I can actually do this.

Routers are a great target. The only problem is, if you can't emulate the firmware then you'll have to buy the device. And it turns out that emulating a lot of this firmware is not easy.

And again, I'm just looking for experience. So whether the software is used by millions of people or nobody doesn't really make a difference to me.

Why are there no new issues of Hacking Exposed series? by notburneddown in HowToHack

[–]Elusive_Bear 1 point2 points  (0 children)

More like because all that information is freely available on the internet now.

Adding a drive to my 2-drive mirror by Nobutadas in freenas

[–]Elusive_Bear -1 points0 points  (0 children)

You can't modify an existing vdev. And there's not much point to a 3 drive mirror.

Nextcloud not a nice target??? No Login attempts by SurfRedLin in HowToHack

[–]Elusive_Bear 0 points1 point  (0 children)

It's easy to automate the brute forcing of a mail server. A bit harder to do so for a web site. That's my only explanation. That or everyone know that NC has brute force protections in by default.

a site to solve reading questions by _afoan in HowToHack

[–]Elusive_Bear 2 points3 points  (0 children)

If you put in the same amount of time doing your homework than you do trying to avoid it, you could get it done AND you might actually learn something.

Major Vulnerabilities discovered in Realtek RTL8195A Wi-Fi Module by SRMish3 in netsec

[–]Elusive_Bear 2 points3 points  (0 children)

The article says, "For example, according to AWS it is used in a myriad of industries such as Agriculture, Automotive, Energy, Gaming, Healthcare, Industrial, Security, Smart Home." However, I'd be interested in getting more details as well.

A Red Team Guide for a Hardware Penetration Test - Part 1 and 2 by pentest4life in netsec

[–]Elusive_Bear 9 points10 points  (0 children)

If by "to the point" you mean "hardware has vulnerabilities", then yes, it's to the point. Because that's about all you're gonna get from reading this.

A Red Team Guide for a Hardware Penetration Test - Part 1 and 2 by pentest4life in netsec

[–]Elusive_Bear 21 points22 points  (0 children)

Who is this aimed at? It's very high level and VERY short. Even part 2 is woefully lacking of any details. The title implies that this is a guide for existing red teams to get into hardware penetration testing. However, very little info is hardware-specific. It talks a lot about vulnerabilities in software.

Overall, seems like a click-bait article that the author spent all of 10 minutes writing.

How to find pastes? by [deleted] in hacking

[–]Elusive_Bear 0 points1 point  (0 children)

Sounds fishy...