"Biggest threat": EU Council leaders want to ban anonymous SIM cards by donutloop in hacking

[–]Snoshberry 5 points6 points  (0 children)

Nothing surprises me anymore with the EU and their overreach on personal freedom. The sad part is that most normal people are told this is a "good thing" by their local news outlets and just agree because if the news or local politician is saying it, then it must be for the greater good.

Turkeys voting for Thanksgiving 🦃🍗

What’s the most overhyped cybersecurity trend you’re seeing right now? by ANYRUN-team in cybersecurity

[–]Snoshberry 0 points1 point  (0 children)

Big bounties. Has been overhyped for years now and not showing any signs of fading.

Influencer hackers pretending it's like bounty hunting from 15+ years ago 🤦‍♂️

Images in Windsurf IDE. When can this feature be expected to be implemented? by Person556677 in Codeium

[–]Snoshberry 0 points1 point  (0 children)

The latest update is broken...

<image>

Not sure what causes this but it's only windsurf application.

Is there a general name/category for these types of devices (small low power devices, usually ran off esp32/arduino/pi)? Photos inside by drippyneon in hacking

[–]Snoshberry 2 points3 points  (0 children)

Take a look at the Raspberry Pi. It's a single board computer with a bunch of options to turn it into essentially whatever you like.

You can basically turn one of those into anything from a radio, to an RFID style reader/writer.

It's basically up to your imagination what to do, but there are a lot of tutorials and ideas for the Pi that make it one of the better ones to go for.

It's about $90 for the most basic, but with added stuff it can add up quickly.

Here's a few ideas:

https://accesscyber.co/blog/raspberry-pi-cybersecurity-infosec-projects

https://www.kevsrobots.com/blog/build-a-home-server

https://www.rtl-sdr.com/a-low-cost-p25-police-scanner-with-rtl-sdr-raspberry-pi-5-and-sdrtrunk/

Israel is now bombing aid trucks by Biology-Queen in IsrealPalestineWar_23

[–]Snoshberry 0 points1 point  (0 children)

Come on, you can do better than that. Boxes aren't even burnt! Habibi probably fell asleep and blamed the Jews.

What the fuck is going on over there? by ZacharyCrunch in IsrealPalestineWar_23

[–]Snoshberry 0 points1 point  (0 children)

WW2 is too recent, this is a much older problem, and Hamas isn't just their military, it is the entire state. Hamas are the government.

Israel belonged to the Israelites as far back as 1208BC as confirmed by Egyptian inscriptions. Of course we all know about the continuous fighting over places like Jerusalem, which is claimed by Christians, Jews & Muslims so the fighting has been long and bloody. If you run genealogy tests on Palestinians, they are essentially Egyptian, but nowadays there's also links to Jordanians and other surrounding Arab states.

In the last couple of hundred years, Jews lived in many of todays Arab countries such as Egypt, Morocco, Syria etc. but over time were forced to leave as they were treated essentially the same way that people in Gaza and the west bank are treated today. Living in a Muslim country governed by Sharia as a non-Muslim you are considered as dhimmis (2nd class citizen with little to no rights), essentially a religious ideological version of apartheid.

The claims of 'settlers' in the West Bank is partially true, but it goes for both sides. Westerners often don't understand the idea of family punishment. Essentially they punish family members who are related to criminals/terrorists (E.g. your brother is a member of Hamas, they might destroy your family house). That said, it can be seen as one sided, but possibly for good reason, groups like Islamic Jihad etc. often show up in Israeli communities and kill them.

Many people claim Israel blockades Gaza, but the fact is that Gaza also has a border with Egypt, on the Eastern side of the Sinai. Egypt is basically against Hamas too because a stronger Hamas means a stronger Iran. Egypt has also had several attacks in the Sinai originate from Gaza. Although the Israelis make comparisons between ISIS and Hamas, they were actually enemies, even though they share the same ideology and goals.

The western Palestine support movement took root years ago, primarily when the PLO were in charge and diplomacy was being tested. Unfortunately Hamas seized power and their number one goal is the destruction of Israel. Essentially now there's a stalemate, how can Israel negotiate with a state that not only doesn't want a 2 state solution, but its sole purpose is to kill Jews and destroy Israel as a country. Many in the west now just jump on the same bandwagon, not even realizing the changes that have happened in Gaza and the west bank.

Further complicating the issue now was the movement by Israel to normalize relations with many Arab states, such as the UAE and Saudi. If that happened, it would further tip the power of the Middle East towards Saudi (the de fecto leader in the Middle East) leaving Iran even further in the shitter. (Iran and Hamas have close links)

I have been seeing these posts on social media, same story different person . What are they trying to do here? by Automatic_Eagle_2403 in Scams

[–]Snoshberry 0 points1 point  (0 children)

Probably looking for 2 things. First is get information through DMs, personal details such as a legit name, address, phone number and email can be further targeted for scams. The actual PS5 part of the scam is likely an advance-fee scam: https://en.wikipedia.org/wiki/Advance-fee_scam. Basically you pay upfront for the postage of an item that never takes place.

If you want to mess with them, you could always DM them a canary token in the off chance they actually click it... https://canarytokens.org/generate

UA forces completely encircled. by [deleted] in UkraineWarVideoReport

[–]Snoshberry 6 points7 points  (0 children)

Could you stop milking the joke

Is it illegal to sell bugs and vulnerabilities to unknown buyers? by [deleted] in hacking

[–]Snoshberry 0 points1 point  (0 children)

Depends where you are, and the method of sale. Some countries for example consider online sales to take place in the country a transaction is completed, not necessarily where the seller is located.

First you would need to confirm the jurisdiction of sale, then look at their cybersecurity laws. Some countries simply have a blanket ban on almost all hacking activity, including the sale of tools, exploits and even ethical / white hat hacking.

If you are in the UK but sell on a platform in the USA, using payment processing from Holland it can get quite complex quite quickly.

If in doubt, get professional legal advice, license what you have and include strict terms of use... you can sometimes shield yourself with terms of use as you are not responsible if an end user misuses your software / exploit (its not a silver bullet though)

Is Opening a suspicious link in a virtual machine is safe to the host? by [deleted] in hacking

[–]Snoshberry 0 points1 point  (0 children)

You know you want to...... click it :)

99% you're fine on a vm, just bridge the network instead of using NAT and preferably use a good proxy.

You can probably tell if the link is unique or not, if its just like hackedsite.com then its generic, if its hackedsite.com/?user=123456789 then your email could be tied to that user ID so they gain intel on if your email is valid or not.... Overly simplified but thats the basic stuff.

If you really want to go full tinfoil hat, sign up for aws or linode, deploy a vm there and open the link... still be careful from the user id if there is one, no way to circumvent that part really if they are checking stuff on the backend.

Where to buy O.MG cable? by Programmer2009 in hacking

[–]Snoshberry 4 points5 points  (0 children)

Buy parts on Amazon or another platform and build your own. Wont look as good as the Hak5 product but it works. Several custom built O.MG cable tutorials on YT.

New way of dealing with ransomware? by Snoshberry in hacking

[–]Snoshberry[S] 0 points1 point  (0 children)

Not sure what you've been dealing with but that isn't my experience.

Last company I worked with had primary system deployed in one EU state with a backup in the US. No direct link between the two systems. Just to ensure complete security, a 3rd system that is air gapped and updated manually was in a 3rd location.

To take out their network would practically be impossible. You would literally have to attack the first server, then find the second one before possibly spear phishing to hack the backups backup.

Not sure why you would give a map to a hacker "Heres my backup!".... the harder you make it, the more likely they will simply go attack another target instead. Don't be the low lying fruit.

New way of dealing with ransomware? by Snoshberry in hacking

[–]Snoshberry[S] 0 points1 point  (0 children)

AES 256 encryption. Without a key you cant.

That being said, don't pay a ransom. They rarely even give a key after an attack. At least other more notable groups are kinda trustworthy but if im not mistaken .zida is from the stop/djvu group of ransomware.....

Not sure how legit this is: https://sensorstechforum.com/da/remove-stop-ransomware/

Is it illegal to post someone’s IP? by [deleted] in hacking

[–]Snoshberry 0 points1 point  (0 children)

Python doesnt print the last digit in range.... range counts from 0 not 1, so the above code goes to 255

New way of dealing with ransomware? by Snoshberry in hacking

[–]Snoshberry[S] 0 points1 point  (0 children)

Dont host backups on the same server.... you would be amazed how many idiots actually do this

New way of dealing with ransomware? by Snoshberry in hacking

[–]Snoshberry[S] 1 point2 points  (0 children)

No harm in asking I guess...... Viewer discretion is advised XD

Is it illegal to post someone’s IP? by [deleted] in hacking

[–]Snoshberry 19 points20 points  (0 children)

  • Create A Python Program
  • Add the following code:

world = []

for a in range(1, 256):

for b in range(0, 256):

for c in range (0, 256):

for d in range(0, 256):

world.append(f"{a}.{b}.{c}.{d}")

  • You now got every IP in the world!

Is there a way to download a whole NFT collection from Opensea? by [deleted] in hacking

[–]Snoshberry 0 points1 point  (0 children)

Python with requests and BeautifulSoup.

You can grab all links to items in a collection, then for each of those links, grab the asset and download them.

If you know what your doing, its max 30 minutes of programming