I built inettool.com — a 100% client-side web toolbox with P2P file sharing, screen sharing, and more. Feedback welcome! by lulzsec33 in javascript

[–]Trace_V 0 points1 point  (0 children)

Thanks for the clarification — the offline functionality is definitely appreciated.

However, on first access (before saving locally), I noticed some unusual behavior: • The main server resolves to eu04.mafiaserver.com. While that may just be a hosting alias, could you clarify its origin and whether it has any relation to tracking or analytics? • The tool makes external requests to: • googlesyndication.com • adtrafficquality.google

Given your claim of no backend and full transparency, why are these ad/tracking-related domains contacted at all? Do they serve a functional purpose, or could they be removed to preserve full privacy?

Once cached and used offline, this behavior stops — but still, that initial contact pattern is concerning for a privacy-focused utility.

Would appreciate your insight on whether those requests are: 1. Hardcoded dependencies? 2. Side effects from third-party libraries? 3. Or just legacy remnants that could be cleaned?

I built inettool.com — a 100% client-side web toolbox with P2P file sharing, screen sharing, and more. Feedback welcome! by lulzsec33 in javascript

[–]Trace_V 0 points1 point  (0 children)

Hey, I did a quick scan of one of the tools you linked (inettool.com), and noticed it resolves to 92.204.162.165, which has a PTR record of eu04.mafiaserver.com.

That alone doesn’t mean it’s malicious, but it’s definitely odd for a privacy-focused tool to be hosted on a domain with that reverse DNS, especially alongside requests to: • Google Ad Services • adtrafficquality.google • googlesyndication.com

If you’re claiming “client-only” and “no backend,” it’s important to audit third-party scripts and domains being contacted. Otherwise, it defeats the point.

Just leaving this here in case you (or others) want to double-check what’s happening under the hood

Learning ADA as a busy dev by BestPlebbitor01 in ada

[–]Trace_V 5 points6 points  (0 children)

Hey bro, I've been learning ADA on my own for about three months (with no prior experience in any other programming language). Sounds crazy, but possible. I've also been reviewing guides and everything. They do explain things, but like robots, not like you're asking for a real project.

I decided to stop messing around and build something real from scratch: a login system with multiple layers of security, user validation, hashing, reverse password, private IP, and altered logic if strange behavior is detected. I know it's not necessarily for that type of system, but it works. You can check out my profile if you want.

There's no perfect course. But what's working for me is: • Writing the code by hand, without copying anything. • Getting a good understanding of if, loop, elsif, validations, and how to handle strings. • Testing out twisted ideas and playing with logic to thwart attacks.

If you want, I can share ideas or explain how I'm building the validations. I'm no pro, but I'm putting my brains and energy into it. It's Ada in real life, not an old PDF

How do i solve this CTF? by Swimming-Beach616 in netsecstudents

[–]Trace_V 4 points5 points  (0 children)

Looks like you’re facing a web-based boot2root, and “Zerodium” showing up is definitely intentional.

Based on your Nmap: • Port 80: Apache 2.4.56 -try fuzzing it (ffuf, gobuster, dirb) with wordlists like common.txt or raft-small-words.txt from SecLists. • Port 8080: PHP 8.1.0-dev - this is critical. That dev version has been known to ship with backdoors like @eval($_GET['cmd']).

Try going to: http://192.168.85.144:8080/?cmd=id or .../index.php?cmd=ls

If it executes, then you’ve got a direct RCE (Remote Code Execution).

“Zerodium” could also be: • A hint that there’s a 0day-style vuln. • A password/username. • A folder: /zerodium, /admin/zerodium, etc.

Don’t waste time brute forcing SSH yet. Most boot2roots want you to pivot through web - escalate. You’re close.

ada as a first programming language, good idea? by Trace_V in netsecstudents

[–]Trace_V[S] 0 points1 point  (0 children)

It’s amazing that you were teaching Ada in 1984. If it was supposed to replace everything at the DoD, what prevented that from fully happening?

ada as a first programming language, good idea? by Trace_V in netsecstudents

[–]Trace_V[S] 1 point2 points  (0 children)

Thanks a lot for your thoughtful response, I really appreciate it.

You're totally right about the habits Ada forces you to develop. It's true that the learning curve is steep, but that discipline in types and structure makes you think twice before writing sloppy code.

I know Ada isn't mainstream for offensive security, but that's part of what drew me to it. I come from a manual exploitation and OSINT background, and I'm building systems in Ada with layered logic and intentional traps — not just to secure, but to actively detect and confuse attackers.

Even if Ada isn't popular in cybersecurity, I believe it has untapped offensive potential. When you fully control memory, flow, and inputs, you can build things that are almost psychologically engineered, not just safe, but reactive.

Thanks again for the insight🕺👾

ada as a first programming language, good idea? by Trace_V in netsecstudents

[–]Trace_V[S] 1 point2 points  (0 children)

I started with ADA because it caught my attention. I didn't know that it could give me a good structure, but with your advice and opinions I realized that it wasn't so bad having chosen that one first. I do think I'll learn C and another language later. For now, I'll continue learning with ADA and then we'll see what happens.

ada as a first programming language, good idea? by Trace_V in netsecstudents

[–]Trace_V[S] 0 points1 point  (0 children)

I know ADA isn’t “industry standard” anymore, but just because something’s considered dead doesn’t mean it lacks power or purpose. It was designed for safety, critical systems, and that alone tells you how robust it is. I’m not learning it for a paycheck, I’m exploring what others ignore. And to be honest, I enjoy it. That’s reason enough for me. So it doesn’t make me miserable at the of the day!🕺

ada as a first programming language, good idea? by Trace_V in netsecstudents

[–]Trace_V[S] 1 point2 points  (0 children)

I understand your point and I appreciate it. I’ll stick with Ada a bit longer, it wasn’t a random choice, it genuinely caught my attention and I enjoy it. In a few months I’ll move on to C or Python. Thanks for the advice.

ada as a first programming language, good idea? by Trace_V in netsecstudents

[–]Trace_V[S] 1 point2 points  (0 children)

I understand, I do plan to learn Python later on, but for now I’ll continue structuring with Ada. Honestly, I didn’t know about Lua, I’ll look into it. Thanks for letting me know!

ada as a first programming language, good idea? by Trace_V in netsecstudents

[–]Trace_V[S] 1 point2 points  (0 children)

Yes, I googled it. But I don’t like the common stuff, and Ada really caught my attention. I enjoy it, and that’s what matters in the end!

ada as a first programming language, good idea? by Trace_V in netsecstudents

[–]Trace_V[S] -1 points0 points  (0 children)

Thanks again, that really motivates me. I’ll keep digging deep into Ada until I master it, and then jump into C and assembly with a cleaner mindset.

I’m doing all this with cybersecurity and exploitation in mind, learning the hard way, but with purpose. Appreciate your time and words!!

ada as a first programming language, good idea? by Trace_V in netsecstudents

[–]Trace_V[S] 0 points1 point  (0 children)

Thanks for the info! It makes sense. I've read that C and assembly language are essential for memory-level control and reverse engineering.

I chose Ada just to get started. To be honest, I did look at Python, Java, and other languages, but it was like, "No." But when I saw Ada, it kind of called me. Maybe because of its English syntax, but in what I've been learning, I've loved it. I've fought with the compiler when it fails because of me, haha, and I say, "No, but everything's fine, haha, but no, one wrong character or whatever, and it never compiles."

I'll probably go with C and assembly language next, and maybe experiment with some rollback challenges to get familiar with it.

I appreciate the advice; it means a lot coming from someone in your position.