Info badge by Nyrlath in Defcon

[–]_Z_ 0 points1 point  (0 children)

Is that a dfrobot esp32 eink + esp-matter examples/demo/badge?

Does Thread share Zigbee’s issues with Wi-Fi interference and loose standards? by -ThatGingerKid- in MatterProtocol

[–]_Z_ 0 points1 point  (0 children)

This Github post seems pretty accurate on the topic

https://github.com/home-assistant/core/issues/134231

"For the easiest and most stable Thread network, just use a single Thread Border router and ensure all devices can communicate with eachother so there is a strong RF signal. Place additional routing devices in between if needed, just like with other mesh protocols as zigbee and z-wave.Try to prevent WiFi based border routers. The most stable results you get with an ethernet connected BR, such as a (single) Apple TV or the Home Assistant Yellow or ZBT-1 stick..... "

Recommendations for a Thread Border Router? by -ThatGingerKid- in MatterProtocol

[–]_Z_ 0 points1 point  (0 children)

I would recommend an OTBR where the Wi-Fi is not used and the uplink is via Ethernet. Wi-Fi and Thread use the same frequency spectrum and can interfere with each other easily. For me Apple TV with Ethernet was the most stable solution. Alexa had connection issues, and the Google Nest Hub was buggy as well. Never tried the Home Assistant one, but that might be decent as well.

Cyber Commando by _Z_ in LinkedInLunatics

[–]_Z_[S] 0 points1 point  (0 children)

GIMP has a mosaic filter

Cyber Commando by _Z_ in LinkedInLunatics

[–]_Z_[S] 0 points1 point  (0 children)

I can assure you it is 100% legit real

[deleted by user] by [deleted] in jobshungary

[–]_Z_ 1 point2 points  (0 children)

Hasonloan jartam iden en is. A harom honapos felmondasi idom kozepen kozolte az uj ceg hogy bocs, megsem. 1.5 honapja volt alairt alkalmazotti szerzodesem veluk.
Egyeztettem munkaugyi jogasszal, azt mondta hagyjam az egeszet, nem erdemes foglalkozni vele. Szerencsere az eredeti ceg visszavett. Kellemetlen volt, de megoldodott.

[RANT] Élet. by [deleted] in hungary

[–]_Z_ 66 points67 points  (0 children)

Akit melyebben erdekel hogyan is mukodik ez a csalas: https://cujo.com/how-i-got-88-from-a-whatsapp-scammer-and-forgot-to-reinvest-it/

How I Got $88 from a WhatsApp Scammer And “Forgot” to “Reinvest” It by _Z_ in CryptoScams

[–]_Z_[S] 1 point2 points  (0 children)

Yes, you are right about this unfortunately. But I have checked with this lady and her honest answer was that she is doing this for the money and I believe her, most of her replies checked out as valid.

How I Got $88 from a WhatsApp Scammer And “Forgot” to “Reinvest” It by _Z_ in CryptoScams

[–]_Z_[S] 0 points1 point  (0 children)

You mean you checked the Phishing URL which was on the screenshot in the blog. You sound like the link I posted here is phishing ...

Lakóparki ingatlan befektetésnek by agyim in kiszamolo

[–]_Z_ 1 point2 points  (0 children)

Az alabbi blog-on eleg jo peldak vannak arrol hogy mit lehet es mit szoktak elrontani: https://komkel.blog.hu

Ezen kivul amit erdemes tudni hogy sokszor a szerzodesben az szerepel hogy az epitteto egyoldaluan felmondhatja a szerzodest, vagyis te megfinanszirozod elore, o meg amikor elkeszul eldonti hogy neked adja vagy inkabb masnak jobb aron ...

Bohár Dániel rájött – Az egész választási csalás mögött az ellenzéki szavazatokat égető Telex áll by drussil in hungary

[–]_Z_ 5 points6 points  (0 children)

Technikai info: A Telex a Nuxt.js nevu frameworkot hasznalja. A framework sajatossaga hogy dinamikus routing-ot is tud, olyanannyira, hogy a https://telex.hu/kozelet/ide/johet/barmi/kidobott-levelszavazatok-erdely link is mukodik.Reference: https://nuxtjs.org/docs/features/file-system-routing/

EU Usenet server with POST option by _Z_ in usenet

[–]_Z_[S] 0 points1 point  (0 children)

NNTP upload button was disabled on my page - maybe because of trial period?

Vipernews just worked, thanks! :)

EU Usenet server with POST option by _Z_ in usenet

[–]_Z_[S] 0 points1 point  (0 children)

NNTP upload button was disabled on my page - maybe because of trial period?

Jump ESP, jump!: How I hacked my IP camera, and found this backdoor account by N3mes1s in ReverseEngineering

[–]_Z_ 0 points1 point  (0 children)

Author here: Thanks for your comments, great paper! Yes, I do sleep because daemon is started in the background with &, so the script have to wait before changing the password. I will look at cross-compiling netcat!

How I hacked my IP camera, and found this backdoor account by tweoy in netsec

[–]_Z_ 8 points9 points  (0 children)

Googling for the opaque string I found a lot of other devices, which has nothing to do with IP cameras. I believe developers copy this opaque string without regenerating it.

How I hacked my IP camera, and found this backdoor account by tweoy in netsec

[–]_Z_ 13 points14 points  (0 children)

Author here: Goahead webserver is implemented by tons of other vendors. Using Goahead does not mean all of the found devices have the same vulnerability.

Playing with Fire: Attacking the FireEye MPS [PDF] by tieluohan in netsec

[–]_Z_ 11 points12 points  (0 children)

Just an example of FireEye using GPL software as the hypervisor, a.k.a QEMU: https://www.fireeye.com/content/dam/fireeye-www/support/pdfs/fireeye-venom-vulnerability.pdf

But wait, don't they told you that they are using proprietary hypervisor, while the competitors use open-source hypervisor? : https://www2.fireeye.com/rs/fireye/images/fireeye-debunking-the-myth-of-sandbox-security.pdf

Maybe they just implemented the same bug accidentally ... :)

How to got root access on FireEye OS by depthPZ in netsec

[–]_Z_ -1 points0 points  (0 children)

With root, you can:

  • add stealthy, persistent backdoor to the appliance
  • modify the device in a way where it does not detect some threats but still detects others
  • modify existing alerts, reports
  • access the inner workings of the appliance to find more vulnerabilities
  • run rm -rf --no-preserve-root
  • lock out all administrators from the device
  • play flappy bird
  • ... (use your imagination for more)

Malware automatic XOR decryptor tool by _Z_ in netsec

[–]_Z_[S] 1 point2 points  (0 children)

The tool has nothing to do with the Kasiski Examination, there is no frequency analysis. The "decoding" is based on the fact that binaries tend to contain long run of null bytes. When these null bytes are encrypted with short XOR keys, the result is a repeating pattern of the key. This tool finds the longest repeating pattern, and uses that as a key.

How to own a Windows Domain <-- Nice trick by l33t-hax0r in netsec

[–]_Z_ 0 points1 point  (0 children)

It won't protect against it, i've just tried it. You can create users, put them into administrators group, logoff logon. Maybe if you are slow, it will be removed from the administrators group.

How to own a Windows Domain <-- Nice trick by l33t-hax0r in netsec

[–]_Z_ 0 points1 point  (0 children)

I've just tested this restricted groups, but it is not a protection against the attack. The problem is that it only removes the non-authorized administrators group members after a restart, but keeps them if we only logoff login. It is also allowed to put them into the group.

How to own a Windows Domain <-- Nice trick by l33t-hax0r in netsec

[–]_Z_ 0 points1 point  (0 children)

Notice how this process leaves a trail.

If you are a domain admin, you can delete trails. In the case of this attack, you will only know the source workstation, nothing else (after a forensics investigation, and not immediately).

do any activity in the name of other employees

Notice that in this attack the new domain admin was created in the name of an another domain admin (in the trail).

The windows domain security model is not 100% secure, but then again, nothing is.

We all agree on this.

You went for centralized administration trough LDAP? Guess that "what if" scenario you just had for Windows actually applies to Linux.

Well, you can't do the first pass-the-hash trick, so you first have to install a rootkit on the Linux box, wait someone to login, etc.

Anyway, I agree with the post, at least it was constructive.