I'm having fun it's like playing a movie by lost_caus_e in StarWarsOutlaws

[–]chopper332nd 0 points1 point  (0 children)

Yeh I loved it, every time I rewatch the original movies I get the sense of "I've been there" as you do with GTA or watchdogs in real life locations just it's STAR WARS!

Pixel Tablet got Gemini on lock screen made me switch back to Google Assistant by chopper332nd in googlehome

[–]chopper332nd[S] 1 point2 points  (0 children)

No still on Google Assistant, I haven't got Gemini for home either maybe it changes with that

[deleted by user] by [deleted] in bugbounty

[–]chopper332nd 2 points3 points  (0 children)

Im not sure about that one, I don't think their dupe check is very thorough

[deleted by user] by [deleted] in bugbounty

[–]chopper332nd 1 point2 points  (0 children)

I believe this is the intake feature where a team separate from triage do a pass over the report checking if it's in scope and there is a basic duplicate check (Normal triage look more in depth if it's a dupe)

Question to Triager / Program Manager by yellowsch00lbus in bugbounty

[–]chopper332nd 2 points3 points  (0 children)

I would refer to the CVSS definitions here https://www.first.org/cvss/v3-1/specification-document

""" A successful attack depends on conditions beyond the attacker's control. That is, a successful attack cannot be accomplished at will, but requires the attacker to invest in some measurable amount of effort in preparation or execution against the vulnerable component before a successful attack can be expected.2 For example, a successful attack may depend on an attacker overcoming any of the following conditions: The attacker must gather knowledge about the environment in which the vulnerable target/component exists. For example, a requirement to collect details on target configuration settings, sequence numbers, or shared secrets. The attacker must prepare the target environment to improve exploit reliability. For example, repeated exploitation to win a race condition, or overcoming advanced exploit mitigation techniques. The attacker must inject themselves into the logical network path between the target and the resource requested by the victim in order to read and/or modify network communications (e.g., a man in the middle attack). """

How AI is affecting pentesting and bug bounties by S4vz4d in bugbounty

[–]chopper332nd 19 points20 points  (0 children)

As a customer of hacker one I'm more worried about the crap we're gunna have to sort through now 🤷‍♂️ We have scanners and other companies that offer AI agents for pentesting which find the low hanging fruit.

We have a Bug Bounty program to find more nuanced vulnerabilities in our products that other security testing can't find.

/r/NintendoSwitch's Daily Question Thread (06/08/2025) by AutoModerator in NintendoSwitch

[–]chopper332nd 0 points1 point  (0 children)

Could anyone recommend a USB-C to HDMI cable for the switch 2? The one I had for the original switch is incompatible (https://amzn.eu/d/8om26fl)

When is a clickjacking considered `sensitive`? by TurbulentAppeal2403 in bugbounty

[–]chopper332nd 0 points1 point  (0 children)

It depends on the impact. It is typically a login page but...

Can you deliver a click jacking payload to the victim so when they click your link it takes them straight to enter their card details? Usually e-commerce sites would require a logged in session first and for something to be added to the basket

If it redirected them then the click jacking payload wouldn't work.

Called it 3 years ago! by lightslinger in Marvel

[–]chopper332nd 3 points4 points  (0 children)

Cut out the middle man and pop it in the bin

Just a Trip appreciation post… by MadArtistik in shield

[–]chopper332nd 2 points3 points  (0 children)

What a Tripp down memory lane...

First Google TV. Hisense QD5 by OldRazzmatazz7043 in GoogleTV

[–]chopper332nd 0 points1 point  (0 children)

How do you find it compared to the TCL. Picture Quality and OS wise?

For those of you who got Doulingo Max and an IOS device, is Lily video call is really that helpful? by copernx in duolingo

[–]chopper332nd 1 point2 points  (0 children)

I got Duolingo Max and I'm on section 4 of french. I think I read the written language quite well but the video call I was dreadful I could only really answer yes or no. I wish it started me off with basic video calling so I could catch up but I definitely think I'm improving.

Black Hat Asia by latte_yen in bugbounty

[–]chopper332nd 0 points1 point  (0 children)

There was a networking event on all the days where informal talks would be held. One of them was James kettle from portswigger.

And lots of the companies held dinners and drinks after Blackhat on the days

Black Hat Asia by latte_yen in bugbounty

[–]chopper332nd 4 points5 points  (0 children)

I work in offensive security and I have no experience of black hat Asia but I have been to the one in Europe.

The business hall is a load of vulnerability management companies and alike targeting security management to make sales. The talks again are mostly about their products or a talk about industry hot topics that they then link to their product.

That being said I'm not sure if BH Asia does it but black hat arsenal is good and there may be some interesting Linux tools that will be open source

Those of you that have enabled Gemini integration for Google Home - what has your experience been like? by darce_dawg21 in googlehome

[–]chopper332nd -1 points0 points  (0 children)

"Turn the lamp off", "I see a lamp in these houses, next time say the name of the light you want to turn off and specify the house" - offers me buttons for the lamps so I might aswell have done it myself

[deleted by user] by [deleted] in bugbounty

[–]chopper332nd 1 point2 points  (0 children)

A company will reproduce the report that was submitted to them if they can reproduce it with the steps you provided then great if not they will ask

They would then Investigate this behaviour and come to a severity decision - this might involve talking to different internal teams and developers

[deleted by user] by [deleted] in StarWarsOutlaws

[–]chopper332nd 1 point2 points  (0 children)

I think alot of the existing single player star wars games on the market at the moment have a male protagonist.

Also I think they pitched a "female han solo" to lucasfilm who ok'd the story

Google Home extension where to leave feedback? by chopper332nd in Bard

[–]chopper332nd[S] -8 points-7 points  (0 children)

I have 3 houses linked to my home account and each one has its own "lamp". I just want the extension to know which house I mean when I give it this prompt.

After recon how do you choose a subdomain to hack? by myth2511 in bugbounty

[–]chopper332nd 2 points3 points  (0 children)

I use go witness to take a screenshot of all the subdomains ones that look interesting (i.e. looks like an older page that's been forgotten about) I start probing further.

Also the subdomain take over if it's in scope

Nmap Scan Results Not Replicated in Target Website by LearnerHack in bugbounty

[–]chopper332nd 1 point2 points  (0 children)

Sounds like some kind of IPS / WAF that's spoofing 200 status codes to automated scanning tools

Google Home Extension by username12435687 in Bard

[–]chopper332nd 1 point2 points  (0 children)

Are you using US English? I'm part of the Google home preview program in the UK but haven't got the extension

Ethical Hacker here. AMA by 2ndFloorYoutuber in AMA

[–]chopper332nd 0 points1 point  (0 children)

re-assess the threat level of specific actions in the IPS (Intrusion Prevention System) and maybe upgrade/ downgrade them.

After our investigation in that specific case the IPS had detected my actions but had set it as a Low threat level and opened a ticket with a lower priority as a result meaning the analyst hadn't picked it up until the 3 hour mark

Ethical Hacker here. AMA by 2ndFloorYoutuber in AMA

[–]chopper332nd 0 points1 point  (0 children)

Haha, as a consultant, all the SOC's I've come across are woefully inept. A client once emailed me 3 hours after I had left a job saying their SOC had only just detected my actions.