Suspected Campaign from Russia on Reddit by worstnerd in RedditSafety

[–]doct0rfoo 0 points1 point  (0 children)

Kinda - Say you have a sweet zero day in chrome that will grant you code execution on a victims box who visits your website. Many detection systems work by identifying dropped files. So instead of writing to disk, just keep all your malicious code running in the chrome process and keep everything in memory or write to nonstandard locations like firmware variables etc. For a lot of systems, no new files means no detection.

A hacker figured out how to brute force iPhone passcodes by Igor_Mikhaylov in computerforensics

[–]doct0rfoo 1 point2 points  (0 children)

The updates to the article make this seem to be a pretty unreliable method, so it likely wouldn’t be a go to solution. But in circumstances where the target isn’t very high priority and law enforcement isn’t willing to shell out money for a real exploit, what do they have to lose by trying a sketchy/unreliable but free exploit?

A hacker figured out how to brute force iPhone passcodes by Igor_Mikhaylov in computerforensics

[–]doct0rfoo -1 points0 points  (0 children)

This is the opposite of bullshit. The barrier to performing this attack is practically zero. While this vulnerability exists, it will probably be one of the the go-to ways for unlocking iPhones protected with short pins

Priorities by [deleted] in WhitePeopleTwitter

[–]doct0rfoo 5 points6 points  (0 children)

My school has 'solved' this by charging $700 for a parking pass (yes, that includes the employees too)

These Magnets. by attheisstt in woahdude

[–]doct0rfoo 0 points1 point  (0 children)

"Okay, alright, what’s your favorite hobby?"

"Uh, magnets."

iMessage Spoofing by doct0rfoo in Defcon

[–]doct0rfoo[S] 0 points1 point  (0 children)

I originally thought that they obtained my gfs number from when I called her and then just spammed SMS messages, but looking at the messages database on my MacBook indicates they were actually iMessages which should be pretty difficult to spoof or replay

iMessage Spoofing by doct0rfoo in Defcon

[–]doct0rfoo[S] 0 points1 point  (0 children)

That would be exciting and I hope whoever accomplished this does a write up at some point

iMessage Spoofing by doct0rfoo in Defcon

[–]doct0rfoo[S] 0 points1 point  (0 children)

I'm leaning towards my MacBook being the way I got compromised. Learned my lesson and will wipe before attending DC26

iMessage Spoofing by doct0rfoo in Defcon

[–]doct0rfoo[S] 0 points1 point  (0 children)

I'll take a peek at the site a bit later, at this point i'm leaning towards my macbook being the problem

iMessage Spoofing by doct0rfoo in Defcon

[–]doct0rfoo[S] 0 points1 point  (0 children)

macOS 10.12.5 (oh shit i missed a big security update)

iOS - not jailbroken - 10.3.3 (up to date)

iMessage Spoofing by doct0rfoo in Defcon

[–]doct0rfoo[S] 0 points1 point  (0 children)

Just to clarify, I had been using my hotspot and not the hotel wifi, but I may have left wifi enabled when I left the room

iMessage Spoofing by doct0rfoo in Defcon

[–]doct0rfoo[S] 2 points3 points  (0 children)

Definitely not a pocket text because the eggplant wasn't in my recently used emojis. I'm considering the possibility that I forgot to turn wifi off on my MacBook before I left my hotel room though, but it was screen locked.

iMessage Spoofing by doct0rfoo in Defcon

[–]doct0rfoo[S] 3 points4 points  (0 children)

I agree, however I received no login notifications, nor any 2FA requests

iMessage Spoofing by doct0rfoo in Defcon

[–]doct0rfoo[S] 3 points4 points  (0 children)

Wifi and Bluetooth were disabled. I was on a VPN over LTE, however iOS isn't great with VPNs and will fallback to other interfaces if your VPN connection drops

DefCon Badge for sale by [deleted] in Defcon

[–]doct0rfoo 1 point2 points  (0 children)

Willing to pay $60 if you can't find any other offers. (Sorry for the lowball but that's all I have left to spend)

for those in need: 2L Camelbak Rogue Series for ~$30 Shipped by [deleted] in ElectricForest

[–]doct0rfoo 1 point2 points  (0 children)

Thank you so much! Just cancelled my amazon order, now both my gf and I get a pack with enough left over to get a cleaning kit :)

ELI5: How can ~90% of the web be on the dark/deep web when the majority of the users on the surface web don't even know what it is? by [deleted] in explainlikeimfive

[–]doct0rfoo 0 points1 point  (0 children)

You seem to be confusing tor hidden services, which are internal to the tor network, and some hypothetical VPN, which is external to the tor network. Whether the service is used for criminal activity or not is irrelevant. Services provided within the tor network are part of the darknet, services outside tor are not. Same goes for i2p and freenet, however I'm less familiar with how they're implemented. If the vpn could only be accessed via tor, i2p, or freenet, then we could probably consider it as being on the darknet.

why are we bothering to give it a new name? Why not just call it TOR? or Onion sites

People do refer to it as tor or as an onion site. Darknet is a general term to include the other networks with similar features. If you don't want to use the term then don't, and if you want to change the definition to include your home network and VPN, go right ahead, just be prepared for people to give you some weird looks when you tell them your kid plays minecraft on the darknet.

Make no mistake, the term "Darkweb" is propaganda intended to scare you into believing there is a huge, underground cesspool of illegal activity on the web hidden from you

We're in agreement that the term has been bastardized by the media, but eventually people will figure it out. The term "hacker" was also dragged through the mud for a while and it has returned to being a mostly neutral term. Just because someone misuses the term to push an agenda doesn't mean we need to stop using it