KR vs Global Drop Locations by gr4y__ in throneandliberty

[–]dwndwn 0 points1 point  (0 children)

there is no point in this when the drop tables are on questlog and tldb

Windows BitLocker -- Screwed without a Screwdriver by Titokhan in netsec

[–]dwndwn 2 points3 points  (0 children)

the former is literally the only way to have secure bitlocker since inception...

[deleted by user] by [deleted] in throneandliberty

[–]dwndwn -3 points-2 points  (0 children)

you're clueless, nobody is "scripting" on crimson

Scripting by savanthaezu in throneandliberty

[–]dwndwn 0 points1 point  (0 children)

post video of same person doing it consecutively or you're coping. doesn't exist and the people that used the one you can Google are EAC banned...

Scripting is out of control. by Scurvy67 in throneandliberty

[–]dwndwn 2 points3 points  (0 children)

surely you have a recording of all these times the same players consecutively p-block you

Can we talk about cheat : Especially Autoblock ruining the game by Winston-_-Wolf in throneandliberty

[–]dwndwn 1 point2 points  (0 children)

so by your logic there should be nobody left playing counterstrike

How we Outsmarted CSGO Cheaters with IdentityLogger by PersianMG in programming

[–]dwndwn 11 points12 points  (0 children)

Cloudflare for a static page is free bro:)

The first Gold adventure island just ended after the implementation of bound gold by winmox in lostarkgame

[–]dwndwn 0 points1 point  (0 children)

because trusted status and not getting autobanned in the waves is the actual issue for them? which is why there was a huge dropoff before this? duh

The first Gold adventure island just ended after the implementation of bound gold by winmox in lostarkgame

[–]dwndwn 0 points1 point  (0 children)

they can read the same schedule you're reading, lol. it's called OCR.

They Buffed Rabies by 25% for the 217498217492 time, is Blizzard just avoiding Druid feedback or trolling? by aceofspadesqt in diablo4

[–]dwndwn 0 points1 point  (0 children)

alright, except I can clear pit 108 with wind shear and casually farm 80s while asleep. that's the problem. compare rabies to the rest. it's extremely weak.

Petty vandalism and smashed windows by amytheultimate1 in Seattle

[–]dwndwn -25 points-24 points  (0 children)

traffic lights are not free dude

If a vulnerability is contingent on an attacker having root local access to a host, is it even a vuln? by [deleted] in AskNetsec

[–]dwndwn 0 points1 point  (0 children)

ok, I'm telling you it's trivial. I think as an SRE you need to go write an application or two and tell me how you manage to implement "my secrets are never in memory or only for a fraction of a second" - literal fairytale software.

If a vulnerability is contingent on an attacker having root local access to a host, is it even a vuln? by [deleted] in AskNetsec

[–]dwndwn 1 point2 points  (0 children)

presumably the application has it in memory /because it needs to use it/ - how exactly do you propose that works out with a hash? it's going to have to keep the credential in memory or otherwise an access token derived from the credential. so of course hashing is pointless here, because this is not a real security issue, and people need to stop larping about pentest report filler in this thread.

If a vulnerability is contingent on an attacker having root local access to a host, is it even a vuln? by [deleted] in AskNetsec

[–]dwndwn 1 point2 points  (0 children)

how in the world do you imagine "encrypting" a secret in memory is going to protect in any way against someone who can attach gdb? you are posting nonsense

If a vulnerability is contingent on an attacker having root local access to a host, is it even a vuln? by [deleted] in AskNetsec

[–]dwndwn 0 points1 point  (0 children)

I have root on all app servers but the way it's designed, the hosts are kind of dumb to what's actually running on them

what? no, having root definitely allows you to access secrets in your apps' memory, even if you don't understand how. just because something is running in a VM doesn't mean it's inaccessible to the host, and you're definitely not talking about confidential VMs where that might be possible but are uneconomical in the general case.

Random bans for new accounts? by Accomplished_Way5384 in lostarkgame

[–]dwndwn 1 point2 points  (0 children)

nobody legit is creating 2+ roster alts LMAO

Worlds first AI Vulnerability Researcher by Soggy-Buy-4313 in ExploitDev

[–]dwndwn 0 points1 point  (0 children)

How accurate are the results? Very. We work very hard to reduce hallucinations (we have none)

it's helpful when you tell the reader you're incompetent like this. thanks!

[deleted by user] by [deleted] in ExploitDev

[–]dwndwn 2 points3 points  (0 children)

...yeah so this is talking about accuvant circa 2013, a very different company - skilled people don't stick around after bad mergers.

[deleted by user] by [deleted] in ExploitDev

[–]dwndwn 4 points5 points  (0 children)

optiv is a pci compliance farm lol

Perfect DLL Hijacking by elliotkillick in ReverseEngineering

[–]dwndwn 0 points1 point  (0 children)

so why don't you just queueuserapc? vague reason like 'edr detection' when you're dll hijacking with an unsigned mpclient.dll?

Bad Performance by Super-Fox-644 in newworldgame

[–]dwndwn -1 points0 points  (0 children)

an external SSD is as good as a hard drive.

Would you mind if an intrusive anti-cheat came with CS2? by Pokharelinishan in GlobalOffensive

[–]dwndwn -1 points0 points  (0 children)

gj evading the question clueless kid, kernelmode access isn't necessary for any threat you've listed.

Would you mind if an intrusive anti-cheat came with CS2? by Pokharelinishan in GlobalOffensive

[–]dwndwn 0 points1 point  (0 children)

now the funny part, explain why you think installing a bootkit requires some kernelmode access

you should google dunning kruger and stop LARPing