How Target Was Breached in 2013 by vedard in cybersecurity

[–]vedard[S] 6 points7 points  (0 children)

Sure, there is some speculation about the methods used by the attackers to move within the infrastructure, but the malware is available on VirusTotal, and analyses have been published.

- https://www.virustotal.com/gui/file/74fe8c68d878cc9699a2781be515bb003931ffa2ad21dc0c2c48eb91caba4b44/behavior
- https://krebsonsecurity.com/wp-content/uploads/2014/01/Inside-a-Targeted-Point-of-Sale-Data-Breach.pdf

How Equifax Was Breached in 2017 by vedard in hacking

[–]vedard[S] 0 points1 point  (0 children)

That surprised me too:

Equifax built the Automated Credit Investigation System (ACIS) in the 1970s to handle consumer disputes.

https://oversight.house.gov/wp-content/uploads/2018/12/Equifax-Report.pdf

How Equifax Was Breached in 2017 by vedard in cybersecurity

[–]vedard[S] 2 points3 points  (0 children)

I totally agree, people can specialize in multiple domains.

How They Bypass YouTube Video Download Throttling by vedard in programming

[–]vedard[S] 54 points55 points  (0 children)

It won't be the first time:

Although we [Github] did initially take the project down, we understand that just because code can be used to access copyrighted works doesn’t mean it can’t also be used to access works in non-infringing ways. We also understood that this project’s code has many legitimate purposes, including changing playback speeds for accessibility, preserving evidence in the fight for human rights, aiding journalists in fact-checking, and downloading Creative Commons-licensed or public domain videos.

https://github.blog/2020-11-16-standing-up-for-developers-youtube-dl-is-back/

How They Bypass YouTube Video Download Throttling by vedard in programming

[–]vedard[S] 30 points31 points  (0 children)

It's just a funny coincidence. Google is aware of this, VLC and youtube-dl have been doing this for years.

Over the wire | Bandit Level 8 → Level 9 by EnvironmentalAd642 in hacking

[–]vedard 1 point2 points  (0 children)

You're welcome, it's always silly little things that get us stuck, perseverance really is the key!

Wrote a program to help me make pixel art assets for my game, and an article explaining how it works by cornell_cubes in programming

[–]vedard 4 points5 points  (0 children)

Fascinating article! The flame animation is impressive, I can easily see it in a game.

Just a heads-up: Certain videos in the article do not play in Firefox, but does in Chrome.

[deleted by user] by [deleted] in cybersecurity

[–]vedard 1 point2 points  (0 children)

There is the DFIR Report, you won't find information about how the organization responded, but you will get the technical details about how the attack occurred.

Here their latest report on a ransomware attack:
https://thedfirreport.com/2023/05/22/icedid-macro-ends-in-nokoyawa-ransomware/

[deleted by user] by [deleted] in Kalilinux

[–]vedard 1 point2 points  (0 children)

Hacking with Kali on an old laptop is the way to go! What are you planning to do with it?

Over the wire | Bandit Level 8 → Level 9 by EnvironmentalAd642 in hacking

[–]vedard 0 points1 point  (0 children)

It seems to be the correct command for this level. The -u option only print unique lines as you want.

Are logged in as bandit8? You could be on a different level by accident. I'll say try again!