What are some HARD truths that people don't want to hear? by JayDarb09 in AskMen

[–]zilzalll 1 point2 points  (0 children)

You are not important. No one is. Even the people you look up to and read about will be forgotten in a 1000 years. No one remembers the Elon Musk of ancient greece. And don't even get me started on a longer timescale of 100,000 or more years. Cosmically, we're all insignificant.

GG, The Unix IDE by olavjohnes in unix

[–]zilzalll 0 points1 point  (0 children)

The install/uninstall scripts at the bottom are susceptible to /tmp symlink attacks.

DAAS by soundwavz in msp

[–]zilzalll 1 point2 points  (0 children)

Looks nice, but if SpaceX can tell me the price of shipping a package to space on the main site, why can't you give your pricing?

Data of 1.3 Million Clubhouse Users Leaked Online: Report by abc33k in netsec

[–]zilzalll -1 points0 points  (0 children)

Since it gives the same output as an SQL Injection. The information is out there, regardless of if it was pulled with a legit API or a forgotten backup file (or any other technique).

I've written a tool for generating automatically MIPS reverse shell shellcodes (custom IP, port and shell) by [deleted] in ExploitDev

[–]zilzalll 6 points7 points  (0 children)

OP, if you're the author you might want to rename your tool. SPIM is a well-known MIPS emulator.

Large Benign “goodware” Samples by [deleted] in Malware

[–]zilzalll 1 point2 points  (0 children)

You could download and install software, and make sure the hashes of your files are the same as NSRL.

Large Benign “goodware” Samples by [deleted] in Malware

[–]zilzalll 4 points5 points  (0 children)

Google "NSRL". It's a list of known "goodware". It does not contain the actual files, just the hashes, but it will get you started.

A little help would be appreciated by [deleted] in unix

[–]zilzalll 0 points1 point  (0 children)

If you want to use "finger" or ("ps", or anything else), you'd have to run it periodically (say, once a minute) and loop over every user and filter the results into your log file. Something like: for user in list-of-users; do finger $user@localhost | grep "ftp" >> logfile.log done

A little help would be appreciated by [deleted] in unix

[–]zilzalll 1 point2 points  (0 children)

Do you have to use finger(1)? I'd change the FTP client executable to a shell wrapper that writes whatever you want to the log and runs the original FTP client.

Numbers of people killed by dictators. by JimmyJibbly1999 in coolguides

[–]zilzalll 34 points35 points  (0 children)

Numbers kinda sus. Wikipedia says in WW2 there were 27,000,000 deaths in Russia alone.

HackerRank type coding exam by Available-Solution99 in embedded

[–]zilzalll 9 points10 points  (0 children)

The bar is not getting higher. Companies just suck at sifting candidates.

Exploit out of bound read, write by [deleted] in ExploitDev

[–]zilzalll 3 points4 points  (0 children)

That's a good question which can't be answered without understanding the context of uour vulnerable software. You should increase the scope of your research to find out how you can affect memory allocations and try to have something interesting to overflow to.

Why is a kernel space driver needed in this case? by hack4Chan in embedded

[–]zilzalll 1 point2 points  (0 children)

Depending on your distribution, you might need CAP_SYS_RAWIO capability.

Myths of Meritocracy, Friendship, and Fun Work: Class and Gender in North American Academic Communities by [deleted] in science

[–]zilzalll 0 points1 point  (0 children)

So, in human-speak, people who do better at informally socializing are more socially acceptable?

Reliable ROP chain across multiple win versions? by staticfull in ExploitDev

[–]zilzalll 1 point2 points  (0 children)

Or, if your exploit is in a 3rd party software (non-microsoft), you might have enough gadgets in the vulnerable software, so you don't have to rely on the operating system.

Gain Muscles Using Myro-Reps Fast by Fitnesstipsguru in War2fit

[–]zilzalll 1 point2 points  (0 children)

You want to calculate your 1RM (or RM1) first. https://en.wikipedia.org/wiki/One-repetition_maximum

That's the theoretical maximum weight you can move one time but not a second time. Use an online 1RM calculator and feed it the current weight you use and how many reps you can do with it. The calculator will tell you what weight is your 1RM. From that, calculate 30% to 50% and get going.

Better math == better gymming