6m after he gets up he begins the assault on his lil bro.

I'm on XMPP with Fingerprint: 54F65BA6 B8829BF9 A262CD78 A2F524A6 C60A00FB

My :birdsite: just got locked again for using a VPN while using the site.

CrikeyCon this week.... I'm keen for some CTF!

n0tj05h boosted

Pretty handy if your victim is a sysadmin, there’s a high probability he has WSL installed 😈

n0tj05h boosted

Some pentesting tools to abuse Bash on Windows if you’re on a box with WSL installed, made by @acervoise github.com/cervoise/Abuse-bash #hacklu #redteam

n0tj05h boosted

Could the libssh vulnerability (CVE-2018-10933) be a bugdoor? So simple and elegant, makes me thinking 🤔

n0tj05h boosted

Remotely controlling a Yacht, it’s actually pretty scary 😱 (cleartext FTP, hardcoded credentials, etc.), talk by @obiwan666 #hacklu #yacht #hacking #boathacking t.co/0rifYTI2K1

n0tj05h boosted

Selfie, eye contact, deserved rudeness Show more

n0tj05h boosted

Interesting #DDoS approach, find vulnerable IoT devices (w/ UDP services prone to amplification) close from the victim to bypass ISP anti-DDoS mechanisms, for example from within the same AS or /24, talk by @DennisRand #Hacklu t.co/jdgytuB7F6

n0tj05h boosted
n0tj05h boosted

If you’re doing large scale #ThreatHunting and have some extra hardware available you should really give Klara a try, developed by @_xdanx from Kaspersky’s GReAT github.com/KasperskyLab/klara #malware #hacklu t.co/5NO8caPdp4

Show more
Aus.Social

Welcome to thundertoot! A Mastodon Instance for 'straya