simplenomad, to infosec
@simplenomad@rigor-mortis.nmrc.org avatar

Hey and various old school types out there. Ages ago I read a tale about a print server that was the source of an intrusion into some system that the author of this tale was trying to secure. In other words, the print server (at some ISP in Australia) had been popped and from there the attacker was getting into other systems. If you were around in the last century and involved in tech and security you might have read this in some zine or blog. A pointer to a copy of this tale would be appreciated, and you will be rewarded in a large quantity of Zorkmids. And if you get the Zorkmids reference, surely you might recall this tale. Boosts appreciated.

realhackhistory, to random
@realhackhistory@chaos.social avatar

This 'numb3rs' episode ("Shadow Market") that is sort of about and darkweb marketplaces is just too much, too many cringe inducing moments that I want to post.

The episode starts with the feds undercover at a con called "Pentest".

video/mp4

redegelde, to random Dutch
@redegelde@mastodon.education avatar

Beste waarom ik, why me.
Mensen ik lig bij hacker niet lekker blijkbaar. Eerst Facebook, toen mijn eigen site, gisteren Linkedin. pfff traceerde zelf koppelingen via Singapore, rusland en China. Maar ja dat zegt niks met gekoppelde VPN.

kubikpixel, (edited ) to IT German
@kubikpixel@chaos.social avatar

Leider wird gerne "Der Westen" noch als die -Übermacht gesehen.

»Nordkorea – Wie Kims Elite- zum globalen 'sproblem werden:
ist international isoliert und seine Ressourcen sind begrenzt – doch im 'bereich gehört das Land zur . Dass selbst westliche Großkonzerne nicht sicher vor Kims Cybersoldaten sind, beweist das Regime immer wieder. Experten warnen, dass die kritische westlicher Länder gefährdet ist«

📰 https://www.welt.de/politik/ausland/article251277348/Nordkorea-Wie-Kims-Elite-Hacker-zum-globalen-Sicherheitsproblem-werden.html

kubikpixel,
@kubikpixel@chaos.social avatar

🧵…und weshalb bin ich nicht erstaunt, dass die "stabile" Kryptawährung Tornado Cash dabei eine Rolle spielt?!

»Uno-Bericht – Kryptodiebstahl in Milliardenhöhe durch nordkoreanische Hacker vermutet:
Nordkorea ist bettelarm – und leistet sich dennoch ein teures Atomprogramm. Das Geld dafür stammt auch aus digitalen Raubzügen staatlicher Hacker. Die Vereinten Nationen beziffern nun den Schaden.«

📰 https://www.spiegel.de/ausland/nordkorea-laut-uno-kryptodiebstahl-in-milliardenhoehe-durch-hacker-vermutet-a-8ccc51ed-94f4-4240-ad77-131b7ae829ea


simplenomad, to infosec
@simplenomad@rigor-mortis.nmrc.org avatar

I recently deployed Wireguard, and have a blog post about it. It's more of a "real world" blog post than instructional, but I do enclose details about what I did and how I did it.

https://www.markloveless.net/blog/2024/5/14/installing-wireguard

phranck, to random German
@phranck@chaos.social avatar

Interesting interview with an "old school" named .

https://www.youtube.com/watch?v=g6igTJXcqvo

phranck,
@phranck@chaos.social avatar
Killab33z_OG, to opensource
@Killab33z_OG@hispagatos.space avatar

This alternative is looking like a great new tool to tinker with. It's using a hat on a , it's cheaper, and the source code is available. Anyone on make one yet?

https://www.xda-developers.com/raspberry-pi-hackbot/

HackBat repo
https://github.com/controlpaths/hackbat

AlbertoQ, to colombia Spanish
@AlbertoQ@hispagatos.space avatar

Me han compartido este trailer desde , donde este mes se va a presentar el primer capítulo de la serie "La Hacker", que pretende mostrar las diferencias entre y . Muy interesado en ver esta serie, a ver qué tal...

https://vid.puffyan.us/watch?v=mGMJ1-DlNEE

hackmas, to random German
@hackmas@chaos.social avatar

Um 14:00 Uhr beginnt der öffentliche Ticketvorverkauf! 🏰

Ab dann könnt ihr auf https://pretix.eu/c3w/hackmas2024/ eure Tickets kaufen.

Bus Tickets, Parktickets und Merch können ab jetzt separat im Shop gekauft werden. Für Caravans gibt es dort eine Warteliste.

Mehr Informationen zum Event findet ihr auf https://hack-mas.at/

publicvoit,
@publicvoit@graz.social avatar

@hackmas Ich bin ebenfalls am und freue mich, möglichst viele von euch zu treffen! 🙋‍♂️

koen, to Camping
@koen@procolix.social avatar

I seem to have a lot more common ground with than I thought, but watching his and and sets I want it to be summer next year. Cannot wait for

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Uploaded some court documents from an appeal by Electra, a phone phreak who was caught up in Operation Sun Devil for hacking voicemail systems and sharing calling card codes.

https://archive.org/details/com.-v.-gerulis

18+ mook, to random
@mook@possum.city avatar

shout out to @root for running such a dope ass sharkey server on minimal resources just for the fuck of it

Sending burnt offerings your way ​:fire_autism:​

mook,
@mook@possum.city avatar

@root discord will literally crash my laptop, either app or in browser, sharkey does all the flashy real time action and is smooth as budda #C++

kubikpixel, to email German
@kubikpixel@chaos.social avatar

Was mich pers. wundert, ist dass nicht nur die Hacker vom Staat geschützt wurden, sondern mMn einsichtlich nach deren Interessen gefördert wurde. Nun sind anscheinend einige überrascht, dass dem wirklich so ist.

»Auch wirft Russland vor:
des russischen Militärgeheimdiensts sollen hinter Angriffen auf tschechische Einrichtungen stecken. Dieselbe Gruppe soll auch -Konten der gehackt haben.«

🤨 https://www.zeit.de/politik/ausland/2024-05/russland-hackerangriff-geheimdienst-tschechien-spd

lifeinstereo, to Matrix German
@lifeinstereo@bonn.social avatar

Mal so aus saspekten gefragt: Was ist sicherer: oder ? Oder kann man das so nicht sagen?
Bitte gern

kubikpixel, to windows German
@kubikpixel@chaos.social avatar

Evt. nützt es ja schon, sich nicht nur rein auf Microsoft & Windows Software sich zu verlassen und der Internetzugang entsprechend minimalisiren ect.

»Wie können Unternehmen sich besser gegen Hacker wappnen?
Diebstahl von IT-Daten, Spionage und Sabotage: Die Schäden, die Cyberkriminalität anrichtet, sind groß. Welche Rolle spielt der Faktor Mensch dabei – und wie sollten Unternehmen darauf reagieren?«

🙄 https://www.rnd.de/digital/wie-koennen-unternehmen-sich-besser-gegen-hacker-wappnen-BJSEWMILPRE7NF4F2VZPMQ4VFU.html

rye, to tech
@rye@ioc.exchange avatar

For the hackers out there - what are you using to create virtual ranges?

Prefer FOSS but open to a subscription model.

Looking for something that can replicate an enterprise environment with a few enclaves.

2600, to glasgow
@2600@glasgow.social avatar

Hackers, crackers, geeks, hats of any colour, technology enthusiasts, hacktivists, and other like-minded folks are most welcome. We do not judge anyone and everyone has something to contribute, no matter their level of expertise.

We're meeting tomorrow (Fri 3rd May) at a new - @thegamerclub 153 Bath Lane from 6pm 'til late - all welcome!

Also join us in Matrix at :glasgow.social (invite link: https://glasgow.social/matrix)

informapirata, to informatica Italian
@informapirata@mastodon.uno avatar

Dropbox sarebbe stato violato. Rubati i dati dei clienti e i token di autenticazione

Dropbox ha affermato che gli sono penetrati nei di della piattaforma di firma elettronica . Hanno ottenuto l’accesso a di , di autenticazione a più fattori (), con hash e sui clienti.

@informatica

Notizia segnalata su @redhotcyber

https://www.sec.gov/Archives/edgar/data/1467623/000146762324000024/may2024exhibit991.htm

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Been reading about the case of Edward Austin Singh in the UK, a who was caught physically trespassing in a Teesside Polytechnic college computer lab, while connected to various computers, by UK police in 1988.

blog, to apple German
@blog@kaffeeringe.de avatar
realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Still combing through stories in news archives from 1987 & what the hell is this.

As reported in The Albany Herald in April of 1987, this cop had his conviction reversed, he'd managed to cyberstalk women in 1984! Unbelievable this was already a thing back then.

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Another release, this time on the 2004 'MyDoom' worm. This is 22 pages that had already been processed, I've asked for further records to be processed for later release.

https://archive.org/details/MyDoom-FBI-FOIA

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Proof that people caught up in related investigations back in the day were not all young guys.

realhackhistory,
@realhackhistory@chaos.social avatar

I love these illustrations, this one from The Spokesman-Review, on the 24th of July, 1987.

Kids clustered around a computer screen, the skateboard that got them all busted even makes an appearance.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • GTA5RPClips
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • everett
  • InstantRegret
  • Youngstown
  • mdbf
  • slotface
  • rosin
  • modclub
  • kavyap
  • Leos
  • normalnudes
  • cubers
  • osvaldo12
  • tacticalgear
  • Durango
  • khanakhh
  • ngwrru68w68
  • provamag3
  • anitta
  • tester
  • cisconetworking
  • ethstaker
  • megavids
  • lostlight
  • All magazines