#music on a #modular#synthesizer for a Monday morning. I'm sort of building my synthesizer to be more of a "1970s" analog synthesizer that has that classic warmth, instead of a "1980s" synthesizer, that sounds like a vintage computer. But for those of you interested, there are modules that let you access a C64 SID chip in your modular synth and really let you bleep and bloop! ... But that's not what I did here ;p
@VitorHSSousa and myself have developed a #nmap service probe to identify whether a service on port 1801 is #MSMQ.
I've just published it on the URL below. We can't guarantee this will successfully detect every version, but we've tested with a few Windows Server and non-server versions and it seems to work across at least recent ones.
We hope this helps defenders identify exposed MSMQ so they can mitigate the risk from #QueueJumper.
It seems 0x524F494C is always used as the BaseHeader.Signature. Those hex bytes correspond to... surprise, surprise... the "LIOR" string that appears in every packet 😀
I'm planning on submitting a PR to #nmap to add the probe to the list that ships with it.
Hi all, I've read its good etiquette to make an about me post. I've been a tinkerer of things for a long while, been a cybersercurity enthusiast since my teens where I was having fun on lots of BBS' and Datapac.
I'm a big believer in #opensource, FOSS and fostering communities. I've been messing with Linux since the 90s. Huge fan of the movie Hackers.
Today I hack #gibsons for a living! I focus a lot of my work on making tools and giving talks on hacking and pentesting IBM z/OS mainframes. I've published updates for metasploit and #Nmap adding support for z/OS. I also have many more tools on my github.
In my spare time I also maintain my own mainframe distro MVS/CE which I use to teach workshops about mainframe buffer overflows and hacking CICS applications.
I'm also a huge fan of #retrogaming and retrocomputing especially retro hacks.