@shaknais@mastodon.social
@shaknais@mastodon.social avatar

shaknais

@shaknais@mastodon.social

Author | Aussie | Written all kinds of tales over the years - romance, murder mystery, science fiction and fantasy and more.
Warning: Short term memory loss.

This profile is from a federated server and may be incomplete. Browse more on the original instance.

winter, to random
@winter@translunar.academy avatar

Sparrow said that I regularly fall for a girl/etc every year since they met me, and then listed them all :hiding:

shaknais,
@shaknais@mastodon.social avatar

@winter So... They wanna be on that list?

BasicAppleGuy, to random
@BasicAppleGuy@mastodon.social avatar

True or False: Which are actual Apple display names? 👨🏻‍🏫

shaknais,
@shaknais@mastodon.social avatar

@BasicAppleGuy *(True * 11)

feld, (edited ) to random
@feld@bikeshed.party avatar

> One of the most notable propagation methods is Ebury using its presence inside data centers to perform AitM attacks at scale on servers deemed to be high value.

what the fuck is an AitM attack?

edit: the term is Adversary in the Middle and it sucks because it's misleading and I was cranky, baby needed his bottle^Wcoffee

shaknais,
@shaknais@mastodon.social avatar

@feld Adversary-in-the-Middle.

You take control of something like a phishing site, and tweak their attack into something that will better suit yourself.

One attacker hiding behind another.

shaknais,
@shaknais@mastodon.social avatar

@feld No, a MitM attack, is where you position yourself inbetween the client and their provider.

An AitM is where you hijack someone trying to pull that off. They usually don't realise it's you, and blame the first attacker, as you make off with the goods.

shaknais,
@shaknais@mastodon.social avatar

@feld The Adversary in the Middle is the original attacker.

Because between the successful attacker and the target, is a patsy. The original attacker. They're in-between.

We use a new term, because the new attacker isn't usually noticed. They sacrifice the AitM, framing them, and get away scot-free.

shaknais,
@shaknais@mastodon.social avatar

@feld The term for the unnoticed attacker is usually just "the attacker".

e.g. The attacker hid themselves by utilising AitM methodology.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • kavyap
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • InstantRegret
  • GTA5RPClips
  • Youngstown
  • everett
  • slotface
  • rosin
  • osvaldo12
  • mdbf
  • ngwrru68w68
  • JUstTest
  • cubers
  • modclub
  • normalnudes
  • tester
  • khanakhh
  • Durango
  • ethstaker
  • tacticalgear
  • Leos
  • provamag3
  • anitta
  • cisconetworking
  • lostlight
  • All magazines