Advertisement Β· 728 Γ— 90

Posts by

Why do you think they all wear masks?

9 months ago 2 0 0 0
Preview
ICE Is Using a New Facial Recognition App to Identify People, Leaked Emails Show The new tool, called Mobile Fortify, uses the CBP system which ordinarily takes photos of people when they enter or exit the U.S., according to internal ICE emails viewed by 404 Media. Now ICE is usin...

New from 404 Media: ICE is using a new facial recognition app to identify people, leaked emails show. Point camera at person, reveal their identity. It uses the CBP system that records peoples' faces as they enter or exit the U.S. Now, turned inwards to be used by ICE www.404media.co/ice-is-using...

9 months ago 5820 3519 426 567
Preview
The Protesters' Guide to Smartphone Security Your phone is an essential tool, but it also represents a huge risk to your privacy and security. Understanding these best practices when it comes to securing your smartphone will help keep you and yo...

Full guide covers OpSec, burner phones, data protection, secure communications, and handling law enforcement interactions.
Read: www.privacyguides.org/articles/202...

10 months ago 0 0 0 0

Key takeaways: Use strong passphrases to unlock phone, minimize stored data, prefer Signal for messaging, know your legal rights, and consider leaving your main phone at home entirely. #LA #Protests #ICE #DigitalRights #ProtestSafety #OpSec #PrivacyMatters

10 months ago 1 0 1 0

With recent protests and the documented surveillance conducted by law enforcement with aerial drones, protecting your digital privacy has never been more critical. Your smartphone can be both a powerful tool for coordination and documentation, and a significant security risk if not secured. πŸ§΅πŸ‘‡

10 months ago 0 0 1 0
Preview
DHS Black Hawks and Military Aircraft Surveil the LA Protests Local police, state authorities, DHS, and the military all flew aircraft over the Los Angeles protests this weekend, according to flight path data.

New from 404 Media: here's our report on the aircraft circling above the LA protests. Local, state, DHS, military all flew. Left: aircraft from air base. Right: a distinctive high altitude/hexagonal flight pattern, looks like a Predator drone (it flew to border after) www.404media.co/dhs-black-ha...

10 months ago 447 208 10 9
Post image

A picture worth 0x3E8 words at Bsides Seattle. @00wham.bsky.social

1 year ago 3 0 0 0
Advertisement
I Built a Mini Truck for Abandoned Railroads
I Built a Mini Truck for Abandoned Railroads YouTube video by prestongoes

Here's part one of his 3-part series. The series is great, but overall PrestonGoes is one of the best YouTube channels I've found. He's an incredibly genuine and positive guy and his videos are fun to watch.
youtu.be/FgOJwFLF26k?...

1 year ago 2 0 0 0

@abyssdomainexpert.bsky.social Absolutely loved your talk at HC Seattle last year. When I heard the @jackrhysider.bsky.social episode, I had to do some digging to see if it was the same person or someone else with an identical story lol. Glad to find you on here.

1 year ago 1 0 1 0
Preview
Bike Index – Darknet Diaries Have you ever got your bike stolen? In this episode we dive into the world of stolen bikes. Who does it and where do the bikes go? We talk with Bryan from Bike Index who investigates this.

Thank you Jack Rhysider and @DarknetDiaries for letting me tell the Bike Index story darknetdiaries.com/episode/153/

1 year ago 1 1 1 0

Well that was incredibly creepy lol. Nice work!

1 year ago 1 0 0 0
I broke IKEA. (or, well, one of their delivery services.) πŸ”Š Just a fair warning - there are some perhaps annoying glitch sounds in the attached recording. The volumes are normalized to limit loud spikes, as they w...

Ok, this is brilliant. @sirocyl.bsky.social set up a DTMF bomb on their voicemail message to spam DTMF tones to spammers and jam up their PBX systems. They accidently broke Ikea.
cohost.org/sirocyl/post...

1 year ago 2 0 1 0

β€œif you don’t have a family then make one” okay fine im making an ai family for the holidays

1 year ago 3 1 0 0

No I haven't had to log in since creating my account πŸ€·β€β™‚οΈ

1 year ago 0 0 0 0
Advertisement

@fixit42.bsky.social Heya FixIt! πŸ’œ

1 year ago 0 0 0 0

the friends of cabal starter pack!
go.bsky.app/JAR9jhy

1 year ago 9 6 0 0

No, not personally. This was one of the challenges on OWASP's WebGoat, and I figured I'd make a post about it.

1 year ago 0 0 0 0

@owasp.org too

1 year ago 0 0 0 0

@johnhammond.bsky.social should definitely be on this list. He puts out great content.

1 year ago 0 0 0 0
Preview
GitHub - WebGoat/WebGoat: WebGoat is a deliberately insecure application WebGoat is a deliberately insecure application. Contribute to WebGoat/WebGoat development by creating an account on GitHub.

Shout out to @owasp.org and github.com/WebGoat/WebG... for putting together this great example!

1 year ago 2 0 0 0

Tips to stay safe from cookie hijacking:
βœ… Websites: Use random, encrypted session cookies over HTTPS.
βœ… Users: Log out after use, enable MFA, and avoid untrusted networks. Protect your cookies and keep hackers out! πŸ”

1 year ago 0 0 1 0
Advertisement
Post image

We intercept the login request as Admin, swap in the cookie we created for Tom, and boom β€” we're logged in as him! πŸ•΅οΈ This is cookie hijacking in action. Weak session cookies can expose accounts. Secure cookies save lives! πŸ›‘οΈ

1 year ago 1 0 1 0
Post image Post image

The decoded cookies reveal plain text:
Webgoat: nzozZtxkdKtaogbew
Admin: nzozZtxkdKnimda
Reversing these strings, we see the username is reversed at the end.
To impersonate Tom, we reverse β€œTom,” encode it in hex, then Base64. Crafting Tom’s session cookie lets us hijack his account! 😱

1 year ago 1 0 2 0
Post image

Authentication cookies like spoof_auth are often Base64 encoded. If predictable, they can be exploited! Logging in with credentials we know of such as Webgoat and Admin, we find:
Webgoat: NmU3YTZm...
Admin: NmU3YTZm...
Decoded, these cookies reveal hex patterns. Time to exploit them! πŸ”“

1 year ago 1 0 1 0

What is cookie hijacking? πŸͺπŸ”’
Authentication cookies keep you logged in, but if they're predictable, hackers can use them to impersonate you. Let’s explore how a vulnerable site can be exploited to log in as someone else. Stay tuned! πŸ•΅οΈβ€β™‚οΈ

1 year ago 5 0 1 0
-----BEGIN PGP MESSAGE-----hQIMA3PiNz2hRYmGAQ/+IAKjSSRVXEY4bFVp0Q9uPpZy1a/Zx - Pastebin.com Pastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.

@gachikuku.bsky.social
pastebin.com/mhm4u0Mk

1 year ago 2 0 1 0

@bryanbrake.bsky.social you may be interested in this starter pack.

1 year ago 1 1 0 0

@jameskettle.com has put together a great starter pack for bug bounty hunters and InfoSec creators on BlueSky. #infosec #bugbounties #contentcteators
go.bsky.app/GD7hKPX

1 year ago 1 0 1 0