Why do you think they all wear masks?
27.06.2025 13:20 β π 2 π 0 π¬ 0 π 0@digitalwarhead.bsky.social
Success is not final; failure is not fatal: it is the courage to continue that counts. https://darknetdiaries.com/
Why do you think they all wear masks?
27.06.2025 13:20 β π 2 π 0 π¬ 0 π 0New from 404 Media: ICE is using a new facial recognition app to identify people, leaked emails show. Point camera at person, reveal their identity. It uses the CBP system that records peoples' faces as they enter or exit the U.S. Now, turned inwards to be used by ICE www.404media.co/ice-is-using...
26.06.2025 16:45 β π 5881 π 3561 π¬ 432 π 571Full guide covers OpSec, burner phones, data protection, secure communications, and handling law enforcement interactions.
Read: www.privacyguides.org/articles/202...
Key takeaways: Use strong passphrases to unlock phone, minimize stored data, prefer Signal for messaging, know your legal rights, and consider leaving your main phone at home entirely. #LA #Protests #ICE #DigitalRights #ProtestSafety #OpSec #PrivacyMatters
09.06.2025 20:50 β π 1 π 0 π¬ 1 π 0With recent protests and the documented surveillance conducted by law enforcement with aerial drones, protecting your digital privacy has never been more critical. Your smartphone can be both a powerful tool for coordination and documentation, and a significant security risk if not secured. π§΅π
09.06.2025 20:50 β π 0 π 0 π¬ 1 π 0New from 404 Media: here's our report on the aircraft circling above the LA protests. Local, state, DHS, military all flew. Left: aircraft from air base. Right: a distinctive high altitude/hexagonal flight pattern, looks like a Predator drone (it flew to border after) www.404media.co/dhs-black-ha...
09.06.2025 13:36 β π 451 π 211 π¬ 10 π 9A picture worth 0x3E8 words at Bsides Seattle. @00wham.bsky.social
19.04.2025 16:51 β π 2 π 0 π¬ 0 π 0Here's part one of his 3-part series. The series is great, but overall PrestonGoes is one of the best YouTube channels I've found. He's an incredibly genuine and positive guy and his videos are fun to watch.
youtu.be/FgOJwFLF26k?...
@abyssdomainexpert.bsky.social Absolutely loved your talk at HC Seattle last year. When I heard the @jackrhysider.bsky.social episode, I had to do some digging to see if it was the same person or someone else with an identical story lol. Glad to find you on here.
08.01.2025 20:27 β π 1 π 0 π¬ 1 π 0Thank you Jack Rhysider and @DarknetDiaries for letting me tell the Bike Index story darknetdiaries.com/episode/153/
07.01.2025 15:18 β π 1 π 1 π¬ 1 π 0Well that was incredibly creepy lol. Nice work!
21.12.2024 07:19 β π 1 π 0 π¬ 0 π 0Ok, this is brilliant. @sirocyl.bsky.social set up a DTMF bomb on their voicemail message to spam DTMF tones to spammers and jam up their PBX systems. They accidently broke Ikea.
cohost.org/sirocyl/post...
βif you donβt have a family then make oneβ okay fine im making an ai family for the holidays
27.11.2024 05:58 β π 3 π 1 π¬ 0 π 0No I haven't had to log in since creating my account π€·ββοΈ
27.11.2024 03:09 β π 0 π 0 π¬ 0 π 0@fixit42.bsky.social Heya FixIt! π
26.11.2024 14:19 β π 0 π 0 π¬ 0 π 0the friends of cabal starter pack!
go.bsky.app/JAR9jhy
No, not personally. This was one of the challenges on OWASP's WebGoat, and I figured I'd make a post about it.
25.11.2024 22:11 β π 0 π 0 π¬ 0 π 0@owasp.org too
25.11.2024 15:16 β π 0 π 0 π¬ 0 π 0@johnhammond.bsky.social should definitely be on this list. He puts out great content.
25.11.2024 15:12 β π 0 π 0 π¬ 0 π 0Shout out to @owasp.org and github.com/WebGoat/WebG... for putting together this great example!
24.11.2024 21:59 β π 2 π 0 π¬ 0 π 0Tips to stay safe from cookie hijacking:
β
Websites: Use random, encrypted session cookies over HTTPS.
β
Users: Log out after use, enable MFA, and avoid untrusted networks. Protect your cookies and keep hackers out! π
We intercept the login request as Admin, swap in the cookie we created for Tom, and boom β we're logged in as him! π΅οΈ This is cookie hijacking in action. Weak session cookies can expose accounts. Secure cookies save lives! π‘οΈ
24.11.2024 21:59 β π 1 π 0 π¬ 1 π 0The decoded cookies reveal plain text:
Webgoat: nzozZtxkdKtaogbew
Admin: nzozZtxkdKnimda
Reversing these strings, we see the username is reversed at the end.
To impersonate Tom, we reverse βTom,β encode it in hex, then Base64. Crafting Tomβs session cookie lets us hijack his account! π±
Authentication cookies like spoof_auth are often Base64 encoded. If predictable, they can be exploited! Logging in with credentials we know of such as Webgoat and Admin, we find:
Webgoat: NmU3YTZm...
Admin: NmU3YTZm...
Decoded, these cookies reveal hex patterns. Time to exploit them! π
What is cookie hijacking? πͺπ
Authentication cookies keep you logged in, but if they're predictable, hackers can use them to impersonate you. Letβs explore how a vulnerable site can be exploited to log in as someone else. Stay tuned! π΅οΈββοΈ
@gachikuku.bsky.social
pastebin.com/mhm4u0Mk
@bryanbrake.bsky.social you may be interested in this starter pack.
21.11.2024 23:27 β π 1 π 1 π¬ 0 π 0@jameskettle.com has put together a great starter pack for bug bounty hunters and InfoSec creators on BlueSky. #infosec #bugbounties #contentcteators
go.bsky.app/GD7hKPX