@digitalwarhead.bsky.social

Success is not final; failure is not fatal: it is the courage to continue that counts. https://darknetdiaries.com/

654 Followers 419 Following 23 Posts Joined Nov 2024
8 months ago

Why do you think they all wear masks?

2 0 0 0
8 months ago
Preview
ICE Is Using a New Facial Recognition App to Identify People, Leaked Emails Show The new tool, called Mobile Fortify, uses the CBP system which ordinarily takes photos of people when they enter or exit the U.S., according to internal ICE emails viewed by 404 Media. Now ICE is usin...

New from 404 Media: ICE is using a new facial recognition app to identify people, leaked emails show. Point camera at person, reveal their identity. It uses the CBP system that records peoples' faces as they enter or exit the U.S. Now, turned inwards to be used by ICE www.404media.co/ice-is-using...

5,828 3,527 426 568
9 months ago
Preview
The Protesters' Guide to Smartphone Security Your phone is an essential tool, but it also represents a huge risk to your privacy and security. Understanding these best practices when it comes to securing your smartphone will help keep you and yo...

Full guide covers OpSec, burner phones, data protection, secure communications, and handling law enforcement interactions.
Read: www.privacyguides.org/articles/202...

0 0 0 0
9 months ago

Key takeaways: Use strong passphrases to unlock phone, minimize stored data, prefer Signal for messaging, know your legal rights, and consider leaving your main phone at home entirely. #LA #Protests #ICE #DigitalRights #ProtestSafety #OpSec #PrivacyMatters

1 0 1 0
9 months ago

With recent protests and the documented surveillance conducted by law enforcement with aerial drones, protecting your digital privacy has never been more critical. Your smartphone can be both a powerful tool for coordination and documentation, and a significant security risk if not secured. πŸ§΅πŸ‘‡

0 0 1 0
9 months ago
Preview
DHS Black Hawks and Military Aircraft Surveil the LA Protests Local police, state authorities, DHS, and the military all flew aircraft over the Los Angeles protests this weekend, according to flight path data.

New from 404 Media: here's our report on the aircraft circling above the LA protests. Local, state, DHS, military all flew. Left: aircraft from air base. Right: a distinctive high altitude/hexagonal flight pattern, looks like a Predator drone (it flew to border after) www.404media.co/dhs-black-ha...

448 208 10 9
10 months ago
Post image

A picture worth 0x3E8 words at Bsides Seattle. @00wham.bsky.social

3 0 0 0
11 months ago
YouTube
I Built a Mini Truck for Abandoned Railroads YouTube video by prestongoes

Here's part one of his 3-part series. The series is great, but overall PrestonGoes is one of the best YouTube channels I've found. He's an incredibly genuine and positive guy and his videos are fun to watch.
youtu.be/FgOJwFLF26k?...

2 0 0 0
1 year ago

@abyssdomainexpert.bsky.social Absolutely loved your talk at HC Seattle last year. When I heard the @jackrhysider.bsky.social episode, I had to do some digging to see if it was the same person or someone else with an identical story lol. Glad to find you on here.

1 0 1 0
1 year ago
Preview
Bike Index – Darknet Diaries Have you ever got your bike stolen? In this episode we dive into the world of stolen bikes. Who does it and where do the bikes go? We talk with Bryan from Bike Index who investigates this.

Thank you Jack Rhysider and @DarknetDiaries for letting me tell the Bike Index story darknetdiaries.com/episode/153/

1 1 1 0
1 year ago

Well that was incredibly creepy lol. Nice work!

1 0 0 0
1 year ago
I broke IKEA. (or, well, one of their delivery services.) πŸ”Š Just a fair warning - there are some perhaps annoying glitch sounds in the attached recording. The volumes are normalized to limit loud spikes, as they w...

Ok, this is brilliant. @sirocyl.bsky.social set up a DTMF bomb on their voicemail message to spam DTMF tones to spammers and jam up their PBX systems. They accidently broke Ikea.
cohost.org/sirocyl/post...

2 0 1 0
1 year ago

β€œif you don’t have a family then make one” okay fine im making an ai family for the holidays

3 1 0 0
1 year ago

No I haven't had to log in since creating my account πŸ€·β€β™‚οΈ

0 0 0 0
1 year ago

@fixit42.bsky.social Heya FixIt! πŸ’œ

0 0 0 0
1 year ago

the friends of cabal starter pack!
go.bsky.app/JAR9jhy

9 6 0 0
1 year ago

No, not personally. This was one of the challenges on OWASP's WebGoat, and I figured I'd make a post about it.

0 0 0 0
1 year ago

@owasp.org too

0 0 0 0
1 year ago

@johnhammond.bsky.social should definitely be on this list. He puts out great content.

0 0 0 0
1 year ago
Preview
GitHub - WebGoat/WebGoat: WebGoat is a deliberately insecure application WebGoat is a deliberately insecure application. Contribute to WebGoat/WebGoat development by creating an account on GitHub.

Shout out to @owasp.org and github.com/WebGoat/WebG... for putting together this great example!

2 0 0 0
1 year ago

Tips to stay safe from cookie hijacking:
βœ… Websites: Use random, encrypted session cookies over HTTPS.
βœ… Users: Log out after use, enable MFA, and avoid untrusted networks. Protect your cookies and keep hackers out! πŸ”

0 0 1 0
1 year ago
Post image

We intercept the login request as Admin, swap in the cookie we created for Tom, and boom β€” we're logged in as him! πŸ•΅οΈ This is cookie hijacking in action. Weak session cookies can expose accounts. Secure cookies save lives! πŸ›‘οΈ

1 0 1 0
1 year ago
Post image Post image

The decoded cookies reveal plain text:
Webgoat: nzozZtxkdKtaogbew
Admin: nzozZtxkdKnimda
Reversing these strings, we see the username is reversed at the end.
To impersonate Tom, we reverse β€œTom,” encode it in hex, then Base64. Crafting Tom’s session cookie lets us hijack his account! 😱

1 0 2 0
1 year ago
Post image

Authentication cookies like spoof_auth are often Base64 encoded. If predictable, they can be exploited! Logging in with credentials we know of such as Webgoat and Admin, we find:
Webgoat: NmU3YTZm...
Admin: NmU3YTZm...
Decoded, these cookies reveal hex patterns. Time to exploit them! πŸ”“

1 0 1 0
1 year ago

What is cookie hijacking? πŸͺπŸ”’
Authentication cookies keep you logged in, but if they're predictable, hackers can use them to impersonate you. Let’s explore how a vulnerable site can be exploited to log in as someone else. Stay tuned! πŸ•΅οΈβ€β™‚οΈ

5 0 1 0
1 year ago
-----BEGIN PGP MESSAGE-----hQIMA3PiNz2hRYmGAQ/+IAKjSSRVXEY4bFVp0Q9uPpZy1a/Zx - Pastebin.com Pastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.

@gachikuku.bsky.social
pastebin.com/mhm4u0Mk

2 0 1 0
1 year ago

@bryanbrake.bsky.social you may be interested in this starter pack.

1 1 0 0
1 year ago

@jameskettle.com has put together a great starter pack for bug bounty hunters and InfoSec creators on BlueSky. #infosec #bugbounties #contentcteators
go.bsky.app/GD7hKPX

1 0 1 0