/t/ - Technology

Welcome to the WIRED

Posting mode: Reply
Visit J-List - Your Favorite Online Shop and Friend in Japan
Get the Newest Figures from J-List - Your Favorite Online Shop and Friend in Japan

[]
01/20/25 A total rewrite for the site is in progress. Read more.
05/21/24 Happy birthday hikari3! (News post)
12/21/23 Recent news post: Check here. Also, new board added: /i/ - Oekaki.
11/25/23 Accepting banner submissions; check this thread for more details.
11/17/23 New blotter! Use this to keep an eye for small updates.
[Show All]


Read-Only. Visit the all-new hikari3.ch


(191.74 KB 960x1000 haxor.jpg)
Cybersecurity Thread Anonymous 04/09/2025 (Wed) 22:56:40 No. 1155
This thread is for all things Cybersecurity General topics: OPSEC, Hacking, Offensive & Defensive security, Breaches, Open Source Intelligence, MalDev, Cryptography, Red-teaming VS Blue-teaming, Reverse engineering, etc. Useful resources: • https://git.hackliberty.org/hackliberty.org/Hack-Liberty-Resources#securityhttps://github.com/Hack-with-Github/Awesome-Hacking Learn more: • https://picoctf.org/https://tryhackme.com/https://www.hackthebox.com/https://portswigger.net/web-security
>>
>>
(212.22 KB 700x500 1744266948987649.png)
>>1155 Thanks for posting this thread on here since /sec/ general on 4/g/ is full of garbage posts. >>1156 Thanks, the first link has some pretty interesting stuff.
>>
If anyone is interested, here's how 4chan got hacked through a file upload vulnerability: Apparently the vulnerability stemmed from certain boards allowing PDF uploads without proper file validation—the system didn't verify whether the uploaded file was a legitimate PDF. Once uploaded, the file was processed by an outdated version of Ghostscript (dating back to 2012) to generate a thumbnail. The attacker exploited this by crafting a malicious PDF containing specific PostScript commands, ultimately gaining shell access to the system.
>>
(296.78 KB 891x416 haxor.png)
>>
Me websit get hacked HALP
>>
>>1178 you gotta update ur site mr hiroshimoot
>>
>>1178 >>1179 I don't think hiroshima-san even knows about it
>>
Since we're on the subject, I've read somewhere that the guy who got in was worming inside for about a year, before nuking the site and doxing the mods. Does anyone know if this is true?
>>
>>1181 he claimed it on sjak party. but no proof i wish he somehow got the whole DB. i want to see my bans from back in the day
>>
>>1182 >the whole DB He said he wouldn't leak anything about the users I have seen some ban summaries be posted though?
>>
>>1155 Really useful site for bug bounty hunters: https://lostsec.xyz/
>>
My goal is to finish the CPTS path and pass the exam by the end of summer
>>
(57.80 KB 852x712 1709003713572767.jpg)
>>1431 Good luck
>>
I did my first crackme. I did it with Binary ninja, it was quite easy, I only had to modify a couple of values in assembly mode and modify some conditions. happy If anyone is interesed, you can find a lot of crackmes here: https://crackmes.one/
>>
can anyone point to past haskell vulnerabilities? language specific, focused. (for educational purposes) I've looked their bulletin, and saw only 3rd party issues with XZ, lib supply chain attack.
>>
>>1475 haskell is flawlessdown

Index Catalog Archive Top Reply

Posters: 13


Quick Reply