101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

485
active users

#Payloads

0 posts0 participants0 posts today
Dendrobatus Azureus<p><span class="h-card"><a href="https://planetearth.social/@cgerhard" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cgerhard</span></a></span> <span class="h-card"><a href="https://mastodon.neilzone.co.uk/@neil" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>neil</span></a></span></p><p>It's gotten so bad, that the only way you are certain, that your television will not squeal on you, is by making sure that you <em>never ever ever</em> let it go on the internet, because if you do <em>it will</em> just <em>create a tunnel</em> report to its Masters and if you close that tunnel it will just create others</p><p><strong>Smart TV's and IOT devices have payloads just like malware!</strong></p><p><a href="https://polymaths.social/tags/enshittification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Enshittification</span></a> <a href="https://polymaths.social/tags/payloads" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>payloads</span></a> <a href="https://polymaths.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
postmodern<p>Added integration tests for <a href="https://github.com/ronin-rb/ronin-payloads/tree/0.3.0#readme" rel="nofollow noopener" target="_blank">ronin-payload</a>'s new payload encoders and discovered that Python2 does not support evaling a <code>print</code> statement. Python3 however added support for this.</p><pre><code>&gt;&gt;&gt; eval('print "test"')<br>Traceback (most recent call last):<br> File "&lt;stdin&gt;", line 1, in &lt;module&gt;<br> File "&lt;string&gt;", line 1<br> print "test"<br> ^<br>SyntaxError: invalid syntax<br></code></pre><p>Lol, wtf, how did people seriously tout Python2 over Python3. Even Ruby and JavaScript are more consistent.</p><p><a href="https://infosec.exchange/tags/python2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>python2</span></a> <a href="https://infosec.exchange/tags/payloads" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>payloads</span></a> <a href="https://infosec.exchange/tags/roninrb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>roninrb</span></a></p>
postmodern<p>When you refer to a UNIX/Linux/macOS/BSD or <code>sh</code>/<code>bash</code>/<code>zsh</code> command payload, what do you common refer to them as?</p><p><a href="https://infosec.exchange/tags/namingthings" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>namingthings</span></a> <a href="https://infosec.exchange/tags/payloads" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>payloads</span></a></p>
postmodern<p>and how would you group Windows PowerShell command payloads in a directory structure of other payloads?<br><a href="https://infosec.exchange/tags/namingthings" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>namingthings</span></a> <a href="https://infosec.exchange/tags/payloads" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>payloads</span></a></p>
postmodern<p>How would you group Windows <code>cmd.exe</code> command payloads in a directory structure of other payloads?<br><a href="https://infosec.exchange/tags/namingthings" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>namingthings</span></a> <a href="https://infosec.exchange/tags/payloads" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>payloads</span></a></p>
ronin-rb<p>Ronin 2.1.0 has finally been released! Lots of new stuff in this release, like new database tables, new payloads, <a href="https://github.com/ronin-rb/ronin-recon#readme" rel="nofollow noopener" target="_blank">ronin-recon</a>, <a href="https://github.com/ronin-rb/ronin-app#readme" rel="nofollow noopener" target="_blank">ronin-app</a>, and more.<br><a href="https://ronin-rb.dev/blog/2024/07/22/ronin-2-1-0-finally-released.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ronin-rb.dev/blog/2024/07/22/r</span><span class="invisible">onin-2-1-0-finally-released.html</span></a><br><a href="https://infosec.exchange/tags/ronin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ronin</span></a> <a href="https://infosec.exchange/tags/roninrb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>roninrb</span></a> <a href="https://infosec.exchange/tags/ruby" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ruby</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/securitytools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securitytools</span></a> <a href="https://infosec.exchange/tags/recon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>recon</span></a> <a href="https://infosec.exchange/tags/payloads" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>payloads</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a></p>
postmodern<p>How useful would you say a command injection payload that exfils a single file via <code>curl</code> to a webserver might be? Do you think it should be built-in to a framework or offered as a 3rd-party thing?<br><a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/exploitdev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploitdev</span></a> <a href="https://infosec.exchange/tags/payloads" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>payloads</span></a></p>
ronin-rb<p>You've probably heard of the <code>xz-utils</code> backdoor by now. You shouldn't submit backdoors to Open Source projects... unless it's to <a href="https://github.com/ronin-rb/ronin-payloads" rel="nofollow noopener" target="_blank">ronin-payloads</a>! We're always looking for <a href="https://github.com/ronin-rb/ronin-payloads/issues?q=is%3Aissue+is%3Aopen+label%3Abuiltin-payloads" rel="nofollow noopener" target="_blank">more payloads</a>!<br><a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/ruby" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ruby</span></a> <a href="https://infosec.exchange/tags/payloads" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>payloads</span></a> <a href="https://infosec.exchange/tags/shellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shellcode</span></a> <a href="https://infosec.exchange/tags/webshells" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webshells</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/corny" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>corny</span></a> <a href="https://infosec.exchange/tags/shamelesspromotion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shamelesspromotion</span></a></p>
postmodern<p>TIL <a href="https://en.wikipedia.org/wiki/Nashorn_(JavaScript_engine)" rel="nofollow noopener" target="_blank">Nashorn</a> is a JavaScript VM written in Java and gives direct access to Java classes. There's even a reverse shell payload for it, which has apparently been improved/fixed by this chap <span class="h-card" translate="no"><a href="https://infosec.exchange/@mosesrenegade" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mosesrenegade</span></a></span> who's on here. <br><a href="https://gist.github.com/mosesrenegade/dd565dba9360a84b3c2d6e44b8381dbd" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gist.github.com/mosesrenegade/</span><span class="invisible">dd565dba9360a84b3c2d6e44b8381dbd</span></a><br><a href="https://infosec.exchange/tags/reverseshells" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseshells</span></a> <a href="https://infosec.exchange/tags/nashorn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nashorn</span></a> <a href="https://infosec.exchange/tags/payloads" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>payloads</span></a></p>
postmodern<p>For a tool that compiles C payloads, how would you prefer to specify the cross-compiler?<br><a href="https://infosec.exchange/tags/payloads" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>payloads</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/redteaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteaming</span></a> <a href="https://infosec.exchange/tags/exploitdev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploitdev</span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"🔍 Deep Dive into Malvertising: Techniques &amp; Tactics 🕵️"</p><p>The malvertising campaign under the spotlight uses a unique fingerprinting method to distribute time-sensitive payloads. Malicious ads target software like Notepad++ and PDF converters. A two-tier filtering system is in place: 1️⃣ IP checks to discard VPNs and non-genuine IPs, 2️⃣ System fingerprinting to detect VMs. Those who pass are directed to a decoy site resembling the real Notepad++ website. The payload is a <code>.hta</code> script, uniquely named for each victim, making it time-sensitive. This level of sophistication in malvertising campaigns is alarming, indicating a shift in tactics and techniques by threat actors.</p><p>Source: <a href="https://www.malwarebytes.com/blog/threat-intelligence/2023/10/the-forgotten-malvertising-campaign" rel="nofollow noopener" target="_blank">Malwarebytes Blog</a> by Jérôme Segura</p><p>Tags: <a href="https://infosec.exchange/tags/MalvertisingDeepDive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalvertisingDeepDive</span></a> <a href="https://infosec.exchange/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreats</span></a> <a href="https://infosec.exchange/tags/Evasion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Evasion</span></a> <a href="https://infosec.exchange/tags/Fingerprinting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fingerprinting</span></a> <a href="https://infosec.exchange/tags/Payloads" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Payloads</span></a> <a href="https://infosec.exchange/tags/CyberSecurityTrends" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityTrends</span></a> 🧐🔗🚫</p>
Avoid The Hack!<p>3CX Supply Chain <a href="https://mastodon.social/tags/Attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Attack</span></a> Campaign </p><p>Trojanized 3CXDesktopApp installers are running rampant in a supply-chain attack campaign.</p><p>Dropping multiple <a href="https://mastodon.social/tags/payloads" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>payloads</span></a>, including information stealers, which can transfer account credentials and wallet keys directly to the attackers.</p><p><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> </p><p><a href="https://www.zscaler.com/security-research/3CX-supply-chain-attack-analysis-march-2023" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">zscaler.com/security-research/</span><span class="invisible">3CX-supply-chain-attack-analysis-march-2023</span></a></p>
Spaceflight 🚀<p>Space-based solar ☀️ power (<a href="https://techhub.social/tags/SBSP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SBSP</span></a>) - beaming clean <a href="https://techhub.social/tags/energy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>energy</span></a> to <a href="https://techhub.social/tags/Earth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Earth</span></a> from orbital <a href="https://techhub.social/tags/solar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>solar</span></a> farms.</p><p>The <a href="https://techhub.social/tags/UK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UK</span></a> 🇬🇧, <a href="https://techhub.social/tags/US" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>US</span></a> 🇺🇸 and <a href="https://techhub.social/tags/Chinese" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chinese</span></a> 🇨🇳 governments are funding research, <a href="https://techhub.social/tags/ESA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESA</span></a> 🇪🇺 has approved a 3-year study named <a href="https://techhub.social/tags/Solaris" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Solaris</span></a>.</p><p>One reason that <a href="https://techhub.social/tags/SPSB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SPSB</span></a> is back on the agenda is the plummeting <a href="https://techhub.social/tags/cost" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cost</span></a> per kilogram of launching <a href="https://techhub.social/tags/payloads" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>payloads</span></a> into <a href="https://techhub.social/tags/space" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>space</span></a>.<br>Thanks to <a href="https://techhub.social/tags/reusable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reusable</span></a> <a href="https://techhub.social/tags/rockets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rockets</span></a>, this figure has fallen nearly 20-fold in two decades, while solar panels have become <a href="https://techhub.social/tags/lighter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lighter</span></a>. <a href="https://www.abc.net.au/news/science/2022-12-20/space-based-solar-power-europe-funding-research/101733558" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">abc.net.au/news/science/2022-1</span><span class="invisible">2-20/space-based-solar-power-europe-funding-research/101733558</span></a></p><p><a href="https://techhub.social/tags/Microwave" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microwave</span></a> power transmission <a href="https://en.wikipedia.org/wiki/Space-based_solar_power#Microwave_power_transmission" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/Space-ba</span><span class="invisible">sed_solar_power#Microwave_power_transmission</span></a></p><p>Picture : Tim Peake &amp; Tim Kopra replace a failed voltage regulator at the <a href="https://techhub.social/tags/ISS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ISS</span></a> <a href="https://commons.wikimedia.org/wiki/File:ISS-46_EVA-1_(c)_Timothy_Peake.jpg" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">commons.wikimedia.org/wiki/Fil</span><span class="invisible">e:ISS-46_EVA-1_(c)_Timothy_Peake.jpg</span></a></p><p><a href="https://techhub.social/tags/SpaceEnergy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SpaceEnergy</span></a> <a href="https://techhub.social/tags/SpaceSolar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SpaceSolar</span></a></p>
Reed HHW <a href="https://twitter.com/threatpost/status/1398268237595488257" rel="nofollow noopener" target="_blank">♲</a> @<span class=""><a href="https://twitter.com/threatpost" class="u-url mention" rel="nofollow noopener" target="_blank"><span class="mention">threatpost@twitter.com</span></a>:</span><blockquote>The mass email campaign delivers malicious URLs with <a href="https://libranet.de/search?tag=payloads" rel="nofollow noopener" target="_blank">#payloads</a> enabling network persistence so the actors can conduct further nefarious activities. <a href="https://libranet.de/search?tag=cybersecurity" rel="nofollow noopener" target="_blank">#cybersecurity</a> <a href="https://threatpost.com/solarwinds-nobelium-phishing-attack-usaid/166531/" rel="nofollow noopener" target="_blank">threatpost.com/solarwinds-nob…</a></blockquote>