Hi there! I used to work with elders and their families. In my time, I saw a lot of scams, fraud, and other devious means of pilfering money. I wanted to write a short guide for anyone who might have a bit of knowledge about this stuff, but don’t know where to begin with helping a loved one.
First and foremost, I want to thank you for being the one to bear the weight of helping with this. It’s not easy, it’s not fun, and can sometimes cause other problems down the road. …
Hey there, here’s a quick bit of info about switches that are currently unauthenticated and serving traffic all over the place.
The Shodan dork for these is: https://www.shodan.io/search?query=eHTTP
Note that most do have authentication, and this write up focuses on ones that have no auth. I have identified 850+ switches that are currently unauthenticated on the web UI.
There are three versions of the web UI that are accessible from port 80. The web UI may be configured to use a different port, so it’s worth checking scan results.
/html/nhome.html is the classic version of the Web UI
Hey y’all, thanks for all the support ! I didn’t realize so many people would think this sort of coding was as cool as I do.
In the previous write up, the concept of binary golf was established, executing a binary in as few bytes as possible. There’s quite a lot of history in the realm of “size coding”, and extreme assembly optimization. The people who pioneered and later weaponized these approaches did some amazing work to really map out what the limitations of the processor actually are, and some wild ways of making things happen.
Greetings everyone, and welcome to part two of the Binary Mangling series. In our last installment, we took a look at the basics of what an ELF binary is, how it’s laid out, and the bare minimum needed to execute some raw machine code. We also did a little bit of mangling, by hand optimizing our binary in a hex editor to put things where they aren’t supposed to go.
In this installment, we are going much, much deeper, to challenge the kernel with a clown car of barely valid bytes to test the limits of the ELF format itself.
Okay, so you want to see how small you can make a 64 bit binary. In the age of giant bloated applications full of impossibly convoluted machine instructions, eating up your memory and disk space, it’s nice sometimes to get down to the lowest of low levels and create something so tiny, that you know what every single bit is doing and it’s purpose. To do so, we need to employ some standard tricks and a little creativity to get us down there.
Let’s start with a really simple program that prints a string in the terminal! I chose these…
New twitter is @netspooky