Conversation
Notices
-
(mint@ryona.agency)'s status on Saturday, 25-Mar-2023 22:43:35 JST @lina @dushman @meso @Oliver @paulo @pawlicker @pomstan In more ways than one.
Screenshot_20230325_164321.png-
Lina Inver:z:e :mur_close: :nuts: (lina@eientei.org)'s status on Saturday, 25-Mar-2023 22:55:10 JST Lina Inver:z:e :mur_close: :nuts: @Oliver @dushman @meso @paulo @pawlicker @mint @pomstan thats literally what hacking always has been, it's either leaked passwords, commonly used passwords, guessing or bruteforcing -
Cent (oliver@boks.moe)'s status on Saturday, 25-Mar-2023 22:55:11 JST Cent @mint @dushman @meso @paulo @pawlicker @lina @pomstan the idea of a ""hacker"" going and googling like "generally used passwords" is so funny. -
pawlicker (pawlicker@boks.moe)'s status on Saturday, 25-Mar-2023 22:55:44 JST pawlicker @lina @dushman @meso @Oliver @paulo @mint @pomstan using obscure aix exploits from the SysV era to hack into people
https://rhinosecuritylabs.com/research/unix-nostalgia-aix-bug-hunting-part-2-bellmail-privilege-escalation-cve-2016-8972/ likes this.
-