And furthermore...
Base64 is not encryption.
Base64 is not encryption.
Base64 is not encryption.
Base64 is not encryption.
Base64 is not encryption.
Base64 is not encryption.
Base64 is not encryption.
Base64 is not encryption.
Base64 is not encryption.
Base64 is not encryption.
A scan is not a pentest.
A scan is not a pentest.
A scan is not a pentest.
A scan is not a pentest.
A scan is not a pentest.
A scan is not a pentest.
A scan is not a pentest.
A scan is not a pentest.
A scan is not a pentest.
A scan is not a pentest.
A scan is not a pentest.
So one time... nmap took down a large manufacturer of... things. All the ICS and scada went kaboom.
nmap -sT -T3. The destroyer of manufacturing everywhere.
RT if you're a pen tester who has been told by a client that nmap scans on their public-facing systems posed unacceptable operational risk. Quote-tweet to tell a story of how a free tool scan actually did knock down a production server, whether you were blue team or red team 💜
If you use Google Chrome, go to
chrome://flags/
#autoplay
-policy
and set it to "Document user activation is required."
Boom: no more auto-playing videos.
You're welcome.
#hackerproblems
How it started: This hotel has a TV with a barcode I can scan to control the TV from my phone???
How's it going:
(screenshot edited to remove most of the cookie)
This is what it's like when people ask me how I computer so hard.
A lot of screwing up, thinking about about it, and doing it until it's right, for thirty years.
Wanna see something funny?
Put GPT-5 in your bio and watch the intrusion attempts from several countries I won't mention come rolling it on yours and all your loved one's accounts.
It's awesome. lol
I called this. Nessus just yanked the API and multiple users from Nessus Professional.
Say goodbye to easy/automated vulnerable management and discovery. 🤯
via
@leonov_av
Everyone freaking out over Automated Mass Exploiter, forgets I was scanning a single port for banners across /0 in 45 minutes.
Like.. Guys. This stuff is already easy.