[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip / qa] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File: 1719760389836754.png (34 KB, 998x731)
34 KB
34 KB PNG
>save .mp4
>see this in 5 minutes
>>
File: 1708980923651604.jpg (76 KB, 541x541)
76 KB
76 KB JPG
>>103255822
HIROSHIMOOOOOOOOOOOOOT
>>
>what are backups
>>
>pay me $97,000 to get your anime jpegs back
>>
>>103255940
he might have some very rare pepes
>>
>>103255822
lol, lmao even.
>>
>>103256061
where's the funny
>>
>>103255822
>AES-256
>RSA-2048
nothingburger, can be decrypted without even trying lmao
>>
>>103255822
Genuine question, can this actually happen? Can fucking mp4 be the gateway to arbitrary code execution?
>>
>>103256088
can you crack my dads bitcoin private key
>>
>>103255822
>2016
>>
File: oompa_loompa_10197.png (203 KB, 500x500)
203 KB
203 KB PNG
>>103255822
Ransom increase time: 2016...
>>
>>103256088
>nothingburger, can be decrypted without even trying lmao
Source? I have masturbation videos of myself encrytpted with AES-256
>>
>>103256101
Yes, via exploiting vulnerabilities in media players, same with image viewers. It's rarer today for these kinda of vulns to exist, especially in wells established software, but it can happen.
>>
>>103256101
Any media player can be exploited. That's why we wrap that rascal with Firejail or Bubblewrap that is using Mandatory Access Controls.
>>
>>103256101
windows explorer has displaying extensions off by default
iirc they would name the file s01e01.mp4.exe and in windows you wouldn't see the .exe part if you never changed that setting
>>
>>103256075
babyduck syndrome
>>
>>103256300
>windows explorer has displaying extensions off by default
I'm fairly certain it's not...
>>
>>103255822
>windows
lel
>>
>>103255822
VLC'd
>>
File: 1731671772344175.png (158 KB, 652x767)
158 KB
158 KB PNG
>>103256101
>>103256233
some pedo using tails os got caught years ago thanks to a vulnerability in the media player that was included. feds sent him a video, he tried to play it and it leaked his real ip iirc kek
>>
>>103256101
>>103256541
They also spent an obscene amount of money to discover and execute that vulnerability.
Just to put it into perspective, it's possible but not easy. It's not basic script kiddie stuff.
>>
>>103256601
indeed. lots of time, money and manpower just for one pedo
>>
>>103255822
picrel is one of my greatest fears. I have some backups, but they are old, and not even air-gapped.
>>
>>103256541
tails was coerced long ago by both French police and interpol to weaken the settings of the browsers and players it comes with.

>>103256601
That was a show so that people would keep using tails. Same as the show that apple put on to make it look like its hard to access a locked or powered off iPhone when in fact all one needs is a JTAG dongle. There are now decent sized communities of hackers making these dongles and a couple companies that sell them to cops.
>>
>>103257030
>powered off iPhone when in fact all one needs is a JTAG dongle. There are now decent sized communities of hackers making these dongles and a couple companies that sell them to cops.
Is there more info about it? How are they exactly opening the device?
>>
>>103255916
>waits for you to backup
>lock your backups too

>>103256101
WebP was recently but it got patched before a disaster.

>>103256461
Yes it is(was). I had to turn them on every time. A usual example of making things supposedly retard friendly actually making things more complicated.

>>103256541
That's why Whonix > Tails. Reasonably assuming a VM vuln is way less likely than a random gstreamer gnome video player app having one.
>>
Does that mean we have metadata now?
>>
File: pb.gif (9 KB, 640x480)
9 KB
9 KB GIF
>>103256461
Fuck off you imbecile moron.
>>
>>103257237
where's all teh data
>>
>>103257165
would they get spawncamped like they do in prison?
>>103257046
>>103257030
probably just his schizo theory, jtag devices aren't a secret in reverse engineering and modern smartphones have fucktarded security chips that the feds definitely don't have a backdoor into that have mitigations against being shot with laser beams, unless he knows something and can leak it to us pls
>>
>>103257868
>probably just his wapadoodle theory
No all phones leave JTAG debugging enabled. There are communities of nerds building these and seeing what debug functions they can access. They are long past unlocking phones.
>>
>>103255822
when this happens I put in a new hard drive
what's the problem
>>
>>103256541
>glowie try not to upload 'p challenge (impossible)
>>
>>103257237
nope
you will never have metatatatatada
you will never have EXIF dataatatata
too many selfdoxxing morans
>>
>>103257900
>you will never be a metadata
>>
File: cellebrite.png (242 KB, 1978x1378)
242 KB
242 KB PNG
>>103257888
he might be on to something.........
>>
>>103257134
WebP RCE exploit was used by certain government intelligence agencies to target political adversaries, I am convinced still to this day no one else knows how to reproduce it.
>>
>>103256541
iirc they planted a specially prepared cp file, with video container able to have hyperlink sections for some metadata like posters or subtitles. the link pointed to their own server and they just assumed the pedo had video player set to download such content automatically and would play it on a pc not routing all network traffic via tor. their assumption was correct. it wasn't vuln leading to rce, just a proper support of file format and unsafe defaults.
>>
>>103257920
You can find videos of the nerds unlocking phones, pulling debug info, accessing all the files, etc... Cellebrite just makes it easy for non technical people (patrol cops) to grab everything (for money of course).
>>
>>103258018
https://www.theregister.com/2017/02/06/microsoft_drm_and_tor/
it was a wmv signed with special cert, which the moron opened with windows media player.
>>
>>103255822
How does this shit even get through browsers and antiviruses these days?
>>
>>103256300
okay so that's an .exe., not an .mp4, so not germane to the question
>>
>>103255822
>>
>>103258059
only see them doing it on the centennial era iPhones, apple said wontfix to one of the vulnerabilties the guy in the video below just found (government has a vulnerability using that or sum shit). but it looks like the nerds might be getting close, but I still don't see any BFU unlocks
https://www.youtube.com/watch?v=cFW0sYSo7ZM
>>
>>103258292
works on all phones, well all Droid/iPhone that is. Also using JTAG one can tell the phone that the correct PIN has been entered. The enclave is unlocked and encryption is decrypted.
>>
>>103255822
How did these things ever work? There really wasn't a way around them? Just take out the hard drive and grab the files via another computer.
>>
>>103258689
The files are actually encrypted, anon. If they wanted to do it very quickly they could have it encrypt every tenth of a file and scramble it that way.
>>
>>103258396
seems it was possible on old Google Pixel phones (Titan M1) in 2022, but not past pixel 6 with the Titan M2 which seems to be independent from the rest of the system almost entirely.
https://blog.quarkslab.com/attacking-titan-m-with-only-one-byte.html
i don't know shit about iPhones because they didn't try to make news out of their security chip upgrades but I'm pretty sure they do the same thing
send if you have a video on the newer ones THOUGH i love watching those
https://youtu.be/dSgSnYPgzT0
>>
>>103258707
They decrypt first. It takes all of 10 milliseconds with a JTAG command to say that the PIN was correctly entered. Decrypted. Simple as.
>>
>>103258728
So they don't randomize the encryption key?
>>
>>103258707
So if you clicked something and this ransomwear happened, how long would it take ti fuck everything up?
>>
>>103258762
Key material doesn't matter. Its in an enclave protected by your PIN. The phone just has to be told the PIN was entered correctly.
>>
>>103258764
If they knew what they were doing, it would pop up after it was done.
>>
>>103258772
I'm not familiar with phone malware. I was referring to PCs.
>>
>>103258817
he got confused while talking to me about phone vulnerabilities or something
>>103258724
>>
>>103256625
The idea is to catch one dead to rights and then flip them to catch more
>>
>>103258764
Depends, it won't actually display anything to the user until it has finished its routine. The speed which it happens depends on number of files, file size, your hardware, etc. Ransomware will target specific directories and file types (docs, databases, spreadsheets, pictures, etc) to minimise the amount of work it has to do whilst still causing the most functional loss for the victim. The longer it has to run, the more time you have to notice something is awry before it finishes its routine
>>
File: fuck it up.png (51 KB, 127x188)
51 KB
51 KB PNG
Can this happen if I download the .mp4 from here now that 4chan accepts .mp4?
>>
>>103258133
Schizos BTFO.
>>
>>103256088
you have no idea what youre talking about
>>
>>103256541
this was patched btw
>>
>>103257900
That's not why metadata is gone. It's gone because of the extension people were using to add links and secondary images inside the metadata.
>>
>>103257237
>>103257900
exif was removed because stupid niggers took photos from their dads camera saying they'll shoot up their school tomorrow, the exif data had the gps location and the dads name, and the people on /b/ noticed it and called the cops on him.

not kidding, but this was back in like 2006.
>>
what's a tool to remove all metadata from my archives
>>
>>103261071
Use mediainfo and exiv2 to find out what's there to begin with
>>
>>103261017
and metadata didn't start getting scrubbed until 2020 when the third-eye extension got popular and let people post images with entire other images embedded inside the metadata and links to things from other sites.
>>
>>103257237
>>103257900
>>103257907
>>103260922
>>103261017
read byte 0x69 to 0xb3 of this video
>>
File: Alucard i will not.png (164 KB, 779x198)
164 KB
164 KB PNG
>>103263096
>>
>>103263096
Don't do it guys it creates nerve gas
>>
File: images.jpg (6 KB, 259x194)
6 KB
6 KB JPG
your computer sucks if its vulnerable to ransomware
>>
>>103263096
What?
How?
>>
>>103263167
because modern phones are bloated and useless and worse and just plain bad and useless
>>
>>103263096
Cool magic trick. Now do it with a video that actually looks like a normal mp4 or else it doesn't count.
>>
>>103255916
Backup me arse. Start fresh.



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.