[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology

Name
Options
Comment
Verification
4chan Pass users can bypass this verification. [Learn More] [Login]
File
  • Please read the Rules and FAQ before posting.
  • You may highlight syntax and preserve whitespace by using [code] tags.

08/21/20New boards added: /vrpg/, /vmg/, /vst/ and /vm/
05/04/17New trial board added: /bant/ - International/Random
10/04/16New board for 4chan Pass users: /vip/ - Very Important Posts
[Hide] [Show All]


[Advertise on 4chan]


File: 1696342843575.jpg (335 KB, 1920x1080)
335 KB
335 KB JPG
>>106836577
"With software there are only two possibilities: either the users control the program or the program controls the users."
--Richard Stallman

>Cyberpunk
The FAQ: https://sizeof.cat/post/cyberpunk-faq/
What is /cyb/erpunk?: https://pastebin.com/pmn9vzWZ
How do I into /cyb/erpunk?: https://pastebin.com/5tpNFQds
Huge list of cyberpunk media: https://sizeof.cat/post/cyberpunk/
The cyberdeck: https://pastebin.com/7fE4BVBg
Cyberlife: https://jinteki.industries/files/cyberlife.7z
Bibliothek: https://www.mediafire.com/folder/4m5hd2065hde8/Bibliothek

>Privacy
Tools: https://www.privacyguides.org/en/tools/
Hitchhiker's Guide: https://anonymousplanet.org/guide/
Hardware: https://ryf.fsf.org/products
Frontends: https://igwiki.lyci.de/wiki/Privacy_friendly_frontends
OSINT Guide: https://inteltechniques.com/index.html
Firmware: https://libreboot.org/
RMS on Facebook: https://stallman.org/facebook.html
Have I Been Pwned: https://haveibeenpwned.com/

>Security
"Shit just got real": https://pastebin.com/rqrLK6X0
Cybersecurity basics: https://igwiki.lyci.de/wiki/Cybersecurity_-_/sec/_guide
Basics and armory: https://igwiki.lyci.de/wiki/Cybersecurity_-_basics_and_armory
Learning/News/CTFs: https://igwiki.lyci.de/wiki/Cybersecurity_-_Learning/News/CTFs
/sec/ PDFs: https://mega.nz/#F!zGJT1QQQ!O-8yiH845GN26ajAvkoLkA
EFF Surveillance Self-Defense: https://ssd.eff.org/
Other library: https://mega.nz/file/UCgEGAjb#rwNcnMAQCUUbSp8supsFvn9QEHCWUW86eLcZa16ZG4Y
>>
>>106913537
Busy week.
>F5 gets popped back in August
>SNMP buffer overflow
>>
>>106913571
>F5 gets popped
At least they didn't publish their private key in documentation. Oh wait . . .
>>
Reposting the updated Data Broker Removal Links:
https://pastebin.com/9tc94g2T
https://pastebin.com/raw/9tc94g2T
>>
>>106913571
Yet too quiet in here.
Solarpunk still running: >>>/sci/16778662
>>
got my 3D printer this week
make sure to remove all the government spyware
stopped working for a couple of days, no idea why
managed to get it working again, it's airgapped so it can't tell the government what im printing
also working on getting property, finally have enough money for a couple of acres, gonna park a caravan on it and get to work
>>
>page 10
>>
Does full packet inpsection only pick up data once you start it or before as well?
>>
>>106919331
Snort, which I used, had to run before it inspected.
>>
I'm interested. I saved the links and I will start reading when I find some time.
>>
>>106919331
>Does full packet inpsection only pick up data once you start it or before as well?
Some enterprise class solutions (ExtraHop comes to mind) have a giant in-memory packet buffer and can start a PCAP midway through a flow and retroactively pull relevant packets from the packet buffer once you've decided "yes, I'd like those packets".
If you think about it, it makes sense.
>SYN - don't care, could be benign
>SYN-ACK - don't care, could be benign
>ACK - don't care, could be benign
>GET - holy shit, there's a log4shell / jndi in the User-Agent header, grab those packets
>>
http://ankblog2rpsnci3w72l3zggiibu7l5y6nargwgjjnycgizwfdq72zfid.onion
rip an OG
>>
File: 1591594108959-k.jpg (77 KB, 960x929)
77 KB
77 KB JPG
https://blog.nullvoid.me/posts/mercku-exploits/

Critical flaws discovered in #Mercku routers, specifically the M6a model, that could allow attackers to achieve remote code execution with minimal effort.

shodan shows 702 nodes exposed
>>
I have the IDA Pro source code, wat do ?
>>
File: 1739402019865964.jpg (58 KB, 680x680)
58 KB
58 KB JPG
>>106923674
leak it
use onionshare and post link here
>>
>>106923693
Can't do that, I'd be throwing someone under the bus.
I'm thinking of making a femboy themed cracked version.
>>
hexrays .su
>>
>>106923781
this fucking nigger fag axe
>umm *full mouth breath* what do *exhale*
then says
>umm *full mouth breathe* no*exhale*
fuck you fag
>>
Is it possible to decrypt TLS and https?
>>
>>106925475

tls 1.2, sure. 1.3+ uses forward secrecy so technically possible, but harder.
>>
>>106923505
Would it be safer to have pairs of serially connected routers from tywo different companies?
>>
>>106913571
>Busy week.
Seems traffic has moved elsewhere. I had not expected so many would move across to a.c.t
>>
>>106925531
>1.3+ uses forward secrecy so technically possible, but harder.
not really. There are turnkey implementations that will pop 1.3
>still need the private key
>need something that will forward the session key
I've seen it done with as the session key forwarder.
I've also seen it done with PA doing full on break/inspect.
>>
>>106925531
What about aes-128?
>>
Remember to only use technology from countries that you trust
>>
>>106931957
Thanks to globalism, you really don't know where the tech originated.
>>
>>106932979
I guess all devices are going to have global supply chains but still, when you're choosing a piece of tech to use, you're making a choice about which company or people you're supporting. Those people are going to be making decisions about what they allow into their supply chain, and what they don't allow into their supply chain.
>>
=== /sec/ News:
>Thousands of customers imperiled after nation-state ransacks F5’s network
https://archive.is/eOkur
>F5 said a “sophisticated” threat group working for an undisclosed nation-state government had surreptitiously and persistently dwelled in its network over a “long-term.” Security researchers who have responded to similar intrusions in the past took the language to mean the hackers were inside the F5 network for years.
>During that time, F5 said, the hackers took control of the network segment the company uses to create and distribute updates for BIG IP, a line of server appliances that F5 says is used by 48 of the world’s top 50 corporations. Wednesday’s disclosure went on to say the threat group downloaded proprietary BIG-IP source code information about vulnerabilities that had been privately discovered but not yet patched. The hackers also obtained configuration settings that some customers used inside their networks.
>>
>>106933395
>you're making a choice about which company or people you're supporting. Those people are going to be making decisions about what they allow into their supply chain, and what they don't allow into their supply chain
That is what people think until news like >>106933896 come up. In addition to such cases, there are cases with discruntled employees leaving time bombs in the corporate software.
>>
>>106913537
For my new job, I have to use social media for our marketing. What can I do to use it at home without it tying shit together? I can't use a VPN on any of the work devices so that's already fucking me over.
>>
=== /re/ News:
>Hacking A Banned Chinese Security Camera
https://hackaday.com/2025/10/18/hacking-a-banned-chinese-security-camera/
>After powering the camera with a power-over-Ethernet (PoE) adapter [Matt] sets about monitoring network activity with Wireshark. The first data comes from DNS for the host devaccess.easy4ipcloud.com, which whois reports is operated by Alibaba Cloud LLC in California. This is a Chinese owned company with servers in the United States.
>[Matt] covers some basics of TLS and how it works. He then goes on to explain how a Man in the Middle (MITM) attack works at a high level. To setup a MITM attack against the camera [Matt] sets up some port redirections using iptables for ports 443, 15301, 8683, 9898, and 12337 which his Wireshark analysis indicates were being used. His MITM attack works, which means the device is not properly verifying its certificate signing chain.
>[Matt] goes on to reverse engineer the custom UDP protocol used for transmitting video data. He uses a vibe-coded Python program along with ffmpeg for that and manages to reconstruct a few frames of video taken from the UDP packet capture.
>>
>>106929877

if you have the key, anything is possible



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.