Tor Combined with VPNs – Twitter Thread
submitted by /u/McJvck [link] [comments]
submitted by /u/McJvck [link] [comments]
Are there any known methods of taking a video feed and falsifying it on an ethernet based camera system?
There’s an employee that uses things like kali linux OS and miscellaneous hak5 devices and has previously gained access to the companies network… so I guess they could maybe be considered “a hacker”. The employee reclines in the office all night and probably sleeps, but is never caught. You can’t open the door to the offices without waking them up, and you can’t bust them sleeping because they’re awake by the time you get to their door within the offices.
There’s a Lorex video system with an extra channel, but it would be installed in an area where they would have direct access to the ethernet cord and no supervision. Is it possible for them to fake a video feed so that if I’m viewing the feed I see a fake video loop?
I’ve seen there are ways that people have faked video feed using OSB on ZOOM and wanted to know if there are any known methods that I myself am unaware of that could be used to provide a fake video feed to the NVR. I wouldn’t say we’re dealing with Mr. Robot, but they’re definitely not your average joe.
submitted by /u/anotherdumbschmuck
[link] [comments]
I was wondering what do people usually do with the data breaches they download from forums like breached. The databases have lots of personal information like names, emails, phone numbers but obviously almost never passwords due to encryption. So I was curious trying to figure out what are they mostly used for.. I doubt it’s just for educational purposes, I bet people want to make money off it.
Are they going after the email lists to do some spamming/phishing? I’m just a curious beginner so that’s the only explanation I could think of
submitted by /u/quietestman
[link] [comments]
Censys found 30,000 internet-facing QNAP appliances potentially impacted by a recently disclosed critical code injection flaw. On January 30, Taiwanese vendor QNAP released QTS and QuTS firmware updates to address a critical vulnerability, tracked as CVE-2022-27596 (CVSS v3 score: 9.8), that affects QNAP NAS devices. A remote attacker can exploit the vulnerability to inject malicious code […]
The post Over 30k Internet-Exposed QNAP NAS hosts impacted by CVE-2022-27596 flaw appeared first on Security Affairs.
I usually saw stuff at the beginning of CLI but people usually not explained what it is so Im want to know. I saw this for example : maxwell@villa:[maxwell]$ echo “random stuff” random stuff What I want to ask is what the stuff at the beginning, the st…
Cybersecurity researchers have issued an alert of hackers using the Microsoft Visual Studios Tools for Office (VSTO) to conduct hacking campaigns. VSTO can be compromised by threat actors to achieve persistence and to run code in the victim machines us…
what are the malicious ways to use esp82 besides esphishing? submitted by /u/Omoica [link] [comments]
Let me explain: I have an http server that handles requests id like to make available to others to connect to. I set up port forwarding via mullvad, however I can’t forward my http port (443) to mullvad’s forwarded port (55077). How can I locally chang…
SANS has their SEC554 course which is supposed to be good. Is there anything else that focuses on this topic? submitted by /u/faguzzi [link] [comments]
https://bbms.physiotherapie-birnbaum.de/creative-xp-glitch.html
Unclear what exactly it achieves, but I can’t seem to sandbox it & I’m not sure if it’s malicious enough to steal any info & or give access right off the jump, or it’s just some ad pusher redirect. I have noticed, however, that this domain in particular has TONS of other links similar to it under the guise of HTML links.
submitted by /u/VelothYT
[link] [comments]