I don't wanna get too political, but honestly we should treat 32bit ASM as historical, like 16bit ASM.
"It's 2025, show the kids r8 and r9", β 2pac, All Eyez On Me
"It's 2025, show the kids r8 and r9", β 2pac, All Eyez On Me
π82π―17π€15π7π4π₯3π’2π€2π1π1
This media is not supported in your browser
VIEW IN TELEGRAM
The visual demonstration illustrating cyber security defense against ransomware
π€£137π«‘11π7β€5π2π€2π1π±1π’1
vx-underground
Chat, we are cooked. The 90s is considered old now.
Unrelated, someone asked if I remember "September 9th". They didn't even know the correct date as September 11th.
Also, yes.
Also, yes.
π€£153β€11π’9π4π€3π2π€―1
Twitter has been down for a really long time. Probably like, 4 or 5 hours, dunno.
Elon Musk probably fuming that he can't post every 15 minutes.
Elon Musk probably fuming that he can't post every 15 minutes.
π179π₯21β€15π6π€£6β€βπ₯5π―5π’4π3π2π€1
vx-underground
Creating a GUI interface using Visual Basic, see if I can track an IP address
π¨BREAKINGπ¨
THE X USED IN THE MUSK TWEET ISNT THE SAME X ON THE KEYBOARD. WTF IS THAT WEIRD LOOKING X.
THE X USED IN THE MUSK TWEET ISNT THE SAME X ON THE KEYBOARD. WTF IS THAT WEIRD LOOKING X.
π€―148π€£42π10π€9β€7π₯5π±5β€βπ₯2π€1π€©1π1
Elon Musk did an interview today stating the IP addresses in the X cyber attack (?) originated from "the Ukraine area" (???).
This has resulted in many people believing the the Ukrainian government is responsible for the DdoS attack on X
This has resulted in many people believing the the Ukrainian government is responsible for the DdoS attack on X
π€£176π€17π€―10π6π€5π4π3β€βπ₯2π’1π€1
vx-underground
Elon Musk did an interview today stating the IP addresses in the X cyber attack (?) originated from "the Ukraine area" (???). This has resulted in many people believing the the Ukrainian government is responsible for the DdoS attack on X
Rant / opinion
DdoS attacks can be difficult to attribute especially if it's DdoS-as-a-Service. Additionally, accurate attribution of any offensive cyber operation in mere hours in low.
The likelihood of a state sponsored group performing a DdoS attack on an American social media platform is also extremely low. A DdoS attack wouldn't serve any military objective (or an intelligent one rather).
The broad sweeping statement the DdoS attack came from Ukraine (or the Ukraine area(?), at a moment where many Americans are divided on the Ukraine-Russian conflict, is inflammatory at best, is propaganda at worst. Generally speaking, DFIR needs to performed, external organizations will need to be consulted, you cannot (or rather should not) make a statement regarding the situation at hand while having little to no conclusive evidence for accurate attribution. In other words, an organization typically would not make a statement regarding the origins of an offensive cyber operation without concrete evidence.
tldr sigh, non computer nerds will eat up this crap and spread conspiracy theories and misinformation.
DdoS attacks can be difficult to attribute especially if it's DdoS-as-a-Service. Additionally, accurate attribution of any offensive cyber operation in mere hours in low.
The likelihood of a state sponsored group performing a DdoS attack on an American social media platform is also extremely low. A DdoS attack wouldn't serve any military objective (or an intelligent one rather).
The broad sweeping statement the DdoS attack came from Ukraine (or the Ukraine area(?), at a moment where many Americans are divided on the Ukraine-Russian conflict, is inflammatory at best, is propaganda at worst. Generally speaking, DFIR needs to performed, external organizations will need to be consulted, you cannot (or rather should not) make a statement regarding the situation at hand while having little to no conclusive evidence for accurate attribution. In other words, an organization typically would not make a statement regarding the origins of an offensive cyber operation without concrete evidence.
tldr sigh, non computer nerds will eat up this crap and spread conspiracy theories and misinformation.
π131π―42π€£32π«‘11π6π€6π’4β€2π€2β€βπ₯1π€1
DarkStorm DDoS-as-a-Service has taken credit for the alleged DDoS against X.
We have no way to confirm this information. However, we've been told like, 15 times, this is the culprit.
Β―\_(γ)_/Β―
We have no way to confirm this information. However, we've been told like, 15 times, this is the culprit.
Β―\_(γ)_/Β―
π€£84π€15β€βπ₯5π1π’1
vx-underground
Just 0day'd the McDonald's drive-thru using a newly created technique called "Stack McChickens". You push McChickens onto the stack until the program McChickens.
in this example the prolog looks like
PUSH RBP
MOV RBP, RSP
SUB RSP, 2 HAPPY MEAL 6 PC
PUSH RBP
MOV RBP, RSP
SUB RSP, 2 HAPPY MEAL 6 PC
π€£107π9π6π―5β€2π’1
This media is not supported in your browser
VIEW IN TELEGRAM
> wake up
> check twitter place
> normies discussing hacking
> check twitter place
> normies discussing hacking
π109π€£92β€6π’4π€4π2π±2π1π₯1
> wake up
> take a shit
> get out of bed
> everything's computer
> take a shit
> get out of bed
> everything's computer
π145π39π―23π€14π₯6π6π±5β€4π€4β€βπ₯3π€―2