This media is not supported in your browser
VIEW IN TELEGRAM
The visual demonstration illustrating cyber security defense against ransomware
🤣137🫡11👍7❤5🎉2🤝2👏1😱1😢1
vx-underground
Chat, we are cooked. The 90s is considered old now.
Unrelated, someone asked if I remember "September 9th". They didn't even know the correct date as September 11th.
Also, yes.
Also, yes.
🤣153❤11😢9😁4🤔3👍2🤯1
Twitter has been down for a really long time. Probably like, 4 or 5 hours, dunno.
Elon Musk probably fuming that he can't post every 15 minutes.
Elon Musk probably fuming that he can't post every 15 minutes.
😁179🔥21❤15👏6🤣6❤🔥5💯5😢4👍3😎2🤔1
vx-underground
Creating a GUI interface using Visual Basic, see if I can track an IP address
🚨BREAKING🚨
THE X USED IN THE MUSK TWEET ISNT THE SAME X ON THE KEYBOARD. WTF IS THAT WEIRD LOOKING X.
THE X USED IN THE MUSK TWEET ISNT THE SAME X ON THE KEYBOARD. WTF IS THAT WEIRD LOOKING X.
🤯148🤣42😁10🤓9❤7🔥5😱5❤🔥2🤔1🤩1😍1
Elon Musk did an interview today stating the IP addresses in the X cyber attack (?) originated from "the Ukraine area" (???).
This has resulted in many people believing the the Ukrainian government is responsible for the DdoS attack on X
This has resulted in many people believing the the Ukrainian government is responsible for the DdoS attack on X
🤣176🤔17🤯10👏6🤓5😁4👍3❤🔥2😢1🤝1
vx-underground
Elon Musk did an interview today stating the IP addresses in the X cyber attack (?) originated from "the Ukraine area" (???). This has resulted in many people believing the the Ukrainian government is responsible for the DdoS attack on X
Rant / opinion
DdoS attacks can be difficult to attribute especially if it's DdoS-as-a-Service. Additionally, accurate attribution of any offensive cyber operation in mere hours in low.
The likelihood of a state sponsored group performing a DdoS attack on an American social media platform is also extremely low. A DdoS attack wouldn't serve any military objective (or an intelligent one rather).
The broad sweeping statement the DdoS attack came from Ukraine (or the Ukraine area(?), at a moment where many Americans are divided on the Ukraine-Russian conflict, is inflammatory at best, is propaganda at worst. Generally speaking, DFIR needs to performed, external organizations will need to be consulted, you cannot (or rather should not) make a statement regarding the situation at hand while having little to no conclusive evidence for accurate attribution. In other words, an organization typically would not make a statement regarding the origins of an offensive cyber operation without concrete evidence.
tldr sigh, non computer nerds will eat up this crap and spread conspiracy theories and misinformation.
DdoS attacks can be difficult to attribute especially if it's DdoS-as-a-Service. Additionally, accurate attribution of any offensive cyber operation in mere hours in low.
The likelihood of a state sponsored group performing a DdoS attack on an American social media platform is also extremely low. A DdoS attack wouldn't serve any military objective (or an intelligent one rather).
The broad sweeping statement the DdoS attack came from Ukraine (or the Ukraine area(?), at a moment where many Americans are divided on the Ukraine-Russian conflict, is inflammatory at best, is propaganda at worst. Generally speaking, DFIR needs to performed, external organizations will need to be consulted, you cannot (or rather should not) make a statement regarding the situation at hand while having little to no conclusive evidence for accurate attribution. In other words, an organization typically would not make a statement regarding the origins of an offensive cyber operation without concrete evidence.
tldr sigh, non computer nerds will eat up this crap and spread conspiracy theories and misinformation.
👍131💯42🤣32🫡11👏6🤓6😢4❤2🤝2❤🔥1🤔1
DarkStorm DDoS-as-a-Service has taken credit for the alleged DDoS against X.
We have no way to confirm this information. However, we've been told like, 15 times, this is the culprit.
¯\_(ツ)_/¯
We have no way to confirm this information. However, we've been told like, 15 times, this is the culprit.
¯\_(ツ)_/¯
🤣84🤔15❤🔥5😁1😢1
vx-underground
Just 0day'd the McDonald's drive-thru using a newly created technique called "Stack McChickens". You push McChickens onto the stack until the program McChickens.
in this example the prolog looks like
PUSH RBP
MOV RBP, RSP
SUB RSP, 2 HAPPY MEAL 6 PC
PUSH RBP
MOV RBP, RSP
SUB RSP, 2 HAPPY MEAL 6 PC
🤣107👍9😁6💯5❤2😢1
This media is not supported in your browser
VIEW IN TELEGRAM
> wake up
> check twitter place
> normies discussing hacking
> check twitter place
> normies discussing hacking
😎109🤣92❤6😢4🤝4😁2😱2👍1🔥1
> wake up
> take a shit
> get out of bed
> everything's computer
> take a shit
> get out of bed
> everything's computer
👏145😎39💯23🤔14🔥6😁6😱5❤4🤓4❤🔥3🤯2
Shoutout to Windows 11 for automatically restarting while I was compressing data.
I love compressing 2,213,220 malwares and having you Thanos snap my progress into nothingness
I love compressing 2,213,220 malwares and having you Thanos snap my progress into nothingness
🤣181🫡19🔥13😁7😢7🎉7🙏7💯6😱4🤓2🤯1
vx-underground
Shoutout to Windows 11 for automatically restarting while I was compressing data. I love compressing 2,213,220 malwares and having you Thanos snap my progress into nothingness
Yes, currently maining Windows 11 while handling terabytes of malware. Don't be a big baby — what's the worst that can happen?
🤣142🤯14🥰10😁8🤓6😘6👍4🔥4😇3🤔2🤝2