Twitter has been down for a really long time. Probably like, 4 or 5 hours, dunno.
Elon Musk probably fuming that he can't post every 15 minutes.
Elon Musk probably fuming that he can't post every 15 minutes.
😁179🔥21❤15👏6🤣6❤🔥5💯5😢4👍3😎2🤔1
vx-underground
Creating a GUI interface using Visual Basic, see if I can track an IP address
🚨BREAKING🚨
THE X USED IN THE MUSK TWEET ISNT THE SAME X ON THE KEYBOARD. WTF IS THAT WEIRD LOOKING X.
THE X USED IN THE MUSK TWEET ISNT THE SAME X ON THE KEYBOARD. WTF IS THAT WEIRD LOOKING X.
🤯148🤣42😁10🤓9❤7🔥5😱5❤🔥2🤔1🤩1😍1
Elon Musk did an interview today stating the IP addresses in the X cyber attack (?) originated from "the Ukraine area" (???).
This has resulted in many people believing the the Ukrainian government is responsible for the DdoS attack on X
This has resulted in many people believing the the Ukrainian government is responsible for the DdoS attack on X
🤣176🤔17🤯10👏6🤓5😁4👍3❤🔥2😢1🤝1
vx-underground
Elon Musk did an interview today stating the IP addresses in the X cyber attack (?) originated from "the Ukraine area" (???). This has resulted in many people believing the the Ukrainian government is responsible for the DdoS attack on X
Rant / opinion
DdoS attacks can be difficult to attribute especially if it's DdoS-as-a-Service. Additionally, accurate attribution of any offensive cyber operation in mere hours in low.
The likelihood of a state sponsored group performing a DdoS attack on an American social media platform is also extremely low. A DdoS attack wouldn't serve any military objective (or an intelligent one rather).
The broad sweeping statement the DdoS attack came from Ukraine (or the Ukraine area(?), at a moment where many Americans are divided on the Ukraine-Russian conflict, is inflammatory at best, is propaganda at worst. Generally speaking, DFIR needs to performed, external organizations will need to be consulted, you cannot (or rather should not) make a statement regarding the situation at hand while having little to no conclusive evidence for accurate attribution. In other words, an organization typically would not make a statement regarding the origins of an offensive cyber operation without concrete evidence.
tldr sigh, non computer nerds will eat up this crap and spread conspiracy theories and misinformation.
DdoS attacks can be difficult to attribute especially if it's DdoS-as-a-Service. Additionally, accurate attribution of any offensive cyber operation in mere hours in low.
The likelihood of a state sponsored group performing a DdoS attack on an American social media platform is also extremely low. A DdoS attack wouldn't serve any military objective (or an intelligent one rather).
The broad sweeping statement the DdoS attack came from Ukraine (or the Ukraine area(?), at a moment where many Americans are divided on the Ukraine-Russian conflict, is inflammatory at best, is propaganda at worst. Generally speaking, DFIR needs to performed, external organizations will need to be consulted, you cannot (or rather should not) make a statement regarding the situation at hand while having little to no conclusive evidence for accurate attribution. In other words, an organization typically would not make a statement regarding the origins of an offensive cyber operation without concrete evidence.
tldr sigh, non computer nerds will eat up this crap and spread conspiracy theories and misinformation.
👍131💯42🤣32🫡11👏6🤓6😢4❤2🤝2❤🔥1🤔1
DarkStorm DDoS-as-a-Service has taken credit for the alleged DDoS against X.
We have no way to confirm this information. However, we've been told like, 15 times, this is the culprit.
¯\_(ツ)_/¯
We have no way to confirm this information. However, we've been told like, 15 times, this is the culprit.
¯\_(ツ)_/¯
🤣84🤔15❤🔥5😁1😢1
vx-underground
Just 0day'd the McDonald's drive-thru using a newly created technique called "Stack McChickens". You push McChickens onto the stack until the program McChickens.
in this example the prolog looks like
PUSH RBP
MOV RBP, RSP
SUB RSP, 2 HAPPY MEAL 6 PC
PUSH RBP
MOV RBP, RSP
SUB RSP, 2 HAPPY MEAL 6 PC
🤣107👍9😁6💯5❤2😢1
This media is not supported in your browser
VIEW IN TELEGRAM
> wake up
> check twitter place
> normies discussing hacking
> check twitter place
> normies discussing hacking
😎109🤣92❤6😢4🤝4😁2😱2👍1🔥1
> wake up
> take a shit
> get out of bed
> everything's computer
> take a shit
> get out of bed
> everything's computer
👏145😎39💯23🤔14🔥6😁6😱5❤4🤓4❤🔥3🤯2
Shoutout to Windows 11 for automatically restarting while I was compressing data.
I love compressing 2,213,220 malwares and having you Thanos snap my progress into nothingness
I love compressing 2,213,220 malwares and having you Thanos snap my progress into nothingness
🤣181🫡19🔥13😁7😢7🎉7🙏7💯6😱4🤓2🤯1
vx-underground
Shoutout to Windows 11 for automatically restarting while I was compressing data. I love compressing 2,213,220 malwares and having you Thanos snap my progress into nothingness
Yes, currently maining Windows 11 while handling terabytes of malware. Don't be a big baby — what's the worst that can happen?
🤣142🤯14🥰10😁8🤓6😘6👍4🔥4😇3🤔2🤝2
Ransomware but instead of encrypting data it puts parental controls on the victims computer and restricts them from visiting anime-related websites
❤143🤣109🔥16😱12😢10💯6🤯5🤓4👍2🤔1🫡1
vx-underground
The alleged developer (and core member) of Lockbit ransomware group is being extradited from Israel to the United States. Will law enforcement be nice to him? Will he face 20 years or more? Will he attempt an hero? Find out next time on Dragon Ball Z
fr tho bro is cooked, fbi prolly lowkey thinkin of killing his ass (he tripped and fell out a window)
🤣100🫡13😢5❤1👍1🤝1
*downloads 1 episode of Naruto off pirate bay*
"fuc da feds dey gunnin after me, I put dat on da O"
"fuc da feds dey gunnin after me, I put dat on da O"
🤣117🤓8🔥7🤔7❤3😢1
hAcKeRs jUst wAnT tO eXplOrE
It's not 1991 anymore. It's 2025. "Hackers" (the name is butchered, makes me uncomfortable), aren't compromising places to explore. If they want to explore, they'll watch a YouTube essay or browse Wikipedia.
They want money (or to be a nuisance)
It's not 1991 anymore. It's 2025. "Hackers" (the name is butchered, makes me uncomfortable), aren't compromising places to explore. If they want to explore, they'll watch a YouTube essay or browse Wikipedia.
They want money (or to be a nuisance)
🤣103👍21😢11🤓9❤8💯5🤔3😁2