vx-underground
Creating a GUI interface using Visual Basic, see if I can track an IP address
π¨BREAKINGπ¨
THE X USED IN THE MUSK TWEET ISNT THE SAME X ON THE KEYBOARD. WTF IS THAT WEIRD LOOKING X.
THE X USED IN THE MUSK TWEET ISNT THE SAME X ON THE KEYBOARD. WTF IS THAT WEIRD LOOKING X.
π€―148π€£42π10π€9β€7π₯5π±5β€βπ₯2π€1π€©1π1
Elon Musk did an interview today stating the IP addresses in the X cyber attack (?) originated from "the Ukraine area" (???).
This has resulted in many people believing the the Ukrainian government is responsible for the DdoS attack on X
This has resulted in many people believing the the Ukrainian government is responsible for the DdoS attack on X
π€£176π€17π€―10π6π€5π4π3β€βπ₯2π’1π€1
vx-underground
Elon Musk did an interview today stating the IP addresses in the X cyber attack (?) originated from "the Ukraine area" (???). This has resulted in many people believing the the Ukrainian government is responsible for the DdoS attack on X
Rant / opinion
DdoS attacks can be difficult to attribute especially if it's DdoS-as-a-Service. Additionally, accurate attribution of any offensive cyber operation in mere hours in low.
The likelihood of a state sponsored group performing a DdoS attack on an American social media platform is also extremely low. A DdoS attack wouldn't serve any military objective (or an intelligent one rather).
The broad sweeping statement the DdoS attack came from Ukraine (or the Ukraine area(?), at a moment where many Americans are divided on the Ukraine-Russian conflict, is inflammatory at best, is propaganda at worst. Generally speaking, DFIR needs to performed, external organizations will need to be consulted, you cannot (or rather should not) make a statement regarding the situation at hand while having little to no conclusive evidence for accurate attribution. In other words, an organization typically would not make a statement regarding the origins of an offensive cyber operation without concrete evidence.
tldr sigh, non computer nerds will eat up this crap and spread conspiracy theories and misinformation.
DdoS attacks can be difficult to attribute especially if it's DdoS-as-a-Service. Additionally, accurate attribution of any offensive cyber operation in mere hours in low.
The likelihood of a state sponsored group performing a DdoS attack on an American social media platform is also extremely low. A DdoS attack wouldn't serve any military objective (or an intelligent one rather).
The broad sweeping statement the DdoS attack came from Ukraine (or the Ukraine area(?), at a moment where many Americans are divided on the Ukraine-Russian conflict, is inflammatory at best, is propaganda at worst. Generally speaking, DFIR needs to performed, external organizations will need to be consulted, you cannot (or rather should not) make a statement regarding the situation at hand while having little to no conclusive evidence for accurate attribution. In other words, an organization typically would not make a statement regarding the origins of an offensive cyber operation without concrete evidence.
tldr sigh, non computer nerds will eat up this crap and spread conspiracy theories and misinformation.
π131π―42π€£32π«‘11π6π€6π’4β€2π€2β€βπ₯1π€1
DarkStorm DDoS-as-a-Service has taken credit for the alleged DDoS against X.
We have no way to confirm this information. However, we've been told like, 15 times, this is the culprit.
Β―\_(γ)_/Β―
We have no way to confirm this information. However, we've been told like, 15 times, this is the culprit.
Β―\_(γ)_/Β―
π€£84π€15β€βπ₯5π1π’1
vx-underground
Just 0day'd the McDonald's drive-thru using a newly created technique called "Stack McChickens". You push McChickens onto the stack until the program McChickens.
in this example the prolog looks like
PUSH RBP
MOV RBP, RSP
SUB RSP, 2 HAPPY MEAL 6 PC
PUSH RBP
MOV RBP, RSP
SUB RSP, 2 HAPPY MEAL 6 PC
π€£107π9π6π―5β€2π’1
This media is not supported in your browser
VIEW IN TELEGRAM
> wake up
> check twitter place
> normies discussing hacking
> check twitter place
> normies discussing hacking
π109π€£92β€6π’4π€4π2π±2π1π₯1
> wake up
> take a shit
> get out of bed
> everything's computer
> take a shit
> get out of bed
> everything's computer
π145π39π―23π€14π₯6π6π±5β€4π€4β€βπ₯3π€―2
Shoutout to Windows 11 for automatically restarting while I was compressing data.
I love compressing 2,213,220 malwares and having you Thanos snap my progress into nothingness
I love compressing 2,213,220 malwares and having you Thanos snap my progress into nothingness
π€£181π«‘19π₯13π7π’7π7π7π―6π±4π€2π€―1
vx-underground
Shoutout to Windows 11 for automatically restarting while I was compressing data. I love compressing 2,213,220 malwares and having you Thanos snap my progress into nothingness
Yes, currently maining Windows 11 while handling terabytes of malware. Don't be a big baby β what's the worst that can happen?
π€£142π€―14π₯°10π8π€6π6π4π₯4π3π€2π€2
Ransomware but instead of encrypting data it puts parental controls on the victims computer and restricts them from visiting anime-related websites
β€143π€£109π₯16π±12π’10π―6π€―5π€4π2π€1π«‘1
vx-underground
The alleged developer (and core member) of Lockbit ransomware group is being extradited from Israel to the United States. Will law enforcement be nice to him? Will he face 20 years or more? Will he attempt an hero? Find out next time on Dragon Ball Z
fr tho bro is cooked, fbi prolly lowkey thinkin of killing his ass (he tripped and fell out a window)
π€£100π«‘13π’5β€1π1π€1
*downloads 1 episode of Naruto off pirate bay*
"fuc da feds dey gunnin after me, I put dat on da O"
"fuc da feds dey gunnin after me, I put dat on da O"
π€£117π€8π₯7π€7β€3π’1
hAcKeRs jUst wAnT tO eXplOrE
It's not 1991 anymore. It's 2025. "Hackers" (the name is butchered, makes me uncomfortable), aren't compromising places to explore. If they want to explore, they'll watch a YouTube essay or browse Wikipedia.
They want money (or to be a nuisance)
It's not 1991 anymore. It's 2025. "Hackers" (the name is butchered, makes me uncomfortable), aren't compromising places to explore. If they want to explore, they'll watch a YouTube essay or browse Wikipedia.
They want money (or to be a nuisance)
π€£103π21π’11π€9β€8π―5π€3π2
vx-underground
hAcKeRs jUst wAnT tO eXplOrE It's not 1991 anymore. It's 2025. "Hackers" (the name is butchered, makes me uncomfortable), aren't compromising places to explore. If they want to explore, they'll watch a YouTube essay or browse Wikipedia. They want money (orβ¦
BRO, I COMPROMISED A HOSPITAL USING LUMMA STEALER LOGS TO EXPLORE I SWARE I WAS JUST EXPLORING
π―102π€£65π9π€4β€2π2π’1
Security researcher gentoo_python discovered a Prompt Injection on VirusTotal.
Could this be used as a form of social engineering to trick users into thinking a file is safe when it's not?
File hash: 1d30bfee48043a643a5694f8d5f3d8f813f1058424df03e55aed29bf4b4c71ce
Could this be used as a form of social engineering to trick users into thinking a file is safe when it's not?
File hash: 1d30bfee48043a643a5694f8d5f3d8f813f1058424df03e55aed29bf4b4c71ce
π€90π39π€£31π₯8β€6π±3π1π€―1