Al-Pharaday

1.2K posts

Al-Pharaday banner
Al-Pharaday

Al-Pharaday

@AlPharaday

これは私たちが考えていた文明とは違う

Katılım Temmuz 2024
22 Takip Edilen21 Takipçiler
Sabitlenmiş Tweet
Al-Pharaday
Al-Pharaday@AlPharaday·
FreeDroidWarn
English
1
0
0
101
Proton VPN
Proton VPN@ProtonVPN·
Starts with P and we all love it
English
382
27
579
69.2K
Al-Pharaday retweetledi
Massimo
Massimo@Rainmaker1973·
Cover of Guns'n'Roses' Sweet Child O' Mine with a bagpipe [🎶 piperdotally]
English
15
79
501
23.2K
Al-Pharaday retweetledi
Massimo
Massimo@Rainmaker1973·
A cat managed to catch 27 mice and carefully lined them all up to show off his 'work' to his owner.
English
241
723
9.9K
244.8K
Al-Pharaday retweetledi
Brian Roemmele
Brian Roemmele@BrianRoemmele·
Bob Fosse in Little Prince movie, 1974 had a massive influence on Michael Jackson.
English
1.1K
7.1K
65.3K
12.6M
Al-Pharaday
Al-Pharaday@AlPharaday·
@vxunderground "This is a Chromium thing" Check it with @brave, it is based on the Chromium open-source project. It is technically a "fork" of Chromium. But only 'technically'.
English
0
0
0
112
vx-underground
vx-underground@vxunderground·
The initial proof-of-concept was released in C-sharp. Using this method to dump credentials is iffy because it requires administrative access and some security access tokens which can raise some flags. First, Edge is Chromium based. This is a Chromium thing but (if my memory serves me correctly) a unique attribute to Edge exclusively. However, because it is Chromium based this may impact other Chromium bases. It requires more investigation. Edge is a primary target because it's the default Windows browser and used in enterprise environments. Secondly, as far as malware goes, this is yet another method to potentially dump credentials on a home users machine. There are a few different ways. This method doesn't surprise me. However, successfully using this method is an enterprise environment would be difficult to use. It would require administrative access and some security access tokens which would immediately raise some flags. In other words, this method is interesting, I like the research performed, however it isn't something super super critical. If you're using this method in an enterprise environment then that company has been completely compromised down to the bone and they've got much larger issues. The code and research is really cool though. I just wish it wasn't written in C-sharp (I have an irrational disdain to .NET, especially lately).
International Cyber Digest@IntCyberDigest

‼️🚨 Microsoft calls this "intended behaviour," so here we go. How to dump the credentials of every user stored in Microsoft Edge: 1. Open Edge. Don't browse anywhere, just open it. 2. Flip to Task Manager, find Edge, expand the task. 3. Highlight the "browser" sub-task, right-click, and choose "Create Memory Dump." 4. Open the dump file and look for credentials. The logged-in Windows user can dump every stored Edge credential with no additional rights. Which means any malware that user executes has those credentials for the asking. Thanks to Rob VandenBrink at SANS: isc.sans.edu/diary/32954

English
36
64
763
77.3K
The Lunduke Journal
The Lunduke Journal@LundukeJournal·
The Islamic terrorist group, 313 Team, has announced that they have ended their “5-day attack” on Ubuntu Linux infrastructure. The Iran & Palestine aligned Islamists have also announced that they intend to target @Cloudflare servers in retaliation for assisting @Ubuntu. “Cloudflare intervened and prevented our attack. Therefore, Cloudflare servers should expect a devastating attack that will target their servers.”
The Lunduke Journal tweet media
English
10
8
72
3.4K
Al-Pharaday
Al-Pharaday@AlPharaday·
@GunloverClub1 Could be helpful against Big Boys in bullet-proof vests travelling in armoured vehicles. Right through the windshield.
English
0
0
1
3.8K
Gun Lovers Club
Gun Lovers Club@GunloverClub1·
Meet the Finnish 'Elephant Gun.' The Lahti L-39 was built to shred tanks. Against a human target? Resistance is nonexistent. The kinetic energy is so massive the target basically disappears on impact.
English
413
1.9K
19.2K
2.7M
International Cyber Digest
International Cyber Digest@IntCyberDigest·
❗️🚨 Microsoft Edge keeps every saved password in process memory as cleartext from the moment it launches. Microsoft's responsed when reported: "by design." All of them. Including credentials for sites you won't open this session. Researcher @L1v1ng0ffTh3L4N tested every major Chromium browser. Edge is the only one that behaves this way. Chrome decrypts credentials on demand, and App-Bound Encryption locks the keys to an authenticated Chrome process so other processes can't reuse them. In Chrome, plaintext surfaces only during autofill or when a password is viewed, making memory scraping far less useful. What makes this extra weird is that Edge still demands re-authentication before revealing those passwords in its Password Manager UI, while the same browser process already holds every one of them in plaintext. In shared environments, this turns into a credential harvest. On a terminal server, an attacker with admin rights can read the memory of every logged-on user process. In the published PoC video, a compromised admin account lifts stored credentials from two other logged-on (and even disconnected) users with Edge running. Microsoft's official response when notified: "by design." The finding was disclosed April 29 at BigBiteOfTech by PaloAltoNtwks Norway, alongside a small educational tool that lets anyone verify the cleartext storage for themselves.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
236
2.3K
8.6K
1.3M
Al-Pharaday retweetledi
Meredith
Meredith@Opportunitweet·
There is no legal requirement to have an email address, nor is there a requirement to have a cell phone or use certain apps. But our government and far too many corporations behave as though this is the case. It's a tremendous problem.
English
375
2.9K
18.7K
306.7K
Al-Pharaday
Al-Pharaday@AlPharaday·
@senatorshoshana If a third of kids know how to bypass the restriction, the other two thirds will learn from them. A perfect way to raise a generation of rebels. It'sfascinating to watch the System cutting its own head in real time. 🏴‍☠️
English
0
0
4
278
Sam Bent
Sam Bent@DoingFedTime·
Bookmark this, and if you see a Monero shill sponsored by Wagyu in the wild please drop a screenshot here. I noticed some of them removing it from their profiles. I told cow to disclose a list never saw one. Here's some examples... (thank you to the ones that do)
Sam Bent tweet mediaSam Bent tweet mediaSam Bent tweet media
English
31
12
184
11.6K
Ahmad
Ahmad@TheAhmadOsman·
Zero following I am better than you energy Should tell you everything about how Dario leads Anthropic, and how he perceives his customers (us)
Ahmad tweet media
English
155
38
1.3K
139.2K
Al-Pharaday
Al-Pharaday@AlPharaday·
@CollinRugg Step 2: he will need an army in case another king decides to seize his land; it can be conscripts (if there're any) or mercenaries (requires lots of money). If nobody is to attack him since he's under the protection of an outside force like the government, then he is not A King.
English
0
0
8
7.9K
Collin Rugg
Collin Rugg@CollinRugg·
Self-depicted King of Switzerland is steadily growing his own ‘empire’ thanks to a legal loophole. Jonas Lauwiner has acquired more than 110,000 square meters of land for free. According to The Times, Lauwiner has acquired 148 bits of land and 83 sections of road in Switzerland thanks to the loophole. “I am fair. I don’t shut the roads and I do not charge much for them. [I make money] by selling the right to construct near my road and I sell the right of passage if there is a new house,” he said. The 31 year old calls his “conquests” a “military campaign,” that are carried out digitally and “without bloodshed,” according to the outlet. The loophole, under Swiss law, allows anyone to acquire land for free if it is registered as ownerless, by making a claim to the local council. Video: The Times.
English
335
954
10.3K
1.7M
Al-Pharaday retweetledi
Science girl
Science girl@sciencegirl·
This is from an IBM presentation In 1979
Science girl tweet media
English
484
17.1K
85.9K
1.2M
Al-Pharaday
Al-Pharaday@AlPharaday·
@kcimc If you have access to flights data of this sort, you actually can track figures of authority irt, right? Btw, during a massive thermonuclear strike critical systems on board of an aircraft are supposed to stop operating. Why would they choose to meet their end while on high?
English
0
0
0
790