ax0n

16.5K posts

ax0n banner
ax0n

ax0n

@ax0n

Buy it. Use it. Break it. Fix it. Husband. Tabby Wrangler. Bot Hunter. SecOps. DFIR. SysAdmin. When in doubt, use BSD. Hard NOCs Class of '06. Tweets my own.

Kansas Katılım Nisan 2008
1.1K Takip Edilen3K Takipçiler
ax0n
ax0n@ax0n·
@bettersafetynet I'm not saying you're wrong, but I am saying this is the 30th time this week I've seen someone say AI is good at a lot of things and may jeopardize jobs in certain niches, but not this one specific niche that the writer is intimately familiar with the nuances of.
English
1
0
1
30
Mick Douglas 🇺🇦🌻
Mick Douglas 🇺🇦🌻@bettersafetynet·
Yes, AI can help with risk analysis, but it's bad at risk discovery... and flat out sucks at risk contextualization in a way that's meaningful for orgs. That's where everyone who wants long term work in this field must run to. 2
English
3
2
14
2.4K
Mick Douglas 🇺🇦🌻
Mick Douglas 🇺🇦🌻@bettersafetynet·
Infosec techies, we need to talk. We're in an era where tech skills are being commoditized by AI and the automation it can build... and it's only going to get more so. 🧵1
English
2
1
48
16.6K
vx-underground
vx-underground@vxunderground·
> Not really real ShinyHunters > Claims to have compromised Vercel > Real ShinyHunters say "wtf that's not me" > Impersonator ShinyHunters says stole source code, customer data, databases etc > Vercel makes security bulletin > Announces compromise > Real ShinyHunters "wtf that's not us tho fr" 1. WHO EXTORTS SOMEONE ON A SUNDAY 2. 200iq move to blame ShinyHunters for compromise 3. 400iq move if ShinyHunters made fork of ShinyHunters claiming to be impersonator ShinyHunters to convince everyone the fake ShinyHunters are impersonating ShinyHunters, but it was actually ShinyHunters being the fake ShinyHunters all along 4. Lots of cybercrime drama right now, but ITS SUNDAY. Dawg, WAIT UNTIL LIKE TUESDAY OR SOMETHING. Smdh
Vercel@vercel

We’ve identified a security incident that involved unauthorized access to certain internal Vercel systems, impacting a limited subset of customers. Please see our security bulletin: vercel.com/kb/bulletin/ve…

English
60
142
2K
136.2K
ax0n
ax0n@ax0n·
@vxunderground Word on the street is the Anodot victims got their first ransom notes on Easter.
English
0
0
0
626
Dave
Dave@GamewithDave·
For anyone who used a computer between 1990 & 2005… what’s the one game you still think about?
English
40.8K
723
14.4K
10.3M
LaurieWired
LaurieWired@lauriewired·
In the 90s, Hitachi came up with a bizarre way to conserve memory bandwidth. Their SuperH architecture, intended to compete with ARM, was a 32-bit architecture that used…16 bit instructions. The benefit was really high code density. If you can fit twice as many instructions into every cache line, the CPU pipeline stalls way, way less. This was *really* important for embedded devices, which were often extremely bandwidth constrained in the era. Sega famously used the processors for the Dreamcast, and ARM actually ended up licensing their patents for Thumb mode! I think perhaps the weirdest thing about SuperH was its concept of “upwards compatibility”. The ISA itself is a microcode-less design, all future instructions were trapped and emulated by older chipsets. It’d be slow…but you could run future code on very old chips! Very neat design, a massive success through the 90s and 2000s, that slowly faded.
LaurieWired tweet mediaLaurieWired tweet media
English
73
450
4.7K
386.7K
ax0n
ax0n@ax0n·
@SegaSwole @Fat_Electrician Man, I haven't even thought about those in 30 years. I can still feel the weird little eye controls through this photo.
English
0
0
2
87
The Fat Electrician
The Fat Electrician@Fat_Electrician·
I hate to break it to people my age, but in 30 years your adult kids are going to look at your Funko Pops, Labubus, action figures, and Warhammer 40K collections the same way we look at boomer ceramic angel collections. That shit is going straight to the thrift store when you die.
English
1.6K
573
15.3K
809.7K
ax0n
ax0n@ax0n·
@HackingDave Every few years, my wife decides to try to go back to Android. Within 2 days, I always have a new Android phone to play with.
English
0
0
1
26
Dave Kennedy
Dave Kennedy@HackingDave·
I always get phone FOMO, I switched to Android yesterday because usually hardware wise it's much better than iPhone and felt it's been a few years let me try it out. Almost had a rebellion from my kids and wife being a green bar, but I talked them out of making me sleep on the couch. After a day of use on Android.... Andddddddd, I'm back on iPhone 😂
English
56
4
202
23.5K
vx-underground
vx-underground@vxunderground·
> be me > be red teamer > industry disrupted > omg > we all using PentAGI now > compromise target using email lure > c2 access to network machine > need lateral movement > spend 45 minutes reading pentagi readme > "omg this is gonna be so sweet" > needs docker instance > docker not installed > windows applocker denies installs > omg im so disrupted
Guri Singh@heygurisingh

🚨 BREAKING: The cybersecurity industry is about to get completely disrupted. Someone just open-sourced a fully autonomous AI Red Team. It's called PentAGI. 8,200+ stars on GitHub. Not one AI agent. An entire simulated security firm. Researchers, developers, pentesters, and risk analysts. All AI. All coordinating with each other before launching a single attack. No Cobalt Strike. No $100K/year pentest retainers. No OSCP required. Here's what's inside this thing: → An Orchestrator agent that plans the full attack chain → A Researcher agent that gathers intel from the web, search engines, and vulnerability databases → A Developer agent that writes custom exploit code on the fly → An Executor agent that runs 20+ pro security tools (nmap, metasploit, sqlmap, and more) → A memory system that learns from every engagement and gets smarter over time Here's the wildest part: It runs everything inside sandboxed Docker containers. Full isolation. It picks the right container image for each task automatically. It has a knowledge graph powered by Neo4j that tracks relationships between targets, vulnerabilities, tools, and techniques across every single test. Cybersecurity firms charge $25K-$150K per engagement for this exact workflow. This is free. 100% Open Source. MIT License.

English
60
120
1.9K
167.3K
ax0n
ax0n@ax0n·
@CapturasANHQV @holman My oldest website still includes urchin.js and calls urchinTracker() from Google analytics' site. It's a miracle it still feeds the GA dashboard.
English
1
0
1
47
Capturas ANHQV
Capturas ANHQV@CapturasANHQV·
@holman For a long time the tracking script you’d get from google analytics was urchin.js iirc
English
1
0
9
3.7K
Zach Holman
Zach Holman@holman·
Still amazes me that we still see `utm_source` in URLs everywhere today because decades ago Google bought the best-designed software on the planet: Urchin. I cannot describe to you how incredible Urchin's web design was. Hugely inspirational.
Zach Holman tweet media
English
12
34
826
153.8K
Eric S. Raymond
Eric S. Raymond@esrtweet·
If you are a software engineer "experiencing some degree of mental health crisis", now hear this, because I've been coding for 50 years since the days of punched cards and I have a salutary kick in your ass to deliver. Get over yourself. Every previous "programming is obsolete" panic has been a bust, and this one's going to be too. The fundamental problem of mismatch between the intentions in human minds and the specifications that a computer can interpret hasn't gone away just because now you can do a lot of your programming in natural language to an LLM. Systems are still complicated. This shit is still difficult. The need for people who specialize in bridging that gap isn't going to go away. As usual, the answer is: upskill yourself and adapt. If a crusty old fart like me can do it, you can too.
Tom Dale@tomdale

I don't know why this week became the tipping point, but nearly every software engineer I've talked to is experiencing some degree of mental health crisis.

English
655
1.7K
15.7K
1.6M
ax0n
ax0n@ax0n·
@esrtweet I'm probably going to print and frame this tweet.
English
0
0
0
11
ax0n
ax0n@ax0n·
@H3KTlC Part of why I champion spending some time in helpdesk, software engineering or networking is because few things prepare one for InfoSec (defensive or offensive) quite like being a “user,” and some of the best I’ve hired picked up all the InfoSec skills they needed organically.
English
0
0
0
112
𝗛𝟯𝗞𝗧l𝗖
𝗛𝟯𝗞𝗧l𝗖@H3KTlC·
gatekeeping infosec is weird. there’s more work than people and ta’s arent waiting for ppl feel special. but still: ‘come back after helpdesk’ treat starter certs like a joke no degree, dismissed withhold context during investigations to jrs
English
22
15
277
16.6K
ax0n
ax0n@ax0n·
I'm in a much better head space now, but I'll never forget those who post "if you need to talk, I'm here" but deflected in DM that "people ask daily and I just don't have time" every bit as much as I remember the real ones who took the call or met up to talk some sense into me.
English
0
0
0
148
ax0n
ax0n@ax0n·
I whipped up a userland USB/IP server for #OpenBSD that can passthrough ugen(4) devices like RTL-SDR and Arduino serial to Alpine Linux VMM instances. Needs more work. Unfortunately, USB/IP client for OpenBSD is going to need kernel code. Way over my head.
ax0n tweet media
English
0
0
0
200
ax0n retweetledi
TracketPacer
TracketPacer@TracketPacer·
TracketPacer tweet media
ZXX
46
53
856
25.8K
mRr3b00t
mRr3b00t@UK_Daniel_Card·
Just to let you know, I installed a token ring network once.... bow before mighty networking skills #OMG #FuckPeopleAreInsane
GIF
English
24
0
85
6.6K
ax0n
ax0n@ax0n·
@strandjs In fairness, I only see a small core group of folks trying to make Thrunt happen. I'm never, ever calling it that. This is the first, and last, time I will ever type that word.
English
0
0
2
39
strandjs - strandjs@bsky.social
God I hate the fact that Threat + Hunting is being called "Thrunting." And we now have Threat + Hunters who are "Thrunters." This is all I can see when I see these terms...
GIF
English
41
12
216
13.8K
ax0n
ax0n@ax0n·
@BentleyAudrey I did this well into my 20s but once my parents found out I was occasionally sneaking a roll of TP, a sleeve of crackers, a few AA batteries every once in a while, they had a paper sack waiting for me every Sunday dinner and let me raid for whatever I needed.
English
0
0
0
19
Audrey Renée Bentley
Audrey Renée Bentley@BentleyAudrey·
Does anyone else's college kids use their house as a store? Every time this girl comes home stuff disappears..like what happened to the paper towels, laundry detergent, vitamin c etc. lmao Mind you her dad takes her to the store on her way back to campus every single week lol
English
13
0
60
2.4K