sigmoid.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A social space for people researching, working with, or just interested in AI!

Server stats:

608
active users

#bruteforcing

0 posts0 participants0 posts today
h o ʍ l e t t<p>→ Bruteforcing the phone number of any Google user<br><a href="https://brutecat.com/articles/leaking-google-phones" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">brutecat.com/articles/leaking-</span><span class="invisible">google-phones</span></a></p><p><a href="https://mamot.fr/tags/Bruteforcing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bruteforcing</span></a> <a href="https://mamot.fr/tags/phone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phone</span></a> <a href="https://mamot.fr/tags/number" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>number</span></a> <a href="https://mamot.fr/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> <a href="https://mamot.fr/tags/user" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>user</span></a></p>
Marco Ivaldi<p><a href="https://infosec.exchange/tags/Bruteforcing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bruteforcing</span></a> the phone number of any <a href="https://infosec.exchange/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> user</p><p><a href="https://brutecat.com/articles/leaking-google-phones" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">brutecat.com/articles/leaking-</span><span class="invisible">google-phones</span></a></p>
Turris project<p>Thanks to our <a href="https://fosstodon.org/tags/TurrisSentinel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TurrisSentinel</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://fosstodon.org/tags/research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>research</span></a> program, <a href="https://fosstodon.org/tags/CZNIC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CZNIC</span></a> <a href="https://fosstodon.org/tags/CSIRT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSIRT</span></a> team discovered large scale <a href="https://fosstodon.org/tags/FTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FTP</span></a> <a href="https://fosstodon.org/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a>. Coming from 45.78.4.0/22, it is <a href="https://fosstodon.org/tags/bruteforcing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bruteforcing</span></a> <a href="https://fosstodon.org/tags/slowly" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>slowly</span></a> - it takes it 19 day to get through it's <a href="https://fosstodon.org/tags/passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwords</span></a>. Big thanks to everybody who helps us by running our <a href="https://fosstodon.org/tags/minipots" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>minipots</span></a> on their devices! Report in <a href="https://fosstodon.org/tags/Czech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Czech</span></a> is available on CSIRT website <a href="https://csirt.cz/cs/kyberbezpecnost/aktualne-z-bezpecnosti/distribuovany-ftp-bruteforcer/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">csirt.cz/cs/kyberbezpecnost/ak</span><span class="invisible">tualne-z-bezpecnosti/distribuovany-ftp-bruteforcer/</span></a></p>
postmodern<p>How many services have a default username, but can have a custom password? Redis comes to mind (<code>AUTH default password123</code>).<br><a href="https://infosec.exchange/tags/bruteforcing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bruteforcing</span></a></p>
Marco Ivaldi<p>A case of missing bytes: <a href="https://infosec.exchange/tags/bruteforcing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bruteforcing</span></a> your way through <a href="https://infosec.exchange/tags/Jenkins" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Jenkins</span></a>' CVE-2024-23897</p><p>(In which US crypto export restrictions prove to be still harmful after 25 years)</p><p><a href="https://www.errno.fr/bruteforcing_CVE-2024-23897.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">errno.fr/bruteforcing_CVE-2024</span><span class="invisible">-23897.html</span></a></p>
postmodern<p>I decided to write a Ruby micro-framework for writing bruteforcers. In order to test my code, I would need bruteforce-able servers. So I created this bruteforceable repo of various apps and Dockerfiles. Please feel free to contribute some additional servers/Dockerfiles. Currently have FTP and HTTP Basic-Auth, still need HTTP Login Form, SMTP, POP3, IMAP, and RDP. What else am I missing?<br><a href="https://github.com/ronin-rb/bruteforceable" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/ronin-rb/bruteforce</span><span class="invisible">able</span></a><br><a href="https://infosec.exchange/tags/bruteforcers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bruteforcers</span></a> <a href="https://infosec.exchange/tags/bruteforcing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bruteforcing</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/dockerfiles" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dockerfiles</span></a></p>