@mkljczk @feld @elfin Fully agree, but the browser print should not be a factor in a place like cloudflare blocking traffic because it "might be a bot"
Notices by kajer (kajer@infosec.exchange), page 2
-
Embed this notice
kajer (kajer@infosec.exchange)'s status on Tuesday, 25-Feb-2025 08:36:36 JST kajer
-
Embed this notice
kajer (kajer@infosec.exchange)'s status on Tuesday, 25-Feb-2025 08:35:27 JST kajer
@feld @elfin
this seems like the thread I remember... https://news.ycombinator.com/item?id=31317886They "fix" it then block everything a week later anyway...
-
Embed this notice
kajer (kajer@infosec.exchange)'s status on Tuesday, 25-Feb-2025 08:35:27 JST kajer
IIRC WaterFox, PaleMoon, and some others just don't support some of the "features" that cloudflare was using to fingerprint. There was a HackerNews thread on it a while ago.
Cloudflare just went "oopsiewhoopsie" and basically said to pound sand since nobody uses those browsers anyway. (heavy paraphrasing, and witnessing their actions)
In conversation from infosec.exchange permalink -
Embed this notice
kajer (kajer@infosec.exchange)'s status on Tuesday, 25-Feb-2025 08:24:55 JST kajer
@elfin Lol, the press release even has a big quote from the article interrupting it's own article.... useless.
Fucking AI and ADs... Just... no.
But, because cloudflare blocks waterfox as a bot browser... what are you going to do about it consumer? That's right nothing. 🖕
In conversation from infosec.exchange permalink -
Embed this notice
kajer (kajer@infosec.exchange)'s status on Saturday, 22-Feb-2025 03:36:02 JST kajer
@ryanc You want me to send a care package? Or at least stock up for the next time (if) you come back to the states?
In conversation from gnusocial.jp permalink -
Embed this notice
kajer (kajer@infosec.exchange)'s status on Saturday, 22-Feb-2025 03:33:42 JST kajer
@ryanc if you don't patch cable, then how do you justify NOT buying these?!
In conversation from infosec.exchange permalink -
Embed this notice
kajer (kajer@infosec.exchange)'s status on Saturday, 08-Feb-2025 03:19:56 JST kajer
@ryanc idontgetit.avi
In conversation from gnusocial.jp permalink -
Embed this notice
kajer (kajer@infosec.exchange)'s status on Saturday, 08-Feb-2025 01:26:30 JST kajer
In conversation from gnusocial.jp permalink -
Embed this notice
kajer (kajer@infosec.exchange)'s status on Tuesday, 31-Dec-2024 06:15:01 JST kajer
drake meme:
no: tuned transmitter
yes: spark gapIn conversation from infosec.exchange permalink -
Embed this notice
kajer (kajer@infosec.exchange)'s status on Tuesday, 31-Dec-2024 02:37:33 JST kajer
@ryanc I can think of a few legit uses for a signal like this, since my atomic clocks get signal at ~2am only.
On the otherhand... a time based "CTF challenge" seems neat.
In conversation from infosec.exchange permalink -
Embed this notice
kajer (kajer@infosec.exchange)'s status on Thursday, 19-Dec-2024 05:05:44 JST kajer
@ryanc Simple explanation is Aruba Central is a PoS thanks to HPE.
In conversation from infosec.exchange permalink -
Embed this notice
kajer (kajer@infosec.exchange)'s status on Thursday, 19-Dec-2024 04:46:42 JST kajer
ROFL Aruba Central.
Me: goes to old office suite to remove Aruba AP635
Me: unplugs AP
Aruba Central Slack Alert: Hey! That AP you just removed, yeah, it reconnected! Good to go! :thumbsup_hmn_h2:(there was no alert about it being disconnected)
me looking at unplugged AP: [confused noises]
In conversation from infosec.exchange permalink Attachments
-
Embed this notice
kajer (kajer@infosec.exchange)'s status on Thursday, 05-Dec-2024 10:04:53 JST kajer
@cR0w There is a reason we used MACSEC on "darkfiber." We setup IPSEC over AWS direct connects. IPSEC over MPLS links.
These are all non-public network links, and the fintech I worked for took no chances with anything "in the clear."
In conversation from infosec.exchange permalink -
Embed this notice
kajer (kajer@infosec.exchange)'s status on Saturday, 23-Nov-2024 08:44:56 JST kajer
Presented without context.
In conversation from infosec.exchange permalink Attachments
-
Embed this notice
kajer (kajer@infosec.exchange)'s status on Friday, 22-Nov-2024 05:59:56 JST kajer
@ryanc <3
In conversation from gnusocial.jp permalink -
Embed this notice
kajer (kajer@infosec.exchange)'s status on Friday, 22-Nov-2024 05:34:52 JST kajer
I was unsuccessful in getting a different OS on the existing motherboard.
PXEboot results in continuous beeping just after trying to get the pxelinux.0 file
Booting FreeBSD11 results in a partial load of the kernel until something beeps and the boot hangs.
Booting various i386 linux is the same, something causes a short beep and the boot process hangs.
I swapped the X6 motherboard with a X11, but with the ASIC installed, the MB won't post.
In conversation from infosec.exchange permalink -
Embed this notice
kajer (kajer@infosec.exchange)'s status on Friday, 22-Nov-2024 05:34:51 JST kajer
cool, cool... not in the rockyou.txt I have
Time to fire up my CMIYC cluster... my laptop 940MX won't be up to the abuse I have planned.
In conversation from infosec.exchange permalink -
Embed this notice
kajer (kajer@infosec.exchange)'s status on Friday, 22-Nov-2024 05:34:51 JST kajer
put everything back, but with a video card installed. Managed to stop GRUB in an attempt to get single user mode.
Grub has a MD5crypt password (hashcat -m 500)
yay
I can either change it on disk, or... CRACK IT
In conversation from infosec.exchange permalink -
Embed this notice
kajer (kajer@infosec.exchange)'s status on Friday, 22-Nov-2024 05:34:51 JST kajer
If I do manage to boot a vanilla RHEL, I might be able to pillage some device /asic drivers out of the rpm library I found in the disk I mounted.
In conversation from infosec.exchange permalink -
Embed this notice
kajer (kajer@infosec.exchange)'s status on Friday, 22-Nov-2024 05:34:51 JST kajer
I dug in to the OS a little bit last night after doing hardware stuff. The OS is based on RHEL but can't quite tell which version.
I am thinking I clone the HDD back to another disk, but inject a root password in to the shadow file so I can login to the underlying OS before PanOS takes over getty.
In conversation from infosec.exchange permalink