Joshua Small
2025-06-20

@0x00string I need a how to guide for the butt sprayer.

2025-06-20

@microsoft I feel this post in my bones.

Joshua Small boosted:
Tib3rius :antiverified:tib3rius@infosec.exchange
2025-06-20

🫠

2025-06-19

@merill Looking forward to this one! It's been a huge default gap.

2025-06-18

Woop.

Hack The Box prolab: Dante complete.
2025-06-15

@cR0w People I have not heard from today: Anyone at M-Files.

I literally had an argument about putting this on a public IP last week.

2025-06-12

Oh great another "incident" caused by marketing sending some SEO person EPP transfer codes. Can we please get like a CISA alert on this so it becomes an actual issue?

2025-06-12

@rrwo Hashcat can brute force MD5, and if you know it's a small enough string you could write an appropriate mask.

Joshua Small boosted:
cR0w :cascadia:cR0w@infosec.exchange
2025-06-10

CVSS scores are like penis sizes: Situational, often lied about, used for irrelevant comparisons by weirdos, and generally more interesting to observers than those actually involved.

2025-06-09

When Microsoft require a .HAR capture from a browser session for a credit card billing issue.

2025-06-06

@deepthoughts10 @SwiftOnSecurity @threatinsight There were stories floating around for ages arguing that you could make yourself immune by adding the Russian keyboard and there's a lot of stories of orgs trying this out. But any actual ransomware break down anyone did showing any check, would check the default keyboard, making this common advise pointless.

Joshua Small boosted:
Secure ICS OT :mastodon:Secure_ICS_OT@infosec.exchange
2025-06-06
2025-06-06

@RedwoodSec Well that breaks my DJI drone, which works perfectly but is run from an App that DJI has not put in the store.

Joshua Small boosted:
2025-06-05

A lot of websites right now aren't slow because of a lack of bandwidth or limited server resources, but because they are built on top of some of the worst software that I have ever seen (case in point, Elementor), by people who have no idea what they are doing or how basic things like image sizes work.

#Webdev #WordPress

2025-06-05

@malwaretech XXTEA is disliked by cryptographers for valid reasons, but it's been very useful as something EDR products have never seen.

en.wikipedia.org/wiki/XXTEA

2025-06-04

It is now substantively easier to find the source of memes via AI than the crippled Google Images search.

oy imagepng
What band is this picture?
© 2
Y" The image appears to reference the lyrics of the song “Ransom” by the cyberpunk/electronic band LORN.
The lyrics you provided match the spoken-word intro to the song, which has a dark, synth-heavy sound
and themes of digital threats or hacking.
If this is a screenshot from a music video or artwork related to the song, the band is LORN.
Would you like more details about the song or artist?
(CRF SAN CIR]
2025-06-04

@nyanbinary Me, who inherited a legitimate business app written with Cyrillic characters in variable and function names.

2025-06-04

@jerry The drama-lama now of course will be whether Google and Microsoft maintain that spreadsheet in Sharepoint or Google Workspaces, Excel or Google Sheets?

Joshua Small boosted:
Richard Campbellrichcampbell
2025-06-04

Why would a security vulnerability take more than two years to fix?

@SteveSyfuhs talks on RunAs Radio at runasradio.com/Shows/Show/987 about the process of responding to KB5015754 dealing with on-premises certificate authority for Active Directory!

2025-06-04

@hacks4pancakes If social media has taught me anything it's that what you just said is terrible and only people with no freedom ever experience it.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst