she told me i was loco. true that i ain't got no chill. but i love you like a nerd loves his glasses
😁12🤣4😭4🐳1💋1
as silly as it sounds, gotta clarify.
just because i do malware stuff doesn't mean i am good at pentest or other cybersec disciplines. like, how on earth you expect the UX guy to maintain your server uptime
just because i do malware stuff doesn't mean i am good at pentest or other cybersec disciplines. like, how on earth you expect the UX guy to maintain your server uptime
😁6
Mira
hmm... https://www.electronjs.org/docs/latest/tutorial/code-signing
notarization is so much a hassle
kinda scary the possibilities with ai. the entry barrier is so low that you can pull up anything with a limited knowledge. lemme give you a scenario from my research:
DarkHotel is an APT malware. it's a bit old (first identified around 2007). it specifically targets high profile business travelers who stay at the hotel. basically its infection vector were spear phishing emails and MITM attacks (payload distributed during windows update and stuff). the initial payload is a customized dropper exec which is very much obfuscated and installs the main malware components. then a backdoor is established through RAT. the usual data exfiltration and maybe additional modules are deployed on the infected system. since the RAT is smh sophisticated it communicates with C2 servers through encrypted channels (often over http or https) and got custom protocols which allowed it to blend in with normal traffic. it then hooks in some keyloggers and performs credential theft. it even modifies windows registry keys to auto start on boot. and also checks for virtual machines or sandbox envs to avoid analysis.
if you know your way around fine tuining models and got some malware foundations (the better the experience, the more effective you are), this is a reproducible task. and smh, in the near future i'm hoping the barrier even gets lower than now
#meyapping
DarkHotel is an APT malware. it's a bit old (first identified around 2007). it specifically targets high profile business travelers who stay at the hotel. basically its infection vector were spear phishing emails and MITM attacks (payload distributed during windows update and stuff). the initial payload is a customized dropper exec which is very much obfuscated and installs the main malware components. then a backdoor is established through RAT. the usual data exfiltration and maybe additional modules are deployed on the infected system. since the RAT is smh sophisticated it communicates with C2 servers through encrypted channels (often over http or https) and got custom protocols which allowed it to blend in with normal traffic. it then hooks in some keyloggers and performs credential theft. it even modifies windows registry keys to auto start on boot. and also checks for virtual machines or sandbox envs to avoid analysis.
if you know your way around fine tuining models and got some malware foundations (the better the experience, the more effective you are), this is a reproducible task. and smh, in the near future i'm hoping the barrier even gets lower than now
#meyapping
Mira
Random:
Is ignorance a bliss ?
Is ignorance a bliss ?
ignorance was bliss, and i carelessly traded it for this profound dread
❤6💯1
reading about existentialism at 3am 😭
- [Pascal the Existentialist: Introduction]
- [Pascal’s Existentialism: Happiness, Contingency, and Paradox]
- [Pascal’s Existentialism: Boredom, Death, and Knowledge]
- [Pascal the Existentialist: Introduction]
- [Pascal’s Existentialism: Happiness, Contingency, and Paradox]
- [Pascal’s Existentialism: Boredom, Death, and Knowledge]
Please open Telegram to view this post
VIEW IN TELEGRAM
1😁4