Forwarded from DARKNET BR
👁 #NSA | #Vigilance | #EdwardSnowden
https://telegra.ph/Sete-anos-depois-Tribunal-dos-EUA-reconhece-ilegalidade-da-NSA-denunciada-por-Snowden-09-03
A decisão foi tomada por três magistrados do Tribunal de Apelações do 9º Circuito e considerou que este órgão ligado à CIA, a partir das informações apresentadas pelo seu ex-funcionário, realmente realizou atividades ilegais.
O resultado foi fruto de processo que surgiu de uma iniciativa da ACLU a favor de Snowden.
https://telegra.ph/Sete-anos-depois-Tribunal-dos-EUA-reconhece-ilegalidade-da-NSA-denunciada-por-Snowden-09-03
Telegraph
Sete anos depois, Tribunal dos EUA reconhece ilegalidade da NSA denunciada por Snowden
Juízes consideraram que fatos denunciados pelo ex-espião, relatados em série de reportagens de Glenn Greenwald em 2013, configuram violação das leis de vigilância dos Estados Unidos. A decisão foi tomada por três magistrados do Tribunal de Apelações do 9º…
Forwarded from DARKNET BR
"Sete anos atrás, quando o noticiário declarou que eu estava sendo acusado de criminoso por falar a verdade, nunca imaginei que viveria para ver nossos tribunais condenarem as atividades da NSA como ilícitas e, na mesma decisão, me darem crédito por expô-las. E ainda assim esse dia chegou."
Algumas tools de osint
https://github.com/instant-username-search/instant-username-search
https://github.com/khast3x/h8mail
https://github.com/jofpin/trape
https://github.com/s0md3v/Photon
https://github.com/thewhiteh4t/FinalRecon
https://github.com/ex0dus-0x/doxbox
https://github.com/laramies/theHarvester
https://github.com/Cignoraptor-ita/cignotrack
https://github.com/sundowndev/PhoneInfoga
https://github.com/thewhiteh4t/seeker
https://github.com/initstring/linkedin2username
https://github.com/Ekultek/WhatBreach
https://github.com/m4ll0k/Infoga
https://github.com/instant-username-search/instant-username-search
https://github.com/khast3x/h8mail
https://github.com/jofpin/trape
https://github.com/s0md3v/Photon
https://github.com/thewhiteh4t/FinalRecon
https://github.com/ex0dus-0x/doxbox
https://github.com/laramies/theHarvester
https://github.com/Cignoraptor-ita/cignotrack
https://github.com/sundowndev/PhoneInfoga
https://github.com/thewhiteh4t/seeker
https://github.com/initstring/linkedin2username
https://github.com/Ekultek/WhatBreach
https://github.com/m4ll0k/Infoga
GitHub
GitHub - instantusername/instant-username-search: ⚡ Instantly search for the availability of your username on more than 100 social…
⚡ Instantly search for the availability of your username on more than 100 social media sites. - instantusername/instant-username-search
Forwarded from Programmer Humor
from alert(1) to uid=0(root) | Chaining XSS & command injection for root on Lenovo NAS
https://youtu.be/ixO7D1-B-aY
🦠 @Phantasm_Lab
Embedded device researchers often come across traditionally valuable vulnerabilities, such as command injection, whose exploitation is limited to authenticated, LAN-side users. From an attacker’s point of view, these restrictions are less than ideal for remote compromise. How can such bugs be weaponized for use in actual exploits? For the Lenovo ix4-300d NAS, the key to a successful attack lies in the victim’s web browser. In this livestream, ISE Labs will demonstrate the chaining of two unrelated vulnerabilities against the ix4-300d—cross-site noscripting and command injection—to show how remote, unauthenticated adversaries can abuse the browser to gain root access to LAN targets.https://youtu.be/ixO7D1-B-aY
🦠 @Phantasm_Lab
YouTube
LIVESTREAM: from alert(1) to uid=0(root) | Chaining XSS & command injection for root on Lenovo NAS
Follow us on:
https://twitter.com/ISEsecurity
https://twitter.com/iotvillage
Website:
https://www.securityevaluators.com
https://blog.securityevaluators.com
Embedded device researchers often come across traditionally valuable vulnerabilities, such as…
https://twitter.com/ISEsecurity
https://twitter.com/iotvillage
Website:
https://www.securityevaluators.com
https://blog.securityevaluators.com
Embedded device researchers often come across traditionally valuable vulnerabilities, such as…
Top 20 Latin America Tech Companies 2020
https://latin-america.cioreview.com/vendors/top-latin-america-tech-companies.html
🦠 @Phantasm_Lab
https://latin-america.cioreview.com/vendors/top-latin-america-tech-companies.html
🦠 @Phantasm_Lab
Forwarded from @Phantasm_Lab
The Hacker Wars takes you to the front lines of the high-stakes battle over the fate of the Internet, freedom and privacy.
🕴🏼 @Phantasm_Lab
🕴🏼 @Phantasm_Lab
Forwarded from @Phantasm_Lab
The Hacker Wars leva você até a linha de frente da batalha de alto risco sobre o destino da Internet, liberdade e privacidade.
🕴🏼 @Phantasm_Lab
🕴🏼 @Phantasm_Lab