Mira
735 subscribers
802 photos
25 videos
20 files
263 links
sporadic attempts at cybersec.
personal channel.

files: @mira_files
playlist: @the_coding_playlist
Download Telegram
it's quite likely that the installation of new Go version fails especially if you're on linux. so instead of directly deleting the existing Go setup, move it to old directory and install the new one.

mv /usr/local/go /usr/local/old-go
tar -C /usr/local -xzf go1.22.6.linux-amd64.tar.gz
rm -rf /usr/local/old-go

if something goes wrong while installing the new version, itโ€™s good to have the previous one around.

#tips #golang #linux
@Mi_Ra_Ch
I'm not sure what's more awkward, asking to call someone or responding with a 'no'. But at least it's less awkward than saying 'yes.' Then you have to actually talk ๐Ÿ˜‘ calls drain too much energy ngl
๐Ÿ‘3๐Ÿ’ฏ3
๐Ÿคฃ6
literally me rn
โค3
XEE Attack: Exploiting Timing Differences for Information Disclosure

XEE (Cross-site Execution) attacks are a type of side-channel attack that exploits timing variations in a website's responses to deduce sensitive information. These attacks rely on the fact that different operations take varying amounts of time to complete, and these differences can be measured and analyzed to reveal otherwise hidden data.

How XEE Attacks Work:

XEE attacks typically involve injecting JavaScript code into a web page that observes the timing of the website's responses to different requests. For example, consider a login form that validates a user's password:

<form method="post" action="/login">
  <input type="text" name="username" placeholder="Username">
  <input type="password" name="password" placeholder="Password">
  <button type="submit">Login</button>
</form>


An attacker might inject a script that iterates through a list of potential passwords, sending each one to the login form:

// Example of a malicious script exploiting timing differences
function bruteForcePassword() {
  const passwords = ["password1", "password2", "secret", "12345", ...];
  for (let i = 0; i < passwords.length; i++) {
    const startTime = Date.now();
    // Submit the password to the login form
    document.querySelector("input[name='password']").value = passwords[i];
    document.querySelector("form").submit();
    // Measure the time it takes for the website to respond
    const endTime = Date.now();
    const responseTime = endTime - startTime;
    // Analyze the response time and try to deduce the correct password
    // (e.g., if the response time is significantly longer for a specific password, it might be the correct one)
    console.log("Response Time for password " + passwords[i] + ": " + responseTime);
  }
}


This script sends each password to the login form and measures the time it takes for the website to respond. If the response time is significantly longer for a specific password, the attacker might deduce that it is the correct one.

Exploiting Timing Variations:

XEE attacks can exploit various timing differences:

Database Queries: Different database queries can take different amounts of time to execute, depending on the complexity of the query and the size of the database.
Password Validation: Websites might take longer to validate incorrect passwords, especially if they involve complex hashing algorithms.
Cookie Processing: Websites might take longer to process and decrypt cookies containing sensitive information.

Defending Against XEE Attacks:

Constant Time Operations: Implement password validation and other sensitive operations with constant time complexity, meaning the execution time should remain consistent regardless of the input.
Timing Obfuscation: Randomly introduce delays in response times to make it difficult for attackers to measure accurate timing differences.
Secure Coding Practices: you gotta be aware of the potential for XEE attacks

Concluding thoughts

XEE attacks are a serious threat to web security, and require careful consideration with implementation of appropriate countermeasures.

#TakeAByte #XEEAttack #pentest
@Mi_Ra_Ch
โšก3๐Ÿ‘1
sup y'all ๐Ÿ™Œ
๐Ÿค5๐Ÿ‘€1
app-arm64-v8a-release.apk
7.4 MB
this is the latest apk for it
โค2
had a human-contact outside of my family members today. such a milestone ๐Ÿ˜Š๐Ÿ™Œ
๐Ÿ˜3๐Ÿ”ฅ2๐Ÿ‘€1
Go is a bit slower than compiled languages like C mostly due to its automated memory management also known as the "Go runtime". oftentimes this is for memory safety and simpler syntax.

#golang
*me proceeds to ask dad about our maid, and dad responds with "what maid?"
๐Ÿ˜9๐Ÿ‘1
I'm hoping a lot from Barca and Arsenal this year. both got a match today

fyi i've been a diehard fan of Barcelona since i was 6 or 7 ๐Ÿ˜ญ
๐Ÿ”ฅ3
Blessed are those who do not fear solitude, who are not afraid of their own company, who are not always desperately looking for something to do, something to amuse themselves with.


#quotes
โค1
lmao so true
๐Ÿ”ฅ6
facts ๐Ÿ’ฏ
โค4๐Ÿ’Š1
TIKVAH-ETHIOPIA
#Ethiopia #แแ‰ตแˆ• แ‰ แŠ แˆฐแ‰ƒแ‰‚ แˆแŠ”แ‰ณ แ‰ฐแ‹ฐแแˆซ แ‹จแ‰ฐแŒˆแ‹ฐแˆˆแ‰ฝแ‹ แ‹จ7 แ‹“แˆ˜แ‰ท แˆ…แŒปแŠ• แˆ”แ‰จแŠ• แ‰ณแˆชแŠญ แ‹จแ‰ แˆญแŠซแ‰ถแ‰ฝแŠ• แˆแ‰ฅ แ‹จแˆฐแ‰ แˆจ แŒ‰แ‹ณแ‹ญ แˆ†แŠ—แˆแข แ‹ญแˆ… แ‹ตแˆญแŒŠแ‰ต แ‹จแ‰ฐแˆแŒธแˆ˜แ‹ แŠจแ‹›แˆฌ #แŠ แŠ•แ‹ต_แ‹“แˆ˜แ‰ต แ‰ แŠแ‰ต แ‰ แ‰ฃแˆ…แˆญแ‹ณแˆญ แŠจแ‰ฐแˆ› แŠฅแŠ•แ‹ฐแˆ†แА แ‹›แˆฌแˆ แ‹ตแˆจแˆต แˆ˜แˆชแˆญ แˆ€แ‹˜แŠ• แ‹แˆตแŒฅ แ‹จแˆแ‰ตแŒˆแŠ˜แ‹ แŠฅแŠ“แ‰ต " แŠขแ‹ฎแˆƒ " แ‰ แ‰ฐแˆฐแŠ˜ แ‹จแˆ›แˆ…แ‰ แˆซแ‹Š แˆšแ‹ฒแ‹ซ แˆ‹แ‹ญ แ‰€แˆญแ‰ฃ แ‰ฐแŠ“แŒแˆซแˆˆแ‰ฝแข แˆ•แŒปแŠ• แˆ”แ‰จแŠ• แ‹จแ‰ฐแ‹ฐแˆแˆจแ‰ฝแ‹ แ‰ฐแŠจแˆซแ‹ญแ‰ฐแ‹ แ‹ญแŠ–แˆฉแ‰ แ‰ต แ‰ แАแ‰ แˆจ แŒแ‰ข แŠ แŠจแˆซแ‹ญ แАแ‹แข แ‹จแ‰ฐแ‹ฐแˆแˆจแ‰ฝแ‰ แ‰ตโ€ฆ
Jesus Christ!
Mira
Jesus Christ!
i can only imagine how many different cases are not still known and many parents have been mistreated in front of Justice.
Robi makes stuff
im in my listening more than talking era
this part of my life is called growing
โค3