锐评无限暖暖:
是兄弟,就来一起做姐妹
4K爽玩,每一根头发丝都看得清清楚楚,5800X3D+4080S不热不掉帧
TPP腰射怎么不给准心,此外战斗动作交互很一般,二段跳都给了,但没有翻滚也没有滑铲,有点难受……噢原来这是美少女换装游戏,确实不需要翻滚滑铲……这是吗?总之没有那种闪身走位擦弹弹反的感觉
开局中配就没绷住于是换日配,听完女神感觉日配也很难绷,换了英配,虽然有点棒读至少玩的时候绷住了
野外收集点太多了,永远怀念无主之地的拾取机制,能不能学人家做个带F键交互的自动拾取,这对于我们什么小物品都想毛的hobo玩家来说很重要
感觉衣品比◯神好太多,玩不下◯神的人真可以玩这个(不是我想拐◯神但它确有◯感
开服送的套装比池子里的好看太多谁懂
经典叠纸定价,还好开服送的抽也很多,玩完开服福利和首充之后就不想充钱了
致敬传奇淘米游戏哈奇小镇
4K爽玩,每一根头发丝都看得清清楚楚,5800X3D+4080S不热不掉帧
开局中配就没绷住于是换日配,听完女神感觉日配也很难绷,换了英配,虽然有点棒读至少玩的时候绷住了
野外收集点太多了,永远怀念无主之地的拾取机制,能不能学人家做个带F键交互的自动拾取,这对于我们什么小物品都想毛的hobo玩家来说很重要
感觉衣品比◯神好太多,玩不下◯神的人真可以玩这个(不是我想拐◯神但它确有◯感
开服送的套装比池子里的好看太多谁懂
经典叠纸定价,还好开服送的抽也很多,
💊5
Pseudorandom Thoughts
https://github.com/IBM/plex/pull/606
这几天Plex突然“火出圈”了,刚好有群友讨论到“抽象的人字头”,所以经典回顾一下这篇博文
https://www.thetype.com/2021/06/21723/
https://www.thetype.com/2021/06/21723/
The Type
The Type — 油墨陷阱和它的朋友们
最近我看到了伊夫斯·彼得斯(Yves Peters)在推特上询问图中尖刺的正式名称叫什么,我简短地回答了一下( […]
DFIR笑传之常常备
数据无价 谨慎操作
给亲友进行一个硬盘扩容抢救,原盘抛开写入寿命已经用掉20%不说,明明响应时间已经飞50ms甚至100ms了,测盘还是全绿的,SMART也非常宁静祥和,可能是太满了(余量10%)。相关数据截图不放出保护当事人隐私
经验1:痛苦地解了一晚上bitlocker和拷贝,事后想想是不是先逐字节对拷到新盘再解bitlocker会好一点,但那样搞我都怕从TPM到SB到卷内的任意一环出问题导致全盘锁解不开,Bitlocker+微软账号的设计对普通人还是过于不友善了,没有计算机管理经验的人谁会记得备份密钥.txt啊
经验2:真心建议从事非涉密的数字创作的朋友们人手一个小NAS进行准实时同步备份,群晖算1个能用的,其他牌子后果自负
经验3:固态硬盘留出至少15%可用空间,不然读写速度响应时间真要爆了
经验4:数据恢复是私人op动作中唯一一个适合在周五做的事情,因为工作日时间不够用但他是挂机等待类型
数据无价 谨慎操作
给亲友进行一个硬盘扩容抢救,原盘抛开写入寿命已经用掉20%不说,明明响应时间已经飞50ms甚至100ms了,测盘还是全绿的,SMART也非常宁静祥和,可能是太满了(余量10%)。相关数据截图不放出保护当事人隐私
经验1:痛苦地解了一晚上bitlocker和拷贝,事后想想是不是先逐字节对拷到新盘再解bitlocker会好一点,但那样搞我都怕从TPM到SB到卷内的任意一环出问题导致全盘锁解不开,Bitlocker+微软账号的设计对普通人还是过于不友善了,没有计算机管理经验的人谁会记得备份密钥.txt啊
经验2:真心建议从事非涉密的数字创作的朋友们人手一个小NAS进行准实时同步备份,群晖算1个能用的,其他牌子后果自负
经验3:固态硬盘留出至少15%可用空间,不然读写速度响应时间真要爆了
经验4:数据恢复是私人op动作中唯一一个适合在周五做的事情,因为工作日时间不够用但他是挂机等待类型
Forwarded from idapro (Not official)
Kaspersky's GReAT has released private plugin – the hrtng plugin for IDA Pro, the result of nearly 10 years of work. Packed with 37 advanced features, the plugin includes entirely new capabilities along with powerful upgrades to popular third-party plugins.
Each feature comes with detailed descriptions, demo links, and practical examples, all designed to make malware analysis faster, more effective, and more efficient.
An example of usage hrtng plugin to dissect FinSpy spyware is here
Each feature comes with detailed descriptions, demo links, and practical examples, all designed to make malware analysis faster, more effective, and more efficient.
An example of usage hrtng plugin to dissect FinSpy spyware is here
GitHub
GitHub - KasperskyLab/hrtng: IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition…
IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformations - KasperskyLab/hrtng
Forwarded from vx-underground
vx-underground Black Mass Research Group presents: Minegrief.
tl;dr a computer worm that targets minecraft
https://github.com/blackmassgroup/minegrief
tl;dr a computer worm that targets minecraft
https://github.com/blackmassgroup/minegrief
GitHub
GitHub - blackmassgroup/minegrief: Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning…
Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encrypting Minecraft worlds, and phishing players who connect. - blac...
🎉1💊1
国内排名前三的云厂商里面至少有两家厂商的专有云负载均衡产品的webconsole及其后端不能正确处理哪怕稍微花一点的PEM封装的证书,气笑了,我看还是优化少了,人和平台都是
💊4🎉1
Forwarded from vx-underground
We're witnessing the evolution of ransomware.
Yesterday someone informed us of the existence of the new TTP of AWS S3 extortion. More specifically, Threat Actors abusing the Amazon Key Management Service (KMS) to encrypt company AWS buckets (or any cloud provider).
We have never heard of this until yesterday.
RhinoSecurity wrote a paper on AWS S3 extortion, the methodology in which it's deployed, and wrote a simple AWS CLI script to accomplish the task.
It's 25 lines of Python code.
Yesterday someone informed us of the existence of the new TTP of AWS S3 extortion. More specifically, Threat Actors abusing the Amazon Key Management Service (KMS) to encrypt company AWS buckets (or any cloud provider).
We have never heard of this until yesterday.
RhinoSecurity wrote a paper on AWS S3 extortion, the methodology in which it's deployed, and wrote a simple AWS CLI script to accomplish the task.
It's 25 lines of Python code.
Forwarded from vx-underground
vx-underground
We're witnessing the evolution of ransomware. Yesterday someone informed us of the existence of the new TTP of AWS S3 extortion. More specifically, Threat Actors abusing the Amazon Key Management Service (KMS) to encrypt company AWS buckets (or any cloud…
Rhino Security Labs
S3 Ransomware Part 1: Attack Vector
In part one of this two-part blog series, we detail the attack vector of Amazon S3 Ransomware. We also include a PoC script to demonstrate the attack.
哦真的牛批 还有这种勒索 这下云厂商不得不在私藏用户密钥和丢失勒索数据之间创死一个了
省流:AWS的KMS服务,开公共加密权限,给别人开了公共写的桶全加密了,然后把钥匙扔了
省流:AWS的KMS服务,开公共加密权限,给别人开了公共写的桶全加密了,然后把钥匙扔了
💊7
最近半年干SRE捉的稀有网络虫子总结(高松灯并感)
1. 目标服务器访问微信API,会出现无连接静置一段时间后,重新连接产生大量丢失,直到数分钟后重新成功。原因是目标服务器出口防火墙采用的域名白名单实现有病,不采用Host头或SNI嗅探,而是抓DNS 53的包并将匹配了域名的A记录返回IP计入白名单,白名单TTL即为DNS指派的TTL。当客户端实现的DNS记录TTL长于DNS记录指定的TTL,或是二者之间存在时间差时,防火墙的白名单已经凋亡,但客户端并不会重新发DNS请求,白名单不会重新上新,于是请求被拦截。
2. 服务器属主反馈称进行扫描后发现托管的其服务器互联网IP的25和110端口没有开启服务但是暴露监听,出于安全考量,希望关闭。本端换用各种互联网IP尝试访问均不通,全网tcping也不通,但是属主反馈称他们有线宽带出口和手机热点均可复现,也确实有截图为证。原因是客户终端安装的零信任网关驱动会劫持邮件端口流量进行敏感信息过滤。
3. 修改DNS解析记录,等了三倍的TTL,仍然出现部分浏览器访问时导向原记录站点。原因疑似是国内手机厂商的浏览器采用的DNS疑似掺了私货,超时缓存相关记录。
锐评:不知道想出这么多神人实现方式的程序员的脑子一个月值多少钱,反正至少比我拿得多
1. 目标服务器访问微信API,会出现无连接静置一段时间后,重新连接产生大量丢失,直到数分钟后重新成功。原因是
2. 服务器属主反馈称进行扫描后发现托管的其服务器互联网IP的25和110端口没有开启服务但是暴露监听,出于安全考量,希望关闭。本端换用各种互联网IP尝试访问均不通,全网tcping也不通,但是属主反馈称他们有线宽带出口和手机热点均可复现,也确实有截图为证。原因是
3. 修改DNS解析记录,等了三倍的TTL,仍然出现部分浏览器访问时导向原记录站点。原因疑似是
锐评:不知道想出这么多神人实现方式的程序员的脑子一个月值多少钱,反正至少比我拿得多
Forwarded from OG: BATTLEGROUNDS
Here's a little surprise for y'all: We're now OPEN SOURCE!
https://github.com/H4TIUX/PUBG2017PS
https://github.com/H4TIUX/PUBG2017PS
GitHub
GitHub - H4TIUX/PUBG2017PS: A PUBG 2017 Open Source Private Server.
A PUBG 2017 Open Source Private Server. Contribute to H4TIUX/PUBG2017PS development by creating an account on GitHub.
💊1