Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
jony ive aces
Jun 14, 2012

designer of the lomarf car


Buglord
10 peperony and chease references only 90s kids will understand

Adbot
ADBOT LOVES YOU

jony ive aces
Jun 14, 2012

designer of the lomarf car


Buglord

ultramiraculous posted:

:lol:

oh yeah this 100% definitely happened




spankmeister
Jun 15, 2008






alternatively:

https://www.youtube.com/watch?v=44uYz6PuTj0

prefect
Sep 11, 2001

No one, Woodhouse.
No one.




Dead Man’s Band

three of those layers are terrible

Captain Foo
May 11, 2004

we vibin'
we slidin'
we breathin'
we dyin'

jony ive aces posted:

yeah literally everyone who isn't an infidel from the great satan amerikkka has autism :rolleyes:

now that's what i call a security fuckup!!!

that wasn't my point at all lmfao

Chris Knight
Jun 5, 2002

me @ ur posts


Fun Shoe

Main Paineframe posted:

For example, to start a queue you PUT to /queue/:name where :name is the unique identifier for your queue.

free man() on the lan

goddamnedtwisto
Dec 31, 2004

If you ask me about the mole people in the London Underground, I WILL be forced to kill you
Fun Shoe

prefect posted:

three of those layers are terrible

but enough about the osi model

goddamnedtwisto
Dec 31, 2004

If you ask me about the mole people in the London Underground, I WILL be forced to kill you
Fun Shoe
also:

https://twitter.com/JamesDeanTimes/status/538253074876612608/photo/1

Captain Foo
May 11, 2004

we vibin'
we slidin'
we breathin'
we dyin'

goddamnedtwisto posted:

but enough about the osi model

actually, agreed.

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

owns

Vicas
Dec 9, 2009

Sweet tricks, mom.

hahahaha thank you glorious republic of north korea

Shame Boy
Mar 2, 2010


we have this component at work that runs powerpoint using COM and macros and other fun things and whenever it gets an outcome it doesn't expect (like a popup) it presses escape and prints PRESSING ESCAPE to its log like 100 times and sends us an email that says PRESSING ESCAPE. so that last picture is technically accurate computering :colbert:

jre
Sep 2, 2011

To the cloud ?



computer toucher posted:

I've never heard of layered bean dips either.

Munkeymon
Aug 14, 2003

Motherfucker's got an
armor-piercing crowbar! Rigoddamndicu𝜆ous.



Chris Knight posted:

free man() on the lan

Peanut and the Gang
Aug 24, 2009

by exmarx
Seth Rogen movie looks funny as heck. Totes gonna watch it.

spankmeister
Jun 15, 2008






If any of y'all run OpenVPN you need to patch your stuff




[Openvpn-announce] OpenVPN 2.3.6 released - fixes a critical DoS issue
From: Samuli Seppänen <samuli@op...> - 2014-12-01 18:21:34
Attachments: openvpn-2.3.6-changelog openvpn-2.3.6-changelog.sig
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The OpenVPN community project team is proud to release OpenVPN 2.3.6. It
can be downloaded from here:

<http://openvpn.net/index.php/open-source/downloads.html>;

This release fixes a critical denial of service vulnerability in OpenVPN
servers (CVE-2014-8104). The vulnerability can be exploited by
authenticated clients only. Also note that confidentiality and
authenticity of traffic are not affected. More information about this
vulnerability is available on the Trac Wiki:

<https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b>;

This release also includes a few other fixes and enhancements.

A full list of changes is available here:

<https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn23>;

The changelog is also attached to this email.

The 2.2 branch in Git has also been patched for the DoS vulnerability.
Fixed source packages (2.2.3) are also provided, primarily for the
benefit of OpenVPN package maintainers. Official Windows installers
based on 2.2.3 will not be released.

For generic help use these support channels:

- - - Official documentation:
<http://openvpn.net/index.php/open-source/documentation/howto.html>;
- - - Wiki: <https://community.openvpn.net>;
- - - Forums: <https://forums.openvpn.net>;
- - - User mailing list: <http://sourceforge.net/mail/?group_id=48978>;
- - - User IRC channel: #openvpn at irc.freenode.net

Please report bugs and ask development questions here:

- - - Bug tracker and Wiki: <https://community.openvpn.net>;
- - - Developer mailing list: <http://sourceforge.net/mail/?group_id=48978>;
- - - Developer IRC channel: #openvpn-devel at irc.freenode.net (requires
Freenode registration)

- - --
Samuli Seppänen
Community Manager
OpenVPN Technologies, Inc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iEYEARECAAYFAlR8saQACgkQwp2X7RmNIqN63wCfWzr5rN60BoHuir//x0jSkvtQ
7n8An2ppL7+1QQ/3VxGMwlYbdEgBzu3q
=X0lz
-----END PGP SIGNATURE-----

spankmeister
Jun 15, 2008






this'll be fun for routers.

although you need to have a valid client cert so it's not a big deal if you trust your clients.

jony ive aces
Jun 14, 2012

designer of the lomarf car


Buglord

spankmeister posted:

The OpenVPN community project team is proud to release OpenVPN 2.3.6.
"the openvpn community project team is proud to have had vulns in its code"

jre
Sep 2, 2011

To the cloud ?



spankmeister posted:

If any of y'all run OpenVPN you need to patch your stuff
:eyepop:
fuuuuuuck

quote:

The vulnerability can be exploited by authenticated clients only.
Thank gently caress, panic over.

Bloody
Mar 3, 2013


please post screencaps of tweets for those of us who cannot get to the twit

Bloody
Mar 3, 2013

Westie
May 30, 2013



Baboon Simulator

Bloody posted:

please post screencaps of tweets for those of us who cannot get to the twit

Bloody
Mar 3, 2013

please post screencaps to popular image hosts that are unlikely to not be whitelisted

Wiggly Wayne DDS
Sep 11, 2010



project zero's internet explorer sandbox escape write-up is up

Captain Foo
May 11, 2004

we vibin'
we slidin'
we breathin'
we dyin'

Wiggly Wayne DDS posted:

project zero's internet explorer sandbox escape write-up is up

the safari one was cool, looking forward to this

ultramiraculous
Nov 12, 2003

"No..."
Grimey Drawer

quote:

Now if at this point you might be getting uncomfortable that’s understandable. As the marshaler is little different between DCOM and in-process COM this is surely a massive security hole? Fortunately not, the FTM doesn’t just send the pointer value it also tries to ensure only the same process which marshaled the pointer can unmarshal it again. It does this by generating a per-process 16 byte random value which is attached to the serialized data. When deserializing the FTM checks that the value matches the one in the current process, rejecting anything which is incorrect. The assumption here is an attacker can’t guess or brute-force such a value, therefore the FTM will never unmarshal an invalid pointer. But this threat model obviously doesn’t take into account being able to read process memory, and it just so happens we have just such a vulnerability.

i love this poo poo

spankmeister
Jun 15, 2008






jre posted:

:eyepop:
fuuuuuuck

Thank gently caress, panic over.

yah it's only a real issue if you don't trust your clients

Captain Foo
May 11, 2004

we vibin'
we slidin'
we breathin'
we dyin'

ultramiraculous posted:

i love this poo poo

same

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender
anyone got a good suggestion for skimming through the nmap xml output easily? i have seen some examples but i'd like to avoid writing my own parser

i will if i have to but i'd rather not

bobbilljim
May 29, 2013

this christmas feels like the very first christmas to me
:shittydog::shittydog::shittydog:

OSI bean dip posted:

anyone got a good suggestion for skimming through the nmap xml output easily? i have seen some examples but i'd like to avoid writing my own parser

i will if i have to but i'd rather not

im emailing u an xml file thats just full of laughs

pr0zac
Jan 18, 2004

~*lukecagefan69*~


Pillbug

OSI bean dip posted:

anyone got a good suggestion for skimming through the nmap xml output easily? i have seen some examples but i'd like to avoid writing my own parser

i will if i have to but i'd rather not

ive used python's libnmap for some basic stuff before and its not too bad

http://libnmap.readthedocs.org/en/latest/parser.html

Series DD Funding
Nov 25, 2014

by exmarx
proclick: https://dl.acm.org/citation.cfm?id=2673311

https :negative:

Bloody
Mar 3, 2013




im the y axis

ultramiraculous
Nov 12, 2003

"No..."
Grimey Drawer

Bloody posted:

im the y axis

tufte wept

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender


I need an audit on 127.0.0.1 done. Any takers? Please disclose your fee.

Captain Foo
May 11, 2004

we vibin'
we slidin'
we breathin'
we dyin'

Bloody posted:



im the y axis

dat fukken charte

suffix
Jul 27, 2013

Wheeee!
because i like the title:

IETF takes rifle off wall, grabs RC4 cipher's collar, goes behind shed

Captain Foo
May 11, 2004

we vibin'
we slidin'
we breathin'
we dyin'


same

minivanmegafun
Jul 27, 2004

Bloody posted:



im the y axis

not in it, voted 5

Adbot
ADBOT LOVES YOU

Winkle-Daddy
Mar 10, 2007
what the gently caress is with get.rvm.io and travis-ci.org being down all goddamn day? I think someone at work mentioned denial of service? goddammit i have a docker image i need to build that relies on get.rvm.io working. If they're using dnsimple, they need to find a dns provider that doesn't take going on 11 hours to deal with a denial of service attack, because this leads me to believe they're fuckin slow http://dnsimplestatus.com/

  • Locked thread