WordPress 5.1–critical exploit chain that enables an unauthenticated attacker to gain remote code execution on any WordPress installation:
– exploit is possible due to a CSRF vulnerability in comment forms
– fixed in WordPress 5.1.1
~=8 Character Passwords Are Dead=~
New benchmark from the Hashcat Team shows a 2080Ti GPU passing 100 Billion password guesses per second (NTLM hash).
This means that the entire keyspace, or every possible combination of:
...of an 8 character password can be guessed in:
(8x 2080Ti GPUs against NTLM Windows hash)
My challenge answer was accepted for 'Hack The Admin Panel Challenge'! :) Try it here: https://www.bugbountynotes.com/challenge?id=442
One of the questions I am asked at the #Eunomia meeting, are there any politicians/journalists using Mastodon? Help me out
does anyone have a script to reset permissions to default on everything in the mastodon directory?
*Extremely* well done... I really need to see this movie
Ok.... this one won the memes for me today #it
SysAdmin and IT Security Enthusiast
r3pek.org is one server in the network