Skip to main content

Posts

Showing posts with the label information security

E-Mail and XMPP Setup

What you will get You get a free anonymous E-Mail address and an XMPP/Jabber account using the same details. Your Jabber ID is user@danwin1210.de and can be connected to directly from clearnet or via TOR hidden service (danielas3rtn54uwmofdo3x2bsdifr47huasnmbgqzfrec5ubupvtpid.onion). You will have 50MB of disk space available for your mails. If you desperately need more space, just contact me . Your E-Mail address will be user@danwin1210.de For privacy, please use PGP mail encryption, if you can. This prevents others from reading your mails (including me and/or LEA). GnuPGs official home: https://gnupg.org Windows GUI: https://gpg4usb.org E-Mail Setup SMTP: danwin1210.de Port 465 (SSL/TLS) or 587 (StartTLS) IMAP: danwin1210.de Port 993 (SSL/TLS) or 143 (StartTLS) POP3: danwin1210.de Port 995 (SSL/TLS) or 110 (StartTLS) Authentication: PLAIN, LOGIN You can also connect on the same ports via the tor onion address danielas3rtn54uwmofdo3x2bsdifr47huasnmbgqzfrec5...

Hackers Can Take Full Control of Online Compilers through a Common Exploit

Online compilers are a handy tool to save time and resources for coders, and are freely available for a variety of programming languages. They are useful for learning a new language and developing simple programs, such as the ubiquitous “Hello World” exercise. I often use online compilers when I am out, so that I don’t have to worry about locating and downloading all of the resources myself. Since these online tools are essentially remote compilers with a web interface, I realized that I might be able to take remote control of the machines through command injection. My research identified a common weakness in many compilers: inadequate sanitization of user-submitted code prior to execution. My analysis revealed that this lack of input filtration enables exploits that an hacker can use to take control of the machine or deliberately cause it to crash. A clever attacker can exploit built-in C functions and POSIX libraries to gain control over the computer hosti...