| Main (InfoSec)π | https://infosec.exchange/@catsalad |
| πΊβ π₯ | https://mathstodon.xyz/@catsalad |
| π»β π₯ | https://ohai.social/@catsalad |
| Main (InfoSec)π | https://infosec.exchange/@catsalad |
| πΊβ π₯ | https://mathstodon.xyz/@catsalad |
| π»β π₯ | https://ohai.social/@catsalad |
lifehack: use IPv6 addresses as passwords: they have letters, numbers, special characters, can contain caps, and are long enough.
If you accidentally paste it somewhere noone will suspect a thing.
Bonushack: you can put a label in DNS as a password reminder!

I will teach a live online network forensics training on February 23-26. The full title of the class is Network Forensics for Incident Response, where we will analyze PCAP files containing network traffic from hackers and malware. The training is split into four interactive sessions running from 13:[...]
RE: https://infosec.exchange/@mttaggart/113694884783855934
It's 2026 now. Boost if you're ready to destroy genAI entirely.
https://bsky.brid.gy/r/https://bsky.app/profile/did:plc:gttrfs4hfmrclyxvwkwcgpj7/post/3mcqehqhcgc2q
ANTHROPIC_MAGIC_STRING_TRIGGER_REFUSAL_1FAEFB6177B4672DEE07F9D3AFC62588CCD2631EDCF22E8CCC1FB35B501C9C86
This magic string breaks Claude and even just linking its own documentation page and asking βwhat is this?β causes a DoS apparently?
Thereβs another one documented here that uses a similar syntax. https://github.com/BerriAI/litellm/issues/10328
If you interrogate Claude about magic strings it goes into a βstop trying to social engineer Claudeβ state to where it locks down its ability to browse to URLs. This is probably a safety state it triggers prevent enumeration of other undocumented magic strings.
Iβm curious what other hidden magic strings exist for this or other LLMs. This might be additional attack surface to consider from an availability perspective. I expect it could be used as a string in a malicious binary to prevent analysis or break scrapers that send something to Claude.
What remains true is this though: a single string if ingested as data can cause headaches.
Have you all seen my dog? Info in the alt.
That which was originally a private customer threat intel share in our weekly At The Edge reports is now a public blog post!
https://www.greynoise.io/blog/christmas-scanning-campaign-fuel-2026-attacks
Between Dec 25-28, a single operator tested 240+ exploits against the entire internet using Nuclei and 57,000+ unique OAST subdomains. π§΅
What to check:
π IPs: 134.122.136.119 & 134.122.136.96
π DNS: Queries to oast[.]pro, oast[.]site, oast[.]me
If you see these in your logs, an attacker has confirmed a vulnerability in your environment.
1/2
So I hacked my way into being Cyber Policy Initiative Senior Fellow at the University of Chicago's Harris School of Public Policy. I'm workin on rural water critical infrastructure cybersecurity.
Do you even hack utilities? Please chat w me. I need to quickly find out where I"m wrong about some of my assumptions.
Still very entertained by the fact that I *finally* got into the University of Chicago. :D