43 Followers
84 Following
87 Posts
InfoSec Guy | Emacs enjoyer

In Hinblick auf die bevorstehende Potsdamer Sicherheitskonferenz am 19. und 20. April, habe ich zum dort vorgestellten Thema "Cybersicherheit und Digitale Souveränität" einige Gedanken in meinem neusten Blogeintrag veröffentlicht:

https://gkourgkoutas.net/posts/cybersicherheit-digitale-souveraenitaet/

#cybersec #infosec #digitalsovereignty

Cybersicherheit und Digitale Souveränität

Is it just me or did mastodon got more quiet in the last two weeks?

#infosec #mastodon

If bypassing #amsi with a PSv2 downgrade or amsi.fail is not working, you can still try invisi-shell:
https://github.com/OmerYa/Invisi-Shell

#hacking #windows #powershell #infosec

GitHub - OmerYa/Invisi-Shell: Hide your Powershell script in plain sight. Bypass all Powershell security features

Hide your Powershell script in plain sight. Bypass all Powershell security features - GitHub - OmerYa/Invisi-Shell: Hide your Powershell script in plain sight. Bypass all Powershell security features

GitHub
Some big news: We’re suing NSO Group, the spyware company, on behalf of fifteen journalists and others who were the victims of spyware attacks in El Salvador.
https://knightcolumbia.org/content/el-faro-journalists-knight-institute-sue-nso-group-over-spyware
El Faro Journalists, Knight Institute Sue NSO Group Over Spyware

Expired Domains | Backorder Pending Delete Domains

Expired Domains have the Pending Delete Status and will be deleted soon. You can Backorder Expired Domains before they drop to get them!

Want that AWS keys? Try this dork:

path:env AWS_KEY /(AKIA[A-Z0-9]{12,})/

GitHubs new search is 🔥​

#infosec #hacking #dorks #github #githubdorks

GitHub dorks are now possible under cs.github.com !

First dorks like:
/ssh:\/\/.*:.*@.*target\.com/
/ftp:\/\/.*:.*@.*target\.com/

can be used to find SSH/FTP passwords in the connection strings.

regex is powerful 

#infosec #hacking #dorks #github #githubdorks

What is the MOST accurate statement about a digital signature?

#infosec #qotw #security #cryptography

A method used to encrypt confidential data
0%
Allows the recipient of data to prove the datas source and its integrity
100%
The art of transferring handwritten signatures to electronic media
0%
It can be used as a crypto- and a signature system
0%
Poll ended at .

Unfortunately I have to stop actively working on #Metatext for a while due to health issues. I really wish I could implement Mastodon 4 features and squash every bug, but it's not possible for me to do so right now.

I know the app has become important to a lot people, so I'm open to a new maintainer who can carry on its values of privacy and accessibility taking it over if there's interest and a fit. Email [email protected] if you (or your organization) are interested

Trying to hide the existence of a wireless network by disabling SSID broadcasting is not a true mechanism of security.

#wifi #security #securitythroughobscurity