Router exploitation with Metasploit
I also plan to write an abbreviated version on vagn.es next week if you're not up to reading almost 80 pages :p
hence, this is what I wrote my thesis about: rubberduckies in a forensic environment
if you wanna read it, it's freely available here:
So it's actually not that cut and dry, because I looked at p4wnp1 and other existing solutions to be used in a forensic setting, but they never seem to really fit my specs.
tired: use existing rubberducky solutions
wired: create a new one in circuitpy 👀
I think my instance is stable enough to move to, so I think I will do just that.
Thanks for hosting me this long time @jerry , all the best!
Thank you and My #infosec Hopes For 2019
Also, it does not seem to federate properly
So I'm moving to a pleroma instance I set up at social.qore.no , but I have some problems. Often it logs "Signature missing or not from author, relayed Create message, fetching object from source"
To people actually understanding pleroma, is this normal? I'm not sure if web push keys are correctly configured...