Re: Re: Web 3.0 portknocking (14/01/22 00:03:37)
https://packetstormsecurity.com/files/22121/cd00r.c.html I did play around with portknocking around that time, it was a nifty concept but limited to computer enthusiasts circles. But never met anyone, or know of usecases that it was used in a enterprise setting.. Well NSA certainly saw the value as they used it in their toolset CTRL+F "dewdrop" https://en.m.wikipedia.org/wiki/The_Shadow_Brokers Actually there is a recent blog regarding reversing engineering dewdrop: " You can definitely see that architecture and code are carefully thought and engineered. They have been doing this for a long time and definitely have more resources than most (nation state) attackers. This isn’t some random proof of concept code. Almost every operating system is a target so their catalog is impressive. The problems of SIGINT and wanting to collect all the things. " RF |
back to main board | expand thread |
This board has been visited 216666 times | Current time is 06/07/22 19:14:06 |