mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.
Irish Mastodon - run from Ireland, we welcome all who respect the community rules and members.

Administered by:

Server stats:

1.6K
active users

#tcpdump

0 posts0 participants0 posts today
Furi Labs<p>Spy-Free FuriOS <a href="https://furilabs.com/spy-free-furios/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">furilabs.com/spy-free-furios/</span><span class="invisible"></span></a></p><p>FuriOS Doesn’t Spy on You - Unlike the Others. Read more.</p><p><a href="https://fosstodon.org/tags/flx1" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>flx1</span></a> <a href="https://fosstodon.org/tags/furios" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>furios</span></a> <a href="https://fosstodon.org/tags/furilabs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>furilabs</span></a> <a href="https://fosstodon.org/tags/FuriPhoneFLX1" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FuriPhoneFLX1</span></a> <a href="https://fosstodon.org/tags/LinuxOnMobile" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxOnMobile</span></a> <a href="https://fosstodon.org/tags/LinuxMobile" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxMobile</span></a> <a href="https://fosstodon.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://fosstodon.org/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> <a href="https://fosstodon.org/tags/tcpdump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcpdump</span></a> <a href="https://fosstodon.org/tags/telemetry" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>telemetry</span></a></p>
Hestia Hacker<p>The latest release of the <a href="https://mastodon.social/tags/AirGradient" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AirGradient</span></a> firmware removed the code that phones home to the company servers even when you check the to to explicitly tell it not to do so. This is a big win for <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> and <a href="https://mastodon.social/tags/SelfHosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SelfHosting</span></a>!</p><p><a href="https://github.com/airgradienthq/arduino/releases/tag/3.2.0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/airgradienthq/ardui</span><span class="invisible">no/releases/tag/3.2.0</span></a></p><p>I plan on flashing this onto my device and testing it to verify nothing was missed. <a href="https://mastodon.social/tags/tcpdump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcpdump</span></a> and <a href="https://mastodon.social/tags/wireshark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireshark</span></a> are my friends. 😄</p><p><a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/OpenHardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenHardware</span></a> <a href="https://mastodon.social/tags/electronics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>electronics</span></a></p>
@infosec_jcp 🐈🃏 done differently<p>The <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> low hanging fruit easy win is a simple solution:</p><p><a href="https://infosec.exchange/tags/AuditOfficerProxies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AuditOfficerProxies</span></a> <a href="https://infosec.exchange/tags/StateSponsoredMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StateSponsoredMalware</span></a> <a href="https://infosec.exchange/tags/accesslogs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>accesslogs</span></a> &amp; <a href="https://infosec.exchange/tags/Meta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meta</span></a> via <a href="https://infosec.exchange/tags/TCPDUMP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TCPDUMP</span></a> <a href="https://infosec.exchange/tags/EvidenceCollected" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EvidenceCollected</span></a> already that proves exactly this fact!</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/StateSponsoredMalwareAudits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StateSponsoredMalwareAudits</span></a> <a href="https://infosec.exchange/tags/CALEAGreyMarket" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CALEAGreyMarket</span></a> <a href="https://infosec.exchange/tags/CALEAInvestgations" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CALEAInvestgations</span></a> </p><p><a href="https://infosec.exchange/tags/OfficerProxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OfficerProxy</span></a>🤝<a href="https://infosec.exchange/tags/OrganziedCrimeRings" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OrganziedCrimeRings</span></a> 🔍🧐⚖️👮👩‍⚖️👨‍⚖️</p>
@infosec_jcp 🐈🃏 done differently<p>BOLO for <a href="https://infosec.exchange/tags/OfficerProxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OfficerProxy</span></a> </p><p><a href="https://infosec.exchange/tags/OfficerProxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OfficerProxy</span></a> has been known to hide <a href="https://infosec.exchange/tags/IdentityTheftRings" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityTheftRings</span></a> &amp; <a href="https://infosec.exchange/tags/GangStalkers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GangStalkers</span></a> using <a href="https://infosec.exchange/tags/OfficerProxies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OfficerProxies</span></a> access to this <a href="https://infosec.exchange/tags/CALEA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CALEA</span></a> <a href="https://infosec.exchange/tags/StateSponsoredMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StateSponsoredMalware</span></a> access to <a href="https://infosec.exchange/tags/GammaGroup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GammaGroup</span></a>'s <a href="https://infosec.exchange/tags/FinFisher" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinFisher</span></a> <a href="https://infosec.exchange/tags/FinSpy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinSpy</span></a> <a href="https://infosec.exchange/tags/Finsky" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Finsky</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> by <a href="https://infosec.exchange/tags/FacebookGroups" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FacebookGroups</span></a> organizing their targeted <a href="https://infosec.exchange/tags/IdentityTheft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityTheft</span></a> using <a href="https://infosec.exchange/tags/FakeProfiles" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FakeProfiles</span></a> of their targets.</p><p>Be aware that some <a href="https://infosec.exchange/tags/OfficerProxies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OfficerProxies</span></a> are getting thousands of dollars of ' kickbacks for access ' for their criminal <a href="https://infosec.exchange/tags/Facebook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Facebook</span></a> leverage <a href="https://infosec.exchange/tags/OrganizedCrimeRings" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OrganizedCrimeRings</span></a> in multiple states and cities.</p><p><a href="https://infosec.exchange/tags/InternalAffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InternalAffairs</span></a> <a href="https://infosec.exchange/tags/investigations" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>investigations</span></a> </p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/Fortune1000" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fortune1000</span></a> <a href="https://infosec.exchange/tags/CorporateEspionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CorporateEspionage</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/TCPDUMP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TCPDUMP</span></a> <a href="https://infosec.exchange/tags/MetaUsers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MetaUsers</span></a> 👨‍⚖️👩‍⚖️⚖️👮</p>
ДевоПес<p>У розробників цікавий баг - якщо простий <a href="https://twiukraine.com/tags/NodeJS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NodeJS</span></a> скріпт, який робить GET запит у сторонній API, запускати локально він працює. Якщо усе те саме але в <a href="https://twiukraine.com/tags/docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>docker</span></a> - прилетає 403. Перехопив через <a href="https://twiukraine.com/tags/tcpdump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcpdump</span></a> пакети у обох випадках та бачу, що запити ідентичні. Як це пояснити - в мене зовсім зкінчились ідеї</p>
@infosec_jcp 🐈🃏 done differently<p>Today is also a remeberence day of how <a href="https://infosec.exchange/tags/StateSponsoredMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StateSponsoredMalware</span></a> from <a href="https://infosec.exchange/tags/GammaGroup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GammaGroup</span></a> is used for a <a href="https://infosec.exchange/tags/masssurveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>masssurveillance</span></a> <a href="https://infosec.exchange/tags/GreyMarketCALEA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GreyMarketCALEA</span></a> <a href="https://infosec.exchange/tags/DigitalSlaverySystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalSlaverySystem</span></a> but also is being watched by other <a href="https://infosec.exchange/tags/StateSponsoredMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StateSponsoredMalware</span></a> that competes with <a href="https://infosec.exchange/tags/FinFisher" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinFisher</span></a> <a href="https://infosec.exchange/tags/FinSpy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinSpy</span></a> <a href="https://infosec.exchange/tags/Finsky" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Finsky</span></a> who's 100's of MILLIONS of installs of its clients in <a href="https://infosec.exchange/tags/AMER" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AMER</span></a> is used for <a href="https://infosec.exchange/tags/cryptowallettheft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptowallettheft</span></a>, <a href="https://infosec.exchange/tags/identitytheft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>identitytheft</span></a> , <a href="https://infosec.exchange/tags/propaganda" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>propaganda</span></a> &amp; <a href="https://infosec.exchange/tags/GangStalking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GangStalking</span></a> purposes by <a href="https://infosec.exchange/tags/OfficerProxys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OfficerProxys</span></a>', luckily, <a href="https://infosec.exchange/tags/InternalAffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InternalAffairs</span></a> can review who accessed what, when &amp; where, for public reviews 🔍🧐.</p><p>Every Day is <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <br> 👀<br> 🔬<br> ☣️📲☣️<br> 👨‍⚖️ <a href="https://infosec.exchange/tags/CALEA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CALEA</span></a> <a href="https://infosec.exchange/tags/TCPDUMP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TCPDUMP</span></a> <a href="https://infosec.exchange/tags/watchDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>watchDay</span></a> 👩‍⚖️</p>
T_X<p>And on another good news, got some sign of life from a <a href="https://chaos.social/tags/tcpdump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcpdump</span></a> / <a href="https://chaos.social/tags/libpcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>libpcap</span></a> maintainer. Hopefully the <span class="h-card" translate="no"><a href="https://social.freifunk.net/@batadv" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>batadv</span></a></span> dissector for libpcap will be merged eventually... It's been more than 4 years already with only eventual feedback from upstream... This would really help with debugging network issues, especially on <a href="https://chaos.social/tags/embedded" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>embedded</span></a> devices, and capturing only the data you need with minimal performance overhead.</p>
Brad<p>2024-12-18 (Wednesday): Posted a <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> with one week of server scans. probes &amp; web traffic hitting my server at www.wiresharkworkshop[.]online.</p><p>Window of traffic in the pcap is from 2024-12-13 at 00:00:00 UTC to 2024-12-18 at 23:59:59 UTC</p><p>It's an Apache web server (no HTTPS) with a small index page. I have a session of <a href="https://infosec.exchange/tags/tcpdump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcpdump</span></a> running to capture any traffic over the external interface.</p><p>I filter out the internal traffic generated for OS updates, NTP and such, so it should only have the external traffic coming in and the server's response to it.</p><p><a href="https://www.malware-traffic-analysis.net/2024/12/18/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">024/12/18/index.html</span></a></p>
Pyrzout :vm:<p>Comando tcpdump de Linux: cómo analizar paquetes en tu red <a href="https://blog.elhacker.net/2024/12/comando-tcpdump-de-linux-como-analizar-trafico-red.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.elhacker.net/2024/12/coma</span><span class="invisible">ndo-tcpdump-de-linux-como-analizar-trafico-red.html</span></a> <a href="https://social.skynetcloud.site/tags/tutorial" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tutorial</span></a> <a href="https://social.skynetcloud.site/tags/tcpdump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcpdump</span></a> <a href="https://social.skynetcloud.site/tags/manual" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>manual</span></a></p>
DrScriptt<p>It has been zero* days since <a href="https://oldbytes.space/tags/tcpdump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcpdump</span></a> and <a href="https://oldbytes.space/tags/Wireshark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireshark</span></a> have helped solve a problem.</p><p>I read a response from an application developer this morning saying that the packet capture I collected on Friday gave them insight into what the problem was. </p><p>*zero because of when I read reply / three for when I captured and analyzed traffic</p>
@infosec_jcp 🐈🃏 done differently<p><a href="https://infosec.exchange/tags/TIL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TIL</span></a> two new <a href="https://infosec.exchange/tags/GamaGroup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GamaGroup</span></a> <a href="https://infosec.exchange/tags/FinFisher" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinFisher</span></a> <a href="https://infosec.exchange/tags/FinSpy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinSpy</span></a> <a href="https://infosec.exchange/tags/Finsky" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Finsky</span></a> verified attaccc node FQDN &amp; ips! 🤡🔴😆</p><p>Here's the verified <a href="https://infosec.exchange/tags/GammagRoUp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GammagRoUp</span></a> attaccc node list for your <a href="https://infosec.exchange/tags/TCPDUMP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TCPDUMP</span></a> <a href="https://infosec.exchange/tags/Meta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meta</span></a>🔍🧐 list of <a href="https://infosec.exchange/tags/CorporateEspionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CorporateEspionage</span></a> targets to add to the <a href="https://infosec.exchange/tags/watchlists" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>watchlists</span></a> <br>🤡<br>⚠️<br>👇<br><a href="https://infosec.exchange/@infosec_jcp/111643255388069969" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@infosec_jcp/</span><span class="invisible">111643255388069969</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
@infosec_jcp 🐈🃏 done differently<p><a href="https://infosec.exchange/tags/Investigate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Investigate</span></a>🤝<a href="https://infosec.exchange/tags/TCPDUMP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TCPDUMP</span></a>🤝<a href="https://infosec.exchange/tags/Meta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meta</span></a>🤝<a href="https://infosec.exchange/tags/GammaGroup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GammaGroup</span></a>🤝2000-2024<br>🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/FraudPlatforms" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FraudPlatforms</span></a> <a href="https://infosec.exchange/tags/BusinessModels" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BusinessModels</span></a></p>
Wireshark<p>Here are some more highlights from the agenda of SharkFest'24 EUROPE, coming up this 4-8 November in Vienna, Austria!</p><p>- How to analyze like a pro (Roland Knall)<br>- Making online conferencing work in secured company networks (Robert Hess)<br>- Automatically trigger captures via <a href="https://ioc.exchange/tags/tcpdump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcpdump</span></a> when a suspicious event occurs in your Kubernetes cluster (Thomas Labarussias)</p><p>Find out more and register: <a href="https://sharkfest.wireshark.org/sfeu" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sharkfest.wireshark.org/sfeu</span><span class="invisible"></span></a></p><p><a href="https://ioc.exchange/tags/Wireshark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wireshark</span></a></p>
@infosec_jcp 🐈🃏 done differently#OpenDNS🔎#YouTube playlists
@infosec_jcp 🐈🃏 done differently<p><span class="h-card" translate="no"><a href="https://press.coop/@Independent" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Independent</span></a></span> </p><p>' ... but school shootings in USA went UP during Republican leadership &amp; then also increased after they lost in 2020 ! '</p><p>Citation:<br><a href="https://infosec.exchange/@rbreich@masto.ai/113087446326171323" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@rbreich@mast</span><span class="invisible">o.ai/113087446326171323</span></a></p><p>Does this mean the usage of <a href="https://infosec.exchange/tags/GammaGroup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GammaGroup</span></a>'s <a href="https://infosec.exchange/tags/FinFisher" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinFisher</span></a> <a href="https://infosec.exchange/tags/FinSpy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinSpy</span></a> <a href="https://infosec.exchange/tags/Finsky" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Finsky</span></a> from <a href="https://infosec.exchange/tags/Meta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meta</span></a> could be tracked as a cause via <a href="https://infosec.exchange/tags/tcpdump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcpdump</span></a>🤝<a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> since 1996? ⚖️☝️</p>
DIGITAL PRIVACY .DIY<p>New "Extras" is available</p><p>This tutorial is to help you to dig deeper into your devices.<br>See what your specific device/software does on your server, phone and desktop.</p><p>The tutorial works with the following programs/systems:<br>* <a href="https://fosstodon.org/tags/mitmproxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mitmproxy</span></a><br>* <a href="https://fosstodon.org/tags/wireshark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireshark</span></a> <br>* <a href="https://fosstodon.org/tags/tcpdump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcpdump</span></a><br>* <a href="https://fosstodon.org/tags/frida" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>frida</span></a> <br> * objection<br>* <a href="https://fosstodon.org/tags/proxychain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxychain</span></a>-ng<br>* <a href="https://fosstodon.org/tags/tsocks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tsocks</span></a><br>* <a href="https://fosstodon.org/tags/pcapdroid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcapdroid</span></a><br>* <a href="https://fosstodon.org/tags/openwrt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openwrt</span></a> <br>* <a href="https://fosstodon.org/tags/opnsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opnsense</span></a><br>* <a href="https://fosstodon.org/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> 11<br>* <a href="https://fosstodon.org/tags/firefox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firefox</span></a><br>* <a href="https://fosstodon.org/tags/socks5" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socks5</span></a> <br>* <a href="https://fosstodon.org/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a></p><p><a href="https://digitalprivacy.diy/news/en/device-inspections-with-mitmproxy-wireshark-and-other-clever-tools" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">digitalprivacy.diy/news/en/dev</span><span class="invisible">ice-inspections-with-mitmproxy-wireshark-and-other-clever-tools</span></a></p><p><a href="https://fosstodon.org/tags/tutorial" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tutorial</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://fosstodon.org/tags/mitm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mitm</span></a> <a href="https://fosstodon.org/tags/network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>network</span></a> <a href="https://fosstodon.org/tags/proxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxy</span></a> <a href="https://fosstodon.org/tags/german" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>german</span></a> <a href="https://fosstodon.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://fosstodon.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p>
@infosec_jcp 🐈🃏 done differently#GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on IPs LARGE LIST
@infosec_jcp 🐈🃏 done differently#GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #CloudFront
@infosec_jcp 🐈🃏 done differently#GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #akamai
@infosec_jcp 🐈🃏 done differently#GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #Google