For the best experience on desktop, install the Chrome extension to track your reading on news.ycombinator.com
Hacker Newsnew | past | comments | ask | show | jobs | submit | history | LiveOverflow's commentsregister

interesting! I never thought about that somebody might interpret it in this way


Do you know where I could get old IRC logs? I was looking for some but couldn't find any. I guess most of them are not archived anywhere?

IRC logs of #hack etc. would be gold!


It's a shame http://bash.org/ isn't datestamped.


Oh god, I hope not. My webarchived geocities from 1997 is cringy enough. I don't need to remember what I was saying on EFNet in 1993.


Must be advanced because:

> Throw away your paid tools because this is some God level shit. Now with 4 hand written parsers, an intelligent payload generator, powerful fuzzing engine, DOM scanner, hidden parameter discovery and an incredibly fast crawler. F*cking retweet it!

- https://twitter.com/s0md3v/status/1061255510677057537

> Exactly, that's why you have no idea how it works and all. Well, it took me a month and being a developer of 30+ open source software, this is the first time I am saying this is some God level shit and I mean it.

- https://twitter.com/s0md3v/status/1061662698335723520


Why the heck would "four hand written parsers" be a selling point?




Sarcastic?

Not sure testimonials from the dev themselves mean anything.


thank you for sharing my channel <3

I would also like to highlight the following other creators. For me seeing the process of others has been a lot more fruitful then just following text tutorials:

+ ippsec: https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA

+ John Hammond: https://www.youtube.com/user/RootOfTheNull

+ Gynvael EN: https://www.youtube.com/user/GynvaelEN

+ Derek Rook: https://www.youtube.com/channel/UCMACXuWd2w6_IEGog744UaA

+ ...


Wow, thanks for sharing and for your hard work on your channel!

I recommend it to everyone who is even remotely interested in security as your videos provide really valuable knowledge which is very easy to digest in the same time.

Thank you and keep it up please!:)


I create highly technical videos about various topics of IT security. Many of my videos are walk-throughs of CTF challenges explaining my thought process. I think this playlist could be interesting: https://www.youtube.com/playlist?list=PLhixgUqwRTjywPzsTYz28...

I have also recently started a series on Pwn Adventure 3, where we are hacking a game and I explain my process: https://www.youtube.com/playlist?list=PLhixgUqwRTjzzBeFSHXrw...

Besides that, I can also really recommend livestreams/screenshares from the following creators. To me, seeing how somebody really does it and where they struggle, really really helped me break through a wall I was hitting:

+ ippsec: https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA

+ John Hammond: https://www.youtube.com/user/RootOfTheNull

+ Gynvael EN: https://www.youtube.com/user/GynvaelEN

+ Derek Rook: https://www.youtube.com/channel/UCMACXuWd2w6_IEGog744UaA

+ ...


I really appreciate your videos.. I'm an early early beginner, regardless though the videos and how you construct them is really entertaining and informative. Keep it up. <3


Your videos are great, thanks for your hard work! And thanks for the ep with John Hammond recently that put me onto his channel too :)


+1 I love your videos there great, I've watched a few of your pwnadvenuture videos and some other ones related to MMOs


I'm a big fan of your videos. Thanks buddy!


I think a difference can be made about the individual "right to be forgotten" and the transparency/accountability of a public company.


people like you and I can write on Medium.


Shameless plug: https://www.youtube.com/LiveOverflowCTF not directly programming, but hopefully still interesting


i love your channel! It contains just enough technical details to be interesting, but isn't made too overly dense so as to be boring or snooze inducing.

I m glad that you made such good videos for me to enjoy!


title is misleading because it's not like Germany broke the encryption. But this has nothing to do with rt, a lot of news outlets reported it in this way. And in the article rt is is pretty clear what it is about: The law makes it legal for the police to install trojans on a phone to gather evidence.


There is a database for prime factorisation: https://factordb.com/

And like the other people responded, there are just wayyyy to many primes to make that feasible. Though it is a common Challenge in security competitions to find the factors to a public key through factordb. Or having two bad keys sharing one same prime - then you can use Euclidean algorithm (greates common divisor).


> Or having two bad keys sharing one same prime - then you can use Euclidean algorithm (greates common divisor).

I wrote a puzzle in 2012 to help people understand this issue:

http://www.loyalty.org/~schoen/rsa/


classic


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search:

HN For You