Tuesday, April 5, 2022

I will Destroy the "system" (IRS hack folder)

 So, everybody ready?

🙂
starting:
A window can listen for dispatched messages by executing the following JavaScript:
window.addEventListener("message", (event) => {
if (event.origin !== "http://example.org:8080
")
return;
// ...
}, false);
"Always specify an exact target origin, not *, when you use postMessage to send data to other windows. A malicious site can change the location of the window without your knowledge, and therefore it can intercept the data sent using postMessage."
(their security..and our probable attack)
"However, the shared data block referenced by the two SharedArrayBuffer objects is the same data block, and a side effect to the block in one agent will eventually become visible in the other agent.
var sab = new SharedArrayBuffer(1024);
worker.postMessage(sab);

Web content uses Web Workers to run scripts in background threads. Data gets sent to and from the worker by using the postMessage() method and certain types are so-called transferable objects, that are transferred from one context to another with a zero-copy operation, resulting in high performance.
When transferring an ArrayBuffer from your main app to a worker script, the original ArrayBuffer is cleared and no longer usable. Its content is (quite literally) transferred to the worker context.
JavaScript
Shrink ▲ Copy Code
var ab = new ArrayBuffer(1024);
var uInt8Array = new Uint8Array(ab);
for (var i = 0; i < uInt8Array.length; ++i) {
uInt8Array[i] = i;
}
var worker = new Worker("worker.js");
// before transferring
console.log(uInt8Array.byteLength); // 1024
worker.postMessage(uInt8Array.buffer, [uInt8Array.buffer]);
// after transferring
console.log(uInt8Array.byteLength); // 0
Now with a SharedArrayBuffer, you can share this memory with the worker by transferring it using the same postMessage() call.
3 comentários
Gosto
Comentar
Partilhar
3 comentários
  • Elsinha David
    you need a big big biggggg God damm memory for the IRS lenght
  • Elsinha David
    Parameters
    length
    The size, in bytes, of the array buffer to create.
    Return value
    A new SharedArrayBuffer object of the specified size. Its contents are initialized to 0
  • Elsinha David
    (details to considere)

Sunday, April 3, 2022

hacking missiles (hack folder)

 check it out:

[DllImport(nameof(SetupApi), SetLastError = true)]
[return: MarshalAs(UnmanagedType.Bool)]
public static extern unsafe bool SetupDiEnumDeviceInfo(
SafeDeviceInfoSetHandle deviceInfoSet,
int memberIndex,
[Friendly(FriendlyFlags.Bidirectional)] SP_DEVINFO_DATA* deviceInfoData);
NOTE : " For any standard type of device, this specifies the name of the device setup class for the type of device that is installed by using this INF file. This name is usually one of the system-defined class names, such as Net or Display, which are listed in Devguid.h."
2 comentários
Gosto
Comentar
Partilhar

Saturday, April 2, 2022

missiles hacking (hack folder)

 When I run const dotenv = require("dotenv").config({debug: true}); I encounter the following message: "USER" is already defined in process.env and will not be overwritten

Additionally when I try to load the page, it encounter the following error: ER_DBACCESS_DENIED_ERROR: Access denied for user ''@'localhost' to database '_api'


in that case....

const fs = require('fs')
const dotenv = require('dotenv')
const envConfig = dotenv.parse(fs.readFileSync('.env.override'))
for (const k in envConfig) {
process.env[k] = envConfig[k]
}

Russia Ukraine Intel (hack folder)

Tochka-U tactical ballistic missile..." (NATO: SS-21 “Scarab”)
Are not short range missiles!!!!
"Somebody" missiles system was hacked yesterday!!!

Photo: the weapon...(not to be carried by helicopters)

Pode ser uma imagem de ao ar livre
Gosto
Comentar
Partilhar