Details
Joined devRant on 7/7/2019
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
-
If a pentester find a very critical bug and the boss is not aware of him knowing this type of exploitation (no one is expecting him to find such flaws)
Should he report it ? Or reporting will make him suspicious ?3 -
!rant
Will this code be compiled ?
#include<iostream>
using namespace std;
int main(){
int 🥩=1;
int 🧀=1;
int 🥬=1;
int 🍞=1;
int 🍅=1;
int 🥪=🍞+🥬+🍅+🧀+🥩;
cout<<🥪;
return 0;
}12 -
He he he!
Matching software version and vulnerabilities in NIST then exploiting it is not HACKING !
I wanna find new zero day vulnerabilities that no one ever noticed before!!5 -
I'm in a interview. I'm scared like I'm gonna shit in my pants. This is my second interview after graduating8
-
-Problem
-searching everywhere
-complicated algorithms
-almost there ...
My little sister: hey! Can you install this game on my tablet?
Me: no! I'm busy right now
Sister: mom!!...
Me: okay! okay!
<installation process >
...
What was I doing?...
That's how everything gets ruined :/7 -
I hate being invited to a party!
Specifically when I have no chance to refuse (family parties mostly)
Though I'm still able to code or read a book with my phone but WHY SHOULD I??
Grrrrr !!
Idk ... what do you do in such complicated situations?3 -
A backdoor means an open port so...
If anybody in including the admin checks the open port he will definitely notify the port and probably will close that port so...
Maintaining access means nothing?8 -
[ Meanwhile in python ] I thought it was just a joke , and now i take it seriously '😂😂😂!
(Old one)2 -
I use Google for anything I don't know ,
Does that mean I'm a bad programmer?
If so , if I memorize everything I googled once , will I be a good programmer ?
How do good programmers find the solution? Do they try everything ? Kinda brute force ?8 -
I'm performing a pentest for my client.
So after scanning my client's network I understood they're using IIS 4.5 and windows server 2012 (or 2012 R2)
I know the systems are real old.
And there are known exploits for them.
The tricky part is I have to stay hidden and I only have my own credentials for logging in to the asp page. (Uploading a script is almost crossed cuz it will reveal my identity)
Also I have access to the local network with some of the other employees user/pass.
Any recommendation for exploiting and staying hidden at the same time ?
One more question : will exploits for newer versions work for the older ones necessarily?8 -
##REAL STORY##
Friend: Hey there, I have a Java Exam after one hour and I have a question for you.
Me: Great ! How can I help
F: They will give us a problem and ask us to solve it by writing a Java code.
Me: Okay,
F: That's it.
Me: Good, so were's the question.
F: Come on, of course I want to know how to solve it.
Me: Absolute Silence.
Me: friendsList.removeAll();10 -
So I wrote an algo in python3 for a challenge in codechef.com but it raised this exception !
If I put the input() built-in method in a try/catch , how do i know what the input was in order to pass the test case?3