NoGoolag
4.54K subscribers
13.2K photos
6.93K videos
587 files
14.1K links
Live free!

πŸ“‘ @NoGoolag

FAQ:
http://t.me/NoGoolag/169

β˜…Group:
https://t.me/joinchat/nMOOE4YJPDFhZjZk

πŸ“‘ @Libreware

πŸ“‘ @TakeBackOurTech

🦊 @d3_works

πŸ“š @SaveAlexandria

πŸ’― % satire OSINT
Download Telegram
Surveillance under Surveillance

Surveillance under Surveillance shows you cameras and guards β€” watching you β€” almost everywhere. You can see where they are located and, if the information is available, what type they are, the area they observe, or other interesting facts.

Surveillance under Surveillance uses data from OpenStreetMap contributors that is not visualized on the regular OpenStreetMap site.

πŸ‘‰πŸΌ https://sunders.uber.space πŸ‘ˆπŸΌ

#surveillance #defense
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘@cRyPtHoN_INFOSEC_EN
πŸ“‘@NoGoolag
πŸ“‘@BlackBox
Stealing Data With CSS: Attack and Defense

Summary:
A method is detailed - dubbed CSS Exfil - which can be used to steal targeted data using Cascading Style Sheets (CSS) as an attack vector. Due to the modern web's heavy reliance on CSS, a wide variety of data is potentially at risk, including: usernames, passwords, and sensitive data such as date of birth, social security numbers, and credit card numbers. The technique can also be used to de-anonymize users on dark nets like Tor. Defense methods are discussed for both website operators as well as web users, and a pair of browser extensions are offered which guard against this class of attack.

πŸ‘€ πŸ‘‰πŸΌ Want to check if you are vulnerable?
https://www.mike-gualtieri.com/css-exfil-vulnerability-tester

πŸ’‘ πŸ‘‰πŸΌ Want to protect yourself?

πŸ‘‰πŸΌ Install the Chrome plugin:
https://chrome.google.com/webstore/detail/css-exfil-protection/ibeemfhcbbikonfajhamlkdgedmekifo

πŸ‘‰πŸΌ Install the Firefox plugin:
https://addons.mozilla.org/en-US/firefox/addon/css-exfil-protection

πŸ‘€ πŸ‘‰πŸΌ Methods of Exploitation and Proof of Concept
https://www.mike-gualtieri.com/posts/stealing-data-with-css-attack-and-defense

#css #attack #defense #exploitation #vulnerability
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag