toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

330
active users

#techinsights

1 post1 participant0 posts today

Stealthy Network Access with Bluetooth PAN 📶💻

Our Tom shared insights from a malicious insider engagement in which they employed Bluetooth PAN to bridge connections between a client laptop and their own Linux VM. This method enabled them to establish a reverse SSH proxy into the client's internal network, circumventing traditional barriers like client isolation.

🔍 What is the significance?

Native Tools: This approach relies on built-in Windows tools, which help reduce the risk of detection by security teams.

Local Network advantage: Bluetooth PAN avoids using public internet resources like Command and Control (C2) infrastructure, reducing risk of detection via outbound network monitoring. However, the technique is dependent on having close proximity to the device for Bluetooth connectivity

Stealthy Operations: It allows for tunnelling Linux commands through the client's laptop, potentially bypassing Endpoint Detection and Response (EDR) systems.

The full blog post provides detailed instructions on setting up a reverse SSH proxy and emphasizes the importance of disabling unused features like Bluetooth PAN and monitoring tools like native SSH.

➡ pentestpartners.com/security-b

🚀 New Video! 🤖 Free AI: Gift or Trojan Horse? 🎁

Are free AI models from giants like Meta truly generous or hiding motives? Discover the truth in our latest video!

🔍 Highlights:
• Basics & impact of LLMs
• Why companies offer free AI
• Hidden motivations & data use
• Future of the AI industry

🧠 Join Colin, the IT Guy, for a critical analysis!

👉 Watch Now: youtu.be/jnXUOebNlXg

👍 Like, Subscribe & Share your thoughts!

✨ Edited with CapCut

#FreeAI#AI#Meta

From Optus to T-Mobile, explore notable incidents that highlight the need for robust security practices. Discover how simple oversights can lead to massive data leaks and learn valuable lessons to protect your systems.

Read now to understand the real impact of unsecured endpoints and why it's crucial to do more than just the bare minimum.

🔗 netapinotes.com/breaking-down-

Net API Notes · Breaking Down API Breaches: How Simple Mistakes Lead to Major Security FailuresNet API Notes for 2024/07/29, Issue 241

If you're just starting out on your PKM journey, the wealth of tools out there may seem daunting. How do you pick the right one? In this video, I unveil some of the myths around PKM tools and help you learn the important things to look for when making your choice.

youtu.be/jLpkCGfxWCk?si=FDHfrH

#PersonalKnowledgeManagement, #PKMTools, #DigitalInnovation, #Versatility, #Transferability, #Security, #Longevity, #EaseOfUse, #Zettelkasten, #Markdown, #DataIntegrity, #UserFriendly, #CulturalHeritage, #KnowledgeWisdom, #LearningJourney, #SystemAdaptability, #PermeableBoundaries, #TechInsights, #UnenlightenedGeneralists, #MemoryAid #PKM, #Zettelkasten #Learning #Education #Video #YouTube #Sharing