Leaflet@lemmy.world to Linux@lemmy.mlEnglish · 20 hours agoAttacking UNIX Systems via CUPS, Part I | CUPS Remote Code Executionwww.evilsocket.netexternal-linkmessage-square26fedilinkarrow-up1110arrow-down11file-text
arrow-up1109arrow-down1external-linkAttacking UNIX Systems via CUPS, Part I | CUPS Remote Code Executionwww.evilsocket.netLeaflet@lemmy.world to Linux@lemmy.mlEnglish · 20 hours agomessage-square26fedilinkfile-text
minus-squareNunar@lemmy.worldlinkfedilinkarrow-up3·10 hours agoNobody likes Apple. They’re just afraid to say they don’t.
minus-squaremasterofn001@lemmy.calinkfedilinkarrow-up4·16 hours agoThey’re standardised zeroconnf protocols. Apple was part of the early development. Bonjour is the apple implementation for mDNS. Avahi is the GPL compliant implementation. mDNS, llmnr (ms developed), have been known for ages to be vulnerable. https://en.m.wikipedia.org/wiki/Zero-configuration_networking#Standardization *I don’t like apple
minus-squaremasterofn001@lemmy.calinkfedilinkarrow-up2·edit-214 hours agohttps://duckduckgo.com/?q=mdns+vulnerability&t=fpas&ia=web https://book.hacktricks.xyz/generic-methodologies-and-resources/pentesting-network/spoofing-llmnr-nbt-ns-mdns-dns-and-wpad-and-relay-attacks
minus-squareryannathanslinkfedilinkarrow-up1arrow-down1·9 hours agoI could similarly link you an internet search for http or tls vulnerability, I fail to see your point
Someone doesn’t like apple
Nobody likes Apple. They’re just afraid to say they don’t.
They’re standardised zeroconnf protocols. Apple was part of the early development.
Bonjour is the apple implementation for mDNS.
Avahi is the GPL compliant implementation.
mDNS, llmnr (ms developed), have been known for ages to be vulnerable.
https://en.m.wikipedia.org/wiki/Zero-configuration_networking#Standardization
*I don’t like apple
To be vulnerable to what?
https://duckduckgo.com/?q=mdns+vulnerability&t=fpas&ia=web
https://book.hacktricks.xyz/generic-methodologies-and-resources/pentesting-network/spoofing-llmnr-nbt-ns-mdns-dns-and-wpad-and-relay-attacks
I could similarly link you an internet search for http or tls vulnerability, I fail to see your point