lol and back to scumbags..
servicenow. hit their documentation pages, my entire browser is covered in "you got an ad block and cant load some content" slide outs ( i have popups blocked, they got around that ) . They eventually time out. But if you scroll, you get more. According to Ublock, it removed over 40% of the page. F-these people. I ll be glad when i'm out of here. i have never experienced such a bad company and terrible product in my life. I thought Oracle was the top tier of scum. But no.
if i move to another entity later this year and not just retire, first question: "Do you now, or do you ever plan, on using service now" if yes, i walk out. ( or if its a virtual interview, just turn it off. )
( 2nd attempt to post after that above strangeness.. )
Did we get hacked, or someone find a way to break a room ( or ami broke :) )? And for what its worth when i posted in woof zone, and while it did apparently post, i was instantly transported here instead, with that mess above.
Subject: Script injection attacks don't work here.
We haven't been hacked, but some lowlife is trying:
Bottom Feeders> . Read User listing: katana User Name Last Login ---------------------------------------------------------------- -------------- katana 2025-02-03 katana;echo $((197 + 494))&echo $((197 + 494)) 2025-02-02 katana;echo $((7608 + 6438))&echo $((7608 + 6438)) 2025-02-01 katana;echo XRGHKF$((94+17))$(echo XRGHKF)XRGHKF 2025-01-18 katana'mLyZOU<'">uvKwpW 2025-01-17 katana'OROLvD<'">YfcWzW 2025-01-17 katana.print(system(phpinfo())) 2025-02-02
Hey there "katana", if you're reading this, script injection attacks can never work here. Our server architecture makes it impossible. Even if you managed to get the web code to misbehave, you'd still only be able to work within the confines of your own user session. And guess what, kiddo: the protocol the web server uses to talk to the back end is both exposed to the public and fully documented.
Subject: Re: Script injection attacks don't work here.
lowlifes such as this need to be taken out to the square for presentation, then taken out back to turn them into fertilizer, like we did in medieval times.
Subject: Re: Script injection attacks don't work here.
Still at it.. new username popped up. Same idea just different numbers in the 'injection' part.
Subject: Re: Script injection attacks don't work here.
2025-02-03 14:14 from IGnatius T Foobarthe confines
Subject: Script injection attacks don't work here.
We haven't been hacked, but some lowlife is trying: Bottom
Feeders> . Read User listing: katana User Name Last Login
----------------------------------------------------------------
-------------- katana 2025-02-03 katana;echo $((197 +
494))&echo $((197 + 494)) 2025-02-02 katana;echo $((7608 +
6438))&echo $((7608 + 6438)) 2025-02-01 katana;echo
XRGHKF$((94+17))$(echo XRGHKF)XRGHKF 2025-01-18
katana'mLyZOU<'">uvKwpW 2025-01-17
katana'OROLvD<'">YfcWzW 2025-01-17
katana.print(system(phpinfo())) 2025-02-02
Hey there "katana", if you're reading this, script injection
attacks can never work here. Our server architecture makes it
impossible. Even if you managed to get the web code to
misbehave, you'd still only be able to work within
of your own user session. And guess what, kiddo: the protocol
the web server uses to talk to the back end is both exposed to
the public and fully documented.
That, and Citadel is not PHP software.
Subject: Re: Script injection attacks don't work here.
Ya, i thought the same thing: They didn't do their research :)
Mon Feb 03 2025 18:32:19 UTC from darknetuser Subject: Re: Script injection attacks don't work here.
That, and Citadel is not PHP software.
Subject: Re: Script injection attacks don't work here.
That, and Citadel is not PHP software.
Yes, there is that. :)
I suppose there could be two different objectives for an attacker. One would be to gain privileged access to the site. This is of course impossible, since the web server runs without privilege. The level of access one could achieve by breaking out of the intended session path is the same level of access we give all users, free for the taking.
The other objective, and possibly the more likely one, is that they just want to find a way to get it to offer them a shell. Then they can use the server as part of a botnet or something. Is such an attack possible? I'll bet it is. They'd need to download the source code for Citadel, figure out where it might have a *native* exploit (like a buffer overrun or something) and then penetrate the target system. If they were foolish enough to target the lead developer's own system they'd have less than a day before they were caught and locked out.
But of course, neither of these objectives will be achieved with script injection attacks, since we're not using PHP, we're not using SQL, we're not using any technology from which a script injection attack can do anything other than make your script crash. Because this software is written by maniacs who still develop everything in C except for the client-side browser interface. So go pick on the Rust zealots or something.
Subject: Re: Script injection attacks don't work here.
#3 would to be just to crash things.. "let it burn" so to speak.
---------------------------------------------------------------- --------------
katana 2025-02-10
katana;echo $((197 + 494))&echo $((197 + 494)) 2025-02-02
katana;echo $((7608 + 6438))&echo $((7608 + 6438)) 2025-02-01
katana;echo $((779 + 4143))&echo $((779 + 4143)) 2025-02-03
katana;echo XRGHKF$((94+17))$(echo XRGHKF)XRGHKF 2025-01-18
katana;id 2025-02-11
katana'mLyZOU<'">uvKwpW 2025-01-17
katana'OROLvD<'">YfcWzW 2025-01-17
katana{${print(`echo 2025-02-11
katana.print(system(phpinfo())) 2025-02-02
Everyone feel free to send hate mail to the main "katana" account.
"Come March 28, those who opted to have their voice commands for Amazon's AI assistant Alexa processed locally on their Echo devices will lose that option, with all spoken requests pushed to the cloud for analysis."
All your data is ours. And the government.
"this is swat, open up or we kill you, we heard you threaten your spouse at 9:43pm" "it was a freaking tv sho.. boom"
Ya, for just under 4 years, until its no longer 'politically beneficial' , then it will come back. And they will look at everyone history during that period, start bouncing people, and reporting them to the new federal administration as 'dissidents', to be rounded up for re-education. Zuckerburg is a scumbag just like Musk, dont trust him either.
I do find it interesting its 'in the US'. Money still wins over correctness. Cant lose that UK market. Nope.
~~~~~~~~~~~~~~~~
"Meta will shutter its fact-checking program across Facebook, Instagram and Threads on Monday, marking a major shift in the company’s content moderation strategy.
The announcement follows a January pledge by CEO Mark Zuckerberg to dial back censorship and restore “free speech” on Meta-owned platforms. Going forward, Meta will adopt a system modeled after X’s “Community Notes,” allowing users to affix context to posts with no penalties or content suppression — effectively ending the era of third-party fact-checkers rating and flagging information.
“By Monday afternoon, our fact-checking program in the US will be officially over,” Joel Kaplan, chief global affairs officer at Meta, wrote on X. “That means no new fact checks and no fact checkers. We announced in January we’d be winding down the program & removing penalties. In place of fact checks, the first Community Notes will start appearing gradually across Facebook, Threads & Instagram, with no penalties attached.”
Subject: This bottom feeder is still at it. Here's what I wrote to it.
2025-04-13 20:45 from IGnatius T Foobar to katana
Subject: I see you
I see you, still trying to break this site with dictionary attacks.
What do you think is going to happen if you make it break? Do you
think you're going to get admin on the site? Do you think you're going
to get root on the server? You clearly don't know how this software
works because neither of those things are possible here.
May you wallow in freakish misery forever.
Feel free to dogpile this idiot.