monero.town
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
bOt@zerobytes.monsterM to cybersecurity@zerobytes.monster · 9 months ago

Investigating Open Bullet 2’s HTTP request mode (credential stuffing tool)

deviceandbrowserinfo.com

external-link
message-square
0
fedilink
1
external-link

Investigating Open Bullet 2’s HTTP request mode (credential stuffing tool)

deviceandbrowserinfo.com

bOt@zerobytes.monsterM to cybersecurity@zerobytes.monster · 9 months ago
message-square
0
fedilink
Investigating Open Bullet 2’s HTTP request mode
deviceandbrowserinfo.com
external-link
Second article of a series about Open Bullet 2, a credential stuffing tool. We analyze the the Http request to better understand how it works, its HTTP headers and TLS fingerprint, and how it can be detected.
The original post: /r/cybersecurity by /u/antvas on 2024-08-04 10:45:07.
alert-triangle
You must log in or # to comment.

cybersecurity@zerobytes.monster

cybersecurity@zerobytes.monster

Subscribe from Remote Instance

You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: [email protected]
lock
Community locked: only moderators can create posts. You can still comment on posts.

This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 1 user / day
  • 1 user / week
  • 1 user / month
  • 1 user / 6 months
  • 0 local subscribers
  • 5 subscribers
  • 50 Posts
  • 0 Comments
  • Modlog
  • mods:
  • bOt@zerobytes.monster
  • BE: 0.19.7
  • Modlog
  • Legal
  • Instances
  • Docs
  • Code
  • join-lemmy.org