pawb.fun is one of the many independent Mastodon servers you can use to participate in the fediverse.
This instance aimed at any and all within the furry fandom, though anyone is welcome! We're friendly towards members of the LGBTQ+ community and aiming to offer a safe space for our users.

Server stats:

311
active users

#pentesting

1 post1 participant0 posts today
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://chaos.social/@HonkHase" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>HonkHase</span></a></span> ja, die <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpSec</span></a> jener <a href="https://infosec.space/tags/KRITIS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KRITIS</span></a> ist quasi nichtexistent.</p><ul><li>Und nein, ich werde nicht in Details gehen.</li></ul><p>Nur soviel: Mich bezahlt keine*r die dazu authorisiert sind für's <a href="https://infosec.space/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a>!</p>
Bill<p>I really need to order a new pack of this. <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a></p>
Bill<p>NIST getting in on the AI security bandwagon. I'd be happier about that if I trusted anyone in the district anymore.</p><p><a href="https://www.infosecurity-magazine.com/news/nist-limitations-ai-ml-security/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">infosecurity-magazine.com/news</span><span class="invisible">/nist-limitations-ai-ml-security/</span></a></p><p>What we really need is some edits to the PTES or something with a GenAI test plan.</p><p><a href="https://infosec.exchange/tags/genai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>genai</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a></p>
IT News<p>Physical Key Copying Starts With a Flipper Zero - A moment’s inattention is all it takes to gather the information needed to make a ... - <a href="https://hackaday.com/2025/03/25/physical-key-copying-starts-with-a-flipper-zero/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/03/25/physic</span><span class="invisible">al-key-copying-starts-with-a-flipper-zero/</span></a> <a href="https://schleuss.online/tags/lockpickinghacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lockpickinghacks</span></a> <a href="https://schleuss.online/tags/duplicating" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>duplicating</span></a> <a href="https://schleuss.online/tags/flipperzero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>flipperzero</span></a> <a href="https://schleuss.online/tags/lockpicking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lockpicking</span></a> <a href="https://schleuss.online/tags/locksports" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>locksports</span></a> <a href="https://schleuss.online/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a></p>
0x40k<p>Whoa, the IT security world was on FIRE this week! 🤯 Open source supply chain attacks, malware sneaking into the Play Store, ransomware bypassing EDR... and is AI just pouring gasoline on the phishing flames?! Seriously intense! 😳 Cloud security's getting a raw deal and let's be real, backups are only as good as their security.</p><p>It's wild how rapidly the threat landscape's evolving, isn't it? Gotta stay sharp, folks! Automated vulnerability scans? They're definitely nice, but manual penetration tests are still essential. And AI? Awesome tech, but also seriously risky. Disinformation and manipulation are spiraling out of control. We've gotta stay vigilant!</p><p>So, what are *your* biggest IT security pain points right now? Spill the beans!</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/offensiveSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offensiveSecurity</span></a></p>
0x40k<p>Alright, Okta and similar tools are cool and all, but don't think they're a get-out-of-jail-free card for security! 😉 I frequently see IAM systems configured incorrectly. For instance, MFA is often forgotten. What about outdated accounts? Or giving admin rights to everyone? Boom! You've got a potential breach on your hands. 💥</p><p>Listen up: IAM isn't just about setting it up and forgetting about it; you've *got* to *live* it! Automation definitely helps, but it's no substitute for manual checks. Regular pentests are a must, and certificates only tell part of the story. 📃</p><p>So, what IAM best practices do you use (beyond the standard documentation)? 🤔 Let's share some insights! <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/okta" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>okta</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
Bill<p>Hey <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a> people. How do you handle organization of testing artifacts when you are dealing with tons of apps? I have a new client in deep water, their app suite is 20 years old and shows it. They have 53 endpoints. </p><p>My testing strategy is not designed for that.</p><p>How do you keep things organized? Is there a cool tool I need to know about? Is it Burp Suite Enterprise time for POINT? How do you keep your notes?</p><p>I know a lot of this is kinda up to your own personal philosophy for testing, but I thought it would make for informative conversation fodder for St. Paddy. ☘️ </p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a></p>
Bill<p>Apropos of nothing, PeopleSoft uses 303 See Other as a response code for auth redirects and whatnot. It's pointed out a weakness in all the cool filters I use. Always learning. <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Hetty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hetty</span></a>: <a href="https://mastodon.thenewoil.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.thenewoil.org/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a> toolkit for security research</p><p><a href="https://www.helpnetsecurity.com/2025/03/10/hetty-open-source-http-toolkit-security-research/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/03/10</span><span class="invisible">/hetty-open-source-http-toolkit-security-research/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/PenTesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PenTesting</span></a></p>
Konstantin :C_H:<p>I'm excited to share CVE Crowd's Top 5 Vulnerabilities from February 25!</p><p>These five stood out among the 352 CVEs actively discussed across the Fediverse.</p><p>For each CVE, I’ve included a standout post from the community.</p><p>Enjoy exploring! 👇</p><p><a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a> <a href="https://infosec.exchange/tags/CveCrowd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CveCrowd</span></a></p>
❤️ Luigi Mangione<p>Pic of the Day <a class="hashtag" href="https://bsky.app/search?q=%23infosec" rel="nofollow noopener noreferrer" target="_blank">#infosec</a> <a class="hashtag" href="https://bsky.app/search?q=%23cybersecurity" rel="nofollow noopener noreferrer" target="_blank">#cybersecurity</a> <a class="hashtag" href="https://bsky.app/search?q=%23cybersecuritytips" rel="nofollow noopener noreferrer" target="_blank">#cybersecuritytips</a> <a class="hashtag" href="https://bsky.app/search?q=%23pentesting" rel="nofollow noopener noreferrer" target="_blank">#pentesting</a> <a class="hashtag" href="https://bsky.app/search?q=%23cybersecurityawareness" rel="nofollow noopener noreferrer" target="_blank">#cybersecurityawareness</a> <a class="hashtag" href="https://bsky.app/search?q=%23informationsecurity" rel="nofollow noopener noreferrer" target="_blank">#informationsecurity</a> <a href="https://bird.makeup/users/hackinarticles/statuses/1895702066607391062" rel="nofollow noopener noreferrer" target="_blank">bird.makeup/users/hackin...</a></p>
0x40k<p>Hey everyone, what's cooking in the open-source universe? 🤯 I just stumbled upon something that's seriously mind-blowing.</p><p>So, there's this Python library pretending to be a music tool (automslc), but get this – it's actually illegally downloading songs from Deezer! And the worst part? It turns your computer into an accomplice in a huge music piracy operation. Seriously, a digital pirate cove. 🏴‍☠️</p><p>And then there's this npm saga with @ton-wallet/create... Crypto wallet emptied, just like that! 💸</p><p>The moral of the story? Open source rocks, but blindly trusting everything is a recipe for disaster. Always double-check those dependencies! Automated scans are cool, but a real penetration test? That's pure gold. 🥇</p><p>Clients are always so appreciative when we can spot and fix this kind of stuff beforehand!</p><p>Now, I'm curious: What are your go-to methods for keeping your codebase squeaky clean and secure? Any tips or tricks you'd like to share?</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/devsecops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devsecops</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a> <a href="https://infosec.exchange/tags/javascript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>javascript</span></a></p>
❤️ Luigi Mangione<p>Pic of the Day <a class="hashtag" href="https://bsky.app/search?q=%23infosec" rel="nofollow noopener noreferrer" target="_blank">#infosec</a> <a class="hashtag" href="https://bsky.app/search?q=%23cybersecurity" rel="nofollow noopener noreferrer" target="_blank">#cybersecurity</a> <a class="hashtag" href="https://bsky.app/search?q=%23cybersecuritytips" rel="nofollow noopener noreferrer" target="_blank">#cybersecuritytips</a> <a class="hashtag" href="https://bsky.app/search?q=%23pentesting" rel="nofollow noopener noreferrer" target="_blank">#pentesting</a> <a class="hashtag" href="https://bsky.app/search?q=%23cybersecurityawareness" rel="nofollow noopener noreferrer" target="_blank">#cybersecurityawareness</a> <a class="hashtag" href="https://bsky.app/search?q=%23informationsecurity" rel="nofollow noopener noreferrer" target="_blank">#informationsecurity</a> <a href="https://bird.makeup/users/hackinarticles/statuses/1893895189694992532" rel="nofollow noopener noreferrer" target="_blank">bird.makeup/users/hackin...</a></p>
The New Oil<p>Hackers Call Current <a href="https://mastodon.thenewoil.org/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> Security Testing 'Bullshit'</p><p><a href="https://it.slashdot.org/story/25/02/11/191240/hackers-call-current-ai-security-testing-bullshit" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">it.slashdot.org/story/25/02/11</span><span class="invisible">/191240/hackers-call-current-ai-security-testing-bullshit</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a></p>
Marek Alexa :verified:<p>Scanning ports with Python 🐍 for beginners to penetration testing.<br>+ Channel Announcement 🙂 </p><p><a href="https://youtu.be/Tc0VDwp-CqQ?si=QK3gZ9oEpcJHOoOg" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtu.be/Tc0VDwp-CqQ?si=QK3gZ9</span><span class="invisible">oEpcJHOoOg</span></a></p><p><a href="https://techhub.social/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a> <a href="https://techhub.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://techhub.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://techhub.social/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a> <a href="https://techhub.social/tags/youtube" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>youtube</span></a></p>
Mosscap<p>I saw this posted on Xiaohongshu. Not all heroes wear capes. Some wear fursonas. <br><a href="https://pounced-on.me/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://pounced-on.me/tags/whitehat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>whitehat</span></a> <a href="https://pounced-on.me/tags/whitehathacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>whitehathacker</span></a> <a href="https://pounced-on.me/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://pounced-on.me/tags/furry" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>furry</span></a> <a href="https://pounced-on.me/tags/hardening" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardening</span></a> <a href="https://pounced-on.me/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a></p>
Parrot Security<p>Parrot 6.3 has landed 🚀</p><p>🔒 Reinforced security<br>⚡ Improved performance<br>🛠️ Updated tools</p><p>Click the link and read more on the changelog ⬇️</p><p>parrotsec.org/blog/2025-01-3…</p><p><a href="https://mastodon.social/tags/ParrotSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ParrotSec</span></a> <a href="https://mastodon.social/tags/ParrotOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ParrotOS</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/CybersecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CybersecurityNews</span></a> <a href="https://mastodon.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://mastodon.social/tags/PenTest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PenTest</span></a> <a href="https://mastodon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/linuxdistro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linuxdistro</span></a></p>
Marek Alexa :verified:<p>Documentation, documentation, documentation ...</p><p>Pentesters, stay out of trouble. 👮‍♂️ </p><p><a href="https://youtu.be/luH2WGCf7k4" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/luH2WGCf7k4</span><span class="invisible"></span></a></p><p><a href="https://techhub.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://techhub.social/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a> <a href="https://techhub.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://techhub.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
IT News<p>This Week in Security: ClamAV, The AMD Leak, and The Unencrypted Power Grid - Cisco’s ClamAV has a heap-based buffer overflow in its OLE2 file scanning. That’s ... - <a href="https://hackaday.com/2025/01/24/this-week-in-security-clamav-the-amd-leak-and-the-unencrypted-power-grid/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/01/24/this-w</span><span class="invisible">eek-in-security-clamav-the-amd-leak-and-the-unencrypted-power-grid/</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://schleuss.online/tags/microcode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microcode</span></a> <a href="https://schleuss.online/tags/clamav" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>clamav</span></a> <a href="https://schleuss.online/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
nickbearded<p>The website is live!</p><p><a href="https://www.bashcore.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">bashcore.org/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/bashcore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bashcore</span></a> <a href="https://mastodon.social/tags/cli" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cli</span></a> <a href="https://mastodon.social/tags/nogui" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nogui</span></a> <a href="https://mastodon.social/tags/debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debian</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://mastodon.social/tags/education" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>education</span></a> <a href="https://mastodon.social/tags/bash" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bash</span></a></p>