Trashfire The Dick Masterson Simp Conspiracy - Dick Masterson & Co cover up of his "Simping"

Who is the third man?

  • tonka

    Votes: 107 15.6%
  • Mister Metokur

    Votes: 126 18.3%
  • Warski

    Votes: 73 10.6%
  • ur mom?

    Votes: 151 21.9%
  • Dear Leader

    Votes: 178 25.9%
  • f-slurs

    Votes: 212 30.8%
  • kraut

    Votes: 179 26.0%

  • Total voters
    688
Status
Not open for further replies.
gfdgdgdfgdfdd.jpg

Well, this escalated quickly.
 
Take me seriously next time.
Lmao my dude don't be a fag I knew about this shit too. Its nothing special, Zoom/Plate Gang ops are pretty porous.

Also I did some foreshadowing too, woo.
I'm glad Jesse fucked up, the Gunt will continue to gain in confidence and eventually fall (for like the fifth time, lol) due to his hubris. Ralph's instability mixed in with hubris and a certain severely autistic actor behind the scenes will probably come in when the time is right to fuck with him again.
 
There has been no hack.

Agreed
vulnerability =/= compromise.

For example, Zoom talked about CVE-2020-11027 on Twitter:
https://nvd.nist.gov/vuln/detail/CVE-2020-11027
"In affected versions of WordPress, a password reset link emailed to a user does not expire upon changing the user password. Access would be needed to the email account of the user by a malicious party for successful execution."
The risk ratings for CVEs are calculated by complexity, potential damage, and accessibility. This one's risk is lower because it requires a different compromise in order to be achievable.

Zoom said NP2 is using JQuery 1.12.4:
https://www.cvedetails.com/vulnerab...1/version_id-286372/Jquery-Jquery-1.12.4.html
Not much there, although the list could be incomplete. This also doesnt include vulnerabilities for JQuery UI.

Nothing here strikes me as a 'hack' or as much of a big deal
Should Dick have pentested this earlier and fixed some of this stuff? Yes.
Is he PCI DSS compliant? I actually have no idea - but even if not, this is the kind of stuff you perform a pentest to find out.

Josh is probably used to people slamming KF with crawlers, exploits and portscanners to try and find vulnerabilities, and has been around the block when it comes to protecting stuff against turbospeds with hateboners. Dick probably doesn't have that kind of experience, and is on a learning curve here.

If anything, at the end of this we will end up with an NP2 which is more secure, so as long as Zoom actually doesn't compromise any data (which from what i have seen, so far he has not) as actually done Dick a favour here provided he actually fixes this stuff.
 
Status
Not open for further replies.
Back