this post was submitted on 29 Aug 2025
18 points (100.0% liked)

cybersecurity

5065 readers
6 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] scintilla@crust.piefed.social 3 points 1 month ago (1 children)

Please explain if I'm wrong because I think I am because it can't b this stupid.

Its using llama to discover the way to enter credentials? And then using a normal brute force attack once that's done?

[โ€“] AwesomeLowlander@sh.itjust.works 4 points 1 month ago* (last edited 1 month ago)

Sounds like it. Presumably useful for large corporations and such where there may not be a clear picture of potential entrypoints into the system. You can just let it loose and it'll find login pages on its own and process them.