GET https://kbin.spritesserver.nl/index.php/u/@computerboss@sh.itjust.works/hot

Security

Token

There is no security token.

Firewall

main Name
Security enabled
Stateless

Configuration

Key Value
provider security.user.provider.concrete.app_user_provider
context main
entry_point App\Security\KbinAuthenticator
user_checker App\Security\UserChecker
access_denied_handler (none)
access_denied_url (none)
authenticators
[
  "two_factor"
  "remember_me"
  "App\Security\KbinAuthenticator"
  "App\Security\FacebookAuthenticator"
  "App\Security\GoogleAuthenticator"
  "App\Security\GithubAuthenticator"
  "App\Security\KeycloakAuthenticator"
]

Listeners

Listener Duration Response
Symfony\Component\Security\Http\Firewall\ChannelListener {#723
  -map: Symfony\Component\Security\Http\AccessMap {#722 …}
  -logger: Monolog\Logger {#783 …}
  -httpPort: 80
  -httpsPort: 443
}
0.00 ms (none)
Symfony\Component\Security\Http\Firewall\ContextListener {#706
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\TokenStorage {#1017 …}
  -sessionKey: "_security_main"
  -logger: Monolog\Logger {#783 …}
  -userProviders: Symfony\Component\DependencyInjection\Argument\RewindableGenerator {#705 …}
  -dispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …}
  -registered: false
  -trustResolver: Scheb\TwoFactorBundle\Security\Authentication\AuthenticationTrustResolver {#780 …}
  -sessionTrackerEnabler: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage::enableUsageTracking(): void {#703 …}
}
6.36 ms (none)
Symfony\Component\Security\Http\Firewall\AuthenticatorManagerListener {#584
  -authenticatorManager: Symfony\Component\Security\Http\Authentication\AuthenticatorManager {#595 …}
}
0.00 ms (none)
Scheb\TwoFactorBundle\Security\Http\Firewall\TwoFactorAccessListener {#582
  -twoFactorFirewallConfig: Scheb\TwoFactorBundle\Security\TwoFactor\TwoFactorFirewallConfig {#842 …}
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -twoFactorAccessDecider: Scheb\TwoFactorBundle\Security\Authorization\TwoFactorAccessDecider {#581 …}
}
0.07 ms (none)
Symfony\Component\Security\Http\Firewall\AccessListener {#579
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -accessDecisionManager: Symfony\Component\Security\Core\Authorization\TraceableAccessDecisionManager {#937 …}
  -map: Symfony\Component\Security\Http\AccessMap {#722 …}
}
0.00 ms (none)
Symfony\Component\Security\Http\Firewall\LogoutListener {#786
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -options: [
    "csrf_parameter" => "_csrf_token"
    "csrf_token_id" => "logout"
    "logout_path" => "app_logout"
  ]
  -httpUtils: Symfony\Component\Security\Http\HttpUtils {#841 …}
  -csrfTokenManager: Symfony\Component\Security\Csrf\CsrfTokenManager {#1015 …}
  -eventDispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …}
}
0.00 ms (none)

Authenticators

No authenticators have been recorded. Check previous profiles on your authentication endpoint.

Access Decision

affirmative Strategy
# Voter class
1
"Symfony\Component\Security\Core\Authorization\Voter\AuthenticatedVoter"
2
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
3
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
4
"Symfony\Component\Security\Core\Authorization\Voter\ExpressionVoter"
5
"App\Security\Voter\EntryCommentVoter"
6
"App\Security\Voter\EntryVoter"
7
"App\Security\Voter\MagazineVoter"
8
"App\Security\Voter\MessageThreadVoter"
9
"App\Security\Voter\MessageVoter"
10
"App\Security\Voter\NotificationVoter"
11
"App\Security\Voter\OAuth2UserConsentVoter"
12
"App\Security\Voter\PostCommentVoter"
13
"App\Security\Voter\PostVoter"
14
"App\Security\Voter\UserVoter"

Access decision log

# Result Attributes Object
1 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
2 DENIED moderate
Proxies\__CG__\App\Entity\Entry {#1583
  +user: Proxies\__CG__\App\Entity\User {#2448 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
  +image: Proxies\__CG__\App\Entity\Image {#1723 …}
  +domain: Proxies\__CG__\App\Entity\Domain {#2382 …}
  +slug: "That-many-people-need-old-Ubuntu-installations"
  +title: "That many people need old Ubuntu installations?"
  +url: "https://lemmy.ml/pictrs/image/f5a65952-a239-406e-8937-e428631be65d.png"
  +body: """
    I’ve been seeding many Foss things for years but for some reason, people keep downloading Ubuntu versions that are more than 3 years old.\n
    \n
    Any ideas why there is always someone downloading the ancient stuff, especially Ubuntu?
    """
  +type: "image"
  +lang: "en"
  +isOc: false
  +hasEmbed: true
  +commentCount: 36
  +favouriteCount: 221
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1699764031 {#1717
    date: 2023-11-12 05:40:31.0 +01:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#2385 …}
  +votes: Doctrine\ORM\PersistentCollection {#1566 …}
  +reports: Doctrine\ORM\PersistentCollection {#1548 …}
  +favourites: Doctrine\ORM\PersistentCollection {#2391 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1907 …}
  +badges: Doctrine\ORM\PersistentCollection {#1385 …}
  +children: [
    1 => App\Entity\EntryComment {#1610
      +user: App\Entity\User {#260 …}
      +entry: Proxies\__CG__\App\Entity\Entry {#1583 …2}
      +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
      +image: null
      +parent: null
      +root: null
      +body: """
        I can give you an answer from someone who regularly downloads really old EOL versions of Ubuntu and Debian. I personally use them as part of attack and defense competitions. They are normally very close to unusable and are nearly impossible to update to a more recent or secure version. This forces my team to find creative ways to keep them working while also taking measures to isolate them as much as possible. I also use them to teach old exploits that have been patched in more recent versions, walking people through how it worked and why it existed.\n
        \n
        It happens a lot more with Windows machines, but there might be some manufacturing systems out there that require software that won’t run on modern versions of the OS. These systems often require new manufacturing tools in order to upgrade, or they need massive overhauls that smaller companies can’t always afford.
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 29
      +score: 0
      +lastActive: DateTime @1699630624 {#1434
        date: 2023-11-10 16:37:04.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@ejmin@lemmy.ml"
      ]
      +children: Doctrine\ORM\PersistentCollection {#1575 …}
      +nested: Doctrine\ORM\PersistentCollection {#1572 …}
      +votes: Doctrine\ORM\PersistentCollection {#1581 …}
      +reports: Doctrine\ORM\PersistentCollection {#1579 …}
      +favourites: Doctrine\ORM\PersistentCollection {#1576 …}
      +notifications: Doctrine\ORM\PersistentCollection {#1652 …}
      -id: 102713
      -bodyTs: "'afford':152 'also':64,75 'alway':151 'answer':6 'attack':27 'close':35 'compani':148 'competit':30 'creativ':57 'debian':19 'defens':29 'download':11 'eol':14 'exist':99 'exploit':81 'find':56 'forc':52 'give':3 'happen':101 'imposs':41 'isol':68 'keep':60 'lot':103 'machin':107 'manufactur':113,135 'massiv':144 'measur':66 'might':110 'modern':125 'much':71 'near':40 'need':143 'new':134 'normal':33 'often':132 'old':13,80 'order':138 'os':129 'overhaul':145 'part':25 'patch':85 'peopl':91 'person':21 'possibl':73 'realli':12 'recent':47,88 'regular':10 'requir':118,133 'run':123 'secur':49 'smaller':147 'softwar':119 'someon':8 'system':114,131 'take':65 'teach':79 'team':54 'tool':136 'ubuntu':17 'unus':37 'updat':43 'upgrad':140 'use':22,76 'version':15,50,89,126 'walk':90 'way':58 'window':106 'won':121 'work':62,95"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://sh.itjust.works/comment/5296509"
      +editedAt: null
      +createdAt: DateTimeImmutable @1699480096 {#1699
        date: 2023-11-08 22:48:16.0 +01:00
      }
      +"title": 102713
    }
    0 => App\Entity\EntryComment {#1567
      +user: App\Entity\User {#260 …}
      +entry: Proxies\__CG__\App\Entity\Entry {#1583 …2}
      +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
      +image: null
      +parent: Proxies\__CG__\App\Entity\EntryComment {#1611 …}
      +root: App\Entity\EntryComment {#1610}
      +body: """
        Ok so to be clear when I said team I mean a bunch of college students preparing for different ctfs, but these are some of the more helpful resources we have found:\n
        \n
        Tryhackme: personal favorite especially for beginners Hackthebox: great for learning/practicing attacks Overthewire: another good ctf site\n
        \n
        We try to build many of our own ctf like machines, then each person switches their machine with another person and the other person tries to secure the vulnerabilities without knowing anything about the machine. Once everyone has secured their machines we try to attack them using the notes made while setting them up. This is our step by step for that process.\n
        \n
        1. download an old version of a distro. (Ubuntu 14, deb 9, ect)\n
        2. install and setup the VM without any updates or changes to the default configuration\n
        3. google the distro version (Ubuntu 14.04) + vulnerabilities or exploits\n
        4. read through the different sites to find applications that had huge security issues on that version and begin installing some of the programs that have known exploits\n
        \n
        So for example with Ubuntu 14.04 we know there are some Linux kernel exploits.\n
        \n
        A quick Google search returned this exploit: [www.exploit-db.com/exploits/43418](https://www.exploit-db.com/exploits/43418)\n
        \n
        Using Ubuntu’s website I looked up other critical vulnerabilities and found these: [ubuntu.com/security/cves?q=&package=&prio…](https://ubuntu.com/security/cves?q=&package=&priority=critical&version=trusty&status=)\n
        \n
        From here I could add some of the packages mentioned as having exploits and then attempt to exploit them. I could also check newer versions of Ubuntu like 16 to find vulnerabilities that would also apply to older versions.\n
        \n
        There is also Mitre’s list(s) of the most dangerous software vulnerabilities. They have one for 2023, but also a catalog of lists from previous years.\n
        \n
        [cwe.mitre.org/top25/…/2023_top25_list.html](https://cwe.mitre.org/top25/archive/2023/2023_top25_list.html)\n
        \n
        Hopefully this helps!
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 2
      +score: 0
      +lastActive: DateTime @1699558018 {#1667
        date: 2023-11-09 20:26:58.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@ejmin@lemmy.ml"
        "@computerboss@sh.itjust.works"
        "@fiat_lux@kbin.social"
      ]
      +children: Doctrine\ORM\PersistentCollection {#1616 …}
      +nested: Doctrine\ORM\PersistentCollection {#1795 …}
      +votes: Doctrine\ORM\PersistentCollection {#1691 …}
      +reports: Doctrine\ORM\PersistentCollection {#1689 …}
      +favourites: Doctrine\ORM\PersistentCollection {#1687 …}
      +notifications: Doctrine\ORM\PersistentCollection {#1701 …}
      -id: 105158
      -bodyTs: "'/2023_top25_list.html':290 '/exploits/43418](https://www.exploit-db.com/exploits/43418)':201 '/security/cves?q=&package=&prio':217 '/security/cves?q=&package=&priority=critical&version=trusty&status=)':220 '/top25/':289 '/top25/archive/2023/2023_top25_list.html)':293 '1':112 '14':121 '14.04':146,183 '16':249 '2':125 '2023':277 '3':140 '4':150 '9':123 'add':225 'also':242,255,262,279 'anoth':45,67 'anyth':80 'appli':256 'applic':158 'attack':43,93 'attempt':236 'begin':168 'beginn':38 'build':52 'bunch':13 'catalog':281 'chang':135 'check':243 'clear':5 'colleg':15 'configur':139 'could':224,241 'critic':210 'ctf':47,57 'ctfs':20 'cwe.mitre.org':288,292 'cwe.mitre.org/top25/':287 'cwe.mitre.org/top25/archive/2023/2023_top25_list.html)':291 'danger':270 'deb':122 'default':138 'differ':19,154 'distro':119,143 'download':113 'ect':124 'especi':36 'everyon':85 'exampl':180 'exploit':149,177,191,198,233,238 'favorit':35 'find':157,251 'found':32,213 'good':46 'googl':141,194 'great':40 'hackthebox':39 'help':28,296 'hope':294 'huge':161 'instal':126,169 'issu':163 'kernel':190 'know':79,185 'known':176 'learning/practicing':42 'like':58,248 'linux':189 'list':265,283 'look':207 'machin':59,65,83,89 'made':98 'mani':53 'mean':11 'mention':230 'mitr':263 'newer':244 'note':97 'ok':1 'old':115 'older':258 'one':275 'overthewir':44 'packag':229 'person':34,62,68,72 'prepar':17 'previous':285 'process':111 'program':173 'quick':193 'read':151 'resourc':29 'return':196 'said':8 'search':195 'secur':75,87,162 'set':100 'setup':128 'site':48,155 'softwar':271 'step':106,108 'student':16 'switch':63 'team':9 'tri':50,73,91 'tryhackm':33 'ubuntu':120,145,182,203,247 'ubuntu.com':216,219 'ubuntu.com/security/cves?q=&package=&prio':215 'ubuntu.com/security/cves?q=&package=&priority=critical&version=trusty&status=)':218 'updat':133 'use':95,202 'version':116,144,166,245,259 'vm':130 'vulner':77,147,211,252,272 'websit':205 'without':78,131 'would':254 'www.exploit-db.com':200 'www.exploit-db.com/exploits/43418](https://www.exploit-db.com/exploits/43418)':199 'year':286"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://sh.itjust.works/comment/5321609"
      +editedAt: null
      +createdAt: DateTimeImmutable @1699558018 {#1525
        date: 2023-11-09 20:26:58.0 +01:00
      }
      +"title": 105158
    }
  ]
  -id: 11235
  -titleTs: "'instal':7 'mani':2 'need':4 'old':5 'peopl':3 'ubuntu':6"
  -bodyTs: "'3':23 'alway':31 'ancient':35 'download':16,33 'especi':37 'foss':6 'idea':27 'keep':15 'mani':5 'old':25 'peopl':14 'reason':13 'seed':4 'someon':32 'stuff':36 'thing':7 'ubuntu':17,38 've':2 'version':18 'year':9,24"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1699561656
  +visibility: "visible             "
  +apId: "https://lemmy.ml/post/7687281"
  +editedAt: null
  +createdAt: DateTimeImmutable @1699475256 {#1595
    date: 2023-11-08 21:27:36.0 +01:00
  }
  +__isInitialized__: true
   …2
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
3 DENIED edit
Proxies\__CG__\App\Entity\Entry {#1583
  +user: Proxies\__CG__\App\Entity\User {#2448 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
  +image: Proxies\__CG__\App\Entity\Image {#1723 …}
  +domain: Proxies\__CG__\App\Entity\Domain {#2382 …}
  +slug: "That-many-people-need-old-Ubuntu-installations"
  +title: "That many people need old Ubuntu installations?"
  +url: "https://lemmy.ml/pictrs/image/f5a65952-a239-406e-8937-e428631be65d.png"
  +body: """
    I’ve been seeding many Foss things for years but for some reason, people keep downloading Ubuntu versions that are more than 3 years old.\n
    \n
    Any ideas why there is always someone downloading the ancient stuff, especially Ubuntu?
    """
  +type: "image"
  +lang: "en"
  +isOc: false
  +hasEmbed: true
  +commentCount: 36
  +favouriteCount: 221
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1699764031 {#1717
    date: 2023-11-12 05:40:31.0 +01:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#2385 …}
  +votes: Doctrine\ORM\PersistentCollection {#1566 …}
  +reports: Doctrine\ORM\PersistentCollection {#1548 …}
  +favourites: Doctrine\ORM\PersistentCollection {#2391 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1907 …}
  +badges: Doctrine\ORM\PersistentCollection {#1385 …}
  +children: [
    1 => App\Entity\EntryComment {#1610
      +user: App\Entity\User {#260 …}
      +entry: Proxies\__CG__\App\Entity\Entry {#1583 …2}
      +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
      +image: null
      +parent: null
      +root: null
      +body: """
        I can give you an answer from someone who regularly downloads really old EOL versions of Ubuntu and Debian. I personally use them as part of attack and defense competitions. They are normally very close to unusable and are nearly impossible to update to a more recent or secure version. This forces my team to find creative ways to keep them working while also taking measures to isolate them as much as possible. I also use them to teach old exploits that have been patched in more recent versions, walking people through how it worked and why it existed.\n
        \n
        It happens a lot more with Windows machines, but there might be some manufacturing systems out there that require software that won’t run on modern versions of the OS. These systems often require new manufacturing tools in order to upgrade, or they need massive overhauls that smaller companies can’t always afford.
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 29
      +score: 0
      +lastActive: DateTime @1699630624 {#1434
        date: 2023-11-10 16:37:04.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@ejmin@lemmy.ml"
      ]
      +children: Doctrine\ORM\PersistentCollection {#1575 …}
      +nested: Doctrine\ORM\PersistentCollection {#1572 …}
      +votes: Doctrine\ORM\PersistentCollection {#1581 …}
      +reports: Doctrine\ORM\PersistentCollection {#1579 …}
      +favourites: Doctrine\ORM\PersistentCollection {#1576 …}
      +notifications: Doctrine\ORM\PersistentCollection {#1652 …}
      -id: 102713
      -bodyTs: "'afford':152 'also':64,75 'alway':151 'answer':6 'attack':27 'close':35 'compani':148 'competit':30 'creativ':57 'debian':19 'defens':29 'download':11 'eol':14 'exist':99 'exploit':81 'find':56 'forc':52 'give':3 'happen':101 'imposs':41 'isol':68 'keep':60 'lot':103 'machin':107 'manufactur':113,135 'massiv':144 'measur':66 'might':110 'modern':125 'much':71 'near':40 'need':143 'new':134 'normal':33 'often':132 'old':13,80 'order':138 'os':129 'overhaul':145 'part':25 'patch':85 'peopl':91 'person':21 'possibl':73 'realli':12 'recent':47,88 'regular':10 'requir':118,133 'run':123 'secur':49 'smaller':147 'softwar':119 'someon':8 'system':114,131 'take':65 'teach':79 'team':54 'tool':136 'ubuntu':17 'unus':37 'updat':43 'upgrad':140 'use':22,76 'version':15,50,89,126 'walk':90 'way':58 'window':106 'won':121 'work':62,95"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://sh.itjust.works/comment/5296509"
      +editedAt: null
      +createdAt: DateTimeImmutable @1699480096 {#1699
        date: 2023-11-08 22:48:16.0 +01:00
      }
      +"title": 102713
    }
    0 => App\Entity\EntryComment {#1567
      +user: App\Entity\User {#260 …}
      +entry: Proxies\__CG__\App\Entity\Entry {#1583 …2}
      +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
      +image: null
      +parent: Proxies\__CG__\App\Entity\EntryComment {#1611 …}
      +root: App\Entity\EntryComment {#1610}
      +body: """
        Ok so to be clear when I said team I mean a bunch of college students preparing for different ctfs, but these are some of the more helpful resources we have found:\n
        \n
        Tryhackme: personal favorite especially for beginners Hackthebox: great for learning/practicing attacks Overthewire: another good ctf site\n
        \n
        We try to build many of our own ctf like machines, then each person switches their machine with another person and the other person tries to secure the vulnerabilities without knowing anything about the machine. Once everyone has secured their machines we try to attack them using the notes made while setting them up. This is our step by step for that process.\n
        \n
        1. download an old version of a distro. (Ubuntu 14, deb 9, ect)\n
        2. install and setup the VM without any updates or changes to the default configuration\n
        3. google the distro version (Ubuntu 14.04) + vulnerabilities or exploits\n
        4. read through the different sites to find applications that had huge security issues on that version and begin installing some of the programs that have known exploits\n
        \n
        So for example with Ubuntu 14.04 we know there are some Linux kernel exploits.\n
        \n
        A quick Google search returned this exploit: [www.exploit-db.com/exploits/43418](https://www.exploit-db.com/exploits/43418)\n
        \n
        Using Ubuntu’s website I looked up other critical vulnerabilities and found these: [ubuntu.com/security/cves?q=&package=&prio…](https://ubuntu.com/security/cves?q=&package=&priority=critical&version=trusty&status=)\n
        \n
        From here I could add some of the packages mentioned as having exploits and then attempt to exploit them. I could also check newer versions of Ubuntu like 16 to find vulnerabilities that would also apply to older versions.\n
        \n
        There is also Mitre’s list(s) of the most dangerous software vulnerabilities. They have one for 2023, but also a catalog of lists from previous years.\n
        \n
        [cwe.mitre.org/top25/…/2023_top25_list.html](https://cwe.mitre.org/top25/archive/2023/2023_top25_list.html)\n
        \n
        Hopefully this helps!
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 2
      +score: 0
      +lastActive: DateTime @1699558018 {#1667
        date: 2023-11-09 20:26:58.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@ejmin@lemmy.ml"
        "@computerboss@sh.itjust.works"
        "@fiat_lux@kbin.social"
      ]
      +children: Doctrine\ORM\PersistentCollection {#1616 …}
      +nested: Doctrine\ORM\PersistentCollection {#1795 …}
      +votes: Doctrine\ORM\PersistentCollection {#1691 …}
      +reports: Doctrine\ORM\PersistentCollection {#1689 …}
      +favourites: Doctrine\ORM\PersistentCollection {#1687 …}
      +notifications: Doctrine\ORM\PersistentCollection {#1701 …}
      -id: 105158
      -bodyTs: "'/2023_top25_list.html':290 '/exploits/43418](https://www.exploit-db.com/exploits/43418)':201 '/security/cves?q=&package=&prio':217 '/security/cves?q=&package=&priority=critical&version=trusty&status=)':220 '/top25/':289 '/top25/archive/2023/2023_top25_list.html)':293 '1':112 '14':121 '14.04':146,183 '16':249 '2':125 '2023':277 '3':140 '4':150 '9':123 'add':225 'also':242,255,262,279 'anoth':45,67 'anyth':80 'appli':256 'applic':158 'attack':43,93 'attempt':236 'begin':168 'beginn':38 'build':52 'bunch':13 'catalog':281 'chang':135 'check':243 'clear':5 'colleg':15 'configur':139 'could':224,241 'critic':210 'ctf':47,57 'ctfs':20 'cwe.mitre.org':288,292 'cwe.mitre.org/top25/':287 'cwe.mitre.org/top25/archive/2023/2023_top25_list.html)':291 'danger':270 'deb':122 'default':138 'differ':19,154 'distro':119,143 'download':113 'ect':124 'especi':36 'everyon':85 'exampl':180 'exploit':149,177,191,198,233,238 'favorit':35 'find':157,251 'found':32,213 'good':46 'googl':141,194 'great':40 'hackthebox':39 'help':28,296 'hope':294 'huge':161 'instal':126,169 'issu':163 'kernel':190 'know':79,185 'known':176 'learning/practicing':42 'like':58,248 'linux':189 'list':265,283 'look':207 'machin':59,65,83,89 'made':98 'mani':53 'mean':11 'mention':230 'mitr':263 'newer':244 'note':97 'ok':1 'old':115 'older':258 'one':275 'overthewir':44 'packag':229 'person':34,62,68,72 'prepar':17 'previous':285 'process':111 'program':173 'quick':193 'read':151 'resourc':29 'return':196 'said':8 'search':195 'secur':75,87,162 'set':100 'setup':128 'site':48,155 'softwar':271 'step':106,108 'student':16 'switch':63 'team':9 'tri':50,73,91 'tryhackm':33 'ubuntu':120,145,182,203,247 'ubuntu.com':216,219 'ubuntu.com/security/cves?q=&package=&prio':215 'ubuntu.com/security/cves?q=&package=&priority=critical&version=trusty&status=)':218 'updat':133 'use':95,202 'version':116,144,166,245,259 'vm':130 'vulner':77,147,211,252,272 'websit':205 'without':78,131 'would':254 'www.exploit-db.com':200 'www.exploit-db.com/exploits/43418](https://www.exploit-db.com/exploits/43418)':199 'year':286"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://sh.itjust.works/comment/5321609"
      +editedAt: null
      +createdAt: DateTimeImmutable @1699558018 {#1525
        date: 2023-11-09 20:26:58.0 +01:00
      }
      +"title": 105158
    }
  ]
  -id: 11235
  -titleTs: "'instal':7 'mani':2 'need':4 'old':5 'peopl':3 'ubuntu':6"
  -bodyTs: "'3':23 'alway':31 'ancient':35 'download':16,33 'especi':37 'foss':6 'idea':27 'keep':15 'mani':5 'old':25 'peopl':14 'reason':13 'seed':4 'someon':32 'stuff':36 'thing':7 'ubuntu':17,38 've':2 'version':18 'year':9,24"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1699561656
  +visibility: "visible             "
  +apId: "https://lemmy.ml/post/7687281"
  +editedAt: null
  +createdAt: DateTimeImmutable @1699475256 {#1595
    date: 2023-11-08 21:27:36.0 +01:00
  }
  +__isInitialized__: true
   …2
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
4 DENIED moderate
Proxies\__CG__\App\Entity\Entry {#1583
  +user: Proxies\__CG__\App\Entity\User {#2448 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
  +image: Proxies\__CG__\App\Entity\Image {#1723 …}
  +domain: Proxies\__CG__\App\Entity\Domain {#2382 …}
  +slug: "That-many-people-need-old-Ubuntu-installations"
  +title: "That many people need old Ubuntu installations?"
  +url: "https://lemmy.ml/pictrs/image/f5a65952-a239-406e-8937-e428631be65d.png"
  +body: """
    I’ve been seeding many Foss things for years but for some reason, people keep downloading Ubuntu versions that are more than 3 years old.\n
    \n
    Any ideas why there is always someone downloading the ancient stuff, especially Ubuntu?
    """
  +type: "image"
  +lang: "en"
  +isOc: false
  +hasEmbed: true
  +commentCount: 36
  +favouriteCount: 221
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1699764031 {#1717
    date: 2023-11-12 05:40:31.0 +01:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#2385 …}
  +votes: Doctrine\ORM\PersistentCollection {#1566 …}
  +reports: Doctrine\ORM\PersistentCollection {#1548 …}
  +favourites: Doctrine\ORM\PersistentCollection {#2391 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1907 …}
  +badges: Doctrine\ORM\PersistentCollection {#1385 …}
  +children: [
    1 => App\Entity\EntryComment {#1610
      +user: App\Entity\User {#260 …}
      +entry: Proxies\__CG__\App\Entity\Entry {#1583 …2}
      +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
      +image: null
      +parent: null
      +root: null
      +body: """
        I can give you an answer from someone who regularly downloads really old EOL versions of Ubuntu and Debian. I personally use them as part of attack and defense competitions. They are normally very close to unusable and are nearly impossible to update to a more recent or secure version. This forces my team to find creative ways to keep them working while also taking measures to isolate them as much as possible. I also use them to teach old exploits that have been patched in more recent versions, walking people through how it worked and why it existed.\n
        \n
        It happens a lot more with Windows machines, but there might be some manufacturing systems out there that require software that won’t run on modern versions of the OS. These systems often require new manufacturing tools in order to upgrade, or they need massive overhauls that smaller companies can’t always afford.
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 29
      +score: 0
      +lastActive: DateTime @1699630624 {#1434
        date: 2023-11-10 16:37:04.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@ejmin@lemmy.ml"
      ]
      +children: Doctrine\ORM\PersistentCollection {#1575 …}
      +nested: Doctrine\ORM\PersistentCollection {#1572 …}
      +votes: Doctrine\ORM\PersistentCollection {#1581 …}
      +reports: Doctrine\ORM\PersistentCollection {#1579 …}
      +favourites: Doctrine\ORM\PersistentCollection {#1576 …}
      +notifications: Doctrine\ORM\PersistentCollection {#1652 …}
      -id: 102713
      -bodyTs: "'afford':152 'also':64,75 'alway':151 'answer':6 'attack':27 'close':35 'compani':148 'competit':30 'creativ':57 'debian':19 'defens':29 'download':11 'eol':14 'exist':99 'exploit':81 'find':56 'forc':52 'give':3 'happen':101 'imposs':41 'isol':68 'keep':60 'lot':103 'machin':107 'manufactur':113,135 'massiv':144 'measur':66 'might':110 'modern':125 'much':71 'near':40 'need':143 'new':134 'normal':33 'often':132 'old':13,80 'order':138 'os':129 'overhaul':145 'part':25 'patch':85 'peopl':91 'person':21 'possibl':73 'realli':12 'recent':47,88 'regular':10 'requir':118,133 'run':123 'secur':49 'smaller':147 'softwar':119 'someon':8 'system':114,131 'take':65 'teach':79 'team':54 'tool':136 'ubuntu':17 'unus':37 'updat':43 'upgrad':140 'use':22,76 'version':15,50,89,126 'walk':90 'way':58 'window':106 'won':121 'work':62,95"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://sh.itjust.works/comment/5296509"
      +editedAt: null
      +createdAt: DateTimeImmutable @1699480096 {#1699
        date: 2023-11-08 22:48:16.0 +01:00
      }
      +"title": 102713
    }
    0 => App\Entity\EntryComment {#1567
      +user: App\Entity\User {#260 …}
      +entry: Proxies\__CG__\App\Entity\Entry {#1583 …2}
      +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
      +image: null
      +parent: Proxies\__CG__\App\Entity\EntryComment {#1611 …}
      +root: App\Entity\EntryComment {#1610}
      +body: """
        Ok so to be clear when I said team I mean a bunch of college students preparing for different ctfs, but these are some of the more helpful resources we have found:\n
        \n
        Tryhackme: personal favorite especially for beginners Hackthebox: great for learning/practicing attacks Overthewire: another good ctf site\n
        \n
        We try to build many of our own ctf like machines, then each person switches their machine with another person and the other person tries to secure the vulnerabilities without knowing anything about the machine. Once everyone has secured their machines we try to attack them using the notes made while setting them up. This is our step by step for that process.\n
        \n
        1. download an old version of a distro. (Ubuntu 14, deb 9, ect)\n
        2. install and setup the VM without any updates or changes to the default configuration\n
        3. google the distro version (Ubuntu 14.04) + vulnerabilities or exploits\n
        4. read through the different sites to find applications that had huge security issues on that version and begin installing some of the programs that have known exploits\n
        \n
        So for example with Ubuntu 14.04 we know there are some Linux kernel exploits.\n
        \n
        A quick Google search returned this exploit: [www.exploit-db.com/exploits/43418](https://www.exploit-db.com/exploits/43418)\n
        \n
        Using Ubuntu’s website I looked up other critical vulnerabilities and found these: [ubuntu.com/security/cves?q=&package=&prio…](https://ubuntu.com/security/cves?q=&package=&priority=critical&version=trusty&status=)\n
        \n
        From here I could add some of the packages mentioned as having exploits and then attempt to exploit them. I could also check newer versions of Ubuntu like 16 to find vulnerabilities that would also apply to older versions.\n
        \n
        There is also Mitre’s list(s) of the most dangerous software vulnerabilities. They have one for 2023, but also a catalog of lists from previous years.\n
        \n
        [cwe.mitre.org/top25/…/2023_top25_list.html](https://cwe.mitre.org/top25/archive/2023/2023_top25_list.html)\n
        \n
        Hopefully this helps!
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 2
      +score: 0
      +lastActive: DateTime @1699558018 {#1667
        date: 2023-11-09 20:26:58.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@ejmin@lemmy.ml"
        "@computerboss@sh.itjust.works"
        "@fiat_lux@kbin.social"
      ]
      +children: Doctrine\ORM\PersistentCollection {#1616 …}
      +nested: Doctrine\ORM\PersistentCollection {#1795 …}
      +votes: Doctrine\ORM\PersistentCollection {#1691 …}
      +reports: Doctrine\ORM\PersistentCollection {#1689 …}
      +favourites: Doctrine\ORM\PersistentCollection {#1687 …}
      +notifications: Doctrine\ORM\PersistentCollection {#1701 …}
      -id: 105158
      -bodyTs: "'/2023_top25_list.html':290 '/exploits/43418](https://www.exploit-db.com/exploits/43418)':201 '/security/cves?q=&package=&prio':217 '/security/cves?q=&package=&priority=critical&version=trusty&status=)':220 '/top25/':289 '/top25/archive/2023/2023_top25_list.html)':293 '1':112 '14':121 '14.04':146,183 '16':249 '2':125 '2023':277 '3':140 '4':150 '9':123 'add':225 'also':242,255,262,279 'anoth':45,67 'anyth':80 'appli':256 'applic':158 'attack':43,93 'attempt':236 'begin':168 'beginn':38 'build':52 'bunch':13 'catalog':281 'chang':135 'check':243 'clear':5 'colleg':15 'configur':139 'could':224,241 'critic':210 'ctf':47,57 'ctfs':20 'cwe.mitre.org':288,292 'cwe.mitre.org/top25/':287 'cwe.mitre.org/top25/archive/2023/2023_top25_list.html)':291 'danger':270 'deb':122 'default':138 'differ':19,154 'distro':119,143 'download':113 'ect':124 'especi':36 'everyon':85 'exampl':180 'exploit':149,177,191,198,233,238 'favorit':35 'find':157,251 'found':32,213 'good':46 'googl':141,194 'great':40 'hackthebox':39 'help':28,296 'hope':294 'huge':161 'instal':126,169 'issu':163 'kernel':190 'know':79,185 'known':176 'learning/practicing':42 'like':58,248 'linux':189 'list':265,283 'look':207 'machin':59,65,83,89 'made':98 'mani':53 'mean':11 'mention':230 'mitr':263 'newer':244 'note':97 'ok':1 'old':115 'older':258 'one':275 'overthewir':44 'packag':229 'person':34,62,68,72 'prepar':17 'previous':285 'process':111 'program':173 'quick':193 'read':151 'resourc':29 'return':196 'said':8 'search':195 'secur':75,87,162 'set':100 'setup':128 'site':48,155 'softwar':271 'step':106,108 'student':16 'switch':63 'team':9 'tri':50,73,91 'tryhackm':33 'ubuntu':120,145,182,203,247 'ubuntu.com':216,219 'ubuntu.com/security/cves?q=&package=&prio':215 'ubuntu.com/security/cves?q=&package=&priority=critical&version=trusty&status=)':218 'updat':133 'use':95,202 'version':116,144,166,245,259 'vm':130 'vulner':77,147,211,252,272 'websit':205 'without':78,131 'would':254 'www.exploit-db.com':200 'www.exploit-db.com/exploits/43418](https://www.exploit-db.com/exploits/43418)':199 'year':286"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://sh.itjust.works/comment/5321609"
      +editedAt: null
      +createdAt: DateTimeImmutable @1699558018 {#1525
        date: 2023-11-09 20:26:58.0 +01:00
      }
      +"title": 105158
    }
  ]
  -id: 11235
  -titleTs: "'instal':7 'mani':2 'need':4 'old':5 'peopl':3 'ubuntu':6"
  -bodyTs: "'3':23 'alway':31 'ancient':35 'download':16,33 'especi':37 'foss':6 'idea':27 'keep':15 'mani':5 'old':25 'peopl':14 'reason':13 'seed':4 'someon':32 'stuff':36 'thing':7 'ubuntu':17,38 've':2 'version':18 'year':9,24"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1699561656
  +visibility: "visible             "
  +apId: "https://lemmy.ml/post/7687281"
  +editedAt: null
  +createdAt: DateTimeImmutable @1699475256 {#1595
    date: 2023-11-08 21:27:36.0 +01:00
  }
  +__isInitialized__: true
   …2
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
5 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
6 DENIED moderate
App\Entity\EntryComment {#1610
  +user: App\Entity\User {#260 …}
  +entry: Proxies\__CG__\App\Entity\Entry {#1583
    +user: Proxies\__CG__\App\Entity\User {#2448 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
    +image: Proxies\__CG__\App\Entity\Image {#1723 …}
    +domain: Proxies\__CG__\App\Entity\Domain {#2382 …}
    +slug: "That-many-people-need-old-Ubuntu-installations"
    +title: "That many people need old Ubuntu installations?"
    +url: "https://lemmy.ml/pictrs/image/f5a65952-a239-406e-8937-e428631be65d.png"
    +body: """
      I’ve been seeding many Foss things for years but for some reason, people keep downloading Ubuntu versions that are more than 3 years old.\n
      \n
      Any ideas why there is always someone downloading the ancient stuff, especially Ubuntu?
      """
    +type: "image"
    +lang: "en"
    +isOc: false
    +hasEmbed: true
    +commentCount: 36
    +favouriteCount: 221
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1699764031 {#1717
      date: 2023-11-12 05:40:31.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#2385 …}
    +votes: Doctrine\ORM\PersistentCollection {#1566 …}
    +reports: Doctrine\ORM\PersistentCollection {#1548 …}
    +favourites: Doctrine\ORM\PersistentCollection {#2391 …}
    +notifications: Doctrine\ORM\PersistentCollection {#1907 …}
    +badges: Doctrine\ORM\PersistentCollection {#1385 …}
    +children: [
      1 => App\Entity\EntryComment {#1610}
      0 => App\Entity\EntryComment {#1567
        +user: App\Entity\User {#260 …}
        +entry: Proxies\__CG__\App\Entity\Entry {#1583 …2}
        +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
        +image: null
        +parent: Proxies\__CG__\App\Entity\EntryComment {#1611 …}
        +root: App\Entity\EntryComment {#1610}
        +body: """
          Ok so to be clear when I said team I mean a bunch of college students preparing for different ctfs, but these are some of the more helpful resources we have found:\n
          \n
          Tryhackme: personal favorite especially for beginners Hackthebox: great for learning/practicing attacks Overthewire: another good ctf site\n
          \n
          We try to build many of our own ctf like machines, then each person switches their machine with another person and the other person tries to secure the vulnerabilities without knowing anything about the machine. Once everyone has secured their machines we try to attack them using the notes made while setting them up. This is our step by step for that process.\n
          \n
          1. download an old version of a distro. (Ubuntu 14, deb 9, ect)\n
          2. install and setup the VM without any updates or changes to the default configuration\n
          3. google the distro version (Ubuntu 14.04) + vulnerabilities or exploits\n
          4. read through the different sites to find applications that had huge security issues on that version and begin installing some of the programs that have known exploits\n
          \n
          So for example with Ubuntu 14.04 we know there are some Linux kernel exploits.\n
          \n
          A quick Google search returned this exploit: [www.exploit-db.com/exploits/43418](https://www.exploit-db.com/exploits/43418)\n
          \n
          Using Ubuntu’s website I looked up other critical vulnerabilities and found these: [ubuntu.com/security/cves?q=&package=&prio…](https://ubuntu.com/security/cves?q=&package=&priority=critical&version=trusty&status=)\n
          \n
          From here I could add some of the packages mentioned as having exploits and then attempt to exploit them. I could also check newer versions of Ubuntu like 16 to find vulnerabilities that would also apply to older versions.\n
          \n
          There is also Mitre’s list(s) of the most dangerous software vulnerabilities. They have one for 2023, but also a catalog of lists from previous years.\n
          \n
          [cwe.mitre.org/top25/…/2023_top25_list.html](https://cwe.mitre.org/top25/archive/2023/2023_top25_list.html)\n
          \n
          Hopefully this helps!
          """
        +lang: "en"
        +isAdult: false
        +favouriteCount: 2
        +score: 0
        +lastActive: DateTime @1699558018 {#1667
          date: 2023-11-09 20:26:58.0 +01:00
        }
        +ip: null
        +tags: null
        +mentions: [
          "@ejmin@lemmy.ml"
          "@computerboss@sh.itjust.works"
          "@fiat_lux@kbin.social"
        ]
        +children: Doctrine\ORM\PersistentCollection {#1616 …}
        +nested: Doctrine\ORM\PersistentCollection {#1795 …}
        +votes: Doctrine\ORM\PersistentCollection {#1691 …}
        +reports: Doctrine\ORM\PersistentCollection {#1689 …}
        +favourites: Doctrine\ORM\PersistentCollection {#1687 …}
        +notifications: Doctrine\ORM\PersistentCollection {#1701 …}
        -id: 105158
        -bodyTs: "'/2023_top25_list.html':290 '/exploits/43418](https://www.exploit-db.com/exploits/43418)':201 '/security/cves?q=&package=&prio':217 '/security/cves?q=&package=&priority=critical&version=trusty&status=)':220 '/top25/':289 '/top25/archive/2023/2023_top25_list.html)':293 '1':112 '14':121 '14.04':146,183 '16':249 '2':125 '2023':277 '3':140 '4':150 '9':123 'add':225 'also':242,255,262,279 'anoth':45,67 'anyth':80 'appli':256 'applic':158 'attack':43,93 'attempt':236 'begin':168 'beginn':38 'build':52 'bunch':13 'catalog':281 'chang':135 'check':243 'clear':5 'colleg':15 'configur':139 'could':224,241 'critic':210 'ctf':47,57 'ctfs':20 'cwe.mitre.org':288,292 'cwe.mitre.org/top25/':287 'cwe.mitre.org/top25/archive/2023/2023_top25_list.html)':291 'danger':270 'deb':122 'default':138 'differ':19,154 'distro':119,143 'download':113 'ect':124 'especi':36 'everyon':85 'exampl':180 'exploit':149,177,191,198,233,238 'favorit':35 'find':157,251 'found':32,213 'good':46 'googl':141,194 'great':40 'hackthebox':39 'help':28,296 'hope':294 'huge':161 'instal':126,169 'issu':163 'kernel':190 'know':79,185 'known':176 'learning/practicing':42 'like':58,248 'linux':189 'list':265,283 'look':207 'machin':59,65,83,89 'made':98 'mani':53 'mean':11 'mention':230 'mitr':263 'newer':244 'note':97 'ok':1 'old':115 'older':258 'one':275 'overthewir':44 'packag':229 'person':34,62,68,72 'prepar':17 'previous':285 'process':111 'program':173 'quick':193 'read':151 'resourc':29 'return':196 'said':8 'search':195 'secur':75,87,162 'set':100 'setup':128 'site':48,155 'softwar':271 'step':106,108 'student':16 'switch':63 'team':9 'tri':50,73,91 'tryhackm':33 'ubuntu':120,145,182,203,247 'ubuntu.com':216,219 'ubuntu.com/security/cves?q=&package=&prio':215 'ubuntu.com/security/cves?q=&package=&priority=critical&version=trusty&status=)':218 'updat':133 'use':95,202 'version':116,144,166,245,259 'vm':130 'vulner':77,147,211,252,272 'websit':205 'without':78,131 'would':254 'www.exploit-db.com':200 'www.exploit-db.com/exploits/43418](https://www.exploit-db.com/exploits/43418)':199 'year':286"
        +ranking: 0
        +commentCount: 0
        +upVotes: 0
        +downVotes: 0
        +visibility: "visible             "
        +apId: "https://sh.itjust.works/comment/5321609"
        +editedAt: null
        +createdAt: DateTimeImmutable @1699558018 {#1525
          date: 2023-11-09 20:26:58.0 +01:00
        }
        +"title": 105158
      }
    ]
    -id: 11235
    -titleTs: "'instal':7 'mani':2 'need':4 'old':5 'peopl':3 'ubuntu':6"
    -bodyTs: "'3':23 'alway':31 'ancient':35 'download':16,33 'especi':37 'foss':6 'idea':27 'keep':15 'mani':5 'old':25 'peopl':14 'reason':13 'seed':4 'someon':32 'stuff':36 'thing':7 'ubuntu':17,38 've':2 'version':18 'year':9,24"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1699561656
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/7687281"
    +editedAt: null
    +createdAt: DateTimeImmutable @1699475256 {#1595
      date: 2023-11-08 21:27:36.0 +01:00
    }
    +__isInitialized__: true
     …2
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
  +image: null
  +parent: null
  +root: null
  +body: """
    I can give you an answer from someone who regularly downloads really old EOL versions of Ubuntu and Debian. I personally use them as part of attack and defense competitions. They are normally very close to unusable and are nearly impossible to update to a more recent or secure version. This forces my team to find creative ways to keep them working while also taking measures to isolate them as much as possible. I also use them to teach old exploits that have been patched in more recent versions, walking people through how it worked and why it existed.\n
    \n
    It happens a lot more with Windows machines, but there might be some manufacturing systems out there that require software that won’t run on modern versions of the OS. These systems often require new manufacturing tools in order to upgrade, or they need massive overhauls that smaller companies can’t always afford.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 29
  +score: 0
  +lastActive: DateTime @1699630624 {#1434
    date: 2023-11-10 16:37:04.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@ejmin@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#1575 …}
  +nested: Doctrine\ORM\PersistentCollection {#1572 …}
  +votes: Doctrine\ORM\PersistentCollection {#1581 …}
  +reports: Doctrine\ORM\PersistentCollection {#1579 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1576 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1652 …}
  -id: 102713
  -bodyTs: "'afford':152 'also':64,75 'alway':151 'answer':6 'attack':27 'close':35 'compani':148 'competit':30 'creativ':57 'debian':19 'defens':29 'download':11 'eol':14 'exist':99 'exploit':81 'find':56 'forc':52 'give':3 'happen':101 'imposs':41 'isol':68 'keep':60 'lot':103 'machin':107 'manufactur':113,135 'massiv':144 'measur':66 'might':110 'modern':125 'much':71 'near':40 'need':143 'new':134 'normal':33 'often':132 'old':13,80 'order':138 'os':129 'overhaul':145 'part':25 'patch':85 'peopl':91 'person':21 'possibl':73 'realli':12 'recent':47,88 'regular':10 'requir':118,133 'run':123 'secur':49 'smaller':147 'softwar':119 'someon':8 'system':114,131 'take':65 'teach':79 'team':54 'tool':136 'ubuntu':17 'unus':37 'updat':43 'upgrad':140 'use':22,76 'version':15,50,89,126 'walk':90 'way':58 'window':106 'won':121 'work':62,95"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://sh.itjust.works/comment/5296509"
  +editedAt: null
  +createdAt: DateTimeImmutable @1699480096 {#1699
    date: 2023-11-08 22:48:16.0 +01:00
  }
  +"title": 102713
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
7 DENIED edit
App\Entity\EntryComment {#1610
  +user: App\Entity\User {#260 …}
  +entry: Proxies\__CG__\App\Entity\Entry {#1583
    +user: Proxies\__CG__\App\Entity\User {#2448 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
    +image: Proxies\__CG__\App\Entity\Image {#1723 …}
    +domain: Proxies\__CG__\App\Entity\Domain {#2382 …}
    +slug: "That-many-people-need-old-Ubuntu-installations"
    +title: "That many people need old Ubuntu installations?"
    +url: "https://lemmy.ml/pictrs/image/f5a65952-a239-406e-8937-e428631be65d.png"
    +body: """
      I’ve been seeding many Foss things for years but for some reason, people keep downloading Ubuntu versions that are more than 3 years old.\n
      \n
      Any ideas why there is always someone downloading the ancient stuff, especially Ubuntu?
      """
    +type: "image"
    +lang: "en"
    +isOc: false
    +hasEmbed: true
    +commentCount: 36
    +favouriteCount: 221
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1699764031 {#1717
      date: 2023-11-12 05:40:31.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#2385 …}
    +votes: Doctrine\ORM\PersistentCollection {#1566 …}
    +reports: Doctrine\ORM\PersistentCollection {#1548 …}
    +favourites: Doctrine\ORM\PersistentCollection {#2391 …}
    +notifications: Doctrine\ORM\PersistentCollection {#1907 …}
    +badges: Doctrine\ORM\PersistentCollection {#1385 …}
    +children: [
      1 => App\Entity\EntryComment {#1610}
      0 => App\Entity\EntryComment {#1567
        +user: App\Entity\User {#260 …}
        +entry: Proxies\__CG__\App\Entity\Entry {#1583 …2}
        +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
        +image: null
        +parent: Proxies\__CG__\App\Entity\EntryComment {#1611 …}
        +root: App\Entity\EntryComment {#1610}
        +body: """
          Ok so to be clear when I said team I mean a bunch of college students preparing for different ctfs, but these are some of the more helpful resources we have found:\n
          \n
          Tryhackme: personal favorite especially for beginners Hackthebox: great for learning/practicing attacks Overthewire: another good ctf site\n
          \n
          We try to build many of our own ctf like machines, then each person switches their machine with another person and the other person tries to secure the vulnerabilities without knowing anything about the machine. Once everyone has secured their machines we try to attack them using the notes made while setting them up. This is our step by step for that process.\n
          \n
          1. download an old version of a distro. (Ubuntu 14, deb 9, ect)\n
          2. install and setup the VM without any updates or changes to the default configuration\n
          3. google the distro version (Ubuntu 14.04) + vulnerabilities or exploits\n
          4. read through the different sites to find applications that had huge security issues on that version and begin installing some of the programs that have known exploits\n
          \n
          So for example with Ubuntu 14.04 we know there are some Linux kernel exploits.\n
          \n
          A quick Google search returned this exploit: [www.exploit-db.com/exploits/43418](https://www.exploit-db.com/exploits/43418)\n
          \n
          Using Ubuntu’s website I looked up other critical vulnerabilities and found these: [ubuntu.com/security/cves?q=&package=&prio…](https://ubuntu.com/security/cves?q=&package=&priority=critical&version=trusty&status=)\n
          \n
          From here I could add some of the packages mentioned as having exploits and then attempt to exploit them. I could also check newer versions of Ubuntu like 16 to find vulnerabilities that would also apply to older versions.\n
          \n
          There is also Mitre’s list(s) of the most dangerous software vulnerabilities. They have one for 2023, but also a catalog of lists from previous years.\n
          \n
          [cwe.mitre.org/top25/…/2023_top25_list.html](https://cwe.mitre.org/top25/archive/2023/2023_top25_list.html)\n
          \n
          Hopefully this helps!
          """
        +lang: "en"
        +isAdult: false
        +favouriteCount: 2
        +score: 0
        +lastActive: DateTime @1699558018 {#1667
          date: 2023-11-09 20:26:58.0 +01:00
        }
        +ip: null
        +tags: null
        +mentions: [
          "@ejmin@lemmy.ml"
          "@computerboss@sh.itjust.works"
          "@fiat_lux@kbin.social"
        ]
        +children: Doctrine\ORM\PersistentCollection {#1616 …}
        +nested: Doctrine\ORM\PersistentCollection {#1795 …}
        +votes: Doctrine\ORM\PersistentCollection {#1691 …}
        +reports: Doctrine\ORM\PersistentCollection {#1689 …}
        +favourites: Doctrine\ORM\PersistentCollection {#1687 …}
        +notifications: Doctrine\ORM\PersistentCollection {#1701 …}
        -id: 105158
        -bodyTs: "'/2023_top25_list.html':290 '/exploits/43418](https://www.exploit-db.com/exploits/43418)':201 '/security/cves?q=&package=&prio':217 '/security/cves?q=&package=&priority=critical&version=trusty&status=)':220 '/top25/':289 '/top25/archive/2023/2023_top25_list.html)':293 '1':112 '14':121 '14.04':146,183 '16':249 '2':125 '2023':277 '3':140 '4':150 '9':123 'add':225 'also':242,255,262,279 'anoth':45,67 'anyth':80 'appli':256 'applic':158 'attack':43,93 'attempt':236 'begin':168 'beginn':38 'build':52 'bunch':13 'catalog':281 'chang':135 'check':243 'clear':5 'colleg':15 'configur':139 'could':224,241 'critic':210 'ctf':47,57 'ctfs':20 'cwe.mitre.org':288,292 'cwe.mitre.org/top25/':287 'cwe.mitre.org/top25/archive/2023/2023_top25_list.html)':291 'danger':270 'deb':122 'default':138 'differ':19,154 'distro':119,143 'download':113 'ect':124 'especi':36 'everyon':85 'exampl':180 'exploit':149,177,191,198,233,238 'favorit':35 'find':157,251 'found':32,213 'good':46 'googl':141,194 'great':40 'hackthebox':39 'help':28,296 'hope':294 'huge':161 'instal':126,169 'issu':163 'kernel':190 'know':79,185 'known':176 'learning/practicing':42 'like':58,248 'linux':189 'list':265,283 'look':207 'machin':59,65,83,89 'made':98 'mani':53 'mean':11 'mention':230 'mitr':263 'newer':244 'note':97 'ok':1 'old':115 'older':258 'one':275 'overthewir':44 'packag':229 'person':34,62,68,72 'prepar':17 'previous':285 'process':111 'program':173 'quick':193 'read':151 'resourc':29 'return':196 'said':8 'search':195 'secur':75,87,162 'set':100 'setup':128 'site':48,155 'softwar':271 'step':106,108 'student':16 'switch':63 'team':9 'tri':50,73,91 'tryhackm':33 'ubuntu':120,145,182,203,247 'ubuntu.com':216,219 'ubuntu.com/security/cves?q=&package=&prio':215 'ubuntu.com/security/cves?q=&package=&priority=critical&version=trusty&status=)':218 'updat':133 'use':95,202 'version':116,144,166,245,259 'vm':130 'vulner':77,147,211,252,272 'websit':205 'without':78,131 'would':254 'www.exploit-db.com':200 'www.exploit-db.com/exploits/43418](https://www.exploit-db.com/exploits/43418)':199 'year':286"
        +ranking: 0
        +commentCount: 0
        +upVotes: 0
        +downVotes: 0
        +visibility: "visible             "
        +apId: "https://sh.itjust.works/comment/5321609"
        +editedAt: null
        +createdAt: DateTimeImmutable @1699558018 {#1525
          date: 2023-11-09 20:26:58.0 +01:00
        }
        +"title": 105158
      }
    ]
    -id: 11235
    -titleTs: "'instal':7 'mani':2 'need':4 'old':5 'peopl':3 'ubuntu':6"
    -bodyTs: "'3':23 'alway':31 'ancient':35 'download':16,33 'especi':37 'foss':6 'idea':27 'keep':15 'mani':5 'old':25 'peopl':14 'reason':13 'seed':4 'someon':32 'stuff':36 'thing':7 'ubuntu':17,38 've':2 'version':18 'year':9,24"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1699561656
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/7687281"
    +editedAt: null
    +createdAt: DateTimeImmutable @1699475256 {#1595
      date: 2023-11-08 21:27:36.0 +01:00
    }
    +__isInitialized__: true
     …2
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
  +image: null
  +parent: null
  +root: null
  +body: """
    I can give you an answer from someone who regularly downloads really old EOL versions of Ubuntu and Debian. I personally use them as part of attack and defense competitions. They are normally very close to unusable and are nearly impossible to update to a more recent or secure version. This forces my team to find creative ways to keep them working while also taking measures to isolate them as much as possible. I also use them to teach old exploits that have been patched in more recent versions, walking people through how it worked and why it existed.\n
    \n
    It happens a lot more with Windows machines, but there might be some manufacturing systems out there that require software that won’t run on modern versions of the OS. These systems often require new manufacturing tools in order to upgrade, or they need massive overhauls that smaller companies can’t always afford.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 29
  +score: 0
  +lastActive: DateTime @1699630624 {#1434
    date: 2023-11-10 16:37:04.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@ejmin@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#1575 …}
  +nested: Doctrine\ORM\PersistentCollection {#1572 …}
  +votes: Doctrine\ORM\PersistentCollection {#1581 …}
  +reports: Doctrine\ORM\PersistentCollection {#1579 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1576 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1652 …}
  -id: 102713
  -bodyTs: "'afford':152 'also':64,75 'alway':151 'answer':6 'attack':27 'close':35 'compani':148 'competit':30 'creativ':57 'debian':19 'defens':29 'download':11 'eol':14 'exist':99 'exploit':81 'find':56 'forc':52 'give':3 'happen':101 'imposs':41 'isol':68 'keep':60 'lot':103 'machin':107 'manufactur':113,135 'massiv':144 'measur':66 'might':110 'modern':125 'much':71 'near':40 'need':143 'new':134 'normal':33 'often':132 'old':13,80 'order':138 'os':129 'overhaul':145 'part':25 'patch':85 'peopl':91 'person':21 'possibl':73 'realli':12 'recent':47,88 'regular':10 'requir':118,133 'run':123 'secur':49 'smaller':147 'softwar':119 'someon':8 'system':114,131 'take':65 'teach':79 'team':54 'tool':136 'ubuntu':17 'unus':37 'updat':43 'upgrad':140 'use':22,76 'version':15,50,89,126 'walk':90 'way':58 'window':106 'won':121 'work':62,95"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://sh.itjust.works/comment/5296509"
  +editedAt: null
  +createdAt: DateTimeImmutable @1699480096 {#1699
    date: 2023-11-08 22:48:16.0 +01:00
  }
  +"title": 102713
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
8 DENIED moderate
App\Entity\EntryComment {#1610
  +user: App\Entity\User {#260 …}
  +entry: Proxies\__CG__\App\Entity\Entry {#1583
    +user: Proxies\__CG__\App\Entity\User {#2448 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
    +image: Proxies\__CG__\App\Entity\Image {#1723 …}
    +domain: Proxies\__CG__\App\Entity\Domain {#2382 …}
    +slug: "That-many-people-need-old-Ubuntu-installations"
    +title: "That many people need old Ubuntu installations?"
    +url: "https://lemmy.ml/pictrs/image/f5a65952-a239-406e-8937-e428631be65d.png"
    +body: """
      I’ve been seeding many Foss things for years but for some reason, people keep downloading Ubuntu versions that are more than 3 years old.\n
      \n
      Any ideas why there is always someone downloading the ancient stuff, especially Ubuntu?
      """
    +type: "image"
    +lang: "en"
    +isOc: false
    +hasEmbed: true
    +commentCount: 36
    +favouriteCount: 221
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1699764031 {#1717
      date: 2023-11-12 05:40:31.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#2385 …}
    +votes: Doctrine\ORM\PersistentCollection {#1566 …}
    +reports: Doctrine\ORM\PersistentCollection {#1548 …}
    +favourites: Doctrine\ORM\PersistentCollection {#2391 …}
    +notifications: Doctrine\ORM\PersistentCollection {#1907 …}
    +badges: Doctrine\ORM\PersistentCollection {#1385 …}
    +children: [
      1 => App\Entity\EntryComment {#1610}
      0 => App\Entity\EntryComment {#1567
        +user: App\Entity\User {#260 …}
        +entry: Proxies\__CG__\App\Entity\Entry {#1583 …2}
        +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
        +image: null
        +parent: Proxies\__CG__\App\Entity\EntryComment {#1611 …}
        +root: App\Entity\EntryComment {#1610}
        +body: """
          Ok so to be clear when I said team I mean a bunch of college students preparing for different ctfs, but these are some of the more helpful resources we have found:\n
          \n
          Tryhackme: personal favorite especially for beginners Hackthebox: great for learning/practicing attacks Overthewire: another good ctf site\n
          \n
          We try to build many of our own ctf like machines, then each person switches their machine with another person and the other person tries to secure the vulnerabilities without knowing anything about the machine. Once everyone has secured their machines we try to attack them using the notes made while setting them up. This is our step by step for that process.\n
          \n
          1. download an old version of a distro. (Ubuntu 14, deb 9, ect)\n
          2. install and setup the VM without any updates or changes to the default configuration\n
          3. google the distro version (Ubuntu 14.04) + vulnerabilities or exploits\n
          4. read through the different sites to find applications that had huge security issues on that version and begin installing some of the programs that have known exploits\n
          \n
          So for example with Ubuntu 14.04 we know there are some Linux kernel exploits.\n
          \n
          A quick Google search returned this exploit: [www.exploit-db.com/exploits/43418](https://www.exploit-db.com/exploits/43418)\n
          \n
          Using Ubuntu’s website I looked up other critical vulnerabilities and found these: [ubuntu.com/security/cves?q=&package=&prio…](https://ubuntu.com/security/cves?q=&package=&priority=critical&version=trusty&status=)\n
          \n
          From here I could add some of the packages mentioned as having exploits and then attempt to exploit them. I could also check newer versions of Ubuntu like 16 to find vulnerabilities that would also apply to older versions.\n
          \n
          There is also Mitre’s list(s) of the most dangerous software vulnerabilities. They have one for 2023, but also a catalog of lists from previous years.\n
          \n
          [cwe.mitre.org/top25/…/2023_top25_list.html](https://cwe.mitre.org/top25/archive/2023/2023_top25_list.html)\n
          \n
          Hopefully this helps!
          """
        +lang: "en"
        +isAdult: false
        +favouriteCount: 2
        +score: 0
        +lastActive: DateTime @1699558018 {#1667
          date: 2023-11-09 20:26:58.0 +01:00
        }
        +ip: null
        +tags: null
        +mentions: [
          "@ejmin@lemmy.ml"
          "@computerboss@sh.itjust.works"
          "@fiat_lux@kbin.social"
        ]
        +children: Doctrine\ORM\PersistentCollection {#1616 …}
        +nested: Doctrine\ORM\PersistentCollection {#1795 …}
        +votes: Doctrine\ORM\PersistentCollection {#1691 …}
        +reports: Doctrine\ORM\PersistentCollection {#1689 …}
        +favourites: Doctrine\ORM\PersistentCollection {#1687 …}
        +notifications: Doctrine\ORM\PersistentCollection {#1701 …}
        -id: 105158
        -bodyTs: "'/2023_top25_list.html':290 '/exploits/43418](https://www.exploit-db.com/exploits/43418)':201 '/security/cves?q=&package=&prio':217 '/security/cves?q=&package=&priority=critical&version=trusty&status=)':220 '/top25/':289 '/top25/archive/2023/2023_top25_list.html)':293 '1':112 '14':121 '14.04':146,183 '16':249 '2':125 '2023':277 '3':140 '4':150 '9':123 'add':225 'also':242,255,262,279 'anoth':45,67 'anyth':80 'appli':256 'applic':158 'attack':43,93 'attempt':236 'begin':168 'beginn':38 'build':52 'bunch':13 'catalog':281 'chang':135 'check':243 'clear':5 'colleg':15 'configur':139 'could':224,241 'critic':210 'ctf':47,57 'ctfs':20 'cwe.mitre.org':288,292 'cwe.mitre.org/top25/':287 'cwe.mitre.org/top25/archive/2023/2023_top25_list.html)':291 'danger':270 'deb':122 'default':138 'differ':19,154 'distro':119,143 'download':113 'ect':124 'especi':36 'everyon':85 'exampl':180 'exploit':149,177,191,198,233,238 'favorit':35 'find':157,251 'found':32,213 'good':46 'googl':141,194 'great':40 'hackthebox':39 'help':28,296 'hope':294 'huge':161 'instal':126,169 'issu':163 'kernel':190 'know':79,185 'known':176 'learning/practicing':42 'like':58,248 'linux':189 'list':265,283 'look':207 'machin':59,65,83,89 'made':98 'mani':53 'mean':11 'mention':230 'mitr':263 'newer':244 'note':97 'ok':1 'old':115 'older':258 'one':275 'overthewir':44 'packag':229 'person':34,62,68,72 'prepar':17 'previous':285 'process':111 'program':173 'quick':193 'read':151 'resourc':29 'return':196 'said':8 'search':195 'secur':75,87,162 'set':100 'setup':128 'site':48,155 'softwar':271 'step':106,108 'student':16 'switch':63 'team':9 'tri':50,73,91 'tryhackm':33 'ubuntu':120,145,182,203,247 'ubuntu.com':216,219 'ubuntu.com/security/cves?q=&package=&prio':215 'ubuntu.com/security/cves?q=&package=&priority=critical&version=trusty&status=)':218 'updat':133 'use':95,202 'version':116,144,166,245,259 'vm':130 'vulner':77,147,211,252,272 'websit':205 'without':78,131 'would':254 'www.exploit-db.com':200 'www.exploit-db.com/exploits/43418](https://www.exploit-db.com/exploits/43418)':199 'year':286"
        +ranking: 0
        +commentCount: 0
        +upVotes: 0
        +downVotes: 0
        +visibility: "visible             "
        +apId: "https://sh.itjust.works/comment/5321609"
        +editedAt: null
        +createdAt: DateTimeImmutable @1699558018 {#1525
          date: 2023-11-09 20:26:58.0 +01:00
        }
        +"title": 105158
      }
    ]
    -id: 11235
    -titleTs: "'instal':7 'mani':2 'need':4 'old':5 'peopl':3 'ubuntu':6"
    -bodyTs: "'3':23 'alway':31 'ancient':35 'download':16,33 'especi':37 'foss':6 'idea':27 'keep':15 'mani':5 'old':25 'peopl':14 'reason':13 'seed':4 'someon':32 'stuff':36 'thing':7 'ubuntu':17,38 've':2 'version':18 'year':9,24"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1699561656
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/7687281"
    +editedAt: null
    +createdAt: DateTimeImmutable @1699475256 {#1595
      date: 2023-11-08 21:27:36.0 +01:00
    }
    +__isInitialized__: true
     …2
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
  +image: null
  +parent: null
  +root: null
  +body: """
    I can give you an answer from someone who regularly downloads really old EOL versions of Ubuntu and Debian. I personally use them as part of attack and defense competitions. They are normally very close to unusable and are nearly impossible to update to a more recent or secure version. This forces my team to find creative ways to keep them working while also taking measures to isolate them as much as possible. I also use them to teach old exploits that have been patched in more recent versions, walking people through how it worked and why it existed.\n
    \n
    It happens a lot more with Windows machines, but there might be some manufacturing systems out there that require software that won’t run on modern versions of the OS. These systems often require new manufacturing tools in order to upgrade, or they need massive overhauls that smaller companies can’t always afford.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 29
  +score: 0
  +lastActive: DateTime @1699630624 {#1434
    date: 2023-11-10 16:37:04.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@ejmin@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#1575 …}
  +nested: Doctrine\ORM\PersistentCollection {#1572 …}
  +votes: Doctrine\ORM\PersistentCollection {#1581 …}
  +reports: Doctrine\ORM\PersistentCollection {#1579 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1576 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1652 …}
  -id: 102713
  -bodyTs: "'afford':152 'also':64,75 'alway':151 'answer':6 'attack':27 'close':35 'compani':148 'competit':30 'creativ':57 'debian':19 'defens':29 'download':11 'eol':14 'exist':99 'exploit':81 'find':56 'forc':52 'give':3 'happen':101 'imposs':41 'isol':68 'keep':60 'lot':103 'machin':107 'manufactur':113,135 'massiv':144 'measur':66 'might':110 'modern':125 'much':71 'near':40 'need':143 'new':134 'normal':33 'often':132 'old':13,80 'order':138 'os':129 'overhaul':145 'part':25 'patch':85 'peopl':91 'person':21 'possibl':73 'realli':12 'recent':47,88 'regular':10 'requir':118,133 'run':123 'secur':49 'smaller':147 'softwar':119 'someon':8 'system':114,131 'take':65 'teach':79 'team':54 'tool':136 'ubuntu':17 'unus':37 'updat':43 'upgrad':140 'use':22,76 'version':15,50,89,126 'walk':90 'way':58 'window':106 'won':121 'work':62,95"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://sh.itjust.works/comment/5296509"
  +editedAt: null
  +createdAt: DateTimeImmutable @1699480096 {#1699
    date: 2023-11-08 22:48:16.0 +01:00
  }
  +"title": 102713
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
9 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
10 DENIED moderate
App\Entity\EntryComment {#1567
  +user: App\Entity\User {#260 …}
  +entry: Proxies\__CG__\App\Entity\Entry {#1583
    +user: Proxies\__CG__\App\Entity\User {#2448 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
    +image: Proxies\__CG__\App\Entity\Image {#1723 …}
    +domain: Proxies\__CG__\App\Entity\Domain {#2382 …}
    +slug: "That-many-people-need-old-Ubuntu-installations"
    +title: "That many people need old Ubuntu installations?"
    +url: "https://lemmy.ml/pictrs/image/f5a65952-a239-406e-8937-e428631be65d.png"
    +body: """
      I’ve been seeding many Foss things for years but for some reason, people keep downloading Ubuntu versions that are more than 3 years old.\n
      \n
      Any ideas why there is always someone downloading the ancient stuff, especially Ubuntu?
      """
    +type: "image"
    +lang: "en"
    +isOc: false
    +hasEmbed: true
    +commentCount: 36
    +favouriteCount: 221
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1699764031 {#1717
      date: 2023-11-12 05:40:31.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#2385 …}
    +votes: Doctrine\ORM\PersistentCollection {#1566 …}
    +reports: Doctrine\ORM\PersistentCollection {#1548 …}
    +favourites: Doctrine\ORM\PersistentCollection {#2391 …}
    +notifications: Doctrine\ORM\PersistentCollection {#1907 …}
    +badges: Doctrine\ORM\PersistentCollection {#1385 …}
    +children: [
      1 => App\Entity\EntryComment {#1610
        +user: App\Entity\User {#260 …}
        +entry: Proxies\__CG__\App\Entity\Entry {#1583 …2}
        +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
        +image: null
        +parent: null
        +root: null
        +body: """
          I can give you an answer from someone who regularly downloads really old EOL versions of Ubuntu and Debian. I personally use them as part of attack and defense competitions. They are normally very close to unusable and are nearly impossible to update to a more recent or secure version. This forces my team to find creative ways to keep them working while also taking measures to isolate them as much as possible. I also use them to teach old exploits that have been patched in more recent versions, walking people through how it worked and why it existed.\n
          \n
          It happens a lot more with Windows machines, but there might be some manufacturing systems out there that require software that won’t run on modern versions of the OS. These systems often require new manufacturing tools in order to upgrade, or they need massive overhauls that smaller companies can’t always afford.
          """
        +lang: "en"
        +isAdult: false
        +favouriteCount: 29
        +score: 0
        +lastActive: DateTime @1699630624 {#1434
          date: 2023-11-10 16:37:04.0 +01:00
        }
        +ip: null
        +tags: null
        +mentions: [
          "@ejmin@lemmy.ml"
        ]
        +children: Doctrine\ORM\PersistentCollection {#1575 …}
        +nested: Doctrine\ORM\PersistentCollection {#1572 …}
        +votes: Doctrine\ORM\PersistentCollection {#1581 …}
        +reports: Doctrine\ORM\PersistentCollection {#1579 …}
        +favourites: Doctrine\ORM\PersistentCollection {#1576 …}
        +notifications: Doctrine\ORM\PersistentCollection {#1652 …}
        -id: 102713
        -bodyTs: "'afford':152 'also':64,75 'alway':151 'answer':6 'attack':27 'close':35 'compani':148 'competit':30 'creativ':57 'debian':19 'defens':29 'download':11 'eol':14 'exist':99 'exploit':81 'find':56 'forc':52 'give':3 'happen':101 'imposs':41 'isol':68 'keep':60 'lot':103 'machin':107 'manufactur':113,135 'massiv':144 'measur':66 'might':110 'modern':125 'much':71 'near':40 'need':143 'new':134 'normal':33 'often':132 'old':13,80 'order':138 'os':129 'overhaul':145 'part':25 'patch':85 'peopl':91 'person':21 'possibl':73 'realli':12 'recent':47,88 'regular':10 'requir':118,133 'run':123 'secur':49 'smaller':147 'softwar':119 'someon':8 'system':114,131 'take':65 'teach':79 'team':54 'tool':136 'ubuntu':17 'unus':37 'updat':43 'upgrad':140 'use':22,76 'version':15,50,89,126 'walk':90 'way':58 'window':106 'won':121 'work':62,95"
        +ranking: 0
        +commentCount: 0
        +upVotes: 0
        +downVotes: 0
        +visibility: "visible             "
        +apId: "https://sh.itjust.works/comment/5296509"
        +editedAt: null
        +createdAt: DateTimeImmutable @1699480096 {#1699
          date: 2023-11-08 22:48:16.0 +01:00
        }
        +"title": 102713
      }
      0 => App\Entity\EntryComment {#1567}
    ]
    -id: 11235
    -titleTs: "'instal':7 'mani':2 'need':4 'old':5 'peopl':3 'ubuntu':6"
    -bodyTs: "'3':23 'alway':31 'ancient':35 'download':16,33 'especi':37 'foss':6 'idea':27 'keep':15 'mani':5 'old':25 'peopl':14 'reason':13 'seed':4 'someon':32 'stuff':36 'thing':7 'ubuntu':17,38 've':2 'version':18 'year':9,24"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1699561656
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/7687281"
    +editedAt: null
    +createdAt: DateTimeImmutable @1699475256 {#1595
      date: 2023-11-08 21:27:36.0 +01:00
    }
    +__isInitialized__: true
     …2
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
  +image: null
  +parent: Proxies\__CG__\App\Entity\EntryComment {#1611 …}
  +root: App\Entity\EntryComment {#1610}
  +body: """
    Ok so to be clear when I said team I mean a bunch of college students preparing for different ctfs, but these are some of the more helpful resources we have found:\n
    \n
    Tryhackme: personal favorite especially for beginners Hackthebox: great for learning/practicing attacks Overthewire: another good ctf site\n
    \n
    We try to build many of our own ctf like machines, then each person switches their machine with another person and the other person tries to secure the vulnerabilities without knowing anything about the machine. Once everyone has secured their machines we try to attack them using the notes made while setting them up. This is our step by step for that process.\n
    \n
    1. download an old version of a distro. (Ubuntu 14, deb 9, ect)\n
    2. install and setup the VM without any updates or changes to the default configuration\n
    3. google the distro version (Ubuntu 14.04) + vulnerabilities or exploits\n
    4. read through the different sites to find applications that had huge security issues on that version and begin installing some of the programs that have known exploits\n
    \n
    So for example with Ubuntu 14.04 we know there are some Linux kernel exploits.\n
    \n
    A quick Google search returned this exploit: [www.exploit-db.com/exploits/43418](https://www.exploit-db.com/exploits/43418)\n
    \n
    Using Ubuntu’s website I looked up other critical vulnerabilities and found these: [ubuntu.com/security/cves?q=&package=&prio…](https://ubuntu.com/security/cves?q=&package=&priority=critical&version=trusty&status=)\n
    \n
    From here I could add some of the packages mentioned as having exploits and then attempt to exploit them. I could also check newer versions of Ubuntu like 16 to find vulnerabilities that would also apply to older versions.\n
    \n
    There is also Mitre’s list(s) of the most dangerous software vulnerabilities. They have one for 2023, but also a catalog of lists from previous years.\n
    \n
    [cwe.mitre.org/top25/…/2023_top25_list.html](https://cwe.mitre.org/top25/archive/2023/2023_top25_list.html)\n
    \n
    Hopefully this helps!
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 2
  +score: 0
  +lastActive: DateTime @1699558018 {#1667
    date: 2023-11-09 20:26:58.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@ejmin@lemmy.ml"
    "@computerboss@sh.itjust.works"
    "@fiat_lux@kbin.social"
  ]
  +children: Doctrine\ORM\PersistentCollection {#1616 …}
  +nested: Doctrine\ORM\PersistentCollection {#1795 …}
  +votes: Doctrine\ORM\PersistentCollection {#1691 …}
  +reports: Doctrine\ORM\PersistentCollection {#1689 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1687 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1701 …}
  -id: 105158
  -bodyTs: "'/2023_top25_list.html':290 '/exploits/43418](https://www.exploit-db.com/exploits/43418)':201 '/security/cves?q=&package=&prio':217 '/security/cves?q=&package=&priority=critical&version=trusty&status=)':220 '/top25/':289 '/top25/archive/2023/2023_top25_list.html)':293 '1':112 '14':121 '14.04':146,183 '16':249 '2':125 '2023':277 '3':140 '4':150 '9':123 'add':225 'also':242,255,262,279 'anoth':45,67 'anyth':80 'appli':256 'applic':158 'attack':43,93 'attempt':236 'begin':168 'beginn':38 'build':52 'bunch':13 'catalog':281 'chang':135 'check':243 'clear':5 'colleg':15 'configur':139 'could':224,241 'critic':210 'ctf':47,57 'ctfs':20 'cwe.mitre.org':288,292 'cwe.mitre.org/top25/':287 'cwe.mitre.org/top25/archive/2023/2023_top25_list.html)':291 'danger':270 'deb':122 'default':138 'differ':19,154 'distro':119,143 'download':113 'ect':124 'especi':36 'everyon':85 'exampl':180 'exploit':149,177,191,198,233,238 'favorit':35 'find':157,251 'found':32,213 'good':46 'googl':141,194 'great':40 'hackthebox':39 'help':28,296 'hope':294 'huge':161 'instal':126,169 'issu':163 'kernel':190 'know':79,185 'known':176 'learning/practicing':42 'like':58,248 'linux':189 'list':265,283 'look':207 'machin':59,65,83,89 'made':98 'mani':53 'mean':11 'mention':230 'mitr':263 'newer':244 'note':97 'ok':1 'old':115 'older':258 'one':275 'overthewir':44 'packag':229 'person':34,62,68,72 'prepar':17 'previous':285 'process':111 'program':173 'quick':193 'read':151 'resourc':29 'return':196 'said':8 'search':195 'secur':75,87,162 'set':100 'setup':128 'site':48,155 'softwar':271 'step':106,108 'student':16 'switch':63 'team':9 'tri':50,73,91 'tryhackm':33 'ubuntu':120,145,182,203,247 'ubuntu.com':216,219 'ubuntu.com/security/cves?q=&package=&prio':215 'ubuntu.com/security/cves?q=&package=&priority=critical&version=trusty&status=)':218 'updat':133 'use':95,202 'version':116,144,166,245,259 'vm':130 'vulner':77,147,211,252,272 'websit':205 'without':78,131 'would':254 'www.exploit-db.com':200 'www.exploit-db.com/exploits/43418](https://www.exploit-db.com/exploits/43418)':199 'year':286"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://sh.itjust.works/comment/5321609"
  +editedAt: null
  +createdAt: DateTimeImmutable @1699558018 {#1525
    date: 2023-11-09 20:26:58.0 +01:00
  }
  +"title": 105158
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
11 DENIED edit
App\Entity\EntryComment {#1567
  +user: App\Entity\User {#260 …}
  +entry: Proxies\__CG__\App\Entity\Entry {#1583
    +user: Proxies\__CG__\App\Entity\User {#2448 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
    +image: Proxies\__CG__\App\Entity\Image {#1723 …}
    +domain: Proxies\__CG__\App\Entity\Domain {#2382 …}
    +slug: "That-many-people-need-old-Ubuntu-installations"
    +title: "That many people need old Ubuntu installations?"
    +url: "https://lemmy.ml/pictrs/image/f5a65952-a239-406e-8937-e428631be65d.png"
    +body: """
      I’ve been seeding many Foss things for years but for some reason, people keep downloading Ubuntu versions that are more than 3 years old.\n
      \n
      Any ideas why there is always someone downloading the ancient stuff, especially Ubuntu?
      """
    +type: "image"
    +lang: "en"
    +isOc: false
    +hasEmbed: true
    +commentCount: 36
    +favouriteCount: 221
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1699764031 {#1717
      date: 2023-11-12 05:40:31.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#2385 …}
    +votes: Doctrine\ORM\PersistentCollection {#1566 …}
    +reports: Doctrine\ORM\PersistentCollection {#1548 …}
    +favourites: Doctrine\ORM\PersistentCollection {#2391 …}
    +notifications: Doctrine\ORM\PersistentCollection {#1907 …}
    +badges: Doctrine\ORM\PersistentCollection {#1385 …}
    +children: [
      1 => App\Entity\EntryComment {#1610
        +user: App\Entity\User {#260 …}
        +entry: Proxies\__CG__\App\Entity\Entry {#1583 …2}
        +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
        +image: null
        +parent: null
        +root: null
        +body: """
          I can give you an answer from someone who regularly downloads really old EOL versions of Ubuntu and Debian. I personally use them as part of attack and defense competitions. They are normally very close to unusable and are nearly impossible to update to a more recent or secure version. This forces my team to find creative ways to keep them working while also taking measures to isolate them as much as possible. I also use them to teach old exploits that have been patched in more recent versions, walking people through how it worked and why it existed.\n
          \n
          It happens a lot more with Windows machines, but there might be some manufacturing systems out there that require software that won’t run on modern versions of the OS. These systems often require new manufacturing tools in order to upgrade, or they need massive overhauls that smaller companies can’t always afford.
          """
        +lang: "en"
        +isAdult: false
        +favouriteCount: 29
        +score: 0
        +lastActive: DateTime @1699630624 {#1434
          date: 2023-11-10 16:37:04.0 +01:00
        }
        +ip: null
        +tags: null
        +mentions: [
          "@ejmin@lemmy.ml"
        ]
        +children: Doctrine\ORM\PersistentCollection {#1575 …}
        +nested: Doctrine\ORM\PersistentCollection {#1572 …}
        +votes: Doctrine\ORM\PersistentCollection {#1581 …}
        +reports: Doctrine\ORM\PersistentCollection {#1579 …}
        +favourites: Doctrine\ORM\PersistentCollection {#1576 …}
        +notifications: Doctrine\ORM\PersistentCollection {#1652 …}
        -id: 102713
        -bodyTs: "'afford':152 'also':64,75 'alway':151 'answer':6 'attack':27 'close':35 'compani':148 'competit':30 'creativ':57 'debian':19 'defens':29 'download':11 'eol':14 'exist':99 'exploit':81 'find':56 'forc':52 'give':3 'happen':101 'imposs':41 'isol':68 'keep':60 'lot':103 'machin':107 'manufactur':113,135 'massiv':144 'measur':66 'might':110 'modern':125 'much':71 'near':40 'need':143 'new':134 'normal':33 'often':132 'old':13,80 'order':138 'os':129 'overhaul':145 'part':25 'patch':85 'peopl':91 'person':21 'possibl':73 'realli':12 'recent':47,88 'regular':10 'requir':118,133 'run':123 'secur':49 'smaller':147 'softwar':119 'someon':8 'system':114,131 'take':65 'teach':79 'team':54 'tool':136 'ubuntu':17 'unus':37 'updat':43 'upgrad':140 'use':22,76 'version':15,50,89,126 'walk':90 'way':58 'window':106 'won':121 'work':62,95"
        +ranking: 0
        +commentCount: 0
        +upVotes: 0
        +downVotes: 0
        +visibility: "visible             "
        +apId: "https://sh.itjust.works/comment/5296509"
        +editedAt: null
        +createdAt: DateTimeImmutable @1699480096 {#1699
          date: 2023-11-08 22:48:16.0 +01:00
        }
        +"title": 102713
      }
      0 => App\Entity\EntryComment {#1567}
    ]
    -id: 11235
    -titleTs: "'instal':7 'mani':2 'need':4 'old':5 'peopl':3 'ubuntu':6"
    -bodyTs: "'3':23 'alway':31 'ancient':35 'download':16,33 'especi':37 'foss':6 'idea':27 'keep':15 'mani':5 'old':25 'peopl':14 'reason':13 'seed':4 'someon':32 'stuff':36 'thing':7 'ubuntu':17,38 've':2 'version':18 'year':9,24"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1699561656
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/7687281"
    +editedAt: null
    +createdAt: DateTimeImmutable @1699475256 {#1595
      date: 2023-11-08 21:27:36.0 +01:00
    }
    +__isInitialized__: true
     …2
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
  +image: null
  +parent: Proxies\__CG__\App\Entity\EntryComment {#1611 …}
  +root: App\Entity\EntryComment {#1610}
  +body: """
    Ok so to be clear when I said team I mean a bunch of college students preparing for different ctfs, but these are some of the more helpful resources we have found:\n
    \n
    Tryhackme: personal favorite especially for beginners Hackthebox: great for learning/practicing attacks Overthewire: another good ctf site\n
    \n
    We try to build many of our own ctf like machines, then each person switches their machine with another person and the other person tries to secure the vulnerabilities without knowing anything about the machine. Once everyone has secured their machines we try to attack them using the notes made while setting them up. This is our step by step for that process.\n
    \n
    1. download an old version of a distro. (Ubuntu 14, deb 9, ect)\n
    2. install and setup the VM without any updates or changes to the default configuration\n
    3. google the distro version (Ubuntu 14.04) + vulnerabilities or exploits\n
    4. read through the different sites to find applications that had huge security issues on that version and begin installing some of the programs that have known exploits\n
    \n
    So for example with Ubuntu 14.04 we know there are some Linux kernel exploits.\n
    \n
    A quick Google search returned this exploit: [www.exploit-db.com/exploits/43418](https://www.exploit-db.com/exploits/43418)\n
    \n
    Using Ubuntu’s website I looked up other critical vulnerabilities and found these: [ubuntu.com/security/cves?q=&package=&prio…](https://ubuntu.com/security/cves?q=&package=&priority=critical&version=trusty&status=)\n
    \n
    From here I could add some of the packages mentioned as having exploits and then attempt to exploit them. I could also check newer versions of Ubuntu like 16 to find vulnerabilities that would also apply to older versions.\n
    \n
    There is also Mitre’s list(s) of the most dangerous software vulnerabilities. They have one for 2023, but also a catalog of lists from previous years.\n
    \n
    [cwe.mitre.org/top25/…/2023_top25_list.html](https://cwe.mitre.org/top25/archive/2023/2023_top25_list.html)\n
    \n
    Hopefully this helps!
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 2
  +score: 0
  +lastActive: DateTime @1699558018 {#1667
    date: 2023-11-09 20:26:58.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@ejmin@lemmy.ml"
    "@computerboss@sh.itjust.works"
    "@fiat_lux@kbin.social"
  ]
  +children: Doctrine\ORM\PersistentCollection {#1616 …}
  +nested: Doctrine\ORM\PersistentCollection {#1795 …}
  +votes: Doctrine\ORM\PersistentCollection {#1691 …}
  +reports: Doctrine\ORM\PersistentCollection {#1689 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1687 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1701 …}
  -id: 105158
  -bodyTs: "'/2023_top25_list.html':290 '/exploits/43418](https://www.exploit-db.com/exploits/43418)':201 '/security/cves?q=&package=&prio':217 '/security/cves?q=&package=&priority=critical&version=trusty&status=)':220 '/top25/':289 '/top25/archive/2023/2023_top25_list.html)':293 '1':112 '14':121 '14.04':146,183 '16':249 '2':125 '2023':277 '3':140 '4':150 '9':123 'add':225 'also':242,255,262,279 'anoth':45,67 'anyth':80 'appli':256 'applic':158 'attack':43,93 'attempt':236 'begin':168 'beginn':38 'build':52 'bunch':13 'catalog':281 'chang':135 'check':243 'clear':5 'colleg':15 'configur':139 'could':224,241 'critic':210 'ctf':47,57 'ctfs':20 'cwe.mitre.org':288,292 'cwe.mitre.org/top25/':287 'cwe.mitre.org/top25/archive/2023/2023_top25_list.html)':291 'danger':270 'deb':122 'default':138 'differ':19,154 'distro':119,143 'download':113 'ect':124 'especi':36 'everyon':85 'exampl':180 'exploit':149,177,191,198,233,238 'favorit':35 'find':157,251 'found':32,213 'good':46 'googl':141,194 'great':40 'hackthebox':39 'help':28,296 'hope':294 'huge':161 'instal':126,169 'issu':163 'kernel':190 'know':79,185 'known':176 'learning/practicing':42 'like':58,248 'linux':189 'list':265,283 'look':207 'machin':59,65,83,89 'made':98 'mani':53 'mean':11 'mention':230 'mitr':263 'newer':244 'note':97 'ok':1 'old':115 'older':258 'one':275 'overthewir':44 'packag':229 'person':34,62,68,72 'prepar':17 'previous':285 'process':111 'program':173 'quick':193 'read':151 'resourc':29 'return':196 'said':8 'search':195 'secur':75,87,162 'set':100 'setup':128 'site':48,155 'softwar':271 'step':106,108 'student':16 'switch':63 'team':9 'tri':50,73,91 'tryhackm':33 'ubuntu':120,145,182,203,247 'ubuntu.com':216,219 'ubuntu.com/security/cves?q=&package=&prio':215 'ubuntu.com/security/cves?q=&package=&priority=critical&version=trusty&status=)':218 'updat':133 'use':95,202 'version':116,144,166,245,259 'vm':130 'vulner':77,147,211,252,272 'websit':205 'without':78,131 'would':254 'www.exploit-db.com':200 'www.exploit-db.com/exploits/43418](https://www.exploit-db.com/exploits/43418)':199 'year':286"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://sh.itjust.works/comment/5321609"
  +editedAt: null
  +createdAt: DateTimeImmutable @1699558018 {#1525
    date: 2023-11-09 20:26:58.0 +01:00
  }
  +"title": 105158
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
12 DENIED moderate
App\Entity\EntryComment {#1567
  +user: App\Entity\User {#260 …}
  +entry: Proxies\__CG__\App\Entity\Entry {#1583
    +user: Proxies\__CG__\App\Entity\User {#2448 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
    +image: Proxies\__CG__\App\Entity\Image {#1723 …}
    +domain: Proxies\__CG__\App\Entity\Domain {#2382 …}
    +slug: "That-many-people-need-old-Ubuntu-installations"
    +title: "That many people need old Ubuntu installations?"
    +url: "https://lemmy.ml/pictrs/image/f5a65952-a239-406e-8937-e428631be65d.png"
    +body: """
      I’ve been seeding many Foss things for years but for some reason, people keep downloading Ubuntu versions that are more than 3 years old.\n
      \n
      Any ideas why there is always someone downloading the ancient stuff, especially Ubuntu?
      """
    +type: "image"
    +lang: "en"
    +isOc: false
    +hasEmbed: true
    +commentCount: 36
    +favouriteCount: 221
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1699764031 {#1717
      date: 2023-11-12 05:40:31.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#2385 …}
    +votes: Doctrine\ORM\PersistentCollection {#1566 …}
    +reports: Doctrine\ORM\PersistentCollection {#1548 …}
    +favourites: Doctrine\ORM\PersistentCollection {#2391 …}
    +notifications: Doctrine\ORM\PersistentCollection {#1907 …}
    +badges: Doctrine\ORM\PersistentCollection {#1385 …}
    +children: [
      1 => App\Entity\EntryComment {#1610
        +user: App\Entity\User {#260 …}
        +entry: Proxies\__CG__\App\Entity\Entry {#1583 …2}
        +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
        +image: null
        +parent: null
        +root: null
        +body: """
          I can give you an answer from someone who regularly downloads really old EOL versions of Ubuntu and Debian. I personally use them as part of attack and defense competitions. They are normally very close to unusable and are nearly impossible to update to a more recent or secure version. This forces my team to find creative ways to keep them working while also taking measures to isolate them as much as possible. I also use them to teach old exploits that have been patched in more recent versions, walking people through how it worked and why it existed.\n
          \n
          It happens a lot more with Windows machines, but there might be some manufacturing systems out there that require software that won’t run on modern versions of the OS. These systems often require new manufacturing tools in order to upgrade, or they need massive overhauls that smaller companies can’t always afford.
          """
        +lang: "en"
        +isAdult: false
        +favouriteCount: 29
        +score: 0
        +lastActive: DateTime @1699630624 {#1434
          date: 2023-11-10 16:37:04.0 +01:00
        }
        +ip: null
        +tags: null
        +mentions: [
          "@ejmin@lemmy.ml"
        ]
        +children: Doctrine\ORM\PersistentCollection {#1575 …}
        +nested: Doctrine\ORM\PersistentCollection {#1572 …}
        +votes: Doctrine\ORM\PersistentCollection {#1581 …}
        +reports: Doctrine\ORM\PersistentCollection {#1579 …}
        +favourites: Doctrine\ORM\PersistentCollection {#1576 …}
        +notifications: Doctrine\ORM\PersistentCollection {#1652 …}
        -id: 102713
        -bodyTs: "'afford':152 'also':64,75 'alway':151 'answer':6 'attack':27 'close':35 'compani':148 'competit':30 'creativ':57 'debian':19 'defens':29 'download':11 'eol':14 'exist':99 'exploit':81 'find':56 'forc':52 'give':3 'happen':101 'imposs':41 'isol':68 'keep':60 'lot':103 'machin':107 'manufactur':113,135 'massiv':144 'measur':66 'might':110 'modern':125 'much':71 'near':40 'need':143 'new':134 'normal':33 'often':132 'old':13,80 'order':138 'os':129 'overhaul':145 'part':25 'patch':85 'peopl':91 'person':21 'possibl':73 'realli':12 'recent':47,88 'regular':10 'requir':118,133 'run':123 'secur':49 'smaller':147 'softwar':119 'someon':8 'system':114,131 'take':65 'teach':79 'team':54 'tool':136 'ubuntu':17 'unus':37 'updat':43 'upgrad':140 'use':22,76 'version':15,50,89,126 'walk':90 'way':58 'window':106 'won':121 'work':62,95"
        +ranking: 0
        +commentCount: 0
        +upVotes: 0
        +downVotes: 0
        +visibility: "visible             "
        +apId: "https://sh.itjust.works/comment/5296509"
        +editedAt: null
        +createdAt: DateTimeImmutable @1699480096 {#1699
          date: 2023-11-08 22:48:16.0 +01:00
        }
        +"title": 102713
      }
      0 => App\Entity\EntryComment {#1567}
    ]
    -id: 11235
    -titleTs: "'instal':7 'mani':2 'need':4 'old':5 'peopl':3 'ubuntu':6"
    -bodyTs: "'3':23 'alway':31 'ancient':35 'download':16,33 'especi':37 'foss':6 'idea':27 'keep':15 'mani':5 'old':25 'peopl':14 'reason':13 'seed':4 'someon':32 'stuff':36 'thing':7 'ubuntu':17,38 've':2 'version':18 'year':9,24"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1699561656
    +visibility: "visible             "
    +apId: "https://lemmy.ml/post/7687281"
    +editedAt: null
    +createdAt: DateTimeImmutable @1699475256 {#1595
      date: 2023-11-08 21:27:36.0 +01:00
    }
    +__isInitialized__: true
     …2
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1587 …}
  +image: null
  +parent: Proxies\__CG__\App\Entity\EntryComment {#1611 …}
  +root: App\Entity\EntryComment {#1610}
  +body: """
    Ok so to be clear when I said team I mean a bunch of college students preparing for different ctfs, but these are some of the more helpful resources we have found:\n
    \n
    Tryhackme: personal favorite especially for beginners Hackthebox: great for learning/practicing attacks Overthewire: another good ctf site\n
    \n
    We try to build many of our own ctf like machines, then each person switches their machine with another person and the other person tries to secure the vulnerabilities without knowing anything about the machine. Once everyone has secured their machines we try to attack them using the notes made while setting them up. This is our step by step for that process.\n
    \n
    1. download an old version of a distro. (Ubuntu 14, deb 9, ect)\n
    2. install and setup the VM without any updates or changes to the default configuration\n
    3. google the distro version (Ubuntu 14.04) + vulnerabilities or exploits\n
    4. read through the different sites to find applications that had huge security issues on that version and begin installing some of the programs that have known exploits\n
    \n
    So for example with Ubuntu 14.04 we know there are some Linux kernel exploits.\n
    \n
    A quick Google search returned this exploit: [www.exploit-db.com/exploits/43418](https://www.exploit-db.com/exploits/43418)\n
    \n
    Using Ubuntu’s website I looked up other critical vulnerabilities and found these: [ubuntu.com/security/cves?q=&package=&prio…](https://ubuntu.com/security/cves?q=&package=&priority=critical&version=trusty&status=)\n
    \n
    From here I could add some of the packages mentioned as having exploits and then attempt to exploit them. I could also check newer versions of Ubuntu like 16 to find vulnerabilities that would also apply to older versions.\n
    \n
    There is also Mitre’s list(s) of the most dangerous software vulnerabilities. They have one for 2023, but also a catalog of lists from previous years.\n
    \n
    [cwe.mitre.org/top25/…/2023_top25_list.html](https://cwe.mitre.org/top25/archive/2023/2023_top25_list.html)\n
    \n
    Hopefully this helps!
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 2
  +score: 0
  +lastActive: DateTime @1699558018 {#1667
    date: 2023-11-09 20:26:58.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@ejmin@lemmy.ml"
    "@computerboss@sh.itjust.works"
    "@fiat_lux@kbin.social"
  ]
  +children: Doctrine\ORM\PersistentCollection {#1616 …}
  +nested: Doctrine\ORM\PersistentCollection {#1795 …}
  +votes: Doctrine\ORM\PersistentCollection {#1691 …}
  +reports: Doctrine\ORM\PersistentCollection {#1689 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1687 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1701 …}
  -id: 105158
  -bodyTs: "'/2023_top25_list.html':290 '/exploits/43418](https://www.exploit-db.com/exploits/43418)':201 '/security/cves?q=&package=&prio':217 '/security/cves?q=&package=&priority=critical&version=trusty&status=)':220 '/top25/':289 '/top25/archive/2023/2023_top25_list.html)':293 '1':112 '14':121 '14.04':146,183 '16':249 '2':125 '2023':277 '3':140 '4':150 '9':123 'add':225 'also':242,255,262,279 'anoth':45,67 'anyth':80 'appli':256 'applic':158 'attack':43,93 'attempt':236 'begin':168 'beginn':38 'build':52 'bunch':13 'catalog':281 'chang':135 'check':243 'clear':5 'colleg':15 'configur':139 'could':224,241 'critic':210 'ctf':47,57 'ctfs':20 'cwe.mitre.org':288,292 'cwe.mitre.org/top25/':287 'cwe.mitre.org/top25/archive/2023/2023_top25_list.html)':291 'danger':270 'deb':122 'default':138 'differ':19,154 'distro':119,143 'download':113 'ect':124 'especi':36 'everyon':85 'exampl':180 'exploit':149,177,191,198,233,238 'favorit':35 'find':157,251 'found':32,213 'good':46 'googl':141,194 'great':40 'hackthebox':39 'help':28,296 'hope':294 'huge':161 'instal':126,169 'issu':163 'kernel':190 'know':79,185 'known':176 'learning/practicing':42 'like':58,248 'linux':189 'list':265,283 'look':207 'machin':59,65,83,89 'made':98 'mani':53 'mean':11 'mention':230 'mitr':263 'newer':244 'note':97 'ok':1 'old':115 'older':258 'one':275 'overthewir':44 'packag':229 'person':34,62,68,72 'prepar':17 'previous':285 'process':111 'program':173 'quick':193 'read':151 'resourc':29 'return':196 'said':8 'search':195 'secur':75,87,162 'set':100 'setup':128 'site':48,155 'softwar':271 'step':106,108 'student':16 'switch':63 'team':9 'tri':50,73,91 'tryhackm':33 'ubuntu':120,145,182,203,247 'ubuntu.com':216,219 'ubuntu.com/security/cves?q=&package=&prio':215 'ubuntu.com/security/cves?q=&package=&priority=critical&version=trusty&status=)':218 'updat':133 'use':95,202 'version':116,144,166,245,259 'vm':130 'vulner':77,147,211,252,272 'websit':205 'without':78,131 'would':254 'www.exploit-db.com':200 'www.exploit-db.com/exploits/43418](https://www.exploit-db.com/exploits/43418)':199 'year':286"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://sh.itjust.works/comment/5321609"
  +editedAt: null
  +createdAt: DateTimeImmutable @1699558018 {#1525
    date: 2023-11-09 20:26:58.0 +01:00
  }
  +"title": 105158
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
13 DENIED ROLE_ADMIN
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
14 DENIED ROLE_MODERATOR
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details