Event JSON
{
"id": "255ad58df625964eef8aa3351eba61fe6be43573a6063d45cb3ff251e00ec074",
"pubkey": "e98881dc17522381a12a51600c0c54bb25e1b9692644d94f0328cfb2184cb0f0",
"created_at": 1717475312,
"kind": 1,
"tags": [
[
"p",
"a44c6213ddf8e5412d6992087bccf9bc9795121220023473030d5b738791e059",
"wss://relay.mostr.pub"
],
[
"p",
"db8b54fce55a9e382a26124416a28951b5aa4a33f946fc082e4049f79ff95aae",
"wss://relay.mostr.pub"
],
[
"proxy",
"https://infosec.exchange/users/tiraniddo/statuses/112556462060321120",
"activitypub"
]
],
"content": "Just because you get access denied accessing a folder, it doesn't mean you can't get access. A quick look at bypassing the security on the WindowsApps folder. https://www.tiraniddo.dev/2024/06/working-your-way-around-acl.html. This was inspired by a specific toot from nostr:npub153xxyy7alrj5zttfjgy8hn8ehjte2ysjyqprgucrp4dh8pu3upvsr7fp2m :)",
"sig": "6fd54a47f49ca90bb4d2f583d6ae42c40b2c635144e7e58ac55aac7765c805232e520b426d6c7a3bc636aa556f3eee81fa0e37e8445b6115ad8b9de520ad5d0b"
}