abitrolly

abitrolly t1_j9subda wrote

Nice! Even with my shitty phones I could enjoy this. ) I was about prepared to listen to the same metal/scream/beats on repeat till the end, but then the panning riffs at 0:46 knocked me out. I didn't expect anything that came next. Impressive. At first I wanted to somewhat split the melodic part in the middle, and it would be very nice to have an end without fade out to loop the track back from the beginning without even noticing. But,, it is already soooo goood. :D \m/ \m/

1

abitrolly t1_j9sketb wrote

The riffs are good. The irony of the lyrics is that the anthem can be sung by both sides of the conflict, and the ones who've smelled dead bodies won't be the ones listening to it. There is nothing heroic in the war for me. In other times I would appreciate the lyrics, maybe even as speed metal. But the only music association with that war that I have right now is doom metal with a footage of dead in the dirt covered with the snow of passing winter.

1

abitrolly t1_j9sf3vs wrote

It is not that I feel much of Massive Attack grove here. The music here feels like a filler for voices, at least in the first part, while my perception of Massive Attack is that voices are just another tool to add expression to the sound. The second part is catchy, but in the end the whole song sounds repetitive. I would switch second part and the first places, and if that makes the first part unbearable, would think about removing or reworking that - adding silence, removing the repeating voice pitches, work with slowing down maybe. That is, if I compare it to MA, but that might not be your goal. Just my 0.02 cents. )

1

abitrolly t1_j5b6xmw wrote

Find the value that will bypass safety checks and destabilize connected hardware. Just sending random noize might not help, so the fuzzer could try to steadily increase some values or execute another logic that is known to be harmful for typical process control mechanisms. I called it fuzzer because I assume it doesn't know what is the real mechanism on the other end. If you have source code and schematic of the plant, you don't need to guess and can directly write targeted destructive code.

2

abitrolly t1_j4hkjjs wrote

Fuzzing is a method of putting unexpected stuff into function parameters. You can write a fuzzer yourself, like `for x in random(): call(x)`.

5

abitrolly t1_j4hk8md wrote

The program that generates bogus parameters for function calls. In that case values for Siemens controllers to set that will cause chaos in controlled hardware.

17

abitrolly t1_j4h796y wrote

I worked at the company that originally discovered it. Siemens SCADA software are run on Windows machines that are not connected to the Internet, and hence never patched. So any kind of malware that uses autorun exploits can get there. Knowing that, it is easy to target the machines. What is not that easy is to develop a fuzzer that once installed, will properly send disruptive commands, instead of just freezing PC.

35