WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

805

I feel like I should do this. IT "security" has been going so balls-deep in the most retarded ways of "securing" things that it has gone full-circle.

Also, Never hire pajeets to try to "secure" your shit. All they basically do is install some spyware that they claim to be DLP (it's not and barely fucking does anything and is user-uninstallable) but it will fuck up your IDE's, your various browser extensions and profiles (required for testing/qa/qe/dev/engineering/etc). All while they say YOU are the problem.

I fucking hate those people so much.

Source: https://phishyurl.com/

Here is a random example (that redirects to poal.co). https://cheap-bitcoin.online/malcode/key-snatcher/session_stealer.ps1?endpoint=hijack&id=ae32e785&parameter=overflow&password=bypass&payload=%28function%28%29%7B+return+%27abc%27.length%3B+%7D%29%28%29%3B&subdomain=inject

From the post:

>This is a tool that takes any link and makes it look malicious. It works on the idea of a redirect. Much like tinyurl for example. Where tinyurl makes an url shorter, this site makes it look malicious.

I feel like I should do this. IT "security" has been going so balls-deep in the most retarded ways of "securing" things that it has gone full-circle. Also, Never hire pajeets to try to "secure" your shit. All they basically do is install some spyware that they claim to be DLP (it's not and barely fucking does anything and is user-uninstallable) but it will fuck up your IDE's, your various browser extensions and profiles (required for testing/qa/qe/dev/engineering/etc). All while they say YOU are the problem. I fucking hate those people so much. Source: https://phishyurl.com/ Here is a random example (that redirects to poal.co). https://cheap-bitcoin.online/malcode/key-snatcher/session_stealer.ps1?endpoint=hijack&id=ae32e785&parameter=overflow&password=bypass&payload=%28function%28%29%7B+return+%27abc%27.length%3B+%7D%29%28%29%3B&subdomain=inject From the post: >>This is a tool that takes any link and makes it look malicious. It works on the idea of a redirect. Much like tinyurl for example. Where tinyurl makes an url shorter, this site makes it look malicious.

(post is archived)

[–] 1 pt
[–] 1 pt

Hearty laugh. This reminds me of the Internets of yore. Oldfag approved.

Look up the "spook code block"

[–] 1 pt

True story: my work last year implemented a new screen and firewall for shit because the staff are too fucking stupid not to click stuff. They "trained" people by sending emails that were meant to be clicked so you could get redirected to the "training page". I never click shit much less really check my email. I saw the phishers, and just ignored them. About 3 months in, I got a verbal warning for NOT clicking those emails so I could "learn what not to click".

Yeah....

[–] 2 pts

You will click on the links to learn not to click on the links. Links will continue until all links are clicked. If you click any links you may be fired.

[–] 1 pt

Yeah, I get "phishing test" emails all of the fucking time. They are useless. I think I posted an article about "phishing training" a week or two ago.

Shocker, it doesn't work but companies make bank selling it to other morons. Anyone stupid enough to fall for a phish is going to ALWAYS fall for it (even if they have been 'trained' at some point).

[–] 1 pt

My IT dept sends out those damn emails all the time. They do nothing for me but waste my time. I wish I could opt out of them or at least reason with them by pointing out that I have successfully reported all of their fake emails and had them acknowledged as such.

[–] 1 pt (edited )

If you inspect the headers you can see that they are "phishing" test emails... You can then filter them to be auto deleted and never bother with them again.

If "Security" every bothers you about it you can explain to them that they are so fucking retarded that it is so obvious what they are doing that a simple email filter can get rid of their garbage.

They are not going to like that though. Also, I am probably about 500x more qualified to be in "security" than any of those fucking morons.

[Edit] Better yet. Set it up so it auto-forwards the email to security and posts a notice to a teams/slack/whatever channel every time one comes in. It's not even hard to do.

The retards in "Security" are going to really hate me after this week, I might be called into "HR". It's going to be fun explaining the amount of human hours and money they are wasting.

[–] 1 pt

Exactly. The staff are largely on Chromebooks now too for that exact reason. Like how much more do they want this shit dumbed down?

[–] 1 pt (edited )

Run the domain through mxtoolbox.com - use their supertool and do spf:domain.tld (assuming domain.tld is the email from domain.)

If anything there comes back red, then you can go "Yes, but you're not even following modern security standards for email."

try spf:ge.com and see what I mean.

Actually, just did my domain and I see my host changed some of the nested lookups. I had an error but I can remove some of the dedicated IPV4 lookups.

[–] 1 pt

Your under the impression is CARE enough to do anything more than check the mail, see nothing pertains to me and fuck it off for the remainder of the day.

[–] 2 pts

I constantly tell my IT people that the email system at my employer has improper records and that's why they can't get deliverability. It's all in how much chaos you can tolerate.