[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

/cyb/ /sec/

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 251
Thread images: 31

File: IMG_5570.jpg (529KB, 1920x1080px) Image search: [Google]
IMG_5570.jpg
529KB, 1920x1080px
/Cyb/er/sec/urity general is for the discussion of anything and everything related to cyberpunk and cybersecurity.

What is cyberpunk?
>https://pastebin.com/jS37Vu7A (embed)

Nothing to hide? - The importance of a cyberpunk mindset applied to a cybersecurity skillset.
>[YouTube] Glenn Greenwald: Why privacy matters
Resources:
Cyberpunk:
Cyberpunk directory:
>https://pastebin.com/9JaJFqB2
Cyberpunk resources:
>https://pastebin.com/7DWCsAc8

Cybersecurity:
Cybersecurity essentials:
>https://pastebin.com/JWx5xeEM
Cybersecurity resources:
>https://pastebin.com/NaUPUDF0

Harden your OS, reroute your DNS and fire up the VPN!
Shit just got real: - Looking for more resources, help is welcomed.
>https://pastebin.com/JXyM4fTe

The Old Skool: - Looking for more resources, help is welcomed.
>0ld 5k00l h4ck3rz: http://67.225.133.110/~gbpprorg/#40

IRC:
Join: irc://irc.rizon.net:6697
>#/g/punk - Requires SSL
>#/g/sec - Requires SSL
IRC guide:
>https://pastebin.com/bh3Uyq3a

Thread archive:
>https://archive.rebeccablacktech.com/g/search/subject/cyb/
>https://archive.rebeccablacktech.com/g/search/subject/sec/
>https://archive.rebeccablacktech.com/g/search/text/%2Fcyb%2F%20%2Fsec%2F/

Thread backup:
>https://www.cyberpunked.org/

Previous thread:
>>61744177


IM THE OP NOW I GUESS EDITION
>>
highly recommend anyone learn assembly even if you're just doing capture the flags to have fun. it's vitally important and really fun to be able to debug stuff and look inside compiled executables that aren't supposed to be looked inside of
>>
>>61789088
do you think python is a language worth learning?
>>
>>61789088
anyone who programs a compiled language should know assembly
if you can't debug your code what's the point of being a programmer
>>
>>61789175
>if you can't debug your code what's the point of being a programmer
to write fizzbuzz in interviews and get hired due to diversity quotas
>>
>>61789159
if you already know a scripting language? no particular reason to. if you don't know any scripting languages or any languages full stop? go for it. it's not a particularly elegant language and not my favorite, but it has easy syntax and lots of libraries
>>
OP you need to deleted the "embeds" and post the link for that youtube video
>>
>>61789088
>>61789175
I'm trying to learn x86 assembly right now, not for skiddie stuff though. It's ironic how dealing with pointers and memory is easier than in C because of all the ass-pain labor put into assemblers since the seventies.
>>
>>61789276
Sorry dude, I'm not the "regular op" who edits the pasta and shit. I'm just a phone poster who loves this thread and tried to keep it alive as often as possible. It's bloody hard to remove the embeds and shit on phone
>>
>yfw jewgle just fired that guy that wrote the pdf
>>
To post in this thread you need to post one thing you are currently working on.
>>
I recommend the Edx micro-masters in Cybersecurity from RIT (Rochester Institute of Technology).

https://www.edx.org/micromasters/ritx-cybersecurity

I recently finished the Forensic module and now I'm in the Risk Management module.

Each module last 8 weeks. There are 5 modules in the entire course.

I'm really liking it.
>>
>>61789320
i think it may just seen easier because they're working on more trivial things in assembly than in C, or because it's clarified any confusion you may have had about what pointers are or w/e. although it's true that you don't have to memorize the workings of malloc vs calloc when you just have the memory in your bss section. but in total C is probably the better of the two to develop with if you had to pick :)
>>
>>61789377
ironic. all he did was say that you are not free to voice your opinion at google if you are right of center, and in google's response they say "we LOVE when our employees share their opinions!" not surprised though. our time will come soon enough
>>
>>61789377
I hope google starts to lose talent long term because of this. Definitely making me think twice about trying to go for project zero.
>>
>>61789384
>CCNA Cyber ops
>setting up a professional data centre type lab with domain controllers, firewalls and dmz
>pen testing book
Slowly slowly learning more and more than my peers. I'll be entering the stratosphere soon while they continue to be shitful scrubs
>>
>>61789552
take joy in your own success, not the failures of others
>>
>>61789969
I do take some joy in it because these people dismissed me and looked at me like I was retarded for CHOOSING to study, for VOLUNTEERING to be sent on PAID courses; they are happy and content to do the same hardware repair forever, but try make me feel like a loser for wanting more.
>>
61788022 (last thread)

Your right man...whenever I have thought about exploit development, for some reason my mind always falls back on binary stuff, not development toward web apps...what you said makes sense, as drive-by exploits are incredibly lethal...I thinking combining even the poorest level of exploit develpment in that are would pay big dividends for me given my other skills...

I have exploited basic web application vulns in the past, but these were always much more predatory/opportunistic then I would like...

I appreciate the new looks on things man...Thank you!
>>
Guys my spelling is atrocious tonight given my working and trying to keep up on the thread as well...

Anon who got this thread up again after last one closed, thank you.
>>
>>61790138
All g

TGG always here to keep this thread up
>>
Whats a good documentation for wireshark?
>>
>>61790098
https://www.youtube.com/watch?v=qzGLCqW_wrM
Pretty generic explanation of a javascript dropper if you were interested in it.
>>
>>61789088
Whats a good assembler to get into? Any good resources for them?

MASM is too narrow, and NASM seems to not have alot of resources, even if I am learning it.
>>
>>61790192
Definitely am. Thanks!
>>
So there's probably no way to say it without actually spelling it out.

How often do you pro guys wrap things using veil evasion?

I cooked up a real basic Trojan into a portable application, used veil evasion and it with no issues slipped past and worked on a 100% updated w10, 7, server 2012, and once I installed wine, os sierra for fucks sake.

That made me real paranoid about how often I've used warez cracks with reverse shells in them, but I was just blown away how easy that was..
>>
>>61790208

FASM is good, but all the x86 ones do the same shit really.
>>
>>61790797
If your payload gets spread around it will start being picked up by AV. Until then it will be relatively undetectable. You might want to set up a bunch of VMs with up to date anti virus and test in there if you know your target will have a certain vendor. Just make sure it can't submit the sample to the cloud. Enjoy your new found paranoia.
>>
>>61790797

Veil is real cool, I use it on occasion. I generally spend an hour or two making a batch of payloads amd keep a text file noting the differences of each file.

Honestly, just run them in a sandbox and monitor network communications. If any, something's up. A keygen has no business calling home.
>>
>>61789391
Do you need some background for it?

t. EE freshmen.
>>
I have a question leading on from the other thread about ISP's.

I always thought that your ISP only see's what comes out of the router and not the individual devices behind the router, if this is the case then how does an ISP have such detailed information about the hardware you are using?
>>
>>61789267

The best reason to use python is the libraries and programs written in it
>>
>>61790797
not really answering your question, but take a look at shellter. AFAIK it's the golden egg for AV evasion.
>>
>>61791032

Shellter free is kinda meh, the paid version is uber1337 tho
>>
>>61790975
>>61790956
Is this the place to be asking how exactly veil works? I don't like even bringing up the name because eventually it'll get banhmered like msfvenom exploits ala nakashakita (yep that's totally how you spell it /s)

But if I get the same Exe, make three copies,and run all three through veil with the same properties three separate times, am I going to get 1 or 3 different payloads?
>>
>>61791092
it's spelled shikata na gai, baka
>>
>>61791134
or shikata ga nai
>>
>>61791092
Veil is on it's third iteration to be honest I am not sure how it works on a deep level anymore. nakakashakbaka was just an xor encoder.
>>
>>61791000
Are you asking if your ISP can only see that traffic is coming from the router?

If so you are correct, the ISP won't know how many people or what devices are being used behind the router, they would need physical access to the router to gain that information. In the case of ISP provided routers, they come backdoored so that the ISP can remotely update the firmware.
>>
>>61791275
>nakakashakbaka
I cannot stop smirking
>>
>>61790208
i'm using NASM
>>
>>61790098
You're not going to get code exec from browsers easily, downloading a file is one thing, forcing a browser to execute it is a lot harder
real browser 0day is worth a fucking lot of money for a good reason
>>
Was there a big fuck off gpu cluster put together to crack NTLM V2 hashes?
>>
>>61791953
I guess I was mistaken then
>>
File: IMG_5568.jpg (360KB, 1600x1200px) Image search: [Google]
IMG_5568.jpg
360KB, 1600x1200px
>>
File: IMG_4722.jpg (87KB, 494x640px) Image search: [Google]
IMG_4722.jpg
87KB, 494x640px
>>
>>61793323
Im still going to get this done on myself. I love it so much. Not a replica, the general idea
>>
>>61790151
man wireshark
>>
>>61793539
I've heard wireshark man is a good guy
>>
File: IMG_4712.jpg (206KB, 1200x675px) Image search: [Google]
IMG_4712.jpg
206KB, 1200x675px
>>
File: IMG_4720.jpg (95KB, 500x750px) Image search: [Google]
IMG_4720.jpg
95KB, 500x750px
>>
>>61789159

For cybsec C is the only answer.
>>
>>61795233
For the most part it's quicker and easier to write userland exploits in python. For kernel exploits however, yeah. Quite strong knowledge of C or some other systems language is advisable.
>>
File: 1502190156152.jpg (49KB, 409x600px) Image search: [Google]
1502190156152.jpg
49KB, 409x600px
Google is not what it seems, by Julian Assange
https://wikileaks.org/google-is-not-what-it-seems/
>>
>>61795412
I will buy this when it comes ot
>>
>>61793057
Tokyo Metropolitan Building appears to have a few DF antennas. Looking over using Google maps shows something else. Strange.
>>
File: page99.jpg (207KB, 1065x1760px) Image search: [Google]
page99.jpg
207KB, 1065x1760px
So as I promised in the previous thread, I'll post my brief points about Neuromancer. Generally it's a worthwhile read, at least for the cultural aspect alone. It's not as outdated as some people talk, it goes beyond being just an 80s rendition of the future. Pic related in the cover from the graphic novel, that thing is horrible and is no substitute for the book.

The presentaiton of low life high tech is really good, though I don't appreciate how far it goes into the future with outer space colonies midway through the book, as at that point the cyberpunk aspect takes a nosedive. That's why I liked Burning Chrome more, it's more minimal, less ambitious or unrecognizable.

I found the portrayal of the cyberspace quite confusing. Previously I read Burning Chrome and the matrix there was described as something geometrical, bearing no lifelike form. The abstractness was easy to grasp. In Neuromancer however there seems to be a mix of everything, physical and abstract representation. The storytelling when both are in play is absolutely chaotic, hard to follow. Things I was imagining as abstract blobs turn out to be in physical shape of sorts in other parts.

continued...
>>
File: page46.jpg (239KB, 1104x1760px) Image search: [Google]
page46.jpg
239KB, 1104x1760px
(continued)

3Janes' motivation seems very dubious, I would say badly written even. She is familiar with the characters for several hours at best, her compassion seems unfound, moreso foolish as she fails to see how her willing cooperation leads to an apparent downfall. She takes no step to verify the claims of eminent destruction. Everyone else is always on their toes, except this girl.

Wikipedia article says Gibson rewrote the first two-thirds of Neuromancer after seeing Bladerunner. Well he should've rewritten the rest too.

I think a somewhat missed out point about Neuromancer is how everything is interconnected and how that might hurt those who follow the naive wiredness. In the book, society and even the people or machines that utilize the weaknesses of extreme wiredness don't seem to express any estimation of how they are sucessful thanks to that, everything seems so complacent. Maybe that's why the interpretations are muted when it comes to interconnectness, it's not signaled explicitly anyhow.
Anyhow, the relevance and risks have a strong current day foothold as companies rush out products with internet connectivity without properly investigating how the devices might be utilized to remotely intrude upon owners or how said devices with little or no protection might be used for attacks large enough to cripple even the biggest internet providers.
The book here really has some predictive power for the situation that is still evolving.

And that's about it, this cover is taken from a smaller graphical novel that tried to publish whatever was left after the discontinued original.
>>
File: battlezone.gif (296KB, 961x617px) Image search: [Google]
battlezone.gif
296KB, 961x617px
>>61796430
>I found the portrayal of the cyberspace quite confusing.
My understanding was that information and databases in Cyberspace were represented by geometrical structures but actors and AIs were not.

The inspiration was computer games from the 1980's where Wm Gibson saw players looking deep into the screen, absorbed in the virtual world of the game.

Pic. related is probably close to what we are talking about.
>>
File: CubeFace_Render[1].jpg (36KB, 717x578px) Image search: [Google]
CubeFace_Render[1].jpg
36KB, 717x578px
>>61796826
In Burning Chrome everything is abstract geometry. After having read that, that's what I imagined the cyberspace would be too in Neuromancer. Gibson made no attempt to portray it as having physical properties at the start so when it shifted to having humanoid visions got me really confused. I then went to imagining these semi-geometric semi-humanoid descriptions. For example, I imagined the cyberspace description of Armitage as a flying cube with one side textured with his face (pic related minus ears).
>>
File: 42.jpg (155KB, 1244x1067px) Image search: [Google]
42.jpg
155KB, 1244x1067px
>>61796826
The graphic novel while shit, attempted something sane, both abstract and concrete at the same image for cyberspace. Attaching
>>
File: cover.jpg (330KB, 825x1200px) Image search: [Google]
cover.jpg
330KB, 825x1200px
Oh and just so no one feels left out, attaching the book in two formats. Pick whatever you like better.
http://ran.2hu.moe/izcene.epub
http://ran.2hu.moe/jfxuah.pdf
>>
>>61796430
>>61796454
>>61796826
>>61796970
>>61797013
>>61797111
I started reading it last year when I first got my kindle. I read some 50~ pages and found it boring, even though I really love cyberpunk. Should I give it another shot? Does it get better later on or does the book keeps on the same pace?
>>
>>61797244
If you didn't enjoy anything following the Sense/Net hacking, don't bother, it will not get better.

>even though I really love cyberpunk
What in particular?
>>
>>61797244
To me the book feels like riding shotgun, so just strap in and enjoy the ride. It's writting in fast pace anyways, so you can finish it in a couple of nights.

Give it another shot and then pick up the other books of the Sprawl.
>>
>>61797566
>Sense/Net hacking
I don't remember any hacking in the book, though it's been a while since I read it. Though this idea piqued my interest.

>What in particular?
I'm not sure how to put it into words (English is my second language) but I find it very interesting the way that the "net" is portrayed in GitS. The idea of you projecting (is this the right word?) your conscience into the network and directly interacting with it has a very high appeal to me and I'd like to see more of it. Does it make sense?


>>61797573
Yeah, I just re-read the points the other anon (or was it you?) made about the book and I'm considering giving it another chance. I just might do that.

Also, directed to both of you, what do you think about the other books in the trilogy?
>>
>>61797902
>Also, directed to both of you, what do you think about the other books in the trilogy?

They are more focused and thus structured. It still feels like Cyberpunk obviously, but Neuromancer is literally all over the place. At least it felt like that when I first read it. Now that I read it again it makes more sense, but compared to the other two, it's much more "anarchic punkish".
>>
>>61791934
Yeah, modern day browsers are battle tested and go through quite a rigorous secure development lifecycle. You need to jump through a number of exploit mitigations after you find a vulnerability and it can be a major pain in the ass during exploit development. So it's certainly possible, but it generally requires a lot of time/effort which translates to higher payouts.
>>
>>61797902
>I don't remember any hacking in the book, though it's been a while since I read it. Though this idea piqued my interest.

The start of the book has the main protag play a street degenerate until his senses and abilities are restored. There's much less neo noir moments as such afterwards. The whole backstory starts to get uncovered as separate missions get completed. Cyberspace exploration is key in this.
If you haven't yet gotten through the very first hacking mission, at least consider finishing that. If you still don't feel good about it by then, then consider skipping.
>>
>>61789391

Do the courses cost money?
>>
>>61798082
>>61797948
I see. I'll start reading it again since I forgot most of it and I'll report here in due time. Thanks.
>>
>install linux
>fuck up
>stuck on tty1
>keyboard doesn't work
>usb keyboards don't seem to take either

fuck
>>
>>61789074
How can I keep myself as safe as possible while using windows 10?
I work in an industrial environment where windows is a real necessity because of all the retarded proprietary software (I use linux at home).
>>
>>61799546
Safe against what and against whom specifically?
>>
>>61799571
Against peeking eyes. Privacy.
I know, I know, windows and privacy, hence "safe as possible". Or is it a pipe dream?
>>
>>61799546
Do your work on your employer-issued Windows machine. Do nothing on it that isn't work. Do all your non-work stuff that you want to keep private on your own non-windows machine when you aren't at work.

Your employer will always have a lot of visibility into anything you do on their machines, networks, or that involves them in any way, so keep your activities segregated.
>>
>>61799586
Well, I would not say pipe dream, but you probably know the limitation of windows for all around privacy already.

Standard OPSEC is obvously advices. Seperate your private life as much as you can from your work life. Don't use Social Media during work, encrypt your emails, use seperate passwords that you don't use anywhere else.

And again, you need to get more into detail. Not trying to talk you down or anything, but if you know the potential threats you are facing, it makes it easier to find appropriate defence.
>>
>>61799505
which distro?
a lot of people use debian or ubuntu because it just "werks" and does stuff for them.
>>
Opinion on adnauseam?
>>
>>61799546
>>61799586

Also, if you want to have some stuff to read in that regard:
1. The art of deception - controlling the human element of security
2. Secrets and Lies Digital Security
3. Social Engineering - The Art of Human Hacking
4. Security engineering

If possible, read in that order.
>>
>>61799662
Ubuntu, but I tried to install a script to get the trackpad working properly.

I think if I can get control of it again, I'll just wipe it and reinstall Ubuntu. How do I boot from USB exactly? Hold Shift?
>>
>>61799793
to boot from devices, there should be a prompt telling you how on start up screen which will show the logo of computer manufacturer (lenovo, dell,etc..) or motherboard manufacturer (asrock, evga,) press that then press enter after going on your usb device
>>
>>61799817
I don't get that when booting up. I did when I had Windows, but last night I wiped it and installed Ubuntu.

Did I fuck up even more severely than I though?
>>
>>61799546
Does anyone know if those little programs to stop windows 10 from phoning home are effective?
>>
>>61799829
Try F1-F4 or F9-F12, usually one of those eight keys brings up the bootloader
>>
>>61799829
nah, the motherboard of your system has a bios battery which you probably havent been tampering with, so you probably have fast boot, or utlra fast boot on, im not sure if your pc manufacturer has the program to remove ultra fast boot supported on linux.
>>
>>61799849
>>61799862
I'll keep those in mind, then.
Meanwhile, I think I'm just gonna have to either wait out my laptop's battery running out, which sucks because the battery tends to last for several hours, or until it finishes processing whatever events it claims to have when I hit the power button and bring up a message that the CPU clock is throttled.
>>
How do Install gentoo on my Intel thinkpad laptop? Is there a certain iso I have to get for laptops? I also how do I install I never installed Linux before except on a rasberry pi but I know the process is different.

Also does disabling the drivers for the Webcam and mic in the bios safe? Or am I better off tearing the system down and removing the camera and the mic?
>>
>>61801058
just use the regular iso, not the minimal one, installation is the same as arch and is pretty easy if you follow the instructions, OR, do it repetitively
>>
>>61801096
Is there like special drivers or something I need to get because it is a laptop?
>>
>>61791292
How do websites know exactly what hardware I'm using then? I'm behind a Pfsense router
>>
>>61801201
nah, its just software
>>
>>61789074
You're OP for as long as you want to be OP, anon.
I'm 'usual OP', by the way.
>>
>>61790797
Imo Veil is shit. It was good, but not anymore.
>>
>>61802775
Come back please. You were doing a beautiful job. Although the other anon kept the game alright.
>>
>>61802960
I will, but I'm still working on updating and streamlining the pasta.
A New OP pointed out to me last thread, it is mammoth.
However, I don't want to stop adding it to as I think the information should be kept as up-to-date as possible, so this means that it needs to be easy to navigate.
>>
>>61802990
Cool, we will be waiting, OOP.
>>
>>61802990
How about presenting the compilation so far? Perfection is not required.

There is also the FAQ. And the FTP site.

And the long dark tea time of the quietness of /cyb/.
>>
File: TheDose4.jpg (576KB, 904x1277px) Image search: [Google]
TheDose4.jpg
576KB, 904x1277px
I was just checking some pasta:
>https://pastebin.com/9JaJFqB2
A link there goes to Planet Damage
>http://www.planetdamage.com/

Last update appears to be April 2017. Is it on hiatus?

Also on the FAQ there are further pointers:
>http://www.planetdamage.com/faq/
Several magazines are listed including The Dose (Pic related) Seems rather Cybergoth. Are there anything newer than 2010?
>>
>>61789088
>>61789175
Knowing assembly also gives you an opening into embedded software. that is a line of work less prone to be outsourced to Asia. Embedded with C code is often done in China and Taiwan, hence all the GNU problems. Assembly stuff is loser to the important IPR of the company and they will not let that part out of the gates. Unless they are suicidal.
>>
>>61802243
>I'm behind a Pfsense router
..okay? And?
>>
>>61789074
Anyone know why after following the Firefox guide I can't drag and drop an image into google? If I use the google reverse image search link here it just loads the default search start page.
>>
>>61806379
This is interesting, I have not heard of it happening before, in many threads and lots of people following the guide.

All I can recommend is remove ff, reinstall and try the config again. If it still occurs, then there's an issue in the guide that needs fixing
>>
File: IMG_5127.jpg (104KB, 980x551px) Image search: [Google]
IMG_5127.jpg
104KB, 980x551px
>>
So what do we think of mr robot?
>>
>>61808248
>implying that has any place in this thread
>>
>>61808925
it's /cyb/ related
>>
>>61809014
What? It's SEC related! He's a cyber security engineer
>>
>>61809113
literally don't care
>>
>>61809203
>>61809113
>>61809014
>>61808925
>>61808248
I can't even fucking tell whose who
>>
>>61809271
i'm a person who correctly stated the show is cyberpunk related, and also correctly stated i don't care
>>
>>61789074
Cyberpunk has nothing to do with cybersecurity.
>>
>>61808248
>we
>having a shared oppinion

>>61809457
Hello again.
>>
>>61789175
To tell kids on 4chan how smurt u r
>>
>>61790063
ERR I WUS BULLIED I HA8 DEM ERRR
>>
>>61810234
Yes.
>>
>>61789074
This photo is of my friend. She lives in Tacoma.
>>
Defcon videos are starting to come up. Any talks worth watching?
>>
https://practicalmalwareanalysis.com/2012/04/03/all-about-ebp/

posting this here for you fags like me who are trying to learn x86
>>
>>61802243
A router doesn't stop a website or an isp from seeing your hardware/deviceID's or MAC address
>>
>>61806028
I thought a router protected that information.
>>
>>61811325
Negative. The browser leaks all sorts of information to simple queries made server side; this has little to do with your network infrastructure
>>
Page 6 is dark. . .
>>
>>61795269
>Quite strong knowledge of C or some other systems language is advisable
You can just skip that shit and learn assembly for x86. Unless you're trying to write malware, I'm pretty sure all stack and heap overflows can be executed with just enough knowledge of assembly. Python is great though. ITs very versatile and very high level. BASH & Powershell script writing is more important to learn though IMO.
>>
>>61811325
Routers just routes network requests to other networks.

Maybe you're thinking of a default gateway, which usually has a firewall on it. That won't stop other people from getting info like your MAC address, tho
>>
0600 bump
>>
>>61813162
>not using utc
>>
>>61813186
Why would I?
>>
>>61812663
Nigger you're recommending someone learn ASSEMBLY before AN ACTUAL PROGRAMMING LANGUAGE?
>>
>>61790063
I have been there. Management, however, smell the opportunity of abusing someone. That and offloading some of their duties onto you.

You's better have an escape plan because these things tend to end badly.
>>
Bed time bump
>>
>>61813727
>assembly
>not an actual programming language

You should leave anon.
>>
>>61813448
u dont wanna be a faggot do you?
>>
>>61812663
I wouldnt want to invest the time into writing stuff in assembly that I could just make in C. I'm sure there are system api bindings available for python (which are probably written in C) for pretty much every platform imaginable; but it's really just easier and makes more sense to write C or some other language designed with low level development in mind.
>>
>>61798139
For purely attending no. Otherwise it's 150 quid for a certificate (per course).
>>
>>61814411
But the servers are not in Europe, anon.
>>
File: 27525_battle_angel_alita.jpg (468KB, 2560x1920px) Image search: [Google]
27525_battle_angel_alita.jpg
468KB, 2560x1920px
>>61814736
Seems most contributors, by volume, are in Europe. So why not go for a strawpoll?

>http://www.strawpoll.me/13665376
>>
2 hour bump
>>
File: Tron.jpg (635KB, 3948x1841px) Image search: [Google]
Tron.jpg
635KB, 3948x1841px
Just a reminder that Tron is /cyb/ and that the graphics are awesome:
>>>/co/94372087

Also: any shows that are similar but based on /sec/?
>>
What's a good non-US/Canada/Eurostan VPN for torrenting?
>>
>>61789074
When I do modprobe chacha20poly1305 it does not appear on /proc/crypto, while when I do modprobe chacha20 and modprobe poly1305 they do. Do templates not appear on /proc/crypto or is there some other issue?
>>
>>61814948
europe lurking here
>>
File: 1502004722558.jpg (119KB, 497x732px) Image search: [Google]
1502004722558.jpg
119KB, 497x732px
>>61814948
>datamining
>not even being subtle about it
>>
Anyone /NYC/ here?

Just moved for my infosec job, looking for cyberpunk shit to do.
>>
>>61817883
Good on you Mr. Europe, please write more.

Strawpoll so far shows a heavy European influence. The Americas should be waking up by now.

>>61817941
I do some data mining and specialised big data analytics for a living but this is far from it. rather it is a good way of building community.
>>
=== /cyb/ and /sec/ News

>FBI sting 'unmasks' US cyber-extortionist targeting girls
http://www.bbc.com/news/technology-40874918
>The FBI has charged an American man officers believe to be behind an online extortion campaign to make young girls share explicit pictures of themselves.
>Facebook messages in the name of "Brian Kil" were sent to the girls, using the Tor anonymising network, from 2012.
The explanation for penetrating the TOR is mysterious:

>But after local police in Indiana called on the FBI for help investigating the case of two victims who lived in the state, agents added extra code to one video file uploaded along with other images to a private Dropbox account.
>And when this video was viewed, the code grabbed the IP address of Mr Hernandez's computer, the FBI alleges.

The alibi for uploading video is provided:
>They threatened to kill them and their families or blow up their schools if they did not share explicit images.
>The FBI says it tricked "Brian Kil" into viewing a video bearing virus-like code that logged his real net address.

>If convicted, he faces a mandatory minimum sentence of 15 years in jail.
>>
>>61818663
>viewing a video bearing virus-like code that logged his real net address.
This is possible?
>>
>>61817419
I'm not certain but I think that's normal. The kernel views them as separate primitives, a cipher and a MAC. They're usually used together but it's certainly possible to use one without the other. I know there was a proposal for an AES-Poly1305 combination, but I don't know if anyone ever implemented it.
>>
>>61818695
It used to be possible but was very convoluted based on a little known 6502 bytecode interpreter used for laying old school music files! This I thought was patched a log time ago.

Of course this is a good explanation but is not necessarily true. It would also mean his viewer was not on a TOR net when he opened the file. Being online without a TOR gateway is a major opsec failure but then again he would need to do just one single mistake to earn 15 years bed and breakfast.
>>
File: Untitled-6.jpg (443KB, 1920x1080px) Image search: [Google]
Untitled-6.jpg
443KB, 1920x1080px
>>61789074
Fixed
>>
>>61819165
nice but still missing some dystopian advertising
>>
>>61818663
Wasnt tor invented by the us army? Of course they got all the backdoors ready, they dont need anything else.
>>
>>61819777
>Wasnt tor invented by the us army?
Navy, DARPA and probably a few others.

>Of course they got all the backdoors ready, they dont need anything else.
This is where it gets funny. Parts of the .gov wants to crack TOR, other parts are working to secure it. Rumours are that TOR developers have received hints from the far side about unpatched vulnerabilities. Backdoors therefore tend to evaporate. If true I am sure someone in Maryland is spitting blood just now.
>>
>>61819777
If I remember right it originated in the Navy (because they started a comms project through DARPA, or something like that) but now resides under the State Department.
>>
>>61819966
Generally speaking, most people who get caught after using Tor to anonymize their traffic are not defeated due to weaknesses in Tor, but OPSEC failures.

For a more detailed examination on how Tor users get caught, see this Defcon 22 talk here: https://www.youtube.com/watch?v=7G1LjQSYM5Q
>>
so for most pentesters, the easiest ways in are password guessing and spearphishing, right?
>>
Why hasn't AES512 encryption been implemented
>>
Has anyone read any essay or archived forum post that highlights why privacy is important. Regardless of the idea that a person is 'normal and unimportant'. Aside from the tedtalk link and other similar pinned content.
>>
>>61820501
Phishing without a doubt. After that bad configurations and way after that out of date software.
>>
>>61820646
I found this infographic video titled Why privacy matters which could be what you're looking for: https://www.youtube.com/watch?v=AW7aU3zv-4M
>>
>>61820943
that's certainly in the right vain. Thanks. I'm hopeful for something that could be read as youtube videos....are inherently google related.

Oh well. thanks again.
>>
>>61789074
what building is that?
>>
File: wall5.jpg (413KB, 1024x768px) Image search: [Google]
wall5.jpg
413KB, 1024x768px
What's the difference between the two lainchans?
>>
>>61821222
Am I virus now after clicking on picture?

Asking for pajeet. pls no bullyy
>>
>>61821275
it's just a wallpaper, silly
>>
File: Poll_cybsec.png (66KB, 669x1168px) Image search: [Google]
Poll_cybsec.png
66KB, 669x1168px
>>61814948
>>http://www.strawpoll.me/13665376
Just a reminder that Europe totally dominates /cyb/ /sec/.
>>
>>61821395
>15 person sample size
>>
How can I secure the variables in my Javascript program from client-side meddling? I know that I should verify the values server-side, but is that really an adequate defense?
>>
looking into cheap vpn recommned?
There was a good one for like $5 a month but i forgot the name
>>
>>61821492
Its a slow board.

Anywaaaay. I'm reading these books now
Ethical Hacking & Penetration Guide; CRC Press

Gray Hat Hacking; McGraw Hill

Hacking the Art of Exploitation: No Starch

Are these good enough to get me started & anyone have any other suggestions?

Also if some kind anon would be gracious enough to post a link to the Blue Team Field Manual, I'd greatly appreciate it. Although I heard its not nearly as good as the RTFM, so I'm wondering if I even need BTFM if I already have RTFM.

Thanx, fa/g/s
>>
>>61818740
There is rfc4106(gcm(aes)) in /proc/crypto however, could it be because it seems to be hardware accelerated? (driver: rfc4106-gcm-aesni) unlike chapoly?
>>
>>61821593
There is a way to compute with encrypted numbers/variables. it is hard and takes a lot of extra processing but I have seen it described. The specifics were well outside my field of knowledge.

>>61821492
>15 person sample size
Currently at 20 after another 45 minutes. Europe continues to dominate, Americans are probably still at work and basement dwellers are not into this thread.

It is interesting how great difference there is between the various generals in here.
>>
>>61820817

by bad configurations you mean open ports, default creds, poor access controls, etc?
>>
How do I evolve an early career in web development into cybersec?
>>
>>61820817
SE is always the weakest link, but a lot of companies don't let you exploit retards in their pentesting guidelines.
>>
>>61822389
Learn C. It's the best thing I ever decided to do.
>>
>>61814096
>what are objects
Yep, a real programming language indeed
>>
what's a basic book or textbook to learn basic infosec?
>>
>>61820033
Hello grugq
>>
>>61823090
Gonna quote myself here
>>61799696

If you are in a hurry, read the last one
>>
>>61821222
Nothing. They are both shit and a waste of your time
>>
>>61821820
Yes you do need it, because they aren't even related

It's not as good in the sense that it's not as exciting as rtfm. Because red teaming is sexy shit. Blue team is yay firewalling! Yay closing ports! Yay patch management!!
>>
how the FUCK can I be the only poster from Oceania

I'm this thread and the last and the one before that OP, and this explains so much about why it's dead at certain times. Because NO ONE IN MY COUNTRY IS HERE.

This is an interesting feel.
>>
>>61823223
>Yay closing ports! Yay patch management!
Its just a reference manual you tard.
>>
>>61821222
.org is the old one, it has more traffic and its new owner seems pretty weird and autistic
.jp is the new one made by the old owners if I understood correctly, they have a different flavour of autism

aside from that the userbase overlaps a lot I think, the same kind of views are expressed in both websites, they even have the same cancerous wordfilters
>>
>>61823560
wait, why are there 2 of them now?
>>
>>61790988
No.
It's very Newbie friendly.

>>61798139
No. Only if you want a certificate in your linkedin.
>>
anyone got some biohacking done? how is it? hear you are bound to set off store alarms with it.
>>
>>61823636
I probably forget details because I didn't follow it closely but if I understood correctly the precedent owner (Kalyx) sold the .org board to appleman and he started .jp afterwards whith some mods who followed him
Kalyx accidentaly deleted all the threads on .org after he sold it too lol.

I've got no idea why they set up an imageboard with the same name though
>>
>>61823818
>accidentaly
>implying
>>
>>61823146
by Ross Anderson?
thx
>>
File: 1498169256079.png (86KB, 480x480px) Image search: [Google]
1498169256079.png
86KB, 480x480px
>>61823931
kek I'm telling stuff like I've read it
from what I've read ""he accidentally the whole server"" without being aware the backups of his website were on the same server
I have literally no opinion about that
>>
>>61823677
I'm taking the same course, but its mostly cursoray knowledge in penetration and vuln assessment and mostly deals with digital forensics. The capstone project is digital forensics, anyway.

For the total white hat and/or blackhat experience one needs to read a few outside books.

But yeah, I'm also enjoying the course. The teachers aren't shit, which has been really hit or miss for me on eDX.
>>
File: 1468869242307-1.jpg (1MB, 3319x2543px) Image search: [Google]
1468869242307-1.jpg
1MB, 3319x2543px
>>
>>61822378
Yes. For example patreon got hacked because they had their server in debug mode facing the outside world.
>>61822404
Because companies don't care, they only care about getting the certificate saying they passed.
Ordered goods from /csg/ hopefully they arrive soon and if it goes well I'll make some tutorials showing rooting from start to finish. AliExpress has the slowest shipping.
>>
>>61789074
>>61789074
>>61789074
>>61789074
https://www.youtube.com/watch?v=pcSlowAhvUk

Here's the YouTube video that isn't actually linked in OP's post.
>>
File: 1468516912923-0.jpg (2MB, 3324x2534px) Image search: [Google]
1468516912923-0.jpg
2MB, 3324x2534px
>>
>>61824344
>>61824649
these are dope

post more retro-sec posters
>>
File: 1491976318769.png (129KB, 500x483px) Image search: [Google]
1491976318769.png
129KB, 500x483px
>>61824776
>>
>>61824776
>>61824834
lol sorry I'm eating I fucked up wait a sec
>>
File: 1468516912923-1.jpg (3MB, 3324x2534px) Image search: [Google]
1468516912923-1.jpg
3MB, 3324x2534px
>>
Daily reminder that if you are not doing CTFs you will be replaced by a low paid poo using an automated scanner.
>>
File: 1468516912923-2.jpg (2MB, 3321x2549px) Image search: [Google]
1468516912923-2.jpg
2MB, 3321x2549px
I didn't scan them myself btw I found them on my favourite fish related board
>>
File: 1468869242307-0.jpg (3MB, 3312x2534px) Image search: [Google]
1468869242307-0.jpg
3MB, 3312x2534px
>>
File: 1468516912923-3.jpg (2MB, 3335x2524px) Image search: [Google]
1468516912923-3.jpg
2MB, 3335x2524px
>>
>>61824344
>>61824649
>>61824924
>>61825033
>>61825090
These are great
>>
Question, is there any for handphones? In military now and they check everything on phone even messages. Any way to make a facade of some sort?
>>
>>61823271
i'm here lurkin
>>
>>61825738
What state? NT here
>>
Question for any exploit dev/vulnerability research anons out there: What are your thoughts on third party brokers like Zero Day Initiative (http://www.zerodayinitiative.com/)?

Also, after discovering a zero day in a lesser known product (e.g. random mp3 converter, file parser), is it better to notify the vendor directly then request a CVE or just give it to a third party who will handle things from there?
>>
>>61826185
I would make the decision based on how server the exploit is
>>
>>61827237
Severe
>>
what tool do all of you use for monitoring network traffic on linux?
>>
>>61819091
Man who extorts young girls doesn't necessarily have the mental capabilities for opsec his operations so dearly needs.
>>
>>61827476
That's an assumption
>>
>>61824094
Yes, that one.
>>
>>61826185
You can sell 0day to contractors like raytheon yourself, you just need the contacts
It's hard to sell in lesser known products though, that would be a more mission specific target thing that the customers would request
They'd also probably want full weaponization, not just a crash
>>
>>61827247
Well it's resume material or money. Your choice.
>>
>>61827237
>>61828241
Thanks for the replies, I'm new to vulnerability research and wanted to know how best to navigate the market with any zero days I come across. I'll take this advice into consideration, probably going to go with the route which allows me to get a CVE for a resume.
>>
>>61828434
One leads to the other, and the order is reversible
>>
>>61828884
A lot of places won't hire you if you sell exploits on the grey market publicly. A good exploit in a high profile product is worth it's weight both ways, but if you sell it keep quiet
>>
>>61826185
>after discovering a zero day in a lesser known product
Depending on the product you'd be lucky if you could get a CVE or a payout from a program like ZDI.
For someone just starting out I'd suggest negotiating with the vendor. If they're cunts then you can always publish your research independently on a blog or something anyway.
>>
File: 1446752304399.png (462KB, 640x480px) Image search: [Google]
1446752304399.png
462KB, 640x480px
https://github.com/xoreaxeaxeax/movfuscator
>yfw
>>
File: 1488859812946.jpg (24KB, 640x480px) Image search: [Google]
1488859812946.jpg
24KB, 640x480px
>>61830316
nice desu
>>
>>61830316
Too bad he killed himself recently.
>>
>>61830316
The question is WHY
>>
>>61830415
https://twitter.com/xoreaxeaxeax
>>
>>61830458
sp00ky
>>
>>61816452
There is a show now? Holy shit dude.

>>61821593
Wrap all your secure code in anonymous functions.
I shit you not.
As far as I can tell, there is zero ways to access anonymous functions unless YOU specify a way to access that data.
If you don't, the only way to access it is using a modified JS engine that has memory-management calls not found in regular JS so you can peek and poke around the entirety of the memory rather than limited named-calls.

(function(){
// Hey guys I'm hidden LOLE
}())
>>
>>61830446
>>61830446
The question is answered in the FAQ

>Q: Why did you make this?
>A: I thought it would be funny.
>>
Heeey, NSA (Equation Group) stole my idea.

>GrayFish: the successor to EquationDrug and the most sophisticated of all the Equation Group attack platforms. It resides completely in the registry and relies on a bootkit to take hold each time a computer starts.

Neat that it worked.
>>
>>61821593
>is that really an adequate defense?

It is the only defense. What makes you think users will be using the javascript you've provided them to access your server?
>>
>>61822808
I said development, not design.
I already know C.
>>
>>61831612
>I already know C
Congratulations; go and write exploits then.
>>
>>61829597
Thanks, I think I will do just that and negotiate with the vendor. 3 months is the standard time to give disclosure to the affected party before publicizing right?
>>
>>61833426
Yeah, I think 3 months is a pretty fair amount of time for a vendor to produce and ship patches for most vulnerabilities. Don't let them fuck you about though. Good luck, man.
>>
>>61834038
Yeah, hopefully they aren't a pain to deal with. Thanks again.
>>
>>61826185
I read through some of ZDI's website. Is it actually more profitable or report exploits to them than it is to sell them gray market style?
>>
>>61836314
I read through the site too, was hoping there would be some anons who had experience with ZDI that could talk about how the disclosure process was/whether it was worth it to go with ZDI vs contacting the vendor directly.
>>
>>61830316
>>61830458
This dudes fucking project names man.
>>
>>61830316
Pleb reporting in. What's the target of this?
>>
>>61836392
Vendors aren't where you make money, it's selling to gov and contractors
>>
>>61838157
see
https://github.com/xoreaxeaxeax/movfuscator/blob/master/README.md
and
>>61831097
>>
>>61838246
I already read it before asking (as it should be done) but I still don't get it.
>>
>>61838198
this and dealing with vendors can be a huge pain in the ass at best.
>>
>>61838293
Mainly just weird ass proof of concept for obfuscation.

Could be potentially useful for writing malware.
>>
File: Poll_cybsec2.png (67KB, 669x1168px) Image search: [Google]
Poll_cybsec2.png
67KB, 669x1168px
>>61823271
>the only poster from Oceania
Perhaps too comfy for Cyberpunk?

Latest update after 1 day is Pic. 37 votes and 2 from Oceania.

I am quite surprised by the results.
>>
>>61827476
If we were to believe media and Hollywood documentaries (yeah, right) pedos are at the top of the heap, sitting in dark rooms wearing hood, shades and gloves, typing out the next devastating attack.
>>
So if anyone followed yesterday's pseudo-stenography thread there has been some experimenting with writing file data as pixels, thus going around the rule of no additional or embedded data (mods are dumb and may ban you however). The most optimal and widely supported variant allows to view original media with seeking capabilities without saving it locally.
By playing with this idea further it's possible to store original media in specific channels, even producing noisy images with fancy alpha cutouts.

Going even further, non-media files such as archives can be stored to specific channels (say alpha) or using a byte order reversal can be saved to images without triggering embedded file warning. 4chan most likely uses primitive file identifier scan, so anything that may mix up the identifier bytes goes around it. The byte order reversal works especially well with 16bpc images. This method isn't detailed in the thread.

Even playlists can be written to images. All that is needed is to reserve a specific bytestream section within the image raster for writing text data. Using curl, tail and head that text data can be extracted and piped to mpv for playlist parsing without storing the file locally. This method isn't detailed in the thread.

This is the archived thread, maybe some of you were already there, would like to hear if you've done anything more.
archive.rebeccablacktech.com/g/thread/61810624
>>
>>61819091
>>61818695
It may have been this particular vulnerability of attaching maliciously crafted subtitle files
https://www.theregister.co.uk/2017/05/23/malware_in_subtitles_return/

But I'd rather believe the guy downloaded some hot_girl.mp4.exe and while some video was playing the FBI was getting beaconed.
>>
>>61823708
>anyone got some biohacking done?
Bunnie did some concept analysis. Also MIT Review did an infamous article.
>how is it?
Deadly.

>hear you are bound to set off store alarms with it.
Store alarms?
Thread posts: 251
Thread images: 31


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.