[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

/sec/ - Security - Anonymity - Hardening

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 312
Thread images: 23

File: 1488765471540.jpg (1MB, 1920x1200px) Image search: [Google]
1488765471540.jpg
1MB, 1920x1200px
Hi Everyone,
ITT: You can share Sec, anon or over stuff tips.
Also:
info thread
>>
links from old thread

How To Become a Hacker: http://catb.org/~esr/faqs/hacker-howto.html

>Learning
https://cybrary.it/
https://n0where.net/
https://www.offensive-security.com/metasploit-unleashed
http://resources.infosecinstitute.com/
http://www.windowsecurity.com/articles-tutorials/
https://www.sans.org/reading-room/
https://www.corelan.be/index.php/articles/
http://opensecuritytraining.info/Training.html
https://www.blackhat.com/html/archives.html
http://www.securitytube.net/
http://opensecuritytraining.info/Welcome.html
https://beginners.re/

>News/CVE releases
https://threatpost.com/
https://www.deepdotweb.com/
https://packetstormsecurity.com/
https://www.cvedetails.com/
http://routerpwn.com/
http://www.exploit-db.com/
https://www.rapid7.com/db/
http://0day.today/

>Wargames
https://overthewire.org/wargames/
https://www.pentesterlab.com/
http://www.itsecgames.com/
https://exploit-exercises.com/
https://www.enigmagroup.org/
http://smashthestack.org/
http://3564020356.org/
https://www.hackthissite.org/
http://www.hackertest.net/
http://0x0539.net/
https://vulnhub.com
https://ringzer0team.com/
https://root-me.org/
https://microcorruption.com/
https://starfighter.io/
>>
File: Autism.jpg (34KB, 403x433px) Image search: [Google]
Autism.jpg
34KB, 403x433px
There's no such thing as anonymity today. You can try to by anonymous but that would have been suspicious.
Basically come on man. It would be highly suspicious if you didn't have any social media accounts and run TOR 24/7.
>>
>>59894189
>suspicious
to who you fucking nigger?
kys yourself, cancer
>>
drop packets instead of rejecting them
patch your shit
don't be stupid
>>
File: security.png (26KB, 448x274px) Image search: [Google]
security.png
26KB, 448x274px
>>
>>59894189
I don't have any social media, encrypt everything, use a VPN, and use 2FA everywhere.
>>
>>59894101
Is there any good (and somewhat simple) info on hardening GNU/Linux? Just got into it and some things I got already
>modifying sysctl values
>compiling with -fstack-protector-all, -D_FORTIFY_SOURCE=2 and -Wl,-z,relro,-z,now (anything else?)
>grsecurity kernel
>>
File: image.gif (2MB, 312x250px) Image search: [Google]
image.gif
2MB, 312x250px
>>59894229
t.
>>
good talk on OPSEC, that was posted in the last thread.
https://www.youtube.com/watch?v=9XaYdCdwiWU
>>
>>59894273
that's a good start
you should enable -fsanitize=address on all setuid binaries for maximum security
>>
>>59894264
There are physical factors. Basically every abnormal behavior tracks attention.
>>
How does the new security issue concering Windows affect me, if I'm behind a NAT router? I hear it uses a hole in the SMB implementation.
>>
>>59894302
http://seclists.org/oss-sec/2016/q1/363
>>
Mods are pathetic laincucks who don't understand board culture
>>
Such pathetic cucks who don't know cute girls like maki
>>
File: 1489891764186.jpg (1015KB, 1920x1080px) Image search: [Google]
1489891764186.jpg
1015KB, 1920x1080px
Protip:
Maki is just a normie bitch, lain is love.

Also:
Do you think the numbers of proxy you hiding behind is important ? Like "Good Luck, I'm Behind 7 Proxies"
>>
File: 1492199539515.jpg (235KB, 1600x1638px) Image search: [Google]
1492199539515.jpg
235KB, 1600x1638px
>>
>>59894252
Joke's on them I'm a masochist
>>
>>59894302
ASan doesn't work well with PaX
>>
>>59894557
>Joke's on them I'm a masochist

You won't be joking after waterboarding
>>
>>59894273
Run questionable software in VM, I wouldn't trust an NSA botnet modules for your kernel to handle security.
>>
>>59894613
One would like to think.
>>
>>59894273
http://hashdump.org/wiki/linux/hardening.html
has some simple guides.
>>
>>59894591
That's a good thing considering that using asan with setuid binaries is insecure
>>
>>59894557
Fuck good one caught me off guard
>>
>>59894101
http://www.strawpoll.me/12736081
more people need to vote
>>
>>59894903
R I O T / M A T R I X
>>
Been running Hardened Gentoo and hardened kernel with grsec for about a month. Everything I normally use works, except for gdb debugging doesnt work but that's to be expected. I use gentoo's standard hardened toolchain havent riced any flags like >>59894273 >>59894302 I used to run gentoo years ago and then i tried ricing flags but a lot of stuff broke it never worked right.
Next up Im thinking of trying to setup something like firejail and apparmor.
>>
>>59894290
https://youtube.com/watch?v=J1q4Ir2J8P8

More opsec, also Melvin Guzman.
>>
Yo this thread fuckn ill my niqqa. We gon be hackn for weeks wit dis shit
>>
>>59895238
you should learn selinux
>>
Is tails good for basic sight reading and research?
>>
>>59895523
cheers
>>
>>59895692
yes
>>
>>59894101
What are some good pentesting tweaks/root apps for Android or iOS?
>>
File: install_gentoo.jpg (930KB, 2550x3300px) Image search: [Google]
install_gentoo.jpg
930KB, 2550x3300px
>>59896705
>https://www.pwnieexpress.com/

It's not an apps, but muw
>>
>>59896705
>Sorry bad link

https://store.pwnieexpress.com/product/pwn-phone2014b/
>>
D E A D
E
A
D
>>
>>59894391
Hey

Don't disrespect lain
>>
>>59897290
You're an idiot
>>
File: wall.png (109KB, 185x394px) Image search: [Google]
wall.png
109KB, 185x394px
>>
Who are you guys securing yourselves against anyway? The way I see it, you either try to secure yourselves against the NSA or against random hackers.

The thing is, I've used Windows for years and never once have I been hacked to my knowledge. Payment information has never been stolen, never had problems with identity theft, never had my data held ransom, etc. So if I have been hacked by some random hacker, then they must not have wanted to do much to me once they hacked me.

As far as the NSA goes, I don't believe you can do anything at all to defend against them if they target you specifically, so I don't see what the point is in trying to defend against them. I understand trying to get out from under their mass surveillance, but if you're being targeted by them specifically then I don't see how you could possibly defend yourself.

So in short, why do you guys do this? Is it just a hobby?
>>
>>59898452
You're an idiot and I hope no one else responds to you
>>
>>59898550
Why?

Fucking faggot, this is why 4chan is a garbage site. People like you just spam "lol idiot" to everyone and there's never any concrete discussion, and never any disagreement allowed unless it's forceful and exaggerated.
>>
>>59898598
Don't let the door hit you on the way out, retard
>>
>>59898452
same reason people carry firearms, if you ever you need it, you will wish you had it.
>>
>>59898618
I'm not leaving, so it certainly won't.
>>
>>59898452
I'll give you a (you). I don't think anybody here really thinks they can fully protect themselves from the NSA because as all the leaks have shown they hoard zero days like you hoard cock in your asshole and if you draw their ire they can get you. The reason we do it is because we want to make their job as hard as possible as a way of flipping the bird to them to them. It also has a side effect of making it hard for the normal run of the mill hacker to screw with you which is always a good thing. I know you might like to present your anus to get fucked by random strangers but not everybody is into that kinda shit.
>>
>>59898452
Dragnet spying/hacking. Anybody who's actually targeted by the NSA is screwed but passive information snooping on a massive scale won't affect a secure setup. I guarantee you've been passively spied on. Microsoft is scanning your disks and sending file hashes to their databases right now.
>>
>>59898598
I certainly don't want to have any meaningful conversation with an actual retard and I think he didn't either, feel free to get out of this site if you dislike it so much.
>>
bump from the depths
>>59897290
also vote faggots
>>59894903
>>
>tfw no social group where we all work on wargames together on IRC
>>
https://github.com/xmikos/cryptboot

Meme or not? I've been looking at ways to prevent evil maid and that seems to be my best bet.

I'm kinda surprised there isn't more stuff like that everywhere - installing a hardware keylogger is both more time-consuming, and easier to detect, than a malicious bootloader, while outright replacing hardware (e.g. installing a malicious mobo or CPU) is even more time-consuming and costly.

You will still be compromised if the NSA gets temporary access to your laptop, but at least your disgruntled roommate won't be able to flash a usb disk after 30 minutes of research online and infect your PC while you're taking a dump.
>>
I think a name should be restablished since name already differed from last thread but everyone seems fine with both.
https://strawpoll.me/12752349

>>59902849
If there's no IRC channel by tomorrow I'll make it. (With results from the poll or whatever)
>>
>>59894477
>/b/ with tripcodes
This is very very outdated.
>>
>>59905471
Why no /gsg/?

Shit poll
>>
>>59894316
While it's true the physical factors can blow your 'cover' in the first place that shit doesn't matter if you just want to protect your data. If you're actually some 1337 haxx0r the best thing to do is some opsec and have a normie life with FB and a different machine for that shit.

If you look up the history of who gets caught doing illegal shit online, it's always because the person blows their cover is really roundabout ways and never really the government exploiting zero days. IF they already know who you are you're fucked anyway. It takes one slip up for you to leave you machine unattended and physically accessing everything
>>
>>59905595
>/g/ security general
The point is for this to be named /g/sec or /g/netsec like the other shitty generals.
>>
>>59894219
GTFO http://www.chiark.greenend.org.uk/~peterb/network/drop-vs-reject
>>
>>59905471
>>59905595
>>59906039
it is going to be /nsg/ since you did not put any effort into your poll if you want to remake then we can postpone the irc until the end of the next thread. if you do not care then im going to make the irc when this thread 404's and start the next thread with the irc
>>
>>59908368
i do not care when the irc is made as long as it is before the 21st
>>
>>59894434
No. In fact someone could argue that the more proxies you use the less secure you are. Complexity is not a substitute for good opsec.
>>
>>59894160
starfighter has been dead for months,why are you still linking to it?
>>
>>59908368
>it's going to be /nsg/ because i want it to
I'll give you the benefit of the doubt because I was talking about the irc channel name with /g/netsec. There's no need for the "general" word to be in the acronym, and it looks better without it.
If you want /nsg/ or whatever to be in the poll, consider if people would vote it over /sec/ or /netsec/. Anyway make another stupid poll if you want.
>>
>>59908962
I really don't think it makes a difference.
>>>/tpg/
>>>/sqt/
>>>/csg/
>>>/fglt/
>>>/wdg/
>>>/dpt/
>>>/ptg/
>>>/pcbg/
>>>/spg/

Almost every general here has "thread" or "general" in the name. It also makes filtering easier to a degree, for those who are into that.
>>
>>59906894
Rejecting packets has more overhead when compared to drop.

https://serverfault.com/questions/412031/drop-vs-reject-ddos
>>
File: 1491519111309.jpg (620KB, 1054x1500px) Image search: [Google]
1491519111309.jpg
620KB, 1054x1500px
>/netsec/
this
>>
>>59908618
How are more hops making you more vulnerable? Shouldn't it be the other way around? As long as the proxies are logless and with good encryption.
>>
>>59894101
bump
>>
>>59911295
You literally can't verify that they're logless or properly encrypted unless you built them. And you don't know how the company will do in court. Cash burners and public internet
>>
>>59904409
what are you looking for? you can find pen testing, kiddy scripter, and CTF/wargame discords by just taking 5 minutes to search around on Reddit.
>>
>>59904409
we are making one that is why i want the irc before the 21 so i can sign us up for a ctf
>>59908962
i was just giving it the name it had last time. anyways i do not care what the name is the channel could be called "fuck /cyb/ we do shit"
>>
Just keep an up to date GNU/Linux system, stop using any suspicious corporate services, and you're already 99% more secure than the average user. Also stop using VPNs, you can't trust them at all because you have no way to review their infrastructure.
>>
I am going to make the CTF team we need a team name
>>
>>59912702
eromanga-sensei
>>
>>59912870
i might do this and name the irc after this too
>>
File: C4jcC7jVcAAdaah.jpg (316KB, 1270x1806px) Image search: [Google]
C4jcC7jVcAAdaah.jpg
316KB, 1270x1806px
>>59912917
only if you can live up to the standards of TomoriNao though
>>
>>59913022
nope
>>
How is NCL going for you guys?

I'm stuck on a very basic question and the hard part of wireshark network analysis. 90% complete.
>>
>>59894101
Why do you fuckers do these thread when I am away from my desktop computer? Fuck you guys
>>
>>59894101
So any of you faggots panicking over the not-CIA Shadowbroker release of all those juicy windows zero day exploits.
>>
>>59914283
>NCL
Noregian Cruise Line?
>>59914287
better than no thread you ungratful bitch
>>59914313
>windows
>>
>>59914347
Yesterday's thread was full of panicking kids disabling SMB 1 and 2 and NetBIOS and crying into their mountain dew about how not even windows 10 is safe. I wonder where the windows 10 shills went, it's relatively peaceful right now.
>>
>>59914379
i did not read most of yesterday's thread. but fuck em they are running windows something that you can break into with a linux usb. besides most windows user have not heard about the leak nor will they ever care about security.
>>
I have been using selinux for a year or so

I am still not very good at telling whether a denial is something an application needs to function or not, for instance stuff like whether local_login_t default_t:dir search; is something you should allow or whether it is a symptom of some other configuration error

or stuff like a cleaner way of giving execmod permissions on a case by case basis (if that is even possible) rather than globally
>>
>>59894101
security general? noice
did you guys try any of the latest leaked NSA tools? I didn't... because I didn't trust those .exe's
>>
>>59914468
>he uses windows
you're just about the only faggot in this thread still using windows
>>
>>59914476
>>he uses windows
who even said I use windows, you retard? do you know what virtual machines are?
>>
>>59914313
Don't worry. Microsoft patched those 0 days conveniently exactly 1 month before it was leaked to the public.
>>
>>59914347
National Cyber League

https://www.nationalcyberleague.org

The security club in my university is planning on making a team, but as far as I know there is one other guy besides me that's posting in the channel rip.
>>
>>59915131
it looks cool but it sucks that it cost money. do you think anyone else will join your team?
>>
>>59898452
pretty much this. i get how all of this is interesting and gives you an elite feel, but ironically most cybersecfreaks i've met so far talked to me about their sophisticated home setups and then pulling out an iphone or nexus/pixel with paypal and twitter on it.
>>
>>59899692
>microsoft is aware of my rare pepe collection and that i pirate the expanse every week wich is perfectly legal in my country
p-please don't torture me, cia!
>>
File: 2017-04-15_22-47-44-825538398.png (198KB, 1642x1396px) Image search: [Google]
2017-04-15_22-47-44-825538398.png
198KB, 1642x1396px
>>59915445
It was $25 to join, to be honest, they have a LOT of good info and labs regarding "ethical hacking" and "Security +" It's pretty cheap if you are up for it or want to do it with a friend.

Now I got an email saying that teams have to register, and it's $25 per team, a team is 3 to 10 people. But I have no idea if I can go on to do it solo. I think it's possible to solo, but I haven't checked.

I think it's worth the $25 if you want to compete with others and see what you know. A lot of people already got 100% completion on the first damn day the preseason game started.

I don't like how the labs lag (maybe it's me) when you do them, but it's still possible to do it under your own VMs. They provide the pdfs which is pretty sweet. But very basic stuff. There is no explanation, it's only step by step "paste this command, now paste this command"

And the preseason game was pretty fun but I have never done this one so I guess I'll leave it be until I meet the security club people on Monday and see what's up. I wanna know how to do it, but I have no idea how to do it.
>>
Glad this thread is coming up. Since lainchan's /sec/ got deleted, I hope these threads stay up!
>>
>>59915557
i know i saw what they offered but i one those weird people that believe all inforation like that should be free. i understand they have to make money and what not. and a suggestion about the team thing you might as well try getting a third and winging it. that is going to be an amazing experiance but do not expect to win but try to anyways.
>>59915580
i have not kept up with lain the last few days. is it offical they are not going to bring back /sec/ or are they trying to merge it into /tech/
>>
>>59915628
Yeah the reason I even joined was because several members from the security club I go to were planning to as well. There are other CTF games for free, but I don't know why I never tried them. Probably I wasn't sure they "teach" like this one, how to do specific things. This one has labs and pods that you can schedule with their own network topology. It's good quality stuff, but you can easily mimic it with VirtualBox and some RAM.

I suggest adding this into the OP under "Competitions with money" but eh, it's still a resource.

There's https://picoctf.com/ but I haven't tried it out yet.
>>
>>59914313
Nope. I still have a good reserve.
>>
File: lRq6T7n.gif (607KB, 800x792px) Image search: [Google]
lRq6T7n.gif
607KB, 800x792px
>>59914409
>fuck em they are running windows something that you can break into with a linux usb

You're retarded
>>
>>59915690
how so?
>>
>>59912702
WE NEED NAME IDEAS YOU KEKS

CiggerNattle
>>
>>59915660
PicoCTF is really good for learning. I remember they had a visual interface to teach you buffer overflows with a lot of good resources to figure it out. By a visual interface, I mean they showd what was being written to the stack as you typed.
>>
>>59916050
Oh damn that's nice. I just registered in root-me, but I guess I should've registered for picoctf as well?

The only thing is, I don't know if it's on 24/7 every day. Cause I think CTFs are timed?
>>
I like this thread so bump
>>
>>59915131
So the plan is you register and participate and we play passively?
>>
>>59894434
Fuck maki. Literally and dump her body in some river.

Lain is for cuddling and headpats.
>>
>>59894434
Theoretically. if one proxy is bugged and botnetted, it can hook a javascript botnet on your browser via cache and can track where you go.

Check out BeEF
>>
>>59916666
That would be weird, I might get into trouble for that maybe, but I doubt these people with 100% complete rates with 100% accuracy didn't cheat.
>>
>>59917458
Why would you? As long as you don't share your username or whatever is used to track your progress, I think it should be fine.
>>
>>59917596
Hmm alright. Then how do you think, or what do you think I should look for in wireshark in that pcap file to find the beacon intervals?

Also anothing thing is that, I had to register with my edu email and real name

kms
>>
>>59894101
does anyone have a link for lainchan wiki?
the old url 404s
http://164.132.230.31/~lainwiki/doku.php
>>
>>59914313
They are all patched m80
>>
>>59914448
did you atleast did mls setup?
or an strict setup?
targeted is pretty useless for SELinux to be fair.
>>
>>59915557
There are tons of free ways to do all of this stuff.
Basically using tools won't get you very far.
If you don't know any programming languages you're gonna have a hard time in infosec.
There are free courses and CTFs that you can use to learn actual stuff.
start here https://picoctf.com
>>
>>59917446
https://www.youtube.com/watch?v=0QT4YJn7oVI&sns=em

Man in the tab attack
>>
>>59894252
What if your encryption doesn't have a password?
>>
>>59918549
I have one strict and one targeted setup
considering moving the targeted one to strict
>>
>>59918591
Yeah I agree with that, I gotta practice programming again since I haven't taken any courses past data structures.
>>
>>59918641
Then they beat you up for the passphrase.
>>
>>59918641
then they just beat you up for being a huge fuckin nerd
>>
>>59894903
Irc, blocked all google domains in hosts file and cant be bothered to change it so cant check the recaptcha
>>
>>59919070
I just said that it doesnt have one
>>59919104
that doesnt get them into my hard drive
>>
>>59894903
Slack, like professional organizations.
>>
Anyone else running a firewall with iptables?
>>
>>59919419
>encrypted disk without password/passphrase/key/whatever to decrypt
Do you run it through your own hardware to decrypt it or what?

>>59919675
Why iptables and not fail2ban?
>>
>>59919822
Since when does fail2ban have routing capability?
>>
>>59894903
Matrix
>>
>>59918641
is this even possible?
>>
>>59894189
You're right.

Which is why the ideal solution is to live two different lives. One normal, so you can pretend. Another hidden, so you can be yourself.

Get a cheap chink tablet, start over from fucking scratch. Disable and physically sabotage anything other than wifi, the screen, and the charging port, keep it as unconfigured, vanilla and straight out of the box as possible so it can't be traced the slightest, don't use your favorite apps on it, lose all your habits, keep the battery removed when not in use, don't put it in direct or indirect contact, or carry it along with any other traceable electronics, don't even charge it from home, keep no history nor data on it, wipe it at startup and when turning off for extra safety, connect only from free or hacked wifi, don't reuse any account or pseudonym that could be traced, don't contact people you know, don't pursue similar interests, get a VPN paid in cash, loop in between it and TOR and public VPNs. Never trust that device, destroy and replace it once in a while.

No one will ever know it's you unless you're caught redhanded, and even then, be prepared to throw that tablet far and high. I came to the conclusion it's the only way to survive in this digital era, anything other than getting 100% split can get you caught, dunno if it would, but it can.
>>
>>59920307
>the life of a hacker in burgerland
Memes aside, it's pretty true.
>>
>>59920725
Here's a protip: I'm French.

Here's a list of things that can you get jailed in France: holocaust denial, hate speech, antisemitism, supporting conspiracy theories, spreading/consulting terrorism material, call to boycott, consulting copyrighted material. Going on /pol/ today is enough to get you into trouble, blaming the white genocide on kikes could get you into huge trouble.

Fortunately, there are other priorities, so anons aren't persecuted. But still that's the law, and we better be careful, because there's no telling when things will change.
>>
>>59894477
>>59894189
>using Tor
>2017

It's literally a honeypot at this point and has huge vulnerabilities known due to the design and the fact that the US government routes the vast majority of entry and exit nodes making defeating the security of what Tor gave.

It's not even hidden at this point, it's been written about many times and the NSA has even had their methods leaked on how they discover where you're going within the network.
>>
/sec/ is back lains
>>
>>59920845
France is officially a shithole
>>
>>59921427
The correct word is "totalitarian".

So yes, France is a totalitarian shithole.
>>
>>59921437
are there any countries that arent a shithole anon?
>>
File: 1447089319058.jpg (33KB, 500x500px) Image search: [Google]
1447089319058.jpg
33KB, 500x500px
IRC channel made according to the name poll (>>59905471) and to the way we should circlejerk poll (>>59894903).

#/g/sec @ Rizon

Feel free to come and shitpost, I'll start fiddling with channel modes, topic, etc in a bit.
>>
>>59921455
Japan, Iceland, Finland... wait okay I run out, you got me.
>>
>>59921132
The clearnet is more of a honeypot.
What are those huge vulnerabilities?
End to End timing attack yes but that's with all the others too.
>>
>>59921459
hardly anyone voted in name poll
>>
>>59921467
>Japan
Wont you get 10 years in prison for piracy in Japan?
>Iceland
Isn't even porn illegal there?
>>
>>59921544
Registered #/g/netsec too, if the poll goes the other way around we'll just swap.
>>
>>59894101
Do I need to learn how to program in order to get into /sec/? I already have good linux knowledge and am working on my net+ now.
>>
>>59921663
Yes it is pretty essential really. See >>59918591
>>
File: imaginebeingacomputer.png (183KB, 394x310px) Image search: [Google]
imaginebeingacomputer.png
183KB, 394x310px
to add to the salad of irc channels #/nsg/ was one made a few months back that saw some use before dying
>>
>>59894252
RSA is an NSA botnet crypto though so they wouldn't have to do either
>>
>>59921680
Where does it fit in to your daily job, for example? Asking honestly. I've tried a class before and was shit, but linux knowledge came extremely easily.
>>
>>59921544
I did
>>
>>59921766
Who do you think that develops 0days?

And learning about the insides of the tools you're using is pretty important. Why choose x tool instead of y without some faggot from the internet telling you, and a lot more stuff.
>>
>>59894903
Telelgram
>>
how do you guys protect your computer physically? if an attacker can access your computer physically, then you're already considered compromised

>>59894903
how to kill a general 101
>>
>>59922491
It's suspended over an active volcano by telekinetic monks.
>>
File: lainbear.jpg (20KB, 684x487px) Image search: [Google]
lainbear.jpg
20KB, 684x487px
Who here likes playing with botnets, I set up bunch of VMs and played with mirai. The real-time-load design seems really neat, but I don't know much about botnets, so maybe it's not as great as I think.
>>
>>59922610
i actually want to do something like this
https://www.xkcd.com/350/
>>
>>59922568
>not using your own telekinesis
It's almost like you want those monks to steal your personal information
>>
>>59922624
>linking an image on an image board
>>
>>59922628
They are suspended over vats of acid by each other without their knowledge.
I made blinded and deafened them after giving each one their assignment.
Also the volcano is in a decaying orbit around the sun.
>>
>>59922624
Don't get the CIA nigger VM sandbox breaking viruses
>>
A while ago there was a v detailed guide to setting up an anonymous system on a (now dead) forum on Tor.
It went through all steps from downloading Tor to setting up VMs, gateways etc.
Does anyone remember the guide and know where one could find it?
>>
File: network.png (114KB, 740x414px) Image search: [Google]
network.png
114KB, 740x414px
>>59922678
>>59922687
do it on a separated computer with no access to the internet or my intranet
>>
>>59922687
>years of advanced polymorphic viruses changing and adapting to an extremely hostile environment
>cia virus teaches it to adapt to closed systems and breaks the environment sending a flood of superviruses careening off into cyberspace
>first AI is born
Thanks Freevil Inc.
>>
File: 1492235267152.gif (2MB, 1920x1152px) Image search: [Google]
1492235267152.gif
2MB, 1920x1152px
protip:

if you are doing shady shit online:

do not use your home connection
use public wifi
stay out of security camera areas
encrypt your laptop
have a failsafe if it is taken from you while running
never revel anything about your life online
change your mac address
use tor
superglue your ram into the laptop
>>
>>59922880
>use public wifi
>stay out of security camera areas
almost all places offering free wifi have security cameras

>never revel anything about your life online
that's really hard to do though
even the way you speak can be used to track you

>superglue your ram into the laptop
it really depends on the ram type though
as long as it's not ancient, you should be fine
https://superuser.com/questions/464297/wipe-ram-on-shut-down-to-prevent-cold-boot-attack
>If you are not using old RAM like DDR2, 512 MB or 1024 MB then you should not be worried about CBA.
>>
>>59922880
https://www.youtube.com/watch?v=9XaYdCdwiWU

Watch this instead, it's better.
>>
>>59922990
>almost all places offering free wifi have security cameras
Yeah, at short range. Time to get yourself a good antenna anon, so you can shitpost from a hundred meters at least.

Solar powered repeaters are a nice thing too.
>>
>>59923041
Can't stand this massive SJW. He even uptalks like a fucking valley girl.

Good knowledge though.
>>
>>59923041
can u please make a tl;dr for that
>>
Is anyone here into solving crackmes? I posted a keygenme the other day and it found some positive reception. Would this kind of effort be appreciated here?
>>
>>59923196
I'm not aware of anything SJW he did, but I find his insight into "OPERATING" quite impressive, it's really good material

>>59923203
Sure I guess.

>>59923212
Yes and yes from me
>>
do you guys know if you can add voice and videochats in xmpp? i know of xmpp+omemo and letting you share gifs and pictures, but i need avatars, and voice/video communications too, wire seems like the ideal alternative, but i still don't trust them too much until they release the server side code, i've looked at mumble too, but it doesn't have video chat.
>>
>>59922880
make sure you consistently use the same locations for public wifi and keep a diary that includes details of all of your illegal activities on your laptop
>>
>>59923320
thanks dpr
>>
>>59921687
i wanted to bring back that name or something
>>
>>59923203
Id advise you watch the video anyways.
The basic takeaway is:

Okay so basically, it's enough to fuck up once to get caught, if you're doing something illegal consider the following.

1. Compartmentalize: Aka separate, your online persona now must never be linked to your online persona that does shady shit, to your real life person. Best would be to create fake identities for each of your online personae so that when you inevitably fuck up, you are not the one they are after.

2. Do not keep your tools / incriminating material on your computers, keep them on a server, encrypted, if you have the ability to pop a box, keep it on a hacked server and unpack it only when you need it, it should never be in a human readable state when you're not using it.

3. Assume all communication means are monitored, don't reveal personally identifying evidence to co-conspirators, they are eventual co-defendants. Don't talk in code (it's always easily breakable), but never be explicit. "We're hacking Sony" => "We're hacking Sparta" Cryptonims are fine.

4. Never hack / operate from home this ties in to compartmentalizing if you hack from home it can get tied back to you,

5. Use systems that fail closely, tor browser isn't one, TAILS is one. (I personally would advise to use a normal windows machine with innocuous data on it, go to a public internet access place, boot up tails and operate from tails, that way if you get caught they only have a compeltely fine windows / mac / whatever machine)

6. VPN providers are people they will not go to jail for you, even if they claim they keep no logs.
>>
>>59923041
>https://www.youtube.com/watch?v=9XaYdCdwiWU
~6:20 he says 'don't do drugs', weev got busted because of drugs in New York
let's unpack all of the things wrong with this:

weev was raided in Arkansas, not New York
weev was charged in New Jersey (not New York) and the whole reason he got off was the feds tried some shady jurisdictional shit to make it worse for him, so getting locations right is important
all of the drug charges were dropped and they could have easily just used something else as a pretense for the arrest
weev says the drugs were planted anyways

sure, getting caught with drugs does basically mean game over for you, but it isn't like not having drugs is going to protect you from the government in any circumstance as they have tens of other ways to steal your freedom
>>
>>59923580
I think the general idea is to not give them more leverage than they have already, don't give them bullets to kill you with.
>>
>>59923526
thanks, this shit is common sense for the most part
>>
>>59923693
the thing is, it's really easy to fuck up.

(oops I accidentally ssh-ed from my home ip instead of my pivot box into my target)

So it's a good thing if you practice setting up decent Opsec thinking about failure points etc.
>>
just listen to the ten crack commandments
>>
>>59894273
Install gentoo, drop systemd
>>
>>59894273
learn selinux you will be fine
>>
>>59923766
i find that having two computers for personal and hidden life works best
there should be no link between them

>>59894273
-fPIC
apparently there's some security benefit in position-independent code

>>59923845
can you redpill me on systemd?
>>
>>59923930
it's not even about equipment contamination it's about location/ip contamination, if I connected to a compromised box from home, then my home network is suddenly tied to the operation and if I get busted I'm fucked.
>>
>>59923930
systemd is new has a lot of unreviewed code. some people do not like it since it is just an abstraction layer. and bininary logs are something that can be tedious
>>
>>59894101
WARNING this is a thread for pedos to share how to hide from the law , report this thread
>>
laine!!
>>
>>59924034
Ignore this post.
>>
>>59923248
Well, I told myself as long as there's at least one guy...

I guess I'll make crackme Sunday a thing.
>>
>>59894101
Hey OP
I'm using an extremely hardened Windows 10 Home installtion
I simply set the slider for diagnostics to "Basic"

That should definetly lock out NSA

Nobody can deanonymize me at this point
>>
>>59924103
Hello, Rajesh Naishwaree.
>>
>>59924145
THAT CAN'T BE POSSIBLE
I just checked my DNS and it's Google DNS for maximum privacy
>>
>>59924189
Unfortunately for you, dear sir, i have a direct link to Google mainframes, so it is a matter of time till I pull some more info on you.
>>
>>59924236
ohshit.jpeg

Here is my Bitlocker decryption key
049621-309078-372515-635635-106040-383559-148731-411246

Please don't share my information
I wanna stay anonymouse
>>
>>59924034
WARNING THIS FAGGOT IS RIGHT PEOPLE GIVE OUT LOLIS IN IRC FOR DOING GOOD SHIT
>>
>>59923961
>there should be no link between them
>>
>>59924294
>Where do you store it?
>>
https://arstechnica.com/security/2016/07/cissp-certification-how-to-hire-infosec-pros/
>>
File: 1490141007728.jpg (52KB, 500x506px) Image search: [Google]
1490141007728.jpg
52KB, 500x506px
>>59924080
>>59924283
pedos fuck off
>>
>>59920307
Cheap Chink tablet? I don't trust the Chinks either. Also most cheap tablets run Android and anything Google = letrashmanmeme.jpg. What about a Thinkpad t60 with a modified bios and linux distro?
>>
>>59924593
That's kinda the point anon. I don't trust cheap chink tablets, but neither should you trust a thinkpad. The difference is, a cheap chink tablet is cheap and disposable, a Thinkpad isn't.

The baseline of what anyone needs, is a modern OS that supports modern protocols, a text entry device (touch keyboard), and wireless internet access via wifi. Now if your stealthy activities require more processing power, you're fucked indeed, but for pure communication, this is the way to go.
>>
>>59924309
>keep them on a server, encrypted
your home computer should have no access to the encrypted files anyways
>>
>>59924662
How isn't old thinkpad cheap and disposable? It literally costs 20-40 bucks on ebay.
>>
>>59924546
Ignore this post.
>>
>>59924703
Does it matter where to store the files if they are encrypted?
>>
>>59924736
My bad, I thought that was a more recent model or something. I'm not much into thinkpads desu.
>>
>>59924703
that's not tthe reason, you get arrested and they find you having an encrypted volume / files you're suspicious.
>>
>>59924800
You can make encrypted partition indistinguishable from random garbage on a disk
>>
>>59924835
How if it's an actual parttition they can see that total size / partitioned size don't match.
If you're raw writing to unpartittioned space then sector wear analysis can detect you, probably entropy analysis too.
>>
>>59924892
>sector wear analysis
Distribute information evenly (unironically fragment your data)
And I doubt there is such thing for SSDs
>>
>>59924970
oh but there is, in fact in ssd you can check the amount of times each nand has written or read specifically.
Most ssds do wear leveling by reading these values and distributing load equally either way in an ssd either you unpartition the encrypted volume in which case total size vs main partition size shows you where it is or you get overwritten by wear leveling.
>>
Which prog lang for haxxors?
>>
>>59925057
php
>>
>>59924892
https://en.wikipedia.org/wiki/Disk_encryption_software#Hidden_volumes
>>
>>59924755
preferably somewhere where there won't be an obvious link to you
if you can, convince random internet strangers to pool money for storage and hide your shit there

>>59924892
if they can determine and gather logs about your disk activity, you're already compromised

>>59925057
if serious, c
if not, vb.net
>>
>>59925191
I keep hearing C, but is it really? Why not ASM?
>>
>>59925160
I know the concept but there are a lot of whitepapers on how to defeat this.
Afaik there's no real deniable encryption solutions rn.

Since all solutions basically rely on you freezing the parent volume (in order to not delete/corrupt the hidden volume). Filestamp discrepancies, and entropy oddities pile up.

There are so many attacks that prove that there is a hidden volume.

>>59925191
>if they can determine and gather logs about your disk activity, you're already compromised
Right but always assume you will at some point be compromised it's better to store data offsite for plausible deniability.
>>
>>59923212
yup
>>
Every CPU is compromised every Compiler is compromised. Every ISP is compromised. You cannot hide.
>>
>>59925223
c is more readable and slightly more portable
also every low-level program is programmed in c, not asm

>>59925257
>it's better to store data offsite for plausible deniability
how would that be plausible deniability?

>>59925328
>date +"%Y"
>not making your own CPU
>not even bootstrapping compilers
>not being an ISP
get hacked kiddo
>>
>>59925540
well the idea is that there's no link between you and the server you store at (popped box you never connected from your home net)
>>
>>59925257
>Filestamp discrepancies
a not-so-simple solution would be making a file system with no filestamps or other metadata stored

>>59925564
so maintaining my idea of
>there should be no link between them
>>
>>59925540
Interesting, all the online guides i read said ASM was best used for viruses and stuff related to it

But thanks anyway
>>
>>59925726
you'll need to know some assembly if you're overflowing buffers by hand, but you're more likely to be using a tool someone else wrote to exploit a vulnerability someone else discovered.
>>
>>59925726
>ASM was best used for viruses
I don't think so. While some contain some inline assembly, most are not programmed entirely in it. There's not really a point to do it in just ASM as obfuscators / packers can take care of hading from AV.
>>
>>59925726
maybe for low-level rootkits, but not most viruses
however asm becomes useful if you reverse engineer viruses

>>59925958
>>59926941
i thought this general was about security, not making viruses
>>
>>59927031
Part of software security is finding exploits, and hopefully sharing the fix to them if you're not a dick
>>
>>59921459
Bump and reminder.
>>
>>59894160
Other good wargames:
http://pwnable.kr
http://pwnable.tw
https://io.netgarage.org/

Good course for learning binary exploitation:
https://github.com/rpisec/mbe
>>
>>59928864
Anyone else here top 120 on pwnable.kr?
>>
vote for team name
https://www.strawpoll.me/12763880/r
>>
>>59894264

VPN is not as bad as tor but still pretty bad.

I don't think you can really be Anon these days - least not in America.

Thinking a VPN makes you secure from black helicopter shit is just a false sense of security.
>>
>>59929929
what about creating your own vpn using a vps
>>
>>59929987
the problem with that is it can easily be traced back to you
>>
>>59930063
how so
>>
>>59930098
you buy a vps and put vpn server on it. law enforcement can see it's from vps hoster, contact them, and ask who's behind it: you.
you buy a vpn shared with other people. law enforcement can see it's from vpn hoster, contact them, and ask who's behind it: you and a shit ton of other people.
obviously that assumes the vpn says they don't keep logs
>>
Are any of you actually good at ctfs?
>>
>>59930136
then make sure it is hosted in a contry that does not comply with your government
>>
>>59930175
not vote and join us so we can all use meme magic to get better
>>
>>59930197
I feel like it will just turn into one person solving the challenges, and everyone else wasting their time. Like people work on the same thing separately. That is how it was on other open teams
>>
>>59930179
first of all, just because one country hates each other doesn't guarantee immunity to you
and anyways, i'd be on watchlists for sending gigabytes of data to/from another country that my country hates
also speed will suck, but the price would probably be better
>>
>>59930230
what are you trying to do that would warrent and contry that hates the states to comply with them. and even if you are doing something of that magnatide why would you do that at your house
>>
>>59929987

It's the same? They ask the vps host to access the hardware.

>>59930063

Same level of tracing as a VPN really, maybe slightly more work.

Money trail wise you can purchase it with bitcoin purchased with cash.

Issue with any of this is you expose yourself your doing something uncommon, that's the redflag. Tor would work fine if everyone used Tor. The problem is only people trying to hide what they are doing use tor.

A VPN is slightly better since businesses use them and more and more people use them to access say BBC or American Netflix. Your vpn endpoint has to be in one of those common places though.

You still flag that you're somewhat technically literate though.

VPNs are for hiding /what/ your doing. It's like throwing a smoke grenade when you go catch the bus so people don't see you leaving your house - you just told everyone you're trying to hid something.

Maybe it's better to just blend in.

Really depends how tight you got the tinfoil hat on.

I dunno at the end of the day what are you really doing this for? Fun/general interest or a actual fear of being tracked by the spooks?
>>
File: thanks mr shark.png (675KB, 740x836px) Image search: [Google]
thanks mr shark.png
675KB, 740x836px
>>59930224
they'll be there for the emotional / morale support

thanks mr shark
>>
>>59930283
>>59930300
using a vpn is not indicative of doing shading shit plenty of people use then for work
>>
>>59930224
the the people who are wasting there time can either go and learn while trying to solve a problem or not some at all
>>
>>59930315

Of course not, but it's easy to 1 see a VPN connection , then see it's a VPN end point at a VPN host or a private company. Time of usage will also be a indication if it's for work or not. Using a VPN at 2am either means you work in another time zone or something else - looking at who owns the VPN ip space will tell you.

So now why does a home user need a VPN that isn't for work? If it's a cheapo VPN it's probably for getting past geoblocks, if it's that VPN service that only accepts Bitcoin hummm?

If I'm some big bad government looking at traffic the first filter is every person using some from of encrypted communication. You just took a huge amount of data points and eliminated a bunch of them.

That's why people say using tor or a VPN is up for discussion - you stick out. It's not illegal but if you have nothing to hide why would you pay money to hide it?
>>
>>59930325
You good at any specific categories?
>>
>>59930283
just because they hate each other doesn't mean they don't want to put criminals behind bars
also i said nothing of doing it at my house

>>59930300
>Same level of tracing as a VPN really, maybe slightly more work.
it may be the same level of tracing, but with a vps, you solely own the vps. with vpn, you and other people have access to the vpn

>Money trail wise you can purchase it with bitcoin purchased with cash.
i've yet to see a reasonably priced vpn that i can buy with bitcoin and doesn't require my address

>VPNs are for hiding /what/ your doing
>you just told everyone you're trying to hid something
just because i'm hiding something doesn't mean it's illegal

>Fun/general interest or a actual fear of being tracked by the spooks?
for me, security is a nice hobby, but all advice i give sounds like i'm completely against everyone
>>
>>59930422
they you look into their laws and see if they prosecute for what you are doing
>>
>>59930422

Vps they have the same access as a VPN? They make a request for access or records. A VPN you share exit traffic with people, a vps is only you but the IP space is less obvious to who your talking to (some places ban VPN address space). Pros and cons to both.

But if they want to find you neither is better. A vpn is probably just a standard form where getting vps access is probably a little more effort.

Use Bitcoin to buy a prepaid credit card? I have seen plenty of vpns and vps that take Bitcoin - and if you're trying to find the cheapest of the cheap well you get what you pay for.

Give fake address?
>>
Anyone here have experiences with using a network IPS/IDS? I see that security onion and suricata inline with opnsense are pretty popular routes to take - how do you cut down on all of the false positives effectively?
>>
Donald Trump's website was vulnerable to XSS a while ago because CloudFlare is fucking retarded. They gave me a damn t-shirt.
>>
>>59930389
>it's a VPN end point at a VPN host or a private company
this is why i hate our current system for IPs, where we allocate it in blocks and attach whois data to it

>Time of usage will also be a indication if it's for work or not
that can be cloaked by sending equal amount of requests throughout the day to the same servers you would normally go on

>>59930389
>if it's that VPN service that only accepts Bitcoin hummm?
again, because i'm hiding stuff doesn't mean it's illegal, although it might put me on some watchlists

>If I'm some big bad government looking at traffic the first filter is every person using some from of encrypted communication.
that's the best part about encryption: it can look like absolute garbage
i can have a socks proxy over ssh and it would look just like an ssh connection

>>59930511
>IP space is less obvious
less? i'm sure you're familiar with the concept of a bitcoin tumbler, vpns work the same way

>Give fake address?
that's illegal though
>>
>>59930657

Only VPN providers own address space. You can easily see who owns a address.

A vps they see the vps providers address space but it could be used for all sorts of things.

I don't think giving fake addresses is illegal for most things - even if it is, I'm not sure how that sort of stuff applies to companies asking for that information who operate out of another country.

I mean really if you're goal is to do this for fun that's very different than being paranoid and wearing a tinfoil hat - the later is what I'm talking about, the hypothetical situation.

Tor is your best way to make it next to impossible to trace two ends of a connection. They know you used Tor, they know someone left the Tor exit node, but they can't link the two.

That's the point I'm making , if you send encrypted data, ssh, VPN/ipsec whatever, you stick out because it's uncommon compared to the amount of other traffic.

If you're doing nothing wrong it doesn't matter at the end of the day. If the black helicopters are searching for you, it's best not to stick out
>>
File: 1443272857326.png (326KB, 3388x3638px) Image search: [Google]
1443272857326.png
326KB, 3388x3638px
For those posting about being anonymous and stuff, doesn't using a huge corporate ISP already compromise any sort of anonymity?
>>
>>59931990
not when all data sent it encypted but there are other things that can give you away like a dns leak
>>
>>59931998
>not enabled DNSCRYPT and using a free cryptostorm.is encrypted DNS server at the router level
goddamn /g/ you guys have really fallen off in the last couple years
>>
>>59931998
A lot of the big fancy corporate firewalls can be configured to decrypt TLS traffic examine it then reencrypt and send it on its way now its scary as fuck.
>>
>>59932017
it was an example dumb ass
>>59932053
i would like to see an example
>>
>>59932112
https://www.paloaltonetworks.com/features/decryption

There you go.
>>
>>59932146
that is pretty scary. ever more the reason to never do dumb shit at home
>>
>>59932053
You have to have the corporate certs installed though
>>
>>59932146
Pretty sure these work by writing certs on the fly, so unless you install trust in the firewalls CA, you are fine.
>>
>>59894160
Probably need to update that sticky. Starfighter went out of business.
>>
>>59932434

I manage a Palo Alto deployment. This is correct. Also, Palo Altos are fucking awesome.
>>
>>59932528
There's another pastebin with many more links in the IRC, will update on next OP, there are still most probably a bunch of dead links though.

https://pastebin.com/UY7RxEqp
>>
One reason I never had experience in this field is because I think about how everything can trace back and finally get caught even if I will be doing small things to experiment.

Are there any ways to spend cash and buy gift card-esque things that can be used online anonymously?

If that's possible, from there on, not making any mistake and concealing your presence via reverting logs back to what they were and such, is it theoretically possible to get away with these things?

Unless they are after you and use every bit of their power to see who bought the gift card from which store from security cameras and such.

Also the fact that there will always be forensic evidence.
>>
>>59934125
I mean fuck, even posting that will probably put me on a watch list anyway.
>>
>>59930566
Don't waste your time. Use tripwire on your machine, have your all logs sent every few minutes to a logging server (try and store them for at least a month or two so you have some idea of what happened if you get owned) and just use fail2ban if you must use an IPS.

Logging failed authentication attempts and using IP reputation scores and all of that crap is about as useful as a bag of severed dicks.
>>
>>59925726
C is (relatively) portable.
Assembly is architecture and OS specific, and it's also a pain in the fucking balls to write. I'm sure the online resources you read that were written in 1994/by a retard suggested assembly, but realistically most malware can be written in absolutely any language.
File infectors, ie actual viruses, will need some assembly simply because you're usually adding your code to an existing binary, but nobody writes those any more.

>>59924800
If you get arrested, you're usually fucked anyway. Just stop this line of discussion, you're wasting bandwidth.

>>59923526
Most of this is actually good advice, albeit basic. Your VPN point is particularly salient.
>>
>>59894189
i have a vk account, and i love to eat red sea scallops while sipping vodka comrade
>>
>>59934211
>If you get arrested, you're usually fucked anyway. Just stop this line of discussion, you're wasting bandwidth.
the bloody name of the concept is deniable encryption.
IF you do illegal things eventually you're getting arrested, we're talking about ways to mitigate that being a completely catastrophic event.
>>
>>59934311
If you're being arrested, that means they a) know you've been doing crime, and b) have found some way to trace it to your IRL identity.
This means that you are 100% completely catastrophically fucked.

Just because they don't have the smoking gun that is your hard drive full of Kali installs doesn't mean they don't have enough (or won't be able to get enough) to put you in front of a judge and get you convicted.
>>
Since you guys are discussing personal information, do you think it's a good idea to register to some CTF programs with my real name and school email since they ask for what school I'm in?

I mean, in the end, I will share my stuff with my security club anyway.

>tfw used to be so paranoid
>tfw no I have a lot of places registered with my real name

What have I become? I mean, I'm not trying to do bad things, but as a Computer Engineering student, I guess going professional is a better way out than doing bad things. But again, I kind of feel awkward. You know, it's that inner instinct.
>>
>>59934385
Why wouldn't it be?
Pentesting is a valid hobby to have, with an entire horrible, rotten industry out there that you can work in.
If CTFs are fun for you, go forth and register.
>>
>>59934334
see
>>59923580

if they don't have enough evidence they'll arrest you anyways with bogus stuff as a way to access your devices / home.
>>
>>59934415
Why do you say that the industry is horrible though? Are they being exploited instead of making defensive security better?
>>
>>59934435
The industry is full of circlejerking and stupidity. Whitehats are also not competent people generally.
>>
>>59934423
Right, which renders the discussion about whether deniable encryption is better than normal full-disk encryption utterly pointless.
>>
>>59934496
>Whitehats are also not competent people generally.
Yeah I can say that from how a lot of people in my club do. I mean, they have to act a certain way to hide what their real intentions are though, otherwise, saying and giving a lot of information a lot will show what you are capable of, even though your skills aren't in hand. Hacking isn't hard, anybody can do it these days, there's a lot of information. All you gotta do is spend some time, read up on some documentation and try things out.

Your intentions and personality build you strength. To me, most whitehats are the people that have given up and just brag about what they can do and say to themselves "I know this one thing, I specialized in it, I don't need to learn new things"

That reminds me of a guy that did some shit and bragged a LOT on twitter and called himself Anon.

How the fuck can people like that do shit and get away I have no idea lmao.

But I mean, being whitehat doesn't mean that you're like that, some people just don't want to get into the hassle to hide their tracks every damn time because they have a family to feed and try their best to live and do their work while improving or just don't want to make dirty money anyway.

It's all about intentions man. I'm not the bragging type but I don't want to go to jail for doing something that can bring in profit if you do it professionally anyway.
>>
Any good guides on where to go after learning C in terms of infosec? Like how to apply it in making tools or viruses? Is the next step unix programming or something?
>>
>>59934625
https://www.nostarch.com/hacking2.htm
https://www.nostarch.com/malware
https://www.amazon.com/Modern-Operating-Systems-Andrew-Tanenbaum/dp/0136006639
https://www.amazon.com/TCP-Illustrated-Vol-Addison-Wesley-Professional/dp/0201633469
>>
>>59934625
That really depends on you. What do you actually want to do?
If you're looking to write malware, work out what platforms you want to write it for, and then go look at the source code of other people.
Same with tools.
>>
File: 1486931105689.png (981KB, 1150x1300px) Image search: [Google]
1486931105689.png
981KB, 1150x1300px
>>59935062
>>59934935
sankyu
>>
File: 1479106736363.jpg (21KB, 480x480px) Image search: [Google]
1479106736363.jpg
21KB, 480x480px
>>59894189
I want this hat in RL.
>>
>>59934625
>learned C
Hats off sir!
>>
Does this shit still work on current Dell/HP laptops?

https://dogber1.blogspot.cz/2009/05/table-of-reverse-engineered-bios.html

I get that most BIOS are likely backdoor'd by three letter agencies, but jesus christ I'd hope the average jackass can't just bypass all password protections without even opening up the computer.
>>
>>59935891
I learn C++ before hand, so many things seemed to have carried over
>>
>>59936340
I don't see why it wouldn't in either case they can just yank the hard drive out and plug it into another computer to clone it and do whatever you want with it after that
>>
>>59936397
A backdoor BIOS password is faster and would make it easier to flash malicious firmware on a device without even opening up the computer.
>>
>>59936340
https://bios-pw.org/
>>
>>59934147
>tripwire
>not ossec

lmao
>>
>>59937987
>ossec
Not using samhain.
http://la-samhna.de/samhain/index.html
>>
>>59934385
dude just use an email from guerrilla mail and joe deo you will be fine. unless you want fame
>>
anyone got into to asm book. i guess what i am asking for is a microprocessing book
>>
Hello I'm thinking of pursuing a security career and am currently getting my bachelors at uni. My uni offers computer science and IT degrees, Which of these two would be better for what I would like to do? Right now I'm just taking all of the classes that are required for both like intro to c.
>>
>>59939547
computer science
>>
>>59939781
Why?
>>
>>59939827
you will study OS programming and compilers, and networking. it is a good base for security related things
>>
>>59939875
Operating systems, programming, compilers, and networking
>>
Member of top 25 team on ctftime, AMA
>>
anyone got a link for ida 6.8 linux?
>>
>>59940894
How much trap cock did you swallow to be that good?
>>
File: Aw Shit Bro.png (129KB, 235x222px) Image search: [Google]
Aw Shit Bro.png
129KB, 235x222px
>>59940894
How to learn?
>>
>>59940976
I learned by doing all the wargames I could, then by playing CTFs. In CTFs you either get to practice what you know, or you learn a new technique, although there is a tipping point where all CTF challenges are not really super unique, and you can just solve them with out really needing too many jumps (if it is a good, no guessing challenge.)
Then, you start doing your own research / VR and go from there.

>>59940963
Quite a bit. It helps when doing pwning challenges. Nothing like a trap cock while writing a ROP chain
>>
will lurking these generals be useful when I'm writing, say, some webware?
>>
>>59941096
Not really

But it's always nice to have you around =)
>>
>>59941232

what if I slip up and have some vuln?
>>
>>59941268
Sounds like a (you) problem, friend.
>>
>>59923105

Repeaters seem to be the thing if you are actually up to no good.
>>
>>59942235
New thread
Thread posts: 312
Thread images: 23


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.