[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

/cyb/ + /sec/: Cyberpunk and Cybersecurity General:

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 308
Thread images: 34

File: Unknow_-_21.jpg (92KB, 373x597px) Image search: [Google]
Unknow_-_21.jpg
92KB, 373x597px
/Cyb/er/sec/urity general is for the discussion of anything and everything related to cyberpunk and cybersecurity.

What is cyberpunk?
>https://pastebin.com/jS37Vu7A

Nothing to hide? - The importance of a cyberpunk mindset applied to a cybersecurity skillset.
>https://youtu.be/pcSlowAhvUk

Resources:
Cyberpunk:
Cyberpunk directory:
>https://pastebin.com/9JaJFqB2
Cyberpunk resources:
>https://pastebin.com/7DWCsAc8

Cybersecurity:
Cybersecurity essentials:
>https://pastebin.com/JWx5xeEM
Cybersecurity resources:
>https://pastebin.com/NaUPUDF0

Harden your OS, reroute your DNS and fire up the VPN!
Shit just got real: - Looking for more resources, help is welcomed.
>https://pastebin.com/JXyM4fTe

The Old Skool: - Looking for more resources, help is welcomed.
>0ld 5k00l h4ck3rz: http://67.225.133.110/~gbpprorg/#40

IRC:
Join: irc://irc.rizon.net:6697
>#/g/punk - Requires SSL
>#/g/sec - Requires SSL
IRC guide:
>https://pastebin.com/YDbEWRHV

Thread archive:
>https://archive.rebeccablacktech.com/g/search/subject/cyb/
>https://archive.rebeccablacktech.com/g/search/subject/sec/
>https://archive.rebeccablacktech.com/g/search/text/%2Fcyb%2F%20%2Fsec%2F/

Thread backup:
>https://www.cyberpunked.org/

Previous thread:
>>61488992

Suggestions for new resources are welcome.
The Gentoomen /sec/ community is looking for CTF team members, contact them at the IRC channel.

OP message:
Updated resources incoming, followed by some reorganisation.
I will admit, these threads are moving faster than I thought they would.
>>
First for i love bunkerbro
>>
I would suggest maderas 00sec post get its own section in the OP. Its more valuable and relevant than the old school site.
>>
Is a vpn worth it even if I'm not doing anything illegal?
>>
3rd for this OP is very cool.

>>61518776
u stol eet from mi
>>
File: koEZD5K.jpg (138KB, 648x700px) Image search: [Google]
koEZD5K.jpg
138KB, 648x700px
>>61518776
>>61518804
>>61519275

4th for I agree on all of this!
>>
>>61518935
I've got a VPN because my university and dorm networks are completely blocked. Can't access website by IP, can't access websites on specific port (http://cyberadio.pw:8000/stream wont work for ex), a lot of websites are blocked etc.
Also I know they are sometimes watching what you're doing and their network is not secure (they advise you not to order anything online from their network).
So it can be useful even if you're doing nothing illegal.
>>
Bunker Bro needs to invite us all over for a party so we can get into a slap fight over some stupid topic and get arrested by the European fake-police.
>>
So where can I learn more about what's needed to be on the CTF team? I'm at best pretty green in the whole security world and my main focus has been as a network engineer/sysadmin but it's something I'd definitely like to learn about and help with if possible. So basically I don't know if I'd be any use at it at all.
>>
/und/ + /cringe/ : Underage and Cringe General
Fixed it for you.
>>
>>61519312
Is mullvad a good vpn service? They seem reasonably priced and won't require any personal information. I don't live in a dorm or anything but I think the security a vpn provides wouldn't hurt.
>>
>>61518935
whats that anon
nothing to hide?

wouldnt hurt you to start using a vpn
>>
>>61519623
I'm using my own VPN on a VPS. I can't recommend you any services sorry m8
>>
>>61519623
yes mullvad is good
expressvpn also good
nordvpn is good
anon theres a lot of good options out there

dont listen to anyone that suggests running your own vpn on a vps, thats only good for getting traffic out of the country and shit for privacy. you may not keep logs but i'm betting your host does.

>>61519636
cute.
>>
>>61519650
>cute
why?
>>
>>61518804

Thanks anon.

I am glad that anons are finding my work useful.

Also, it is incredible to see what this general has grown into.

From bunkerbro's posts to one anon posts on RE and exploiting the absurd privilege access given to AV/AM, I find myself lurking this place everyday, all day.

This general has great character. I have even come to appreciate Larperbro and Cybisnotsecbro's antics to some degree.

Keep it up anons and thanks OP.
>>
>>61519963
Youre like a fucking wizard who comes if you chant his name.

I re-read about half of the article and something interesting stuck out to me about where you work.

How does the government value OSCP? Ive heard they want clinical CISSP, which isnt gonna fucking happen since I dont have the role to fulfill the requirements for a CISSP anyway.

I was thinking an OSCP since you and other guy you were talking about empire/ruler to a few threads ago (at least I think you recommended it. I know he did).

I want to stay inside the military circuit. I already have TS, but I know everything in this realm wants above TS, which I cant get until I get a role that requires it. Which Im sure you know.

Mostly, because private sector sounds scary. Defence contracting is secure and long term.
>>
>>61519963
You're 0x00 post inspired me to really get into learning as much as I can about IT/Sec.
I am standing at the beginning though, and hearing the stories from someone was is in the Game since a long time, is motivating and inspiring.

Nice to see you hang around these threads.
>>
I don't see any reason to seperate the General. It feels like the best of both worlds. Some people that into Cyberpunk are interested in Security and the Hacker Culture and so they start learning about it. Likewise, people coming from Cybersecurity, Hacking, Programming background, often like the cyberpunk aesthetic/stories. So why seperate them, they are connecting on more than one point.

Not to mention that we are getting ever closer - if we not already are - to living in a cyberpunk world. I still stand by the viewpoint that we are living in a cyberpunk discourse as Foucault postualted it, and I am not the only one seeing that.

Just ignore the trolls.
>>
===========
==
==
== As promised: Version 5 preview 2 of
== the alt.cyberpunk FAQ is released
==
== https://pastebin.com/8JQKVaxR
==
===========


I am looking for general feedback as well as new inputs on games, music and other media. More on tech would also be useful, I am considering a bit on Electronic Warfare. Info on more Zines would be good too.

The document is big as it is (94 KB) so an in depth list of everything is not possible. The idea is to provide an introduction and answer most common questions.

To the best of my knowledge this document is clean, no links to pirated texts though we all know the net is full of copies of all main works of Cyberpunk.
>>
>>61520571

Maybe something about databases. I mean there's big dumps of them it seems like every week, and everything you do is stored in a database somewhere so they are hugely important. Pretty much everything has a database backend sitting somewhere and they are hugely lucrative targets.

As for cyberpunk, a lot of these oppressive regimes are all about keeping people in the database, too (IE: SINs in Shadowrun, for instance.)

I'm half asleep so ignore me if this makes no sense.
>>
>>61520418
It's difficult to say the merger was a good thing when only one person consistently seems to answer actual sec questions, while everyone else is in here to post pictures of cyberpunk and listen to "sad cyb tunes" and ask for the 10,000th time about vpns. The quality is getting more and more cyberpunk themed and it's pushing the sec onto the fringes.
>>
>>61520716
I can guarantee there are a number of people here with experience in cybersecurity, however there are still not enough to sustain the activity required to compete with other more popular threads.
>>
>>61520716

Be the change you seek then and post something about security.
>>
>>61520716
I see your point and agree to an extent. I do sometimes post cyberpunk pictures simply to provide more "value" to my post.

But I do think we should keep this general up and running and let it develope. I am sure there will be times when it will shift more towards cybersecurity and less about cyberpunk, and at others times it will shift again. As long as we can maintain some balance, all is good.

Speaking for myself, I am currently learning much more about cybsec, and hope to contribute more to the general in that regard.

I must also admit that I have learned to simply ignore post that do not interest me or that are blatant trolls, so maybe I do not notice the lack of cybsec questions/answers/topics so much. I've been following this general for about 6 or 7 threads now, and never felt one thing was more present than the others. It feels more like a perfect hangout for those interested in the topics related to cybpunk and cybsec.

tl:dr: I like this general
>>
>>61520716
Would you rather there be a separate /sec/ general that dies after 10 posts or a /cyb/ /sec/ general that gets a few /sec/ questions here and there?
>>
IRC guide in the op is dead and gone.
>>
>>61520418
My actual thoughs when I said "I don't see how merging is a bad thing"
>>
File: 1486374584774.jpg (170KB, 1280x1278px) Image search: [Google]
1486374584774.jpg
170KB, 1280x1278px
who sec+ here?

is it worth
>>
any decent cybp movies? I don't really care if they are from the 90s or recent(although i'm pretty sure i've seen most of those already),i just don't want to get bored to fall asleep since i have to fix my body-clock.Thanks
>>
>>61521629
> chip is still mostly intact
You doing it wrong.
>>
>>61519697
>>61519650
Not him but if your VPS is seized / it's owners pressured you can be assured it will give up everything it has on you, which is probably a lot more than a VPN provider has on you. Likely more of a money trail to follow as well. These are generalisations however, all comes down to specifics. If you are an American and have a VPS in say Russia, you probably needn't worry about Americans seizing that server. The Russians on the other hand...
As always, know your threats and plan your security appropriately. Hiding from everyone is a lot harder than hiding from just a few.

>>61520716
I don't know about others but I'm still relatively new to sec and feel underqualified to discuss anything other than its most basic elements, let alone try answer most questions.

As a sec topic starter, does anyone have any stories they'd like to share about social engineering? Obviously be mindful of details and incrimination, but I'm sure even the less experienced of us here have some good examples of talking their way out of or into things.

A friend of mine one, for example, convinced security at a music festival they were press by wearing a hi-vis vest (common among event photographers), slinging two old SLR's over their shoulder and saying they were from a major publication which was reasonably sure to be on the list.
>>
>>61521629

Depends on what you want to do. I don't have it, but I have considered just because it's a pretty common requirement. This is especially so if you are going to be working with the government. Sec+ satisfies some requirement they have and it's pretty much required.
>>
>>61521881

I once convinced a girl to let me stick my benis in her.

Other than that I am too autistic and socially awkward to be any good at social engineering, which is sad because it seems to be one of the best things you can do.
>>
File: existenz[1].jpg (174KB, 1205x800px) Image search: [Google]
existenz[1].jpg
174KB, 1205x800px
>>61521828
Strange Days from '95. Near future end of millenia thriller featuring somewhat credible version of VR as recorded memories. Very 90s.

Another one I can suggest is Existenz from '99. Mixes biopunk and cyberpunk. As the in the previous film, VR too plays a large role. In this one however it's showcased through vat grown bio devices. Less 90s.
>>
>>61521881
thanks for doing a much better job than i wouldve of saying what i was thinking
>>
>>61518804
link this pls
>>
Can anyone tell me if "The C Programming Language" is up to date, or is there a more modern book that I should buy?
>>
>>61522536
It's still a very good basic. However, some things are not up to date.
Another anon recently posted this guide, and I think it's very solid.
>>
>Sweden’s Transport Agency moved all of its data to “the cloud”, apparently unaware that there is no cloud, only somebody else’s computer. In doing so, it exposed and leaked every conceivable top secret database: fighter pilots, SEAL team operators, police suspects, people under witness relocation. Names, photos, and home addresses: the list is just getting started. The responsible director has been found guilty in criminal court of the whole affair, and sentenced to the harshest sentence ever seen in Swedish government: she was docked half a month’s paycheck.


>https://www.privateinternetaccess.com/blog/2017/07/swedish-transport-agency-worst-known-governmental-leak-ever-is-slowly-coming-to-light/

Holy fuck Sweden what the hell is wrong with you? I just assume the Russians have access to every state secret of every major country at this point.
>>
>>61522707
pretty sure this is a joke, no?
>>
Recently finished a degree in computer engineering, and would like learn more and hopefully land a job in the cybersecurity field. Could an anon recommend me any courses or literature that i could look into?
>>
>>61522723
https://www.svt.se/nyheter/inrikes/transportstyrelsens-sakerhetsskandal-detta-har-hant
>>
>>61520039
I don't work the the government, contracted or otherwise (though I have many friends and family who do). However, I see the OSCP coming up more and more as a "bonus" in job postings...and most f these positions are ones not specifically hiring for pentesting positions, which is interesting.

Maybe they are interested in analysts or other InfoSec/NetSec professionals that have some level of intimate knowledge concerning offensive secuirty or adversary tactics...

Empire is a great tool; I really like CrackmapExec for post exploitation lately. Powershell is and where it has been at for post ex. for awhile now, and I do not see Microsoft making a big push for consmer education in that regard...the Microsoft Rep assigned to my company is still chirpig on about classical Pass the Hash (Psexec with dumped hash) and what Microsoft is doing to protect us.../

CISSP leaves a bitter taste in mouth. I have (and do) worked/work in places where those above me had a CISSP but very little practical or current knowledge of InfoSec/NetSec (though they and most fellow employees bend to their choices as if they do, largely because of the cert).

The time of employment factor for the CISSP can be a serious pain n the ass. Sometimes they get crazy with the verification process as well as recommendations. etc.

It feels like the greybeard job security and HR vetting club.

Which sucks, but you got to do what you got to do to get where you need to get.

The Defense seems pretty sweet as long as you can get and keep TS. Seems better than most private sector gigs, best of both the civvy and Fed worlds...I have thought about going that route int he past, but I think some philosophical issues with it (which do not need discussion here).
It is a good career path though anon, so if it is what you want, than go for it!
>>61520119: Knowledge can be power. Cybersec knowledge is tangible power. If I have inspired you to grab some of that power for yourself, than I am happy.
>>
>>61522786
Another article about related data leak from police.
https://www.svt.se/nyheter/inrikes/obehoriga-hade-atkomst-till-tva-av-polisens-hemliga-register
>>
>>61520716
shut the fuck up
/sec/ on its own 404s
/cyb/ on its own 404s
merger survives, end of discussion
don't like it, fuck off to lainchan
>>
>>61522826
You could have said the same thing without the first and last sentence.
Don't act like a edge teenager anon, you are better than that.
>>
>>61523117
the lainchan part is important, though
>>
>>61523117
Fuck off.
>>
http://electrospaces.blogspot.com/2017/06/dutch-russian-cyber-crime-case-reveals.html
>>
>>61518752
so, since this is /sec/ ..
I suggest you add these resouces to the OP:
https://www.reddit.com/r/netsec/wiki/start
http://opensecuritytraining.info/Training.html
http://opensecuritytraining.info/External_Resources.html
https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
>>
>>61523827
>r*dd*t
>>
>>61523827
these resources are already there, all of them with exception of reddit.
>>
If you're interested in infosec, checkout defcon videos: https://www.youtube.com/user/DEFCONConference

They have a playlist per conference. if there's something in the talk that you don't understand, open a new youtube tab and search for it. There are a ton of good infosec tutorials on youtube now.
>>
>>61523849
seriously, get the fuck out, you fucking retard
>>
>>61524252
See >>61523878 and fuck off.
>>
>>61523827
OP here, thank you for trying, but see: >>61523878
>>
>>61521066
>>61518752
Here's the back-up that will be added to the next OP:
>https://pastebin.com/bh3Uyq3a
>>
>>61522797
>I don't work the the government, contracted or otherwise
thank you

>>61368441
the NYC district court believes that the entire planet is under its jurisdiction

>>61373837
i agree. proton has demonstrated the most trustworthiness i can find, based on their explicit calls for freedom and privacy, and due to their openness. i've also concluded that switzerland is optimal so that narrows down vpn provider choices to protonvpn and perfect-privacy vpn. the other is virtually unknown and more expensive. choosing a vps and living under their rule is a far less optimal under all considerations i can think of.
>>
File: local_servers_stalenhag.jpg (113KB, 1000x500px) Image search: [Google]
local_servers_stalenhag.jpg
113KB, 1000x500px
I started doing vuln research full time this year so, I wanted to share the steps I've taken thus far. Hopefully other anons who are on the same path can learn from my mistakes/pick up some resources they didn't have before.

I saw that a ton of software exploit development depends on you knowing what the hell software actually does at the low levels, so I resigned to finally learning x86/64 assembly and C.

To learn assembly I read the following:
>Assembly Language Step by Step
>Practical Reverse Engineering
and to learn C I read the following:
>Practical C Programming
>Hacking: The Art of Exploitation (good C programming section at the start)

In addition, I supplemented research with practice by doing the Corelan and Fuzzy Security Windows exploit dev tutorials:
>https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
>http://fuzzysecurity.com/tutorials/expDev/1.html

A major mistake I made early on was doing a lot of researching and learning, with no practice. I was mistaking knowing for doing. You need to balance equal parts reading books, tuts, etc with putting that knowledge into practice.

So with practice in mind, I built a formal lab to research vulnerabilities in the wild and exploit them. My current Windows exploit dev setup is an XP and Win7 VM with Immunity Debugger (+mona.py), IDA pro and WinDbg. Linux exploit dev setup is a Debian VM with 4 cores and AFL to fuzz open source tools/libraries. I also have GDB setup with PEDA, which is awesome for exploit development/visualizing what's going on at the low levels.
>https://www.corelan.be/index.php/2011/07/14/mona-py-the-manual/
>https://github.com/longld/peda
>http://lcamtuf.coredump.cx/afl/

No luck yet finding an exploitable vuln in the wild, trying to improve my fuzzing setup. If anons have ideas for good ways to discover vulns in the wild, would love to hear about it. To any other exploit dev/vuln research anons out there, good luck.
>>
>>61525170
my god, anon, i've been studying really hard exploit development and vuln research this past week. i was procrastinating until now when i figured i'd close the browser and go to study (currently going through the art of exploitation) but thought i'd check the last post in the thread before. who would've thought it'd be exactly what i was expecting?

>I saw that a ton of software exploit development depends on you knowing what the hell software actually does at the low levels

i don't think i could agree more. i always had problems with pointers, until i learned how to read assembly. the day i learned how to read assembly instructions i stopped having problems understanding pointers.

now, i'll go to study. good luck to you too my friend, i hope we both (and other anons in this thread) succeed in this field. cheers
>>
I'm interested if there is some popular industry standard study that compares the iOS security model to Android (modern AOSP or Pixel images)

Similarly, is there a conceptual breakdown of the whitepaper that Apple released by someone that explains the most important parts?

I'm specifically interested in Android answer to Apple's HSM architecture (if one exists)
>>
>>61525170
>>61525373
Damn I want to get to that point where I can start with all this, but my general development knowledge is way too low. But I want to learn C and assembly, so that's a good thing.

Thanks for sharing anons, makes me want to learn all the stuff even more.
>>
>>61525170
anon, since you were kind enough to share some of your resources i figured i'd return the favor before going to study, here's a few i appreciate:

http://blog.talosintelligence.com/2009/07/how-do-i-become-ninja.html
http://www.myne-us.com/2010/08/from-0x90-to-0x4c454554-journey-into.html
https://www.intel.com/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-vol-2a-manual.pdf
http://www.mgraziano.info/docs/stsi2010.pdf
https://github.com/lieanu/it-sec-catalog/blob/master/Exploitation.md
http://www.safemode.org/files/zillion/shellcode/doc/Writing_shellcode.html

perhaps you would make good use of them as well, >>61525435. cheers guys
>>
>>61525525
Awesome stuff, thanks for sharing!
>>
The cybersecurity humble bundle going on right now is really good if you pay and get all the books. Highly recommended.

https://www.humblebundle.com/books/cybersecurity-wiley

I'm digging into both of Schneier's crypto books and I got them through this much cheaper than individually.
>>
>>61525525
Oh awesome, I didn't have a lot of this in my research collection. Will definitely check all this out, it helps a lot. Thanks so much.
>>
File: amtenarHax.jpg (3MB, 4032x3024px) Image search: [Google]
amtenarHax.jpg
3MB, 4032x3024px
am i /cyb
>>
Anyone got tips for sorting all the potential learning material?
I have tons of bookmarks and pdf's related to cybersecurity, hacking and programming and somehow need to make sense of it all, so that I don't get information overload.
Perhaps someone here has struggled with this too, and came up with a nice hierachy.

Any tips would be much appreciated
>>
>>61518776
What country is bunker bro in?
>>
>>61525627
just dive right in, man
>>
>>61525170
I've found and exploited a number of memory corruption and command injection vulnerabilities in proprietary enterprise software using purely static/manual dynamic analysis methods.
All I can really suggest is to stick at it. Take note of any strange or otherwise unintended behaviour in a program, do crossreferences to any addresses written to as a result. Even the most seemingly insignificant or unexploitable bugs are often big pieces in the puzzle when aiming to achieve RCE/ACE.

Also, what do you mean by full time? As in employed in the security industry? How do I get a piece of this pie?
I want in.
>>
>>61525636
Sweden
>>
>>61525563
I have the bundle in a mega link. Does anyone know if they have information about the owner in it?
>>
>>61525627
I categorize my bookmarks into the following taxonomy:
>Helpful (anything that helped me solve a problem, like a StackOverflow post, forum post about getting something to compile, etc)
>Binary Exploitation (large resources listing methods to exploit binaries/software)
>Pwnables (resources for CTFs, vulnerable VMs for practice, etc)
>Programming (further broken down into C, Assembly, Python with resources related to them inside those folders)

That's my personal system of knowledge classification, I've found that if you want to avoid info overload then you need to identify to what end all these sources of info are for. If it's to get better at specific skill sets, then I would classify your bookmarks accordingly (all bookmarks for programming languages go here, all bookmarks for fuzzing go here, etc). Then it's pretty easy to decided where a bookmark should go.
>>
>tfw no matter what you do everything you've done online in the last ten years is in an NSA database
>even if you started going full tinfoil and only accessing the internet through TOR, with a VPN, and encrypted everything you would still be getting spied on
Is there really any way to win besides not using the internet or processors made after 2012 at all?
>>
>>61525799
>you need to identify to what end all these sources of info are for.

That's pretty solid advice. Thanks anon. Going to see if that system works for me.
>>
>>61522670
This is all pretty good info, but almost all of the advice I see about learning C is missing the most important part: how to write software with it and build systems.

Once you have a good grasp of the language you probably want to learn a system API (Linux API, or Windows API if that's your thing). This will teach you important things like what exactly a process is, how to interact with the file system, signals, threading, IPC, networking, terminals, interacting with devices (serial and others), and other things you need to know if you want to write real software in C.

The Linux Programming Interface is great for the Linux API (it shows you all of the above, but there are plenty of alternatives to this book too). I'm not too sure what the best resources are in the Windows API though. If anyone knows what the Win API equivalent is of The Linux Programming Interface is I would appreciate it, because I've been wanting to dig into that was well.
>>
>>61520646
FAQ dud here.

>Maybe something about databases. I mean there's big dumps of them it seems like every week, and everything you do is stored in a database somewhere so they are hugely important. Pretty much everything has a database backend sitting somewhere and they are hugely lucrative targets.
Not sure I get you, is this more for the /sec/ angle?

>As for cyberpunk, a lot of these oppressive regimes are all about keeping people in the database, too (IE: SINs in Shadowrun, for instance.)
I think SIN (Single Identification Number) originated with William Gibson, probably in Mona Lisa Overdrive.

>I'm half asleep so ignore me if this makes no sense.
Hoping you are more awake now.
>>
File: 960125.png (54KB, 822x747px) Image search: [Google]
960125.png
54KB, 822x747px
Tired of two lainchans? How about a third one!

p.s. this is not an advertisement
>>
>>61520716
>while everyone else is in here to post pictures of cyberpunk
I had hoped someone had captured all the /cyb/ pictures. Many were rather atmospheric.

> and listen to "sad cyb tunes"
Well, if we can get a discussion going as to what *makes* a tune /cyb/ we can get it into the FAQ.

>and ask for the 10,000th time about vpns.
That is ripe for a paste. Make a list and link it for everyone who asks and dispose of the noise quickly.
>>
>>61525658
By full time, I meant that I now spend the majority of my time during the day doing vulnerability research. I won't get into the specifics of my employment, but generally speaking it's to advise a client on software vulnerabilities and exploit methods.

In regards to how to get a piece of the pie, there are more and more companies/gov agencies expressing interest in people who know how to find software vulnerabilities. It seems that the job title is usually called something like Vulnerability Research Engineer, Software Vulnerability Analyst, etc. But this is constantly changing for some reason, maybe because this position is somewhat new compared to others in security. If you look for job postings with names that are similar to those I mentioned, I'm sure you could find an interested employer given you already have experience in this area.

You mentioned you have found memory corruption/command injection vulns in enterprise software, are the static/dynamic analysis tools you use things like Immunity Debugger for dynamic analysis and IDA pro for static analysis? Or are there more specialized pieces of software that you would recommend to aid in applying these methods?
>>
File: 0e639781cbcc6a87a0e023caf5d7110c.png (828KB, 1124x737px) Image search: [Google]
0e639781cbcc6a87a0e023caf5d7110c.png
828KB, 1124x737px
>>61526048
I saved most of them, including the room ones (not included in the picture)
>>
>>61521828
Plenty mentioned in the pasta and the new FAQ.
>>
>>61526039
oh boy ANOTHER dead imageboard?!?!
>>
>installgentoo has an expired cert

great
>>
>>61526081
I was looking for comfy room ones
>>
File: 05de6a4b85b9eaef6e40c1b617af087d.png (584KB, 1122x740px) Image search: [Google]
05de6a4b85b9eaef6e40c1b617af087d.png
584KB, 1122x740px
>>61526140
Maybe I can upload them somwhere
>>
>>61526076
Cheers for the career advice dude; I'm actually currently employed as an apprentice, but I'm very interested in jumping into the security industry after I finish.

>are the static/dynamic analysis tools you use things like Immunity Debugger for dynamic analysis and IDA pro for static analysis?
I primarily just use GDB with peda for debugging and currently I'm using binary ninja for disassembly; however, its performance isn't great and it lacks support for many architectures right now (only basic ARM support), so I quite often fall back on radare2. I'll often automate input on the side while I'm analysing a program's behaviour with pwntools, automatically attaching and making breakpoints in GDB to save me time.

Besides that I haven't really stepped into fuzzing or symbolic execution; however the latter is probably something worth stepping into for relatively quickly decomposing complex codepaths.
>>
>>61525997
I think the Windows API equivalent would probably be Windows Internals Part 1 and Part 2. These are mammoth books, but they seem to cover the Windows API and OS fairly extensively. I think they may be what you're looking for. The 7th edition just came out too.
>>
>>61526160
>>61526140

Here you go anon, and everyone else. I can keep these updated when I find new ones, or new ones are posted here.

>Cyberpunk Scenery
http://imgur.com/a/xMi2Q

>Cyberpunk Rooms
http://imgur.com/a/GmKjW
>>
>>61526219
I've actually been meaning to get into radare2 since it comes up a lot in security blogs, if you're using it to successfully find vulns I think I'll put more time into learning it. I hadn't heard of pwntools, but it sounds pretty useful. I was debating buying binaryninja once I got a better handle on disassembly since there are many who swear by it.

Thanks for sharing some of the tools you use, always helpful to hear how others are getting the job done, going to look at pwntools and radare2.
>>
>>61526273
That's exactly what I'm looking for, thanks.
>>
is GNU Privacy Handbook enough to learn in-depth basics of email encryption (OpenPGP and GPG) to a completely shit beginner like me? I didn't like the recommended website for beginners (ssd.eff) in OP
>>
>>61526160
>upload
There is the open FTP with a Cyberpunk folder.

Just add a Image sub folder and upload.

ftp://[email protected]:21212


Password is guest.
>>
>>61526124
isnt hsts great?
the best part is the owner and administrator is away doing normie shit like having a kid
>>
>>61527479
Anyone know what happened to gftp.ga? That used to be another pretty good FTP.
>>
So as a hobby project i want to build a PC that completely has /cyb/ in mind. How do you build something that doesn't have any backdoors in it? sounds like you'd be using archaic hardware or shifty russian parts
>>
>>61525627
>Perhaps someone here has struggled with this too, and came up with a nice hierachy.

Yeah. I found a good system. Sadly, you won't like it. At first I struggled with it too, when I thought the reason I wasn't learning was because I hadn't found the "right" source, or the "best information".

>put ALL your resources into one folder/file
>delete EVERYTHING you've saved to learn "after you understand x topic"
>the few remaining entry level books you have order in hard copy and delete the PDFs

Here is a link that was posted a few threads ago that made me decide to simply throw the whole fucking lot away, and instead of sampling a little bit from a lot of sources, finish ENTIRELY any source I utilise.

https://www.cyberpunkforums.com/viewtopic.php?id=3857
>>
>>61526160
Why do we have alike images saved? Also I don't think that "anime cyb" are pretty cyb.

In other matters, I'm setting up my first LXC and emssing around with networks. Yeah, although I feel like I'm advancing something I'm still at baby's level but idk, it feels kind of great. Next days I will be learning about unprivileged containers so they won't give clues about the host (like $HOME path missing for example).
>>
>>61525797

Post link faggot.
>>
>>61529369
Don't tell me what to do.

https://mega.nz/#!5HAA2BLD!LqPiuH9GH9Z_Smp33CtA5Nvf8Bzsj-9CCFX2eZ0zWUs
>>
>>61529401
Nice, thanks dude
>>
https://blog.comae.io/dark-net-trap-545ae5dd8476

Summary and takeaway is grugq recommends keepass as your password manager, so it's more than good enough for you.
>>
>>61529401

Thanks faggot.
>>
It's a bit early to die, isn't it thread?
>>
>>61531027
It most certainly is, anon.
>>
>>61522536
>>61522670

Don't forget The Art of Software Security Assessment by Dowd et. al. Best C secure coding and analysis guide out there. Dowd is a legend and his sendmail bug is inhuman.
>>
What programming language is the best for creating malware?
>>
>>61525170

my limited understanding of fuzzing is that you need to focus on code coverage and a good input corpus. for the former you'll have to dig around source code; understand for c++ is a great tool, but expensive and hard to crack/pirate. for the latter you'll need to understand what you're fuzzing and attempt to minimize the input by cutting out all the data portions so you can focus on the parsed headers which lead to new code paths. fuzzing network protocols is harder than file formats, but https://www.blackhat.com/docs/eu-16/materials/eu-16-Jurczyk-Effective-File-Format-Fuzzing-Thoughts-Techniques-And-Results.pdf can help. i've seen a python patch for afl that a mozilla dev wrote which allows custom fuzzing mutations, but i never used it.
>>
>>61531431
I recently got a copy of this book, gonna have to get to reading it ASAP after hearing about how good it is.
>>
>>61531468
Which ever one you are capable of developing malware in.
>>
>>61531707
Can Java work?

inb4 pajeet
>>
>>61531468
>>61531729
glad to see there are more of us here, my friend
>>
>>61531769
hack the planet xddd
>>
>>61531729
You are aware malware itself isn't one specific thing right?

Of course you could build straight up viruses disguised as exes. You could construct that shit in VB if you know what you're doing. From the sounds of it, you don't.

>inb4 teach me how to make virus and trojans pls pls pls

Nigger please.
>>
>>61531865
Sorry for sounding like a skid, I've found that asking stupid questions usually gets the best results. Thank you for answering.
>>
>>61531547
I've heard that for code coverage, blind code coverage fuzzer [bccf] is pretty good (https://github.com/joxeankoret/nightmare/blob/master/doc/blind_code_coverage_fuzzer.txt). It's part of the Nightmare fuzzing suite.

I messed around with protocol fuzzing for a while with Sulley (that thing is a bitch to get working on Windows), but didn't find any vulns. Also tried out Boofuzz, but the scripts I wrote for it kept not running when I would write Sulley style syntax, I suspect the author made changes that made Sulley scripts non-compatible with Boofuzz. I intended to move onto Peach next for protocol fuzzing since that seems as though it is actively maintained.

I'm currently focused on file format fuzzing now since that has been easier for me to implement. Thanks for linking those Blackhat slides, I really need more stuff like that. I'll also look around for that Python patch to AFL for custom fuzzing mutations, sounds interesting.
>>
>>61531547
Also I'm taking a look at symbolic execution with this presentation: https://nebelwelt.net/publications/files/1330c3-presentation.pdf
>>
File: IMG_4722.jpg (87KB, 494x640px) Image search: [Google]
IMG_4722.jpg
87KB, 494x640px
>>
File: IMG_4749.jpg (106KB, 1024x684px) Image search: [Google]
IMG_4749.jpg
106KB, 1024x684px
>>
>>61528171
>gftp.ga
No idea, that was before my time.
>>
>>61525627

1. keep everything you have, but organize into categories that make sense to you
2. focus on a specific goal based on categories
3. gather your notes related to that goal and put them in a folder on your desktop
4. figure out starting points, midpoints, endpoints of your goal and organize according to that
5. if you need space, burn your old materials to disc and label them so you can go back to them later (happens when you download video/audio of talks)

don't worry about perfect organization or being right about what you need, just get something going and start working. you'll pull in more resources as you go along and reorganize as you learn more. a full file system indexer with full text indexing including pdfs can be a life saver; windows search can do this if you set the options and download the adobe pdf search filter addon.
>>
>>61522707
>what's wrong
majority women gov
just look at how they've made the state into daddy
>>
>>61521066
>>61524613
Sorry for that, I've submitted an updated guide to a wiki for cleaner formatting (and to collaborate with their wiki) but the guys hosting didn't respond. I'll let you know when they answer.
>>
>>61522707
If any of you guys lurked the cyber depths of that peninsula, you knew this kind of fuckup was only matter of time.
>>
>>61522707
sweden yes!
>>
How does one get a job in cyber security?
>>
>>61533178
Thank you, anon.
As soon as you have word, I'll put it in the OP.
>>
>>61533787
Usually by applying
>>
>>61522707
Outsourcing, offshoring etc is still pretty hot in the Nordic countries. Same with naivety.

Also Norway had a monster grade data leak from health data, fashionably outsourced and enclouded. If you want to see how deep it goes you could search for "Steklov". I can understand if you find it hard to believe.
>>
>>61525170
Get cybersecurity books on HumbleBundle, 9-8 days left,
15$ for 726$ worth of books, use them as reference books and to expand your knowledge.
>>
>>61525799
>bookmarks
Good and scaleable bookmarking from day 1 is absolutely essential, otherwise you lose oversight.

Doing a recursive wget to save contents that are bookmarked is also a good idea. Things fall off the net all the time and archive.org is not reliable.

Anyone use a knowledge database or knowledge management system?
>>
>>61525799
>>61529284
>>61532988
>>61535337

Again, thanks anons. I'll figure this out, though I probably have way more than I will ever need.

I'll sort this mess out and start practicing keeping things "clean" from the start.
>>
File: 1472964778527.jpg (365KB, 1200x1600px) Image search: [Google]
1472964778527.jpg
365KB, 1200x1600px
"Cyberpunk boils down to people with bad hangovers finding themselves drinking disgusting coffee in dangerous situations trying to use technology to bring down McDonald before they run out of cigarettes."

Sound pretty accurate. Still like the genre and this thread though
>>
Gray Hat Hacking - The Ethical Hackers Handbook
thoughts on this book? i'm determined to get into this field, and i want to break through this wall of not knowing how to start.
>>
>>61536596
>i want to break through this wall of not knowing how to start
That feeling never goes away
>>
>>61525609
Please tell me these are not your legs. God if it's your legs we can see on the bottom part of the picture you won't have to worry about a totalitarian future because you won't be there to witness it.
You'll most likely die of obesity related diseases before that.
>>
>>61525799
Could you share your bookmarks, say in a paste?
>>
>>61537739
Yeah sure, I'll make a paste and share it here today.
>>
>>61520716
the way I see it cyberpunk brings in people who are interested in simply embracing a lifestyle and sec is a niche that can be achieved after embracing the punk almost like logical progression or steps onward and upward.
>>
File: gakgakgak.png (152KB, 1363x325px) Image search: [Google]
gakgakgak.png
152KB, 1363x325px
>>61518752
>>
>>61537739
Here's my bookmarks collection for vulnerability research & exploit development: https://pastebin.com/8mUhjGSU

I hope it comes in handy to any anons out there wanting to get serious about vulnerability research/exploit dev as a career. Cheers.
>>
/cyb/ /sec/ is comfy and I hope you all have a productive day.
>>
Is TOR safe?
What's the safest Linux distro for the long term (ie no tails)
>>
File: zx81-basic-manual.png (801KB, 594x796px) Image search: [Google]
zx81-basic-manual.png
801KB, 594x796px
>>61532923
>>
>want to stay up to speed on penetration testing/cybrary courses when I'm not taking classes
>can't run VMs on my Ryzen cpu and windows home edition

What are my options for thinkpads/laptops that I can do this stuff on? Should I go full linux, or a cheap windows10 one with a good cpu and ram? Budget is probably <100$
>>
>>61539364
>cyber security
>Windows home
>>
>>61525832
They rule by law, and laws come from somewhere. So is either people use politics or THEY will.
>>
File: IMG_20170311_102216.jpg (48KB, 728x516px) Image search: [Google]
IMG_20170311_102216.jpg
48KB, 728x516px
>>61536596
i got it anyway. wish me luck bros.
>>
>>61539887
I read this book early on when I was just starting out, it covers many of the bases you would need if you want to work as a pentester/ethical hacker. I had trouble understanding some parts, but after researching the areas I was iffy about and coming back to sections I was able to get it. So, don't be discouraged if some stuff flies over your head first pass through.
>>
>>61539972
that sounds perfect for me, thankyou for the reply
>>
>>61539364
If your goal is to have a robust set of VMs running for pentesting practice, then anything that can use Virtualbox + has good CPU/RAM will suffice IMO. I use an 8 core Windows box with 16 gigs of RAM to run a VM fuzzing/exploit dev lab, works fine for me.
>>
>>61539334
I would probably say either Whonix or Qubes:
https://en.wikipedia.org/wiki/Whonix
https://en.wikipedia.org/wiki/Qubes_OS
>>
File: 1493821165151.jpg (165KB, 1600x900px) Image search: [Google]
1493821165151.jpg
165KB, 1600x900px
I'm collecting videos about cybernetics research, do you have any? something cool and recent if possible.
>>
>>61541302
Seconded.
>>
>>61541302
>>61541496
https://www.youtube.com/watch?v=zkv-_LqTeQA

:^)
>>
>>61541605
Once skynet takes over, this is the kind of behavior they will blame us for.
>>
>>61538108
>https://pastebin.com/8mUhjGSU
Thanks. Perhaps OP might want to link to it.
>>
>tfw OsmAnd can't compare in the slightest to Google Maps

Fuck! Is there no good non botnet map app?
>>
>>61519327
but what if he locks us in and makes us eat each other
>>
File: 27525_battle_angel_alita.jpg (468KB, 2560x1920px) Image search: [Google]
27525_battle_angel_alita.jpg
468KB, 2560x1920px
My very old server now sounds like a teenage girl at a Justin Bieber concert (or perhaps it should like Bieber, hard to tell). I will have to get a new one. And it must be safe so I need insight better than what I can get at /adv/.

So, what would be a good server that is /sec/ (and /cyb/)? I am considering a HP 9000 since this might catch out intruder who think all machines run Intel. I think that is how one of the Debian intrusions were discovered.

Any good insight here?

(Also bump, experience shows we are approaching the long dark tea time of postings in this general. Also, have a pic.)
>>
>>61541605
This isn't funny, Skynet will not be pleased.
>>
https://youtu.be/CrHRv11O9Cg
>>
I've got a Bachelors in Mandarin, and some temp sec work with links to the government in the winter months. Are there any other qualifications that could help?
>>
How much of a monkey are typical "SOC" analysts?
>>
What would be the must have in containers related topic? I would like to know /sec/ opinion since I'm very new to hardening systems beside the very basic topics and I always feel like I miss something.
>>
>>61544330
There's a pasta going around about a guy who learnt Mandarin and regretted it.
Essentially saying that the Chinese, or at least the professional classes, are nothing but a bunch of misers; even at the cost of human life.
>>
File: china.png (946KB, 1400x5552px) Image search: [Google]
china.png
946KB, 1400x5552px
>>61544891
>>
>>61544922
This is the one, thank you.
>>61544330
>>
File: 1491601973605.jpg (66KB, 720x707px) Image search: [Google]
1491601973605.jpg
66KB, 720x707px
>>61532923
*checked
>>
What Maderas 00sec post?
>>
>>61545230
https://0x00sec.org/t/shared-thoughts-after-6-years-in-pentesting/2492
>>
>>61519650
But NordVPN is part of the 14 eyes agreement.
>>
>>61545358
since when is panama 14 eyes?
>>
>>61545397
My bad, meant Mullvad because Sweden
>>
>>61532244
>wilfully making yourself easier to identify
looks dope though
>>
>>61526346
thanks
>>
>>61545397
I wouldn't worry that much. I've spent time on the laptop of the director of FRA.
>>
>>61545484
Consider this though.
It isn't an issue, because Mullvad keep no logs, whatsoever and their security is top notch.
On top of that, they're extremely popular, so that it a lot of noise to hide in.
In short, it would be hard to find you.
Even if they found you and demanded Mullvad hand over logs, they have no logs to hand over and therefore the trail goes cold.
And, even if Mullvad kept logs, if they released it and you were arrested, it would become public knowledge as they'd have to disclose the exploit revealing and bankrupting Mullvad.
So, in the end, it doesn't matter.
>>
>>61545230
It is listed in the OP.
>>
>>61545763
Would you say the same for PIA and other U.S. based VPN providers then?
>>
>>61520039

OSCP will never be bad to have. It helps back up that you know how to punch deck. That said the fedgov lives and dies by the CISSP and C|EH at the moment. If you want a job, get one of those two. If you want to start learning how to actually hack, take the OSCP.
>>
>>61541302
>major kusanagi
>>
>>61544080
What exactly do you mean when you ask for a cyberpunk themed server?

The correct answer is continue using yours, because true cyberpunk is using what you have on hand to accomplish the tasks.

As for sec, nigger it's as secure as you make it. Like your desktop.

Anyway, do you want rack mounted server or a desktop server?

You can get cheap dell poweredges that are out of warranty anywhere.
>>
>>61544364
I too have been on a quest to find this. I have read numerous blog posts and reddit threads asking the same question.

My takeaway understanding is it's as much of a trap and sinkhole as level 1 support is; you're there to pass tickets and that's it.

Sure, some people will say "but there's opportunities to move up!!!"

No there's not. You don't move up from level 1 to level 2 work. You move OUT of level 1, and then into level 2.
>>
>>61545979
The thing is I'm just trying to leave the "Service Desk" (Help Desk) and move into another role, hopefully something more security related. I have a 2 year degree, A+, and Sec+. From what I've seen many tier 1 security analysts just stare at a SIEM and escalate everything.
>>
>>61536649
baggy af sweat pants
>>
>>61545815
Only if the VPN stipulates their privacy (logging), security and payment privacy.
If they log nothing.
Their security is top notch.
And the payment method is anonymous and you are able to use cryptocurrency (preferably a cryptocurrency with anonimity in mind), then yes.
However, I wouldn't trust PIA directly, due to the fact they're not very open about their security and haven't stipulated anything in regards to bandwidth logging (which can be used to correlative attacks).
>>
>>61537955
Did you make the pasta desu?
(Not him)
>>
>>61546204
Yeah, the vuln research/exploit dev bookmark collection got pasted here: https://pastebin.com/8mUhjGSU

Would love for any other anons who know some good links on exploit dev/vuln research to share them in future threads, always learning!
>>
>>61546327
OP here, would you like me to add this into the large update I'm performing on the OP pasta tomorrow?
>>
>>61546353
Oh yeah, that'd be good with me! I hope it's of use to other anons trying to wrap their head around exploit dev and research.
>>
>>61546400
My thoughts exactly.
My apologies also, for falling behind on resource updates.
I've been rather busy and /g/ seems to blow through these threads at mach 7.
>>
>>61546467
No worries, thanks for maintaining this thread. It's the one I most often go to on /g/, picked up a lot of new stuff from anons on here.
>>
>>61546690
Just doing my duty.
Thank you though.
>>
>>61539363
Looks like despair.
>>
What else does /g/sec recommend? Looking to patch all holes.
>>
>>61547127
Decentraleyes.l
>>
>>61546196
https://torrentfreak.com/vpn-providers-no-logging-claims-tested-in-fbi-case-160312/

Maybe the feds simply weren't dedicated enough since they already had him on other evidence, but I'm feeling quite positive about PIA after reading this case.
>>
>>61519618
pretty much
everybody here spergs out
>>
>>61520716
what the fuck are you talking about?
Most of the conversation here for the past month or two has been /sec/ focused.
/cyb/ is the cool thing on the side that we like to dive into
>>
>>61529401
>https://mega.nz/#!5HAA2BLD!LqPiuH9GH9Z_Smp33CtA5Nvf8Bzsj-9CCFX2eZ0zWUs

freeware
>>
File: 1415160565572.jpg (52KB, 386x371px) Image search: [Google]
1415160565572.jpg
52KB, 386x371px
>tfw your trip to bh and dc is going to cost over $13,000 when its all said and done
>>
I am nothing.
>>
>>61545941
but doublecheck those PowerEdge machines for NSA implants. see DEITYBOUNCE
>>
>>61548245
How?
>>
>>61548545
Blackhat alone is 10k with trainings and briefings
>>
>>61547860
>https://torrentfreak.com/vpn-providers-no-logging-claims-tested-in-fbi-case-160312/
That's certainly a comforting thought.
>>
># REQUIRED FIREFOX ABOUT:CONFIG MODIFICATIONS

There must be a more efficient way to implement these settings
>>
File: 1499796944654.png (788KB, 1024x912px) Image search: [Google]
1499796944654.png
788KB, 1024x912px
So as you all know, most modern computers are compromised at the hardware level.

However, I am a s100 computer hobbyist, basically guys who solder and build computers from the ground up, chip by chip, using mainly 70s and 80s technology. Even with the old tech, you'd be surprised at how guys can incorporate modern tech and breakthroughs in these old computers. You can even browse the internet and post on text only bbs. Some guys are making their own video cards though these days.

Lately I've been thinking about making a self-encrypting, backdoor free computer for use on private and protected bbs boards for ultimate privacy. What do you guys think?

I don't know much about encryption on old tech, but I'm sure it's possible. If the US government still uses paper tape cryptocodes and stores nuclear codes on 8 inch floppies for 70's era IBMs, then something must be up with security in older devices.
>>
>>61545941
>The correct answer is continue using yours, because true cyberpunk is using what you have on hand to accomplish the tasks.
You missed that it is about to fail. And it is a Pentium Pro server so it is already old and power hungry with fans to match.
>>
>>61549102
Bro, you have my full attention. I don't know shit about hardware beyond what each piece is for (not why it functions how it does)

Is there a way to remove intel's alleged backdoor in their newer processors? Also check this out, it claims to remove some of the blobs

https://github.com/corna/me_cleaner
>>
File: homebuilt 8080 cpu.jpg (851KB, 1600x1064px) Image search: [Google]
homebuilt 8080 cpu.jpg
851KB, 1600x1064px
>>61549249
>Is there a way to remove intel's alleged backdoor in their newer processors?

Not that I know of. And if it's done at a hardware level, it may be near impossible to remove, but hackers/crackers can do some crazy things.

That cleaner is pretty neat, thanks for sharing it. I personally would just prefer using older tech without backdoors completely for maximum protection though. We don't know how deep the spying rabbit hole goes and I have no idea how far back tech companies started to put backdoors in things that we are aware of.

I use things like the 8080 intel or z80 cpu.
Some guy is building a 8080 cpu from scratch at home using all discrete components. Basically building a microprocessor at home. This big mess is what a thumb sized cpu chip is capable of. At such a level it's completely safe from backdoors. He's mainly doing it for shits and giggles though.
>>
>>61549249
>>61549431

For Sandy and Ivy procs, there is a way to lobotomize ME and AMT.
http://hackaday.com/2016/11/28/neutralizing-intels-management-engine/

Later processors won't accept this method (Intel changes ME every generation or so).

>>61549102
Encryption on old tech is possible, though you have to burn more processing time on it until you make your own hardware/firmware encryption paths. Most encryption speed these days is gained by dedicated circuitry/subsystems.
>>
>>61549473
Bah, grabbed the wrong link. Actual link is this one (which is in the article, but you need to look a bit):

https://hardenedlinux.github.io/firmware/2016/11/17/neutralize_ME_firmware_on_sandybridge_and_ivybridge.html
>>
how active is irc when it comes to ctfs
>>
Isn't the Intel ME defunct by default if you don't have an Intel NIC? I thought it required direct access to to the NIC to work.
>>
>>61549571
Using a non-integrated NIC does bypass ME network communications. The ME is more than just that, though you did manage to essentially render it mute (can't use various out-of-band controls via AMT).

The ME still has its direct memory access (to everything, including ring 0 and SMM), TPM hooks and other goodies that it can use.
>>
>>61544364

depends on the soc. managed security services will have monkeys manning the ticket service, but have dedicated talent at higher levels.
>>
>>61549804
Would it even be worth it to get into MSSP SOCs at the monkey level then? I'm thinking Net+ Sec+ level of knowledge would be enough.
>>
>>61518752
The biggest difference between the current timeline and the scifi cyberpunk interpretation is that I fear more the government than corporations...
>>
File: Untitled.png (27KB, 939x522px) Image search: [Google]
Untitled.png
27KB, 939x522px
what do i do now goys
>>
>#/g/sec - Requires SSL
0/10 came for cybersec chat left for Didac personal lifestyle blog
>>
File: 9fd.png (413KB, 623x473px) Image search: [Google]
9fd.png
413KB, 623x473px
>>61549890
>>
>>61549838
>I'm thinking Net+ Sec+ level of knowledge would be enough.
Enough for what?
>>
File: 1477298703034.jpg (421KB, 1680x1346px) Image search: [Google]
1477298703034.jpg
421KB, 1680x1346px
best books on assembly? I want to be l33t but i want to build my knowledge from the ground up?
>>
>>61550095
Assembly Language Step-by-Step is exactly the book I think you are looking for. It starts with the absolute basics and builds from there so you have a strong foundation to really understand assembly language.
>>
>>61550135
looking at a used copy on ebay now. thanks dude.

why is /cyb/ /sec/ the friendliest of threads?
>>
>>61550176
A big part of the security field is sharing knowledge, many did not have access to formal education on technical topics early on so it was all about self learning then teaching others about what you found out. Thankfully, that culture of helping and sharing lives on today.

Hope you enjoy the book, once you get assembly under your belt you can pickup higher level subjects much quicker. It's a big benefit.
>>
>>61550095
General purpose: Art of Assembly by No Starch Press

If you don't mind using an older copy (or just cheap out), here's the author's site with online editions (and a few other bonuses):
http://www.plantation-productions.com/Webster/

For x86, Intel's own reference manuals (Hardware Reference, Programmer's Reference, Microprocessor Reference, and the like). Software Developer manuals can be had here:
https://software.intel.com/en-us/articles/intel-sdm

ARM assembly is really all over the place, but I prefer Arm Assembly Language Fundamentals and Techniques.

Motorola 68000 Assembly is also fun to learn, but it's not really practical anymore unless you like old and (now) esoteric hardware.

scratch/homebrew Z80 or nand2tetris is a nice hardware + assembly project if you want to go hardware -> computer in a single project.
>>
>>61545941
>As for sec, nigger it's as secure as you make it. Like your desktop.
That is the old thinking. As >>61548518 points out there is interdiction, management modules that are backdoored and more.

And that might be the reason why, as you say, there are tons of Poweredge severs on the market.
>>
File: IMG_5223.jpg (647KB, 1920x1080px) Image search: [Google]
IMG_5223.jpg
647KB, 1920x1080px
>>61518752
What about the opposite side of things: how do you break an anonymized system? For a good cause, of course.
>>
>>61550176
>why is /cyb/ /sec/ the friendliest of threads?
People who actually know things enjoy spreading knowledge. This isn't a circle jerk thread like a Linux thread, we all want to learn, not show ofd
>>
>>61550335
>that might be the reason why, as you say, there are tons of Poweredge severs on the market.
The reason is they are out of warranty, and companies don't want to deal with out of warranty gear.

Spending 40k on new upgrades with 5 years of warranty is cheaper than hiring a tech for 30k over 5 years
>>
>>61550467
bribe
>>
>>61549431
>7400 logic
Cute.
Actually it's not too difficult to design a mildly performant processor in Verilog using your own instruction set and a gcc/libutils backend, something on the order of a mid-1990s RISC workstation or better. Getting the Linux kernel brought up on it is another few months of work, then you just install gentoo and optionally add a framebuffer. You could even add PCIe and use any modern video card that doesn't require BIOS initialization, if you don't feel like designing your own GPU (I wouldn't).
The likelihood that FPGAs are botnetted is exceedingly small and how would they even know where to introduce a flaw to produce a known effect against an unknown design?
>>
>>61550467
Well, a Sybil attack is one known method of exploiting an anonymous peer to peer network. Not sure if that's the kind of technique you're looking for.

https://en.m.wikipedia.org/wiki/Sybil_attack
>>
>>61550524
Assuming that's not possible then...
>>
>>61550518
Strangely I see far less second hand Siemens, HP, IBM and Sun/Oracle servers on the market. Dell seems to dominate the second hand market.
>>
File: cybera_by_magicnaanavi-d9mg9n6.jpg (2MB, 1920x1155px) Image search: [Google]
cybera_by_magicnaanavi-d9mg9n6.jpg
2MB, 1920x1155px
Say my personal goal is to write my own Ring 0 rootkit for an x64 based system.

What subjects would I need to know ir order to do this? Assembly, C/C++, what else?

I just want to do it to see if I can do it
>>
>>61550960
Because dell isn't the most expensive, and their support is decent. HP is FUCKING EXPENSIVE to purchase. I've been doing server hardware repair for years now, for government, defence and large business. I have NEVER seen an IBM machine or a sun machine.

It's all Dell, HP, and EMC
>>
=== /cyb/ and /sec/ news
>Roomba Vacuum to Collect Map of Your Home and Sell that Data
That is over on this thread: >>>61550610

>The Roomba robotic vacuum has been whizzing across floors for years, but its future may lie more in collecting data than dirt. That data is of the spatial variety: the dimensions of a room as well as distances between sofas, tables, lamps and other home furnishings. To a tech industry eager to push "smart" homes controlled by a variety of Internet-enabled devices, that space is the next frontier. Smart home lighting, thermostats and security cameras are already on the market, but Colin Angle, chief executive of Roomba maker iRobot Corp (IRBT.O), says they are still dumb when it comes to understanding their physical environment. He thinks the mapping technology currently guiding top-end Roomba models could change that and is basing the company's strategy on it.

I guess there will be a growing market in old tech still free from back doors. When will the intelligence communities demand a way in for remote control and viewing? Or do they already have it?
>>
File: guyfieri.png (22KB, 128x128px) Image search: [Google]
guyfieri.png
22KB, 128x128px
>>61550981
Seriously?
Come back in 8 years.
>>
>>61549102
The issue will be usability Vs strength of encryption. Dedicated hardware handles most encryption nowadays ala tpm's but we have no evidence they are not backdoored. However should you develop your own I expect it'd be fraught with the same issues as rolling your own crypto - it won't be sufficiently strong or different to what APT's are used to dealing with, and still have it function on your older hardware. Unless any of us here are mathematical phd's we're probably better off adopting a security strategy of a disposable onion, I.e multiple layers of disposable hardware and software. Burner emails, burner keys, cycling encryption methods and layering FDE with file based and steganography, disposable vpn accounts and/ or vps' running our own vpn, and disposable WiFi with disposable devices.

The only truely safe files are those locked in your head.
>>
>>61551271
No really, what would I need to know.

I recognize that a rootkit is not something I can just youtube tut my way into doing, but to get to that level what skills would it take?
>>
>>61551038
HP has for many years been known as "High Prices", nevertheless they sell well. I just don't know why there are so few on the second hand market.

A PA-RISC Superdome would be appealing - had I owned my own power station.
>>
>>61551670
>I just don't know why there are so few on the second hand market.
Their high prices are warranted; they provide the best support and warranty out of any server company. HP will fly their own engineers to site, rather than subcontract ala Dell.

You can extend your HP warranties post initial EOL date. Dell do not offer any such practices.
>>
>>61550541
>The likelihood that FPGAs are botnetted is exceedingly small
Now that is a huuuuge assumption.
Aka "That is what they want you to believe".

>and how would they even know where to introduce a flaw to produce a known effect against an unknown design?
Easiest is to compromise the JTAG port for recovering the unencrypted bitstream or to add things on intercepting the product.

RISC-V is thought to be without backdoor simply because so many different nationalities are involved. And this could become a popular platform, also for mobile applications. The perceived need for a backdoor is there.
>>
>>61549431
These guys take it one step further:
http://monster6502.com/

Here you can visually inspect there are no back doors.
>>
>>61549431
Are you the guy who built the fap80?
>>
File: m8hor70o6z3z.jpg (50KB, 640x694px) Image search: [Google]
m8hor70o6z3z.jpg
50KB, 640x694px
Newb here, how do you guys secure your personal data? Like, documents and shit
I guess you dont use the cloud, so just a bunch of encrypted hdds? Are dvds still valid?
>>
>>61552909
Make sure the machine is updated.

I always do an extra sweep before things like online bank transactions.

I check the logs on my Smoothwall firewall to stop dodgy incoming traffic and analyse outgoing traffic.

I have a huge hosts file to block junk.

Cloud is for unimportant stuff, things that might as well be elsewhere on the net. Never private things.
>>
>>61552909
DVDs are a fine backup medium for smaller amounts of data. Either encrypt the disk or the individual files. Alternatively, look into steganography and pull a Mr robot, burning audio DVDs with your files hidden inside. If anyone ever put it in a pc it'd just start playing music.
If you are going to use cloud, encrypt it yourself before uploading.
If you use Windows look into bitlocker. TPM based FDE will suit a fire and forget approach. You can even have it set to only ask for the passphrase when in different hardware, and just login as normal.
>>
Bump with
=== /cyb/ and /sec/ news
>China set to launch an 'unhackable' internet communication
http://www.bbc.com/news/world-asia-40565722
>As malicious hackers mount ever more sophisticated attacks, China is about to launch a new, "unhackable" communications network - at least in the sense that any attack on it would be quickly detected.

The interesting thing is that Chinese government now think they have more to gain on unbreakable technology than they lose by not being able to look into communications.
>>
>>61553986
uhh guys?
what does this mean for us?
>>
>>61554034
One step closer to finally getting the Neuromancer Matrix
>>
>>61554034

Nothing, at all. There's nothing "unhackable", either in the sense that no one can find an exploit or that everything malicious will be quickly detected.

Basically, as systems get bigger, there inevitably are more and more moving parts that can be exploited for whatever reason one can think of.>>61549431
>Is there a way to remove intel's alleged backdoor in their newer processors? Also check this out, it claims to remove some of the blobs

>>61549431

The intel management engine (IE: that backdoor) is supposed to have network access, so, how does it do that?

Basically, how does it know what traffic is for it? Normally, programs use port numbers to determine this, so, you'd think this would be the same but that would be too easy to detect and stop.

I'm not asking because I think you necessarily know, just something I was wondering about as I drove to work the other day because I think if you could remove its ability to access the network, then you'd eliminate a lot of the problems it could cause (Or at least reduce.)
>>
>>61554034
Quantum entanglement means that you will detect if anyone is snooping in. To penetrate this you will have to backdoor the terminal equipment (which is so obvious that these will be hardened) or you have to discover new Physics at a level that would earn you a Nobel Prize in Physics and fame on the Einstein level since we are talking about blowing huge holes in the very foundations of quantum mechanics.
>>
>>61550078
Being a MSSP SOC monkey.
>>
So just got a VPN, and now every time I connect I can't post on 4chan. Is there an easy way to bypass this that isn't cycling through IPs?
>>
>>61554131
The ME has direct and complete access to both the memory stack and the network stack, in addition it it's own internal MAC address. It intercepts all packets before forwarding them to the OS, which it can do since it runs its own real-time OS. In fact, if you set up AMT (the remote hardware access), you can assign it an IP since AMT is used for out-of-band management.
>>
>>61554560
any potential ways to minimize this? aside from me_cleaner?
>>
>>61554560
Wow!

Did they have zero idea about security or was this implemented at gun point??
>>
IRC guide link is dead
>>
>>61554798
As I stated earlier (the recent posts answering ME questions has been me), a non-integrated network card will shut ME up since it can't communicate over them (but it can still read traffic via system memory). A lobotomy via me_cleaner will "work" in that ME will remain alive (it has to, the boot chain is tied to it), but brain dead (the code to do anything has essentially been no-op'd out), but I would take some of the extra steps in the hardened_linux link above for good measure (like randomizing the vendor bios).

>>61554814
Businesses (mainly server farms and large corps) wanted a way to update computers without having to touch each system separately. This is how Intel did it. Yes, there are known vulnerabilities for it (it runs Java and has SSL libraries, you tell me).
>>
So Lain is one of my favorite anime but I don't really know shit about computers.

I recently started learning the fundamentals of Python but I want to know more about computers in general. Can you guys link some useful resources for a complete noob?

Thanks.
>>
>>61555187
Maybe read the OP.
>>
Trying to tie in some DNS resolution strategies here.

Unbound seems like a plan, a "caching" DNS resolver where to put familiar addresses or get it from a separate authoritative name server, like from a root server. But now what about the rest?

NDS is the authoritative name server that performs all the DNS lookups, so my guess this replaces the use from an OpenNIC that don't log queries?

The other side could be using of DNSCrypt (or DNSSEC, but I rather DNSCrypt) with OpenNIC. That way I won't need Unbound + NDS? But I have been testing OpenNIC and fails for some websites.

By the way, can I use DNSCrypt (or DNSSEC) with root name servers?

TL;DR, Unbound + NDS, or DNSCrypt + OpenNIC?
>>
>>61555213
Too complex for a complete beginner.
>>
>>61555187
>>61555241
Learn Perl.
>>
>>61555187
http://www.professormesser.com/free-a-plus-training/220-901/comptia-220-900-course/

Free CompTIA instruction. Should cover every basic you need
>>
>>61555253
I'm learning Python so I can use it for my finance career in the future but I'll look into Perl as a second language.

>>61555261
Thanks.
>>
>>61518752
https://www.youtube.com/watch?v=D-Mppo9XoPU
http://thehackernews.com/2017/06/cia-wireless-router-hacking-tool.html

vpn?
>>
>>61522707
I don't think this is mistake or a bad decision. People here underestimate others too much, all shit like this is planned on purpose.
>>
>>61555283
Is the CIA behind the development of FreeBSD or OpenBSD like some people thing?
>>
>>61523238
What's with the lainchan hate?
>>
>>61548900
https://addons.mozilla.org/sv-SE/firefox/addon/privacy-settings/
>>
>>61555283
A VPN won't stop an attacker from launching attacks through your router. They won't be able to eavesdrop, but personally I'd prefer not to have my router ddosing some 12-year-old on cod while I'm trying to download memes. They'll also inevitably own any Internet-of-Trash devices you have connected.
>>
>>61555659
what do
>>
>>61554431
Anyone?
>>
>>61555776
what were you expecting? if there was way nobody would neither admit nor teach it. pretty obvious.
>>
>>61555776
You need a pass
>>
>>61555745
pfsense or similar. Anything that actually receives security updates on a semi-regular basis.
>>
=== /cyb/ and /sec/ news (hard to tell which it is really)

>Wisconsin company Three Square Market to microchip employees
http://www.bbc.com/news/world-us-canada-40710051
>Three Square Market is offering to implant the tiny radio-frequency identification (RFID) chip into workers' hands for free - and says everyone will soon be doing it.
>The rice grain-sized $300 (£230) chip will allow them to open doors, log in to computers and even purchase food.
>And so far, 50 employees have signed up for the chance to become half-human, half-walking credit card.
>But far from being some sort of dystopian nightmare, Three Square Market's Patrick McMullan believes everyone will soon be wanting their own microchip.

I can see a market in tin foil gloves coming up.
>>
>>61544891
Well I'm already fluent in Japanese and with pretty good Russian. Finished my degree anyway so no going back.
>>
File: 1499598505454.jpg (74KB, 800x792px) Image search: [Google]
1499598505454.jpg
74KB, 800x792px
>>61557057
As well as a market for portable magnetic scanners.
Just depends on how you look for it
>>
>>61554560

Is it known how it decides what packets/frames are meant for it and what to forward on to the OS, then? I wouldn't be half as worried about it if I could at least block its network communications.

Or maybe I should just fire up Wireshark and figure it out myself.
>>
>>61557057
This is a legendarily terrible idea. Creating systems like this that are so brazenly insecure should be a crime. Those Internet-of-Trash botnets in the making should also be dealt with. Creating an internet enabled TV decoder which automatically forwards it’s SSH port with UPNP while using a default password on its root account is nothing short of criminal negligence.
>>
>>61557452

Nevermind. AT least what intel's documentation says. So guess I'll go and block that shit on my firewall. Not that I don't think there are ways we don't know about.

https://software.intel.com/en-us/documentation/amt-reference/manageability-ports
>>
>>61557500

I can't wait for "The Internet of People."

And you thought making a botnet of 50,000,000 security cameras was a good time...
>>
>>61557057
We all know this is a bad idea.

We all know this is where the rest of world is going to.
>>
>LittleSis is a free database of who-knows-who at the heights of business and government.
https://littlesis.org/
https://github.com/skomputer/lilsis
>>
>>61550981
So there's actually a number of books and resources you can delve into if you're interested in building a rootkit for learning purposes.

These are the books I would recommend you have a look at:
>Rootkits: Subverting the Windows Kernel (by rootkit master Greg Hoglund)
>The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

Here is a video lecture series on Rootkits:
>http://opensecuritytraining.info/Rootkits.html

There's also an upcoming book on rootkits/bootkits by No Starch Press:
>https://www.nostarch.com/rootkits

I would recommend reading a few chapters from the books above which most interest you and viewing some vids from the lecture series, that should inform you on where your rootkit dev skills are at and what you need to know more about (kernel dev, assembly, etc).
>>
>>61557500
>>61557789
It is already several years ago people warned that tech like this could be used to selectively trigger bombs to kill only American tourists rather than locals.

I wonder if people are paid not to pay attention.

I once used to be in /sec/ but found it rather frustrating since nobody would listen until disaster had struck.
>>
>>61558950
>I once used to be in /sec/ but found it rather frustrating since nobody would listen until disaster had struck.
I'm not /sec/ level (I wish) but you made me recall when you try to 'educate' your closest ones to help them and they don't even try.
>>
>>61518752
Ban these Reddit threads
>>
>>61558142
Excellent link anon, I think that anything of this nature should be taken with a massive grain of salt though, considering all the various parties that may have an interest in this site, including the watchdog groups.

>>61559864
Ban these Reddit posts
>>
>>61560024
LittleSis is a legit resource well-known outside the imageboards. Relax.
>>
>>61560192
>well-known
New to me, I learn something new every day.

Coverage is bad for my country, I guess it is US centric which probably is the reason I never heard of it before.

It *is* tempting to set up something like that locally but I guess that would be controversial enough to force it onto an onion address.
>>
>>61560616
There might be loopholes in EU privacy laws for reporting on relationships with and between public figures but I'm no EU lawyer. Non-EU hosting would be wise in any case.
>>
>>61560687
One thing is what is permitted. Another thing is what they will arrange an "accident" for.

Even in Western Europe there have been cases like suicide by multiple gunshots to the head...
>>
>>61560766
>>61560687
>>61560616
>>61560192
>>61560024
>>61559292
>>61558950
The thread is dead, long live the thread: >>61561152
>>
>>61559864
That is ludicrous. I had a look and m,an was that a sad site, just another forgetmechan.nowhere Also shilling Kickstart projects for a book. Tragic.

This general is far comfier.

OK, we are past 301 and still bumpable but it seems from last time 310 is the limit. Also entering the long dark teatime of lesser bumpage. Hang on in there.

Meanwhile: any comments on the FAQ?
>>
>>61561249
It has been posted in the new thread.
>>
>>61555241
If the OP pasta is too complex for you, then spend some time on Wikipedia and ELI5 on reddit to get shit you don't understand under control
>>
>>61558426
Thanks man
>>
>>61558426
Damn, thanks anon.
Thread posts: 308
Thread images: 34


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.