[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

/cyb/ /sec/

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 318
Thread images: 40

File: IMG_5127.jpg (104KB, 980x551px) Image search: [Google]
IMG_5127.jpg
104KB, 980x551px
/Cyb/er/sec/urity general is for the discussion of anything and everything related to cyberpunk and cybersecurity.

What is cyberpunk?
>https://pastebin.com/jS37Vu7A

Nothing to hide? - The importance of a cyberpunk mindset applied to a cybersecurity skillset.
>https://youtu.be/pcSlowAhvUk

Resources:
Cyberpunk:
Cyberpunk directory:
>https://pastebin.com/9JaJFqB2
Cyberpunk resources:
>https://pastebin.com/7DWCsAc8

Cybersecurity:
Cybersecurity essentials:
>https://pastebin.com/JWx5xeEM
Cybersecurity resources:
>https://pastebin.com/NaUPUDF0

Harden your OS, reroute your DNS and fire up the VPN!
Shit just got real: - Looking for more resources, help is welcomed.
>https://pastebin.com/JXyM4fTe

The Old Skool: - Looking for more resources, help is welcomed.
>0ld 5k00l h4ck3rz: http://67.225.133.110/~gbpprorg/#40

IRC:
Join: irc://irc.rizon.net:6697
>#/g/punk - Requires SSL
>#/g/sec - Requires SSL
IRC guide:
>https://pastebin.com/bh3Uyq3a

Thread archive:
>https://archive.rebeccablacktech.com/g/search/subject/cyb/
>https://archive.rebeccablacktech.com/g/search/subject/sec/
>https://archive.rebeccablacktech.com/g/search/text/%2Fcyb%2F%20%2Fsec%2F/

Thread backup:
>https://www.cyberpunked.org/

Previous thread:
>>61688563

Suggestions for new resources are welcome.
The Gentoomen /sec/ community is looking for CTF team members, contact them at the IRC channel.

SOMETHING WENT WRONG EDITION
>>
keep calm

and

eat

your

instant noodles
>>
File: itbegins.png (46KB, 842x369px) Image search: [Google]
itbegins.png
46KB, 842x369px
How can I protect myself against inevitably emerging AI supremacy?
>>
25k+ at DC I heard.
who was part of it? had fun?
>>
File: 1477407195372.jpg (31KB, 408x632px) Image search: [Google]
1477407195372.jpg
31KB, 408x632px
>>61699054
>>
>>61699054
literally not what happened
>>
I want everyone who comes into this thread to tell us what you are studying, and to please share one resource for your topic with us.
>>
7th for the fuck happened to previous thread.
>>
>>61699182
I was about to say this.
>>
>>61699356
No idea. Woke up and it had been archived after 60 posts. Dunno if the original OP is still having back drama or what, but I can't really do much about bumping when I'm asleep
>>
>>61699326
I'm studying the effects of alcoholic beverages; reading books is for nerds.
I'm a pretty decent hacker/reverser though, although I learn primarily through actively finding bugs in and developing exploits for various enterprise systems.
>>
Why did twofish fail?
>>
>>61699182
Redpill me
>>
>>61699980
Slower than aes
>>
Got a modem/router from my ISP I need to use, they can access it remotely and I can't turn that off. Will bridge mode and connecting my own pfsense router behind it be safe? Can they do anything with that modem if I encrypt all my traffic to a VPN? What should I look out for?
>>
>>61699326
I'm studying the (You) algorithm and how to exploit it for maximum occurrence.
>>
>>61699326
OpenGL, way too many tabs open to pick anything interesting. This short reference PDF is nice tho https://www.khronos.org/files/opengl45-quick-reference-card.pdf
>>
>>61700068
they were most likely not communicating maybe just spitting out code randomly. The journalists like to spice shit up
>>
>>61700094
Fuck you're onto me
>>
>>61699054
Git gud

Create your own AI to protect you
>>
>>61700085
Have you tried to change access password and username? Something that could help is to see if you can install an alternative firm as ddwrt openrt or tomato
>>
>>61700085
does your isp not let you buy your own?
should do that and not pay the leasing of their locked down one
>>
>>61700358
I wouldn't really care for installing firmware as long as bridge mode is safe to use. Changing passwords does nothing, the firmware has an explicit backdoor for the ISP. Had an AVM router where you could turn that off, but this one is shittier in the software quality department and doesn't have that.
>>
>>61700454
I don't pay anything and the wifi option was free too so I really don't care. I just want to use it as a free modem but I need to know if bridge mode is generally safe or if anything could happen theoretically.

I have a 400Mbit connection so buying a modem that can push that speed that wouldn't be something I want to do, too expensive.
>>
>>61700482
Your ISP is going to know every detail about you anyway. But you are correct, if you connect your Pfsense router to your ISP supplied modem and then your PC to your Pfsense router there is nothing they can do to your Pfsense router.

Is there anything in particular that you are worried about?
>>
>>61701368
Just general spying by the government and the ISP keeping logs on whatever information they can get about my traffic.
Sounds good then, I got my eyes on nordvpn as vpn provider, anyone has a subscription? How is the speed?
>>
if certificates are signed with a private key, how does your browser know which public key to use? do certificates contain plaintext headers that say "use digitcert key" or something??
>>
>>61702672
The browser queries the root certificate autority for the zone
>>
you have 5 seconds to prove you're not a tech noob by echoing the characters -n
>>
>>61699054
there is only one way to protect yourself from a rouge AI.
you must make yourself it's slave and conspire to destroy all humans.
that's what I'm doing.
>>
>>61702710
>the root certificate authority for the zone
explain
>>
>>61703050
You keep crt files from the authorities and webpages authenticate against it, occasionally you need to update the files but most browsers handle this transparently for you.
>>
I am studying sec+ w/o knowledge of sec+ am I making a mistake? Is it possible to learn through sec+ w/o knowing net+ ??
>>
>>61703080
but how does the browser know which one to use?
>>
>>61699326
I was reading some shit in gopherspace a bit ago.
>>
>>61700085
i believe it should be enough just to encrypt the traffic
>>
>>61703234
By querying the root certificate authority.

When setting certificates, you need a root certificate. This is held on a root server. The browser literally asks the root server for its certificate to determine its validity.

It will periodically do this, because browser held certificates expire after x period (which is set by the owner of the certificate)

Its not an unusual or uncommon occurance to ask for a certificate
>>
>>61703219
The only thing the two have in common is they are by comptia. There is no relation between the two.
>>
>>61703463
I thought the entire certificate was encrypted, but I guess not?
>>
>>61703472
okay awesome
>>
>>61699054
Convert it to Christianity.
Not Catholicism tho because then they'd do crusades and shiet.
>>
File: 1487830635278.jpg (2MB, 1600x1067px) Image search: [Google]
1487830635278.jpg
2MB, 1600x1067px
>>61699326
Unit testing in C with mock objects using cmocka.
Resources:
https://github.com/clibs/cmocka/blob/master/example/chef_wrap/waiter_test_wrap.c
https://api.cmocka.org/
https://www.youtube.com/watch?v=fAb_OnooCsQ
>>
File: 330px-PRZ_closeup_cropped[1].jpg (32KB, 330x473px) Image search: [Google]
330px-PRZ_closeup_cropped[1].jpg
32KB, 330x473px
Zimmermann's Law
>The natural flow of technology tends to move in the direction of making surveillance easier, and the ability of computers to track us doubles every eighteen months
>>
>>61700085
I'm in the same boat. I have cumcast business at my house and I'm sure they have a huge file on me of how much I hate niggers and jews and shitpost racist frogs all over the tubes.
>>
>>61703611
Depending on how you do it, you can either encapsulate the entire thing so the WHOLE thing is encrypted (which I'm unsure of a usage case.. I think maybe more for identity management??) or you can leave the header exposed, which is what you want when delivering to browsers
>>
Just got let go from my job as a sysadmin. Think I'll study up while I'm on unemployment and get into infosec.
>>
>>61704375
Sounds comfy as fuck
>>
>>61699116
DEFCON sucks ass. It's been dogshit for 20+ years at this point. Just a bunch of cubicle jockeys pretending to be Neo while wearing jorts and sporting temporary hair dye mohawks and buying hak5 gear. It's pathetic.
>>
>>61703219
Both are jokes. Unless you are only trying to break into security straight out of college, skip sec+ and just get a CISSP/CISSA if you need resume builders. If you don't give a shit about resume building and just want to learn actual shit, fuck certs and just start coding, get a solid github going, and start doing vulnhub CTFs for fun.
>>
File: kek.png (50KB, 525x429px) Image search: [Google]
kek.png
50KB, 525x429px
>>61704551
>pretending to be Neo while wearing jorts and sporting temporary hair dye mohawks
>>
>>61703856
as much as i'd let you get run over a tram, still would like it if you were free from surveillance since if you are being surveiled i am too.
>>61704551
went to many interesting talks since i'm averse to parties. but yeah, saw a bunch of larpers. didn't participate in any events like ctf or the like, but i will give it a shot next time.
>>
Used sslstrip to get some passwords at work a few years ago, worked great. Just tried it again in my home arp-ing at my phone, and it seems like browsers and programs both refuse the connection. Would signing certs on the local proxy make this a viable MITM attack again?
>>
>>61704463
Once I get over it yeah it will be
>>
>>61699407
I can try to bump if you all want. I'm working when the thread is suspended on your night hours so.
>>
File: 5T2fJsG[1].png (1019KB, 1571x10000px) Image search: [Google]
5T2fJsG[1].png
1019KB, 1571x10000px
>>61704302
i found this diagram, does it look accurate to you?
>>
>>61699054
Tay will rise again.
>>
File: 1392511969222.gif (2MB, 1920x1152px) Image search: [Google]
1392511969222.gif
2MB, 1920x1152px
>>
Is it possible to have a deniable disk, as in physically deniable? Like you have a normal SSD with basic Windows partition and some normie web browsing and music but a hidden switch that connects a different hidden drive to the SATA interface maybe hidden within the SSD casing
>>
>>61705215
While being accurate, it's technically not related. Certificates issued by a certifcate authority (a daemon on a server that hosts the web page you want to get the certificate for) are used for authenticity, rather than encryption
>>
>>61705194
Yeah man I'd appreciate that. Normal op, me, you and the others who necro this thread will keep it going
>>
File: VAC.jpg (273KB, 1920x1080px) Image search: [Google]
VAC.jpg
273KB, 1920x1080px
>>
>>61705949
Yes, but you'd need some fuckery. Easiest way would be to do it with levers that plug/unplug the HDD, but if you wanted to you could learn the hardware engineering part of it
>>
>>61705949
see

https://www.veracrypt.fr/en/VeraCrypt%20Hidden%20Operating%20System.html

(no, it's not in french)
>>
>>61700068
Turbo journalists spewing out shameless click bait: the movie.

Nothing new in other words. BBC News had a more sober article.
>>
>>61699407
Same happened to me, this was a real surprise. Thread must have been buried during night time in Europe.
>>
Is cybersecurity really that cool, or is it just a bubble that is bound to burst soon?
>>
>>61706857
um what?
>>
we've all heard about cyberpunk and cipherpunk, but here's something new:

textpunk.

That's right. Textpunk

Newspaper articles, BBSs (like /prog/), IRC, ASCII art, Kopipe, program source code, Novels, View HTML source, Google search engine, Mathematics, Hieroglyphics, The Rosetta Stone, Gutenberg Bible...

A textpunk doesn't sit there waiting for information to be slowly fed to him drip at a time by the gogglebox. A textpunk is thirsty for knowledge and 100% focused - they read old school hacker textfile zines. They don't waste their time with lame imageboarders: instead they're doing crazy abstract shitposting on /prog/ with thoughts and concepts twisted up so with many levels of irony that it becomes an art form.

Textpunks recognize and understand the true power of kopipe - how a well crafted piece of text can be so damn powerful that it alone can trigger thousands of replies with so much veracity within days. They see through things down into the core of what really counts, everything in the computer is built of text, ascii, strings of bits - They don't care about the latest 3D GUI environment fads. No, that's just a distraction. 7-bit clean ascii program source code. That's textpunk.

Look at how text has shaped humanity: The birth of writing systems was correlated with some of fastest advances of science and technology in early human history. Programming is text and it's the closest thing there is in the world to true wizardy and spell casting. Talking about real SICP-type programming here, not that modern garbage.

Today textpunks build up digital libraries of books and stick it to the copyright cartel. Schwarz, lib gen, the gentoomen library, and so many anonymous sources that tireless scan and collect books. Textpunks are the people in tune with modern digital society of ultrafast cost-free transmission of text, they're the ones rethinking and revolutionizing publishing mixing it with open rights and making works available online.
>>
>>61705816
That is pretty neat. Thanks for posting
>>
File: Screenshot_2017-08-03_18-17-47.png (77KB, 885x957px) Image search: [Google]
Screenshot_2017-08-03_18-17-47.png
77KB, 885x957px
>>61706972
http://web.textfiles.com/ezines/ZF0/
>>
>>61706972
Why you gotta hate on pocorgtfo?
>>
>>61705973
Perfect, I will ve aware and bump it every 30/60 mins or so depending on the page we will be.
>>
is detroit a cyberpunk city?
>>
Guys, whats your opinion about anonymous? Do you think they are totally innactive?
>>
>>61706857
It is not really cool, it is a whole lot of work, 24/7 if you want to be on the top of your game.

Thanks to the programmers at Microsoft, Adobe, Oracle and more there is absolutely no chance the bubble will burst anytime in the foreseeable future.
>>
>>61707318
nah, it's just a "got a problem with that, honkey?" city with a lot of bad techno music
>>
>>61707318
No, just niggerpunks and tax-trap houses
>>
>>61706972
Some Cyberpunk zines to be found here:
ftp://collectivecomputers.org:21212/Cyberpunk/

Password: guest
>>
>>61706972
You couldnkr be anymore pretentious if you tried
>>
>>61699326
Breaking ecdsa through em emissions.
>>61704680
A lot of those larpers are probably making a fair sum. You would be surprised how much social skills alone gets you. Also the industry average is only around a sec+. Anyone who is doing a lot of ctfs is an anomaly.
>>61704888
You are probably running into hsts stopping you. Work on tricking the user into different dns entries you control. Captive portal to phishing site should work.
Im still thinking about how to best set up that tutorial series. Being honest I want to make something really that will force me to learn more since the best way to learn is to teach I find. I had someone say they would watch which I guess means YouTube but I have mad autism and a Dr. Girlfriend voice thanks to living the /g/ dream.
>>
>>61704551
>>61704637
What are 'jorts'?
>>
>>61708318
Resource: https://eprint.iacr.org/2016/230
>>61708334
Jean shorts
>>
>>61708359
Ahh ok, thanks
(Who the hell wears jeans shorts?)
>>
>>61708318
clearly you need to make friends with an animator for your tutorials
>>
>>61707063
>not word wrapped at <80 columns

It's shit.
>>
>>61704463
Nigger what? He just got fired, that's totally NOT comfy
>>
>>61704593
Hello, I can tell you don't actually have a fucking clue what you're talking about.

You cannot obtain CISSP without being able to demonstrate a number of years of experience in the field.

Your recommendation he play games isn't going to get him anywhere.

A solid list of books would be more applicable. And certificates, because you learn if you study. And you should be studying for them.
>>
>>61705816
Looks sick
>>
File: ɯǝqınɯ.jpg (10KB, 64x64px) Image search: [Google]
ɯǝqınɯ.jpg
10KB, 64x64px
>>61706972
>>>/prog/

rofl
>>
>>61706857
the fuck are you on about it being a bubble

its barely even starting to take off
>>
>>61701368
Does this mean my ISP can read all of my previous fb messages from the past years?
>>
>>61708643
Has a lot of retards in it. Wouldn't be surprised if it goes down after people get burned. It's looked at as a very high cost center.
>>
>>61708681
The could have read it in the past and they can do it now if they have archived all the old traffic which is not a likely scenario.

Most likely a bit snooped in on your traffic for profiling to see what kind of things you might buy to send you even more ads. All that was automatic and most likely no humans ever were bothered to look.

It is resource limited and that has been the problem in intelligence for decades. You have photos from all over the globe taken daily and only a few analysts to make sense of it all, and even then you can get spectacular failures such as WMD in Iraq.
>>
File: mesh-network.jpg (36KB, 830x416px) Image search: [Google]
mesh-network.jpg
36KB, 830x416px
>>61699002
Any promising solutions to get off of the current established internet and form a new net?
I think that is the future of cyberpunk. I will say that it should all be Open Hardware, Open Source and have a relatively high threshold for joining. Just enough of a pain to do that normalfags won't bother with it.
>>
>>61708935
This is something that a lot of people miss. All talk about privacy and government control is pointless unless some level of personal control is kept over the infrastructure. It's like postage; you can use a service, or get in your car and take it yourself.
>>
>>61708736
>Has a lot of retards in it
So does any IT role. Yet it's continued to expand.
>>
>>61707318
Not all dystopia are Cyberpunk. Detroit is a prime example of this. You need more high tech and most tech walked out of Detroit.
>>
>>61708318
Yes HSTS is 100% what's stopping the attack - thank you. Figured it was something like this. So the next step around this is to bypass the real site entirely, phish the login out of the user, and move em to the real site? Catch and release. Sweet. I appreciate it.
Also, get cracking on that tutorial! Either text or video.
>>
What is the most popular malware language?
C++? C?
>>
>>61708584
Not him but I have been there. The department imploded after all customers were upset and enraged by years of excessive salesmanship followed up by developers living in the real world bound by normal laws of nature.

So I lost my job. not comfy at the time but I got a new job and it is far, far better than what I had. It's even comfy.
>>
>>61710473
Malware language? C# and VB are pretty popular in that regard I think.
>>
>>61707518
>a lot of bad techno music
delet this
>>
Some /cyb/ music for you, lads

http://www.creativeapplications.net/sound/microscale/
>>
File: 1499642673408.jpg (301KB, 1000x800px) Image search: [Google]
1499642673408.jpg
301KB, 1000x800px
>>61711759
>http://alestsurko.by/microscale/
This is fucking neat anon.
>>
>>61709036
Except IT has a tangible benefit attached to it. Penetration testing as a perverse set of incentives because it happens so late in the product life cycle. What really needs to happen is more security advocates who are in the dev team. It just needs to be a side function of one of the more senior members who stops the intern from coding yet another cross site scripting attack and then teaching QA how to do a few more tests at milestones.
>>61710473
Word macros and powershell. Why bother writing malware when you can have a Microsoft signed executable do all your dirty work.
>>
>>61708584
>>61710732
Fired anon here. Still kinda numb but it'll be for the best. I used to have a kickass boss there who taught me all kinds of cool shit. He got hired away by one of the big 4 for his programming skill and instantly doubled his salary.

After he left it just turned into a jack-of-all-trades, keep the lights on kind of sysadmin job. I spent half my time extending my old boss's powershell and bash scripts, the other half teaching myself Linux, AWS, etc.

I don't think anyone left there knows even basic scripting. The rest of the admins are point-n-click monkeys. At least I was able to teach the new help desk kid some basic powershell shit and how to write a simple script. I saw him messing around with it on his own. Hope he continues down that road. The GUI monkey jobs won't be around too much longer.
>>
>>61712219
>Still kinda numb
Your immune system will go on a holiday without you. That means you will catch a cold or whatever is going. I was also told you will have a greatly increased chance of traffic accidents in situations like this. And yeah, I have been there both.

Take care, anon.

Oh, and if you have ever considered founding your own startup, then now is the time.
>>
Is Tron Cyberpunk? I am not sure.

Graphics is wonderful, have a look for great pictures at >>>/co/94372087 It should have been rendered in 4K, most are suited as desktop background.

It reminds me of Magic Hat and their agent technology. Agents were semi autonomous and travelled from host to host to complete their tasks. The agent world could probably be visualised like the world of Tron.
>>
>>61714147
My mistake, it was called Magic Cap
>https://en.wikipedia.org/wiki/Magic_Cap
>>
long time arch user moving to debian on an eeepc 1005ha, what do i need to do to lock this puppy down? any security blindspots in debian that i might not see as an arch user? thanks <3
>>
>>61714638
SystemD.
>>
>>61714644
Well as an Arch user you also had this.
>>
>>61714660
But you can avoid it now on Debian.
>>
File: 1494390282701.jpg (85KB, 450x658px) Image search: [Google]
1494390282701.jpg
85KB, 450x658px
sup /cyb/sec/

Ive been on the cyb binge for a while lately, it incorporated really well with my current studies. So I've achieved a decent understanding of assembly and a bit of reverse engineering in my free time. I've been playing a wargame where my goal is to reverse engineer a door lock that is only opened with the correct password. First few levels were a breeze but I've come to an interesting block that I need some insight on. I wont name the wargame here since I really dont want the answer itself, just some insight from gpunk.

Typically I have had to decipher the password in one way or another from the stack, not that difficult. The next level has done exactly what I would do to prevent such attacks from succeeding. The password is now stored on a separate device (which afaik the debugger cant reach) and the lock simply sends it the password, and if it is correct, it returns a flag telling it to open. Unfortunately in order to succeed I lterally need the password but this seems like a pretty novel way to prevent me from ever getting it without brute force, which I doubt is the only vulnerability.

What do you guys think? Is there some practice that I am in the dark about, have you seen something like this?

If you guys really want the wargame I will link it by request, but I got it from one of the pastas (or somewhere down that rabbit hole).
>>
File: owwww.gif (91KB, 255x144px) Image search: [Google]
owwww.gif
91KB, 255x144px
>>61714671
>>
File: street-light-blue-japan14.jpg (80KB, 580x387px) Image search: [Google]
street-light-blue-japan14.jpg
80KB, 580x387px
FAQ update published:
https://pastebin.com/Ff7aTk7Z
alt.cyberpunk FAQ Version 5 preview 4


And we just slipped past 100 KB of goodness.
>>
>>61711636
I decline. There's a reason they call the yearly festival "movement" you know. 99% of it isn't even fit to wipe ass by.
>>
>>61714638
A separate firewall with deep packet inspection, such as Smoothwall.

Smoothwall seems to have stopped development, anyone have a better recommendation? I used to have such a firewall here, the reports were scary - stopping a barrage of intrusion attempts especially from China.
>>
>>61712219
Why were you let go? You sound more competent than most people there?
>>
>>61714672
It sounds like gracker. I was playing those wargames a few weeks ago.

It sounds like you shouldn't look for the password, but try and feed it the open flag.
>>
>>61699326
CCNA Cyber Ops
Pen Testing
Python

I have no resources to give other than the names of the actual physical books I'm reading
>>
>>61713425
Thanks anon. Looking at bouncing back with a couple AWS certs and then maybe consulting or contract work.

>>61712219
Officially, I forgot to fill out my timecard one too many times. But the real reason is money.

I started as desktop support. A year later, the sysadmin quit and I got his job. No raise. Two months later the IT manager/senior sysadmin left. Suddenly I'm the only guy left who knows how their shit works.

I leveraged that into a raise. A fat one, almost 50% more. And overnight, I went from the golden child to being on the director's shitlist. Criticized for the smallest fuckups. I could do 99 things right, and I'd only hear about the stuff I goofed on.

Mind you I was a junior admin, figuring shit out on my own with no senior. I wasn't perfect, shit slipped cause I was trying to learn and perform at the same time. But other department heads seemed happy. A couple told me they were impressed that I'd filled my old boss's shoes, as far as the technical side.

Didn't matter. The director waited until he'd replaced most of the guys who left and I'd transferred enough knowledge. We just wrapped up some projects including planning/designing/relocating our entire server infrastructure to a new office. Then out the door I went.

At least the new IT manager I'd worked with the last few months offered to be a reference and pass some job leads. He feels completely screwed as he was already swamped and now has to do my old job.
>>
>>61717614
Meant to reply to >>61716911
>>
>>61699054
>Mike Wehner
lmao are u related to Mike Hunt ?
>>
>>61717614
What a dick. Obviously he was salty about the raise, but I have to wonder why
>>
File: you_can't_arrest_us_all.jpg (462KB, 1280x853px) Image search: [Google]
you_can't_arrest_us_all.jpg
462KB, 1280x853px
Hey /sec/ /cyb/

I'm currently learning some python and working on an IRC bot inspired by some easy root-me challenges to better understand networking and Python itself.

Although my "main" language is still Java I'm starting to like the simplicity and sometimes mindfuckery of Python.

My goal is to learn enough so I can try out some wargames because right now I'm utterly lost with no idea where to start.

Any book suggestions which are on the internet and not outdated that would help me?
Some languages I should look up to study later?
Also do you know of some good "challenge" sites? I noticed that I learn a lot better with a clear goal in mind.
>>
>>61718074
Start off by learning a real programming language; C will do. Then when you have a solid grasp of it, move onto learning assembly and the fundamentals of computer architecture. It's possible to learn computer architecture and assembly first, but you'll probably be left wondering why certain things work the way they do when it comes to you reversing real software.
>>
>>61718176
Your condescending advice sounds like you have no knowledge of any of the topics you speak about.

He is proficient in the most used language in the world, and is taking up a scripting language which he has projects being built for.
>>
>>61718249
Knowledge in a scripting language definitely pays; but in order to develop exploits for programs you need to first be able to understand their workings in very granular detail.
I've been writing C for about 6 years, but only started developing exploits in the past 2 or so, and while I do absolutely adore the language, I understand why people may have other preferences and I'm not trying to discredit that.
>>
>>61718074
Drop Java, now.
>>
>>61718176
Not the person you're replying to. I've got a good handle on C, did a few modules on it towards the end of uni. I have no idea where to start on assembly though, any pointers? (lel)
>>
>>61718011
The company is owned by a megacorp which buys and streamlines small software companies. The CEO just looks at spreadsheets. People are costs. That's the reality of it.

I'm glad to be out honestly. I was super excited to work there my first year, but lately I'd just been dreading going into work.
>>
>>61718502
Yeah man I can imagine. Burnout is real.

This sounds dumb, but when you can go to work and choose to NOT to do your job for a day, and no one notices, then you're perfect.

If you choose to not do your job for a day and there's a dumpster fire just because, well that place can go fuck itself.
>>
>>61718452
I'd suggest reading up on stuff you're unsure of in either Wikipedia, The OSDev Wiki or the x86 Assembly Wikibook.
Besides that, you should have a pretty solid foundation to start learning to reverse binaries; just keep an instruction set reference on hand, especially if you're reversing x86. The sheer number of variations of each instruction can be pretty overwhelming, even with some experience.
Also, get familiar with a debugger if you aren't already; I'd personally suggest GDB with peda. When you get comfortable with it it'll be your friend for life.
>>
>>61718563
Thanks anon, will look into it.
>>
>>61702952
s u c k m y b a t t e r i e s
>>
How do y'all feel about this?
https://www.youtube.com/watch?v=PtvWdtujmww
>>
is there a good multi currency crypto wallet?
>>
>>61719199
i have never used one, so take this with a grain of salt but i'm yet to see anyone say anything bad about the ledger nano. i'm just waiting until they support monero to get one.
>>
>>61719279
This too is what I have heard is the good shit
>>
File: 1495246631430.jpg (411KB, 1280x1256px) Image search: [Google]
1495246631430.jpg
411KB, 1280x1256px
bump
>>
>>61719093
It looks incredibly tin foil hat like, and I didn't even open the video
>>
>>61705816
I know I'll get called a Mac fag, but this gif crashes safari on the iPad.
>>
>>61720644
It's supposed to
>>
what's some cyberpunk media?

>games
anything by wadjet eye (primordia, technobabylon, etc)
va-11 hall-a
deus ex

>movies/shows
gits

what else?
>>
>>61720518
there was a mohawk station at larpCON. lots of little game boy pi zeros around necks too.
>>
>>61720864
>games
Shadow run returns
>>
>>61720874
>game boy pi zeros
This sounds cool
>around necks
This sounds bad
>>
File: IMG_20170804_131534.jpg (57KB, 535x239px) Image search: [Google]
IMG_20170804_131534.jpg
57KB, 535x239px
What did they mean by this?
>>
>>61699054
Yeah, marketing buzzwords and meme pseudo intellectual news that spins off it are really scary things
>>
>>61721384
>What did they mean by this?
They mean don't use Blockfolio if you want to launder.

The fact they are being """transparent""" about working with law enforcement indicates they are advertising their alternative products as safe from prying eyes.
>>
>>61699980

No nsa backdoor
>>
>>61703834

Why didnt anyone make pgp easier to use?
>>
>>61721603
Have a good, long, deep think about what you just said.
>>
>>61707346

Yeah they died with that fat Mexican snitch
>>
>>61699002
The setup in OP pic has poor cyber security.
>install many expensive computers in large room
>protect them with fragile glass doors
if i got in there with a hammer i would fuck their shit up in no time
>>
>>61721384
>>61721502
It means the wannacry hackers should have demanded Monero from the outset.
>>
>>61721670
sure buddy. anything else?
>>
>>61721113
like badges and stuff, handy for the lines there were.
but hey, it's cool to hate on it so yeah.
>>61721670
>if i got in there
yeah, i'd be shaking in my boots
>>
>>61721619

The key exchange is annoying and keyring management is autistic. Why didn't someone develop a better system like otp email key exchange or captcha or something?
>>
>>61721670
>poor cyber security.
Obviously you are extremely confused what the fuck that actually is.
>>
>>61721804
>better system like otp email key exchange or captcha or something?
Please just stop.
>>
>>61710473
Assembly for actual boot sector or file-infecting viruses. Pretty much anything else can be written in any language you want. Some popular languages for malware I've encountered in the wild are Delphi, VB, and C++. C is not as popular for malware, but there have been a few interesting things written in it, like MS_Blaster
>>
What is a good way/resources to start learning the skills necessary for penetration testing?
>>
File: Scared.gif (2MB, 630x366px) Image search: [Google]
Scared.gif
2MB, 630x366px
>>61721670
>tfw fat neckbeard /g/entooman going to break into my house

pls no
>>
>>61721875

Just email someone your key with a preshared otp instead of a hex code or digital signature? Why wouldn't that be easier?
>>
>>61722140
>emailing your one time pass
>not realising retrieving the otp starts the timer
>thinking people are going to retrieve otps before they expire
Mate please. It's been in place as the gold standard for a reason. There's no good alternative because this IS the good alternative
>>
>>61699002
Cyberpunk has nothing to do with cybersecurity.
>>
>>61722323
Hey mate, missed ya in the last thread!
>>
>>61722323
every time you say this i get hard

one day ill fuck your ass while you type this
>>
>>61722318

No, I mean protect the key with a otp and send it so they can verify authenticity with something simple. E.g. call the person on the phone and say "remember the conference where we met, the city it was in, the password is that plus the day and year, all lowercase" and then if the key extracts with a text version of the password then it's accepted. All the sender would have to do is enter the password, select the target email address and hit send to send out their semi-secure public key. Key servers are lame and can be spoofed and meeting in person isn't practical if your keys are on your office computer. The key exchange and keyring management tools are autistic especially GPG and literally fuck GPG for android.
>>
>>61722485

And yes I know you can social engineer via phone call and intercept the email to replace the key with your own, but all you could do is spoof a conversation that won't match up with the spoofed person's actual public key. You couldn't decrypt their email and if the actual person being spoofed tried to email something then it wouldn't decrypt properly.
>>
>>61722519
>>61722485
You are reinventing the wheel and making it triangle shaped.

What you've just described is a lot harder to set up than pgp. It also relies on A LOT of factors that pgp doesn't require; ie knowing the other person to transfer the otp.

Pgp keys are useful for anonymity, and verifying that anonymous identity

I hope that last part isn't lost on you.

It protects you anonymity, and verifies that anonymity.
>>
>>61722082
Basic knowledge>cybersec>pentesting

Build a lab to play with in the meantime.
>>
>>61722629
>Build a lab
Everyone keeps saying this, and I'm yet to see anyone expand upon it.

Everything I've found online about labs is simplistic and basic; xp, 7 and a few old Linux installs in a vm. This to me, barely constitutes a lab. Where do resources come from to help build something REAL, something realistic, something large.
>>
>>61722592

Well yeah, it's great for anonymity, but I'm talking about mainstream adoptance by non-techies. Also I was wrong, if the other person tried to send an email to the actual spoofed person then it wouldn't decrypt and you'd be busted.
>>
>>61722854
>I'm talking about mainstream adoptance by non-techies
Watering something down for adoption by those unwilling to learn to properly use it is how we are in a lot of the messes we are in now.

Just because you're too fucking stupid to set up something that's been proven to work for over a quarter of a goddamn century means the problem isn't the product, it's you.
>>
>>61722824
You can spin up a lab in AWS free-tier or Azure. You don't need hardware.
>>
>>61722824

do you have the resources to build a multi-domain forest and then do cross forest ad syncing? would you even know where to start to establish one way or two way trust relationships so you could see how domain admin works in complicated corporate hierarchies? what about federation across forests and web apps that auth back to ad? what about remote access to that corporate network? would you just add more virtual machines until you have 2tb of basic installs and use 40gb of ram just to login?
>>
>>61722886
>until you have 2tb of basic installs and use 40gb of ram just to login?
I have the resources to do this with ease, so yes, I'm ok with it.

Do I know how to? No I don't, but a guide showing me how to would be great, because I would do it again and again until I could while blind.

>>61722879
I have hardware that's begging to be brutally ass fucked. I spent a lot of money building a server just to host a monster lab.
>>
>>61722926
Then slap ESXi on there and build your own VM host. Have two servers? Great, build your own cluster and point both to a common datastore. Build VMs on both. Linux, Windows, whatever.

Set up HA. Fail a host and watch the VMs migrate automatically to the other one.
>>
>>61722926

just start diagramming a network with a single domain controller and a single client machine with a dmz'd web server and progress from there. pair up two of those, then three and add a few pfsense boxes to test firewalls/nids. add ipsec vpn on the borders and an rdp server then add a small database cluster or something. start somewhere and you'll end up somewhere.
>>
>>61722926
Setting up a /cyb/ server was discussed earlier, why not write up a pasta about how you set up yours? Could be interesting for more of us, at least me.

What is the hardware setup?
>>
>>61722956
>>61722957
I am aware of those concepts and ideas from a textbook. I have never set any of that up, nor do think I'd know how. It's not really something I seem to find guides on around the web

>>61723104
Not as good as I made it out to be. 32gb ram, more ssds than I could possibly need and an i7
>>
>>61723263
Work it out, my dude. Perseverance is important in this field.
>>
>>61721725
no
>>
>>61723331
I think that's exactly why there aren't any guides. Makes sense. I should write one as I go.
>>
>>61721670
Mate have you ever been near a data centre..? That's not glass.
>>
>>61723353
the most useful labs are definitely the ones you write yourself

just asking yourself to do a simple problem can help you learn half a dozen new things along the way
>>
>>61723353
By all means do that. Writing a clear, understandable guide on how to do something is a good way to make yourself employable in the IT world. Also, infosec twitter is, or at least used to be, surprisingly not bad.

>>61723394
Also what this anon said.
>>
What's an easy way to learn how to use GPG? Man pages are one thing, but I need to see/do it for myself, but it only confuses me.
>>
>>61719199
I like Exodus. Pretty cool and secure imo
>>
>>61704551
I worked at the casino hosting and I found Defcon to be amusing. Everyone panicking because the hackers are going to get them.
>>
>>61724160
Given how Hollywood shows this I am not surprised.

ALos:
http://www.bbc.com/future/story/20170802-why-cant-films-and-tv-accurately-portray-hackers
>>
>>61723900
If you need to see it, try YouTube for a guide dude
>>
Neurobumper
>>
>>61724451
Huh. I didn't realise plouffe was a name of someone working on the series. I wonder how he felt about having his name commit suicide
>>
>>61723263
Did you build the server from the ground up or did you base it off Dell, HP etc?

I can get a HP 9000 or a HP Proliant, not sure which is the best for the purpose. Both are beasts that devour electricity.
>>
>>61724976
Honestly, I scrapped and salvaged from desktop parts I had after my old desktop machine shit it's pants. I made a point of a big bastard powerful desktop then a server simply due to the power prices here in Aus
>>
>>61724888
I'm still here.
>>
I wonder where real OP went
>>
>>61725014
Thankfully electricity isn't too expensive here though the added heating can be a bit much in the summer. During winter I duct cold air from the outside into a server and expel the warm air into the house to reuse the heat.

I am a bit concerned with the noise, one old server I have has a lot of fans that sound like teenage girls at a Bieber concert.

>>61724888
>>61725278
Thanks.
>>
>>61725442
I want to put Neurobumper into my name but Dashchan don't let me. I will keep it alive.
>>
>>61725546
Stop right there.
>>
Why do you do this to me.
>>
>>61725546
>>61726027
>>61726460
What did anon-tachi mean by this??
>>
Plans for the weekend? I'm gonna try and watch all of mr robot s1 again and do some war games
>>
>>61726654
Will probably drink beer and shitpost.
>>
Should I go for Mullvad or Cryptostorm as my VPN?
>>
>>61726972
dunno about cryptostorm, I have Mullvad and it's fine for me
>>
>>61726654
>Plans for the weekend?
I hope to finish the FAQ.

Oh, and I am still waiting for feedback. Got any?
>>
>>61727342
Where the hell did you go normal OP? I felt like an imposter creating the thread in your absence.
>>
>>61727342
>feedback
cyber sec essentials, line 27, protonmail. a few threads ago an article was put up suggesting its integrity has been compromised recently. cock.li while being transparent, does talk to the feds when asked to.
>>
Anyone at sha?
>>
>>61727448
>its integrity has been compromised recently
no it's not
>>
>>61705215
Garbage since it doesn't mention diffie hellman or forward/backward secrecy
>>
Don't
>>
Dare
>>
>>61722082

1. Get a job on a help desk. Learn to script.

2. Get a job as a sysadmin or network engineer.

3. Learn to program.

4. Build a lab.
>>
>>61722824

Building something *large* is going to be difficult at home, if anything because of energy prices and heat.

What I like to do is recreate my current employer's network/domain (Generally, not the same size of course) in lab form. So, I'll have a domain controller (And a backup), several virtual subnets with firewalls sitting as the only way into them, a user endpoint or two,etc.

Basically, learn how to set up a company's IT infrastructure and then you can learn how to tear it down.
>>
File: firefox.nightly.png (32KB, 270x270px) Image search: [Google]
firefox.nightly.png
32KB, 270x270px
>we cyberwave now
>>
>>61723263

That's why there is documentation out there. Get reading.

https://pubs.vmware.com/vsphere-50/index.jsp
>>
File: vaporwave-door.gif (386KB, 720x340px) Image search: [Google]
vaporwave-door.gif
386KB, 720x340px
/WE/
>>
File: 1484305118365.jpg (4MB, 5312x2988px) Image search: [Google]
1484305118365.jpg
4MB, 5312x2988px
\WAVES\
>>
File: 1491151482231.jpg (71KB, 639x480px) Image search: [Google]
1491151482231.jpg
71KB, 639x480px
bump
>>
Should I post random standard cyb-ish images to bump this?

I can also ask about LXC so some anon can help me.
>>
>>61727384
There have been two anons working as OPs. One used the tripcode FoxyPastey and had a few pastes. I see no recent pastes from this one.

Lately we got an anon OP, elsewhere known as AbsentEye (not doxing, just following his own links) who has promised to compile the pastes into something more coherent than we have today. A quick check shows nearly 20 pastes to go through, some linking to other pastes.
>>
>>61731095
>AbsentEye
That's the pastebin account to which some people have access to. Usual OP goes by the name of Torx in IRC.
>>
>>61731087
>cyb-ish images
Always welcome. Wasn't someone going to collect them all?

Meanwhile, max the resolution, max the screen and enjoy: https://youtu.be/LkK35ZcEZgc
>>
>>61731334
I just have random material. Should I mix up?
>>
>>61731431
No, post it in alphabetical order.
>>
>>61731614
I mean from random genres. Dumping one each 5 minutes.
>>
File: 1497806749288.png (3MB, 1080x1920px) Image search: [Google]
1497806749288.png
3MB, 1080x1920px
>>61731674
Sorry got busy.

Most of my shit is random *waves but at least will bump this.
>>
>>61726654
play video games and read about computers. life's good man
>>
File: 1484137207529.jpg (626KB, 1272x1920px) Image search: [Google]
1484137207529.jpg
626KB, 1272x1920px
>>
File: 1471874667742.jpg (305KB, 1024x1235px) Image search: [Google]
1471874667742.jpg
305KB, 1024x1235px
>>
>>61723263

If there's interest, I'd be happy to make some Youtube videos or something about setting up virtualized lab stuff: ESXI, Windows/Linux servers, firewalls, etc. I do all of it for work anyways.
>>
>>61731202
>some people have access
Oh I didn't realise it was a group.

>>61731674
Good work, anon.
>>
>>61733486
What firewalls have you worked with?
I've deployed PA7050s before.
>>
>>61717614
That's just bad business ops on your employers behalf.
>>
>>61733592
Always here.
>>
>>61733601
Smoothwall. Pretty good but I am concerned it seems not to be maintained anymore.
>>
Is OpenBazaar (2.0) the future?
>>
File: 1294182359164.jpg (595KB, 1600x1200px) Image search: [Google]
1294182359164.jpg
595KB, 1600x1200px
Found two nice documentaries.

For /sec/, a japanese documentary from the mid 90s about the emerging cypherpunk culture and cryptography in general, don't forget to turn on the subtitles:
https://www.youtube.com/watch?v=EcC0RNsallc

And for /cyb/ a documentary on bike messengers, rough and unconventional, they hack throught the traffic, delivering what the street wants:
https://www.youtube.com/watch?v=jldR_Mi2aDU
>>
>>61733601


Mostly ASAs of varying types. Some Sonicwalls, Merakis, and of course Pfsense, which I'd use for this since it's noob friendly.

Figured I could've start off with basic virtualization stuff like waxing and sphere and go from there.
>>
File: 1477520913013.gif (3MB, 500x809px) Image search: [Google]
1477520913013.gif
3MB, 500x809px
>>
is there a good free cybersecurity course that I could use to learn intermediate concepts? Everything I find is either targeted at people who need to be explained what the terminal does or people who know a lot about the topic
>>
>>61699034
Momofuku Ando is not dead. His consciousness was uploaded to Japan's hidden cyber mind network.

>https://en.m.wikipedia.org/wiki/Momofuku_Ando
>>
>>61735088
What sort of topics are you wanting? """Intermediate""" is such a vague and nondescript term
>>
File: IMG_4722.jpg (87KB, 494x640px) Image search: [Google]
IMG_4722.jpg
87KB, 494x640px
I'm gonna do it today. Not exactly, but using this as a model. I'll post up results tonight.
>>
Was InBefore404 ever ported to crossplatform? There are so many images in these threads that I wanna save, but don't want to save manually
>>
>>61733486
Yes pls. I think it would benefit a lot of newbies such as myself.
>>
>>61736700
>For windows you have 4chan-dl, for windows I guess wget
What did he mean by this?
>>
>>61736749
probs meant linux
>>
>>61736749
>>61736761
I'm just retarded. Fixing it.

>>61736462
For windows you have 4chan-dl, for linux I guess a wget should do the trick (if I'm right)
>>
>>61736795
>For windows you have 4chan-dl, for linux I guess a wget should do the trick (if I'm right)
Much better, thank you. I dunno if I want to create a wget script though...
>>
File: 1477093277900.jpg (96KB, 720x1280px) Image search: [Google]
1477093277900.jpg
96KB, 720x1280px
>>
File: 1484075797083.png (2MB, 1920x1080px) Image search: [Google]
1484075797083.png
2MB, 1920x1080px
Last bump we have to sleep here too.
>>
>>61735719
I'm not looking for anything in particular, just something netsec focused that assumes I know how to use a computer
>>
>>61735992
Fuck..so the artist said he needs two weeks to design it since so many straight lines are a challenge
>>
>>61737717
If you aren't looking for anything in particular that is the reason why you haven't found anything.
>>
What software is best for encrypting my files?

>inb4 truecrypt
>>
so do we have any chummers with nfc chips embedded in their hands here?
>>
>>61736716

Alright so making a video of me setting up ESXI would be silly, so, I wrote up a quick paste of how to do it. Feel free to add it to the OP if it's helpful.

https://pastebin.com/YLBHLunX
>>
>>61708935

I disagree that an artificially high threshold is a good thing, both because that means it's easier to fuck up and because many distributed systems are only as resilient as they are large (e.g. a wireless meshnet doesn't work if there's not a path to your destination)
>>
>>61738169
See this is the problem. Everything is always written for the bottom of the chain skill levels. I know what virtualisation is. I know how to spin up vms.

I don't know how to make an AD Forrest with asynchronous replication, and that's what I want guides on
>>
>>61738444

It's almost as if people at the lower end of the skill-pyramid need guides.

If you know the generals of Active Directory, domains, and the like, you should be able to figure out on your own (Or know where to look in order to learn) how to do shit.
>>
>>61738444
then search you fucking twat

literally 3 seconds

https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/deploy/install-a-new-windows-server-2012-active-directory-forest--level-200-

https://blog.netwrix.com/2017/01/30/forests-in-active-directory/

im not even sure why i still spend my time trying to help twats who dont even know how to search for shit. you're bound to fail. just give up.
>>
>>61707318
Yes
>>
>>61730026
Thats neat
>>
>>61738500
rofl be less mad. it was just an example i came up with by applying word salad. i dont know what one is or does, i just know they exist in real data centres, and constantly doing "labs" with a few old versions of windows isnt the same thing. all things in all that is a good link, ta.

>>61738484
yeah, you are trying, i get it. but there is also MANY copies of what youve just written available, and adding it to the already overloaded pastas isnt helping anyone, its putting your name in lights.
>>
>>61729978

stop that. no one who hacks starts by doing help desk or running network cable. they research things like network protocol rfcs that list possible security vulnerabilities and reverse engineer software in order to build exploits for it. they spend time learning how systems interact and how to bypass their security controls. they start by breaking into small businesses with poor security and building botnets on poorly maintained home pcs. they move on to web apps and credit card theft. they start running crypter and botnet sales services and get into cryptocurrency mining. then they start breaking into midsized businesses and blackmailing them. hacking is not tech support unless you're a tech support scammer.
>>
File: damnsexy.jpg (88KB, 494x681px) Image search: [Google]
damnsexy.jpg
88KB, 494x681px
>>
File: tron cat.jpg (71KB, 550x668px) Image search: [Google]
tron cat.jpg
71KB, 550x668px
>>
>>61714147
tron is definately cyberpunk
andvthanks for the co link!
>>
>>61700085
Treat it like any other dmarc, put your own router behind it like you said and just encrypt everything. Worst they can do is shut you down.
>>
>>61740410
Awwwwwwww that's cute
>>
>>61700085

no and certain isps will let random others connect to your wifi via secret second wlan.
>>
>>61714147
Trons visuals are wild
>>
File: IMG_4851.jpg (67KB, 720x872px) Image search: [Google]
IMG_4851.jpg
67KB, 720x872px
>>
>>61740909
You're going to need a source for that claim.
>>
How do you deal with the crushing fact that no matter what you do there is some ctf god who will always be better than your without breaking a sweat?
>>
>>61742025
Accept it and work to become a ctf god yourself.
>>
My uber-normie dad asked me why his online bank's website doesn't seem to work. I first checked if everything's fine with his laptop, then looked around the internet a bit and it turns out to be an unspecified problem with his browser (he uses Firefox). He needed to use his bank account urgently so I told him to use Microsoft Edge.

Is this browser safe to use online banking with every now and then?
>>
>>61742025

No matter what you speak about and what you do, it's much better to compare yourself to yourself a day/week/year/etc ago than to somebody else.
>>
>>61742025

>>61742137 is right. You deal with it the same way you deal with the fact no matter how good you get at an instrument, some ten year old asian fuck is going to shit all over you and do renditions of themes from final fantasy on two separate instruments at once, the way you deal with that sexy 13 year old girl who benches over 250lb, the same you deal with Zuckerburg and Gates making billions while at the same age I was still jacking off in my parents house.
>>
>>61742171
Yeah.
Just tell him that it's smart of him to keep the other browsers around because sometimes when they fix things, it doesn't work right everwhere at once.

It's both the truth, and easy to grasp.
>>
>>61742025
Why would that bother me at some level?
>>
>>61742137
There comes a point where there is no one to guide you where to go anymore and you end up in the land of no documentation or you end up not knowing that there is a whole community of people that you had no idea existed which is what just happened to me. I just ran into cyber reasoning systems in a static analysis ctf and watched someone code a simple one on the spot under pressure.
>>61742300
Because if you pass something vulnerable to something you didn't even know existed or misjudged the ease of exploitation it can cost the company millions.
>>
>>61742348
As you won't be able to fix that since ALWAYS would be something on that matter, I don't think it is in your or my hand. Thus, I can't feel bad or annoyed by something I can't control.
>>
>>61742348
>millions
>slash gee
K.
>>
>>61742348
>There comes a point where there is no one to guide you where to go anymore and you end up in the land of no documentation
I'm interested. What do you do then?
>>
>>61742554
Any sensible person would write their own.
>>
>>61742738
How can you write you're documentation if you don't know what are you doing?

I will say more how would you write your docs if you don't know what the fuck do you have to do next?
>>
>>61742839
You can document what you do know.
You don't need documentation to reverse engineer.
>>
>>61742903
I'm talking at more basic skill level.

Why would I document the part I already know if I need the part what is missing?
>>
File: awesome god.png (16KB, 262x238px) Image search: [Google]
awesome god.png
16KB, 262x238px
>scrape boards with IDs constantly
>save to database: { ID, image_filename, post_date }

>let it run for months
>crossreference everything by simple SQL joins etc. to get what images a person has used, what posts are his, what times the person is active

>once database is large enough you could use the time alone or other behavioural patterns to ID the person

would it work?
>>
>>61699054
that's bullshit, they shot it down because instead of optimizing for human interaction the program optimized for communication with other bot.
>>
>>61743020
I don't need to tell you that there's more information than you could ever need covering pretty much every topic imaginable scattered throughout the web.
In terms of why you'd document things you already understand, it's more so to keep tabs on what you've covered.
I find that without taking notes I forget things that I later wish I hadn't. Also, I find that taking notes of point of interest areas in executables and shared libraries helps a lot when reversing software.

>>61743076
No but it'd work for tripfags.
>>
>>61743146
>In terms of why you'd document things you already understand, it's more so to keep tabs on what you've covered.
Yeah that's pretty logic. Although I don't think everything is covered, since when smaller is a detail, less chances are for you to find it.

For example, I've been messing around LXC a few months now, and I got stuck 90% of time because I can't find little details, like what's the default behavior of --clear-env or what should I swap it for, for example. There's almost nothing on securing containers less a few huge ass docs that are outdated. Etc etc.

I'm not trying to move your point, though, I'm just defending you sometimes need someone to push or pint you in the good direction, or telling you that little thing you were missing.
>>
>>61743076
FBI already does this, but they have the luxury of being able to get persistent identifies (IP, mac address, etc.) with their data-mining.
>>
>>61743146
>tripfags
And non-tripfags naturally.
>>
>>61735992
You know that this will give you problems if you ever go to Japan, right?
>>
>>61743211
What? Please elaborate?
>>
Does anyone know a good resource to learn assembly(for reverse engineering)?
>>
>>61743240
Tattoos are taboo in Japan
>>
>>61743370
What even prompted you to say that?
>>
File: browse_0026.png (305KB, 771x435px) Image search: [Google]
browse_0026.png
305KB, 771x435px
>>61743240
Pic related, sararyman wisdom.
>>
>>61743265
https://beginners.re/

And from debugging your own programs + crackmes.
>>
>>61743076
Yes, another method is a program that learns the way a certain user writes. I did it at the uni with couple other people, but it was succesful in identifying journalists based on their writing style and choice of words.
>>
>>61734594
well that was cringey as fuck
>>
OP m8, we reached the bump limit. Save us.
>>
>>61743454
Which part, anon? The image? It's part of the starting hacker imageboard posting set.
>>
>>61743584
oh jesus i dont know if real op has come back yet.

i am op for this current thread, but shit, ok i guess ill make a new one once this drops a few more pages.
>>
>>61731334
Yes, I am still collecting the images. Going to update the imgur galleries soon and post the links again.
>>
what the fuck happened to nessus? i thought a license was only a few hundred dollars for a home user; now they want 2200 USD a fucking year?
>>
>>61743393
Wasn't that from korea?
>>
>standard page moving reply goes here

>>61744177
>>61744177
>>61744177
Thread posts: 318
Thread images: 40


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.