[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

/cyb/ /sec/

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 330
Thread images: 27

/Cyb/er/sec/urity general is for the discussion of anything and everything related to cyberpunk and cybersecurity.

What is cyberpunk?
>https://pastebin.com/jS37Vu7A (embed)

Nothing to hide? - The importance of a cyberpunk mindset applied to a cybersecurity skillset.
>[YouTube] Glenn Greenwald: Why privacy matters (embed)

Resources:
Cyberpunk:
Cyberpunk directory:
>https://pastebin.com/9JaJFqB2 (embed)
Cyberpunk resources:
>https://pastebin.com/7DWCsAc8 (embed)

Cybersecurity:
Cybersecurity essentials:
>https://pastebin.com/JWx5xeEM (embed)
Cybersecurity resources:
>https://pastebin.com/NaUPUDF0 (embed)

Harden your OS, reroute your DNS and fire up the VPN!
Shit just got real: - Looking for more resources, help is welcomed.
>https://pastebin.com/JXyM4fTe (embed)

The Old Skool: - Looking for more resources, help is welcomed.
>0ld 5k00l h4ck3rz: http://67.225.133.110/~gbpprorg/#40

IRC:
Join: irc://irc.rizon.net:6697
>#/g/punk - Requires SSL
>#/g/sec - Requires SSL
IRC guide:
>https://pastebin.com/bh3Uyq3a (embed)

Thread archive:
>https://archive.rebeccablacktech.com/g/search/subject/cyb/
>https://archive.rebeccablacktech.com/g/search/subject/sec/
>https://archive.rebeccablacktech.com/g/search/text/%2Fcyb%2F%20%2Fsec%2F/

Thread backup:
>https://www.cyberpunked.org/

Previous thread:
>>61699002
WHERES THE REAL OP EDITION?
>>
keep calm

and

eat

your

instant noodles
>>
I want everyone that comes into this thread to tell us what you are studying.
>>
>>61744201
the blade
>>
Nigga stop using pastebin.

Jesus
>>
5th for I'm watching.
>>
Also 6th for OP, you should have cleaned the (embed) parenthesis. You got it twice.
>>
>>61744201
(You)
>>
File: kZdopKhFaGt.png (4MB, 1339x756px) Image search: [Google]
kZdopKhFaGt.png
4MB, 1339x756px
here's a gift :^)
>>
>>61744670
please dont study me. all you see is a lot of being fat and me masturbating
>>
>>61744775
interesting. i saw nothing by running strings on it, file says its just a picture, hmm
>>
>>61744877
>>61744775
okay, xxd gives me nothing much either.,

well, specifically TOO MUCH

theres a fucktonne here, why cant i see it
>>
>>61744923
>>61744877
The file contains noise in the alpha channel with no original image content. Try using that.
>>
>>61744775
>>61744877
>>61744923
I'm zero, almost negative level on this kind of thing, but maybe the filename has something to do.

>>61744942
Ops
>>
>>61744201
Don't reply to this data mining shill
>>
>>61744775
>>61744775
not very good at this but maybe something to think about.
take image + original (difficult since it seems to be rescaled - tineyr has tons of this image:
https://tineye.com/search/150ae3908e3b3f687835b47f64f980ecce9ce978/
)
and xor to get the plain noise ?

curious about the answer
>>
>>61744999
pls no i just want to see the thread flourish and see what interesting things people are learning :(
>>
How do you people buy bitcoin anonymously? I'm finding it hard to find a site that doesn't have invasive verification requirements and there's no such thing as a bitcoin ATM anywhere near me.
I'm considering trading cash on craigslist, but since I'm also new to bitcoin trading (I understand how it works, just haven't used it) I have no idea what to expect and how to avoid getting ripped off.
>>
>>61745076
>there's no such thing as a bitcoin ATM anywhere near me.
The only guy i know who uses one of these literally flies to the other end of the country to use it, sijnce wwe dont have one anywhere close to our town either
>>
>>61745076
Try Localbitcoins, they have a reputation system so there is a much smaller chance in getting ripped off
>>
File: .png (4MB, 1947x1091px) Image search: [Google]
.png
4MB, 1947x1091px
>>61744775
>>
>>61745249
usually reputation systems come with an unwillingness among users to transact business with anyone who doesn't have a reputation/feedback score though.
>>
>>61744177
What's wrong with lifting and exercising tho? If you're not buying the jew powder I don't see how it's wrong. You can even /homegym/ master race if you want.
>>
>>61745593
>If you're not buying the jew powder
BUT HE IS
ITS IN THE PICTURE
HE HAS TWO TUBS OF POWDERS

Dont pretend you arent just using this as a launching point to broadcast to everyone you lift.
>>
>>61745593
They make it seem using barbells is the only way. Dumbbells are seen as worthless, let alone bodyweight exercises or any sort of cardio.
>>
>>61745593
It's not the inherit act of exercising, but the narcissism and obsession with beauty that usually comes with.
>>
>>61744177
https://medium.com/@coin_and_peace/rarepepe-is-the-most-innovative-project-in-the-crypto-space-seriously-6d6b74749687
https://www.coindesk.com/monegraph-uses-block-chain-verify-digital-assets/
Is it really possible to use the blockchain to prove you're the original creator of a rare pepe? If so, how?
>>
>>61745722
probably using a file hash , timestamp and some identifying information like some password for that dataset. don't know what that verfificatin was called again tho
>>
alright /cyb/ + /sec/, school is coming up and i got a couple low life ideas.

I want to mine Monero on the PC's on off hours which I've calculated would be about 12 hours. School has major funding from state, so could receive decent amounts of monero.
Mostly black neighborhood near school but still a white school, could make sales off of the neighborhood.
might also run a couple servers as dead drops where no one notice.
>>
>>61744186
>>
>>61746397
Call me noob but where is this from? I never researched it so idk where it comes from, but it always looks familiar to me.
>>
>>61746527
then research it
>>
>>61746527
not og poster but its the laughing man symbol from the ghost in the shell
>>
File: wojak121313132.jpg (9KB, 244x206px) Image search: [Google]
wojak121313132.jpg
9KB, 244x206px
can a brainlet into pentesting
>>
>>61746527
"laughing man" from ghost in the shell :S.A.C.
>>
What is the easiest way for a retard like me to encrypt or "harden" my Ubuntu drive? Reinstalling will be a pain in the ass but if it's the easiest way then I will do that.

I read through https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system

But it all looks fucking complicated, and it seems like you have to do it during installation.

please dont be too mean I am a complete noob to linux
>>
>>61745076
Literally lurk /biz/ to learn a shittonne about crypto
>>
>>61746788
practice on usbs, and non system drives until you get it under control. there isnt any easier program
>>
>>61746993

how would I go about doing that? consider me a brainlet when it comes to anything to do with this stuff. I'm willing to learn it's just quite confusing
>>
>>61743240
>>>61743211 (You)
>What? Please elaborate?

Tattoos are closely related to two groups: people working in the fire brigade and people in Japanese organised crime.

If you have visible tattoos you WILL be less than welcome many places and turned away from baths.
>>
What is the most /sec/-compliant, privacy-respecting European/EEA country?
>14-eyes include UK, Netherlands, Belgium, Norway, France, Sweden, Spain, Denmark, Germany, Italy.
>>
File: 1484304586764.jpg (4MB, 5312x2988px) Image search: [Google]
1484304586764.jpg
4MB, 5312x2988px
>>
To answer that one anons question. The more you move into the nuts and bolts of something the less documentation there is or the documentation may require previous knowledge you didn't have to understand. There is almost always a glut of basic information resources written by people who have done x before and want to tell others how to do it, but once you move past that you end up in some no man's land where there may be a very small community of people who know more than you but have a lot of other knowledge they can draw from which makes talking to them difficult. It's crossing of that gap that I'm referring to.
Take side channel analysis. Up until two years ago poorfags didn't even have access to it because you had to have expensive equipment, knowledge of fields that you may not have studied like physics and almost everything was behind academic white papers. You might know it exists and that it effects certain things like storing crypto keys on the device, but how would you go about implementing it? These days we are lucky that the cost of doing it on a practical level has moved down to around $90 if you source everything yourself to about 200 if you need something more stable.
Malware analysis and reverse engineering was in the same spot in the mid 2000s. There were only a few good guides and a lot of shit information unless you knew exactly where to look. It's still that was in a lot of respects. Also windows is still shit whenever you run into something brilliant that moves up above kernel level because the documentation of its low level functions is awful.
These days we are lucky that we have ctf fags who constantly do writeups because they want to get hired at some silicon valley tech company. It makes finding information that used to be a pain in the ass to find much easier, but that is still only a community of a few thousand people at most.
>>61744201
Fuzzing micro controllers by manipulating flash memory and ways to protect against it.
>>
>>61746788
How is reinstalling a pain in the ass? Just backup your home directory (including dotfiles), reinstall with encryption, then copy your backup to your encrypted HDD.

For bonus points, backup to an encrypted drive. You can create those easily with the Disks utility that comes with Ubuntu.
>>
>>61749310
>tfw I have 3 TB of data on a 6TB drive
>tfw the next biggest drive I have is a 3TB drive
>tfw that 3TB drive is already 1TB full of Windows shit (games, mostly)
>tfw the other two drives I have are 1TB

This is why encryption is a pain in the ass for a lot of us coming into /sec/ a little late
>>
>>61749310
I may have to do this.

To clarify, would just ticking "Encrypt my home folder" suffice? Like here: https://tutorials.ubuntu.com/tutorial/tutorial-install-ubuntu-desktop#9

Otherwise I'm not sure how to encrypt the whole drive with the reinstallation.
>>
>>61749878
Depends on what you want to accomplish.

"Encrypt my home folder" uses ecryptfs, which runs in userspace (IIRC), so it uses slightly more resources. It doesn't encrypt system files, which means that sensitive stuff like your password hashes, the sources list of your package manager, your HOSTS file and system logs are not encrypted. An attacker with physical access could also tamper with your system files.

The "encrypt whole disk" option earlier in the installation uses LUKS, which is more efficient, and encrypts everything except /boot. If you're starting with a fresh install, this is the better option.
>>
>>61750217
Is that the "Use LVM" option seen here?: https://tutorials.ubuntu.com/tutorial/tutorial-install-ubuntu-desktop#5

Thanks for your help
>>
>>61750217
>>61750456
I'm retarded. Ignore me. Just seen the option above lol.

Looks like i'll be reinstalling, yay!
>>
>>61750217
Fun trick: put /boot on a flash drive. That lets you pop the only unencrypted part of your system out and take it with you if you need to leave your machine unattended. (airport security, hotel rooms, etc)

>>61750456
nah encryption and LVM are two separate things. You can have one without the other, or neither, or both.
>>
>>61744177
Usual OP here, I'm working through a large backlog of threads (that you lot keep adding to).
>>
where is trinity? I want to fuck her
>>
>>61750827
This is the backlog, by the way:
>>61330215 (07/12/17(Wed)04:05:45) - read through - apply any missed resources to pasta
>>61364245 (07/14/17(Fri)03:35:49) - read through - apply any missed resources to pasta
>>61408222 (07/16/17(Sun)20:32:44) - read through - apply any missed resources to pasta
>>61436875 (07/18/17(Tue)14:58:58) - read through - apply any missed resources to pasta
>>61488992 (07/21/17(Fri)14:10:19) - read through - apply any missed resources to pasta
>>61518752 (07/23/17(Sun)10:04:05) - read through - apply any missed resources to pasta
>>61621447 (07/29/17(Sat)12:58:05) - not mine - read through - apply any missed resources to pasta
>>61636286 (07/30/17(Sun)08:53:04) - read through - apply any missed resources to pasta
>>61688563 (08/02/17(Wed)08:55:21) - failed to reach bump - read through - apply any missed resources to pasta
>>61699002 (08/02/17(Wed)22:41:17) - not mine - read through - apply any missed resources to pasta
>>61744177 (08/05/17(Sat)14:05:40) - not mine - read through - apply any missed resources to pasta
Most of them are over the bump limit.
>>
>>61745034
I think it's basically this, the noise looks like snowcrash, but I'm too lazy to even try.
>>
File: EWWW.jpg (25KB, 265x320px) Image search: [Google]
EWWW.jpg
25KB, 265x320px
Where can i get into the basics of Cybersecurity/ITS? I feel like I have all this random advanced knowledge, but no solid foundation.

Any anon that could help with this would be great. I have a job interview coming up and I need to cram.
>>
>>61744177
>(embed) (embed)
>>
>>61750494
I've encrypted my headless server and use drop bear to decrypt it if i need to restart it or power goes out.
>>
>>61750494
If you put /boot on a separate USB, do you have to set BIOS to boot from that USB or the HDD/SSD with the OS installed?
>>
>>61746588

of course just run nmap, nessus and metasploit with veil
>>
>>61751049
The usb. Just prioritize the order so disc>usb>hdd
>>
>>61751068
You forgot cobalt strike.
>>
>>61744775
I bet it's pizza
>>
>>61751083
Thanks brother
>>
r14
r14d
r14w
r14b

what do the d, w, b stand for?
>>
>>61751734
Dword, word, byte.
>>
>>61748666
Santa Barbara?
>>
What is the likelihood that intel and amd cooperate with prism/nsa now?
>>
>>61752129
incredibly likely.
>>
>>61752129
Even if they do not cooperate willingly they will probably be forced to cooperate by secret court orders. Not only should all US chip manufacturers be expected to backdoor all major chips but so should also foreign chip makers. Remember that many chip makers now are from China. And ST is French/Italian which is not any better.

You might think that a soft core processor like RISC-V in an FPGA is safe but that assumes the FPGA also is kosher. Which it hardly is.

The main attach vector is probably the JTAG port. The second route is probably the internal state machines which are fairly capable alone.
>>
>>61744201
your mother's vaginal cavity good sir
tis indeed quite impressive so far
>>
>>61743776
>>>61731334 (You)
>Yes, I am still collecting the images. Going to update the imgur galleries soon and post the links again.

How about a zip file placed on the FTP server? I see it is still active,
ftp://collectivecomputers.org:21212/Cyberpunk/
Password: guest


Entering the slow patch, last post for me for today.
>>
>>61744177
>terrorist
>get closer /into generic_comercialairplane
>hack into the onboard computer
>make the plane crash

i know it's unrelated but that makes me be scared of planes and I always wanted to know if it could be possible
>>
>>61750827
Where you been lately?
>>
>>61747721

None of them.
>>
This punk ass kid took nude of my 16 yo daughter giving them out to his friends, doxing and swatting her friends. What can I do to stop this?
>>
>>61750916

Go read through the Sec+ certification materials. Should be able to get a torrent of the book or something.
>>
>>61753325
Have a not-slut daughter
>>
He hid a camera in the bathroom, she didn't know she was being filmed. His parents are useless and don't care what he does.
>>
>>61753325
Beat punk ass kid's father?

You can't do much, what's on the internet is there to stay. You could maybe sue the fucker, since I'm fairly sure taking a picture from a minor without consent is illegal, and more if it's nudes.
>>
>>61753401
Then go to the police.
>>
>>61753401
kick his ass
>>
Thanks I'll just beat up his father.
>>
He's already went to jail for swatting but is continuing to do it.
>>
>>61753451
But if you sue him for the picture you can get some money.
>>
>>61750921
Whoops, literally all I did was copy the entire post from the previous thread. I'm not normal op so I don't keep the pasta lying around
>>
>>61753247
Well, I've been ill and had studying to do.
So, I haven't had a great deal of time to deal with threads.
>>
>>61753825
I've literally been calling the new threads strange names to try and get a response from you lol. Anyway, I would suggest, honestly, based on the sheer number of people who do NOT read the pasta and just ask question in the thread, to leave it as it is.

I don't know if anything else can be added because it's monstrously large, and two topics aren't related enough to have any crossover in things you can keep adding.

People into cyb probably don't care for a list of reverse engineering books, and those who do probably won't find it in the pasta anyway due to its sheer scale
>>
>>61752684

how would they backdoor the state machine
>>
>>61753325

that's child porn possession, harassment, stalking and pretty sure swatting is really illegal
>>
>>61751243
>cobalt strike.
what the fuck is this? it looks like an expensive version of armitage?
>>
What's the best program to encrypt my drive?
>>
>>61754999
luks
>>
>>61751528
It's not.
>>
>>61755302
prove it bitch
>>
>>61755414
why so mad desu
>>
File: .gif (3MB, 936x841px) Image search: [Google]
.gif
3MB, 936x841px
>>61755414
>>
>>61755536
i have zero idea what the fuck youre proving here
>>
Hey /g/uys I've been paranoid as fuck lately with the whole CNN thing as well and I want to remove as must of my social presence as I can.

I have 5 Gmail accounts linked to my name and old android phone. I got a new number on my blackberry

I have a facebook account I never used it so it's just linked to my name. I think just deleting it just fine

I have Skype account made before the microsoft bullshit

A twitter account linked to my name I posted some pictures and tweets. Nothing super identifiable.

A instagram account I made when I was 15 I have pictures of me posted on other people's instagram with me tagged.

And 2 reddit account I maybe have doxable posts?

I get that I can't just delete the account I have to delete all posts and what not. What is the most I can do to fix all the mistakes younger me made?
>>
>>61755576
Give me the names, I'll make them go away
>>
File: 3442.png (3MB, 1380x1380px) Image search: [Google]
3442.png
3MB, 1380x1380px
>>61755573
If you were here about 4 years ago, /jp/, /v/ and some other boards had 'sound threads' that users uploaded images with embedded sounds using steganography.

People would use a media player extension to play the sounds extracted from the images which is what you see in that gif.

Moot killed off most of the sound uploading capability (such as embedding webms when webms weren't supported, embedding sounds in to webms, embedding sounds in to gifs, etc) and also put limitations to the file sizes in respect to the resolution, so no more 2mb 1px images anymore.
>>
>>61755576
I can delete every post then I can delete the account but will that be be enough? I know it probably stored on some server or somewhere but I want to do as much as I can.

On my new laptop I removed the camera and the microphone and bought my self a burner phone

>>61755627
No
>>
>>61755673
right, i thought the image the guy uploaded was one of those pictures that used to be on b all the time, them fuckin things...jesus what were the called

youd get a picture, fuck it up using this program, and it would come out with colourful lines and shit on it. you undo it, and youd usually get a maymay, but sometimes youd get real pizza.

was real big in 08/09
>>
>>61755704
Those were sink threads which had embedded archives.
>>
>>61755576
>I have 5 Gmail accounts linked to my name
close them, and use the most professional handle as your main.

>I have a facebook account I never used it so it's just linked to my name
Yes, delete it, but make sure you say YES when it asks if you want to delete messenger too, otherwise it just "parks" your account, doesnt delete it.

>I have Skype account made before the microsoft bullshit
>A twitter account linked to my name I posted some pictures and tweets. Nothing super identifiable.
>A instagram account I made when I was 15 I have pictures of me posted on other people's instagram with me tagged.
delet dis

>And 2 reddit account I maybe have doxable posts?
log in, and individually delete your posts, THEN delete the account. MAKE SURE TO REMOVE THE POSTS FIRST!
>>
How to root my Android devices by hand? Tutorials I found are not good.
>>
>>61755741
When I clicked delete for facebook nothing about messenger showed up. Maybe it's because I made the account before facebook messanger came out? I made it in 2012 or 13 ish

Or is it not fully deleted?
>>
>>61755803
lol bruss messenger has been in there since at LEAST 08; that shit was WHY you made an fb.

hmm. can you screenshot what DID come up?
>>
File: IMG_20170805_233225.jpg (1MB, 3120x3120px) Image search: [Google]
IMG_20170805_233225.jpg
1MB, 3120x3120px
Well I never used the messanger so Idk. I wasn't really into social media when I made my facebook and I was going to add some friends and stuff but I just forgot I made the account for a while. Like I basically just made the account forgot about it for year and occasionally used it to sign into stuff like spotify.

I logged in again and I got this message
>>
>>61755803
>>61755803
>>61755803
SHIT I WAS WRONG

okay, log in, and search for deactivate in the help section. one of the topics is to DELETE the account. go in there, and itll bring you to the page to request a DELETE not just a park
>>
>>61756408
I forgot to tag you but when I try logging in this happens
>>61756203
Am I good?
>>
>>61756499
>Am I good?
yeah dude. thats what i came up with, and im certain itll scrub me
>>
Can I do any of the firefox stuff on the Android version of firefox?
>>
>>61756918
Some, but definitely not all.
>>
>>61744177
Would be awesome if someone would go through the list the recommended about:config settings line by line and briefly explain each one. I HATE not knowing why I'm doing something. Some of these are simple to reason about, but others such as -
browser.safebrowsing.provider.mozilla.gethashURL ""

don't make sense.
>>
>>61757135
https://github.com/pyllyukko/user.js
i use this, but sometimes get too lazy and just go through it to comment out the cookies/saved settings options, since I'm lazy and don't like losing those on the profile i use to browse imageboards.
>>
>>61754631
More or less, but with easier to work with. Really if you are considering either it might be worth it to start coding your own internal tools. Also empire might want to get added to that list as well but I'm not sure how prevalent powershell botnets still are now that Windows 10 is widely adopted.
>>
>>61757655
>empire
maderas praised empire and something called "ruler" a few threads ago, so i think its 100% a viable attack
>>
File: 1492344350830.jpg (312KB, 1277x718px) Image search: [Google]
1492344350830.jpg
312KB, 1277x718px
>>61744177
In the pastebin, if I wanted to learn everything from the beginning to advance what links should I visit in order? Hard to not ask for a spoonfeeding but I know security in different fields, please help a /g/uy out
>>
>>61757857
Entirely dependent on what you currently know. If you don't know how to program go do that first.
>>61757697
Empire I remember as being godlike. Easy exploitation through Microsoft signed executables and worked even if powershell was disabled. Who the fuck is maderas?
>>
File: 1501878983426.jpg (119KB, 497x732px) Image search: [Google]
1501878983426.jpg
119KB, 497x732px
>>61753401
Beat him up.
>>
>>61758101
>Who the fuck is maderas
professional pentester who wrote https://0x00sec.org/t/shared-thoughts-after-6-years-in-pentesting/2492

he was coming into these threads for a little while, havent seen him in weeks now tho. just spread knowledge and good words. chill guy.
>>
>>61758320
Similar situation here although more of a focus on application hacking and reverse engineering. That's a pretty good intro to a lot of things. The shoden thing is bullshit, Hurricane electric works just as well then Nmap the range. His use of persistence is also strange, why not just open up a few reverse shells and just hop into one one of them if needed later? He is right about not directly targeting admins directly. Help desk people are just as good and far less watched.
>>
>>61758509
>Hurricane electric
This is the first i have heard of this name in my life. I will look it up, but i have known of shodan before it became paid.

Persistence keeps you around if the machine gets turned off. Reverse meterpreter shells die when the machine goes down.
>>
>>61758509
>The shoden thing is bullshit, Hurricane electric works just as well then Nmap the range.
i don't understand what you mean here. also, i think it'd be quite interesting if you have the time to write a text similar to maderas'. it would give us a new perspective on the field.
>>
>>61758532
You open up 15 shells on residing in memory and if 7 go down over night it doesn't matter or just hold a few compromised users creds. Persistence is overrated and anything that touches disk raises your risk dramatically.
>>61758543
Hurricane electric let's you figure out the address range of a target by looking up their bgp information. You then just run the scan yourself. I do white hat work only so I have a white listed ip but there isn't to much of a need to be stealthy on the external because botnets are always scanning everything. Shoden last I checked had out of date results where they may have only checked an address 3 years ago.
OK this only really works on companies that are big enough for bgp. Lets say we are trying to figure out the ip areas of our target. Assuming we don't have scoping which in any real engagement we would we know that the internet runs on bgp on the back end. Bgp consists of a bunch of blocks of ip addresses people reserve in an AS. Using tools that look into bgp peering we can then determine the real time area roughly of a corporate network because it's broadcasted out to the entire internet.
This becomes a bit more of a mess now with places that use shared hosting (AWS) but often that's only for their external facing sites and they have a domain they use for internal purposes.
Now you have the entire range or a large portion at least of the target without ever touching them or accidentally scanning someone else. It's not great, but our comparison is just a grepped outdated Nmap scan.
>>
>>61758877
>Shoden last I checked had out of date results
yeah, some of it is, sadly.

>pretty much everything you just said
Yep, im going to need to do some research to understand most of what you just said. Clearly you know what the fuck youre on about, nice of you to drop in.
>>
>>61758933
Let's use google as an example because they happen to be big enough to do bgp peering but also not reliant on AWS which has made this less immediately useful as of late.
http://bgp.he.net/dns/google.com#_ipinfo
Using this we can see google controls AS15169
http://bgp.he.net/AS15169
Here we have some graphs that are not that useful for us because we are not doing work on an ISP level, but if we go over here
http://bgp.he.net/AS15169#_prefixes
I am sure you can see the immediate use of it. Most places will be much smaller because they wont be one of the worlds biggest tech companies.

CDNs and shared hosting fuck this whole process up. Looking at cnn.com
http://bgp.he.net/dns/cnn.com#_ipinfo
We see a bunch of references to some AS called Fastly. Fastly is a last mile CDN I am pretty sure so we are not going to find any webcams hiding in there. Most of the time this sort of recon isn't needed because you are given an IP range because of the dangers of accidentally trying to hack someone without permission, but this might be something to keep in mind when you are implementing bgp peering.

Last fun terrifying fact. If a BGP node goes rogue it can steal the traffic of the entire world and these things are authenticating over md5 using a key shared between the two partners. You shouldn't be able to brute force them because in theory only the peer should be able to connect and the ISP should reject any attempts of setting up a rogue client on the company side, but it's unsettling thinking about stuff like that especially considering this has happened quite a number of times before.
https://www.youtube.com/watch?v=iG5rIqgKuK4
>>
>>61753161
>I always wanted to know if it could be possible
It was on the news a few years ago that someone had hacked into the infotainment on board an aircraft. The question is if this is connected to the aircraft control system. You would think that would not be the case but it is known that on certain cars this has been the case.

Aerospace and car manufacturers both have in common that they are very much not used to think about computer security.
>>
>>61753325
Whatever you do: never ever ever take copies of the pictures to the police. Do. Not. Ever. Do. That. If you do you will be arrested for possession of child porn.

Not joking. This has happened.

The only valid response if to contact a lawyer. And let him or her take care of it. One single mistake on your part and your life is in ruins.
>>
>>61754442
>how would they backdoor the state machine
The simple way is to add a trigger state to the state machine, just like the way you do block erase on EEPROM. The trigger state is engaged by, say, executing a pattern of non-nonsensical instructions followed by what you want to do, like copying kernel memory to a buffer you already own, basically a DMA.

All parts of this unit are already well known technology, available as IP blocks. It is just a question of putting them together and making a user space driver to operate this side band DMA unit.

The bit pattern or code to operate such a backdoor would most likely not trigger any anti virus code out there.
>>
>>61755576
Few things make the surveillance tools scream out louder than someone urgently deleting his entire web presence.

And 5 Gmail accounts? Really? Anyways, wipe and close all you will have klaxons blaring in Fort Meade.

All services you list are on US soil and therefore subject to US laws which means every single keystroke you did is already stored. You therefore achieve little with what you are about to do other than making it harder for civilians to check you out.

It is better to consider what did you do, was it really disastrous and is it truly necessary to delete this?
>>
>>61759611
>other than making it harder for civilians to check you out.
hey fucko

THATS THE POINT
>>
>>61759621
In a threat scenario you should state who you are threatened by. The US, other state actors, commercial professionals or your younger brother. All are different.

Mind you, even if civilians are what you fear you still need to be aware some are more skilled than others and some are quite persistent.

There was a series of cases centered around German politicians that amply demonstrated how civilians could succeed in bringing them down based on old sins.

So always state the threat clearly.
>>
>>61751805
I don't know, it was a wallpaper from wg.
>>
>>61758877
>>61759115
>>61759505
Thanks for the knowledge anon.
>>
File: 1445564348696.jpg (1MB, 1920x1200px) Image search: [Google]
1445564348696.jpg
1MB, 1920x1200px
>>
File: rain-in-tokyo.jpg (922KB, 2048x1365px) Image search: [Google]
rain-in-tokyo.jpg
922KB, 2048x1365px
>>
>>61761003
i love this picture so much
>>
>>61761099
Looks like it is from Shinjuku.

Tokyo is a strange place, in a good way. Just a minutes walk from the busiest streets and you are back in the old village parts of Edo.

I used to work in an ultra modern city but just a few km outside the city centre you would find farms looking the same as they did centuries ago.
>>
File: qa93hPh.jpg (637KB, 1600x1064px) Image search: [Google]
qa93hPh.jpg
637KB, 1600x1064px
>>
Did anyone go to Defcon last week? what were your thoughts? learn anything interesting?
>>
>>61761405
Which is interesting because I would expect that most of that was leveled during WWII. I wonder if they prioritized building everything to how it was before, and then the influx of foreign money coming in for the rebuilding effort went primarily to designing the newer buildings, towers, etc.
>>
>>61761507
There is a map of what was bombed.

A lot is written about the rebuilding but essentially a lot went to Tokyo the first few years after the war and then focus was shifted to infrastructure.
>>
>>61761930
Not that anon but seems pretty logic since without infrastructure you can't store anything. Not food, materials or even ill persons.
>>
File: 1445445017454.jpg (153KB, 1920x1080px) Image search: [Google]
1445445017454.jpg
153KB, 1920x1080px
>>
Good to see there's still 0 actual security talk in this thread
>>
>>61762528
Good to know you still can't scroll, nice to have you again here anon.
>>
>>61762563
Point out any real security posts in this thread
I'll wait
>>
>>61762608
Wait do you happen to be talking about physical security?
>>
>>61762651
No, I'm talking about VR, the only security work that matters
>>
>>61744177
The thing I dislike about that image is that 1984 wasn't ruled by what we hate. The people were ruled by fear, and the fear went from the bottom to the top.
>>
>>61762666
Okay Satan, how about you start the discussion?
>>
>>61761493
Didn't go to Defcon, but learned that their media server also stores practically every single fucking meme video post-1999.
>>
>>61762736
Sure, people trying to get into real security work: shactf is running this weekend and that's the best way to break into the VR space, join their irc, meme with some people and try out easy challs
Also check out pwnable.kr, they have a lot of good intro challs, and rpi published a huge intro to modern binary exploitation on their githib
>>
>>61762956
Isn't the CTF finishing in a few hours though? I participated, also known as I tried almost everything I thought I had a chance in and only beat the easiest challenge.

Did you try some challenges out?
>>
>>61763070
It finishes at midnight tonight, I haven't had a chance to this weekend, was working all yesterday. I'll probably take a peak in a few hours once I actually wake up
>>
>>61763122
If you happen to beat the Title Case chall please make a write-up or just say here how you beat it or something because I banged my head against that challenge for about 4 hours, and I feel it's really dumb and easy, and it probably is considering its value is only 200pts, but only 4 teams have beaten it so far.

It's just this "eval(raw_input().title())".
>>
>>61763236
I'll take a peak, it's probably just some gimmick with certain characters not being recognized by title() to capitalize, but Python still recognizes
>>
>>61763406
Yeah that's what I was trying out, but couldn't get it to work.

Searched a bunch to see if someone somewhere had asked about it on the internet, but found nothing.
>>
>>61763447
Have you tried out any of the other challs?
>>
>>61763623
Yes, I did the asby one since it was just really easy. The other binary challenges I tried I just had almost no idea of what was going on.

On the web challs I tried I got lost pretty fast, and on the networking ones I barely even knew where to start from, on the crypto ones I had no idea what the flaw was, I'm just a pretty big scrub.

To defend myself I'm still on the early stages of learning, since I don't have that much free time. Just saw the Megan-35 chall, I'd give it a chance but I'm already doing other stuff. I'll make sure to check as many write-ups as I can when this finishes.

Also on a bit unrelated note, how fun is going to sec cons?
>>
My brother installed some unknown software and it installed multiple malware with it.
I ran Malwarebytes, adwcleaner and roguekilller antimalware and they all deleted multiple infected files.
Im still seeing cmd randomly opening and closing and i think it is still there, what more can i do to remove it ?
>>
>>61763823
Defcon is kind of a shit show, smaller ones like infiltrate and REcon are amazing though
>>
>>61763999
reinstall os. you can never be sure you're removed it all. do you like the idea of using a still infected machine for online shopping ?
>>
>>61763999
Install GNU/Linux
>>
>>61764121
Is there in built feature to reinstall my win 10 by just formatting C drive ?
>>
>>61764171
why would you want that?
what makes you think the other disk is fine?
>>
>>61764171
bonus points for educational purpose: have your brother reinstall it so he knows for next time
>>
File: 1501178020118.jpg (2MB, 3264x2448px) Image search: [Google]
1501178020118.jpg
2MB, 3264x2448px
>yfw the shut down of major social media channels are going to push things back to text file exchange.

Rev up those SSHs bulletin boards boys.
>>
>>61764214
I have like 1tb of files and yea no backup, hdds here are double the price
>>
>>61764331
well that sucks. Now you know the importance of backups and why sharing a computer with others is a bad idea.

By the way, it's the oldest trick in the book to hide malware within other programs or 'normal' files to avoid detection. If there's any chance the machine is used for online shopping or banking there's no other way but to wipe everything
>>
>>61764241
Yeah, no. Don't trust what he "installs".

Only safe thing is to wipe everything and install everything. I sure hope you have backups of your stuff. If not, this is the time to start. And don't trust Google Backup unless you are happy to share every single file with the agencies.
>>
>>61764331
next time just make his user account not an admin
he can install programs to his user directories, and can't drop malware that works on other users
>>
>>61764251
I would love to have more terminal oriented stuff that maintenance or some ssh things.
>>
>>61764774
http://inconsolation.wordpress.com/
Have fun.
>>
>>61747721
scrap germany
>>
>>61765020
Well i read it overall and although it looks fun it wasn't exactly the kind of stuff I meant.
>>
this is one of the few /sec/ threads that I've found interesting...

>>61755576
>the whole CNN thing
?
>>
>>61765723
>the whole CNN thing

https://www.louderwithcrowder.com/cnn-threatens-doxx-anonymous-creator-trumpwwe-gif/

TLDR; title says it all
>>
>>61765967
Just wow.
>>
>>61759739
I understand that my online stuff is stored and probably accessed online but I just want to make it more difficult for I guess civilians to find me online. It might help that I'm Asian and there are lots of people with the same name as me
>>
>>61752129
There is already ME/PSP
>>
what's the most /cyb/ /sec/ way to store(/manage) passwords and/or things like PGP keys ?
>>
>>61767512
haven't heard of any major fuckups from keepass.
It also supports storing of files which I've never used
>>
>>61755536
What media player is that?
>>
>>61766575
In that case you might be better off by adding stuff to 4 of the 5 accounts to give the impression those are run by different people, someone very much NOT like you. Like taking a holiday to a place you never have been to, getting a job in a line of work you never will etc.

For a civilian threat obfuscation might be more efficient.
>>
I wish more ctfs kept the challenges up after the ctf ended. I had no idea about this one but I am busy working all weekend. I end up doing a disproportionately large amount of binary ctfs because I can just download it and work on them later while eating dinner.
>>
>>61767820
thank you anon
>>
>>61759505

how hard would it be to find this in silicon
>>
>>61751068
>>61751243

empire, bloodhound, ruler, koadic, recon-ng, theharvester, webshell on github, dnscat2, mimikatz, responder.py

anyone got any other critical skiddy tools?
>>
>>61768354
from what I've read in the post you're referring to this would've been done in the microcode. It's possible to do this in silicon aswell - finding that is close to impossible. Does anyone have a figure how much equipment for analyzing 14nm dies would be?
Additionally, you'd need knowledge what it's supposed to do
>>
>>61768446
wifite
Forget reaver and pixiewps
>>
File: Script Kiddies.png (71KB, 900x900px) Image search: [Google]
Script Kiddies.png
71KB, 900x900px
>>
do you like being a skiddy?
do you want to learn some shit or just hack some some stuff?
>>
>>61755791
Depends what devices they are. Most require unlocking the bootloader, installing a cusoom recovery (usually TWRP) and then flashing a superuser zip (Either by SuperSU.zip or Magisk nowadays)
>>
>>61768354
Hard. As >>61768519 points out it could be done in microcode, and that is a pain to decode. It can also in theory be rewritten.

Also it can be done in hardware. Locating 100 gates out of several millions to billions is the proverbial needle in the hay stack.

Also keep in mind that those who added it would make sure it would not be found.
>>
I am going through the book "hacking: the art of exploitation", and I downloaded the c files so I could follow along on my laptop, but my laptop is 64 bit and the book uses 32 bit assembly. When I compile, the assembly I get is completely different from what the book shows, even if I use "-m32" option to compile. Any ideas?
>>
>>61769660
youre doing something wrong. i also compile with the -m32 flag and i always get 32bit binaries.
>>
>tfw you had terrible opsec as a teen and have a massive paper trail that would turn you into a laughing stock if it was made public
You guys think in the future there will be mass-wipes of databases to account for all the abandoned accounts full of cringey teenage shit?
>>
>>61769684
I get 32bit binaries, they are just different than what is in the book, which makes it pointless to follow.
>>
>>61769687
obfuscation my friend
>>
>>61769761
but how
>>
>>61769717
then download the ISO from the book. its pretty easy to find anyway
>>
>>61769761
Useless when there are dozens of years-old accounts linked to you that you can no longer access.
>>
>>61769898
change name and disappear into the wilderness for a couple of years
>>
>>61769687
everyone does cringey teenage shit, get over it.
>>
>>61769826
why is it different though?
>>
>>61770071
the version used in the book is ubuntu 7.x, as such most likely it uses a very old version of gcc to compile the source code, without optimizations and whatnot
>>
>>61770024
I never will until it isn't always hanging over my head. I had a chance to delete most of it and a few years ago I deactivated the gmail account almost everything embarrassing was linked to before the accounts themselves, so they'll be sitting there forever.
>>
>>61763999
>Im still seeing cmd randomly opening and closing

You should still reinstall, but for the record, there is a bug in MS Office that does this.
>>
>>61768446

sqlmap
>>
>>61758320

maderas claimed to be that pentester but provided no proof
>>
>>61769687
then start to remove it.
>>
>>61770171
>I deactivated the gmail account almost everything embarrassing was linked to
so what link do they currently have to you?
>>
How would I go about doing that. I'm not really the emailing type and the accounts themselves aren't public like most can just people can't see the emails. That is a good idea with the twitter account though. Too bad I'm followed by a bunch of people from my school and such
>>
>>61771307
Even if it wasnt him, the guy claiming to be him had more knowledge than Ive ever seen in one of these threads, so I believe he was at least in the industry.
>>
>>61771307
Except you could see it in every single one of his posts.
>>
File: 1497869300725.jpg (356KB, 1894x1636px) Image search: [Google]
1497869300725.jpg
356KB, 1894x1636px
>>
Such a dead time between CTFs. I need something to do besides work.
>>
>>61748666
didn't know Satan rode the bus
>>
>>61772962
omfg that is SUPER CUTE
>>
>>61772962
>this starts of trend of diaramas in clear panel cases
>>
>>61773321
that'd be cool though
>>
>>61771574
Usernames, IPs, addresses, names, etc. Not to mention most of the accounts still exist despite being several years dormant.
>>
>>61761493
Yeah, I went. Specifically for the Tor talk and the Cisco Catalyst Exploitation talk. Other stuff was icing.
>>
File: 1462002031804.jpg (19KB, 400x400px) Image search: [Google]
1462002031804.jpg
19KB, 400x400px
Not sure if this is the right thread, but I created a new cipher system. Can you solve it?

>68712 95333 20604 104140 102575 41600 78103 25167 86034 83452 37908

>58876 81743 81682 31365 70525 15648 80025 66320 79891 99605 56109 92592 67028 49743 47548 34111 94738 48272 100115 57497 85524 70128 107921 22237 78405 42772 91536 16048 85827 27327 21358 57875 41845 48211 87316 105285 105236 68117 45842 32528 77425 75396 79561 98320 11577 104467 83171 34697 28606 66631 90160 89989 47948 13897 78612
>>
>>61773585
>IPs
like that means dick

>>61773585
>Usernames
then abandon the handle and make new ones. jeez.

>>61773585
>addresses
as in your home address?

>>61773585
>names
unless your name is actually cockgobbler penisface there will be other people with your the same name in the world.
>>
so what do you guys think about brave?
>>
>>61774355
Decent movie, but overall lacking considering Pixar's standards.
>>
>>61744177
>mozilla
>implying firefox is safe
>>
>>61768647
I want to learn.
>>
>>61772962
Comfy.
I've always enjoyed miniature stuff like this. Like the movies of small people living and making use of regular objects as a home or stuff like that.
>>
>>61772962
This is much nicer than it deserves to be.
>>
>>61771307
I do not know what kind of proof I could provide unless we were all going to reveal our real names and occupations.
>>61771607
Thank you. I am glad my work is helping people out. I could post in my 0x00sec account where I released my essay...but that is kind of disrespectful to that community to use it to "verify myself".
>>61771853
Thank you
.>>61758320
I am in this general everyday...I have just been extremely busy, so unless there is a question directed toward me, I don't generally outright respond
.>>61758509
I did not say that SHodan is the end all be all of utilities for any facet of recon....I juststated that I have found the $50 I paid forit extremely useful during the course of my career...it gives me another look at a target.
I adore Nmap and its NSE scripts to this day...unfortunately, sometimes time or the presence of things like IDS (especially when set to trigger on X syn-packets received in X period) would force me to scan at a very slow rate (T1, maybe T2 with a --scan-delay within packets that would not exceed the tolerances of the network defenses such as IDS)
Also, I tend to use the persistence methods I do because I often am involved in many engagements where the security personnel are
very vigilant in regards to the network traffic (many now have an inconceivable amount of Snort/Splunk rules set).
Also, many are and our beginning to use technologies that are very sensitive to most interactions with memory/disk on the network hosts (such as enSILO).
Thus, I have nbeen trying to really stick with exploitation with services/resources originally native to WIndows (WMIC, PSEXEC, Powershell, etc.) that do not trigger these defenses.

Sorry if I did not get to everyones questions, comments or doubts....I will try to later....I am just really busy at the moment.
>>
Good morning m8s. WIll be watching the thread so it won't die.
>>
>>61758877
ALso , huge thanks on the Hurrican Electric bgp. Ideally, on every engagement, the scope would clearly indicate the blocks/ranges of IP within that scope.
Unfortunately, more and more, it seems to be a case where customers order a pentest because a project or industry cert requests it. The scope is often a mess in these cases (which is an issue with the managers/personnel arranging the testing as well) and I get pretty vague parameters ("Do whatever you need to do except this" or "We don't really have a great grip on what we have here", or "The Network Administrators will answer those questions foryou" but the net admins aren't playing like we are on the same team),
I really appreciate how SHodan prsents the information; providing linking to many of the HTTP/HTTPS portions of the domain, providing banner grabbing (though I always double check any results without proceeding) etc.

The Hurricane Electric tip is a good one...this is one of the reasons I am here evryday...you never sop learning in this game...
>>
Has anyone taken the Sec+? What would be a good study guide for it?
>>
>>61753325
just post the nudes already
>>
>>61753325
Is this the new mexinigger pasta?
>>
File: Untitled.png (77KB, 717x873px) Image search: [Google]
Untitled.png
77KB, 717x873px
is this normal traffic? i had nothing open and expected a slow network
>>
>>61764774
there's this ssh chan if you haven't heard about it. It's nearly dead but still pretty cool.
fucking spam filter won't let me post it for some reason

https://p.teknik.io/nEvNF
>>
>>61774946
People have different tool choices and I know why you did it. I don't have to worry about ids on external often so it's not something I worry about. 99% of my testing is application specific grey box testing. If you are time boxed and the ids is just saying all ports are closed because you tripped the alarm then even out of date information is better than nothing and our black hat friends just can use their botnets so it doesn't matter for them.
I wasn't trying to shittalk you. Most of what you said is pretty spot on from what I have seen. How is powershell doing now with windows 10 widely deployed? What's the primary entrance point for you on an assignment? Emailed word macro to powershell?
>>61775170
I learned about it because the person who wanted me to pentest had no idea what their external network looked like since they were not technical so I had to dig it up, mail it to them and have their engineering poc get back to them. Delayed testing for a week.
For callbacks I stick most of them on long timers and have a few that sit on user machines a bit faster. If I get locked out it sucks that I might just need to wait a while but it doesn't happen often. Empire is pretty great at this last I checked if you need something turnkey.
>>
>>61745076
there's purse.io
>>
>>61776237
I will check it at home. Thanks anon.
>>
>>61734594
any more like this?
>>
>>61776865
Documentaries or images?
>>
>>61776883
documentaries
>>
>>61776888
The Net: The Unabomber, LSD and the Internet
https://www.youtube.com/watch?v=xLqrVCi3l6E

An older documentary from '93-'94 about bike messengers, you can see some of the same faces:
https://www.youtube.com/watch?v=K0FZoSJ_-5Q

There a few other films shared in the thread before.
>>
>>61776921
>The Net: The Unabomber, LSD and the Internet
i would not recommend anyone open this link
>>
>>61744775
Isn't this image taken from a steam game named 'Delver' or perhaps stardew valley?
>>
>>61777037
There's nothing to fear, anon. The more lists you are on, the easier it is to hide. It's like pozzing.
>>
>>61753051
I can do that too, but I also would like to keep the imgur galleries updated, so people can just grab the images they want.

I will update them (+putting them into the FTP server) during the week - quite busy with work and all.
But I am saving all images I can find, just need to sort them through a bit.
>>
>>61777094
>pozzing
fucking raw with the intent to catch hiv?
>>
>>61777147
Except you're getting on as many secret intelligence lists as possible.
>>
>>61777171
all im hearing is you promote people do dumb things so their life expectancy is cut short
>>
>>61744177
What should I use for anti-virus and anti-malware?
>>
>>61744177
Cyberpunk has nothing to do with cybersecurity.
>>
>>61769898
contact admin / mod and ask them to take it down. For email adresses, spam issues are always a good excuse
>>
>>61772962
>>61774531
Comfypunk is real.

Google Ngram Viewer: '[comfy]', '[cyberpunk]', '[cyberspace]', 1800-2000 in English. https://books.google.com/ngrams/graph?content=comfy%2Ccyberpunk%2Ccyberspace%2C+comfypunk&year_start=1800&year_end=2000&corpus=15&smoothing=3&share=&direct_url=t1%3B%2Ccomfy%3B%2Cc0%3B.t1%3B%2Ccyberpunk%3B%2Cc0%3B.t1%3B%2Ccyberspace%3B%2Cc0


Google Ngram just doesn't realise it. Yet.
>>
>>61777652
gentoo
>>
>>61777860
WIll Windows Defender and Malwarebytes be enough?
>>
>>61777956
Probably not.
>>
>>61777652
ur brain
>>
>>61777981
Suggestions?
>>
File: SuggestionBox.jpg (108KB, 790x1000px) Image search: [Google]
SuggestionBox.jpg
108KB, 790x1000px
>>61777956
>windows
>>
>>61778012
I prefer it over Mac and Linux is a huge learning curve and culture shock.
>>
>>61778005
Common Sense 2017. Or Clamav. If you care about security why are you on Windows though?
>>
>>61744201
Got a B.S. in Comp Sci. Now I'm in flight school in the Navy. Will probably never write a single line of code the rest of my life, and that's fine by me.
>>
>>61778029
If I was a risk-taker and could somehow understand Linux I wouldn't be on Windows. And I just hate Mac.
>>
>>61778028
Get Mint of Ubuntu, those are at least better than Windows.
>>
>>61778056
Looked up a tutorial on how to install them, seems complicated
>>
>>61777652
Depends what os

If 10 then defender is fucking switched on hey
>>
>>61777738
Hello breh

I'm sure you already posted this in this thread

You need a trip because it's literally hilarious now. You've succesfully forced a meme, congratulation
>>
>>61778103
wow. i didn't even know there were tutorials for installing Ubuntu or Mint. then again, whoever needs a tutorial for installing Ubuntu or Mint is assumed to be retarded enough that what should be a trivial process to normal people, needs to be explained in great detail to the retard. this makes the retard cower in terror, thinking the process is long and complicated. in other words, a vicious circle of you shitting into your own mouth.
>>
>>61778192
I have 10
>>
>>61778223
Oh ok, then honestly? Defender is good. It picks Trojans I've tried cooking up on programs using msfvenom and it detects them, it detected eternal blue from INSIDE A TAR ARCHIVE of the shadow brokers leaks. It's switched on.
>>
>>61778213
Not everyone is familiar with computers anon, stop sperging.

>>61778103
It's really not if you just follow the instructions. But whatever, if you want Windows and aren't technically inclined just use Malwarebytes and an adblocker.
>>
>>61778273
yeah, it's good :^)
It's only in the news every other week because
of remote code executions.
Google Zero's Tavis Ormandy fucking hates it
>>
>>61778485
Don't you ever think your opinion is hugely shaped by relative usage of software?
>>
File: what.jpg (103KB, 700x700px) Image search: [Google]
what.jpg
103KB, 700x700px
>>61778520
>>
>>61778370
apologies for my autism. it was merely meant as an inelegant analogy for non-technically inclined populace's innate fear of following step-by-step instructions.
>>
>>61778485
>implying any av will stop a state actor
>implying your average skid can bypass defender
>implying defender doesn't pick up trojans from pirated games
>implying id even be able to stop someone whose throwing zero days at me
ishygddt
>>
Does one of the Firefox about:config settings in the guide prevent dragging an image to a search engine page to reverse search it?
>>
File: IMG_5568.jpg (360KB, 1600x1200px) Image search: [Google]
IMG_5568.jpg
360KB, 1600x1200px
>>
I can't tell if I'm in a thread filled with people who know what they are talking about pretending to be idiots or a thread with a bunch of 14 year old larpers with a few adults who occasionally stop by.
>>
>>61778028
>Linux is a huge learning curve and culture shock
I am not sure where this idea comes from. It is decades since everything was done via the command line.

>>61778103
>seems complicated
In reality it is not complicated. Debian has an overly complicated installation document but Ubuntu is just pop in and go. If you have Windows only experience you would be best off with Kubuntu, the KDE flavour of Ubuntu. Just do not use KMail as mail client and you are golden.
>>
>>61778721
I don't think so, iirc I did most if not all the modifications and it still works. I can be wrong though
>>
Weird I had not to bump the thread even once today.
>>
>>61779982
I have no idea why it's happening then. I tried multiple search engines with all add-ons disabled.
>>
>>61779982
>>61780632
Forgot to say it only works on tineye.com, but only if I allow javascript. But on other engines it doesn't matter if I allow js or disable add-ons.
>>
File: 1495506641105.gif (2MB, 500x372px) Image search: [Google]
1495506641105.gif
2MB, 500x372px
>>
Anons over at /lit/ didn't seem interested in giving their opinions on Neuromancer, can I repost what I had written there up here?
>>
>>61782530
Go ahead. I recently read it again so it's still fresh on my mind.
>>
>>61782591
I'll paste it with another thread that's nearing.
>>
>>61776254
I didn't think you were shit talking me! Anyone who deigns to open their mouth or offer an opinion should be challenged on who or what they state or claim to be; everything and everyone should be challenged so we can evolve.
WHere Windows 10 is concerned, surprsingly few companies have changed over. I still see many companies using WIndows 7 and Windows XP.
Where XP(and other legacy systems) are concerned, it looks like some new forms of service are coming into play: companies who are developing tech to secure legacy even afer/when WIndows (and other companies) are not...they do not (or may not) be able to offer regular patches, bt they offer solutions that help (or help justify maybe) companies keep legacy in play.
Where Windows 10 in particular is concerned, the game has stayed the same for the most part, it's just the strategies to play the game are altered a bit, as well as the the experience/know how necessary to deploy those startegies.
For instance, dumping hashes from SAM in Win 10: while multiple tools may not work, utilizing regedit may allow you to do so ( creating the UseLogonCredential registry key to enable the WDigestr and dump any clear text creds from LSA memory:).
Personally, I am really trying to keep my attacking of Windows 10 networks in the realm of exploiting native resources (especilally Admin resources like WMI); this is a huge reason why I have been really enjoying harmj0y's work and tools lately (CrackMapExec especially).
For ingress during external/red team like engagements, if the full facility/network is in scope, I am hitting WiFi first: I find WPS in play often, and IT tends to watch the WIFI segments with far less scrutiny than the wired segments.
Phishing variations (including IM attacks)using macros are definitely a viable option (Melissa evolved into one sexy bitch), especially given what social media whores people are and poor securing of domains by many IT personnel.
>>
>>61754083
This is true.
Thanks for the advice.
>>
>>61782530
Maybe I'm just dumb but this book is hard as hell to follow the first time through
>>
>>61744177
Damn son, the OP pic really made me think
>>
>>61753325
post pics so I can help you
>>
So my neighbor's network is WEP encrypted

I got his key and access to the router

What do?
>>
>>61783874
It might be the way the scenes are detailed before any action takes place. I usually image time stopping while author takes his time to paint out the environment.
Enter cyberspace however at it becomes really messy. The final scene except of the beach was very hard to place in mind.
>>
>>61783874
Look at the positive side: it just means you can read the book many times.

Part of what makes it hard is that the author introduces a lot of new terminology, like ICE. Cyberspace was also introduced by him.
>>
>>61782939
If you aren't rolling your own malware for rt engagements you need to step it up
>>
how to know what lvl i am ?

noob
>
beginner
>
intermediate
>
advanced
>
1337
>
>>
>>61785051
I wouldn't waste custom malware on an engagement (even a vba macro), though I often make changes to my tools and payloads so that they do what I need/want.

I am being paid to replicate a level of threat that customers are likely to face. The best customers have done a threat assessment and recognize the threats inherent in their specific industry and provide parameters of engagement that help me replicate those threats.

Many of my customers will benefit from learning the gaps in their defenses vs. common exploitation techniques.

A huge part process is illustarting the limitations of their deployed security technologies, Almost all of the technologies they deploy are going to be defeated by custom malware, as almost all customers on earth are going to be vulnerable vs. custom malware.

Now, if there are weaknesses/vulnerabilities in their network defenses that allow my deployment of that malware vs. weaknesses/vulnerabilities in their network defenses vs. the malware itself, then I agree there is value there (but likely not enough value to justify the time/research necessary to engineer new malware).

However, most of the customers I test are looking for an assessment inline with a most of the attacks they will face against common tools and techniques...if their networks cannot withstand ARP/LLMNR/WPAD poisoning, or they have weak password policies/credential hygiene, they have issues way bigger than a weakness against any manner of custom malware.

I am working on tools and some stuff I want to releases to the community though. Most of it is in the privacy realm though...I am working towards being decent at RE/exploit development someday, but I am nowhere there yet.
>>
>>61783958
Yeah it's one I never really thought about when I read brave new world; I just thought it sounded more ridiculous than 1984 does. I'll have to actually read it again to make sure this picture isn't just interpreting it a certain way
>>
>>61784086
why did you break into it if you had no idea what you wanted to get out of it

this is the literal equivalent of forcing entry into an office building after hours and then asking what you can do with it
>>
>>61785872
I guess you're in a different position than me, I'm a full time red team for the company I work for, and all i do is roll custom malware, whereas you're contracting between customers
>>
>>61785528
Recognize what you can do/ Recognize what yoy can't do. Work towards being capable of what you want to do.

And remain a noob forever...it i the best way to constantly improve where others may grow stagnant.

It also helps save you from hubris which can be devastating and potentially dangerous in these disciplines.It also prevents you from becoming an asshole.

You should definitely develop and have confidence in your ability and you should never be anyone's sucker (especially an employer, many of whom would like to minimize your importance).

I have been involved in martial arts my entire life...the most dangerous fighters are almost always the most humble where their art is concerned.

They may run their mouths when they need to, but they remain humble and hungry at their core.
>>
>>61786163
I work for one company.. it is a huge company, but not specifically a security company.

However, the company offers cybersecurity services and I am used for internal projects.

This company only really began investing heavily is cybersecurity,, so more often than not, I am soloing these engagements

FOrtunately it means I am extremely busy all of the time. I can't wait until the company develops a team where specialization is possible, or where I had more prep time...however, this jsut isn't the case.

When I was hired to manage our cybersecurity, penetration test and vulnerability assessment lab, there was a 6 month backlog of work.
>>
>>61786333
*The company only really began investing heavily in cybersecurity a few years ago
>>
>>61786163
ALso, I am envious...exploit development is my ultimate goal. I have a road plan in place...exploit development is one of the pieces a bit further down the road.

Right now my time is spent studying privacy/anonymity technology so I can give something back...it also benefits my pentesting, which I am extremely grateful for.

You are a badass though man. Congratulations!
>>
OP you better hurry the fuck up or we will be lost into de Cyberspace.
>>
>>61785872

sounds like pentesting is breadth more than depth
>>
>>61786539
Right on, commander!

We passed 310 again. New update of FAQ is coming up. Inputs are always welcome. Last part to be put in place on the list is the tech section.

Also: any news on jinteki? She was moving but that was a long time ago.
>>
>>61786588
It's monkey work. They're just professional skids.
>>
>>61786588
No...there is quite a bit of depth to do it well. Doing this job well encompasses knowing quite a bit about many things.

When I attack networks on engagements against entities in the enrgy industry, many of them are pretty well belted down due to regulatory/industry standards.

However, there is always a way in...this in where fidning what others failed to find and looking closely atall available attack surfaces becomes key.

EVery network/target is going to provide you some level of advantage...you just have to lean to utilize every advantage given to you as effeciently/effectively as possible.

You may use "common" tools...it is the manner in which you utilize them that is important.

Whether you forge a hammer or buy a hammer, if you are a carpenter, the skill at whioch you build is based upon your attributes and has very little to do with the hammer.
>>
Want to have a good laugh?
>>>/pol/thread/136510791
/pol/ attempting to into embedded files.
>>
>>61786982
The problem isn't that you don't write your own tools. It's that the majority of pentesters likely aren't skilled enough to identify and exploit unique security vulnerabilities.
Your company's golden seal of approval is worth fuck all when I can cook up an exploit in a week that allows an attacker to achieve remote code execution on a corporate server by exploiting real 0days in shoddy "enterprise" software.
>>
>>61787130
That's not how you link to a thread from another board.

>>>/pol/136510791
>>
>>61787134
I already stated as much in one of my earlier messages...obviously, their security is not going to stop one of your zero days..

It is really a game of probability and percentages. For your %1 of attacks, they will likely face 98% of attacks without that level of technical proficiency.

If body armor stops up to a .44 mag and I work in an inner city, crime ridden environment, I am going to wear the body armor even though it may not stop .556 NATO...I am playing percentages that handguns are more likely used in inner city crime and that my torso represents the most shot part of a human's anatomy.

I may get hit in the head or with a rifle round and I'll be fucked....but I will still play the odds if I have to.
>>
>>61744775
>>61744877
>>61744923
>>61744953
>>61745034

its snowcrash you fucking children.
>>
>>61786588
It's a lot of verification work. Company says control x should protect them but it was improperly implemented. Or x really does y. Or x can be sidestepped by z.
>>61786495
Start working on ctfs, most exploits are just command injection or something on a common framework. They are not as scary as you may think if you are holding back. Binary exploitation is actually pretty rare these days and is a pain to get a stable exploit working even if you find one. Scripting languages have made droppers super easy to reverse so its not to hard to get your hands on up to date malware if you need it for research.
>>61787134
I believe that you are right because I know a lot of pen test monkeys, but at the same time I think you are a larping faggot.
>>
>>61788022
>Scripting languages have made droppers super easy to reverse so its not to hard to get your hands on up to date malware if you need it for research.

not him, but i'm not sure i follow what you mean here. could you please rephrase it?
>>
>>61787440
>snowcrash
I have not heard of this before? I must look it up
>>
>>61788181
It's really easy to reverse scripting languages like Javascript because you don't have to break out ida and deal with assembly. Same with interpreted languages like c#, but that doesn't have the same purpose in this discussion. There are a lot more arcane tricks you can pull at the c/c++ level and tracing execution flow is harder then just watching manipulating a dropper to write its encrypted payload unobstructed (partially) to disk.
>>
>>61788448
I see. I've been studying binary exploitation for a few weeks now (and exploit development in general) , my objective is to make a career out of it. In your opinion, is it worth to pursue this goal even though the number of web applications grows exponentially every day? If you were in my shoes what would you choose?
>>
>>61788512
Do what gets you excited, but really web drives the industry so learn to do it too. A good web bug can destroy an entire company.
Even if you are focusing on binary stuff you can't escape JavaScript because obfuscated JavaScript is one of the main ways that binaries get on a system. The binary stuff will earn you a higher salary and give you job security since so few people can do it well, but you will be expected to be able to do both. After a certain point in time you start to notice there isn't much difference anyways, just different tricks on how to get from A to B. If you plan on doing binary exploitation focus hard on embedded stuff, specifically arm-cortex-m.
>>
I browse a lot on my phone, what browser should I switch to if I've been using Chrome?

Got an Android
>>
make a fucking new
Thread posts: 330
Thread images: 27


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.