[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

/sec/ - Cybersecurity General

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 329
Thread images: 14

We are demerging from /cyb/ because they are LARPers who don't do shit IRL.

>we
By popular demand.

The following are resources that may be helpful to you. Don't trust anyone and do your own research.

Pastebin:
>https://hastebin.com/cesuxoribi.cpp

Why is it so empty?
>It is a rough copy of curated resources. As we have seen how well 400GB ebook torrents work, it was decided to make something easier for everyone to digest. More will be added.

Why are you so paranoid if you've got nothing to hide?
>https://www.philzimmermann.com/EN/essays/WhyIWrotePGP.html

IRC:
>There are none that are reputable. Start your own and invite only people you think are serious, lest you become like the old channels. It's not recommended to interact with anyone from the overarching /g/entooman community. >This general is a tool, not something to substitute as your identity.

Communities:
>There are many, none public are worth the time. Look for individuals with aptitude.

Thread archive:
>N/A

Previous thread:
>N/A


If you have a link that isn't in here, post it.
>>
>Pastebin
>hastebin.cpp

What?
About the general, congrats, I like the idea. Just don't forget to mention DNScrypt. Everyone should install that in their computers and routers.
>>
>Security Focused Operating Systems
OpenBSD
LibertyBSD
Parabola GNU/Linux
Arch Linux
Gentoo
Alpine Linux
QubesOS
Whonix

>Which software do i use?
https://prism-break.org/en/
https://www.privacytools.io/

>Which email provider do i use?
riseup.net https://mail.riseup.net
Protonmail https://protonmail.com/
Openmailbox https://www.openmailbox.org/
Tutanota https://www.tutanota.com/
cock.li https://cock.li/
Your own mail server. Postfix + Dovecot http://www.linuxmail.info/

>>62032462
Hastebin is quicker to deploy and less bloated.
>>
>>62032408
So what's the issue with #/g/sec?
>>
What are we studying?

Ive finished taking notes from the first CCNA Cyber Ops exam book (SECFND) and will now parse my notes over and over until I have all the concepts embedded into my skull. Should sit this exam in 6 weeks, assuming work stays as quiet as it does.

At home I am going through
>penetration testing by georgia weidman
>hackers playbook 2
>slowly building a real virtual data centre
That one is for two reasons; to get my sysadmin skills up, and so I have something real to target; doing SMB exploits on unpatched windows boxes has lost its charm. I want to get my automation skills up so I can rapidly deploy a domain.

Creating a windows version of https://github.com/cliffe/SecGen is a project Id like to do.
>>
>>62032538
Dead and runoff for /g/punk.
>>
>>62032568
>runoff for /g/punk
What? Please detail a bit further.
>>
>>62032576
Oh for fucks sake. The cyberpunk LARPers.
>>
looking to purchase the most secure and private smartphone (out of the box) budget for £500 what should I get? blackberry keyone?
>>
>>62032586
Yes I get the part about them being LARPers but I don't get the part where they ran off to #/g/sec.
>>
>>62032408
>>62032408
/sec/ was a thing on /g/ about a year back, had a much better OP
>>
>>62032558
OPSEC and malware analysis. Currently following up on a large archive of advice dumped by the ew crowd.

You should post your notes if they're digital, they might help out others.
>>62032576
See: >>62032586
It's a holding pen for /g/punk when it gets too crowded. No one knows anything.

>>62032590
>out of the box
None. Get as low-tech as possible, flash and disable unnecesary hardware, and replace kernel.

>>62032624
I'll find and set it up.
>>
>>62032614
The cyb/sec general would list ONE irc for both, separate topics. Part of the reason why the demerge is occurring. To reclaim and have our own space.
>>
>>62032639
>You should post your notes if they're digital
Negative ghost rider. I do on paper notes. Something about reading then WRITING it down makes it stick in my head. It does make it awful to hold onto later on though. I have manilla folders filled with loose leaf paper for random topics.
>>
>>62032660
Ah too bad. Good luck with your exam.


Here is practical discussion on privacy of hardware:
https://archive.is/5LfTV
https://archive.is/a4w6q
https://archive.is/0nySC
https://archive.is/jK3UV
https://archive.is/jMpu5
https://archive.is/4J0Ot
https://archive.is/UtlT3
https://archive.is/R1kJT
https://archive.is/gZ3LN
https://archive.is/WUHoi
>>
>>62032639
>None.
I'm asking whats the best out of the box option for a smartphone, not a good option, but the best available
>>
>>62032586
>>62032639
I really don't understand your point, the channel is devoid of discussion because barely anyone springs up one, not even the LARPers.

>>62032644
What the fuck are you even talking about, #/g/sec was made when /sec/ springed up back again.
>>
>>62032706
>secure
iphone
>private
literally nothing. genuinely, and unironically, no smart phone is private. ios exploits are the most sought after thing in the goddamn world. because its not a flaming pile of dogshit like android
>>
>>62032706
Generic tracfone, bought in area with no CCTV, paid in cash, activated with fake info 1000km+ away from anywhere you visit.

Smartphones are by design terrible. If you want breadth of features, any android phone without SD. Install f-droid and have fun.
>>62032732
Others have issue with the IRC. The main problem is it's not good, that is all.
>>
whats the tech word for people trying to get you, attack group or red group or something?
>>
>>62032766
>attack group or red group or something
Red team and APT
>>
>>62032766
Read Team for offense. Blue team for defense.
>>
>>62032782
>>62032782
that doesn't seem right, think it was scope something sorry for being so vague
>>
Free sec textbook: https://www.jmdev.ca/sheridan/Comp_TIA_Security_Guide_to_Network_Secur.pdf
>>
i would like to voice my opposition to the forceful de-merger by a handful of anons who took it upon themselves to do it, as someone who started with the cyb, and made my way to sec.
but i suppose i might as well lurk and see how it shakes out.
>>
>>62032815
Please stop pushing comptia. It was you in the other thread who wanted that n+ to be put in the pasta didn't you. Their certs are literally useless. Just wait until your exam.
>>
>>62032815
Kino.
>>62032822
As long as there is shit throwing from either side, it is a free market.
>>
>>62032822
This isn't a democracy. Bask in the irony all you like.
>>
File: IMG_5709.jpg (36KB, 749x603px) Image search: [Google]
IMG_5709.jpg
36KB, 749x603px
>>62032840
>Kino
W-wut
>>
>>62032762
>Others have issue with the IRC. The main problem is it's not good, that is all.
Then make it good? Owner of the channel here, I'll take any suggestion that I feel is good. Joined the #/g/punk channel for first time and for a second and saw a lot of common people in both, I could purge everyone if I feel that's what people want, I don't want quantity but quality of people in the channel, and some discussion if possible.

Could also put a password on the channel that needs to be unlocked as a flag or something.

Also people having severe issues with IRC are just mongoloids that don't even deserve into /sec/ and you can't prove me wrong, and the IRC guide was a mistake.
>>
>>62032876
/tv/ vernacular that has devolved into "nice."

Old /sec/ general:

How To Become a Hacker: http://catb.org/~esr/faqs/hacker-howto.html

>Learning
https://cybrary.it/
https://n0where.net/
https://www.offensive-security.com/metasploit-unleashed
http://resources.infosecinstitute.com/
http://www.windowsecurity.com/articles-tutorials/
https://www.sans.org/reading-room/
https://www.corelan.be/index.php/articles/
http://opensecuritytraining.info/Training.html
https://www.blackhat.com/html/archives.html
http://www.securitytube.net/
http://opensecuritytraining.info/Welcome.html
https://beginners.re/

>News/CVE releases
https://threatpost.com/
https://www.deepdotweb.com/
https://packetstormsecurity.com/
https://www.cvedetails.com/
http://routerpwn.com/
http://www.exploit-db.com/
https://www.rapid7.com/db/
http://0day.today/

>Wargames
https://overthewire.org/wargames/
https://www.pentesterlab.com/
http://www.itsecgames.com/
https://exploit-exercises.com/
https://www.enigmagroup.org/
http://smashthestack.org/
http://3564020356.org/
https://www.hackthissite.org/
http://www.hackertest.net/
http://0x0539.net/
https://vulnhub.com
https://ringzer0team.com/
https://root-me.org/
https://microcorruption.com/
https://starfighter.io/

>Resources
https://shodan.io
https://censys.io
https://zoomeye.org
>>
>>62032876
He's misusing it because /tv/ started using it for everything, as it more specifically means a REALLY HIGH QUALITY movie.
>>
>>62032912
>How To Become a Hacker: http://catb.org/~esr/faqs/hacker-howto.html
Delete this.
>>
>>62032906
Changing the name and removing the /g/ so larpers don't join is a good start. Removing voice from anyone that doesn't have a certain amount of flag points/ isn't verified to know what they're talking about is better.
>Could also put a password on the channel that needs to be unlocked as a flag or something.
This is good. I know a discord server for CTF uses this. They have a bot and ranks.
>Also people having severe issues with IRC are just mongoloids that don't even deserve into /sec/ and you can't prove me wrong, and the IRC guide was a mistake.
Yes.

>Q: How can I get the password for someone else's account?
>A: This is cracking. Go away, idiot.
>Q: How can I break into/read/monitor someone else's email?
>A: This is cracking. Get lost, moron.
Kino.
>>
>>62032906
>Owner of the channel here
>Also people having severe issues with IRC are just mongoloids that don't even deserve into /sec/

I like you and your channel already
>>
>>62032970
Last part meant for >>62032932
>>
>>62032912
>How To Become a Hacker: http://catb.org/~esr/faqs/hacker-howto.html
This shit needs to fucking go.
>>
People tell me to use VPN, to not use a VPN.

I'm confused. Why so much conflicting info?
>>
>>62033000
Improperly setup is useless. Properly setup is good. Most likely if you need to ask you don't have the resources to setup properly.
>>62032996
>>62032932
Is it terrible? I skimmed and it seems like regular jaron file.
>>
>>62033000
People who tell you not to use a vpn are mildly retarded, and people who tell you to use a vpn without also telling you need to combine it with Tor to be of any effect are more than likely just as retarded.

A vpn is for privacy, not anonomity. That is what tor is for. A vpn is not a magic bullet, and the people saying not to use one, are the sorts who found out that's it's not a be all and end all.
>>
>>62033014
>Is it terrible?
Typical
>cracker not hacker!
type thing. That grinds my gears so fucking badly.
>>
>>62033014
I've tried some out but never bought any or used one permanently.

What does set up properly mean to you guys? The ones I've tested worked well, just looking for more clarification.
>>
>>62033022
Yeah. I'm not doing anything illegal. I just want to have privacy when connecting to a public wifi or at school, on a plane. etc.
>>
>>62033064
>I just want to have privacy
Oh, well you're sorted then. Vpn it is.
>>
>>62033036
>"Don't call yourself a ‘cyberpunk’, and don't waste your time on anybody who does."
Besides some historical shit, it seems pointless to have in a general anyway.
>>62033047
Regular VPN is fine for your usecase. Better to state intent with your question too next time, some are autistic and will go off on tangents.
>>
>>62032970
The reason I named the channel #/g/sec was just for the /g/ "naming convention" of IRC channels, I could for sure just nuke this one and swap to #/sec/ but I actually like the name.

I seriously don't have much time this week, but could start doing some stuff if I could get some help it would be amazing, never gotten much help from anyone really. Could start with nuking everyone from #/g/punk, although that will take some time, because obviously some sort of filtering should be done, namely just me filtering those that were actually more /sec/ than /cyb/.

People voiced were already those that had done stuff in CTFs, I was just keeping them voiced to give that sort of feeling that the channel had some sort of life and for people to start discussions or something.

Also I have the hacking.moe domain, could use that for the CTF to join the channel and finally give it a proper use.


>>62032980
Y-you too.

>>62033000
It all ends up in trust issues with those saying no to VPN, you could just route through tor too like >>62033022 said.

>>62033014
It's the MIT term of hacker.
>>
>>62033151
>>62033096
>>62033079
Thanks guys... I appreciate the help. I might go with Trust.Zone VPN, still debating on buying a one month.
>>
>>62033151
>The reason I named the channel #/g/sec was just for the /g/ "naming convention" of IRC channels, I could for sure just nuke this one and swap to #/sec/ but I actually like the name.
There is no problem with keeping /g/sec as the name, except a larger flow of users will need to be filtered. /g/ also doesn't mean what is used to five years ago, this is just another shitposting board.

I'll be glad to help with the site and IRC. I'm busphere on Rizon.
>>
>>62033168
Trust.zone is cheap, but most recommend is PIA. If it's regular browsing, it doesn't matter, but trust.zone keeps logs.
>>
>>62033263
I've heard a lot more negative about PIA..

I've heard the best about NordVPN. I used trust.zone trial and it worked well, I know they log bandwidth. According to that chart.
>>
>>62033296
>I've heard a lot more negative about PIA..
This. I rolled my own VPN with alibaba for $30 a year.
>>
how to disappear completely from the internet/freeze what is being stored?
>>
>>62033374
Start by obscuring all of your info on current accounts.
>>
>>62033374
You can't. The best you can do is abandon all your previous online presence. The internet is forever. You should know that, unless you're a newfag
>>
What do you guys think about https://njal.la/ ? Been considering them a while. Any experiences to share?
>>
Does PRISM still even work anymore now that ICANN isn't a government organization?
>>
>>62032408
that's cause /cyb/ is pretty much an overlap with lainchan (the mlg h4xx0rgz fr33d0m fighters lul)
>>
>>62033619
It's called XKEYSCORE now.
>>62033622
Muh sci-fi bookclub, so soykaf.
>>
>>62033498
No experience, but seems like a gimmick. WHOIS Guard is good enough if you're not doing anything illegal.
>>
>>62032408
What is this, the 5th time we've tried to seperate? We need the larpers to bump the thread. Asking "what does cyb have to do with sec" became so pointless it was a meme. You'll see. Also their OP pics were better.
>>
>>62034007
t. butthurt /cyb/ larper
Go to /tg/
>>
>>62034039
Lol nice meme defense, I'm an IT Sec Analyst out of Vegas I've been here lurking forever. I've seen the thread split before. Always goes back. You guys need to just give it up. We barely had 40 active posters as it was, if that.
>>
>>62034086
This time it'll be different.
>>
>>62032496
>security focused systems
>arch
fucking what?
>>
File: 1497106929654.png (192KB, 501x445px) Image search: [Google]
1497106929654.png
192KB, 501x445px
>>62034101
History is not with us.
>>
Don't know if it's been posted already but I want to contribute to the first /sec/ thread so

Linux distros without systemD

4MLinux
Absolute Linux
Amazon Linux
Bedrock Linux
Calculate Linux
Cromnix
Dragora
Dynebolic
Funtoo Linux
Kwort Linux
Legacy OS
Linux Console Mate or LXDE desktop
Milis Linux
NuTyX
Openwall
OviOS Linux
Pentoo
Pisi Linux
Plamo Linux
Plop Linux
Porteus
Porteus Kiosk
PostX
Redcore Linux
SalentOS
Simplicity Linux
Spark Linux
Star Linux
Tiny Core Linux
TLD Linux
Vector Linux
Void Linux
Window Maker Live
Zenwalk

Feel free to add any I forgot.
>>
Security is not privacy.
Those are two different things.
>>
>>62034224
Greater control. They were another's recommendation.
>>62034259
Thanks, anon.
>>
>>62034259
Forgot Source Mage and Gentoo I think it's only an option to use systemd
>>
>>62034285
Ok sure. Security is a tool and privacy is a problem security solves. What's the point?
>>
>>62034420
i don't think arch has any place on that list. you have no more control over arch than you do over ubuntu or gentoo or debian etc. also why is hardenedBSD not in the list? literally a fork of freebsd designed for security
>>
>>62034259
I believe Alpine Linux doesn't use systemd.
>>
>>62032970
I dislike putting this directly tied to CTF points like ctftime if that's what you are talking about. It's bad enough we are making hacking an esport, people still need to be able to ask the occasional stupid question. /r/reverseengineering (plebbit) manages to get by fine with very few barriers to entry. You need to create a culture of excellence in the channel rather than just exclude retards. If you focus on exclusivity the channel will eventually die because old fags will leave and no one wants to jump through hoops for a Mongolian shadow puppet boards /sec/ thread.
>>
>>62034454
HardenedBSD is just OpenBSD with lesser code quality.
>>62034502
This is a good point, but how do you achieve it without turning into freenode 1000+ user mess? I have some ideas, but using them with IRC will be heavy.
>>
>>62034544
First don't frame it as a hacking channel. Keep the focus on stuff like upcoming ctfs, industry news, sharing research etc. Hacking channels bring all the morons out of the woodwork.
Kicking retards asking for how to hack their friend is fine but if everyone in chat is talking about sha2017 or something it sets a tone.
>>
>>62034724
Thank you.
>>
>>62034502
Who says the CTF stuff will be hard, it's just as an entry barrier. And the occasional stupid question can usually be answered in the thread or in another more proper place.

Silly questions are usually asked by skids that can barely breath and type at the same time anyway.

>>62034724
>First don't frame it as a hacking channel. Keep the focus on stuff like upcoming ctfs, industry news, sharing research etc.
That was literally what #/g/sec was trying to accomplish, but it had barely any activity.
>>
How can I use Fiddler for Malware Analysis? Do I need to be in a VM to be safe?
>>
>>62035643
Fiddler checks HTTP traffic on webapps. You don't need to use a VM, but it's pretty much mostly for browser work.
>>
>>62035715
Wrong it works on any application not just browsers.
>>
>>62035643
I asked something similar here a few weeks ago and the guy reccommended vm with windows + procmon + netmon.
>>
>>62035760
Yeah, I forgot the uses of HTTP in non-browser malware.
>>
>Encryption key distribution via chaos synchronization

https://www.nature.com/articles/srep43428

Thoughts?
>>
>>62034544
HardenedBSD is FreeBSD, friend.
>>
>>62036200
That's why it's being compared with OpenBSD, not FreeBSD.
>>
>>62036277
My bad hombrè, misunderstood
>>
>>62036384
It's no big deal, दोस्त
>>
>>62032912
Ty
>>
>>62036436
Anytime, compadre.
>>
>>62032496
security focused OS, not one pentesting distro amongst them..baka
>>
>>62032408
>An empty OP.
>Don't interact with anyone!
Whoa, I'm sure this'll last long.
>>
>>62037030
>pentesting
>not half a step above a cracker kiddie
...

All jokes aside, you can cross-compile many tools that are in Kali Linux, Pentoo, and BlackArch (+ BackTrack, etc.) for whatever distro you're using, bud.

>>62037111
Looks like you're in the wrong place, amigo.
>>
>>62037133
>Looks like you're in the wrong place, amigo.
You don't own the Internet, nor 4chan.
>>
Install DNScrypt, isolate your network (don't let devices see each other).
Hide your modem, if you type 192.168.0.1 or 192.168.100.1 you shouldn't see the modem login or info page.
Install dnscrypt in the router.
Only one computer should be able to log into the router.
Create a separate vlan to log into the router. Ideally you must physically move to the router to plug the Ethernet cable into the right port.
Don't manage your router while being online.
>>
>>62037173
I work for the masked men they call 4chan.
>>
>>62037180
This is interesting, where did you learn this?
>>
>>62037133
ive been using backtrack since forever, done me good so far..cant see why ide want to use another distro when everything is already there in one OS?
>>
>>62037258
It's up to user choice. I don't use backtrack because it's linux. BSD works well for me.
>>
>>62037180
wouldnt checking for DNS leaks once connected to vpn show if anythings amiss?
>>
>>62037286
>>I don't use backtrack because it's linux.

whats the isue with linux?
>>
>>62037298
Different things. A vpn only hides your ip. If your modem or router got dns changed people can still do pretty much everything they want with your network.
>>
>>62037317
Not really inherent issue, just personal taste.
https://www.over-yonder.net/~fullermd/rants/bsd4linux/01
>>
>>62037350
i know when i connect to vpn i always check for leaks and ofcourse ip change (i know para right?) but its become force of habit..the DNS return always coincides with the ip change..is this relevant to my router or am i missing something..genuinal interest anon
>>
>>62037355
interesting read anon...ill return to peruse over it later, thanks
>>
>>62037412
For me dnsleaktest.com is useful to test if my dnscrypt setup is successful. I use OpenDNS because I don't trust any other resolver plus nothing to hide and I value security over everything else.
If I see three different OpenDNS ip addresses or more in the results it means I failed installing dnscrypt on my router. If I only see one IP address It means the dnscrypt is working.

To answer your question: no, if you are using a vpn is not relevant to your router. That being said, these tests can't really detect a MITM attack. My friend was a victim of these attacks (modem got dns changed) and showed only the dns from the VPN but people were still trolling him on twitch chat (no, he doesn't stream, he was getting brigaded and trolled for the skate of it) and all that.
>>
>>62037529
thanks anon, talking of vpn's..is there a method or a script available that randomizes your connection to your vpn set at a time to suit the user, using a vpn (sometimes through tor) is ok for what i do but i can see how flipping between connections similar to how tor does could be of use to some folks.
>>
>>62033498
A shed on a stick!! A motherfriggingfucking cuckshed on a stick!!!!!!! Go and ask on /nrg/ what do they think of njalla... My God... All the tears. And bears...
>>
>>62037675
Njalla killed Pantsu.
>>
>>62032408
I really, really, really support the tone of this general thread. I'll try to bump and keep it alive. The other general that attempts to be about "cybersecurity" and "cyberpunk" is such a joke.
>>
Guys... I need a secure mail client (not server). Any suggestions?? I would also need one that can be deployed/used on a phone...
>>
>>62037675
I'm afraid I don't follow. Could you please rephrase that?
>>
>>62037775
Thank you, vän.
>>62037781 try >>62032496
>>
>>62037800
The guy who owned Nyaa got scammed by Njalla (whose logo is a literal hut on a stick).
>>
>>62037781
i use proton, comfy on moby
>>
>>62037893
I understand. Thank you.
>>
>>62037800
It is a "secure" provider. But totally unstable and unreliable, much like the people running it. Switching "the Pantsu" (/nrg/ project) to it caused our longest downtime to date, and a lot of problems too, moslty related to the servers access and the frontline protection services against DDOS... It hasn't caused any more problems since that long downtime ended, but now other alternatives are being used as well and some of the problems it caused were never reversed. Also they still haven't done anything to regain much trust, either.
Also, bears...
>>
I'm a total fucking noob on all of this, I asked around HF about how to get started and so far I have been told to read Truedemons Hacker Ethos, Tanenbaums Networking 5th edition, learn python and get Kali. Is that going to get me started or do you guys recommend something else? I'm reading the books right now and listed up on eDX MIT python course that starts on 31 this month, I think I'm going to keep Kali as my main OS so I don't get distracted with gaymes
>>
>>62037030
BackBox (not BackTrack) is bretty gud.
>>
>>62037979
you run kali as your main os...
are you fucking kidding me?
>>
>>62037979
Those are some solid recommendations coming from Hack Forums (lmao). Tanenbaums' kinda outdated though (boreding 7 years), but it should be fine for early foundations.
Like >>62038117 said, Kali might be a pain in the ass as a first distro (or a daily driver), but it's worth it. Jump in and immerse yourself with this stuff.

After you're don reading, look into applications. Web Application Hackers Handbook is a good next book, but also couple it with wargames.
>>
>>62037979
nmap network scanning by fyodor, hackers playbook (1 & 2) hacking for dummies (its good for noobs) and if i were you ide run kali alongside another linux distro if your not into gaymes or any windows shite..if you did nothing but hack and learn you could have it as a sole OS but your going to want to tinker and learn linux so best to do it on an OS you can afford to fuck up.
>>
>>62038072
i used it for a while but went back to kali, same with parrot...cyborg looked promising but im not sure its maintained well enough.
>>
>>62037979
What are you trying to do? Write exploits, pentest, blue team, RE, digital forensics?

If you haven't thought it out and only have in mind being a "leet" skiddie, then you might as well give up now.

Its a lot harder than 3 books, Python (which is only used to write scripts you'll never learn BOFs unless you learn C & assembly) and baby's first pentesting OS.
>>
>>62038209
this, please for the love of god be genuine and not another Mr robot fuckin fanboy..that said when i started out i had no direction, just wanted to know how shit worked..anon is right though, its harder than 3 books..you cant go wrong with kali though imo..used it from day one, have no need to change.
>>
Perl or Python?
>>
What's the most difficult branch of sec/the one that weeds out skids the most
I'm thinking vulnerability research but I'd like some input
>>
>>62038209
>What are you trying to do? Write exploits, pentest, blue team, RE, digital forensics?
>If you haven't thought it out and only have in mind being a "leet" skiddie, then you might as well give up now.
if you want a job, or if you want to pass OSCP/OSCE, you have to learn all of those...
seriously, don't tell people to specialize or take a specific path just because you have done that
>>
>>62038309
True cryptography.
>>
>>62038334
>True
As opposed to what?
>>
>>62038117
If the only reason not to use Kali is because it's hard then I'm going to keep it.
>>62038154
>>62038169
Thanks, I'll check those books too
>>62038209
I just want to know how all this stuff works for the sake of knowledge, I thought that hackers know the most about computers and networks in general so I'll try my best to follow them
>>
>>62038345
Bitcoin Asset Managers, password decyption experts, etc.
>>
>>62038309
desu i doubt skids even get to any of the good stuff its copy paste and so on..i was "gifted" with the task of nothing but recon for around 3/4 weeks as part of my work placement and it was great..a script kiddie just wants to see shit break..every trade has a bugbear, a bulders is the lazy labourer who wants it all with no effort...our script kiddie.
>>
>>62038363
Is crypto the most difficult because it's also the most math heavy?
>>
>>62038257
Nothing is wrong with Kali, but its supposed to be used as a live usb/cd because it defaults to root. Plus OffSec has a pretty decent reputation and their cert, the OSCP is the industry standard IIRC. If you want an OS for pentesting and daily use then BackBox is great out of the box. Otherwise if you have experience building OSes and don't need gaymes or itunes then use OpenBSD and build your own packages.

I'm pretty new myself, but at least I had a semblance of an idea for what I wanted to do, mostly pentesting and digital forensics, and its a lot of work.
>>
>>62038378
Crypto's close to the top because it requires a lot of effort, extensive knowledge foundations (math and logic), and time.

Unlike Webdev.
>>
>>62038320
They all intersect, but you're not an expert unless you specialize.
>>
>>62038411
>effort, extensive knowledge foundations
>and time
that's the case for most other branches though outside of websec and perhaps netsec
>>
>>62038380
mine defaults to my non rooted user, but i understand what you mean. cisco have a cyber side if i recall, i went self taught inbetween uni years and didnt go with an accredited company in the cybsec community,..however with my masters pencilled in for next year (or year after that..who knows) in cyber security ive got to make a choice in what path to take, red team is drawing me in although i enjoyed the recon side of it immensely in my work experience.
>>
>>62038425
Besides reverse engineering and offensive security, what is there? Those are tiny fields already.

In the digital scope, that is. Blackwater goons are not really cybersec.
>>
>>62038209 oh and one more question by me >>62038348 should I learn C instead of python then? Just point me in the right direction please, no need to spoonfeed
>>
>>62038464
Learn both.
>>
>>62038476
thanks
>>
>>62038464
desu its your preference, my uni degree was/is java based for most part although two of the modules have now adopted python as their main language of learning..go with what you like, unless you have an endgame in sight which entails learning a specific language.
>>
>>62038264
Python.
>>
>>62038462
Vulnerability research, exploit development and reverse engineering intersect but aren't the same thing
Malware reverse engineering by itself is really fucking vast
I'd also add forensics
>offensive security
How is that a tiny field?
>Blackwater
I'm curious, do some of these shady contractors deal with digital security on top of physical? Gov agencies have special groups dedicated to cyber security, but what about the private sector
>>
>>62038498
I'll start with python then go to C
>>
>>62038527
>Vulnerability research, exploit development and reverse engineering intersect but aren't the same thing
>Malware reverse engineering by itself is really fucking vast
>I'd also add forensics

Forensics really doesn't fall under the categories mentioned. The others do, but not as much as crypto. You still see skids in vuln R&D. The main reason crypto doesn't have skids is academia. You have pretentious faggots, but usually not posers.

Blackwater (Academi) is mainly offensive physical systems and tech. Tech in the guided missiles sort of tech, not malware.
>>
>>62038592
is crypto an area thats on the rise in the cyber sector? ive never really thought about it desu, just wanted to do recon and network securing.
>>
>>62034007
This is the first and only time a separation has occurred since the merge.
>>
>>62038621
Not really. Prospects are shit except the government and academia.
>>
>>62038592
>Forensics really doesn't fall under the categories mentioned
I was under the impression that it required a specific skill set on top of great knowledge in netsec to begin with. Was I wrong?
>You still see skids in vuln R&D
When it's such a critical aspect of security for so many big firms? I mean yeah the ones who find 0days aren't skids but to even break into that environment you have to have a solid background as well as be an excellent programmer.
>The main reason crypto doesn't have skids is academia
Oh, that makes sense, I understand.
>Tech in the guided missiles sort of tech, not malware
Is there a reason why governments do it (the chinese have a bunch of units dedicated to offensive security, the US has Equation, not sure about other countries but the russians probably have something as well)
>>
>>62034007
i think the whats cyb got to do with sec is most peoples thoughts, an internet security based thread coupled with larping fags dreaming of steam machines, goggles and bioshock sisters
>>
>>62038682
Aren't there niche jobs, in finance for example, for cryptography experts?
>>
>>62038711
Extremely niche. They're just not called cryptographers, they usually have domain knowledge and extensive academic backgrounds.
>>
>>62038727
Crypto jobs are set to be on the rise in the future though, at least.
>>
>>62038682
thought as much, i enjoyed the small portion i did during my degree, enough so to take an edx course on it (or some other online provider i cant remember) but ive no use for it in my line of work now
>>
>>62038694
>I was under the impression that it required a specific skill set on top of great knowledge in netsec to begin with. Was I wrong?
If we're talking barebones, run-of-the-mill sysadmin, not really. I'm sure there are serious cybersecurity forensicions in the government, but as I said, they're few and far between. Most only learn their employer's stack and write scripts all day.
>When it's such a critical aspect of security for so many big firms? I mean yeah the ones who find 0days aren't skids but to even break into that environment you have to have a solid background as well as be an excellent programmer.
See: Pentesters and bug bounty hunters.
Legitimate PoC vuln R&D is real grueling work, but unfortunately the aforementioned groups fall into the category and muddy the waters. I think where we disagree is the scope of the terms we're using. They're too general too make generalizations.
>Is there a reason why governments do it (the chinese have a bunch of units dedicated to offensive security, the US has Equation, not sure about other countries but the russians probably have something as well)
Why governments partake in espionage?
>>
>>62038740
I haven't read anything that says so. Maybe with the rise of blockchain you might start seeing some amateur field sprout.
>>
>>62038464
Hey anon,

Okay, here you go, don't say I didn't warn you:
https://pastebin.com/3Qtw6JQw
>>
>>62038805
[spoiler]Kino[/spoiler]
>>
>>62038785
>They're too general too make generalizations
You're right. I probably just have tunnel vision when I think about both vuln R&D and reverse eng because what comes to mind immediately is stuff like malware research or what project zero does — not pentesting with kali.
>espionage
Well industrial espionage is a thing too. Have all black hat groups become centralized (and somewhat legitimized) under three-letter agencies nowadays?
>>
This thread is actually way more active than I imagined it would be. I wonder if it will stay that way.
>>
>>62037213
>where did you learn this?
It's shit you'd do to lock down a mgmt server
>>
>>62038877
this is the kind of vibe i hoped for in the original threads but as we know the larps took control and the rest is history..its a refreshing change.
>>
>>62038865
>Well industrial espionage is a thing too. Have all black hat groups become centralized (and somewhat legitimized) under three-letter agencies nowadays?
A lot of guys have moved to being government contractors, because it still pays and they can fuck with people. The more dogmatic ones have stayed as blackhats and do their (usually not very useful) crusades. I know maybe 2 off the top of my head that do anything close to impactful.

>>62038877
As long as they stay in their containment board.
>>>/tg/55008122
>>
>>62037529
>detect a MITM
None of us are too fancy for wireshark. If you're genuinely worried, inspect ALL of your outbound.
>>
>>62038917
>The more dogmatic ones
>(usually not very useful) crusades
Oh I wasn't talking about the ideologically driven groups, those are dead. I was essentially talking about those who were in it for the money exclusively. It's not surprising that they'd work for the government now I suppose.
>>
>>62038948
>I was essentially talking about those who were in it for the money exclusively.
That's what I thought. They're still some who don't think the government pays enough so they continue with blackhat, but most are completely fine being spook-dogs.
>>
>>62037935
The "bears" he talks about and >>62037936 again, are Russians.
>>
>>62038965
>don't think the government pays enough
To be fair, the US government is the only one that actually pays its cybersec experts competitively.
>they continue with blackhat
How much truth is there to the common belief that, for those who are actually good at what they do (i.e. not LARPers who play around with web exploits), even if they get caught they'll just get recruited and will never set foot in jail?
>>
File: poop-mining.png (79KB, 819x468px) Image search: [Google]
poop-mining.png
79KB, 819x468px
The biggest LARPers are those who call it fucking cybersecurity.
>>
>>62038805
Interesting, thanks!
>>
>>62039078
You and that screencap make zero sense
>>
>>62039078
What would you call it?
>>
>>62039043
>How much truth is there to the common belief that, for those who are actually good at what they do (i.e. not LARPers who play around with web exploits), even if they get caught they'll just get recruited and will never set foot in jail?
Some truth. If your skills are valued and unique (and you're not just the run of the mill botnetter) AND your personality fits within acceptable ranges, you can be guaranteed a job in the blackbox splinters. The NSA has even distributed recruiting papers saying crimes can be looked past.
To qualify how many people like this there are, you wouldn't use a percentage. There's maybe 50-100,000 of these people in the entire world.
>>
>>62039101
>>62039078
No, the tweet means calling cybersecurity, netsec, and related "cyber."

As in, "hi, I work in cyber." It's retarded.
>>
>>62039153
I have literally never heard anyone say that
>>
>>62032408
>dividing a general thread in TWO general threads
NEW META
Thanks /g/ and never stop spamming threads
>>
>>62039136
That's the answer I expected. Thanks anon
>>
>>62039164
They're out there, the few.
>>
>>62039176
Stay frosty.
>>
hey folks, i'm sorry if this is the wrong place to ask this. but i'm using ad nauseam in firefox and what can i do to allow pictures through? like on reddit and here and all over the place, images are blocked.
>>
>>62039180
Why is some guy pretending that his profession has been renamed to "cyber" and that he has to start using the name too if it's only a few retards calling it that?
>>
>>62032408
>complains about larpers
>makes larpshit thread
wow mr tripfag u surely got my brain engaged
>>
>>62039342
Name one instance of larping in this entire thread.
>>
>>62039342
Although I would love to agree with you, I have to say you're wrong, friendo. Here they seem to take this topic a lot more serious than in the previous thread. Which dissapoints me because I though we were treating both topics on its related matter, but seems like I was really really wrong.
>>
>>62034259
missed alpine, gentoo, sourcemage
contrary to widespread opinion, alpine desktop is not only possible but very usable

bedrock shouldnt be counted imo
>>
>>62039078
Who gives a shit besides annoying twats on twatter
>>
>>62039342
>>>/tg/
>>
>>62039342
Please stay in your containment board, buddy.
>>
File: logo.png (30KB, 484x106px) Image search: [Google]
logo.png
30KB, 484x106px
I don't know if this is the right place to talk about this or not, but recently the government has been talking to state governments and private sectors to ditch Kaspersky Anti-Virus because of its ties to Russian intelligence agencies.

Is this warranted from the government, is Kaspersky even safe?
>>
>>62038380
Don't all Linux live distributions default as root?
>>
>>62040034
Kaspersky is fine. It's just the government going HURR RUSSIA IN DA WHITEHOUSE????
>>
>>62040047
Your default user is root.
>>62040034
Perhaps. It's better to not rely on AVs though.
>>
>>62039972
>>62039990
samefag
you're pretty fucking gay if you read the op and didnt laugh desu
who here actually makes a living either side of sec
studentfags need not reply
>>
Can op at least pick better pictures since we are going it alone now.
Anyone make any progress on riscure's exploitation CTF. I have it running but I have no idea what the trick is to get in. No spoilers please.
>>
>>62040266
Second poster here, I do.
>>
>>62040285
Yeah. Did you reverse the binaries?
>>
>>62040285
>pick better pictures
I'll give it to the cyberpunk guys, their aesthetic made it real easy to find good pics..
>>
>>62040266
I am a security engineer, but I also agree that these threads are a fucking joke
>>
>>62040266
First poster here, stop LARPing.
>>
>>62040341
Why don't you make a security general then
Would be cool
>>
>>62040341
What would make them better?
>>
>>62040309
I have a connection on a VM and have a bp set after it accepts and forks with gdb. I'm traced the rest of the application and I understand it but outside of some int overflows I have nothing yet.
>>
>>62040341
really? point to me a thread in the catalog that isn't fucking garbage? generals are post-cancer cancer at least this was mellow enough to not be too bad, pol shitters that post whatever the fuck against google or moz://a, and some amd/intel shilling.
no thread is not a fucking joke anymore, we are long past it.
>>
>>62040389
Retards not taking the bait.
>>
>>62040388
Because /g/ and 4chan in general is no place to have an actual fucking discussion. This shit is good for repeating the exact same bullshit ad nauseum (aka every other general ever) instead of actual people forming ration thoughts. Yes of course there are some people here that would fit this, but it's not fucking worth it.

>>62040389
To have them somewhere else but here. You can talk shit and try to insult me all you want, but reddit has much better discussion. Not really your fault.
>>
>>62040373
>deflecting this hard
>>
>>62040453
>To have them somewhere else but here. You can talk shit and try to insult me all you want, but reddit has much better discussion. Not really your fault.
Reddit is more dead than this general. Is there any other medium?
>>
>>62040515
Ycombinator? Going to hackerspaces and drinking yerba mate with some tranny who is clearly a better coder than you will ever be and their 10 retarded friends who can't figure out Python but stay for the aesthetic.
>>
>>62040453
>Because /g/ and 4chan in general is no place to have an actual fucking discussion. This shit is good for repeating the exact same bullshit ad nauseum (aka every other general ever) instead of actual people forming ration thoughts.
The sad truth is, he's right. You know where's actually goodfor discussions? Reddit. I don't know if it's because of the hope for internet points, or to make a name for themselves, but if you ask a specific question in the right sub, you will have someone go out of their way to find an answer for you.

Case in point; I was having troubles wrapping my head around who actually sends the RST packet when doing an nmap SYN scan; a number of fellows did wiresharking and stace to show it's actually the kernel doing it in response to a SYN-ACK for a SYN it didn't send (since nmap spoofs the first SYN).

If you drill down deep enough and demonstrate you're not a retard who wants to be spoonfed, it's a good resource.
>>
>>62040515
>Reddit is more dead than this general
>the 7th most used website in the works is too dead!!!!
>>
>>62040575
Don't make me feel these feels, anon. You will never have a legitimate non-poser hacker culture because of faggots.
>>62040624
The netsec subs are pretty dead. Sysadmin and cscareers are active, but they don't really interest me or are relative to netsec.
>>
>>62040575
there are so many trannies, like what the fugg
>>
The problem with these threads is they attract the same kind of retards cybersecurity classes attract in university.
I'm just starting the entry 300 level ones for my minor and half the fucking class said "I love hacking!!!!!@@!" as to why they were taking the class.
Precisely none of them knew even basic security practices like egress filtering or network segregation.
Most of them didnt even know what phishing was.

I'm not pretending to know anything myself but at least I didnt shout LMAO HAX!!!@! SO COOOOL
>>
>>62032462
just setup dnscrypt + unbound today, is setting up dnssec worth it?
>>
>>62040682
Has this been previous threads? This one has seemed to be pretty knowledgeable (or atleast not brainded)
>>
>>62040637
>The netsec subs are pretty dead
Only if you post dumb questions or present shit content. There's plenty going on. The new vulnerable lab generator is the first thing I can think of, and it spawned from those subs
>>
>>62038264
Perl is the tool of true sysadmins
>>
>>62040726
I've been lurking for a few months now, it seems maybe one or two threads get enough comments to warrant anything.
>>
>>62040600
Its because their post system gives unequal weight to people. Its probably unhealthy on most subjects but in niche areas with high moderation its great.
>>62040637
Netsec used to be great then it got to be the defacto spot for the community and became worse than this thread. Every undergrad shilled their blogpost about some new script crack wifi or how to find xss. Now they clamped down to hard the other way and they have sans posts on the front page.
>>62040646
Autism and an area you can be respected in even if you are a tranny if you are good enough and can not go full sjw.
>>62040718
Yes. There are only 4 people here who have any idea what they are doing and they are all on shift today.
>>
>>62040718
It's been the case exclusively in previous threads, and this thread has mostly been the exact same kind of people ("Where do I go for the REAL hax info?????") with some smatterings of people who understand basic netsec.

Honestly if anybody here wants to learn anything, that's where you start. Learn to lock down a network first and the rest comes pretty easy.
>>
File: IMG_5673.jpg (30KB, 273x265px) Image search: [Google]
IMG_5673.jpg
30KB, 273x265px
>>62040764
>There are only 4 people
You fucker. This was my favourite meme a few threads back.
>>
>>62040767
>>62040764
It still gets lonely being unable to talk about this sort of shit with anyone. I've only found others, sparingly, at cons and confs.
>>62040797
Delet.
>>
What the fuck is a cyber larper? Cyber Live action roleplay? It doesnt make sense in this context.
>>
>>62040812
It means someone who lives in a fantasy land pretending to be something that's not real. Like what cyberpunks have become.
>"Is Windows 10 /cyb/erpunk?"
>"i'm going for an african geology major, what do you guys think?"
>"yeah lainon that's cool!"
>>
>>62040812
It's the latest meme. It basically means poser.
>>
>>62040689
i tried last month and it didnt work for me. then i found this https://discourse.pi-hole.net/t/the-truth-about-dnscrypt-proxy-and-dnssec/1694 which makes me think there is a compatibility bug between dnssec and dnscrypt then i just gave up.
someone was trying to set this shit up too here in /g/ this week and he failed too.
>>
>>62040689
im using openwrt not pihole but still. btw what are you using?
>>
File: 1497113427953.png (104KB, 550x550px) Image search: [Google]
1497113427953.png
104KB, 550x550px
>>62040806
Unfortunately those people you sparingly meet are the only ones worth talking to.
This is a field filled to the absolute fucking brim with skiddies and LARPers, the few dozen serious people you find will actually know their shit and be genuinely valuable assets.

It's kind of like how modern programmers are all javascript and python shitheads that dont understand a single fucking thing they're doing, but LMAO CODE XDDD. The key difference is that there's 3 decades of incredibly well documented computer science theory and structure, and not-so-much for infosec, so the ratio of people who are retards to people who know anything is much, much, MUCH higher
>>
>>62040812
People who want the aesthetic of blade runner, shadow run, neuromancer, rainy Hong Hong, because they like how it looks, and contribute nothing to the information security because they are "brainlets" and/or somehow don't think it's important to know.
>>
>>62040812
The same kind of person who will slip an RFID chip under the skin of their fingertip and then scream "I AM A TRANSHUMANIST! BEHOLD I AM THE FUTURE!"
Idiots who don't know anything about what they're doing but want the chic of it, basically.
>>
>>62040929
Damn, this really puts things into perspective. There's absolutely no point to online chat for this besides getting a leg into the door and a crayon map to show me where to start.

I'm gonna focus on this shit now, knowing there's little here for me. Thank you.
>>
>>62040999
I mean you might run into people who know what they're doing here/other places, but the odds are a lot more slim.
Most of the people I talk to on IRC are at least semi-well versed in security because its so easy to get fucked with through it.
>>
>>62040682
This is so true. My company an intern in our department who was a millennial CyberLARPer. Every day he was like "OMG I found a polymorphic virus that is moving laterally throughout all the backdoors!!" He found a toolbar trying to update itself.
>>
>>62041022
I've noticed people who spend a lot of time on the internet are never the ones who know the most. They're out there doing shit. These places are like training wheels, spending too much time here might turn me into a crippled manchild.
>>
File: 1502916428575.gif (502KB, 400x400px) Image search: [Google]
1502916428575.gif
502KB, 400x400px
>>62041044
Fair assessment. It's a curious field where you have to actually be doing it and getting real-world experiences to really understand it. It's not a theory-heavy field, which is probably why so many people know so little.
>>
>>62041044
and yet here you are shitposting about how you're totally not like the other LARPers and will get started becoming a l33t hacker right away :^)
>>
>>62041067
>>62041060
This is true, maybe we'll run into each other in the real world, but for now goodbye to you and to internet communities.
>>
>>62041060
different anon here to ask shitty questions.

i'm not going to pretend i'm a hacker that brings down governments or some pull some gay bullshit.

so, i've always been big on security, but i don't know jack shit and i'm too wary of random google searches to get me anywhere. anything you recommend looking at to at the very least startout? i can just build from there
>>
>>62041127
Just google stuff. The NSA isn't going to kick down your door. Where do you want to be in a year?
>>
>>62041127
refer to
>>62040767
>Learn to lock down a network first and the rest comes pretty easy
95% of your threats are external, 4% of them are internal compromises not being checked and allowed free outflow, the remaining 1% is social engineering.
It's a big fuckin field, but basic network security (CCNA Security and CCNA Wireless cover this pretty extensively) and basic Active Directory security will give you an incredibly broad and solid base.
>>
>>62041165
As an aside I love running into ccna people who try to talk to me about security. I once had one claim that ISE would keep me out.
>>
>>62041208
Cisco training is like brainwashing, its fucking nuts. Half of the training is HOW TO CONFIGURE THE CISCO CATALYST 4500 SERIES 3.0 ON A CISCO CONFIGURED TERMINAL TO DUPLEX CISCO ACCESS CABLE THROUGH CISCO ACCESS CONFIGURATION CISCO CERTIFIED CISCO SOFTWARE
That being said if you're working on some fuckhuge network an ISE could help reduce silly oversights and mistakes. Behavior-seeking AV's are also a newer-on-the-market product that seem like vaporware but legit work great.

If you aren't working with 10 filled racks of networking shit, not counting patch panels, then yeah maybe, otherwise they're just drinking the kool-aid
>>
>>62041160
less about getting my shit kicked in and more about being far more comfortable talking to actual people than learning from some guide written in 2011 by a guy named jeremiah

honestly, i just want to be able to sit comfortably knowing that i can secure my data. more of a hobby than anything, but i have no problem turning it into a career

>>62041165
didn't even see that. thanks, i appreciate the pointer. though while i have you here, mind if i ask how you got into this all? you seem pretty knowledgeable in this, or at least give off the impression that you know what you're talking about
>>
>>62041247
>i just want to be able to sit comfortably knowing that i can secure my data
Run your own local DNS server, get a VPN, uMatrix and uBlock Origin, if you're on wangblows then bitlocker is a lazy way to secure stuff from anybody that isnt a government official.
Really securing your own machine is pretty trivial, as long as you don't open strange office documents (macro exploits are still very common and dangerous). The hard part is keeping the other 500 machines on a network secure.
>>
>>62041247
Oh and to address the second question: I got a 2 year Cisco Administration degree and went through a whole fuckload of network security training (which is actually a lot easier than you'd think on the face of it, it's more about keeping the few things you HAVE to have open secure), and then I could slap a cybersecurity minor onto my bachelors so I'm doing some of those courses with some industry professionals. Never thought I'd really get into it but it's really fun because it's such an undefinitive field to work in, what stops exploits at one network leaves you wide open on another.
>>
>>62041239
The problem they have is they only come at the problem from one angle. They are generally well meaning people.
Also I think everyone here can agree that CISSPs are the body snatchers of the industry.
>>
>>62041273
hmm, i guess i'm closer than i thought. just gotta get the DNS server up and running. can't be too hard though. apart from actually setting it up, any recommendations on what to do for it? like, avoid using program x or make sure to use program y type stuff

>>62041296
hmm, interesting. i'll have to look into it more, because even just looking into securing stuff for myself has been pretty fun. plus it doesn't seem like it'll go out of style anytime soon with how many people are setting up their own webbased businesses
>>
>>62041389
just realized i write "hmm" a lot. weird
>>
>>62032408
>hastebin
what is this and why is it loading a blank page
>>
>>62041352
It's an interesting issue. Do you go vendorless like Comptia and become useless? Or do you remain biased to your company and slightly useless outside the company infrastructure?
>>
>>62041402
hmm
>>
>>62032558
Im sorry what... the hackers playbook is the biggest pile of shit ever. Complete waste of money.
>>
>>62041486
Well I have no certs but I lean very heavily towards application security. I think getting a cert for a particular company is better as a door opener. Someone who can work a Cisco network probably won't be to useless at juniper or ubiquiti. Like wise a red hat cert can probably figure out Ubuntu.
>>
I already have several linux certifications and a sec+ and net+.

what resource is recommended to study for the CASP? I hear its mostly continuity of business stuff.
>>
>>62041486
Experience trumps certification. I've talked to a pentester who was ex-NSA and he had so many certifications it'd be a paragraph on its own just to list them.
Know what he lists?
OSCP
CISSP
16 years experience

Certs get your foot in the door. Experience gets your a career.
>>
>>62039342
Cool story bro,

your mom just called, she wants you to give her dildo back.
>>
>>62040453
Then why do you even come here?

>inb4 just to shitpost
Youre the reason this board is cancer
>>
>>62041542
>>62041589
What no I'm talking as a manufacturer of certificates. Cisco, juniper are all based on their gear, while N+, etcs are neutral. So if you're creating certs, you've got two less than stellar options and that's about all you can choose from really
>>
>>62041525
What didn't you like about it? It has a lot of concepts I haven't been exposed to in the no starch press penetration testing book. I'm learning from it
>>
>>62041721
It's as if the author just copy and pasted shit from the internet. Also it isn't very well written.

>>62041589
Also fuck certs, I have CISSP and it is worth fuck all, its just some letters. Get into vuln hunting and exploit development, every employer I have had has fucking loved this way more than any letters on the end of my name. It proves you actually know what you are doing instead of of opening metasploit and copying code off of github
>>
>>62041706
>as a manufacturer of certificates
I'm not sure I follow?
Understanding the techniques behind security is what's important. I wouldnt hire somebody insisting their CCNP Security specialization qualified them to lock down my network because that's tailored to equipment best practices, not independent agency standards.

You're equating IEEE standards to proprietary connectors, basically.
>>
>>62041805
Im not equating anything. The first post in this chain was complaining how Cisco certs teach you to use Cisco products. Im just saying you can either go neutral, or shill your product, which both have a fuck load of cons
>>
>>62041798
>Also it isn't very well written.
yeah youre right there. neither is the no starch press book, and neither is my CCNA textbook. im finding errors in them left and fucking right
>>
Are the oscp, osce and osee really that hard. I looked at the 'what you will know' section and it looks like a pretty average ctf I would give an undergrad
>>
>>62042073
You're expected to do writeups as well as breaking into the boxes. Standard completions I've heard are 25-30 boxes in the 24 hour period
>>
File: 1503359511858.jpg (102KB, 1456x1339px) Image search: [Google]
1503359511858.jpg
102KB, 1456x1339px
Starting college for network and security. Tell me what books I need and what type of laptop I should get because I doubt a macbook is any good. It's mostly going to be Cisco certificates in the schedule.
>>
Anyone here /SWCCDC/? I know you are out there guys
>>
>>62032912
I used to run EnigmaGroup. I wrote many challenges and even have all the source code.
>>
I finish my CCNA R&S in a week or two, after I have that done what should I start studying? I was thinking of working through Violent Python but haven't looked at it too much yet
>>
/sec/ what do you guys think of Ubuntu MATE? It's the only distro I've used never seen a reason to switch. Is it secure or can be made secure?
>>
>>62042141
Holy fuck can you please dump them?
>>
>>62042268
Do you know any Python? They book is not for learning the language, but learning to use it in a certain way
>>
>>62032408

Has anyone taken CSA+? What did you use to study?
>>
File: cyber dimension.png (28KB, 655x572px) Image search: [Google]
cyber dimension.png
28KB, 655x572px
>>62032408
From an alternate universe.
>>
>>62032912
What's the best real world War game?
>>
>>62042371
I read through 'Automate the Easy Things with Python' about a year ago. I plan on using Violent Python to freshen up my programming skills though as I haven't worked on anything recently.
>>
>>62042545
What do you define as "real world"?

Will give you transferable skills?

bandit from overthewire if you don't know Linux will prime you with a good Linux base

Otherwise what are you really asking for?
>>
>>62042541
It's like a zoo >>62041420
>>
>>62042733
That's got to be a meme by now, every thread it pops up
>>
OK, op. Tips for the next one:
- dont start a war between generals, don't mention any other general or larpers
- drop the cyber from cybersec? just call it security maybe? people will start talking about cyber this cyber that like it happened this time otherwise
- dont forget to mention dnscrypt

some good comments ITT here and there but kinda chaotic, hopefully this was because its the first day of the general only.
>>
>>62042732
I'm saying if you were going to infiltrate a system(server or desktop) what watch games show what you would actually find.
>>
File: mostly up to date.png (16KB, 239x372px) Image search: [Google]
mostly up to date.png
16KB, 239x372px
>>62032496
> cock.li
My nigga for real
Working on CSA+, already have Security+.
> Pic related lab
I have added a couple more since then, happy to share if anyone is interested.
>>
>>62042947
*what war games would reflect the average system.
>>
>>62042947
Ah. Good fucking luck man. I've been on the hunt myself, and the two recommendations I keep getting given are

>use boxes off vulnhub
>build it yourself

It just seems to be a wide open void that needs filling. Perhaps I'll put my meaty cock into it.
>>
>>62042876
how about infosec like the old generals were, rather than Cyber
>>
>>62042977
This, just call it /infosec/ and go about your day
>>
>>62042967
> https://github.com/cliffe/SecGen
SecGen creates vulnerable virtual machines so students can learn security penetration testing techniques.

Boxes like Metasploitable2 are always the same, this project uses Vagrant, Puppet, and Ruby to quickly create randomly vulnerable virtual machines that can be used for learning or for hosting CTF events.

Building labs is fun but then you know all the answers. You guys are looking for more of a CTF.
>>
>>62042954
Specs attached.

Previously I had a couple of VPS boxes but this allows for a lot of network virtualization.
>>
>>62043012
Only Linux ones sadly. I will manufacture a windows one, but I feel like the reason it hasn't come yet is licensing and shit
>>
>>62043075
>Only Linux ones sadly. I will manufacture a windows one, but I feel like the reason it hasn't come yet is licensing and shit
Well, https://www.microsoft.com/en-us/evalcenter/ M$ lets you hit the "evaluation licensing" which allows for all kinds of setups for this sort of thing

90 day evaluations for developers are available here https://dev.windows.com/en-us/microsoft-edge/tools/vms/windows/
>>
>>62043118
Yeah for sure, that is how I get my images. I meant rolling them into the vuln generator must have license issues, otherwise someone would have done it by now
>>
>>62043147
Hm this is an interesting concept.

I have experience in managing systems to make sure that they get patched but not really the opposite. Ideally you would be able to basically have a batch script (dependent on version ofc) go through and uninstall updates / patches but I am not sure if you can roll back part of a Service Pack or not.

This would be something pretty cool to work on and I am going to try and remember to look into this at work tomorrow.
>>
Should I bother with an A+ or go right into N+ or S+?

My long term goal is computer forensics but as I understand you don't just walk into those jobs. I need something to hold me over until such time I can truly qualify.
>>
>>62043501
You should avoid Comptia and do something, ANYTHING else. Even an MCSE would hold more weight in an infosec role than anything from Comptia.

Instead of n+ get a real Cisco one. They are still the industry standard
>>
>>62043501
I would say that A+ is useful as it shows you are able to operate a keyboard and mouse. This isn't a joke as some people really aren't able to do that. A lot of positions (depending on where you are planning to start) require this so I would say it will be worth your time. Security+ is easy if you have been into this stuff for anymore than a year even casually. Just make sure you study CompTIA's wrong answers and you will be alright. Network+ I actually didn't study for and didn't pass because they want you to know stuff like how long is the range on a cat 3 cable and what is the transfer rate.
>Source: I have Security+ and A+, this was enough for me to get a job (had to flub previous experience but...)
>>62043520
> You should avoid Comptia and do something, ANYTHING else.
I don't think this is necessarily true. Security+ is registered with the DoD iirc. I would say that MCSE would be valuable but this is a higher barrier to entry and you can get an employer to pay for this later on.
> instead of N+ get a real one
I don't disagree with this, CCNA means that you are appropriately trained to jump through banging your head into a fucking terrible cisco shell.
>>
>>62043575
If you couldn't use a keyboard and mouse you have no business applying for the role. Advertising you own such a basic easy certificate says you have little else to offer.

You are looking at certs the wrong way if you think possibly having your next employer pay for your MCSE is a valid reason not get it. Guess what, if they were going to put you through it and you have it, you'll get something else. You literally are telling that guy to put himself at a disadvantage to POTENTIALLY save a few dollars?

Just because "security+ is registered with dod" (which sounds dubious at best) means..what, exactly? They are gonna pass up someone who has MCSE, CEH, juniper training or even a fucking CCENT because they have the """registered cert"""?

You literally explained in your post WHY Comptia certs are trash. You wrote the words!
>>
>>62043780
Hey, you seem upset.

I wrote at the end of my anecdote that it was an anecdote.

> You are looking at certs the wrong way if you think possibly having your next employer pay for your MCSE is a valid reason not get it.
I mean, if not worrying about cost / amount of tests is your situation good on you. Most people are trying to get into a position and start to get experience and I think that A+ is a foot in the door and looks good to get through the HR firewall.

> Just because "security+ is registered with dod" (which sounds dubious at best) means..what, exactly?
You then went on to say they are going to pass someone up because they have "cert1 or cert2 or cert3". No, this isn't the case and to compare Security+ to the certs you listed shows that you really don't know what you are talking about.
> CompTIA Security+ meets the ISO 17024 standard and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. It is compliant with government regulations under the Federal Information Security Management Act (FISMA).
ISO, DoD, FISMA, what do they all have in common?
>>
>>62043780
>>62043950
Original anon here, to put things into perspective I'm kinda looking for the most bang for my buck as a guy starting from essntially zero. Right now I'm a no-degree 20-something living off shitty freelance gigs, and with no stable income a $900+ cert just dosent seem like a good call, as much as I do beleive it's valuable.

I'm more than willing to put in the work to learn my shit (as in already doing it), but right now I'm looking for the best way to get some baseline position at anyone's company. If A+ will do that then I might as well go for it. Thanks guys.
>>
>>62044004
I would say that these certs are obtainable with minimal effort and give you a good position to pivot into entry level positions. Fake it till you make it.
>>
>>62043950
>I wrote at the end of my anecdote that it was an anecdote.
Your anecdote wasn't the problem. The problem is you experiencing the quality of products that company produce, and still recommending it. I have server+, and I too had to memorise stupid shit like how many inches is an ru and how far can you run cats.

A+ is not a foot in the door, it's nothing. And you know it too.

He wants to get into infosec. Certs with ISO compliance are not infosec. Have a think about it mate. Your security officer needs ISO standardised framework compliance. What does he do?

Or are you just talking out your arse because you're actually not a contractor?
>>
>>62044054
> A+ is not a foot in the door,
Okay, that's a fine opinion to have.
> He wants to get into infosec
Yeah, how often are Security Analysts hired with 0 experience in any tech related position if they don't have a BA in hand? Learning network fundamentals and troubleshooting while in the field is a perfectly acceptable way to learn.
> Certs with ISO compliance are not infosec
Yeah a certificate isn't information security, that statement doesn't really make sense but I wouldn't say that you are incorrect.
> Your security officer needs ISO standardized framework compliance
Yes. ISO is important. Compliance frameworks are important and standardization is also important.
>Or are you just talking out your arse because you're actually not a contractor
Maybe we have such differing opinions because of where we are located geographically and the corresponding job market? I would suspect that this could have contributed to your general misunderstanding of what the DoD is and why having a DoD approved certificate could be beneficial.
>>
>>62032834
Why are they useless?
>>
>>62044113
>Maybe we have such differing opinions because of where we are located geographically and the corresponding job market?
Perhaps. As a defence IT contractor in Aus, framework compliance is not even a consideration to us. OPSEC is drilled into us; clear rooms before using x network, don't set up y network near windows, ensure you use the correct class container for documents of z network. The frame work exists and is why we do the things we do.

But if I hadve applied for my job with a weak s+ because it fits the framework, instead of the certificates showcasing I have the skills to actually do the job I am applying for, I'd have not even gotten an interview.

>>62044217
Your exam will be what amounts to little bits of trivia.

>what is the maximum distance you can run cat 5
>what is the height of an RU
>what is able to be deployed quickest, cold, warm or hot site
>which of these ip addresses are private
>what is loopback
>what is a tower of Hanoi backup structure

It's shit you find on Wikipedia, and they have the audacity to charge you for it. Somehow the field thinks these are good certificates, despite teaching you nothing you can apply into your work place.

Knowing WHAT a grandfathering backup system is means less than being able to actually create one. You never learn hard skills in these courses.
>>
>>62043575
OSCP, CEH & the CCNA, in that order, are the most highly valued certs in the field and having all three will likely get your foot in the door than just having one or any CompTIA. Sorry to burst your bubble, sweetie, but everyone except for pajeets look down on CompTIA bullshit certs.
>>
>>62038711
RHCSA
>>
>>62044998
Now he did mention DoD and ISO standards. DoD does NOT like OSCP. They want CISSP. I don't know if that's because OSCP has a black hat rep or what.
>>
File: IMG_5651.jpg (88KB, 208x627px) Image search: [Google]
IMG_5651.jpg
88KB, 208x627px
>>
>>62032496
>Security Focused Operating Systems
>OpenBSD
no modern hardware support
>LibertyBSD
give it a month and its dead
>Parabola GNU/Linux
give it a month and its dead
>Arch Linux
was never about security and never will be, bunch of pseudo elitist kids who can only rice their WM and can't install gentoo
>Gentoo
was security focused, not anymore, grsec is dead therefor the most robust security it had going is no more
>Alpine Linux
nice idea, same fate as with gentoo
>QubesOS
xen - HA - what a fucking joke
>Whonix
will die like any other fork

faggots like you imply just because you install an OS with a bit of extra cool l33t software that you are secure ... you are not

please fuck off, thank you
>>
>>62046112
There are only 4 people in this thread who know anything at all about security and they're all using Kali right now.
>>
>>62040470
ignorance is bliss as they say

>>62042954
>Yo nigga i have a certificate, really proves im worth something
l fucking mao

>>62044113
>Okay, that's a fine opinion to have.
its the truth
>Yeah, how often are Security Analysts hired with 0 experience in any tech related position if they don't have a BA in hand? Learning network fundamentals and troubleshooting while in the field is a perfectly acceptable way to learn.
no it is not. anything security related should ALWAYS have experience, otherwise you can fuck off right away because you don't understand even parts of the world that you work in. implying that you learn all relevant fundamentals and more in the field is a ticket for failure. i having seen many people like you where i work at as a shitty linux guy and i know a shit ton more about security than the faggots that get hired with absolutely no experience. i understand the need for specialization but being an uneducated, inexperienced sec analyst, you are nothing but a painful roadblock for anyone around you and an a waste of salary which could be put to better use; like hiring someone who actually knows his shit and helps contribute to the companies cause
>Yes. ISO is important. Compliance frameworks are important and standardization is also important.
iso is fucking bullshit, compliance frameworks are bullshit and everybody knows it. it's just another bullshit machinery to generate money off of retards that don't know any better and believe that security is static and that isonorming your audits etc will cover most security related questions.
>>
>>62046133
sure because kali is a secure operating system where you can do everything securely in root context, makes sense
>>
File: 1483323300453.png (24KB, 425x404px) Image search: [Google]
1483323300453.png
24KB, 425x404px
>>62046268
>>
>>62046282
>mfw your response
s/joke/sarcasm/
>>
>>62046314
Lol what? The "4 people in this thread" maymay is some new thing that was introduced a few threads back that made me laugh my fucking arse off. Hes not wrong through. There is nothing wrong with USB booting and setting a small partition for permanence
>>
>>62046446
yes and i like my fries bottled
>>
>>62039078
I always say I work in IT netsec or cyber is lost on most hormones and if I am talking to someone from the same profession then I refer to it as network security. Although it's pretty evident from our topics of discussion what field we are in
>>
Hope you fellas don't mind me asking, but:

For those who work in cybersecurity, what got you into your role?

What's your daily schedule like?

Is it a comfy job, or would you have to sacrifice daily activities (aka going to gym/visiting family) to do your shit?

What are the misconceptions that come with the job?

I ask this because I'm getting rather bored of my eng degree and recently developed interest in the concepts of privacy since my new computer has win10.I guess another inspo is from GITS - so my understanding in this job market is zilch.
>>
>>62046678
every job that requires you to sit in front of a desk is comfy, what fucking planet do you live on?

having need to ask such an absurd question makes me believe that you should stick to your current degree
>>
How do I cover my tracks effectively? Not to the point that it becomes impossible to track me (that's impossible) but to the point where it would just cost too much time and money.
>>
>>62046678
Same here. Just finished my degree in Automotive Eng. and I'm so fucking bored by it.

I developed the same interest in infosec and now I'm trying to get another degree related to that + the certs and an MSC.
>>
>>62046678
>recently developed interest in the concepts of privacy since my new computer has win10.I guess another inspo is from GITS
Both of these have nothing to do with infosec
>>
>>62040885
i just run it on my main machine for now, i am considering building a pfsense box and configuring it on that (if that makes sense?)
>>
Ok I don't know if this is the right place to ask but since I see someone mentioned Cisco, here I go.
Few weeks ago an anon posted a link to a Cisco firewall ISO and now to crack it. https://rbt.asia/g/thread/61890785/#q61891636
The thing is that he torrent has no seeders and the instructions posted by anon st that time are no longer available. I know my chances are low but if someone managed to grab everything at that time, could you please reupload it? I just wanted to play around with the ISO and maybe use it for my network. He said you needed 8 cores and 16 go of ram (Throwing this out there in case someone is interested too). Ty.
>>
>>62048028
If you just want dnsscrypt + outbound + dnssec, you just need a cheap router and LEDE.
You can start with a tp link wr 841 (25 usd) and LEDE/OpenWRT. In fact here is a version compiled by a user with DNSCrypt already included: https://forum.lede-project.org/t/tp-link-tl-wr841n-d-wa701n-d-wr740n-d-wr741n-d-wr743n-d-wr940n-wr941n-d-ladus-julia-ultra-lite-vpn-builds/1158
But the space on that router you won't be able to add too much stuff unless you compile your own version.
For 15 dollars more you can go for a wdr4300 and install a few more packages and for sure won't have any issues installing dnsscrypt, dnssec (which in reality the package is dnsmasq-full so you have to remove dnsmasq so you save some space) and outbound with no problems.
>>
Glad to see cyberpunk and cybersec split.
>>
>>62048308
>>62048308
>>62048308
>>62048308
>>62048308
Migrate.
>>
>>62044998
> OSCP, CEH & the CCNA,
> $1200
> $900
> $600 (IIRC)
It is like you don't understand what a certificate does. It doesn't prove actual aptitude it just shows that you are able to jump through hoops.
>>62046250
See above. Doesn't prove shit but it will help you bypass HR firewall if you don't into networking
> assuming they don't into networking because they are here talking to assholes.
>>62044370
> As a defence IT contractor in Aus, framework compliance is not even a consideration to us.
This explains it. ISO, PCI, FISMA and NIST runs the part of the industry with the money in the US.
Thread posts: 329
Thread images: 14


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.