/cyb/ + /sec/ - Cyberpunk and Cybersecurity Genera

What /projects/ are you working on?

◙ Cypherpunk Manifesto >>activism.net/cypherpunk/manifesto.html

◘ Cyberpunk Manifesto >>project.cyberpunk.ru/idb/cyberpunk_manifesto.html

∆ Hacker Manifesto >>phrack.org/issues/7/3.html

± Guerilla Open Access Manifesto >>archive.org/stream/GuerillaOpenAccessManifesto/Goamjuly2008_djvu.txt

▓ Fables, realities, prophecies and mythology of a community:

░ What is cyberpunk >>pastebin.com/hHN5cBXB

▀ The importance of a cyberpunk mindset applied to a cybersecurity skillset.: >youtube.com/watch?v=pcSlowAhvUk

● Cyberpunk directory: >pastebin.com/VAWNxkxH

▬ Cyberpunk resources >pastebin.com/Dqfa6uXx

▐ Cybersecurity essentials/resources

>pastebin.com/SCUbhpjP
>pastebin.com/VTXRAPxM

Cntrl + F Basic Knowledges, Basic Training, Arms/Arm >pastebin.com/rMw4WbhX

▼ Endware: Heavy armor for anons, by anons >>endchan.xyz/os/res/32.html

⦿ Shit just got real: >pastebin.com/rqrLK6X0

S archive: textfiles.com

Cybersecurity essentials/resources:
Reference books:
>mega.nz/#F!YigVhZCZ!RznVxTiA0iN-N6Ps01pEJw
>PASSWORD : ABD52oM8T1fghmY0

ftp://collectivecomputers.org:21212/Books/Cyberpunk/

=== /News/:
>DDoS-for-Hire Service Webstresser Dismantled
krebsonsecurity.com/

>New NSA/Cyber Command Head Confirmed by Senate
schneier.com/blog/archives/2018/04/new_nsacyber_co.html

>Yet Another Drupal RCE Vulnerability
isc.sans.edu/forums/diary/Yet Another Drupal RCE Vulnerability/23593/

Attached: fm5G0-L5ksIALJdL8L2C4ZoP5jTlq-zAMfA1MjRMFVU.jpg (3276x4096, 1.45M)

Other urls found in this thread:

github.com/mayfrost/guides
web.archive.org/web/20170227042842/http://security.utexas.edu:80/os-hardening-checklist/linux-7
privateinternetaccess.com/blog/2018/04/why-i-hired-mt-gox-ex-ceo-mark-karpeles-as-cto-of-london-trust-media/
youtu.be/4bMK5O8fQBo
amazon.com/CompTIA-Network-Guide-Sixth-N10-006/dp/0071848223/ref=sr_1_3?ie=UTF8&qid=1524973520&sr=8-3&keywords=network+
amazon.com/CompTIA-Certification-Guide-220-901-220-902/dp/125958951X/ref=pd_bxgy_14_2?_encoding=UTF8&pd_rd_i=125958951X&pd_rd_r=1QJRDERPS2E779SFE7BJ&pd_rd_w=OZVqh&pd_rd_wg=WcRu8&psc=1&refRID=1QJRDERPS2E779SFE7BJ&dpID=51Vogw4seHL&preST=_SX218_BO1,204,203,200_QL40_&dpSrc=detail
amazon.com/CompTIA-Security-Guide-Fourth-SY0-401/dp/0071841245/ref=pd_bxgy_14_3?_encoding=UTF8&pd_rd_i=0071841245&pd_rd_r=1QJRDERPS2E779SFE7BJ&pd_rd_w=OZVqh&pd_rd_wg=WcRu8&psc=1&refRID=1QJRDERPS2E779SFE7BJ&dpID=51PAd6hK25L&preST=_SX218_BO1,204,203,200_QL40_&dpSrc=detail
phrack.org/issues/2/9.html#article
twitter.com/NSFWRedditImage

Let's start this thread off by figuring out what can be purged/added to the OP.

I'd like to suggest some basic things people can do to increase their personal security as well as potential projects/links to things people are working on.

Anyone got anything interesting on github or the like?

>purged
Why not put things off to an archive? As for an interesting github there is the collection of Jow Forums manuals github.com/mayfrost/guides

>What /projects/ are you working on?

>doing some assembly work for nand2tetris
It’s a very fulfilling course.
>planning out a program to scan my yugioh cards and mark in a spreadsheet which ones I own
Will not make deck building easier in the slightest, I just want to do it. I’ll set up a webcam in a bed I’ll make, have it take a snap whenever I press a button, use OCR to read which one it is, then put that into the spreadsheet. The last part there is the one I’m thinking of how the fuck to get it going.
>little electronics kit to solder together to make a guitar amp
I should do this on the weekend, then spend time painting up the box I got for it. I’ll make it a gaudy camo cause fuck you I won’t do what you tell me.

I also have plans and notions of studying the PWK; I have downloaded copies of the material and videos from the handsome man general threads when they were around; I just need to sit and do it.

But after the fun stuff..

By the way, we need to order stuff in categories, like checklists, I got a new one web.archive.org/web/20170227042842/http://security.utexas.edu:80/os-hardening-checklist/linux-7

Old OP dropping by to deliver a bump.

Hey OP,
I’m trying to build a computer and would appreciate your wisdom. The short story is that I want an old laptop to view secure files without the worry of any external viewers looking in. My idea is to remove hardware to prevent any internet connection. If I were to buy an old laptop with removable hard drive what part of a laptop would I physically remove to prevent any connection online?

If this is too technical, how can I find this information online without it tracing back to my own devices?

Attached: AB12CEE0-8F57-4F62-9848-85D615951944.jpg (540x540, 63K)

I like this idea. I also like the idea of perhaps a Riot room or something in case 4 Chan goes rip.

Remove the wireless card. It looks like pic related.The vast majority of laptops have these socketed, even ones with soldered RAM and storage.

Attached: wlan.jpg (602x452, 31K)

Thank you user!

Attached: C364556A-837D-45E9-B04E-59EA8C7329A5.png (960x960, 395K)

If you are so low in skill you didn’t know what a wireless card was, you don’t have the knowhow to perform the proper OPSEC to keep them from knowing what files you’re viewing on this machine anyway

Where can I start to get better at OPSEC?

By learning everything.

do you know why a leaky dns is bad, even when you’re on a VPN?

Do you know if Tor is a VPN?

Do you know how to do a Mac spoof, and what are good macs to use?

Try grugqs videos on opsec, they are a good primer to have you realise unless you’re fighting nation states or actually doing something illegal, it is A LOT of effort.

And if you’re doing either of those things in your present state, lol good luck son

>good macs to use

what

You idiot

If you spin up a clearly false MAC address, it’ll be quite suspicious isn’t it?

Nice rebuttle

Well let's start by removing that lame "Hacker's Manifesto" bullshit written by someone who ratted out everyone after he got busted.
Lame tripfags should be removed.

why does it seem like there are no good resources for assembly.

>Nice rebuttle
Okay I meant what do you mean what is a good mac to use? Any MAC that isn't yours is a good one to spoof.

>Read Neuromancer
>Amazed how much shit the Wachowskis took from that novel for The Matrix movie
>He could have sued the shit out of Warner Bros and Wachowskis and would've won hard

Why didn't he do it bros?

Attached: 1510260864028.jpg (1400x857, 258K)

Mac addresses arent sent network to netwotk they are mostly just used to communicate with your routers ARP protocol. I say this because MAC spoofing isnt really necessary for OPSEC unless youre at a public WiFi.

It makes sense because if you use your laptop with a spoofed MAC that identified something like an iPhone but you are on an ethernet VLAN they obviously know the MAC is spoofed.

does steganography have any modern uses besides appealing to my autism?

sometimes

rescure from page 11

>Level 7: Replace your e-mail provider with a more safe, more appropriate provider. A good option is cock.li.

Nice meme.

Any good resources on 433/315Mhz ASK radio communication?

any provider is equally decent if it has imap support and you use pgp

gmail support imap and pgp

Virtual worlds by '99 weren't in any way exclusive to Gibson. They were explored in literature even before Neuromancer came about. As for other concepts in the book, you can attempt to only make a vague connection (Zion dub - space rastas, Molly - Trinity, Armitage - Morpheus), but it's certainly not ripped straight.

Attached: 227733[1].jpg (400x600, 49K)

yeah so its pretty much fine as long as all your messages are pgp encrypted, unless you're worried about email header metadata as well.

i wouldn't worry much about the metadata because the way email works, it's already public information. mail doesnt always get relayed over ssl/tls

You can hide stuff when it's impossible to post otherwise. For example file attachments on Jow Forums.

Attached: book_embed.png (532x700, 1.58M)

>Well let's start by removing that lame "Hacker's Manifesto" bullshit written by someone who ratted out everyone after he got busted.
story?

unless you are stealing wifi, and/or someone is looking for info on your hardware to find you

I'd recommend Tutanota. Free. Encrypted. Even has mobile apps.

Give me a better alternative

don't shill this shit, just use pgp and imap

Tutanota looks good, do they have imap/pop support?

Attached: 3363497_640x640.jpg (640x640, 49K)

What's wrong with it?

Christ alive, the 90s were faggy.

pgp is already well-established

>90s

unless you've got said someone in your LAN or you're not behind a NAT, the MAC doesn't leave your house

i forked futallaby and gonna try to set up my own chan in my native language but i need to adapt php for version 7 and that will take a while. it was last updated in 2004 and it seems that a lot of functions since then has been deprecated. it will be a fun learning experience.

Attached: Subete-Ga-F-Ni-Naru-Moe-Nishinosono-subete-ga-f-ni-naru-the-perfect-insider-39837815-500-281.png (500x281, 799K)

>book_embed.png (1.58 MB, 532x700)
Hmmmmmm.

>Let's start this thread off by figuring out what can be purged/added to the OP.
Let us rather reformulate it by asking: what in all those pastes are not already in the FAQ?

Is crypto /cyb/? It's underground, pseudonymous, anti-establishment, high tech, has the lowlife angle, makes a lot of otherwise losers rich. When I'm working on my bot or trading I feel pretty plugged in.
>nb4

Attached: Screenshot_20180428-073050.png (1536x2048, 94K)

I believe /cyb/ always includes /sec/ and /crypto/ but the reverse is not always true and /sec/ has in the past tended not to believe it relates to /cyb/.

>What /projects/ are you working on?
I'm trying to create my own assistant through voice. Although I want to plan it carefully so it doesn't seem overwhelming and I drop it because "too much to do". I plan to do it on C so I can learn along the way.

decentralized assets are /cyb/

Recommendations on a VPN provider? Nord VPN seems hard to beat.

Just finished the sprawl trilogy. 'Bout to start on pic related
>i'm gonna be disappoint aren't I?

Attached: Virtual_light_uk_cover.jpg (245x369, 26K)

offtopic
My friend's like
"do you know where this is"

wasn't hard

Attached: 1512144888705.jpg (1409x816, 1.05M)

It doesn't just hide the information it hides the communication

PIA (privateinternetaccess)

Also to anyone in this thread, I work as a cybersecurity consultant and would like to know some people who I can talk to/bounce ideas off in general, as I do not really have any online contacts into this stuff.

If you want to contact me my Discord is shalashaska#2029

If you expect another Sprawl story or even a story of same style then yes you will be disappointed. The author mentioned there is just one person in Virtual Light that would have fitted in with the Sprawl cast.

Just go in and expect something different and something set in a far nearer future.

>PIA (privateinternetaccess)
even after recent events?
privateinternetaccess.com/blog/2018/04/why-i-hired-mt-gox-ex-ceo-mark-karpeles-as-cto-of-london-trust-media/

When talking about "second chances" it gets fukken hillarious.

>Any MAC that isn't yours is a good one to spoof.
As I said

if you use something thats obviously false it will raise flags.

You DO know that the first half of the mac is vendor specific, right..?

Can we ask about job things?

What are some of your /cyb/ side hustles?

>if you use something thats obviously false it will raise flags.
I don't get it though. The computers aren't smart enough to detect if a MAC is coming from a false source, and Apple products can show up connected to Ethernet is they connect to an AP first. Plus, even if it wasn't fake looking, wouldn't they be able to track you by your activity anyways as opposed to what is or isn't fake? The only good reason to spoof a MAC is because you need to authenticate something else that can't do it on its own, or you need deniability for if they grab your rig.

Sure. What's on your mind?

Attached: 1475147064143.gif (240x320, 3.27M)

>The computers aren't smart enough to detect if a MAC is coming from a false source
They can be. Check OS profiling. The IP traffic leaves fingerprints as do vendor specific applications. If that does not match the MAX prefix red flags will be raised.

What would you think is the easier way to get in a serious cybersec? Not trying to be a lazyass, is only I can't figure out if promotion is easier than applying for it directly.

Depending on where you are you could try the military route. There are bits about these things in the two FAQs we have.

your own openvpn instance probably

>The IP traffic leaves fingerprints as do vendor specific applications.
I haven't looked at it yet, but just from your description, it sounds more like they're monitoring your activity than monitoring your actual MAC address.

>What would you think is the easier way to get in a serious cybersec?
find vulns, publish them, add to your CV, alongside all your knowledge and previous experience in IT (even if it was some minor shit... put everything you know in your CV, and more)

Is actually true the "what you did on your side actually counts"?

in infosec? I would say, yes, absolutely. in fact, bragging about what you've done shows your experience. just don't brag about illegal shit, obviously...

Read up on the EU's GDPR. It will be one of the first infosec regulations of many. Similar to how many Countries or States have civil codes for the construction of buildings/houses in the interests of public safety, so too will websites/web services in the interest of security.

You can make a very lucrative career having experience in creating standards-compliant stacks better than any rapid prototyping pajeet.

I see. I'm actually a nooby IT guy with an appeal for /sec/ so I thought it would go through the promote way but seems like that's the worst path possible.

infosec has many paths, it's a very broad field, so find the areas you like and learn them. also, practise, practise, practise.

btw, go to because this shit thread usually doesn't have much to do with infosec...

Really? This fine thread made two FAQs, one on /sec/ and one was a rework of an old /cyb/. In addition the FTP site is filled up with more resources.

Does /hmg/ any resource collections?

who cares about the FAQ? there are LOTS of infosec resources out there, the best one is google...
you want to talk to people about infosec stuff, and this thread is full of
>hurr durr cyberpunk future
LARPers and people who don't know the most basic shit about infosec

>who cares about the FAQ?
A few of the regulars here do at least. It was written so that we do not have to restart the conversations from scratch every time.

>LARPers
Oh, it is you.

Which one of the old OPs? The one who is compiling all the stuff from past threads? Please don't give up.

>By learning everything.
This comes up every time the question is asked. People need an order of things to read, much of the literature assumes prior knowledge, and when people ask questions like this they are most likely rather blank.

Earlier we had a discussion about this picture. One user said there was a problem but what was it?

Attached: orbitology.png (744x1052, 142K)

Wish me luck Jow Forums. Just signed up to get an associate's in cybersecurity since I'm a brainlet.

Attached: FeelsTastyMan.png (112x112, 8K)

Fuck off hackerman.

Terrorists, or "terrorists," such as global resistance movements, can hide communications information such as orders or intel inside of files and data using steganography.

youtu.be/4bMK5O8fQBo

Attached: Neo-NatSoc German hero ops.jpg (1024x576, 117K)

secret shitposting.

Search into the archive it should be the answer.

if i enable secure boot to only boot my signed linux kernel, what stops someone from reflashing the bios and loading their own bootloader/kernel?

Pull the NIC card out. Without the NIC the computer cannot communicate with the internets, at all

Seeing as the poster you are replying to is right, start with the three basics A+ NETWORK+ and SECURITY+, even if you don't test you should still read the books.

amazon.com/CompTIA-Network-Guide-Sixth-N10-006/dp/0071848223/ref=sr_1_3?ie=UTF8&qid=1524973520&sr=8-3&keywords=network+

amazon.com/CompTIA-Certification-Guide-220-901-220-902/dp/125958951X/ref=pd_bxgy_14_2?_encoding=UTF8&pd_rd_i=125958951X&pd_rd_r=1QJRDERPS2E779SFE7BJ&pd_rd_w=OZVqh&pd_rd_wg=WcRu8&psc=1&refRID=1QJRDERPS2E779SFE7BJ&dpID=51Vogw4seHL&preST=_SX218_BO1,204,203,200_QL40_&dpSrc=detail

amazon.com/CompTIA-Security-Guide-Fourth-SY0-401/dp/0071841245/ref=pd_bxgy_14_3?_encoding=UTF8&pd_rd_i=0071841245&pd_rd_r=1QJRDERPS2E779SFE7BJ&pd_rd_w=OZVqh&pd_rd_wg=WcRu8&psc=1&refRID=1QJRDERPS2E779SFE7BJ&dpID=51PAd6hK25L&preST=_SX218_BO1,204,203,200_QL40_&dpSrc=detail

Also, on Udemy there are some decent lectures that are a great supplement by Mike Meyers, who wrote some of these books. They are usually expensive, but about once per month the price drops to about $10-$15 per course. The entire course for that cheap is a great compliment to these books.

What exactly is cyber anyway? I mean, is it just all things internet or is there more meaning to it? How would you define it?

cy·ber
ˈsībər/Submit
adjective
relating to or characteristic of the culture of computers, information technology, and virtual reality.

assuming there is something embedded here, what program would I use to see it or to make my own embeds?

It's the whole website that it is on that is interesting. The old boards were amazing, I love reading them.

So cyber is really referring to the sub-culture in this instance? That is pretty interesting. Thx user

Extasyy Elite Disbanded
-----------------------

The following data has not been completely researched and may be considered as
rumors. Bit Blitz busted for phreaking, the organization and enforcement
agencies are unknown. However, $3000 worth of computer material (7 computers)
were confiscated. Also it is reported that The Mentor informed on him.

The Mentor was busted for breaking into his school to steal 29 computers. Also
it has been said that Poltergeist is in the hospital with leukemia.
It is unknown if any other members were busted for any other reasons. However,
all former members are apparently safe now.

The Bit Blitz and Crustaceo Mutoid are supposedly forming a new group called
Rising Force and The Mentor is starting an elite hacking group.

Much of this information has been supplied by former Extasyy member:

Kleptic Wizard

scroll down
phrack.org/issues/2/9.html#article

>phrack.org/issues/2/9.html#article


> this is from thirty-two years ago
> mfw

Attached: Wat_Mr_Horse.png (587x448, 270K)

Can anyone give me a guide and tips to create and secure my own home network?

hurr
durr

Decompress the image to RAW RGB, it should be 48bit. Copy all lower order bytes of each color component pixel to another stream. Last 4 bytes denote the payload length. Payload begins at the very start. First byte after the payload end denotes filename length. Filename follows afterwards and is an ascii encoded string. It includes the extension.
Filename is included because some "platforms" do not have tools to determine file type via magic number.
For some file types it's possible to simply copy the whole lower order byte stream without parsing the additional information at the footer, at least 7z ignores it well, as well as pdf that's inside of that image.
This effectively bypasses the embed filter, because the original file content gets scrambled. It's also undetectable by eye and doesn't harm the original image in any way, if it's 8bit. I think up to around 82% of the final image size can be filled with payload, provided the image is mostly white.

>Search into the archive it should be the answer.
I have followed all these threads. One user said the physics was wrong but never came back with the details.