Ok here is the real question, which language is more Cyberpunk. Haskell, Lisp, Scheme, Rust, C, or Erlang?
Functional languages seem the most cyberpunk to me personally, but I'd be open to other peoples thoughts.
Connor Barnes
asm
Kayden Russell
imo scripting languages are. Quick 'n dirty but gets the job done
Benjamin Nguyen
Do you guys install software with ports? How about making ports yourselves? Why not Perl?
John Anderson
Imo only those languages that aren't target towards large business applications, so nothing "enterprise-ready". >Haskell, Lisp, Scheme, Rust, C, or Erlang Out of those I'd say Lisp/Scheme and C.
Hudson Barnes
Honestly C. It's fucking everywhere, it's easy to learn due to heaps of documentation and examples freely available in the wild coupled with the brain-dead simple syntax. It's powerful enough to write efficient code with and drives most embedded hobbyist hacker projects. Not to mention the fact that getting C up and running from the ground up on a modern computer is a cinch. All you have to do is produce your binary, load it into memory, set up a stack and longjmp to the entrypoint; which means it only requires a few lines of assembly to bootstrap providing any dependencies are statically linked into the binary. C and Assembly are punk as fuck.
Pretentious academic research bullshit like any functional language I would argue as being the antithesis of punk.
Kayden Moore
javascript, how are you ever going to disrupt the institutions that threaten your freedom if you can't speak their language?
Nolan Green
Can any one recommend some good C-Books which aim towards hacking?? I've been searching a little but can only find general approaches
Not really, no. Books will not teach you anything more than general approaches. The best thing to do is use those approaches, coupled with some intuition to develop experience doing whatever it is you want to do. "Hacking" is not a particularly helpful term.
Jason Walker
that one looks interesting. I'll give that a try, thanks! got your point, thanks for advice!
Eli Gutierrez
is 'violent python' worth reading?
Oliver Rivera
Curious to hear this too, I see it suggested a lot.
i wonder if this will work for more than a few days.
William Carter
What?
Gabriel Diaz
Seems to be gone already, according to the onion.to gateway.
Levi Stewart
Hello guys, first time poster on Jow Forums. Didn't want to start a new thread and didn't feel like getting banned "for not following rules" so might as well ask here.
So I have an old semi decent computer (with win7) that I use to host private game servers for myself and a couple of friends (inb4 cracked, we mostly play arma 2/3 and dick around dayz mod). In any case, recently I opened port 3389 because I was lazy and didn't feel like setting up a VPN for a couple of days I would be gone in case somebody wanted me to do anything. Left the server running as well.
So it happens I got a nasty ransomware infection. Ironically, arma server is a tough bitch and doesn't like being messed with when running so all my server files were left untouched, but pretty much everything else is encrypted. Now I don't actually need anything that was on that computer because I'm not completely retarded and I knew something like that would come eventually.
What I would like to do is find out if the hacker left any traces and in process learn something new. I know he connected over RDP, twice in fact, and there are computer logs missing. I already checked prefetch and there are some clues there. Couldn't find anything in registry. It appears ransomware program has deleted itself after running as well. Any suggestions where else I can look next? Also is there any way to check browsing history, cookies etc. even if they were deleted from the program/incognito mode was used?
onion.to seems to be v2 only, this is v3. I can still connect to it.
time to wait for some time periods to roll over.
Landon Brown
what are some good ctf sites for practice
Bentley Flores
Windows stores RDP connections in the event logs, if the malware did something to your logs you won't be able to view the attempts.
That said senpai, never ever open 3389 to the internet, people scan the entire address space looking for idiots like you. Same with any other windows service. Use a VPN or just install team viewer next time.
Nathan Parker
"Here at Braymar college we can get you prepared for the 31st century with advanced programming, quad-rendering and Java+++ scripting language. We offer advanced job placement assistance. So upgrade your grey matter cause one day it may matter!"
Isaac Jackson
Thoughts on Parrot OS vs Kali Linux?
Anthony Hill
thnk u vikram
Carter Nelson
Cyberpunk has nothing to do with cybersecurity.
Jonathan Cook
youtube.com/watch?v=9fMN80wkYvM That was a big eye opener video. We practically are like in the 70's with computers. Some of you guys are alright this is why I suggest you invest in DIY biohacking market and you'll get huge gains, mark my words.
No idea, but someone was talking about a biohacker that was drinking his own fecal matter for genetic modification
Evan Wright
I think you got it wrong because that doesn't makes sense.
Asher Young
Why doesnt he just get it FDA approved, boo-hoo he has to wait a while for it to be approved but everyone else has to. What makes him an exemption
Angel Ward
Ohhhhhhhhh, so you were against DIY and you tried a curb. Well mr. government, trying to stop progress and sucking big corp's dick is not something to be proud about.
Alexander Harris
Not but he's just whining and whining, where is the tale of his attempt to even get FDA approval.
Christopher Rodriguez
Okay mr. FBI, if you are going for the ad hominem then why are you so proud of the FDA?
Why are you so defensive of this pierced hippie that litterally states he did 30 minutes of reserach on whether or not it was dangerous to consume his homecooked liquid.
=== /Sec/ News: Tired of all the spyware, monitoring and backdoors in Android by Google? You are not alone:
>Meet the Frenchman masterminding a Google-free Android Meet the Frenchman masterminding a Google-free Android theregister.co.uk/2018/06/15/meet_the_man_building_a_googlefree_android/ >Interview Open source had a moral purpose when it was fighting "The Borg", Microsoft, in the 1990s, but then it fell from view. You could say it has found its mojo again, only this time it is about loosening the grip of companies built on ever more intrusive personal data processing: Google and Facebook. One of the biggest but most promising challenges is creating an Android free of Google's data-slurping.
Kayden Reed
>Last phase of interviews, its an interview with the boss who made the multi-million dollar 500+ employee company from scratch >This is fine >Interview starts, hit it of instantly >Then the fucking questions >"So how many kids and how soon will you get them with your girlfriend?" (Im male and so is he) >10 minute story setting up a genie dilemma type of deal about what to wish for >"If i gave you 700 000 dollarinos to clean all the windows in this town in any way you wish, would you do it? You would? Well show me your calculations then" (spiralled into 2 A4 papers of calculations about avarege time for cleaning windows given avarege window location / amount per citizen, turns out it would be pretty good payment in this town)
Got the job though. Then instantly walked straight into a punch-bag hanging in the corridor. Fun times.
I need to encrypt my Android phone without using the provided encryption app, it is weak and most likely botnet. I want to encrypt everything,including the operating system. Can EDS do that? What other apps do you reccomend?
an app will never be able to encrypt your system - you know, sandboxes and stuff. if it's a root one, it'll be able to, but that leads to the next problem - who decrypts your system so it's able to boot?
Anthony Jenkins
no
Oliver Turner
Any updates from the user that wanted to make a banesuit?
Ayden Thompson
How can I trust a 4gb file for hacking books in a hacking thread
Camden Rodriguez
what else would it be? grabbing the file and having a poke won't kill you either way
William Scott
>won't kill you either way ... as long as you do it in a sandboxed system like a VM with no internet access.
Henry Carter
>yessss download my root kit
Gavin Ramirez
>any malware >4G
Alexander Collins
oh, that shouldn't be hard, considering the V7 leaks. Remember those mid-90ies "Hacker tools"-CD's ? Those were alread 700MB full of legacy malware
Isaiah Garcia
Care to elaborate please? Any alternatives you'd suggest?
Josiah Moore
Can I see archives of these anywhere?
Hudson Thompson
these books get outdated fast and they're mostly all a waste of money/time if you want a good read, get a decent book on computer/OS architecture
not really, you'll only find a handful when searching for malware analysis tutorials. It's kinda hard to host that stuff and additionally its possession is illegal almost everywhere
Nicholas Gutierrez
Some /cyb/ animations in (and a fair bit of garbage.)
Robert Cruz
It's a huge number that they'll be lost to time like that. I'm sure there was lots of interesting stuff on them.
Blake Lopez
*bummer
Ian Sullivan
I need an "airgapped" device for setting up cold bitcoin storage... I have an old laptop and a Raspberry Pi 3
I don't know how to physically remove networking capabilities from either... which would be simpler to do?
On stackxchange someone said
>To completely disable the onboard WiFi from the firmware on the Pi3, add
>dtoverlay=pi3-disable-wifi
>in /boot/config.txt.
Would this do it completely?
I do have a hardware wallet for bitcoin (Trezor) but it's still not airgapped and connects to USB, I want to create a safer device that is completely unavailable for networking for storing the larger portion of my bitcoin. Trezor (hardware wallet) will only keep 10% or so, for daily "needs"
Thank you all for any help
Noah Butler
indeed. well, that cd should be somewhere around. If it comes around, I'll rip it
Luke Phillips
What do you mean ? Where would you save the private keys ? In the SD card ? Why would you do that?
Logan Powell
This
Julian Phillips
The notebook would boot TailsOS from USB and the keys would be stored on an encrypted persistent partition on the USB
But ideally the notebook used for this would not have any connection to the Internet, so to be 100% sure I think I have to remove wifi and network physically?
Levi Torres
Why is C++ not in your list?
Jayden Hughes
Parrot can be used as a * daily driver * when Kali shoulb used live. Both are shit
That is why I follow Redox-OS but in spite of GSOC it is rather silent. Latest news is moving to Gitlab possibly self hosting.
Adrian Lee
Hello /cyb/, looking for a torrent with 4.5 GB worth of pdfs all about Cybersecurity that was posted on /t/ but I cant seem to find it in the archives anymore, I feel retarded for not saving it to my pendrive earlier before my computer died.
probly speculative execution attacks. rendering decades of processors vulnerable in one fell swoop is pretty hardcore.
Blake Sanchez
CRISPR/Cas9 becoming a mainstream topic, yet at the same time without the politicians understanding the enormity of the potentials. It is the megacorps that are positioning themselves here for future stakes with an aim to become the next Google.