/cyb/ question Is VR ever going to become mainstream, and if so, do you foresee it having any practical use outside of gaming?
It seems like a hell of a lot of effort for enhanced telepresence. I have heard of it possible being useful for employee training in industrial fields but, again, making your own in-house vr app to train employees is probably more effort than it's worth. Opinions?
Parker Bailey
Hey, I'm trying my best to bump here.
Xavier Baker
cyberpunk has nothing to do with cybersecurity
Cooper Edwards
1. This thread is dying even with the merge, imagine what it would be like if they were separate threads 2. The "cyberpunk has nothing to do with cybersecurity" posts provide additional bumps
Ian Reyes
Also, "/cyb/ + /sec/" sounds dope af
Nathaniel Hill
Did everyone in this thread already know Black Hat is shit and DEF CON is pretty ok?
William Foster
anyone know any (semi) permanent physical computer markets/swap meets around the world? MIT Flea in boston is one I'm thinking of
Sebastian Diaz
How is Coursera when it comes to learning about cybersecurity? I'm starting a session tomorrow just to find out if it's something I'd be interested in since I'm more into programming myself. Is it a good career to get into and for people who actually are in the field, do you enjoy doing it?
Gavin Reyes
Speaking of DEF CON, someone explain this shit to me: queercon.org/ Homosexuality has nothing to do with Cyber security.
David Jenkins
Homosexuality has a lot to do with cyberpunk, though.
Jeremiah Smith
Yeah and the number of gross trannies walking round was disturbing. Was it always like this?
How exactly?
Robert Thomas
Should I be fluent in certain programming languages, or is having a general understanding of programming good enough?
Luis Sanchez
The latter but of you are in this thread you will most likely want to learn Python, C, and a bit Assembly.
Oliver Cruz
Work sends me to the retail association show every year. The last two have had 3 or 4 vendors selling software for vives that let you build a training environment without having to do it from scratch.
Having tried some I can say it's dumb. Maybe for something highly specialized but you're not going to train cashiers with it.
I must admit, I was expecting..more from DEF CON after realizing that BH is shit. I was utterly disappointed. It was a ton of LARPing for relatively little hacking. Much like this thread.
Tyler Gray
How many times are you going to make this post?
Luke Perez
it was my first time to both and this is exactly the impression i got
Connor Allen
So what have you been working on lately?
Isaiah Howard
I fucking love these threads, specifically that pasta. Although I don't typically spend a huge amount of time posting because THAT PASTA
i have a new machine though so I'm going to just download all of it
Caleb Anderson
did these threads used to be popular? why was I browsing /b/ 24/7 when I should've been here. How do I get back from all that missed potential? Where did they go? Who will give me recommendations to get into 0day?
Cameron Hughes
So I've been plowing through bandit. I built my own arch machine from scratch (ie no BS helpers) and I did 26 levels of bandit in a few hours cause so far it's fucking basic. However, I've had a mild amount of trouble with this particular level. Should I be concerned and abandon my entire dream future in cybersecurity? Should I kill myself?
I feel the same about the Chaos Communication Congress in Germany. Last years' just left a bad taste. I mean - I enjoyed the atmosphere but that's about it. Another thing is peer review. At least for the C3 it's non existant which leads to many talks that are just plain wrong and probably even dangerout. Prime example - running OONI probe in countries whith an oppressive regime in place. As a citizen probably fastest way to get yourself on a list at best. As a tourist, you've got nothing to fear - the ramifications won't come back to you but hit your host/the local provider/.. instead. Using SDR to detect bugging devices? A bad joke if you've ever done anything with SDR before.
cyberpunk has NOTHING to do with cybersecurity though I don't want to fucking hang out with lainchan freedom fighters just so I can learn skills for a resume
>I don't want to fucking hang out with lainchan freedom fighters nobody's forcing you to :^)
Mason Howard
Only if it is vat grown and operated through cyberspace.
Angel Johnson
They still are popular, we just have a problem around midnight to 0600 CET since interest varies a lot with time zones.
Also this is probably the comfiest thread on Jow Forums, possibly only rivalled by
Gavin Thomas
Anons, how do people hack facebook nowadays? I barely use it but I just found a notification that my password has been changed, the language changed to Chinese, and someone has logged in and tried to create Facebook ads using my account, also created some fake page with a picture of a chinese woman The weird thing is my password is unique and not used anywhere else. All my passwords are generated via a script with three random words and three characters, e.g. "protectexchangedolphinF9*" I'm kind of paranoid now since I don't see how they could have got that password unless they have actual access to my machine
Carter Rivera
They fish you or log your machine with malware. It's not that hard to get a simple undetected keylogger going. Also, optimally you shouldn't use dictionary passwords like that.
>It's not that hard to get a simple undetected keylogger going. even on Linux? and as far as I see nothing else has been accessed. I haven't had any gmail notifications and $1000 of bitcoin is still on my machine
Thomas Roberts
Everybody knows Black Hat is a joke. They even had a high NSA representative give a speech at the last conference. I thought that was hilarious. It's the equivalent of an agricultural conference inviting a fox to give a speech about guarding the chicken coop.
Cameron Ross
Check also your phone for malware. Side installed apps? Might be a problem.
Jacob Anderson
What do you think about the Cyberpunk game being PS4 exclusive?
Jaxson Phillips
forming an opinion usually involves listening and trying to understand more than one side. Otherwise you'll have a deluded, raging twitter mob that goes > PATRIARCHY REEEEEEEEEEEE etc
Elijah Adams
The meme of Linux and UNIX systems are mostly "immune" to malware are mostly because of the way the kernels structure the permissions and mostly have official repos. In truth, it's just as vulnerable as anything else. This. You maybe could have also logged into your account through a compromised public network. If you ever used your friends' devices, there's a chance too that you could have gotten snooped.
That's the thing retard, governments, in relation to their citizens, don't have opinions, they have misinformation
Austin Anderson
Black Hat is a technical conference about hacking. Three letter agencies do a lot of hacking. Not every infosec related conference is about fighting the man.
Carson Green
>even on Linux? Yes. In addition to you have the problem of root kits and infected hardware that are OS agnostic. Snowden revealed that even routers are intercepted in transit and loaded with malware. Nearly every peripheral you have contains at least one microcontroller, a hard disk can easily contain 3. All of these can be compromised.
Henry Martinez
Any y’all playin HTB?
Mason Cooper
You can't do infosec without being against government. The two are mutually exclusive
Jose Rodriguez
How about you delete your post and try again, you fucking moron
John Rivera
don't you think discarding another stand point solely on the fact that it doesn't comply with your on counts as delusional? And no, that doesn't mean I approve whe workings of certain three-letter agencies
Julian Reed
What's the most /cyb/ music genre? Obviously it would be mostly synth-based
from my personal experience so far, you'll need to have at least the basics up to O notation, although algorithmic complexity and performance will almost be useless to you. Everything else you learn in a 101 or 201 class in CS will be of use, i.e: difference between recursion/iteration, flow control, abstraction, mem management, etc.
Benjamin Rivera
I doubt they have your password, but its always a good idea to never reuse passwords.
As to how they may have gotten into your account, I would assume broken Access Controls or lateral escalation.
Facebook and react are cancer, Im sure if you search hard enough on the darkwebz there are some 0days for facecrook.
Levi Long
>I doubt they have your password Yeah, I just had the obvious realisation that if they reset my password then they probably did not have my password, or they could have logged in without resetting it. Which makes me happier.
>What do you think about the Cyberpunk game being PS4 exclusive? I think I’ll never get to fucking play it which is a shame, because I am not buying a console for one fucking game
Brandon Morris
If you don’t even know if you like doing it or not why the fuck are you asking about careers in it?
Blake Kelly
>Should I be concerned If you’ve spent 26 levels on bash it’s not a surprise you’ll try more bash. The ZSH was a shock. I wouldn’t be concerned at all.
which one? They had some decent courses a couple years ago.
Mason Taylor
>>That is to provide a democratic veneer to what in reality is state ownership of business and production means which is getting close to communism >Privatization is happening more and more so you are wrong A lot of privatisation around here are done with the state owning 51 or 31 percents, so they can continue stuffing the board with the party faithful. I once worked for such a company and it was early made clear to us newcomers that promotions required proper allegiances. So don't be naive.
Andrew Watson
Introduction to Cyber Security Specialization
Chase Jones
Heavy industrial, also known as power noise and hellectro. A great example is Terrorfakt.
no because cyberpunk has nothing to do with infosec
Colton Morris
I rather liked windows until I had to support it in a professional setting. My company sells an embedded product which runs on 10 LTSB and I handle our system image for it. I want to kill myself. Fuck M$.
Henry Wright
Still here?
Anyways, Cyberpunk music has much to do with Cyberpunk.
The course synopsis sounds decent and about what most course like that will offer. It should get the job done if you're looking for a start. I've done a couple courses with them which were good. Intro to Information Security in conjunction with FEMA and another one which was basically the same info. Find a focus once you've conpleted the courses. IE, Incident Response, Malware forensics, Data forensics, SEIM and ACL's, Policy and procedure, Hacking and Pen testing, etc.
Then move in that direction with certs that are related. This industry is cert crazy because Uni's can't teach practical application or experiential elements. We get grads with CCNA's that can't subnet or read a Wire Shark session capture to save their life.
Easton Martinez
>cyberpunk has nothing to do with infosec >thread is literally cyberpunk and infosec u wot m8
Liam Jenkins
If that were true it wouldn't have been teased during Microsoft's panel at e3
Plus, even for the non-LARPers, physical fitness corolates heavily with mental acuity. Being in shape improves mental focus and clarity of thought. I'm not really sure where this meme of the idiot gym-bro popped up from but it's absolutely not the case.
Joshua Wood
ok thanks man
Gabriel Morales
What was the hacking book recommended in the old thread?
Carson Howard
Hacking: The Art of Exploitation?
Angel Long
are the hak5 toys cyb?
Wyatt Watson
they're tools like everything else. You'll need to understand them to tell if it's the best way to get things done. Just like a hammer isn't the tool of choice when you're trying to screw wooden planks together
Colton Morales
I guess a better question is are they worth the investment if I have the spare dosh available
Jason Moore
all of those can probably built by yourself aswell while paying less. You'd have to get into everything yourself and maybe even do the software part yourself. In the end, you'll have similar functionality - most likely less compact and stable. There are even shortcuts that may work - I've seen guides on how to reflash regular USB sticks to act as a ducky or a pinapple firmware image for the GL-iNet AR-150 (cheapo chinese routers)
Christian Rogers
My shit has alot of blue LEDs.... I think im pretty cyber.
Josiah Ramirez
Hak5 does indeed make toys. Do not purchase them, take that rpi out of the drawer and use that as a remote pwning device.
A shitty tool, made for a child or retarded adult. Its an improper tool that one should feel ashamed of using.
Julian Bennett
what's the most /cyb/ + /sec/ distro?
Mason Evans
subgraph imo. provides hardening, sandboxing, anonymization and proxying out of the box. still in alpha tho' but doesn't feels solid
Caleb Kelly
>subgraph first I've heard of it but it looks neat. I would have said blackarch myself though, as it comes with a huge array of tools for both offense and defense. But sadly a lot of it is bloat.
Logan Moore
is Blackarch still such a pain in the ass to update? The last time I tried, I needed to --ignore about twenty packages before I could update.
Or aren't you supposed to -Syyu after installing Blackarch ?
Camden Brown
I dont know to be honest. I only used it for maybe a week when I was really interested in pentesting. But I'd assume it would work the same way as regular arch, so you should update with -Syu, not sure what a second 'y' does but I know that doing -Sy without the -u is considered dangerous.