OP here; I was actually thinking of going through all the FAQs and stuff to try and make an entirely new OP post. The one I made is just a reformatting of the OP post in the last thread.
There's a lot of stuff in the linked Pastebins that is outdated or redundant.
Because it looks like shit.
Christian Morales
cyberpunk has nothing to do with cybersecurity
Nathaniel Thompson
is there some kind of a how to get into cybersecurity for complete beginner retards pasta?
Isaac Foster
No, because it's a pretty broad field. You need to know where your interests lie and what you actually want to focus on.
Bentley Russell
Who playing hackthebox here?
I’m on active atm; got the user flag, but unsure if I need to keep trying to pop a shell in order to get root? Can you use kerberoasting without a foothold?
Someone give me a good alert management tool to forward my ELK alerts to. Cant find SHIT.
Asher Brown
no u really need local admin to grab creds but there are lots of options otherwise
Joseph Robinson
email
Nathan Phillips
>There's a lot of stuff in the linked Pastebins that is outdated or redundant. sadly yes. if the pastes aren't interlinked, it'd be a lot easier keeping them up to date. any idea on how to make the updating part more feasible than everyone of us 3+ OP's keeping their own copy of the op up to date ?
Juan Murphy
I need something more trackable n shiet. Big GUI for admins in which they can track and acknowledge events bring processed. I used to use a tool called CA Spectrum that did this but looking for something that can take independent alerts.
Josiah Ortiz
any one here working in malware analysis field? i've been working myself through some reversing tutorials (lena151, TiGa and few youtube vids), almost done with Practical malware analysis book and thought i could take a look into some ransomware like locky. Turned out to be a huge overkill, i didnt understand anything.
Is Malware like Locky the daily level you guys encounter or is it the exception? Also any hint on easier samples?
Sebastian White
What do you do to not get hacked? You need AV and firewall, right? Are free onesbany good, and if so which are best?
Ethan Moore
Guys i keep trying to make new accounts to use on twitter and even with tor that shit always asks me for phone number after the captchas. Whats up with that?! Did i got blacklited or what?
Christian Harris
It's a security measure to prevent botting.
Chase Anderson
>even with tor >even Tor users have to deal with all kinds of shit from privacy-hating megacorps.
Zachary Gonzalez
Is shellcoders handbook any good?
John Rodriguez
download it and see
Joseph Hernandez
Fuck those shitter mane im gonna go to someone else home and make a bunch of accounts to use when they try this shit on me again. If i do so will i be able to use twitter with tor without having toput up with phone nunbers? Or am i still.fucked?
Gabriel Williams
it's probably mandatory by now. They tried it, it didn't create a huge shitstorm when they did, so everyone get's forced now. From a corporate viewpoint it's the best thing to do - data you can attribute to a "real" person is worth a lot more
Cooper Morales
At this point you might as well just use a burner phone. Look up Orbot for Android.
Eli Sullivan
Any good resources for learning to write emulators?
Nathaniel Wright
just do it basically you just need to be able to implement all the opcodes u need and the graphics routines and all the other shit the work involved depends on the platform you're trying to emulate
Sebastian Johnson
Is there anything in the pastes that are not in the FAQ?
Adrian Evans
Yes and no; it's more that there is a lot of useful information that's scattered around among the pastes and FAQs that isn't easily accessible from the OP posts.
Kevin Gutierrez
I've removed adware which opened new tabs with ads in the browser from my friend's computer recently. I wonder, how does this kind of malware work? The system files were intact, and some of the malware modified registry keys and added files to the appdata folder. What's the mechanism of this sort of benign malware which doesn't do any privelege escalation? That is, how does it work?
I think it's a decent and secure substitute for dropbox, other file hosting, email, or plain USB sharing, though by default you have to trust the a server not under your control as a relay (relay.magic-wormhole.io:4000 and transit.magic-wormhole.io:4001 from the source code). You can choose to run relays on servers you do control however.
But how does it work? How do the tabs get opened? Does the malware hook the browser functions? And how does it manage to stay persistent, despite not being present in the registry entries associated with startup program execution?
Leo Ross
Certain registry keys (HKCU) and location (appdata, temp) don't require privilege escalation to run.
I don't know if it's changed since the 2010 time period when I was trying to be a h4x0r but I doubt it because lol microshit.
Matthew Diaz
There's a key in HKCU that can be used for adding to startup. As for opening tabs, all they had to do was send a command to the OS that mimicked a user opening a URL (not sure what that would be because I have not messed with windows programming in a long time). It's probably the same way installers take you to the company site after they finish installing.
Ayden Turner
Why not give this a shot? They explain things easily enough. You have to start somewhere in security, it may as well be yourself.
What are some /cyb/ things I can do with a used server?
Andrew Davis
host a server for wargames
Parker Long
Air filtration masks to fight off pollution and wildfire smoke are most assuredly cyberpunk. They're necessary as well as aesthetic when the air looks like this. What's your favorite, /cyb/?