If there exists a web service made for server-side python execution, which obviously has the correct permissions in place like not letting you import os and path transverse to root or anything, but it does however allow server-side C execution through Python scripts, how likely is it that we've got something to play with here?
Evan Carter
I'm learning the fundamentals of networking and doing a shit job at it because I'm really lazy.
Evan Butler
bump of life
Dylan James
This is back? Wasn't the security general "merged" with the cyb one? Nice, anyway
Jace Reyes
Do you guys think the linuxacadamy 300 shekels offer is worth it?
Brandon Jenkins
Is this the hackerman general or the capture the flag general?
Benjamin Sanchez
it's probably sandbox'd. but if not, you could generate a C privilege escalation exploit and then run it. otherwise, the C you execute will have the same privileges as the python you execute
Hudson Bennett
Got some interviews in the next week for some junior SOC positions. What questions to expect?
Isaac Clark
Dumb question but what do you mean by sandboxed? As in in a VM or something? Also surely even with limited permissions you still gave wriggle room with something as low level as C, I'd imagine at least. I'm still in the process of learning the language let alone creating exploits with it
Evan Ortiz
yes, as in a VM. you wouldn't create an exploit, you would find one on exploitdb, and write the text to a file in python and then compile it from python. it doesn't matter how low level you go, unless you leverage an exploit to elevate your privilege, you won't be able to do anything you're not allowed to do, because all programs you run will run with your privilege unless they have a setuid bit. not sure about windows
I went from ~7 second bios to 3 second bios. It's a bitch do modify (have to reflash all changes, but it works internally) but other than that, I'm happy.
Get shodan, it was/is on sale. 5$ instead of 49.
Charles Lee
Yeah think it died. I saved the text of >>/cyb/ + >>/sec/
Going to make a new thread at some point soon.
Parker Peterson
yes
Carter Nguyen
>>/hmg/ died unfortunately. If I can find a way to recover the copypasta I might try and get it going. It was a neat little general though.
Easton Sullivan
I saved the copypasta so if >>/nsg/ dies we can bring it back.
David Sanders
how do i stop brad from hacking my ip
Grayson Baker
I recommend Carrier on htb, learning bgp was great fun.
Dylan Price
give me research topics for my os security and mobile network security classes
Mason Price
Anomaly detection.
Jayden Lopez
bump
Landon King
Bumpity bump on page 10
Parker Adams
Whats a few options for a decent wifi dongle that can be used with wireshark. So monitor/promiscuous mode?
Windows 10/Kali compatible?
Kevin Lopez
>Windows 10 Yeet yourself, son
Jaxson Taylor
answer the question you dotard
Hudson Bennett
i was the one who first merged cyb and sec. do we need to merge more?
Anthony Hughes
Hackthebox.eu is a nice CTF too, should add it to the OP.
Oliver Howard
>allows server side C execution FFI is your friend, depending on the OS you can have much fun depending on privileges. But even without Admin/root you can get jucy info
Jaxson Harris
No u
Jeremiah Morgan
In /hmg/ we discuss pentesting, hardware hacking, exploits, and general being a hackerman.
I'm a reverse engineer/vulnerability researcher. If anyone has any questions about that career field feel free to ask.
Adrian Myers
I use Kali linux guyz.
Isaiah Moore
die
Cooper Torres
bump
Justin Thomas
yes, what's the point of trying to create a "secure" UEFI when all intel processors have 30+ hardware security vulnerabilities that bypass Libreboot?
Gavin Smith
How competitive is the field outside murrica? Also, how's the pay, was it hard to find a job?
Josiah Harris
I don't know about the job market outside America, sorry. It was not hard to find a job at all, I ended up turning down a bunch, and the pay is great for an entry level position ($98k).
Nathan Robinson
There is literally nothing wrong with Kali Linux and the only people who complain about it are contrarians who don't want to be seen as "cringe"
Gavin Sanchez
Any distro is cringe if you don't have a cute anime wallpaper
Dominic Rogers
Haven't seen one of these threads in a while, but they're the best on Jow Forums. In /hmg/ we discuss pentesting, hardware hacking, exploits, and general being a hackerman.
It's in Virginia. I got about half a dozen offers from $75k up to $98k. The cost of living is high around DC but drops a lot as you get out to say, Centreville or Manassas.
Oliver Peterson
noice, i'm planning on getting a job in charlotte nc. i read on linkedin that it's the highest paying city for cybersecurity after accomodating for cost of living
Colton Carter
what is your edu level/certs look like? i'm trying to get into the field myself
Cooper Adams
"Below the poverty line. Nearly two thirds of American families of four live on less than San Francisco's "low-income" threshold of $117,400. " -- BBC news
Luke Anderson
So a jr dev can't support a family of 4 in San Francisco, seems about right to me.
Jacob Edwards
not only that, you are below the low-income threshold. and good luck commuting. go do a little research about the traffic situation, even as early as 5am.
Ryder Diaz
Someone suggest me some interesting, fun to read CCNA Book. Wendell Odom's book is one of the dry and boring book Ive ever read. Stopped after 3rd chapter.
Jacob Jackson
If you can get a clearance (not a felon, not a heroin addict, not a gambling addict) I would also apply for stuff in VA. There are a lot of cybersecurity customers here.
BS in CS, and Sec+. I would say the degree is the most important just to get you past HR people. OSCP opens a lot of doors too if you can afford it and dedicate the time to it. Even if you fail the test you will have learned enough to make the cost worth it. SANS certs are also very good.
Christian Adams
i already have a top secret clearance but idk. i applied to fire eye in VA but i kind of want to stay in NC. it'd be a hassle juggling rent. i was super pumped about DOD stuff but my excitement has quelled recently as there's few jobs in NC. probably just going to work for schlomoberg at the banks
Levi Hughes
if i had OSCP and a high level in government recomendation, like someone who handles TS/C shit on a daily basis, could i skirt by without the college? hardest part would be the recomendation, i grabbed the guy's wife's ass and he's sore af about it
Nathaniel Martinez
Makes sense. Keep in mind places like Quantico, they are looking for TS/SCIs too and they are far enough from DC that the rents are quite low.
Cooper Collins
It's an iffy proposition for government/contract work. Knowing your shit and having OSCP could carry you through the interview, but in my experience around here, the degree gets you into the interview. Nobody cares about recommendations or references, or even *where* you went to school, as long as you have the degree so they can justify your bona fides to the customer.
Dylan Roberts
/hmg/ In /hmg/ we discuss pentesting, hardware hacking, exploits, and general being a hackerman.
>If you can get a clearance Is it possible to get a clearance as a Canadian-American? Just curious, I work in the states and have a dual citizenship. I don't really want to renounce though and I heard that's the only way.
Brayden Stewart
i'm confident my friends in the gov can come through to get me that interview networking!
also i now finally have kali on my laptop, so i can finally start to stretch my legs. no more fucking around with virtual machines, it's time to get serious. buckle down, take my addy, and focus on this shit, get ready to take the OSCP
any good study guides for it? I have Kali Linux Revealed rn, but i can download more
Gabriel Murphy
Yeah, I am pretty sure you'd have to give up your Canadian citizenship.
There's nothing wrong with using virtual machines. There are actually no downsides for using Kali on a VM as far as I know.
As for OSCP, you'll get an hour or so of videos and a 300~ page guide when you sign up. Beyond what is covered in that material, you will have to do a lot of independent research in a few areas. Privesc comes to mind as something essential on the labs but which barely gets any mention in the guide. There aren't any books on privesc, you will have to read through a bunch of online guides and build your own game plans. To get an RE job you'll have to also dive pretty deep into computer architecture. I recommend a college-level computer architecture textbook to start, something like this amazon.com/Digital-Design-Computer-Architecture-Harris/dp/0123944244/
Ryan Roberts
>giving up canadian citizenship is that really even a downside?
also thanks user, i'll admit i went with kali so it would be easier to do things, and i'm not super comfortable with kali VM's and i'll have 2 laptops soon.
any downloads or books that fell off the back of a torrent you could throw me, or must i venture into this wilderness alone? i want to be as informed as possible before i sign up for the course. Recovering from an injury RN before i return to full time work
Ian Nelson
You can google and find your own book recommendations (actually you can find everything you need on various tutorials and websites), but here are some general tips: make sure you are comfortable with the Linux command line, Bash scripting, and the fundamentals of the TCP/IP suite. Learn Linux and Windows access control schemes. Learn basic assembly, how stack memory works, what linkers and libraries do. Get comfortable with tools like Wireshark/TCPdump, Metasploit, Nmap, netcat, (i)cacls, ps, grep, and a debugger of your choice.
Oh and do a lot of Hackthebox/vulnhub practice VMs. Watch and read walk throughs when you get stuck.
Angel Carter
i'm not sure how much networking plays a role in gov't jobs. it might, but i wouldn't count on it
Isaiah Reed
how familiar should i be with hacking mac/osx/ios? or is most serious shit along the lines of windows/linux? What about android and hacking on ARM architecture?
also i'm guessing i should stop watching the defcon infotainment and focus more on the dry boring lectures?
Networking is a powerful tool. Imagine waking up and seeing things you suggested implemented at a national and international level. Knowing the news months ahead of the journalists because you simply remember the subject talking about it with you to get your advice because for some fucking reason they think your barely educated ass is worth being a bouncing board for their international geopolitical ideas. Seeing people die and survive because you pushed one way or the other.
BTW curious, if you were a politician who got caught doing something you shouldn't have and you had digital evidence, what would you do?
Justin Sanders
yeah, but if you don't meet HR's requirements, there may be nothing they can do because of the law
Carson Lee
>HR
yes,that is actually my biggest fear. Worst case i'll take a pay cut to work for people more privately.
Still, the last question? I'm curious to how someone with TS/CSI would answer VS the one i gave that they went with. I never really know what answer is "optimal", so i like getting as many alternate opinions as possible.
Matthew Mitchell
this? >BTW curious, if you were a politician who got caught doing something you shouldn't have and you had digital evidence, what would you do? the answer is follow the law
Colton Cruz
Sometimes things aren't so clear. Sometimes following the law can look bad. For example and unrelated, flirting with a 17 year old girl in a state where the AOC Is 16.
Anyway, my answer was to come clean. Took the wind out of the sails of a journalist who was working to get the scoop. Was hilarious when i met said journalist later and had to giggle to myself that i was the cause of his suffering. Twas a faggot anyway
Nothing like seeing Jow Forums talk about your work and adding to the memes that are frequently spread. Like being an artist seeing your shit in famous galleries.
As for the answer, if you want to be an "Honest" Politican, i figured the only way to do so from that point would be to come clean, dump everything and turn yourself metaphorically in. Admitting weakness is the most counterintuitive thing to do, and once done, disarms the accusations against you from what they would have been if they tried to hide them.
Oh, and Mac/OSX/IOS? How important are they to know?
Matthew Flores
The real question is, if you're gonna be doing something that would move the government against you
Why not pay cash for a local used thinkpad
Kevin Hall
>order laptop over ebay a week ago >supposed to be delivered today >last tracking status: "In Transit to Next Facility"
So what are the chances it went to an NSA Tailored Access Operations facility?
I might have pissed off someone with shady connections, including NSA, at the last place I worked at.
are you mentally ill? you come across as crazy. i have no idea what you're talking about. but no, i wouldn't prioritize mac OS, i would just learn linux unless you have nothing else to learn about the NSA isn't a place where you slip someone a $20 and get someone's packages intercepted. if someone is "shady", they're not going to be working at the NSA, and the usage of their capabilities is subject to monitor and oversight
Aiden Garcia
The guy I've pissed off certainly has access to more than $20. I'm sure he could easily afford the few extra zeroes needed to compromise someone, and I'm sure the NSA bureaucracy is big enough that an illegitimate "suspect" like me would be lost.
Andrew Martinez
>your government would never do anything to hurt you or act unethically >just trust them, goy...I mean guy
if you're a US citizen, he would probably be better off paying someone off at the FBI, not the NSA
Sebastian Wood
They have a TAO-like program too?
Gabriel Roberts
tell me what you think TAO does
Xavier Parker
>have shipments rerouted to them >carefully open package >implant spy hardware and software onto electronic devices >carefully repackage goods >send to intended receiver
from wikipedia: "TAO identifies, monitors, infiltrates, and gathers intelligence on computer systems being used by entities foreign to the United States.[4][5][6][7]" are you a foreign entity?
Josiah Morgan
I'm not. But would the FBI have something similar for US citizens? Common sense seems to indicate "yes", but I haven't heard of such capabilities. It's also not too much of a stretch to think that the FBi and NSA could share workshops and tech.
Jason Sanders
yeah i'm certain the FBI has an equivalent. just be aware the real intelligence landscape isn't like how Jow Forums thinks it is
Jayden Miller
How so?
Dominic Bell
end of conversation, ivan
Christopher Watson
For the love of fucking god, they were merged two years ago, and UNMERGED almost 18 months ago.
is that really how long it's been? where has the time gone
Landon Kelly
I've been reading practical malware analysis for quite a while now, still stuck on chapter 6 - detecting hll instructions in assembly output, unfortunately I do not progress too quickly, mostly because of the repetitiveness of malware and absolute lack of lack of creativity among malware creators (I've got access exclusively to virusshare and almost all positions there are some poorly obfuscated excel macros or javascript downloaders)...
Isaac Gutierrez
I use the AWUS036NH for Linux. Works with OS X too. If you want a Windows-compatible monitor-mode dongle you will need the npcap library. I have successfully used the AWUS036NHA with monitor mode on Windows, however it is incapable of injection, only monitor mode. Also doesn't work with OS X since there are no native AR9271 drivers.
What the heck is a "Master Hacker"? I mean, overall it does a good job of listing the things that are commonly exploited but nobody is going to master all those things, cryptography alone could take you a whole life to master and to be able to find new vulnerabilities for strong crypto, just like becoming a master in reverse engineering would take a bunch of time too. I think you only really need 15,16 and 17, because once you have those the rest of the skillset you need to advance will become obvious. It really depends on what you want to focus.
Ayden Nelson
Reading this cover to cover. Seems like a good resource.