bump Also: FRIENDLY REMINDER TO GET YOUR ASS UP AND LEARN SOMETHING YOU LAZY FUCKS
Jace Kelly
The only general i read....learning wireshark is on my menu
Carter Turner
I really feel sorry for this general
Anthony Gomez
why
Jaxson Ross
always ded and not enough attention from people skilled in this topic
Luke Powell
yeah i suppose there's some truth to that. I might jump on irc in a bit
Dominic Allen
just completed irked on htb, will give hints if asked
Jaxson Butler
Is that Art of Exploitation book not a good learning method anymore?
Jose Green
Anyone here who played Neverlan CTF, who solved the last binary challenge?
Dylan Walker
nah; bet it's ez tho
Christian Morgan
im so glad this general popped up, tired as fuck of this retarded 'mUH SIKRET CLUB DONT TALK BOUT HAXXOR SHIT FUCK OFF'
its a legit sub-topic of computer science that i wish was more discussed on Jow Forums.
speaking of, is there an easier way to identify if a wifi access point (WPA2 + WPS) is vulnerable to a pixie dust attack other than actually trying to break in with bully/reaver ? I know wash or airodump can show wps and it's version but it doesn't really help.
Sebastian Murphy
bumping
Jackson White
It's worth the read. Good foundational book
James Collins
Sure. Watch the 802.11 traffic in wireshark. All the version info (including encryption scheme) is just flying around
Andrew Reyes
what to look for though? that would signify a pixie-dust vulnerability?
Hunter Harris
bloated OP
Ian Ortiz
No it i'snt Bump
Matthew Scott
How do you exploit the Android apps that aren't chrome?
I've been autistically decompiling an apk for meme reasons but I have no idea wtf I'm doing
Finished Help yesterday. If u need any hint let me know, user is tricky but great for learning about json / bypassing php filters
Wyatt Jones
Reading through it now. It's a bit old though.
Nolan Mitchell
I received a mysterious .dta file from a sketchy coworker at my previous job last year. It's obviously from his "side gig". He was offering me a ludicrous amount of money if I could extract the data from it, but he wouldn't tell me where exactly his contact got it from.
I opened the file in a text editor and noticed it had strings containing peoples' personal info and names of magazines. This is confirmed when I used the "strings" command which seemed to show call center type logs for magazine subscriptions at the end. I'm guessing it's subscription info. I've since left the company due to some serious issues and rediscovered the file today in my USB drive.
I tried analyzing the file with TrID and it says it is 100% a VXD (Virtual Driver) file, which doesn't make a whole lot of sense since the file itself is known to be a database and is dated to 2017. I also used binwalk to analyze it and it came up with descriptions of: >LANCOM EOM file >LZMA compressed data >Uncompressed Adobe Flash SWF file, Version 67
I extracted the LZMA and SWF sections, also with binwalk, but neither of the file types were valid, as in they did not extract or play in programs designed for their types.
Are there any other file type analysis programs I can use? Better yet, does anyone know of a database system that uses .dta files? I've already tried all the obvious ones (MySQL, SQLite, mongoDB, SATA, and others) and they were unable to open it.
it used to be more interesting but everyone doing actual shit seemed to have fucked off
Grayson Clark
this general is dead and full of noobs any irc?
Jason Myers
i know the guy who runs this
Adam Watson
Is he cute?
Landon Hill
to some women i'm sure
John Smith
What can I do with robots.txt? Doing a bug bounty
Adrian Bailey
read it
Christopher Mitchell
Why would anyone use robots.txt? It's not like crawlers are forced to respect it and it's like telling the bad boys where you have the important things.
Ryan Butler
Looking for resources for penetrating port 53 using UDP
Andrew Morales
>port 53 You mean a DNS service? The only way I know is doing a zone transfer.
Jaxon King
>Unsafe implanted medical devices holy fucking shit
Oliver Parker
to reduce the load on your server by crawlers visiting meaningless pages
Asher Moore
wuddup hakbOOOOOIIIiis trying to run a rogue AP and every device i connect to it keeps disconnecting every ten or seconds, why it do this here's the conf for the dhcpd: option domain-name-servers 8.8.8.8, 8.8.4.4; default-lease-time 600; max-lease-time 7200; option T150 code 150 = string; deny client-updates; one-lease-per-client false; allow bootp; ddns-updates off; ddns-update-style none; authoritative;
Maybe one of you nons can help me with this one too for my pentesting. Found a bunch of hidden directories using Burp which show the js files, the css file, and the rpc directory. All the file names are encoded with things like f49bc78c9a65b9733ae3.js. I tried decoding with decoder and doing a second round of decoding but didnt get any interesting results. Don't know much about this.. I assume its base64 encoded?
Evan Lewis
It's probably proprietary and encoded.
Brandon Kelly
Are you sure those are not just random names? I wouldn't assume a filename is b64 encoded because of the '/' character, even with b64URL I think the '-' character could cause some weird things with wildcards.
Aiden Adams
doesn't change anything, even disabled, still just a bunch of this shit, it's like the client sending any data at all just disconnects it from the AP 22:10:17 Client [le mac addr] associated (unencrypted) to ESSID: "Free WiFi" reuse_lease: lease age 88 (secs) under 25% threshold, reply with unaltered, existing lease for 192.168.3.2 DHCPDISCOVER from [le mac addr] (android-[censord]) via at0 DHCPOFFER on 192.168.3.2 to [le mac addr] (android-[censord]) via at0 reuse_lease: lease age 89 (secs) under 25% threshold, reply with unaltered, existing lease for 192.168.3.2 DHCPREQUEST for 192.168.3.2 (192.168.3.1) from [le mac addr] (android-[censord]) via at0 DHCPACK on 192.168.3.2 to [le mac addr] (android-[censord]) via at0 reuse_lease: lease age 89 (secs) under 25% threshold, reply with unaltered, existing lease for 192.168.3.2 DHCPREQUEST for 192.168.3.2 (192.168.3.1) from [le mac addr] (android-[censord]) via at0
Cameron Carter
I hate when I'm trying to do a buffer overflow and forget that I'm working with Python3. What's the difference between Python2 and 3 that changes the "printed" value when working with hex?
Landon Stewart
The text is very readable from what you can see.
There’s 88MB of readable strings in the file.
Ethan Mitchell
Then extract that readable text, if that's all you want. How much of it is unreadable?
Levi Cook
does anyone here like over the wire very rewarding feeling after doing their ctfs
Anthony Cooper
Python3 has better Unicode support, so there's something called byte strings. Learn the fucking language before LARPing like it's 1995 stack smashing season with it.
Benjamin Howard
But using byte strings doesn't change the output, are you sure that's the problem? What do you mean by "better Unicode support"?
Evan Flores
I assume 131112KB is "Unprintable" based on the file sizes. Of course that doesn't count all the info that could be encoded by bytes (booleans, numerical values, dates?). There were some "interesting" strings that I'm sure indicates what that sleaze was after such as "Visa", "CC#", "Chargeback".
There's some trashy summaries of what appears to be debt collection calls and lots of repeats of "Sent To Consumerpositive Upse" all over.
I did manage to get 7558 emails with a regex. Maybe it will be worth it to send them all a mass email to ask if they remember who contacted them?
I really don't know what the cybersec general is even for, last few times I checked it it seemed to just be people shitposting about different ways to encrypt their porn and muh niche privacy-oriented social networks and email providers. How is that the same as this one?