/cyb/ + /sec/ - Cyberpunk and Cybersecurity General

bump limit reached edition
last thread lasted like 6 days, let's see if we can beat it
/cyb/erpunk:
The Cypherpunk Manifesto activism.net/cypherpunk/manifesto.html
The Cyberpunk Manifesto project.cyberpunk.ru/idb/cyberpunk_manifesto.html

"What is cyberpunk?" pastebin.com/hHN5cBXB

Cyberpunk directory (Communities, Media, Readings) pastebin.com/VAWNxkxH
Cyberpunk resources (Miscellaneous) pastebin.com/Dqfa6uXx

/cyb/ ftp: ftp://50.31.112.231/pub/
ftp://collectivecomputers.org:21212/Books/Cyberpunk/

/sec/urity:
The Hacker Manifesto: phrack.org/issues/7/3.html
The Guerilla Open Access Manifesto: archive.org/stream/GuerillaOpenAccessManifesto/Goamjuly2008_djvu.txt

"Why privacy matters" youtube.com/watch?v=pcSlowAhvUk
"Shit just got real" pastebin.com/rqrLK6X0

Cybersecurity basics and armory pastebin.com/rMw4WbhX
Endware endchan.xyz/os/res/32.html
BBS archives textfiles.com/index.html
Various guides to get started github.com/mayfrost/guides/

Reference books (PW: ABD52oM8T1fghmY0) mega.nz/#F!YigVhZCZ!RznVxTiA0iN-N6Ps01pEJw

Thread Archive: archive.rebeccablacktech.com/g/search/text//cyb/ /sec//

IRC:
Guide github.com/mayfrost/guides/blob/master/IRC.md
Join irc://irc.rizon.net:6697
SSL Required:
#Jow Forumspunk
#Jow Forumssec
#nfo

Schway SSH Textboard: [email protected] (port 22)

Attached: cyriak.jpg (288x288, 14K)

Other urls found in this thread:

archive.org/details/cyberpunkeducator
ghidra.re/online-courses/
pastebin.com/8Hk5Ks7h
techxplore.com/news/2019-03-exploitation-techniques-defenses-dop.html
medicalxpress.com/news/2018-12-autistic-individuals-vulnerable-cyber-phishing.html
youtube.com/watch?v=vWenfoTrNJM
bbc.com/news/technology-47485731
twitter.com/NSFWRedditGif

Didn't add anything to the m0ar list because I was too lazy, give suggestions
/cyb/ Movies:
>The Machine (2013)
>Johnny Mnemonic (1995)
>The Matrix (1999)
>Chappie (2015)
>Elysium (2013)
>Virtuosity (1995)
>The Lawnmower Man (1992)
>Lawnmower Man 2: Beyond Cyberspace (1996)
>The Terminator (1984)
>Blade Runner (1982)
>TRON (1982)
>TRON: Legacy (2010)
>Escape from New York (1981)
>Escape from L.A. (1996)
>Rollerball (1975)
>RoboCop (1987)
>Nirvana (1997)
>Transcendence (2014)

/sec/ Movies:
>Sneakers (1992)
>The Net (1995)
>Takedown (2000)
>The Fifth Estate (2013)
>Blackhat (2015)
>Enemy of the State (1998)
>Hackers (1995)
>WarGames (1983)
>WarGames: The Dead Code (2008)
>Swordfish (2001)

Jow Forums Movies:
>Disconnect (2012)
>Antitrust (2001)
>Pirates of Silicon Valley (1999)
>Office Space (1999)
>Her (2013)

/cyb/ Documentaries:
>The Cyberpunk Educator archive.org/details/cyberpunkeducator
>The Internet's Own Boy: The Story of Aaron Swartz (2014)
>RiP: A Remix Manifesto (2009)
>TPB AFK: The Pirate Bay Away from Keyboard (2013)
>The Net - The Unabomber, LSD and the Internet (2003)

/sec/ Documentaries:
>Hackers: Wizards of the Electronic Age (1984)
>Hackers Wanted aka Can You Hack It ( (2009)
>New York City Hackers (2000)
>We Steal Secrets: The Story of WikiLeaks (2013)
>Citizenfour (2014)
>Terms and Conditions May Apply (2013)
>All Watched Over by Machines of Loving Grace (2011)
>Snowden (2016) [Biopic?]
>Zero Days (2016)

Jow Forums Documentaries:
>The Code (2001)
>Revolution OS (2001)
>BBS: The Documentary (2005)
>Get Lamp (2010)
>From Bedrooms to Billions (2014)

Series:
>Dark Angel (2000)
>Person of Interest (2011)
>The Expanse (2015)
>Mr. Robot (2015)

Songs:
>Robyn - Fembot
>Styx - Mr. Roboto
>The Buggles - Video Killed the Radio Star
>Daft Punk - Technologic

Attached: apu-clown.jpg (226x212, 7K)

Let's go, another c o m f y thread

How do i stream porn with javascript disabled

reverse engineering courses by the nsa
ghidra.re/online-courses/

Detroit Become Human is unironically the best movie from 2018. The collected cutscenes are on youtube.

Answer me

/cri/ + /nge/ - Cringe General

Help how do i watch porn with javascript disabled

cringe

Should I try the insane boxes on HTB or are they just a meme

looks like hackerman is back on patrol

( • )( • )ԅ(ԅ)

by enabling it

Open browser DOM, grab link to video, get it, watch porn. Regret it later that you should've been out getting real pussy

Thx user was just reading about this nice quads

pastebin.com/8Hk5Ks7h

Let me know what you think of this. I've only really worked on the /cyb/ section, but mostly because I started this last October/November and put it off for far too long. I figured I might as well release what I got, especially since one of the sections involves recommended cyberpunk media, and I'd like to save the trouble of reposting their list in every thread.

Just yell at me if you have any questions or concerns about what should be added or removed from any of the sections. In fact, I just noticed that there's a redundancy, and the IRC channels are listed twice across two pages. Whoops.

>pastebin.com/8Hk5Ks7h
There was another proposal a few threads ago with a little more formatting and reordering, did you check it out and compare?

No, I must have missed it. I'll go look for it and see what's up.

BTW some OPs have started the show by also including a collection of "=== News" from the previous thread. These news snippets are part of what makes this a different general from the rest.

I'll keep that in mind, but for the most part I just wanted to make up an OP post that was both organized more neatly and could be updated over time to add or remove new sites and dead links. Something more fluid or flexible than the previous one, y'know?

based nsa get

damn nice, based NSA

based thread
based NSA

anyone here take the CCNA Security?

The FAQ now has a more extensive list of manifestos, perhaps either refer to that section or extract those in a separate paste.

If someone has a pro subscription to pastebin they could upload a Markdown-version of the FAQ.

>last thread lasted like 6 days, let's see if we can beat it
That will be hard given that we have so much contents in here and still reach bump limit.

youtube-dl works for most porn sites

>page 9
another slow day

Attached: 1539484367551.jpg (1008x1344, 163K)

AEL-user should be ready soon, I think.

what are the pi's doing?

this is great
>*zipping and splitting intensifies*
I'm making some progress with the KMS.
At current state it's similar to dissenter, and looks like every site can become /b/.
I could just codename "be-everywhere".
Posting prototype is ok (fixes needed), next step is make it switch between public/private notes.


not my setup, I was just comfyposting

Attached: 1532755386605.gif (1600x900, 993K)

We might also carry over the unanswered questions from last thread.

Heard of ROP attacks? What about DOP attacks?

techxplore.com/news/2019-03-exploitation-techniques-defenses-dop.html

>What about DOP attacks?
The pain will never end. The only solution for the foreseeable future is to use processors as simple as possible. I am looking forward to the 6502 renaissance.

However this oddity caught my eye on the same site:
>Autistic individuals are less vulnerable to cyber phishing attacks than others
medicalxpress.com/news/2018-12-autistic-individuals-vulnerable-cyber-phishing.html
Good news for Jow Forums regulars?
>Given the known gullibility and social vulnerability of users with autism, the research team had hypothesized that individuals with autism would be more prone to phishing attacks in comparison to the participants without autism.
That was not nice.
>Contrary to predictions, both participants with and without autism performed nearly as well in identifying the fake websites, with no statistically significant differences. However, participants with autism spent significantly longer on real websites than the fake websites. Both groups did slightly better in identifying fake websites when they were familiar to them.

Care to explain what any of this means?
Why would changing user data be any different than current exploit techniques?

"The danger of data-oriented attacks, including DOP and the newer block-oriented programming (BOP), is that they do not tamper with the control flow of a victim program," Yao explained. "Thus, it evades the popular control-flow integrity (CFI) detection. From an attack perspective, data-oriented attacks are far more advantageous than return-oriented programming (ROP), as the basic ROP attacks extensively violate control-flow integrity and can be easily detected by CFI solutions."

I would say that currently DOP attacks would be difficult to detect.

how can it change the semantics of the program without changing its control flow?

I was asking more about how the implementation of the exploit works.
Sure, a user can input data that triggers a segfault or overflow, but I don't see how that is any different than current exploit methods, what the article calls Return-Oriented.

Any security hazards that I should be aware of if I allow people to access a self host a website via port forwarding http ?

>not my setup, I was just comfyposting
at least make up a comfy back story

Attached: hsg2.jpg (3968x2240, 1.13M)

return oriented programming puts a chain of return addresses on the stack at and above the original saved return address, which can be defeated by a stack canary. if the stack canary has the same value as before the function frame ran, the values above it probably haven't been changed, and the original return address is above it.

a generalization of ROP is JOP, where execution returns to a block of addresses to instruction sequences ending in a jump to the block. stack canaries don't protect against JOP because you can overwrite a function pointer to instead point to your first JOP gadget, which starts the gadget chain.

both of these are defeated by CFI, which checks jump destination addresses are the same ones included in the original program by placing an ID before them and checking it (looking before you leap). that form of CFI has a high overhead and isn't used in the wild, though.

i still don't understand how this DOP can induce arbitrary computation on the program despite CFI. sent it to some guys i work with to see if they can explain it to me

I think it's a bunch of academic hooplah jumping on buzzwords. I've seen "data oriented programming" used elsewhere.

i'm taking a course on OS security and we haven't talked about data oriented programming, so i want to assume it's not relevant for some reason, but it has a load of citations

I don't see how programmers naturally don't orient on data when they write anything. Isn't that the whole point of programming and computers: to take in data, process them, and output the results?

i think in this case is refers to subverting a program's semantics to execute your own chosen program by corrupting data in the local variables of a stack frame. along the lines of return oriented programming and jump oriented programming

lmao

Data oriented programming when googled points to data oriented design, which has nothing to do with DOP. Search the term "DOP attack" for better results.

There are multiple papers from different universities on this concept, so I assume it isn't a load of BS. It seems to be a fairly new type of exploit.

>need to reduce library size
>try to use surgical precision to not lose quality
>just removed some magazines that probably nobody is going to miss anyway
>mfw found a way to reduce size without losing quality
Also changing the compression to zip, is more common and comparing the average size is similar.

Attached: 1447698285956.jpg (500x699, 82K)

Anyone else trying out for /ecsc/ teams?

What is the total size?

Also, isn't RAR a better compressor?

I am really excited to see all this-

The limit for I2P is 512 GB and the AEL will be that. I don't dispose of rar atm.

Attached: 1526272983320.jpg (720x1080, 87K)

>Can the Police Force You to Unlock Your Phone?
youtube.com/watch?v=vWenfoTrNJM

>If you get arrested, can the police force you to unlock your phone using your fingerprint or facial recognition technology? This is a case of first impression. A federal court ruled on the question of whether fingerprint or facial recognition technology is considered communication for the purposes of the fifth amendment to the US constitution.

bump

So from some limited testing, I actually like Ghidra's decompilation better than Binary Ninja's. (I have never used the HexRays decompiler so I can't compare to that.)

Also the initial analysis phase takes a long time but it seems to be as good as Ida's, or better in some instances.

For the home hacker, this is a game changer. You no longer have to shell out $3,000+ for a high-quality, fully-featured static analysis tool. I hope Hex Rays slashes prices. And I hope Vector35 steps up their game, too.

>writing down passwords is considered bad security practice
>using easy to remember passwords is considered bad security practice
What about splitting it down the middle? Part of the password is written down (the hard part, e.g. random letters, numbers, symbols) and the other part is an easy to remember password.
Examples:
>d8#m1V@potato
>12345Qm3P~!
>23ojf*fuckit

I mean the easy part is never written down. So you just have a list of partial passwords written down. The user just remembers the easy part and puts them together for a password.

I just finished Johnny Mnemonic. I enjoyed it, but jesus it was so stupid and melodramatic.

What was it, 80 TB?
I remember back when the movie came out that it was an enormous amount of data, but by today's standards, it's doable even on a modest budget.

Keanu had storage for 160GB and his payload was 320GB. Almost nothing by today's standards

What's the best place to learn this stuff if I'm competent in webdev from the full stack side of things, but haven't done anything from the other side except use ncat to sniff sites?

I've been doing webdev for a few years now, and have been graduating to lower and lower levels of programming (self-teaching C is tough, I wish I had gone to school for CS). One thing I'm interested in is cybersecurity, but there isn't really any all-in-one-source places to learn it from.

>mfw still zipping

Attached: 1547098232513.jpg (949x678, 228K)

Attached: 1521542686452.gif (530x257, 3.14M)

What sections did you trim in order to remain within 512 GB?

>mfw finally generating torrent

Attached: cantwakeup.jpg (680x827, 85K)

>70100000 + 4
sheeeit. it could have been an epic AEL get.
Still, epic in itself.

Attached: 1520981098152.jpg (1280x960, 108K)

Some comics and magazines

Attached: 1439992088297.jpg (267x200, 9K)

Is being a sysadmin for 2-3 years a good previous step to getting into entry-level cybersec later? I started as sysadmin 2 months ago... For now it is mostly configure some apache, filter IPs, run commands like a monkey for the devs because they don't have sudo permissions in the machines (ie: laravel commands, git commands, etc), the most interesting thing so far was automating some of those tasks with Ansible so I felt less like a monkey editing the same line in 15 computers...
I'm still hoping it will get more interesting over time.
If it matters I have 1 yr experience as a webdev as well (in another company), I switched because I don't enjoy webdev much, but I'm bored as fuck now...

>Some comics and magazines
OK. And this was in addition to the manga that were removed earlier?

Just curious, what size were these?

Is anyone else feeling it is time for Christmas presents?? Woo!

Attached: haven1-i_see_stars-01.png (4800x3600, 880K)

>were removed earlier
There was no announcement earlier

>/cyb/ ftp: ftp://redacted/pub/
Cybersecurity General that cannot into a HTTPS A+ rated server and uses an unencrypted legacy protocol?
Fucking scrubs that never will pull off anything ever in IT data security.

Attached: 8c4decae.png (757x632, 198K)

Hi there hackerman

Attached: 3255235745_537f015c79.jpg (400x355, 47K)

=== /sec/ News:
>Security holes found in big brand car alarms
bbc.com/news/technology-47485731
>The security researchers exploited the bugs to activate car alarms, unlock a vehicle's doors and start the engine via an insecure app.

>The research was carried out for the BBC's Click technology programme by security consultants Pen Test Partners, which has a long track record of uncovering software flaws.

>The firm focussed on two well-known firms that produce alarms that can be accessed and controlled via smartphone apps - Pandora and Clifford (known in the US as Viper).

>The research found that Pandora, which had advertised its system as "unhackable", allowed a user to reset account passwords for any account.
Calling a system "unhackable" is in practice a Streissand grade invitation for people to try.

Do you scrub realize there is a maximum bend radius for twisted pair copper cables as well?

Attached: bend.png (261x193, 3K)

You sure must love having your ISP and goverment know what files you did load off that ftp in here.

I have to agree with you there

best way to cyberpunkify Windows 7?

Delete system32

>still generating torrent

Attached: mr bones.gif (500x500, 204K)

Install ElementaryOS

The way i do it is by using 4 or 5 random words (e.g. jogging, zebra, table, person) and put them together and add a number and symbol. (i.e. JoggingzebratablepersoN20&)
It's long, easy to remember, and secure. Just make up a story or whatever to remember the 4 words and that's it.
>also yes its from xkcd

Probably from last thread but what you gonna torrent

I'm gonna add this link as a proposal next thread so more anons can vote on it, also should I do that thing where I include previous === news?
You can vote here too I guess
pastebin.com/8Hk5Ks7h

Attached: itaots.jpg (640x640, 124K)

Honestly, I've gotten sick of software development. I'm trying to switch careers and become a l33t h@x0r.

Has anyone used OWASP's Juice Shop? I've nearly found all star 1 vulnerabilities(pretty sure I've found all, but they're not showing up). This thing is simply amazing. It's a modern application, built with modern tech.

Attached: juice-shop.png (1294x681, 101K)

One thing that's pissing me off, though, is trying to get into Bender's account(Yes, bender from Futurama). Security question is: "Company you first worked for as an adult". I've tried all variations of "planet express", "bending", "factory", etc.

What the fuck was bender's first company?

20th Century Fox?

Doubt it's going to work, but true. I've fucking searched for the first company but cannot find it. Wikipedia just says "bending factory." I thought that security question was going to be super easy, "planet express", but no. WTF.

>Keanu had storage for 160GB and his payload was 320GB. Almost nothing by today's standards
Lol. That is much lower than I remembered.

Attached: amazin-6a7f51cea3e4812bf212d80bc72381d48c6a6be1985632399162d891f958de19.png (339x420, 203K)

>Chappie (2015)
I geniunly enjoyed this movie. I watched when it first came out then recently watched it again. That pajeet is a good ass actor. I could have swore he was straight from India after watching "The Man Who Knew Infinity", which isn't tech related, but I think everyone here would appreciate that movie.

Buuut, I thought it was hilarious that Chappie was built by one guy in his bedroom.

First off FTP is all we have, the sFTP site has a file size limit we cannot get around. Secondly, have you checked the files there? An average newspaper has more controversial articles than that.

>First off FTP is all we have
I could set you up a better HTTPS server than this shit. No extra software required if you are on Linux. No excuse for being a fucking brainlet.

The please do. Really, it would be appreciated.

"""Could""" set it up on a machine. I'm not some free webhoster using my IP or name for other peoples files. Sorry senpai.

Not him but if you are going to sperg about it at least do so describing the alternative better than vague.

Ignore him boys, I got a hunch hackerman is scared of us using the ftp site for the impending feast we are about to have with filesharing. Read his intentions.

Well Nginx and Let's encrypt for starters. If he has a linux box that can handle lots of connections and give decent download speeds this really isn't rocket science.
I run an A+ rated server on a smelly SOC and get perfect speeds.
My massive anger stems from this thread claiming to be "Cybersecurity".
Guys please use crypto if you claim anything cyberpunk or even cypherpunk.
It's not hard, but I don't see why I should write a tutorial here. The guy is obviously angry at me for smack talking his unencrypted FTP. It's just a sad fact that meta data collection is real and your ISP does know what you download. The collectivecomputers ftp even has torrented movies. Might as well neck oneself downloading from there and leave so many traces.
I'll pass!

There is a point here though. I said something similar a year ago or so.

Still, an ftp is better than nothing and at this point is not like most here haven't been into "open directories" at some point.

Typical pleb babble of a brainlet who is overwhelmed by setting up a certificate chain and rolling out TLS1.2 or even TLS1.3, I offer both on my server.

Attached: ssllabs.png (1111x700, 46K)

The best solution I see is setting IPFS over I2P so we can collectively support filesharing with no single person taking all the load and do so anonymously.

I don't think the owner of the ftp is from /cyb/ but from another Jow Forumsentomen