/cyb/ + /sec/ - CYBERPUNK/CYBERSECURITY GENERAL

Previous threads: [ archive.rebeccablacktech.com/g/search/text//cyb/ /sec//type/op/ ]
THE CYPHERPUNK MANIFESTO: [ activism.net/cypherpunk/manifesto.html ]
Last thread: []
- - - - - -

/cyb/erpunk [29 JUN 2019]
The Cyberpunk Manifesto: [ project.cyberpunk.ru/idb/cyberpunk_manifesto.html ]

The alt.cyberpunk FAQ (V5.24) [ ftp://50.31.112.231/pub/Alt_Cyberpunk_FAQ_V5_preview25.htm ]
What is cyberpunk?: [ pastebin.com/pmn9vzWZ ]

Cyberpunk directory (Communities/IRC and other resources): [ pastebin.com/AJYry5NH ]
Cyberpunk media (Recommended cyberpunk fiction): [ pastebin.com/Dqfa6uXx ]

The cyberdeck: [ pastebin.com/7fE4BVBg ]

- - - - - -

/sec/urity [29 JUN 2019]
The Crypto Anarchist Manifesto: [ activism.net/cypherpunk/crypto-anarchy.html ]
The Hacker Manifesto: [ phrack.org/issues/7/3.html ]
The Guerilla Open Access Manifesto: [ archive.org/stream/GuerillaOpenAccessManifesto/Goamjuly2008_djvu.txt ]

The /sec/ Career FAQ (V1.9) [ ftp://50.31.112.231/pub/sec_FAQ_V1_Preview11.htm ]

Why Privacy Matters: [ youtube.com/watch?v=pcSlowAhvUk ]
"Shit just got real": [ pastebin.com/rqrLK6X0 ]

Cybersecurity basics and armory: [ pastebin.com/v8Mr2k95 ]
Endware: [ endchan.xyz/os/res/32.html ]
BBS archives: [ textfiles.com/index.html ]

Reference books (PW: ABD52oM8T1fghmY0): [ mega.nz/#F!YigVhZCZ!RznVxTiA0iN-N6Ps01pEJw ]
Learning/News/CTFs: [ pastebin.com/WQhRYB59 ]

FTP Backup: ftp://50.31.112.231/pub
OP Post: [ pastebin.com/xCgHSzsa ]
#! sec guide [ pastebin.com/aPr5R1pj ]
EFF anti-surveillance [ ssd.eff.org/en ]

- - - - - -

thehackernews.com/2019/06/ea-origin-game-hacking.html

Subdomain takeover leads to OAuth token compromise allowing account theft.

Attached: cybsec.gif (938x1032, 3.05M)

Other urls found in this thread:

technadu.com/german-police-raid-omnirat-developer-house-arrest-him/71614/
youtube.com/watch?v=MFGRhhQGgeE
nytimes.com/2019/06/27/us/lake-city-florida-ransom-cyberattack.html
hackthissite.org/
overthewire.org/wargames/
vulnhub.com/
reuters.com/article/us-china-cyber-cloudhopper-companies-exc/exclusive-china-hacked-eight-major-computer-services-firms-in-years-long-attack-idUSKCN1TR1D4
reuters.com/investigates/special-report/china-cyber-cloudhopper/
latimes.com/books/la-ca-jc-review-richard-kadrey-grand-dark-20190611-story.html
tapas.io/episode/1448324
youtube.com/watch?v=WSNGK9gmdpg
techcrunch.com/2019/06/24/hackers-cell-networks-call-records-theft/
bbc.com/news/technology-48808465
isc.sans.edu/diary/rss/25084
beginners.re/
twitter.com/NSFWRedditGif

technadu.com/german-police-raid-omnirat-developer-house-arrest-him/71614/

Write a "system admin" program they said, it's perfectly legal they said.

As a non-IT related college student, do you guys delve in cybersecurity?

I spent some time learning about network security on my spare time, is quite relaxing but so far is a hobby jf I want to go beyond, unless is about hardening my Linux. Not sure what you guys think.

youtube.com/watch?v=MFGRhhQGgeE
>Deepfakes are going mainstream
>shit is happening like in a horror show
Welcome to the future motherfuckers

nytimes.com/2019/06/27/us/lake-city-florida-ransom-cyberattack.html

so guise are we gonna be bitcoin millionaires or what i mean come on guise this should be easy it's not like the fbi is really that good guise

Attached: guise.jpg (640x690, 31K)

Attached: hVooHzAERe8lEnS4rCgNlgGmcDF.jpg (700x1050, 57K)

If you're gonna post WarGames you might as well post actual wargames.

hackthissite.org/
overthewire.org/wargames/
vulnhub.com/

bump for cyberwar

Looks like /cyb/ has another child general. The degoogling general also needs some collab if you guys want to give a hand.

There is no degoogle.

page 8

How do you manage to make your threads last for a long time, do you just keep bumping every few hours?

Some anons like me happens to have the thread open in second plane while doing other things. So before I realize we're hitting 8-9-10 page and I bump it.
But that's me I guess.

We are legion
Expect us ;^)

>The national oil company of Kuwait, which also happens to be one of the world’s largest, was enraged by this, and so they demanded the identity of the OmniRAT developer from the registrar of “omnirat.eu”, and a powerful corporation like KPC cannot be easily denied this information.

Really??

How would one safely contain viruses on their computer so that they won't get activated and so that antivirus software will leave it alone? Specifically trojans, worms, and ransomware that come from torrents?

I want to make a virus zoo.

>safely contain viruses on their computer
Don't put it on a network.
> so that they won't get activated
Don't run them.
> so that antivirus software will leave it alone?
The fuck would you even have AV on a box dedicated to rape?

Mainly it is about contents and interesting discussions about the world we live in, a reality the majority cares little about as they willingly upload the most intimate information to FB. Panem et circenses is how it works, about 2000 years after the phrase was coined.

Others seem more cold blooded, willing to exploit a weakened soft west:
=== /cyb/ News:
>Exclusive: China hacked eight major computer services firms in years-long attack
reuters.com/article/us-china-cyber-cloudhopper-companies-exc/exclusive-china-hacked-eight-major-computer-services-firms-in-years-long-attack-idUSKCN1TR1D4
And for what purposes?
reuters.com/investigates/special-report/china-cyber-cloudhopper/
>Projects Kronos and Echo related to former Swiss biotech firm Syngenta, which was taken over by state-owned Chinese chemicals conglomerate ChemChina in 2017 – during the same period as the HPE investigation into Chinese attacks on its network.
Now that is what I call planning. China, always looking for gaining tech of ALL kinds, wormed itself into an acquisition target and get its prey.

Meanwhile people discuss what is next after Game of Thrones.

=== /cyb/ News:
And Dieselpunk was not dead:
>Richard Kadrey's 'The Grand Dark' feels like a Tom Waits ballad in a diesel punk novel
latimes.com/books/la-ca-jc-review-richard-kadrey-grand-dark-20190611-story.html
>Richard Kadrey is the pioneering cyberpunk writer best known for his blockbuster supernatural horror series “Sandman Slim”; but as anyone who follows his work knows, he has more than two arrows in his quiver. His latest is “The Grand Dark,” a noir, diesel punk book set in a Weimar world of war trauma, debauchery, cabaret and looming disaster — and it's superb.

This desu. China is stepping up and looks hungry for the west.

True.

And it is a strange kind of Deja Vu with a twist. Back in the 80's Japan was seen as invulnerable and it was only a question of time before they had bought everything of value. There were accusations of copying but they also developed new tech. US government wanted to restrict the flow of tech and you got messy affairs such as the US killing the Japanese TRON CPU/OS project.

Now we face China who has no inhibitions on vast industrial espionage but unlike Japan is a dictatorship that suppresses its people and execute an estimated 3000 a year. On top of that they are so extreme in their Victorian grade industrialisation that they cut up the executed and sell body parts for big money.

Under a system like that they can catch up with the west in terms of tech but are unlikely to surpass.

If I don't pass OSCP next time, I'm gonna kill myself

Attached: WmRbmf5.png (1475x879, 1.28M)

Should AEL be in the OP message? Hang on in there, user, never give up. Nil carborundum!

Attached: DisUnity.png (1081x726, 1.42M)

anons, my comp pretty much explodes if I run multiple vms at once. What's the best cheap route to have one hell of a box to train on? 1-2k usd limit

Have you tried docker?

Why not use a cheap and cheerful Raspberry Pi or a cluster of them?

New episode in Sammy, the desert punk web comics
tapas.io/episode/1448324
Seems they have tried to stop people copying images...

NEETs have a lot of time. either that or police/military/intelligence agents.

you are doing well, IMO. keep learning, read a lot, get your hands dirty and have fun.

>suppresses its people and execute an estimated 3000 a year
the US govt only controls them... except for the capital punishment.
reminder that 2% of the US population is imprisoned/jailed, and that the US has the higher imprisonment rate of any country in the world.
but hey, muh freedom, right?

why do you even care so much? you shouldn't worry about the OSCP, you should care about learning.

get more RAM. also, monitor your VMs, they shouldn't use that much RAM/CPU time.

>reminder that 2% of the US population is imprisoned/jailed, and that the US has the higher imprisonment rate of any country in the world.
For a start that figure is probably true while the next countries on the top ten list are not famed for their credibility. If China is selling body parts we should expect them to do medical trials on the inmates, where failed experiments are just to be expected.

>NEETs have a lot of time. either that or police/military/intelligence agents.
For my part I am working full time, I just keep one tab open for this general. A lot are working in security according to an earlier poll.

yo guys I am studying IT so I can code n stuff but I would like to learn about cybersecurity and stuff where should I start?
I mean I know the basics of all attacks and stuff but what should i really start doing to start learning the real shit and not dos and stuff?
I mean I am not dumb enough to think about becoming an hacker or something like that just I am curious and want to know what I am talking about when it comes to security in the practical things and not just the theory and maybe do something cool with vm in the meantime

This is where you start:

The /sec/ Career FAQ (V1.9) [ ftp://50.31.112.231/pub/sec_FAQ_V1_Preview11.htm ]

Can someone please tell me something interesting to do with a few TB of packet capture data from an enterprise server cluster.

thx user i owe you one

That's exactly what it was. Had so much shit running outside of the vms I didn't notice they were pretty much relying on the swap. Picked up some el cheapo ram earlier and everything runs fine now

thought about it. I might just wipe this comp and do a hypervisor setup

My professor recommended CISSP. Although idk exactly what you learn in it. I'll start it in the fall since I'm too busy with work right now.

Although he recommended that for prior military, idk if it's worth less if you're not also a homeless vet.

Two tries, no clear answer yet, hoping third time is golden:
Which topology is the best.

Attached: Topology.png (1280x1024, 27K)

what are you trying to achieve user?

I want to experiment with a TOR server, it is a handy way of putting one online without getting a domain name. Perhaps I can host the files library so we can keep people complaining about FTP quiet. Mostly it is a learning experience.

So how should it be done without leaking information?

Attached: Blue_streetlights.jpg (500x500, 57K)

youtube.com/watch?v=WSNGK9gmdpg

Great introduction to securing your Android phone.

>inb4 is impossible
Yeah, he says something like that.

Dumbphone recommendations?

There's literally no need for a second firewall and the second config doesn't add anything that the first one can't do (except it's less secure)

>why do you even care so much? you shouldn't worry about the OSCP, you should care about learning.

A job and a life would be kind of nice. I don't have either of them

Attached: eyrfadracm431.gif (500x558, 1.46M)

if you seriously want to an hero pls message us on the general

i've been looking for another suicidal guy for awhile. you could do a lot of good user. a lot of great memes.

is gay sex cyberpunk?

Attached: 5.png (300x300, 72K)

techcrunch.com/2019/06/24/hackers-cell-networks-call-records-theft/

Looks like APT10 or someone trying to frame the Chinese got access to call detail records for major cell phone operators all over the US. Could it be the CIA monitoring us or just China's MSS?

gay sex is the definition of bread and circuses

all dog and no pony if you get it

lots of mayo and no subway 5 dollar footlong
all caboose and no car
lots of sausage with no raddish
like a 2 inch thick thin crust pizza with no cheese, sauce or toppings
under the heel of such an oppressive regime the only way to fight back is being a normal motherfucker who doesn't want to fuck non-sexual organs

C, it's called a DMZ. Don't forget to filter your egress traffic and use a NIDS like Snort/Suricata/Bro/Zeek.

get help schizo

And to add to this you don't need a second physical firewall, just a logical one.

lmao

dude, you have no idea what money and soft power can buy. every country needs oil.

Gay sex is prison sex, except the system itself is the prison.

does this boy look like a prisoner to you

Attached: kisumi-1.png (2400x1698, 2.73M)

lol

just get the cheapest nokia you can find. symbian os is buggy, but you'll probably have the battery and sim card out most of the time, right?

This might be a relevant question to cybersecurity. Any input?

having more than one adblocker installed is the definition of redundant, no idea what most of those propriatary bloat/spyware plugins are either.
there are plenty of ways to remain reasonably anonymous online, even here. I won't give you advice on evading bans though, cunt.
you evidently don't have a clue what you're doing.

>Finally, a few things not to do.
>Don't use a silly, grandiose user ID or screen name.
>Don't get in flame wars on Usenet (or anywhere else).
>Don't call yourself a ‘cyberpunk’, and don't waste your time on anybody who does.
>Don't post or email writing that's full of spelling errors and bad grammar.

You had one job.

>no idea what most plugins are
>accuses others of not knowing what they're doing
Sounds like you have an attitude problem. You must be a joy to be around

Strongly considering going into infosec as my specialty, am I right to assume my job will be 90% nothing and 10% telling boomers how to run an antivirus

More like 90% running audits and 10% typing reports in LaTeX more like.

i like to think i'm pretty good fun, you're likely correct in your assumption that we wouldn't get along though. you've got your friends and i've got mine.
depends what sort of role you apply for, but there's plenty of that kind of work out there if that's specifically what you're looking for.
if you opt to specialise more however, you will likely have some more lucrative options available to you

Not sure I believe that you have any friends due to your unnecessary and off-topic hostility to a genuine and honest question you could have easily ignored. Like you had to go out of your way to insult someone for no reason. Imagine what you're like in-person. Who would want to be around that? Go to therapy; it will help with your social skills.

Bump

Aight so Im an infosec and networking scrub, and: I want to map all the devices connected to my network.

I dont know what IP range my network occupies (will be reading about this after posting). My question: if I do a broad scan like nmap 192.168.1.0 to 192.168.1.255 and end up probing devices not on my network, could I get in trouble?

Attached: zenmap-screenshot-02.png (882x756, 37K)

all this (((cypherphunk))) shit ruins these threads dude. just go back to being net+sec and you might have people older than 14 post in them

that is not broad, nor would it fall outside your own network
and no, chances are that port scanning someone elses box would not land you in any trouble

Thank you! I will read further.
I went through with a quick scan, and found 256 hosts on that range - yet there are probably less than 30 devices on the network between my roommates and I. Dunno what that means.
I will educate myself further

What? i cannot see there is much cypherpunk left, some are dead, others have disappeared. Rather, it is so obscure people felt it necessary to state May had in fact not been cut down in a hail of bullets.

I have a question about browser extensions, any other ones worth considering, are some of them redundant?

I use:
Chameleon
Decentraleyes
I don't care about cookies
Privacy Possum
Smart HTTPS
Trace
uMatrix / uBlock Origin / Nano Adblocker + Nano Defender

These ones I think are obsolete with my setup:
Canvas Blocker
ClearURLs
Ghostery
HTTPS Everywhere
NoScript
Privacy Badger
Random User Agent
WebRTC Control

My firewall is Smoothwall, and it uses Snort.

I was concerned the firewall used on the open net could leak information a lot more traffic was taking place. No chance of side channel leakage?

No, but the original meaning of "punk" was.

>NIDS
Got any recommendations?

I have a ryzen 7 1700 w/ 16 GB of 2133 MHz RAM, and I can run 3-4 VMs at once with ease (on a Windows 10 LTSB host). These days a build like this goes under 1k usd, so you should be fine, even with an upgrade.

Bump with news:
=== /sec/ News:
>Jack'd gay dating app in payout over leaked nude photos
bbc.com/news/technology-48808465
>Gay dating app Jack'd will pay $240,000 (£189,000) after exposing members' private intimate photos publicly on the internet.
>Anyone with a web browser who knew where to look could access millions of private photos, even if they did not have a Jack'd account.

Do they never learn?

Page 8 bruh.

Cross board on Arcologies

What's up with Mastodon limiting user subscriptions? I was bored and saw there was something called cybre.space so I thought why not, but they're saying 'fuck off we're full'. Is this a game, some attempt ate creating artificial scarcity or plain ol' shitty servers that couldn't handle a bigger load?

Attached: opgrf_intro018_RENAMEBEFOREPOSTINGSTEVE.jpg (728x546, 51K)

why is pentesting such a shit job?

Attached: 1409419523997.jpg (1162x1200, 337K)

Because everyone works on keyboards now.

I see alphabet agencies are trawling for easy prey...

Slow day today. And night is here. You know the drill.

Attached: Daybreak_by_Parrish_(1922).jpg (3463x1999, 1.35M)

Can any of you recommend podcasts like Darknet Diaries or Anarchast? There seem to be very few cyberpunk/cypherpunk podcasts really. I would love to hear some reccs.

Smoothwall supports multiple NICs and DMZs, but you'll have to lock it down using iptables. If you're running a Tor hidden service then make sure it can't communicate with anything except the Tor network by only opening the right port on ingress/egress. Use tshark/tcpdump to capture the traffic and make sure it's not leaking anything.

pretty sure azure and other cloud misconfigs are gonna be the easiest things to hack for the next 3-5 years. tons of database leaks on amazon and google cloud.

Snort or Suricata if you're just starting out. Zeek if you know what you're doing.

Friendly, shit taking bump

google says it was related to spunk and prostitutes and originates in the late 17th century. most people link it to music from the 70s and 80s.

>70-80s music
That is correct, but most of the original bands weren't at first operating under that moniker; that's what they got called by the papers.

Punk to me usually means against the grain and anti establishment; like hippies but more edgy. While some people think you have to act or dress a certain way, true punk, at least in my shit opinion, is more about the sport and attitude to rebel agaisnt mainstream norms.

isc.sans.edu/diary/rss/25084

optional streams in office docs used to hide malware payloads

it's not, but you'll wind up doing mundane stuff a lot of the time then having to write the same report over and over. once you pop, you just can't stop!

Did you build a husbando out of rasppis and dragon dildos?

Guys, I have a career question.

If I dont want to do network security, and I have been studying reverse engineering, whats the next step for me? I am slowly learning the assembly languages from beginners.re/

I am currently in college, but I have comp sci as my degree, and /sec/ as my concentration. I dont trust my college to teach me much beyond the basics of comp sci.

p.s. I feel like network sec is a pain in the ass, from my interactions with wireshark, and experience in IT for a family business. Is it a lucrative career? am I wrong about it being a pain?

If the reverse engineering stuff is at sufficiently low level, you could do embedded stuff.
There are companies doing reverse engineering consultancy, reverse engineering entire cars, but I am not sure the job market is that big.

How the fuck do I deal with Intel Management Engine or any other similar backdoor?
AFAIK just touching this shit may brick your puter.

You don't. The NSA dealt with it by building in an OFF function. Look that up and see what you can do to call it so you don't have to flash anything.

You mean the HAP bit, but there really is no explicit proof that it really turns off anything.
I think it also needs reflashing the firmware anyway.

why is netsec a pain? you don't have to build protocol disassemblers to understand how bgp poisoning works. do you not understand psh syn ack fin urg rst? are bit fields too much?

Hmmm, this made me wonder, do we know there is no such misfeature in Raspberry Pi?