would it be a faux pas to study sans material towards a certification during downtime at work if it's mostly relevant to my job?
Adrian Nguyen
that's totally fine user, you might even be able to get them to pay for it if you try
Ryan Young
It should be encouraged. Also many places will give incentives to their employees to continue education
Dominic Parker
study phrack, too. they were doing rop stuff in 2002.
Charles Jones
Has anyone here sat their OSCP exam? I took it a few weeks ago and failed the privesc on the 25pt machine, DEVBOX. Can anyone tell me how they got system on this? Or how they got root on lazyb or Vulcan? The low priv on lazyb was easy as fuck, using that couchdb python script (after modifying the fuck out of it, I reckon offsec intentionally break some of the shit in exploitdb). And Vulcan I was left in the fucking cold with. I got 0 points on that one, and have zero clue how to break the perimeter of that box.
manager said it's ok so i'm gonna buy it on the company credit card
Logan Peterson
>having a manager who lets you charge out sans courses to the company credit card You have made it. I am jealous, friend.
Sebastian Allen
i'm only making $70k and this is the only training i'm getting for the year so i'm gonna savor it
Luis Russell
70k entry? Not bad user
Jordan Smith
Fuck you im doing infra and im only getting 68
Leo Evans
I guess you should practice again. Asking for the solution here won't really help you.
1. It's highly unlikely you will encounter the same set of machines. 2. Move on from those mistakes. You're just gonna beat yourself up.
Now if you say you want to know how to solve those boxes so the next time you are in a similar position you would know what to do, then you would do better to refining your methodology than focusing on particular scenarios. This is much more beneficial and more practical than memorizing steps on how to crack a particular box.
Benjamin Carter
Which are you taking? Better not a meme one. Sans is already meme as it is. Looks good on a CV though.
Go out and do shit. If you’re trying to go real punk, maybe try some drugs get some shady friends.
Jeremiah Jackson
METH AND NO SHOWERS THEN START FIGHTS WITH STRANGERS
Gavin Bell
this smoke some phat rocks cunt
Lucas Sanchez
Make decisions based more on what is right than on what is legal. And wear a leather jacket with spiked shoulders.
Brody Cooper
rn is hot, so I guess I'll make a t-shirt like that
Lincoln Scott
fuck guys I'm gonna get outed as a noob for sure at DEFCON
what do?
Owen Ward
That's fine. Just enjoy it
Charles Taylor
it will be fine user, there will be many more like you, just have fun and learn along the way, everybody was a noob at some point Wish i was you desu, i've been wanting to go to defcon for a while now, but i live too far away
Hudson Nguyen
Hey anons, I'm new to /cyb/, what is the general consensus on lainposting? Also, should the OP be updated with this video on why privacy matters? I think it's just as good as glenn's speech, and it gives practical examples of happenings and headlines to illustrate the point invidio.us/watch?v=Hjspu7QV7O0
>It's highly unlikely you will encounter the same set of machines. I came across the same ones twice
Connor Russell
Same set? Same 4 machines? (BO shousl always be there)
Isaiah Baker
Same 4. Different BO. First BO I did had more than 20 bad characters. Was crazy. This one has legit 4. Other than that the boxes were the exact same. These feel way fucking harder than the cyb3rsick dumps said the old boxes were.
Eli Thomas
Oh lucky you then. BO is the same challenge everytime, practically speaking od course. Yeah I guess they're different after the leaks. I took mine before it happened
Oliver Johnson
excellent video fren. thamx for sharing. i think this is better than the greenwald video precisely for the reasons you stated. examples like the ones in the vid you posted help to drive the point home about why it matters. im downloading it to add to my personal off-line achive. of you have others, by all means please post.
Ah well. Im going to spend the next few weeks living inside metapsloitable 2 and 3 and see what I can learn there.
I have run through pretty much every box in the ippsec HTB recommended list; honestly a HTB vip sub was not as valuable as I thought it was going to be. I found a bunch of them to be replicas of things in the offsec labs.
Aaron Hughes
that guy's whole cannel is based. big corps are the enemy of the people imo.
Fuck off and study more you faggot. Trying to cheat on Offsec tests should be a bannable offense here
Elijah Thomas
Ah really? How many did you do in the actual labs though?
Owen Anderson
Is there a way to protect my identity while making Youtube videos? Obviously I wouldn't show my face, but what about the voice? Due to the content I'm going to create, doxxing is a very real threat that I need to be aware of.
Joshua Edwards
>use a vpn.
But seriously, not sure how you're going to go about making them that there is a probability of leaking PII. Can you elaborate more on what you want to do? There are creators who seem to exclusively use simulators. Have you thought about using one?
Aaron Wilson
34. Pivoting did not interest me as I knew it would not be in the exam. Got all of the big 4, they weren’t too bad at all.
Improve your course materials then fuckhead. Yeah Im calling you out; the videos I got sent in May were recorded I fucking 2013. Your exam boxes and the labs have nothing in common. Your company is straight up ripping people off, and this retake price increase coupled with the boxes that are legit not covered in your material means YOU are the scum, not me.
Juan Gutierrez
Eh that's fair. Not many like completing the labs for the sake of completeness. Most do as much as they can because they are anxious about the exams. Though there are some interesting machines in the other networks though.
Jaxon Roberts
I don't work for Offsec but I do have my OSCP/E. If you really did get 34+4 in the PWK labs, the exam machines should not have been a problem for you. They are nowhere near as technically challenging as the labs.
If you thought you were going to go into the exam and copypasta your lab notes to win your cert, you are retarded. Cheating is not the answer to your problem. Cheaters degrade the value of lab-based certifications. If you have beef go take it up with Offsec directly instead of whining in /cyb/ looking for handouts.
Mason Garcia
Yeah I've thought of using a simulator but I don't think I've ever heard one that sounded like a real human voice. I was wondering if there's some program that alters your voice in a way that still sounds natural, but simply a bit different from how you normally sound. Another option that came to my mind is to hire someone to record the video for me on Fiverr. He would probably do a better job than me anyway, since I don't even have a good microphone.
>use a vpn Thankfully I don't have to worry about the government coming after me, so using my real ip should be fine.
>Can you elaborate more on what you want to do? I just want to speak the truth about a few things that the mainstream media rarely talk about, and unfortunately there are lots of people who're gonna hate me for it.
Jaxon James
Yo do you have plans to take OSEE?
John Gonzalez
Hmmm if you want to limit your footprint then it makes sense to use a simulator rather than paying someone shouldn't it? The last thing you should be worrying about is familiarity if your priority is anonymity.
Tyler Hernandez
Hey /cyb/. I'm not a programmer but I've been banging my head on this ctf called microcorruption. It's basically using assembly to find vulnerabilities in the code for each level. I got along on through buffer overflow and format string vulnerabilities levels just by doing my research online, but I've started levels now that require heap overflows. I've tried to read some material on how chunks, malloc and free works, but it's melting my brain trying to make it work in practice. Anyone recommends something a layman like me might pick up too better understand how overflows and UAFs actually work? Chunk headers specifically have been giving me hell
Jackson Wilson
>do have my OSCP/E You have the old machines. What you said is correct; for the old machines. I have read all the dumps for the old ones. The new ones are way above what you had. Fucking mempodipper, unrealIRC remote roots, black hole one shot root, tomcat system shells; do I need to go on? The old exams were more in line with what the labs had to offer.
The only one I’ll give you credit for is the blowfish decrypter; that one isn’t something immediately obvious. But you seriously don’t know what the new ones are like. You can’t compare.
Jose Cox
Well, as far as I know, you don't need to use your real name on Fiverr, and all payments are processed by them on their platform, so the guy I hire would never know my real identity. I'm not 100% sure about this though.
Kayden Jackson
Doesn't liveoverflow have a tutorial about this? I remember he also recommends doing these challenges too. Though his videos about heap exploitation is not that good but it's a nice start. You can also try doing protostar
Juan Howard
If that's the case then go for it. Keep us updated maybe?
Robert Myers
Does that matter though? Shouldn't passing rely more on the student's developed skills and methodology? If what you say is true then determination and correct application of the lessons should allow you to overcome the exams
Jonathan Diaz
>You have the old machines
Nigger I fucking tested both my exams in the last three months. Don't talk to me like you know shit. Study for your fucking exam.
When I have time
Jayden Russell
>correct application of the lessons should allow you to overcome the exams Are you the same dude who has his OSCE? Because if so I urge you to have another look at your PWK materials. They do not teach lessons. There is so much extranous shit in there just to pad it out a bit. I got more out of Georgia weidmans hands on hacking when I got that a few years ago. Hackers playbook has better methodologies. Offsec don’t offer lessons in their pwk; they say that’s what the lab is for. If there is a serious disconnect between the labs (server 2019 in exams and some fucking windows 2000 boxes in the lab) then the lessons from the labs don’t apply to the exam. So where does this learning come from?
Evan Cooper
Not really the same guy though I also have osce. Yeah they don't I'll give you that. Offsec likes this arms-crossed approach that is frustrating and kind of dickish. So when I mean methodology, it's what you think is the best approach appropriate to the situations you face. Most of the time if you are doing random attacks that you have little confidence but high hopes with then those efforts are better put in doing more recon and reviewing what information that was already gathered. It is more worthwhile to do the latter. In the end all you have to rely on is yourself. The materials are just there as references but ultimately stuff that you will abandon once you have built up a robust methodology on your own.
Jaxon Sanders
Guys can you give a list of recommended tools to learn well when aiming for OSCP? I'm reading "Learn Ethical Hacking From Scratch Your Stepping Stone To Penetration Testing 2018" but since it's not geared to OSCP, tooling is all over the place. What would you recommend?
it's definetely nmap, metasploit, - what else?
Robert Campbell
the forward/back pointers are messing you up or what?
Nicholas Myers
>google >python/ability to read and modify code when required >msfvenom >powershell
I cannot overstate how important it is for you to get good at powershell. Can’t do much windows enum without being able to use PS.
Adam Gray
understood about powershell. Any other tips you could give for someone starting out?
Also, though it may be kind of scope, would you mind sharing your methodology?
Cooper Long
There are thousands who passed and wrote about it (albeit in a humble-bragging way) in their blog. Look for these, they're a dime a dozen
Asher Bailey
I find hackthebox challenges a good learning resource, but you need to find the boxes rated as realistic and not the ctf boxes. It will help you familiarize yourself with tooling at your own pace, try to complete them without meterpreter session handling etc like you would for oscp
Adam Gomez
thanks for the tips guys. Since the scope of the exam is quite large and foreign to me, I find myself looking for some `secret way` to learn effectively, but thats mostly BS and I understand. Read > lab the newly learned methods > repeat is the way to go
Chase Ortiz
>Hey anons, I'm new to /cyb/, Welcome aboard! >what is the general consensus on lainposting? Lain is as close to a patron saint of Cyb as you can come..
Gavin Lewis
I think the 'secret way to learn' is enjoying learning and being passionate about wanting to improve. Just learn at your own pace and read/watch/practice as many different foothold and privesc techniques as you can.
The others who try and cheat with walkthroughs will find themselves found out as frauds real quick in industry when they are expected to use their skills.
Bentley Hill
Yes, there is something called voice fingerprinting. Your problem does not end there, for even if you write the text and then use a synthetic voice you are still vulnerable to stylometric analysis.
Joshua Reed
>stylometric analysis. Just put your words through google translate a few times to get a few strange passages and wrong words thrown in there
Gavin Wright
Push your script through an uwu translator and read it aloud in the faggiest voice you can muster
You can pre-pend public keys in your authorized_keys file with parameters and settings to further secure your environment, like only allowing your private key to be used from a trusted source IP, or 'restrict' to force prevent things like port forwarding, X11 forwarding, pty allocation and more! Or you can specify a series of commands to run and then kill the session. Learned something? Share something!
/cyb/, I must admit that I'm pretty fucking thankful for the fact that I live in a third world corrupt shithole, where the internet is still pretty much the wild west it was in the days of old, where nobody cares what you do and the government doesn't give two shits if you torrent movies or stream cheese pizza. I've always viewed it as a bad thing and dreamed about going to the Land of the Free, where the chicks are hot and the life is high, but now I realize how cucked you actually are. Thank you /cyb/ for making me a little less miserable about not being as "lucky" as to be born in the first world. /blog
now to my question. i am from a borderline third world country, very interested in infosex(hehe get it). is there any remote work available or should i just be a webdev for remote work. i am not looking for a lot of money i would be very content with say 25k usd/year. btw i am second year of college i ve time to prepare
Camden Russell
It's a B-movie from Uganda. My friends and I watch these sometimes when we're drunk (we're slavs btw). I've the poster saved because I though it looked cool.
I'm also 2nd year in college and did a lot of webdev shit this year. The amount of money you reel is proportional to the amount of work you put in, obviously. If you got the time go for it, but don't put it at a higher priority than your studies, as webdev isn't exactly the most marketable skill, surely not worth as much as a college degree.
Henry Wright
what methodology? using the same powershell and bash tricks over and over? do sysvol or ntds.dit change?
Josiah Brooks
are you south slavic ako jesi da pozdravim brata where do you find your gigs thanks for answering me brate
Benjamin Ramirez
I have a quick question about AES. When the round keys are being generated, the current word Wi is set to Wi-n XOR'd with SubWord(RotWord(Wi-1)) XOR'd with the round constant corresponding to i/N; when i > N and (i mod N) = 0. These RotWord and SubWord functions respectively rotate the given word left one byte and replace the bytes of the word with their S-box entries.
My question is, do these operations affect the global state of the keys, i.e does Wi-1 actually get altered? Or do they just use temporary arguments? I guess another way of wording it is if they're pass-by-value or by reference.
Chase Myers
>where do you find your gigs unironically, stackoverflov and reddit. other similar social media sites should work too. people make posts when they're looking for a coder. say you're an up-and-coming developer, or that you're doing it as an honorary job and you should get some gigs. i'm not sure if the money would be enough for you (for i didn't even keep track of my income, i just did it because i was bored with college, also i've never had money issues, spending a bit less than 200 eur per month including bills and rent, with the average paycheck here being 300)
also yes, i'm from the balkans
Ryder Sullivan
what's the thread challenge?
Blake Ross
thanks any subreddits and where exactly on stackoverflow this is now a /balk/ thread
John Roberts
also yes more than enough money
Juan Ward
Find the Scavenger Hunt table in the contest area Friday morning.
GSEC. Then I'm planning on going for GCIH and GCIA and then GSE
Owen Lee
It's so fucking big its hard to know what to focus on.
Noted, it's gonna be a late night tonight (my flight gets in at 7pm and I've got employer "parties" until 1am), but what time should I try to be there?
Also, anything in particular I'm supposed to be keeping an eye out for?
=== /sec/ News: You would have thought dating apps would take privacy seriously, some more tan other? Nope. >Gay dating apps still leaking location data bbc.com/news/technology-49265245 >Some of the most popular gay dating apps, including Grindr, Romeo and Recon, have been exposing the exact location of their users. >In a demonstration for BBC News, cyber-security researchers were able to generate a map of users across London, revealing their precise locations.
How many will be blackmailed over this?
Easton Davis
oh man i hope some politicians and celebrities get burned xD
Jack Price
Does anyone in these threads actually work in information security? Just curious for a headcount.
Does anyone doubt that this is being done on purpose by local election boards to let hackers meddle? I know we joke about how stupid some of the network admins are, but this is outright criminal. In Georgia, they are dragging their feet, not subpoena'ing hard drive images for election systems, probably because they know what forensics will show.
Oliver Hughes
i secure hot dogs and burgers and know some things about them so yes
I'm inclined to believe it's more about inertia ("We could work on getting more secure machines....but that would mean another 4 years of vendor proposals, reviews, bidding, meetings etc.") with a healthy double-scoop of quiet corruption than out of some nefarious "We must make sure the Correct Candidate wins City Councilman Seat 4 in Lower Bumfuck!" plotting. That said, it would not entirely surprise me if "improvable" election results were considered less of an issue than they should be.
Brody Bailey
this is Europes version of juggalos. hahaha look how fucking ridiculous they look.
Angel Green
What are some other conventions besides DEFCON?
also, how do I get IT experience while I'm still in college?
Logan Jones
Yes. I work for a global cybersecurity consulting firm.
Connor Mitchell
That's a meme cert. Might as well go for GCIH or GPEN if you're employer is willing to pay and you're planning to take anyway.
Jose Hill
Yep, I started out in this field though I wanted to be in dev once. Glad I stuck to this in the end.