/CYB/ /SEC/ - DONT CALL IT A GRAVE

Previous threads: [ archive.rebeccablacktech.com/g/search/text//cyb/ /sec//type/op/ ]
Last thread: [ ]
- - - - - -
/cyb/erpunk
The alt.cyberpunk FAQ (V5.28) [ ftp://50.31.112.231/pub/Alt_Cyberpunk_FAQ_V5_preview28.htm ]
What is cyberpunk?: [ pastebin.com/pmn9vzWZ ]
Cyberpunk directory (Communities/IRC and other resources): [ pastebin.com/AJYry5NH ]
Cyberpunk media (Recommended cyberpunk fiction): [ pastebin.com/Dqfa6uXx ]
The cyberdeck: [ pastebin.com/7fE4BVBg ]
- - - - - -
/sec/urity
The /sec/ Career FAQ (V1.11) [ ftp://50.31.112.231/pub/sec_FAQ_V1_Preview11.htm ]
"Shit just got real": [ pastebin.com/rqrLK6X0 ]
Cybersecurity basics and armory: [ pastebin.com/v8Mr2k95 ]
Reference books (PW: ABD52oM8T1fghmY0): [ mega.nz/#F!YigVhZCZ!RznVxTiA0iN-N6Ps01pEJw ]
/sec/ PDFs: [ mega.nz/#F!zGJT1QQQ!O-8yiH845GN26ajAvkoLkA ]
Learning/News/CTFs: [ pastebin.com/WQhRYB59 ]
FTP Backup: ftp://50.31.112.231/pub
thegrugq OPSEC: [ grugq.github.io/ ]
#! sec guide [ pastebin.com/aPr5R1pj ]
EFF anti-surveillance [ ssd.eff.org/en ]
- - - - - -
Thread challenge: get some Bluetooth scanning software and try to find a credit card skimmer. Check any credit card swiper at gas stations or ATMs.

NEW? Check the /sec/ Career FAQ and Cybersecurity basics links above. Learn to code, learn computer basics, learn networking THEN work on hacking. It's technical and hard, but fun. Want to hack now? Try Webgoat and use the cheats. Grab Penetration Testing A Hands On Introduction and see what you don't know enough about. Always use a virtual machine for reading PDFs.

Attached: 1567621659794.png (1272x1428, 888K)

Other urls found in this thread:

bbc.com/news/world-asia-china-49575381
googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html
electronicsweekly.com/blogs/mannerisms/dilemmas/police-chief-warned-police-state-2019-09/
youtube.com/watch?v=f4rPDF993qs
nsa.gov/about/diversity/no-fear/
wired.com/story/android-zero-day-more-than-ios-zerodium/
nytimes.com/2019/08/28/us/politics/us-iran-cyber-attack.html
washingtonpost.com/nation/2019/09/05/fbi-terror-watch-list-unconstitutional/?noredirect=on
abcnews.go.com/Health/edgar-hoover-sex-men-homosexual/story?id=14948447
yro.slashdot.org/story/19/09/05/2040213/600000-gps-trackers-left-exposed-online-with-a-default-password-of-123456
twitter.com/AnonBabble

bump for Jow Forums

Question - how hard would it really be to make a strap n that triggers the sexual pleasure center of your brain on for trannies to get them to shut up with their retarded self mutilation and pity parties

Good to be back, last round was very good.

>I can't understand how anyone gets infected via the web, unless web browser devs install intentional back doors.
Many programmes are networked, in particular web connected, such as PFD viewers (really bad security track record) , time sync programs (ntp had a bad bug a while ago), installation software and more. Just monitor your firewall and see the massive traffic that runs continuously. And one slip-up in these programmes will open the flood gates for malware.

what do you think about hackforums?

also do you know any sec forum?

also fuck those cia niggers they glow in the dark xD

Not just that, but people download all kinds of stuff from the web. Any file can exploit something locally, Flash, Java, PDFs, Word, EXE, zip, etc. and lots of programs have dynamic scripting language support built in. VLC has had a bunch of serious bugs and all they have to do is backdoor some pirate copy of a popular film.

Do you guys have a collection of research papers or journals stuff to read.

bbc.com/news/world-asia-china-49575381

THE PEOPLE HAVE SPOKEN, THIS IS THE HIGH WATER MARK FOR FASCISM EXPANSION, EVEN BOJO IS ON THE ROPES

I have a library of stuff, some I have contributed to the FTP site mentioned in OP msg.
If you want to trim your disks you could always go for the All Encompassing Library (AEL), at >>/t/ael, currently clocking in at 501 GB of carefully curated material. AEL-user is a regular in here too.

googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html

For anyone interested in binary exploit analysis and modern exploit kits. Google Project Zero found a dozen iOS bugs being used on a watering hole site for 2 years. How long do you think they sat on this?

Longer. apple internal security policy is to force users to newer products to avoid technical debt from old bugs.

can someone megaupload the 10gb computer bit?

it would be extremely painful

I had to deal with a litteral " as a queer women of color blah blah" shit last night.

I’m earning an online meme degree in CybSec. Any advice for me?

Will I actually be able to get a job with it?

how do you make a secure lab for htb so you don't get hacked by other people in the same net?

Attached: 142989478.jpg (670x1450, 105K)

for you

Attached: putin_cat.jpg (735x456, 77K)

virtualization but not only

jesus christ how horrifying! you must have been reduced to tears and clenched fists! how dare she explain her plight publicly before making a statement.

lmao
thank God i live in a country where this BS doesn't exist

pls explain more

Attached: 8144eed4bad9222e2e97ba5ba16bb920097c0c354edbd561737600f59fc9af5f.jpg (425x329, 17K)

should've just gone for certs instead

if htb refers to hack the box you can't (low probability) get hacked, if you keep the VM on your LAN. Even better don't give it Internet access. Even better put your lab environment behind a PFSense box

At the least I would put your virtual HTB system in its own subnet and its own VLAN, make sure you set rules on your router/fw so it can't say shit to other nets or VLANs, make sure your routing rules on your VM are set up right, etc.etc.

Assuming someone breaches your VM they can change any routing rules to get access to your internal LAN anyways.

Host-only network or firewall rules to block all traffic unless it's from your computer's IP.

How do you set up VLAN?

If you use host-only then the VM can not connect to the internet no?

most malware is downloaded so if it's host-only vm then even a backdoored file will only exploit the system and attempt to grab a file. if you monitor network traffic of the vm virtual interface then you'll capture the attempt and will know that an exploit occurred. should be easy to figure out what happened.

Oh come on mods

why delete the OP

throw in some certs, get an internship or two, contribute code to some open source stuff on github, write system security scripts and publich them on github, don't mention Jow Forums

>don't mention Jow Forums
I mentioned i posted on Jow Forums at my interview and now i'm CISO

your point is invalid, he needs to get a tshirt with obscene imagry and then cum on it to impress his employers

post a picture of that google guy with the anime tiddies tshirt

couldn't find it, take this one

Bonus points for anyone that finds one that has girls taking tentacles up the asshole graphically.

>force users to newer products to avoid technical debt from old bugs
But.. it's the same software.

new hardware solutions to old bugs.

how do i get big tiddies sec gf

any hackermen in

...

sec+ is basic defense, ceh is basic offense

whats in these ?

Attached: file.png (1417x203, 15K)

oscp training materials, no idea, various oreilly books, humblebundle hacker 2.0 bundle

AM HECKERMEN, WAT DO

tell me, why are you posting this much here?
are you lonely?
are you dare i say the not man "i'm a man" spammer?

i’m in

Thanks! That answers my question exactly!

you guys fucking suck at hacking cucks
70.182.41.47

Some “easy” HTB boxes I root in under 2 hours making steady progress the whole time and some I can’t root after 4 with zero progress made. What gives

>I mentioned i posted on Jow Forums at my interview
That is brave. 4ch does not have the best reputation, especially in media.

Fully functioning hardware solutions for ARM and x64 against Spectre and Meltdown are still not here. The hardware solutions are probably cosmetic at best (faster, compensating for SW "fixes") and marketing (lies) at worst.

RISC-V is immune, and have used this in marketing for all it is worth. And that is a lot. When is the first RISC-V phone coming?

=== /cyb/ /sec/ News:
So how much data do the agencies acquire in an investigation?
>The Police Chief Who Warned Against A Police State
electronicsweekly.com/blogs/mannerisms/dilemmas/police-chief-warned-police-state-2019-09/
>““In 2005, following the London terrorist attacks, police investigations into the seven attacks resulted in the seizure of four terabytes of data,” says the Commissioner, “today, a current counter-terrorist investigation has 81 terabytes of data.”
I doubt all countries show this much soul searching in its surveillance.
>The only way of processing such huge databanks is by AI but, even so, the final judgments made on the basis of AI-processed data must always be made by a carbon-based life form.
Some countries expect to automate this with silicon based judges, possibly for integration with organ harvesting operations.

Anyone on hackthebox.eu? I'm new to pentesting and trying Luke (10.10.10.137) I'm kind of learning as I go along so far I got some credentials and some login pages just trying to figure out this JWT token thing right now for one of the domains. Really want to just say fuck it and metasploit brute force them lol but I want to learn a more proper way.

How are you connecting to their network? You might already have been hacked yourself lol.

im using a burner laptop connected to a neighbors wifi

>neighbor's wifi
you're a fucking nigger that's what you are you fucking coward

It is of course more heroic to take the hail of lead like a real man on your own doorstep.

give me back /hmg/

>i'm going to hide behind my neighbor without his approval because i'm a fucking pussy
could at least have used hotspots or café/restaurant

Yo anyone got any sans pdfs?

Just a question, I'm an engineer by education and my dad says I'm not engineer material. He recommends and wants to fund a degree in cybersecurity for me because in my country it's an up and coming thing. I do have some interest in it, what with a librebooted thinkpad without systemd and all, and I enjoy the material in these threads, but how's the job like?

You're a big guy.

hello pajeet
>I'm an engineer by education and my dad says I'm not engineer material
you either are an engineer or not

Retard. I graduated with an engineering diploma but my type of engineering is marine engineering. I can easily pull a few thousand in pay but I won't see my family for months at a time. I'm also not a fucking Indian.

Attached: 1559371074478.png (750x417, 429K)

here you go

Attached: Sans+is+in+smash_b9dd1d_7277907.jpg (492x553, 32K)

Sure. Trouble is, these are filled with cameras, and also outside there are likely to be dozens of cameras.

Can I get this in pdf?

are hurricanes cyb?

bump

youtube.com/watch?v=f4rPDF993qs
>that's a bitchin' physical access control system you have
>hope you remembered to install a knox box
>would be a shame our knox keys were copied

For you

dude, never use a wifi in your own vicinity

Hey man with your courage in one hand and your dick in the other, which is bigger?

I'm saying i know people who used to work for apple internal security response.

that was his line i said.

Can I get into cybersecurity if I'm a homosexual?

ie is the space homofriendly and supportive?

Thanks.

no

>Can I get into cybersecurity if I'm a homosexual?
Depends if you believe this: nsa.gov/about/diversity/no-fear/

The UK has a different system I hear (from a British guy I worked with during my student days). He had to disclose his orientation (no idea about level of details required and I really didn't feel like asking!) and he got the job.

>He had to disclose his orientation

thats fucking illegal in the US. you cannot ask that shit at an interview. no marital status or any of that shit

yes, in fact, that would be ideal

this

hoover was a closet case and all the fbi did was blackmail him for it. go for it!

wired.com/story/android-zero-day-more-than-ios-zerodium/

Android full compromise RCE fetches $2.5 million each. If you have skill, then you can buy a Ferrari!

Na na! Score is one, notin, sept you crushed my nuts.

nytimes.com/2019/08/28/us/politics/us-iran-cyber-attack.html

they deleted data and disabled comms equipment back in june. us still claims it's about "the big stick" theory so it's fine to waste exploits and lose operational position.

GOTTA ROID UP, KICK SOME DOORS DOWN AND ACT LIKE MY BADGE IS PROTECTION OTHERWISE YOU'LL THINK I'M A GIANT PUSSY WHO NEEDS MILLIONS OF DOLLARS AND A TON OF GUNS TO BE BRAVE

are you retarded

God says, "enmities fallacies inb4 cometh impurity temporately he review texts doesn't privacy cannot get answerest the journey terry as meme boasting "

washingtonpost.com/nation/2019/09/05/fbi-terror-watch-list-unconstitutional/?noredirect=on

So, guise, the FBI is in trouble, right? Like, civil lawsuit trouble?

The FBI started to combat the deaths that arose from prohibition. Milton Friedman was right.

I'm fucking jacked in

Attached: 1566231482695.png (890x960, 584K)

Where are all the entry level pentesting jobs?

I've heard they want people to have experience as a sysadmin first. I'm doing developer stuff right now, but when I was job hunting, there wasn't a lot of security stuff.

hack some stuff and tell people you did :D

Who do you think works in cybersecurity?

Sure. We just don't know what country he is in. Not all countries are like the US.

abcnews.go.com/Health/edgar-hoover-sex-men-homosexual/story?id=14948447

the title of this is laughable

And the content was incomprehensible.

>dude, never use a wifi in your own vicinity
Using a Yagi he can contact a WIFI node way outside his vicinity.

Time for some
=== /Sec/ News:
>600,000 GPS Trackers Left Exposed Online With a Default Password of '123456' (zdnet.com)
yro.slashdot.org/story/19/09/05/2040213/600000-gps-trackers-left-exposed-online-with-a-default-password-of-123456
>According to Avast security researchers, over 600,000 GPS trackers manufactured by a Chinese company are using the same default password of "123456. "They say that hackers can abuse this password to hijack users' accounts, from where they can spy on conversations near the GPS tracker, spoof the tracker's real location, or get the tracker's attached SIM card phone number for tracking via GSM channels," reports BleepingComputer.

An honest mistake? Or orders from Chinese intelligence agencies? Hard to tell.

Is this unironically possible?

Okay so one of the first things to do if you're on the lookout for unwanted or potentially malicious network traffic is to monitor DNS queries. I'm curious, is it common for things to know that and not use DNS, and just hit some hardcoded IP directly without looking up a hostname? How would you go about detecting that - look somehow for outbound traffic to $IP that wasn't preceded by a DNS query that returned $IP?

It was just Hollywood proving hoover liked cock

I can believe Hollywood enjoyed that.

On the same net? So far the odds are really bad. There is a reason .mil prefers separation of nets (red vs. black)

That picture ; )