Cybersecurity thread - Sperg about cybersecurity and whatnot.

  • 🐕 I am attempting to get the site runnning as fast as possible. If you are experiencing slow page load times, please report it.

Do you use the same password on all websites?


  • Total voters
    98
I don't know, you can store your passwords like, in a notebook. Try hacking that, chinaman.

I find it amazing how many people are paranoid about things that don't really matter and then turn around and are entirely fine with giving the likes of discord, twitch, facebook etc. etc. all their personal data. Then the awe and confusion is big when they get phishing spam 24/7. Yet It keeps happening.
 
I should probably look into using a password manager. I don't use the same one on all sites, but I'm guilty of cycling through a small number of passwords, with some variation on them.
If you do, don't use the browser's default (I explained why in exorbitant detail), don't use Dashlane or any browser addon either, still haven't used Keepass, so can't comment on that either, but I'd avoid it personally.

It's better to store the passwords on a text file or just on a sheet of paper like dude above me said.
 
Have you guys heard about this?
Windows MSDT zero-day now exploited by Chinese APT hackers
Microsoft knew about this since April. So glad I don't use Windows anymore.

It gets better:
Under normal circumstances, files from potentially unsafe locations are opened as read only or in Protected View. However, this warning can be easily bypassed by changing the document to a Rich Text Format (RTF) file. By doing so, the code can run without even opening the document via the preview tab in Explorer.
From Malwarebytes' blog
 
HackTheBox just released a new web exploitation certificate for $1300. It is getting so hard to stay on the morally correct side of the keyboard when in order to switch my focus in my cyber career I have to have a one thousand dollar cert backing it up or I will get nothing worth my time and experience. I was told at one point that some interviews take CTF scorecards into account when hiring-does anyone here have any experience with that?
 
SANS would like a word. Theirs are $8500USD and up
It’s actually insane, and not even mentioning the upkeep to these. I understand the thought behind it is to either have your company sponsor you or to have it replace a degree but these prices for a test alone just makes my head hurt. Maybe Im too lazy and cheap but I like learning new skills and want something professional to show for it without groveling to my boss
 
I was told at one point that some interviews take CTF scorecards into account when hiring-does anyone here have any experience with that?
For my first pentesting job, I was told my HTB rank was one of the deciding factors in hiring me over other candidates. When I eventually ended up running interviews it was one of the things we looked for in good candidates, we would score high ranks on CTF platforms like HTB roughly equivalent to some of the low to mid level certs like OSCP and OSWE. That was around four years ago now since I left that job but I imagine they still do something like that, maybe the rankings are different now that boxes are more standardised? Can't say I know anything about their new HTB cert.

It is getting so hard to stay on the morally correct side of the keyboard
I have probably said something like this to myself a hundred times in my heckin soyber security career when I look at bugs that are used to steal unbelievable amounts of money and data. I figured I'm too shit at covering my tracks to actually get away with crimes, and that it is safter to stick to my desk job of finding similar bugs in corporate shitware instead.

If you wanna have a low-stakes shot at trying your skills at some real prod targets, bug bounty is how you do it. Don't expect wins like in a CTF though, biggest difference between a CTF and the real world is in the CTF you know there's an issue there to be found and exploited, IRL there's no guaranteed bug or issue there to be able to check yourself with the "it's just a skill issue, try harder" method that gets us all through our CTF years.

Once you're in a consulting job, you can't spend six weeks hunting an obscure bug in a third party dependency and R&D-ing it into a workable exploit for your target app, because time is money and ACME LLC isn't gonna pay for that time (ironically your employer will pay for a similar amount of time spent doing that to get some expensive cert that says you passed the CTF for that qualifies you in jiggling the splines of certain types of software in a special way only to never do that in your day job), you just have to cast your net wide to catch any low hanging fruit and go as deep as your time limit allows praying for gets, which is really unsatisfying after the first few years of "wow I'm finally here and doing it" wears off and you're testing the same app for the Nth year in a row with some manager breathing down your neck for a report that is due in a few hours that contains 85% identical content to the one you wrote a year ago because they fix things at the rate of 1 thing per year.

I'm jaded if you can't tell.
 
I'm jaded if you can't tell.
We all end up a bit jaded eventually when we choose to work with this shit tbh. Either because people don't fucking patch shit that you tested a year ago in your case with offensive, or because people don't fucking patch shit we found in scans and threat hunts months ago in my case with defensive. Oh and you have to juggle reports that say damn near the same fucking shit every month like clockwork and just slightly change the wording even though the clients just glaze over when you tell them yes, these critical vulns do in fact need to be patched or they will eat shit and make the poor SOCs life hell when they do get breached
 
  • Like
Reactions: Concentrate Juice
Today I sperged to my VPN provider. All day was unable to access Farms with VPN on. Have been having trouble a while now. Have had to restart VPN connection to get through. Today even that did not help.

So I sperged a little to their feedback address. Well kiwifarms.st started working with VPN one hour later.
Now I am in delusion F-Secure indeed did have site blacklisted and unblocked the site because one sperg.

EDIT: Well fucking apparently they just let me in after 18:00 or fucking something. Fags.
 
Last edited:
Does anyone know any good Privacy Focused Emails with IMAP / POP support without being in a paywall? Or do I have to unfortunately build my own email server.
 
Back