|
gently caress, I literally came to post that. drat you yos pos infosec thread. drat youuuuuuuu. Also, are we doing a defcon meetup or not?
|
# ¿ Jun 27, 2017 00:24 |
|
|
# ¿ May 2, 2024 08:23 |
|
fishmech posted:I wonder how many average people would actually give the correct answer to both of those if they were legit trying to buy into whatever scam the guy was selling. They can barely manage to type addresses correctly. "Hi, this is you bank calling. We've had some gently caress up with a new teller. Can you take a picture of your check and confirm your account number is 443567843?"
|
# ¿ Jun 27, 2017 00:29 |
|
French Canadian posted:Indeed, and I know cyber "whatever" has been around forever but I am unaware of when just "cyber" became a term. It's like saying "I like mountain" and forgetting to add "climbing", "biking" or "making GBS threads". c'mon son quote:Even though cyber- had been attaching itself to other words for more than two decades already, the term cyberspace only appeared in 1982, apparently coined by William Gibson in his science fiction novella Burning Chrome. According to its Oxford English Dictionary (OED) entry, cyberspace is the space of virtual reality; the notional environment within which electronic communication (esp. via the Internet) occurs. Although other cyber- formations cropped up, including cyberworld, cyberland, Cyberia (punningly after Siberia), and cybersphere (which is actually attested to earlier than cyberspace), cyberspace remains by far the most popular cyber- term used to refer more broadly to the world of electronic communications (including the Internet), although its popularity peaked in the late 1990s
|
# ¿ Jul 4, 2017 07:43 |
|
maskenfreiheit posted:https://twitter.com/ur_ninja/status/891833262502420480 LOL here I thought DEFCON hadn't quite jumped the shark just yet they go ahead and prove me wrong.
|
# ¿ Jul 31, 2017 17:41 |
|
https://twitter.com/lehtior2/status/895551057744470016
|
# ¿ Aug 11, 2017 17:08 |
|
maskenfreiheit posted:jk gently caress the police https://www.youtube.com/watch?v=9ZrAYxWPN6c&hd=1
|
# ¿ Aug 26, 2017 06:15 |
|
I just did my OSCP and you can only use meterpreter on one box. You *could* use multi/handler with -j on some port and have all your exploits connect to that (using shell_reverse_tcp in msfvenom) but at that point just use ncat or something in its own window with screen -L or somesuch. TBH the Lab was ok but WAY out of date. Like, using exploits from 2008/2010 most of the time. Took me about 18 hours all told. Mostly dead ends and jumping between boxes. Then another 4 hours on the report. And now I can add OSCP to my
|
# ¿ Aug 29, 2017 22:24 |
|
lol
|
# ¿ Aug 30, 2017 16:30 |
|
is this banime?
|
# ¿ Aug 30, 2017 23:47 |
|
fins posted:brb, registering hashaveibeenpwnedbeenpwned.com YES!
|
# ¿ Aug 31, 2017 05:17 |
|
cinci zoo sniper posted:https://www.bleepingcomputer.com/news/security/blueborne-vulnerabilities-impact-over-5-billion-bluetooth-enabled-devices/
|
# ¿ Sep 13, 2017 00:07 |
|
exploded mummy posted:http://gwn.fightnetwork.com/ no don't
|
# ¿ Sep 13, 2017 00:57 |
|
cinci zoo sniper posted:and get charged for tampering with evidence, great idea ianal but say I had a postit that said 'password: imverysmart2017' that when entered would delete the crypto key for my drive and reboots the box. I do this to prevent my snooping wife from finding my porn folder but the cops take my machine and see the postit and try the password which leads to all the data being effectively erased. My question is, who the gently caress cares. gently caress da police, 2017. https://www.youtube.com/watch?v=_BxBs4f4RIU&hd=1
|
# ¿ Sep 18, 2017 06:23 |
|
|
# ¿ Sep 18, 2017 06:39 |
|
the real option is a shadow os on phones/laptops. There was a story about kevin mitnick (or someone) going to the border and getting hauled aside and told to log on to his laptop so they could check it. He had some other account setup and logged on with that showing that it was just a boring old windows account or something. The real pro-tip: fly without anything and buy a chromebook/phone when you land and sell/return when you leave. But if you're that paranoid just don't travel at all.
|
# ¿ Sep 18, 2017 17:21 |
|
cinci zoo sniper posted:https://www.bloomberg.com/news/articles/2017-09-18/equifax-is-said-to-suffer-a-hack-earlier-than-the-date-disclosed the best part, while they were getting hosed up the rear end they were pressuring lawmakers to limit their liability to the point where this was submitted in may. https://www.congress.gov/bill/115th-congress/house-bill/2359 quote:o amend the civil liability requirements under the Fair Credit Reporting Act to include requirements relating to class actions, and for other purposes. e: am I reading this right? Any class action lawsuit brought against Equifax would've had a cap of $500,000? God damned I'm not even angry, this is next level cyberpunk. Optimus_Rhyme fucked around with this message at 18:03 on Sep 19, 2017 |
# ¿ Sep 19, 2017 17:58 |
|
Wiggly Wayne DDS posted:in news absolutely no one saw coming it turns out there was a secondary payload delivered via the ccleaner backdoor: https://blog.avast.com/progress-on-ccleaner-investigation Are those internal domains?
|
# ¿ Sep 21, 2017 14:59 |
|
CommieGIR posted:CIOs are a FYGM of IT decisions.
|
# ¿ Sep 21, 2017 17:42 |
|
Apt use to mean low and slow attacker. The logica breach is a good example of someone who was advanced (knew more about the infrastructure than the people running it) and persistent (he was kicked out multiple times and kept coming back and getting in and took his time). Then marketing people found out about the term and now it means "an attack" because the term is so watered down. Also it helped give CSOs an out cause you can't stop someone who's advanced AND persistent! If anyone is interested the derby streams are up: http://www.irongeek.com/i.php?page=derbyconstreams
|
# ¿ Sep 22, 2017 14:42 |
|
Cocoa Crispies posted:let's be completely clear It implied state actor (cia, mossad, >emotion < bear, whatever we call the Chinese team) but only because they can train people and they have the time and patience.
|
# ¿ Sep 22, 2017 15:34 |
|
Better job prospect cause now you can say you worked at big 4. Before it became big 3. Also you'll get invited to.alumni events where they kiss your rear end hoping you give them business.
|
# ¿ Sep 26, 2017 16:51 |
|
Number19 posted:these all have to be deloitte honeypots what does your heart tell you?
|
# ¿ Sep 26, 2017 20:01 |
|
This never would've happened under stebe
|
# ¿ Oct 6, 2017 02:44 |
|
Muscle memory passwords are great until you have to go to the printer and log in with their poo poo touch screen.
|
# ¿ Oct 9, 2017 03:35 |
|
Qwijib0 posted:doesn't look like love, sex, secret, or god to me.
|
# ¿ Oct 31, 2017 07:09 |
|
Carbon dioxide posted:Has anyone heard of this app and is it good/does it have a future? Oh good, ANOTHER chatting app. gently caress its like 2003 again with the drat chat apps. Meebo, please come back as a single app I can install to manage all these chat apps.
|
# ¿ Nov 4, 2017 21:44 |
|
infernal machines posted:razor and blade? they're flakes!
|
# ¿ Nov 5, 2017 08:31 |
|
https://twitter.com/TheHackersNews/status/930133662141689856
|
# ¿ Nov 13, 2017 19:55 |
|
anthonypants posted:what are you going to do about it
|
# ¿ Nov 14, 2017 01:53 |
|
https://www.youtube.com/watch?v=dUMH6DVYskc
|
# ¿ Nov 15, 2017 23:22 |
|
Powaqoatse posted:solution: drink at home, alone
|
# ¿ Nov 16, 2017 00:58 |
|
|
# ¿ May 2, 2024 08:23 |
|
spankmeister posted:Speaking of MMO's: Here's a podcast in two parts about hacking online games. It's pretty good. They interview "Manfred" a guy who's apparently a big deal in the mmo hacking scene. You may remember the ultima online house deletion debacle, well this guy did it and he explains how. He also explains how he made a living for years by cloning items and gold in MMO's and selling them on eBay. I was gonna reply to a link to his awesome DEFCON talk but NOOOOOPE youtube took it down https://www.youtube.com/watch?v=PfbMZJsb1cQ&hd=1
|
# ¿ Dec 9, 2017 20:28 |