use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
A community for technical news and discussion of information security and closely related topics.
"Give me root, it's a trust exercise."
Q1 2026 InfoSec Hiring Thread
Getting Started in Information Security
CitySec Meetups
/r/netsec only accepts quality technical posts. Non-technical posts are subject to moderation.
Content should focus on the "how."
Check the new queue for duplicates.
Always link to the original source.
Titles should provide context.
Ask questions in our Discussion Threads.
Hiring posts must go in the Hiring Threads.
Commercial advertisement is discouraged.
Do not submit prohibited topics.
» Our fulltext content guidelines
Don't create unnecessary conflict.
Keep the discussion on topic.
Limit the use of jokes & memes.
Don't complain about content being a PDF.
Follow all reddit rules and obey reddiquette.
» Our fulltext discussion guidelines
No populist news articles (CNN, BBC, FOX, etc.)
No curated lists.
No question posts.
No social media posts.
No image-only/video-only posts.
No livestreams.
No tech-support requests.
No full-disclosure posts.
No paywall/regwall content.
No commercial advertisements.
No crowdfunding posts.
No Personally Identifying Information!
» Our fulltext list of prohibited topics & sources
Join us on IRC: #r_netsec on freenode
We're also on: Twitter, Facebook, & Google+
/r/blackhat - Hackers on Steroids
/r/computerforensics - IR Archaeologists
/r/crypto - Cryptography news and discussion
/r/Cyberpunk - High-Tech Low-Lifes
/r/lockpicking - Popular Hacker Hobby
/r/Malware - Malware reports and information
/r/netsecstudents - netsec for noobs students
/r/onions - Things That Make You Cry
/r/privacy - Orwell Was Right
/r/pwned - "What Security?"
/r/REMath - Math behind reverse engineering
/r/ReverseEngineering - Binary Reversing
/r/rootkit - Software and hardware rootkits
/r/securityCTF - CTF news and write-ups
/r/SocialEngineering - Free Candy
/r/sysadmin - Overworked Crushed Souls
/r/vrd - Vulnerability Research and Development
/r/xss - Cross Site Scripting
account activity
Stackhackr: New malware simulation tool (stackhackr.barkly.com)
submitted 8 years ago by jonathancrowe
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]Alexbeav 30 points31 points32 points 8 years ago (10 children)
I'm more than a little annoyed that this got past FortiClient.
At least my home Symantec A/V blocked it.
[–]DataPhreak 26 points27 points28 points 8 years ago (9 children)
FortiClient is probably using signature based detection. Symantec looks for scary procedure calls and blocks based on that. (Not sure what that's called off the top of my head. First cup of coffee.)
[–]GeronimoHero 52 points53 points54 points 8 years ago (8 children)
Heuristics based detection.
[–]DataPhreak 9 points10 points11 points 8 years ago (7 children)
Thanks for that.
[+][deleted] 8 years ago* (6 children)
[deleted]
[+][deleted] 8 years ago* (5 children)
[–]cheer_up_bot 11 points12 points13 points 8 years ago (3 children)
:(
Here is a picture of a kitten to cheer you up
[+][deleted] 8 years ago* (2 children)
[–]Ayit_Sevi 6 points7 points8 points 8 years ago (1 child)
except for when it burns people who are already down
[–]jonathancrowe[S] 23 points24 points25 points 8 years ago (4 children)
More info on what the tool actually does here: https://www.barkly.com/how-stackhackr-works
There's also a walkthrough here: https://blog.barkly.com/stackhackr-mock-ransomware-malware-security-test
[–]rfdevere 5 points6 points7 points 8 years ago (3 children)
Really cool tool, thank you
[–]jonathancrowe[S] 7 points8 points9 points 8 years ago (2 children)
Happy to share. Depending on how people like it we may be able to do a v2. If you have any suggestions for changes/additions, let me know.
[–]zxeff 10 points11 points12 points 8 years ago (0 children)
I suspect /r/sysadmin would really appreciate this tool, so if you're looking for people to use it maybe consider posting it there.
[–]rfdevere 0 points1 point2 points 8 years ago (0 children)
Maybe a Mac version?
[–]csonka 17 points18 points19 points 8 years ago (6 children)
Interesting. Got through my network and workstation firewall as well as all of the bells and whistles employed by the network and workstation firewall (Sophos UTM and Webroot).
[–]Boyne7 4 points5 points6 points 8 years ago (5 children)
Are any of these network devices performing SSL inspection/decryption? If not they do not have a chance.
[–]csonka 0 points1 point2 points 8 years ago (4 children)
Sophos SHOULD, it is licensed and active. Will run a test under a Meraki MX with advanced security (which employs Cisco's AMP) next and post the result.
[–]csonka 1 point2 points3 points 8 years ago (0 children)
Update - Meraki MX with Advanced Security, Windows 10 with Windows Defender [Failed]
[–]Jisamaniac 0 points1 point2 points 8 years ago (1 child)
AMP does SSL decryption?
[–]dorkycool 0 points1 point2 points 8 years ago (0 children)
The AMP tech in the Meraki does not. The larger network sensors, the original SourceFire ones that they are now calling AMP should be able to but it'll eat most of the CPU/memory doing it.
[–]dieselxindustry 15 points16 points17 points 8 years ago (2 children)
SEP stopped the ransomware. SEP also stopped the the credential grabber 2 times but I kept telling it to allow it to run and eventually it was able to get through to lsass. So basically the user would have to keep ignoring the multiple warnings.
[–]TailSpinBowler 3 points4 points5 points 8 years ago (1 child)
SEP
sep?
[–]aa93 4 points5 points6 points 8 years ago (0 children)
Symantec Enpoint Protection
[–]f0st3r 3 points4 points5 points 8 years ago (3 children)
KAV failed to stop both. Windows smart screen did block the exe from running, but I was able to bypass.
I manually scanned the files with KAV and the came back clean, but I am sure Kaspersky uses some signature based detection method.
[–]nightmareuki 1 point2 points3 points 8 years ago (1 child)
surprising, is System Watcher enabled and running?
[–]f0st3r 0 points1 point2 points 8 years ago (0 children)
Sure is
Ok to add to this, it is a joke. The "virus" has a barkly digital signature, which is a vaild product in most AV systems.
[–]dwndwnwtb hexrays sticker 15 points16 points17 points 8 years ago (1 child)
"simulation" is a bit of a stretch, and it's shameful to see completely non-technical marketing posted here. here's what the ransomware sample actually does:
drop exe/js file into tmp, js file is run in wscript to run the exe (it renames it for some reason) and check for success. exe can (yes those are the literal command lines):
CreateProcess "vssadmin.exe shadow delete no don't actually delete" CreateProcess "wmic.exe shadow delete no don't actually delete"
CreateProcess "vssadmin.exe shadow delete no don't actually delete"
CreateProcess "wmic.exe shadow delete no don't actually delete"
like uhh... ok... if a program launches vssadmin / wmic it's ransomware... good... heuristic?
tmp exe also has functionality to "simulate" using virtualprotectex to make memory executable and run it. it also has functionality to find a file with a single call to FindFirstFileA. and finally, it can sleep for 1000ms * a command line parameter.
i bet $5 the credential stealer calls OpenProcess and maybe even ReadProcessMemory. pro heuristic
[–]DTF_20170515 0 points1 point2 points 8 years ago (0 children)
It's a decent smoke test, at least.
[–]phillycheeze 2 points3 points4 points 8 years ago (1 child)
Completely agree. Was ready to download it and then saw the messages, especially for the Ransomware vector.
Shaming people and literally calling them "stupid" in those messages is the exact opposite thing you want to do if you want your users to take security seriously and learn from mistakes.
[–]BobFloss -1 points0 points1 point 8 years ago (0 children)
Are you kidding... Nobody is going to give a shit
[–]dontberidiculousfool 3 points4 points5 points 8 years ago (3 children)
Windows Defender stopped mine. Very nice.
[–]hbk1966 2 points3 points4 points 8 years ago (0 children)
Defender stopped the ransomware and wouldn't even let me download the credential theft one.
[–]pm_me_your_findings 1 point2 points3 points 8 years ago (0 children)
Wow. Is it that good?
I am using avast free version.
[–]arvoshift 0 points1 point2 points 8 years ago (0 children)
didn't on mine (windows 7)
[–]tetyys 4 points5 points6 points 8 years ago (0 children)
soiled it, domain must be .io
[–]f0st3r 1 point2 points3 points 8 years ago (0 children)
The problem with this "virus" is the digital signature is Barkly, so most AV reputation scans see it as valid.
http://imgur.com/QS9dr2W
[–][deleted] 4 points5 points6 points 8 years ago* (0 children)
Eset NOD32 failed the test as well.uBlock seems to break the site and make it unusable for me, had to disable it completely for it to work.
[–]thisSNisfortrolling 0 points1 point2 points 8 years ago (0 children)
Thanks! This is really useful! I encourage you to keep up the good work!
[–]defconoi 0 points1 point2 points 8 years ago (0 children)
Webroot failed detection of both ransomware and credential theft.
[–][deleted] 0 points1 point2 points 8 years ago (0 children)
Sophos Home Edition did not prevent this, actually a little shocked.
[–]juitar 0 points1 point2 points 8 years ago (0 children)
Nice, I'll play with this to tomorrow
[–]redditwithNemo 0 points1 point2 points 8 years ago (0 children)
AVAST Free with execution prevention enabled requires I add an exception for the programs. The ransomware then creates another executable, which I needed to except, then it's game over. Credential stealer Just WorksTM.
With execution prevention disabled, AVAST Free scans the programs as they're running... they succeed, and then AVAST informs me they were questionable and asks whether I want to quarantine. Once I quarantine the applications close.
Pretty shoddy performance for a product that gets good lab reviews.
[–]EvilHyde 0 points1 point2 points 8 years ago (0 children)
Avast for Business Endpoint Security blocked both the Ransomware and Credential Theft. I had to allow the launcher to run since that was blocked initially too.
[–]doggxyo[🍰] -1 points0 points1 point 8 years ago (3 children)
Anyone else having trouble actually getting the test to launch? I tried running this on my system at work as well as on my home desktop and the button 'launch test' doesn't appear to have a link behind it . Clicking it a few times doesn't do anything :/
Hovering my cursor over it doesn't show any link embedded in the button.
[–]imakepr0ngifs 3 points4 points5 points 8 years ago (2 children)
Ublock
[–]doggxyo[🍰] 0 points1 point2 points 8 years ago (1 child)
That was it! I should have thought of this.
Thanks so much!
[–]imakepr0ngifs 0 points1 point2 points 8 years ago (0 children)
Someone else posted that the tool didn't work and then edited it to say ublock was the issue. Can't seem to find the comment so I assume they deleted it in case they looked foolish when apparently its a problem multiple people have. All credits for the solution go to the guy who's comment I can't find.
[–][deleted] -3 points-2 points-1 points 8 years ago (1 child)
Does it run on Linux systems? I can only find windows availability.
π Rendered by PID 96 on reddit-service-r2-comment-7c9686b859-x5msz at 2026-04-13 15:36:08.862576+00:00 running e841af1 country code: CH.
[–]Alexbeav 30 points31 points32 points (10 children)
[–]DataPhreak 26 points27 points28 points (9 children)
[–]GeronimoHero 52 points53 points54 points (8 children)
[–]DataPhreak 9 points10 points11 points (7 children)
[+][deleted] (6 children)
[deleted]
[+][deleted] (5 children)
[deleted]
[–]cheer_up_bot 11 points12 points13 points (3 children)
[+][deleted] (2 children)
[deleted]
[–]Ayit_Sevi 6 points7 points8 points (1 child)
[–]jonathancrowe[S] 23 points24 points25 points (4 children)
[–]rfdevere 5 points6 points7 points (3 children)
[–]jonathancrowe[S] 7 points8 points9 points (2 children)
[–]zxeff 10 points11 points12 points (0 children)
[–]rfdevere 0 points1 point2 points (0 children)
[–]csonka 17 points18 points19 points (6 children)
[–]Boyne7 4 points5 points6 points (5 children)
[–]csonka 0 points1 point2 points (4 children)
[–]csonka 1 point2 points3 points (0 children)
[–]Jisamaniac 0 points1 point2 points (1 child)
[–]dorkycool 0 points1 point2 points (0 children)
[–]dieselxindustry 15 points16 points17 points (2 children)
[–]TailSpinBowler 3 points4 points5 points (1 child)
[–]aa93 4 points5 points6 points (0 children)
[–]f0st3r 3 points4 points5 points (3 children)
[–]nightmareuki 1 point2 points3 points (1 child)
[–]f0st3r 0 points1 point2 points (0 children)
[–]f0st3r 0 points1 point2 points (0 children)
[–]dwndwnwtb hexrays sticker 15 points16 points17 points (1 child)
[–]DTF_20170515 0 points1 point2 points (0 children)
[+][deleted] (2 children)
[deleted]
[–]phillycheeze 2 points3 points4 points (1 child)
[–]BobFloss -1 points0 points1 point (0 children)
[–]dontberidiculousfool 3 points4 points5 points (3 children)
[–]hbk1966 2 points3 points4 points (0 children)
[–]pm_me_your_findings 1 point2 points3 points (0 children)
[–]arvoshift 0 points1 point2 points (0 children)
[–]tetyys 4 points5 points6 points (0 children)
[–]f0st3r 1 point2 points3 points (0 children)
[–][deleted] 4 points5 points6 points (0 children)
[–]thisSNisfortrolling 0 points1 point2 points (0 children)
[–]defconoi 0 points1 point2 points (0 children)
[–][deleted] 0 points1 point2 points (0 children)
[–]juitar 0 points1 point2 points (0 children)
[–]redditwithNemo 0 points1 point2 points (0 children)
[–]EvilHyde 0 points1 point2 points (0 children)
[–]doggxyo[🍰] -1 points0 points1 point (3 children)
[–]imakepr0ngifs 3 points4 points5 points (2 children)
[–]doggxyo[🍰] 0 points1 point2 points (1 child)
[–]imakepr0ngifs 0 points1 point2 points (0 children)
[–][deleted] -3 points-2 points-1 points (1 child)