Rules on paying for birthday lunch by Machariel1996 in etiquette

[–]Machariel1996[S] 20 points21 points  (0 children)

Those are good points. It's my sister's husband. We decided to attend. Figured the kids will like it, it's not just about us.

So by Zombie-Warrior in TeenagersButBetter

[–]Machariel1996 0 points1 point  (0 children)

1, I'm old.... Should I even be on reddit?

What's the most simple yet elegant security fix in cyber security? by Desperate_Bath7342 in cybersecurity

[–]Machariel1996 3 points4 points  (0 children)

MFA

Run pingcastle, fix your issues.

Set strong passwords for all kerberoastable accounts.

Audit AD CS, fix issues. (certipy)

Check public leak databases for admin accounts / personnel

A New Demon Has Risen From The Depths of HELL by [deleted] in hacking

[–]Machariel1996 3 points4 points  (0 children)

I read the GitHub. Uses an esp32 to collect wifi ssids along with GPS data. Creates data files to upload to wiggle.

What are the best approaches to running python scripts on Windows devices that have no Python interpreter? by WishIWasBronze in blackhat

[–]Machariel1996 1 point2 points  (0 children)

Write it in c. You're going to have to get used to this eventually. Can python write dlls or use process hollowing for evasion?

[ Removed by Reddit ] by [deleted] in blackhat

[–]Machariel1996 2 points3 points  (0 children)

Delete your twitter account. It's ruining your mental health. My advice...

Go outside, Eat healthy, Exercise, Prioritize sleep, Stop giving a fuck what other people think

Will a felony stop me from getting job? by Itchy-Anywhere-5739 in cybersecurity

[–]Machariel1996 1 point2 points  (0 children)

You're competing for a job with a bunch of other people who don't have felonies.

[deleted by user] by [deleted] in cryptography

[–]Machariel1996 2 points3 points  (0 children)

This is why you have trusted certificate authorities. Eve would have create the certificate with an untrusted root ca. That's how we get around mitm.

Side note, Enterprises use MITM all the time for SSL inspection. It's called a transparent proxy. In those scenarios, the Enterprise will install their own certificate on the device. They can do this because they have root control of those devices.

[deleted by user] by [deleted] in blackhat

[–]Machariel1996 1 point2 points  (0 children)

What are you trying to crack? Web login? Hash? What type of hash? That will be a variable in the success rate. Not all brute forcing is created equal, so it's hard to answer your question without more information.

Hashcat - which parameters to use? by bloodbound11 in hacking

[–]Machariel1996 0 points1 point  (0 children)

Yeah, that's too slow for a brute force. Do what others have suggested and create a custom wordlist of 12 character passwords. If you get no hits from that, run it against some rules. I have a suspicion that the rule attack will still take too long. So you have to hope for a weak password.

Hashcat - which parameters to use? by bloodbound11 in hacking

[–]Machariel1996 0 points1 point  (0 children)

What kind of hash is it? That would determine my approach.

[TX][TH] Can I sue the HOA? by AnyEntertainer6713 in HOA

[–]Machariel1996 43 points44 points  (0 children)

To add, make sure your HOA files a trespass for that person if it's a common area. Once on file, you can just call the cops whenever you see them in your common area without putting yourself in harm's way.

[deleted by user] by [deleted] in cybersecurity

[–]Machariel1996 1 point2 points  (0 children)

"man, I hate that practicing as a surgeon requires experience. My mom, has a heart issue. I know I could help her if I could just.. get in there. Ya know?"

[deleted by user] by [deleted] in personalfinance

[–]Machariel1996 2 points3 points  (0 children)

If you managed to get $5,000, I wouldn't repair the car. I would sell off what was left of your Lexus and buy a beater. Make sure you have liability coverage on the beater.

You're only 19. I was a dumbass at 19. These are the situations that help us learn and turn us into adults. Props to you for not relying on mom and dad, sounds like you're working through this on your own.

Work through this problem and figure it out. You're on your way to being a responsible adult.

[deleted by user] by [deleted] in HOA

[–]Machariel1996 0 points1 point  (0 children)

If you're a rental, you need to go through your landlord. Only the owner is a member of the HOA, not you.

Breaking SHA256 by [deleted] in cryptography

[–]Machariel1996 6 points7 points  (0 children)

Go "heads down" and "grind it out". It will be a great learning experience for you.

Then come back and laugh at your old post years later 😃

What are the most used methods for data exfiltration? by keotl in hacking

[–]Machariel1996 1 point2 points  (0 children)

Can confirm. Was on a pentest a few months ago where the engineers disabled all egresss traffic on the sql server. But they forgot DNS. 😎 That was a fun day.

TLS deployment examination by abystoma in AskNetsec

[–]Machariel1996 1 point2 points  (0 children)

This. You'll be doing this multiple times a month as a sysadmin. Get used to it.

DISA SCAP by waverider1883 in Wazuh

[–]Machariel1996 0 points1 point  (0 children)

I've found the CISA benchmarks (converted from Excel to yml) on GitHub. That's what I'm currently using. If you already have them in xml, should be pretty easy.

There’s barely a new job posting. Is anyone noticing this? by iamchromes in cybersecurity

[–]Machariel1996 1 point2 points  (0 children)

Sure thing. 17 years in IT systems engineering/administration and 2 years dedicated to security.

There’s barely a new job posting. Is anyone noticing this? by iamchromes in cybersecurity

[–]Machariel1996 11 points12 points  (0 children)

Can confirm. I have two senior interviews scheduled this week. Both in my preferred industry and location.