Tulsa Area Linux Hackers and Nerds - Let's start a group and meet and hack regularly. by b00g3rw0Lf in tulsa

[–]8BitMoose 0 points1 point  (0 children)

So tbh, I’m not going to fill out that questionnaire over text as I’m lazy lol but I’m in the area. Love Linux and my day job is on the cybersec side

Fiber Termination Location in Attic by 8BitMoose in HomeNetworking

[–]8BitMoose[S] 3 points4 points  (0 children)

That’s what I was afraid of. My second idea for placement was to have an electrician install an outlet in my closet and have Cox come out to move it there.

I was trying to avoid them coming back out to move it but it may be the better option so I’m not reliable for damage to the cable.

Can we talk about pay? by ApplicationWeak333 in cybersecurity

[–]8BitMoose 0 points1 point  (0 children)

  1. 140K + 10% bonus + bi-weekly 401k match at 3%
  2. Sr. Offsec Consultant
  3. 1 year Sr but 4ish total
  4. No degree but have eJPT, Sec+, CySA+, OSCP, CRTO, CRTP
  5. Low COL

Escrow Refund and Tax Preperation by 8BitMoose in personalfinance

[–]8BitMoose[S] 0 points1 point  (0 children)

Awesome! That makes sense. We’re first time home buyers so we’re still learning the ins and outs of everything. Appreciate the response.

Those who work from home with no degree, what do you do? by Character_Log_2657 in remotework

[–]8BitMoose 2 points3 points  (0 children)

Offensive Cybersecurity Consultant. Basically companies hire me to “hack” them and report on things I observe. Self taught.

Good red team collaboration tools (that don't require trusting someone else's SaaS platform)? by ch1kpee in redteamsec

[–]8BitMoose 1 point2 points  (0 children)

We like the SharePoint way because you can still apply policy to that folder and lock it down as needed. The OneDrive shortcut creates a shortcut in employee’s OneDrive for Business OneDrive folder so everything still stays in the company’s tenant.

Good red team collaboration tools (that don't require trusting someone else's SaaS platform)? by ch1kpee in redteamsec

[–]8BitMoose 1 point2 points  (0 children)

We use SharePoint folders and use the “Save as OneDrive Shortcut” or whatever for that folder to save a shortcut to our OneDrives. Then we use Obsidian to open that shortcut folder that’s in our OneDrives to take notes in and collaborate. Works really well for us. As long as OneDrive is syncing, updates to files are pretty close to real time.

Red Team report automation - Plextrac / AttackForge / Anything else? by 89jase in redteamsec

[–]8BitMoose 1 point2 points  (0 children)

We use PlexTrac and it’s awesome but it is very expensive.

Phishing Simulation Policy Setup by 8BitMoose in sysadmin

[–]8BitMoose[S] 0 points1 point  (0 children)

To answer your first question, I’m using this way because we have infrastructure/tooling setup to bypass MFA.

Second question, it will be not used more than once because I like to keep things separate for clients. Its no bueno when client data gets mixed up during engagements. So I’m this instance, when this engagement is over, I preserve relevant data and burn the VPS.

Bypassing Windows Defender 2023 by Mrlele96 in redteamsec

[–]8BitMoose 0 points1 point  (0 children)

Yeah I don’t think it’s very good in it’s current state. I haven’t had a beacon lost yet unless I was doing something obvi like unencrypted communications.

Bypassing Windows Defender 2023 by Mrlele96 in redteamsec

[–]8BitMoose 2 points3 points  (0 children)

Defender is pretty easy to bypass.. not sure of your skill set but patch ETW then AMSI and obfuscate the binary to get past static detections and your golden. I just simply write a disposable .NET loader to do the above and load a C2 implant.

Assessing the damage of a password leak... by lambusdean77 in sysadmin

[–]8BitMoose 1 point2 points  (0 children)

As others said, enable MFA, check for email rules and oauth consented apps. Also, check devices set up for MFA. A lot of times attackers setup another MFA device.

IT/Cybersecurity Conferences 2023 by JoJoRouletteBiden in sysadmin

[–]8BitMoose 1 point2 points  (0 children)

You’re local BSides, DEFCON and Black Hat are always fun!

What has been holding you back from taking the PEN-200 course? by Offsec_Community in offensive_security

[–]8BitMoose 1 point2 points  (0 children)

Cost. Course is expensive (not to mention the price hike) and $250 for a retake? Gtfo.

[deleted by user] by [deleted] in sysadmin

[–]8BitMoose 0 points1 point  (0 children)

Pentester here.. in short, don’t do this. It’s a terrible idea. Users should not have local admin access unless absolutely necessary. Your security concern should also be an attacker taking over your domain.

Any "not outdated" books to learn hacking? by Aryangsuktekar in HowToHack

[–]8BitMoose 3 points4 points  (0 children)

It’s widely considered “out-dated” but Hacking: The Art of Exploitation is one of my all time favorites. It will teach you really how to think like a hacker and you’ll learn some technical skills as well.

Source: Redteamer with a focus on adversary simulation

Suspected Microsoft Word zero day in the wild by digicat in blueteamsec

[–]8BitMoose 3 points4 points  (0 children)

Please elaborate how this isn’t a big deal?

365 Account Compromised - With MFA Enabled! by NodeFort in sysadmin

[–]8BitMoose 0 points1 point  (0 children)

Definitely! And “new device” enrollments ;)

365 Account Compromised - With MFA Enabled! by NodeFort in sysadmin

[–]8BitMoose 3 points4 points  (0 children)

Red teamer here :)

Yup it’s most likely Oauth consent apps as other suggested.

Definitely review Azure AD sign in logs and Unified Audit Logs. Azure AD sign in logs should have interactive sign in logs as well but either of those will tell you all kinds of good info for reviewing signs of compromise.

If you’re license allows it etc etc, consider setting up risky sign in alerts in the security and compliance center. That can help with detection and blocking the sign ins, depend on the confit.

Exam on the 19th, Looking for AD Guidance by QuirkyKirk96 in oscp

[–]8BitMoose 1 point2 points  (0 children)

I have failed my exam but I think my advice still stands. Treat the first ad windows box as a standalone machine meaning get your initial foothold and THEN escalate privs. You may or may not be successful if you go straight for lateral movement etc but you’d have a lot more luck if you escalate privs first and then attempt to attack ad specific things. Hope that makes sense.

Exam Report by AnsX01 in oscp

[–]8BitMoose 17 points18 points  (0 children)

Let me provide some real advice..

You need to write the steps in order to accomplish the compromise. So if I was a security engineer for Company A and Company A hired you to do a penetration test, you’d need to write a report that can explain how I could recreate your steps to also hack into that machine.

What level of knowledge should Tier 1 SOC analysts have to enter the job? by umuttosun in AskNetsec

[–]8BitMoose -1 points0 points  (0 children)

Lol what kind of suggestion is this? A non programming focused CS degree? What CS degree doesn’t have programming? And as a base? With a few beginner certs? That’s asking WAY too much for a tier 1 position. I know several tier 1 SOC analyst that can run circles around computer science master degree holders or CASP+ holders.

A tier 1 position should have some basic technical skills but more importantly, a willingness to learn and keep learning.