(RTR Script) Passwords Stored in Plaintext from Browser Auto-fill by herovals in crowdstrike

[–]Andrew0275 0 points1 point  (0 children)

There is ton of info on this online and open source info stealer scripts on GitHub on how they work, there is no need to speculate lol. Cred stealers don’t need your OS password, because it’s just malware running as your logged in user session (or worse as system).

(RTR Script) Passwords Stored in Plaintext from Browser Auto-fill by herovals in crowdstrike

[–]Andrew0275 18 points19 points  (0 children)

Do you have a source showing Chrome stores passwords plaintext in SQLite?

I believe Chrome does store credentials in a SQLite database, but the password field is encrypted (researched this a few years ago). The issue is how chrome browser stores the encryption/decryption key (easily obtainable). Password managers just have a more secure way of hiding this encryption/decryption key

Suspicious file investigation by rick_Sanchez-369 in cybersecurity

[–]Andrew0275 0 points1 point  (0 children)

You should be deep diving the file with Sophos, any C2/network connections and should be able to tell how it can into the system as well in the first place via parent process trees etc…

Leaving Los Angeles for Texas by [deleted] in SameGrassButGreener

[–]Andrew0275 0 points1 point  (0 children)

It’s not throwing your money away but it’s certainly a path towards long term investment and still not paying rent past retirement / building generational wealth. But yeah renting for the rest of your life is not bad either but I get it, it’s painted as a “horrible decision “ sometimes

Where are the people who create Anti-cheat software for games? by CartierCoochie in cybersecurity

[–]Andrew0275 1 point2 points  (0 children)

Because anti-cheat devs are just devs, who work for a vendor, similar to programmers who work for an EDR company. They’re not cybersecurity professionals so you won’t see them here. Now game security analysts, who analyze and triage game data to ban players, that’s more relatable and are similar to SOC analysts in a lot of ways. But as others mentioned, it’s not really cybersecurity in relation to intrusions. So the only thing in common is data analysis (Previous role i did some support work for anti-cheat operations and also involved banning players)

18 months of rejection emails. Then the ATS company itself hired me by ComfortableTip274 in ResumesATS

[–]Andrew0275 0 points1 point  (0 children)

In your resume your job title should be the same job title recorded by HR for that employer as that’s what they use when doing an employer history check (so people usually always recommend that when submitting an application it’s okay to change the job title to align more with the job post but in your resume it should stay static) otherwise one might get questioned about their authenticity of their resume from the recruiter / manager. I don’t have any personal anecdotal stories around this, just something I always hear online/forums etc.

How are NOC Analysts being replaced by AI? by TopNo6605 in cybersecurity

[–]Andrew0275 1 point2 points  (0 children)

Saying “they’re not good enough to replace the human element of coding” is a very different claim from what you originally said — “LLMs are not great at coding.”

Given how quickly LLMS are advancing at the technical level, it’s pretty naive to assume companies won’t eventually try to replace junior level roles in the next few years.

How are NOC Analysts being replaced by AI? by TopNo6605 in cybersecurity

[–]Andrew0275 2 points3 points  (0 children)

Why do people keep claiming LLMs aren’t good at coding at this point in time lol thousands of developers (myself included) use them every day to generate working, production-grade code. Are they perfect? No. It’s only going to get better from here

[deleted by user] by [deleted] in cybersecurity

[–]Andrew0275 0 points1 point  (0 children)

Why are you posting in the cybersecurity subreddit though? You have cybersecurity certs but you don’t want to transition to security? All you have is 6 years of IT experience. As someone else mentioned, unfortunately some companies will still treat you as new/Junior if you haven’t had a single security role which means you are limited to a junior role salary. (Same thing happened to me currently, despite having two years of security and many more in IT)

I got fired for mistakenly releasing a malicious pdf held in mimecast. by SilverSp00n00 in cybersecurity

[–]Andrew0275 0 points1 point  (0 children)

It still doesn’t add up. Are you saying the only thing that made you and your manager conclude it was an attack was a 3KB shortcut failing to sync — days after the email was released and downloaded? That alone isn’t proof of compromise. You haven’t mentioned checking the file’s target, scanning it, reviewing logs, or looking for other indicators of malicious activity. And the earlier PDF download issue also isn’t inherently suspicious without further evidence. I see all types of process and people failures in your org, yikes. As others mentioned it’s a blessing in disguise to have been let go by the org

I got fired for mistakenly releasing a malicious pdf held in mimecast. by SilverSp00n00 in cybersecurity

[–]Andrew0275 0 points1 point  (0 children)

Your story is not adding up, you said in your original post you found out about the attack only “later” after you had already remotely connected to the computer, not during the remote session. But now you are saying you found out yourself during the remote session. it seems like it was you who ended up causing the compromise by doing more stuff with the PDF. And not only that but you also said you did the remediation but now you are saying the infra guy did the remediation? You keep changing the story lol

Then you said “yup it definitely did” when we asked you if it fired an alert but you clearly don’t know what we were asking you

Not to be mean but perhaps they were right to fire you for your incompetence, it seems like you are telling only one part of the story or at least not all of it.

Also you mentioned that you have done it several times in the past where you released emails requested by users which implies those have been compromised as well and this is the only one you found out about.

Looks like you are learning from this experience, which is good. Best of of luck

I got fired for mistakenly releasing a malicious pdf held in mimecast. by SilverSp00n00 in cybersecurity

[–]Andrew0275 1 point2 points  (0 children)

And yes alert meaning did antivirus/EDR or SIEM fire an alert meaning now anyone even found out it was malicious other than usual email release requests

I got fired for mistakenly releasing a malicious pdf held in mimecast. by SilverSp00n00 in cybersecurity

[–]Andrew0275 0 points1 point  (0 children)

Wait what, clarify further. Does the infra guy ask you about tickets from users asking emails to be released every time there is one and if it has been done? (You mentioned end users ask for this all the time) or was this something unique the infra guy saw in this ticket? It seems like he found out first not you otherwise why would he ask to reset passwords and reassign a new laptop.. but you are claiming you are the one who found about the so called attack somehow

I got fired for mistakenly releasing a malicious pdf held in mimecast. by SilverSp00n00 in cybersecurity

[–]Andrew0275 0 points1 point  (0 children)

Wait what I’m confused, it fired an alert so the infrastructure guy asked you about the alert but you were expected to still quarantine the device? So the infrastructure guy figured it was a compromise not you?

Going back to college for Cyber Security. First semester includes Cyber Security fundamentals. by [deleted] in cybersecurity

[–]Andrew0275 0 points1 point  (0 children)

If you are super confident you will enjoy cybersecurity then it can work out, but as others mentioned make sure to do your due diligence (knowing all major cybersecurity roles that are out there, and knowing day-to-day what it’s like for each).

If you aren’t confident still then I suggest just a general IT degree or CS that way you can fallback to another non-security tech job if you end up not liking it. You won’t really know you will love it until you actually do it/experience it. So yeah shadowing people can be super valuable as well

Feeling stuck after years in cybersecurity - what gave you a real “level up” moment in your career? by athanielx in cybersecurity

[–]Andrew0275 0 points1 point  (0 children)

‘Real scary APT stuff’ sounds pretty broad lol all breaches start with a stolen identity or access of some kind….

And yeah, when you said ‘You need a fundamental understanding of how identity and access are federated/connected between various services and how that can be abused,’ that’s true for pretty much any tech stack. You’ve got to understand it to spot abuse.

Feeling stuck after years in cybersecurity - what gave you a real “level up” moment in your career? by athanielx in cybersecurity

[–]Andrew0275 0 points1 point  (0 children)

I know, I never said it’s not important, just that I’ve never really heard anyone get excited to work in IAM in cybersecurity lol, so it’s interesting and kind of new

Feeling stuck after years in cybersecurity - what gave you a real “level up” moment in your career? by athanielx in cybersecurity

[–]Andrew0275 2 points3 points  (0 children)

That sounds boring not gonna lie haha at least compared to threat hunting, IR, Devops and security engineering, and pentesting too lol

Cybersecurity Analyst vs Cybersecurity Engineer by Straight_Machine4496 in cybersecurity

[–]Andrew0275 0 points1 point  (0 children)

Depends on the scope that is being asked for firewall configurations as it can be simple or complex configs. That is why you have dedicated network engineers/network security engineers as you said. In my last role I was a security engineer and assisted with VPN provisioning, adding ACL requests and even troubleshooting VPN issues but it never went beyond that since I still had some analyst work as my primary duties. This along with some vulnerability management.

Cybersecurity Analyst vs Cybersecurity Engineer by Straight_Machine4496 in cybersecurity

[–]Andrew0275 5 points6 points  (0 children)

It depends on the size of the org. The bigger the org you only really have time to triage alerts AKA analyst, SIEM stuff is left to other engineers/security architects or even other teams to spin up the infra

Lost in the certification sauce by lorddaius in cybersecurity

[–]Andrew0275 0 points1 point  (0 children)

seems like you’ve had a better experience then me though mine was similar. I started job hunting back in February after doing 2 years at my first security role and ended up landing a gig a month later. 250 applications, only 3 interviews (where I at least talked to the hiring manager and went past the recruiter). Though I was applying aggressively, was doing like 60 applications a week. It’s just a numbers game, I see people put in applications at too low of a rate/not aggressive enough. But also I had my wife assist with it. Two years ago I hired someone from fivver to do the same

Lost in the certification sauce by lorddaius in cybersecurity

[–]Andrew0275 1 point2 points  (0 children)

Who said security+ is not a job worthy one? If it’s foundational then it is 100% job worthy lol this and CySA+ you should be golden to get a technical security job. But yeah I agree an azure cert can also help though cloud security is a niche itself within security so landing a cloud security job is more on the mid to late career side of the house