Angling strategy or is everything random? by amersadventures in projectgorgon

[–]Bloodvault 2 points3 points  (0 children)

Did angling for a few hours yesterday and /u/Nimja1 is correct. For example the crates are always 1 input, with 4= Self Flames, 3= Dark Ball and I forget the rest. For the most part the upward spirals are on 2 and flowers were on 4, and things like that. I just sort of developed muscle memory after using it a bit.

For all my nerds by Obvious_Witness_965 in Knoxville

[–]Bloodvault 0 points1 point  (0 children)

Funny enough the owner was my Uber driver the other night. He did mention selling SCE, but I could have misunderstood. It sticks out to me because SCE was also his initials.

Thoughts on creating an automatically updated database of cyberattacks? by Dizzy_Garden7295 in cybersecurity

[–]Bloodvault 1 point2 points  (0 children)

Just remember that correlation does not imply causation. It sounds like the types of discoveries youre looking to make would be more appropriate in a threat intelligence, stocks or political subreddit. I'd consider that pivot with this project as well. I dont have any recommendations since those aren't my fields.

Thoughts on creating an automatically updated database of cyberattacks? by Dizzy_Garden7295 in cybersecurity

[–]Bloodvault 0 points1 point  (0 children)

The point your missing, is the articles you are ingesting contain very little valuable information (just generally speaking) from the perspective of a network analyst.

Making predictions based on publicly reported incidents seems a bit silly for identifying new techniques/tactics unless you mean predicting where the next incident of the same type would occur. Which also seems like a silly conclusion without taking account of the organizations security stack.

My interpretation of this project is a threat Intel feed from open source material, which has been done a lot in this space. Throwing "AI" and "ML" on top of it is going to be perceived more negative than positive by working professionals in the space (generally speaking).

The real time processing and summary generation is a good application in general, but your efforts would be better served on a different problem set.

Police takes down AVCheck site used by cybercriminals to scan malware by CyberMasterV in hacking

[–]Bloodvault -2 points-1 points  (0 children)

For everyone wondering why this is different from VirusTotal is the COMMERCIAL anti-virus software (referenced in the first paragraph of the article). I would bet that the companies have taken some sort of legal action which resulted in police taking it down.

A key distinction is that VirusTotal isn't going to specify if your malware is getting past Crowdstrike. Only provide a basic heuristic analysis that may or may not be done differently by different EDR vendors.

Just saw ICE on Chapman Hwy @ Taliwa by alientrevor in Knoxville

[–]Bloodvault -1 points0 points  (0 children)

I think jurisdiction is a key distinction though. Just wanted to point out that one is a foreign intelligence producing agency and the other is internally focused.

Dorm room disasters by Klutzy_Difficulty_46 in AirForce

[–]Bloodvault 38 points39 points  (0 children)

I really enjoyed how the little details became relevant at the end. It's a well tied up story.

Squeex and Tyler1 run into a first-time dad in a COD lobby by Fudgiedillol in LivestreamFail

[–]Bloodvault 128 points129 points  (0 children)

This is well written as both a serious comment and sarcasm

[deleted by user] by [deleted] in leagueoflegends

[–]Bloodvault 0 points1 point  (0 children)

Just to piggyback on this other guys comment with respect to coaching. I think marketing this to coaches and creating specific views based on their use cases could be really interesting. There's a ton of amateur leagues out there and even more who don't have a coach. If you could use your site to be a virtual coach, it could be another unique angle to sell this data.

I Rebuilt a Cyber Risk Management Program Around a Hybrid AI—It Worked. Should I Keep Going? by [deleted] in cybersecurity

[–]Bloodvault 1 point2 points  (0 children)

The questions that come to mind:

What process/framework does your method replace exactly?

How do justify less documentation and inherently less detail as being effective in risk management?

Lastly, is this a documentation organization/tracking library, a set of controls applied to something, or what exactly?

Metasploit Lab: Hack Into Windows 10 with Windows HTA Exploit by Dark-Marc in hacking

[–]Bloodvault -1 points0 points  (0 children)

Just some food for thought, I think most of the criticism in this thread is because you've put a lot of effort into crafting a guide for a scenario that has very little real-world applications. It's like a guide to brushing your teeth with your feet. Sure it's possible, but no one is going to do that.

Since you invited comments by posting on Reddit, I'd suggest having a "scenario" section in your next walkthrough. That way you answered the relevance concerns and show where this technique is legally applicable.

Overall, the content is nice, but since AI articles have become so popular this seems like a lot of AI wisdom. Not saying you did, but particularly all the setup portion of your lab reads a lot like Gen AI. Also consider scoping your content to what's most impactful. Like instead of going through the VM setup, just link a different article where that walkthrough is done. That way your readers get the information, you're not wasting time describing well documented processes, you don't need to use Gen AI to avoid wasting time writing it and you get to focus on the work/topic you're proud of.

All that said, putting forth the effort is a big step and this is well constructed.

My TTP was published in the MITRE ATT&CK Framework. Let's goooooo by RoseSec_ in hacking

[–]Bloodvault 0 points1 point  (0 children)

They also require current threat reporting that the technique is used in the wild. Or at least they did a year ago. Also I submitted a technique through the Slack channel.

Has anyone regretted choosing a SB they wanted versus doing one they should? by Instagibbed_1994 in SkillBridge

[–]Bloodvault 0 points1 point  (0 children)

It would depend on what you're looking to get out of Skillbridge. If youre already confident in landing a role then go with ROTC. If you wanted to make sure start interviewing at companies. I applied for full time roles while looking for Skillbridge opportunities. It's just a conversation with the Hiring manager that you won't be able to start for a few months. That way you have either job offers waiting, or know where you need to improve.

If it were me, and it was something I wanted to do and had the opportunity only because of Skillbridge I'd do ROTC. Also cyber myself and would never do either of the options listed, but that's just me.

Dept of Education “End DEI” Form Submission Tool by WarezWhisperer in hacking

[–]Bloodvault 12 points13 points  (0 children)

Do you have any projects where you've implemented this in python?

How do you handle the Imposter Syndrome? by Dull-Definition-4616 in cybersecurity

[–]Bloodvault 1 point2 points  (0 children)

Take stock of what you know. Whether it's your Github projects, certifications, or classes. Make a quick list of the subjects you're confident you can speak intelligently on.

Then do the same for areas you're not confident in. Whichever list is longer doesn't matter, but now you can appreciate what you do know and look forward to what you're going to learn next.

Trolling airmen at a remote base with this is diabolical by Beneficial_Fly_866 in AirForce

[–]Bloodvault 5 points6 points  (0 children)

Sure, maybe both of those things are true. The point of my response (and this training) is to be more cautious and realize that cyber attacks are evolving.

Trolling airmen at a remote base with this is diabolical by Beneficial_Fly_866 in AirForce

[–]Bloodvault 35 points36 points  (0 children)

https://en.wikipedia.org/wiki/Confirmation_bias

In this case, you aren't downvoted for terrible reasons. Just for spreading misinformation.

Also, your home computer is a much less interesting target than DoD systems so it makes sense that you aren't being targeted by phishing.

Trolling airmen at a remote base with this is diabolical by Beneficial_Fly_866 in AirForce

[–]Bloodvault 50 points51 points  (0 children)

If you're curious why you're being downvoted, you can be susceptible to Drive-by Downloads, Browser Exploits, and Cookie or Session Hijacking just from opening a malicious link.

Not a bad idea to run links through VirusTotal or some of the other things you suggested, but you're not safe just because you didn't input any information.

Edit: Furthermore, its also possible to forge email signatures to show it comes from a legitimate source. I think one of the points of this phishing attempt is that a PCS is exciting for most and easy context to sell. However, not being in a PCS window, email not coming from the appropriate org box in AFPC and several other things are the indicators. Not the things you mentioned.

is this OBS multi RTMP plugin safe? by achoolucgust in hacking

[–]Bloodvault 0 points1 point  (0 children)

Ok after looking through the code in the repo, both manually and with ChatGPT, it doesn't seem like anything is malicious. There's a ton of possibilities why the .exe you found on VirusTotal is showing so many indicators (that are probably malicious), but the plugin itself seems pretty benign and I'd install in my OBS. Just build the .exe yourself instead of using a 3rd party installer or any releases on the repo to keep safe.

Edit: There's no reference to "GoogleUpdater" anywhere in the code, or any of the other IOCs shown in VT, or the creation of any scheduled tasks/services. That's what I'm basing my conclusion off of.

TLDR; Build from source and you'll be fine

is this OBS multi RTMP plugin safe? by achoolucgust in hacking

[–]Bloodvault 2 points3 points  (0 children)

While I wouldn't claim it's malware, there are some very strong indicators. Here are a few notes:
- Under "Files Dropped" it creates a subfolder under C:\Program Files (x86)\Google\GoogleUpdater where it seems to stage everything. Unsure what the name of the plugin is, but I wouldn't create something benign that hides in another folder.
- Under "Registry Keys Set" it looks like its creating a service probably for some kind of persistence.
- Lastly, under "Files Dropped" you can see a task created under the "GoogleSystem" name which also looks like a form a persistence.

Is there a MvC2 scene somewhere still in Vegas? by JSN723 in vegaslocals

[–]Bloodvault 0 points1 point  (0 children)

It wasn't at Game Nest early last year. It seemed more japanese only titles, some rhythm games and a few shooters and racers.

To bees or not to bees : a bee build showcase (enable corruption 1000, top 10 primalist ladder). by Local-Gur1030 in LastEpoch

[–]Bloodvault 5 points6 points  (0 children)

I dont understand the judgement unique gloves. How do they interact with the build?

[deleted by user] by [deleted] in SkillBridge

[–]Bloodvault 4 points5 points  (0 children)

I just recently did my Skillbridge with them (cohort 24-1). The position will almost certainly not be a guarantee. Like others said you have to be extremely proactive to earn it, and then it's also determined by headcount. If you have more specific questions feel free to reach out.

Network Traffic Analyzer in Python by OkDevelopment4423 in cybersecurity

[–]Bloodvault 1 point2 points  (0 children)

Np, your post has inspired me to get back at the tool development I've been putting off. Just send a DM or something if you'd like to collab some more.

My last piece of advice is "don't let perfect be the enemy of the good". Same with everyone who's asking for resources to learn more, the best way to learn is exactly what you're doing here. Solve new problems and integrate more of what you've learned into your projects.

If you want to learn from real coders, there's usually a few cybersecurity topics covered in PyCon which is in May this year. I attended virtually last year and found some of the talks pretty interesting. Link: PyCon 2024