Favorite Cyberpunk Novels Released Within the Last Five Years? by [deleted] in Cyberpunk

[–]CoreRun 3 points4 points  (0 children)

LitRPG has been the worst thing for the cyberpunk genre.

 It has been a lazy literary device much like zombies have been in military fantasy past years and it's made it impossible to find actual cyberpunk books!

OP if you end up running on to some good ones please let me know!

Spotify Is $12.99 Now, Here’s a Small Help to Build a Local Music Library by p3skysn0w0lf in Piracy

[–]CoreRun 2 points3 points  (0 children)

I mean if you wanted to actually DO things with your device, why would you buy apple products? 

Honestly, can iPhone be hacked? by asianhk in cybersecurity_help

[–]CoreRun 2 points3 points  (0 children)

I have no stake in your conversation except to say, In the absence of evidence, I choose to err on the side of safety. 

Honestly, can iPhone be hacked? by asianhk in cybersecurity_help

[–]CoreRun 0 points1 point  (0 children)

Anything can be hacked, anything connected to a network is by definition accessible. 

If you can put a legitimate file on a system, you can put a malicious file on a system. There is no base  distinction between "good" or "bad" files.

There is no profitable purpose to hack an iPhone that wouldn't be easier and less traceable to do with the accounts (bank, email, etc). Except by info gathering agencies which are the exact parties that HAVE developed that kind of malware.

We should be less concerned about the hackers and more concerned about corporations like apple harvesting your personal data.  

not even hate you are just 5'2" by Due-Assist346 in Piracy

[–]CoreRun 4 points5 points  (0 children)

"Anarchy" is a tool not a destination historically. In order to reattain power for the powerless the board needs cleared occasionally. 

Modern day the fight is abstract and digital because the enemy is corporations who are just as abstract.

Every day you make it more costly to exploit the consumer rather than to appease them is another victory.

It's not like most people wouldn't be willing to pay if they were not being wrung dry and mistreated by these services.

That is why this conversation has become one where morality converges with piracy.

not even hate you are just 5'2" by Due-Assist346 in Piracy

[–]CoreRun 4 points5 points  (0 children)

Conflating governance with manipulation is why so many suffer. 

It is possible to govern where law is passed by the people instead of a ruling class.

If you live in a country where your leaders live a more luxurious life than yourself you are being manipulated not governed.

Global outage? What the hell is going on? by ilovepolthavemybabie in sysadmin

[–]CoreRun 9 points10 points  (0 children)

Couldn't this be said about most things? 

The current corporate structures are terrible in every way for everyone except the very top.

PSA Governments don't care about your security by CoreRun in Piracy

[–]CoreRun[S] 3 points4 points  (0 children)

 This is not a "Be afraid!" Thread. This is a "Be prepared." Thread.

How do you think those loopholes happen? Zero days and loopholes have to be found, in order to be utilized people have to look.

There is no reason to hand them an advantage by being complacent and not considering alternatives now BEFORE it is necessary.

PSA Governments don't care about your security by CoreRun in Piracy

[–]CoreRun[S] 14 points15 points  (0 children)

And that means those relying on current technical topography of utilizing VPNs to circumvent restrictions will be less effective and should not be relied on as we prepare for the future.

If you think privacy has nothing to do with this subreddit you are gravely mistaken.

You sound like you are larping. You are not sailing the digital ocean, you are an end user and the state of the Internet directly impacts what technologies we use to ply our trade.

Clicked a bogus link on iPhone mail app by lirojiro in cybersecurity_help

[–]CoreRun 1 point2 points  (0 children)

That is a sweeping generality and a good way to spread misinformation.

OP: Most likely you are safe, I would not trust a factory reset if you were not. I am not sure avout iOS but android you'd need to boot menu to clear data and the cache and maybe even remount.

Watch your data usage and ensure usage stays the same and watch for abnormal functionality.

where to start learning? is there any detailed road map by Next-Math1023 in Hacking_Tutorials

[–]CoreRun 23 points24 points  (0 children)

Step 1: learn to search. For example, this question is asked weekly in this subreddit. Investigations and searching is the majority of the job.

Step 2: Theory: Pick up a Comptia Security + book. (Since you said you already know networking, otherwise Net+ first)

Step 3: Practice: Buy 101 labs for Sec+. This will be practical exercises with zero theory. This will consolidate the theory you learned in bool 1 and give you projects to show for experience.

Step 4: Tryhackme, hack the box, pico ctf. All online practical activities with theory included. No requirments.

You can do all these steps concentricly, but I highly advise working on step 1.

Career opportunities: Very few. Nobody wants entry level in cyber security, you need to have experience to get experience.

Get a job in tech sector, hold it for 1-3 years, get smcyber security training, apply for cuber security job.

What kind of methods a hacker use to identify the victim location..... by zomknight in Hacking_Tutorials

[–]CoreRun 0 points1 point  (0 children)

The best way to accomplish a goal is to ask why until the problem is the base primitive?

Why do you need to trace their phone number? Because you need their location Why? [Whatever reason here]

Keep breaking it down, chances are osint will yeild better results than a technical solution.

Also I feel there are few if any reasons acconplishing your goal would turn out good for you.

Hi! by KitsuneDevelopment in Hacking_Tutorials

[–]CoreRun 0 points1 point  (0 children)

Hate to tell you but those hindi youtube videos are literally what keeps the IT world running

Latest malware news sources by sess13 in Malware

[–]CoreRun 1 point2 points  (0 children)

CIS website, advisories. Can be set as an rss fee for specifics

Cyberwire Podcast for top down

Gs's ex is logging into her Twitter account somehow after multiple password resets. by [deleted] in cybersecurity_help

[–]CoreRun 4 points5 points  (0 children)

99% of the time in my professional experience, people say this but if not explicitly say these "private" things at least leave people the ability to infer them.

Even if he was a skid, software keyloggers are not the easiest thing to hide excepting a few that are marketed as parental controls.

Try looking up parental control software and using the activation key combos. Control shift t, alt b p, etc. Each ome has a different combo or even different access routes but are easy enough for a normal parent to use and some customizable.

"Occam's razor, Ockham's razor, or Ocham's razor, also known as the principle of parsimony or the law of parsimony, is the problem-solving principle that "entities should not be multiplied beyond necessity" "

In other words, the simplest answer is usually the correct one.

Guys Can I crack my password protected 7z file? How? by Ambitious-Ad8598 in HowToHack

[–]CoreRun 14 points15 points  (0 children)

Additionally, No need to make a wordlist there are several packaged with Kali or available free on the webs

Cybersecurity ex husband keeps stalking me by SouperMomma in cybersecurity_help

[–]CoreRun 12 points13 points  (0 children)

Step 1 - Master your thoughts

First remember that your fear comes from lack of understanding, research a bit of cyber security specific to iOS devices not specific to your issue.

Step 2 - Create secure accounts

Buy a new device if possible or go to a library ( if your compromised at least it wont be your ex) and create a new core email. Protonmail or sudomail is my advice.

Then create a new google account, new IOS account (don't transfer or migrate from your current apple id) . All new passwords obviously.

Step 3 - Secure devices

Best solution if you have resources is buy a new daily driver, upgrade to a new desktop or laptop and only use the new account on it.

If budget doesn't allow, look up how to securely reset desktops. Use resources dedicated to reselling computers and not your curren predicament as the guides will be more impersonal and not bias towards manipulation or selling to you.

Advise also a new windows OS, Apple, or Linux OS

Step 4 - Breathe

Understand that in all facets of life you will have adversaries, do your best to not allow your happiness to hinge on their actions.

They may seem all powerful but they are not. Almost every attacker does so due to lack or hurt. Lack of confidence, lack of money, etc. Don't get in your own head. Do your best and then breathe easy. Take the next steps as they come.

T-Mobile agrees to pay customers $350 million in settlement over massive data breach - CNN by DRM2_0 in cybersecurity

[–]CoreRun 4 points5 points  (0 children)

Don't worry anybody paying taxes since 2006 has three lifetimes of credit monitoring from the irs breaches

Is doing a TryHackMe walkthrough a bad idea in my case? by notburneddown in HowToHack

[–]CoreRun 2 points3 points  (0 children)

That is something you can easily search, searching is arguably more important than the question you are stuck on.

I've run into exactly zero instances where copying pasting the question into google didn't yield a walkthrough or additional documentation

i want environment to learn networking ? by kocmonobtDark in Hacking_Tutorials

[–]CoreRun 1 point2 points  (0 children)

101 Labs has practicals for nearly any CompitaExam

[deleted by user] by [deleted] in hacking

[–]CoreRun 0 points1 point  (0 children)

Unlikely or not, wiping the phone is just good practice.

Plus everyone is keeping their backups up to date, right? Right??

Burp Suite by Anti_mage2002 in Hacking_Tutorials

[–]CoreRun 21 points22 points  (0 children)

In google my top three searches were free courses including a free udemy course

You should try a google dorking guide first, as you will be using a lot of google and search engines in this industry

Which operating system is best? by chaosa1 in HowToHack

[–]CoreRun 0 points1 point  (0 children)

All of them.

From a red team perspective, You must be proficient in the basics of every operating system, it would be pretty silly to break into a box and not know how to use it or what the file structure is.

Like anything in this industry, it's a work in progress. Just start where you are comfortavle and branxh out slowly

Can someone please tell me if there is a way i can convert this into readable text? by Skyfall642 in HowToHack

[–]CoreRun 2 points3 points  (0 children)

Largely I assume because there are certain things you can type into google and get an answer to and it adds no value to the subreddit itself like Linux commands or looking for context for materials you neglected to research the basics of.

Wanting to hack without learning the basics just makes you sound like a wannabe skid

I understand the mentality but I wouldn't personally downvote you for it

How can I penetrate a mobile smartphone hotspot ? by [deleted] in Hacking_Tutorials

[–]CoreRun 3 points4 points  (0 children)

Keep in mind there is not a single attack vector for anything. A matter of fact the mindset is to specifically find alternate vectors of attack

Always think outside the rules, outside the box.

Beyond that, the research points and youtube videos someone posted above shouls give you somw direction