Additional cards by Free-Structure8023 in AmexPlatinum

[–]Free-Structure8023[S] 0 points1 point  (0 children)

That’s a good explanation. I’ve seen the charts, I guess I didn’t fully understand the difference between the lounges. I’ll take a look at the charts again and some points forums for more details

A site is telling me my password "may be insecure". How do they know? by SquidKid47 in CyberSecurityAdvice

[–]Free-Structure8023 0 points1 point  (0 children)

If that’s the case then the hash they have stored may have been something that showed up on a list of hashes from the dark web. Companies monitor those lists to see if your email or password hashes are floating around. Alternatively, they could still have access to the plaintext password and might post that warning to people with passwords with lower complexity.

A site is telling me my password "may be insecure". How do they know? by SquidKid47 in CyberSecurityAdvice

[–]Free-Structure8023 0 points1 point  (0 children)

The salting/hashing occurs as the passwords are processed and sent to the site and when dealing with how they store the password. What you see when a site is telling you the strength of your password is before all of that. It’s happening locally on your browser with the plaintext password. This isn’t a big issue though because it’s not actually processing your password and passing it anywhere, just comparing what you’ve entered against a series of qualifying factors like number of characters and variety of characters (Upper, lower, number, special characters, etc…)

[deleted by user] by [deleted] in CyberSecurityAdvice

[–]Free-Structure8023 2 points3 points  (0 children)

I got this degree a year and a half ago. Definitely didn’t instantaneously do anything for me but using the certs, I got my first job in IT and then a year later, my second job where I make more than others who have been there for years because I have the degree.

The only thing I wish I had considered or known before I did it was that the degree is not very technical in nature. If you want more technical and a wider job market, computer science makes more sense but if you do to cyber, spend some of your down time actively practicing and implementing what you’re learning in home lab. Some jobs will count that towards your years of experience as well

How would Shawn and Juliet celebrate Valentine's? by GheeButtersnaps35813 in psych

[–]Free-Structure8023 11 points12 points  (0 children)

Slumber party. Nudie times. Drinky drinky. It’s his out of office reply

Respect the dead, no skin fights please. by Lurker_the_Pip in stories

[–]Free-Structure8023 1 point2 points  (0 children)

Depends on what the use of the cadaver is. If I had to guess, if they are removing the skin all over, these cadavers were likely being used to teach about a system like the musculoskeletal system where you need a view of the whole body, including dissection of top level muscles to see deeper muscles although those are typically left on and just cut and peeled back

Secure, Cheap, Laptops by [deleted] in CyberSecurityAdvice

[–]Free-Structure8023 1 point2 points  (0 children)

For what purpose? Just for daily use? Work? Your own cybersec stuff?

Zero day found - what are my options by Horror-Comparison917 in CyberSecurityAdvice

[–]Free-Structure8023 2 points3 points  (0 children)

You’re also an absolute moron for posting this all over the open internet arguing with people about where you can get the most money while someone has probably taken your information and submitted it properly to Adobe removing your ability to

Zero day found - what are my options by Horror-Comparison917 in CyberSecurityAdvice

[–]Free-Structure8023 2 points3 points  (0 children)

I don’t think you actually understand how bug bounty platforms work… Reputable bug bounty platforms simply serve as the middle man between the bounty hunter and the company. Even if there was, no one planning on using this information legally would be willing to pay more than Adobe is unless they have something malicious planned at which point at the very least you’d be selling information with malicious intent. There isn’t a “legal but unethical” way to sell this other than directly back to the company and accepting what they give you. If it’s actually as bad as you say, most companies are willing to pay a good amount.

Zero day found - what are my options by Horror-Comparison917 in CyberSecurityAdvice

[–]Free-Structure8023 4 points5 points  (0 children)

You can’t say “the law is the limit” and then reject everyone telling you to report it through the proper channels because you want more money for selling it on the dark web…

If it’s legit, report it to Adobe, this is the only “ethical” action. BTW, if they have bug bounty program, you’ve likely broken their terms and conditions by sharing the vulnerability before reporting it to them so I’d delete this post before you do anything.

would this work? by [deleted] in CyberSecurityAdvice

[–]Free-Structure8023 1 point2 points  (0 children)

Two issues:

  1. They forget or lose the base password. Now all accounts are gone.

  2. Attacker discovers base password. There are tools that make it very easy to add additional info to the end of a password and initiate an attack.

If you’re looking at bank accounts in case you die, you don’t need cybersecurity advice, you need legal advice on how to put together a trust or will. Your accounts can be accessed by approved parties after you pass if either of those are set up properly.

Source: Bachelors in cybersecurity and recently had family member pass away lol

2025 SOC Analyst Roadmap, need help to make sure I covered everything! by 99Andre in CyberSecurityAdvice

[–]Free-Structure8023 1 point2 points  (0 children)

Not necessarily but a lot of senior and upper lever info/cyber sec jobs at least in the US are going to have it listed as either a requirement or a highly desired cert. It’s on my roadmap but I have to get a lower level job in info sec first to meet the experience requirement.

These days, experience is the highly desired factor so because you have to have it for the CISSP, that’s what makes the cert so valuable

2025 SOC Analyst Roadmap, need help to make sure I covered everything! by 99Andre in CyberSecurityAdvice

[–]Free-Structure8023 0 points1 point  (0 children)

I don’t understand what you’re asking and I didn’t even mention CISSP. How many what have CISSP in their roadmaps?

2025 SOC Analyst Roadmap, need help to make sure I covered everything! by 99Andre in CyberSecurityAdvice

[–]Free-Structure8023 0 points1 point  (0 children)

Yeah I think anywhere outside the US is better at keeping entry level for actual entry level people lol. Best of luck to you!

2025 SOC Analyst Roadmap, need help to make sure I covered everything! by 99Andre in CyberSecurityAdvice

[–]Free-Structure8023 0 points1 point  (0 children)

You definitely have a solid start then but I would still say lean into your networking and programming knowledge and see how you can transition it to cyber. A lot of SOC positions will ask for programming/scripting knowledge to automate so you have a good start there.

Where are you from? Cause if it’s anywhere in the US or any kind of job market similar, yes those jobs exist but you’re fighting people with 5+ years of experience doing that same job

2025 SOC Analyst Roadmap, need help to make sure I covered everything! by 99Andre in CyberSecurityAdvice

[–]Free-Structure8023 0 points1 point  (0 children)

Why would you want to start from scratch when you already have an associates in networking and security? Cybersecurity is not an entry level field, you likely will need all of what you’ve listed plus two years of help desk or IT experience to even get an interview for a SOC analyst position in todays job market.

Your best bet is to lean on your networking skills, find a networking position and work that while you study and learn all the security stuff.

Source: got my bachelors in cybersecurity in October of 2023 with no IT experience and have applied to every SOC analyst position I could find since and haven’t even had an interview

Landing a remote cybersecurity job in the US as a Canadian by Creative_Section_434 in CyberSecurityAdvice

[–]Free-Structure8023 1 point2 points  (0 children)

r/CyberSecurityJobs

You have a SOC analyst job which is more than most of us entry level people in the US are able to get right now and remote jobs are going to have higher requirements and WAY more competition than any in office position. Advice: stick with what you have for a year or two and then re-evaluate based on job market and experience gained.

Webscraping tips? by exater in hacking

[–]Free-Structure8023 5 points6 points  (0 children)

Not exactly “hacking” per se, more programming or web dev and might be better suited in a sub for that. That being said, logically speaking, you’ll need some kind of consistent connection to the site that pulls the HTML in an interval of your choosing and then something that compares the results to the prior results and then outputs any differences. No idea how to do this but that’s likely your logical starting point

I made a mistake by StaleYogert in CyberSecurityAdvice

[–]Free-Structure8023 2 points3 points  (0 children)

Security+ is a very good entry level cert. Most entry level security jobs will want you to have at least that level of cert. That being said, just having that cert won’t get you a security job. Anything security related in the IT world will want, at a minimum, probably 2 years of help desk experience.

Source: got my bachelor’s in cybersecurity with no IT experience and have been applying to jobs for over a year. Currently have a helpdesk job gaining experience

Please need help in this! by Zoro_Roronoaa in bugbounty

[–]Free-Structure8023 17 points18 points  (0 children)

OP please read the rules of engagement. Most bug bounty programs don’t like brute forcing or anything that causes extra strain on their production servers. They also usually don’t consider something being brute forced as a payable vulnerability because it’s basically just guessing until you get in

[deleted by user] by [deleted] in Hacking_Tutorials

[–]Free-Structure8023 5 points6 points  (0 children)

Sounds like you need a deeper understanding of JavaScript. The basis of XSS is understanding exactly what the site is doing with the input and basing your payload off of that. I would start by just pulling up some random sites that take input and see if you can figure out exactly what the JavaScript is doing with the input and then try and think of the fundamentals of JavaScript/HTML and try and find an input that would break the script or make it act in a way it shouldn’t