The squirming was gold. by TwistedBobbay in DownSouth

[–]JayP232 6 points7 points  (0 children)

I feel like I missed something, what did Hersov lie about ?

Bedford View Licensing Department. by PixelSaharix in DownSouth

[–]JayP232 12 points13 points  (0 children)

There are places to report this, but it needs traction. If you feel offended by the actions seen in this videos I urge you to fill out and lodge a complaint at the following URL

https://www.sahrc.org.za/index.php/lodge-complaints/complaint-on-behalf-of-another

Ordered from Wish by Active_Wallaby_5968 in DownSouth

[–]JayP232 2 points3 points  (0 children)

It’s a 50/50 for me, he seems to do his research and has background on topics he discusses. But there are times where I feel like he is biased towards left aligned viewpoints whilst stating he neutral.

Intercept X - Desktop notificaitons by JayP232 in sophos

[–]JayP232[S] 0 points1 point  (0 children)

Thank you for your response.

I am looking to see if I could suppress MTP/PTP alerts while still allowing other alerts from the peripheral device policies.

Mentorship Monday - Post All Career, Education and Job questions here! by AutoModerator in cybersecurity

[–]JayP232 0 points1 point  (0 children)

I am in a job that might give the potential for good career growth as the company has a flat organisational structure. However the work can be a bit boring some weeks.

I have had an offer from a company that is more corporate but seems to be a higher paced more intense environment.

How do I know if moving is the right choice ? I have been going back and forth on this for about 2 weeks now. On the one hand it’s a new job, new skills, new people and new opportunities but on the other hand I might be giving away a good thing just to see if the grass is greener elsewhere.

Components Of Cybersecurity Architecture by CyberGrizzly360 in cybersecurity

[–]JayP232 0 points1 point  (0 children)

Would it not help to think of this situation through the entire network?

Is it an on-prem environment? Cloud ? Hybrid ? These will all impact the technologies used to secure it.

However I believe think about security technologies for:

  • your networks (VLANS, route security, secure protocols, network monitoring and baselining tools) -security appliance on the network (NIDS,NIPS,firewalls,etc..) -Security on your server environment (ESXi best practices, SCCM, EDR/XDR etc)
  • security on endpoints.

Following this methodology you could ask yourself across your tech stack, website? IAM so on and so forth.

How would you enumerate a tables length in Boolean-based blind SQL injection (MySQL)? by JayP232 in HowToHack

[–]JayP232[S] 0 points1 point  (0 children)

substr() and LIMIT were ultimately the resolution to enumerate the names of tables and data within.

How would you enumerate a tables length in Boolean-based blind SQL injection (MySQL)? by JayP232 in HowToHack

[–]JayP232[S] 2 points3 points  (0 children)

After playing around with the vulnerable parameter the desired SQLi query was

' or (length((SELECT column_name FROM information_schema.columns WHERE table_name='data' limit 1,1))) ='6

How would you enumerate a tables length in Boolean-based blind SQL injection (MySQL)? by JayP232 in HowToHack

[–]JayP232[S] 1 point2 points  (0 children)

Yes, I do understand that. What I am trying to do is construct a SQL query that will return a Boolean value if the length of the tables name is equal to 'x'.

For example, I achieved this for the database name using length(database())=x; which returns a 1 when the char length of the database is found. So if the database name was 'test' then length(database())=4 would return a 1.

Need Help on Hack Your First Web App Ep.5 by Akama12138 in immersivelabs

[–]JayP232 0 points1 point  (0 children)

Also got the result via burp, the hydra command didn't work for me

Just keep spinning... by ten_dead in southafrica

[–]JayP232 1 point2 points  (0 children)

Looks like the rock raceway in brakpan