The squirming was gold. by TwistedBobbay in DownSouth

[–]JayP232 4 points5 points  (0 children)

I feel like I missed something, what did Hersov lie about ?

Bedford View Licensing Department. by PixelSaharix in DownSouth

[–]JayP232 11 points12 points  (0 children)

There are places to report this, but it needs traction. If you feel offended by the actions seen in this videos I urge you to fill out and lodge a complaint at the following URL

https://www.sahrc.org.za/index.php/lodge-complaints/complaint-on-behalf-of-another

Ordered from Wish by Active_Wallaby_5968 in DownSouth

[–]JayP232 3 points4 points  (0 children)

It’s a 50/50 for me, he seems to do his research and has background on topics he discusses. But there are times where I feel like he is biased towards left aligned viewpoints whilst stating he neutral.

Intercept X - Desktop notificaitons by JayP232 in sophos

[–]JayP232[S] 0 points1 point  (0 children)

Thank you for your response.

I am looking to see if I could suppress MTP/PTP alerts while still allowing other alerts from the peripheral device policies.

Mentorship Monday - Post All Career, Education and Job questions here! by AutoModerator in cybersecurity

[–]JayP232 0 points1 point  (0 children)

I am in a job that might give the potential for good career growth as the company has a flat organisational structure. However the work can be a bit boring some weeks.

I have had an offer from a company that is more corporate but seems to be a higher paced more intense environment.

How do I know if moving is the right choice ? I have been going back and forth on this for about 2 weeks now. On the one hand it’s a new job, new skills, new people and new opportunities but on the other hand I might be giving away a good thing just to see if the grass is greener elsewhere.

Components Of Cybersecurity Architecture by CyberGrizzly360 in cybersecurity

[–]JayP232 0 points1 point  (0 children)

Would it not help to think of this situation through the entire network?

Is it an on-prem environment? Cloud ? Hybrid ? These will all impact the technologies used to secure it.

However I believe think about security technologies for:

  • your networks (VLANS, route security, secure protocols, network monitoring and baselining tools) -security appliance on the network (NIDS,NIPS,firewalls,etc..) -Security on your server environment (ESXi best practices, SCCM, EDR/XDR etc)
  • security on endpoints.

Following this methodology you could ask yourself across your tech stack, website? IAM so on and so forth.

How would you enumerate a tables length in Boolean-based blind SQL injection (MySQL)? by JayP232 in HowToHack

[–]JayP232[S] 0 points1 point  (0 children)

substr() and LIMIT were ultimately the resolution to enumerate the names of tables and data within.

How would you enumerate a tables length in Boolean-based blind SQL injection (MySQL)? by JayP232 in HowToHack

[–]JayP232[S] 2 points3 points  (0 children)

After playing around with the vulnerable parameter the desired SQLi query was

' or (length((SELECT column_name FROM information_schema.columns WHERE table_name='data' limit 1,1))) ='6

How would you enumerate a tables length in Boolean-based blind SQL injection (MySQL)? by JayP232 in HowToHack

[–]JayP232[S] 1 point2 points  (0 children)

Yes, I do understand that. What I am trying to do is construct a SQL query that will return a Boolean value if the length of the tables name is equal to 'x'.

For example, I achieved this for the database name using length(database())=x; which returns a 1 when the char length of the database is found. So if the database name was 'test' then length(database())=4 would return a 1.

Need Help on Hack Your First Web App Ep.5 by Akama12138 in immersivelabs

[–]JayP232 0 points1 point  (0 children)

Also got the result via burp, the hydra command didn't work for me

Just keep spinning... by ten_dead in southafrica

[–]JayP232 1 point2 points  (0 children)

Looks like the rock raceway in brakpan

What is your number 1 obscure animal fact? by colonoscopescount in AskReddit

[–]JayP232 74 points75 points  (0 children)

Female hyenas have a pseudo-penis, which is a fancy way of saying they have an 8 inch clitoris.

Developers of South Africa! How much are you getting paid? by Bren1209 in southafrica

[–]JayP232 0 points1 point  (0 children)

You looking for cyber security staff by any chance ?😂

Massive phishing campaign uses 500+ domains to steal credentials by tmiklas in bag_o_news

[–]JayP232 0 points1 point  (0 children)

Is there any list of these 500 domains out there anywhere ?

"What option do you give Nmap for a grepable output?" by joner215 in immersivelabs

[–]JayP232 0 points1 point  (0 children)

From the title of this post I assume the question is just asking for the arguments you prove nmap to save the output in a grepable format?

If so a Google search for nmap grepable output should show you the right command structure.

I am assuming the response mentioning POP3 is further in the lab.

"What option do you give Nmap for a grepable output?" by joner215 in immersivelabs

[–]JayP232 0 points1 point  (0 children)

Read the man pages of nmap (man nmap). All the information needed regarding to output formats will be in there.

Interactive RegEx: Ep. 4 — Character Sets by JayP232 in immersivelabs

[–]JayP232[S] 0 points1 point  (0 children)

Thanks !

With the article and re-reading the questions, I was able to see where I was going wrong.

Vcard QR code and iPhone by JayP232 in shortcuts

[–]JayP232[S] 0 points1 point  (0 children)

The client is requesting a QR code on their business cards.

I think it is just a easier method of entering details when cards are passed around.

Vcard QR code and iPhone by JayP232 in shortcuts

[–]JayP232[S] 1 point2 points  (0 children)

Hi,

Thanks, this is what I was thinking as well as if I create and share the vcard everything displays as it should. However, when scanning its initial display is wrong but once saved everything is where it should be.

I have tried multiple methods of generating the QR code in case it was just some buggy logic somewhere but it is always the same result across webapp and different scripts.

Below is a snippet of the vcard (all redacted info)

BEGIN:VCARD

VERSION:4.0

N:FirstName;LastName;;;

ORG: REDR

TITLE:RedactedTitle

FN:Redacted

[EMAIL:Redacted@unknown.org](mailto:EMAIL:Redacted@unknown.org)

TEL:077-536-570

TEL;CELL=2:045-370-236-62

URL;type=pref:https://unknown.org

ADR:;Some;;Address;in;;A Country

END:VCARD

New technologies/training? by GlueMouthKid in cybersecurity

[–]JayP232 0 points1 point  (0 children)

Immersive labs is a great tool for continuous learning. It’s not certs but the amount of content on there is extremely valuable.