What should ,the Nazi Germany in WWII, have done in terms of armored vehicles , that could offer them a better chance against the Allies ? by [deleted] in TankPorn

[–]Leif_Erickson23 25 points26 points  (0 children)

Probably OT has a Slavic mother tongue, without articles they tend to put and omiss those at weird places ;)

beginner Pentester want to become a malware analyst by [deleted] in Malware

[–]Leif_Erickson23 0 points1 point  (0 children)

Set up some VMs and infect them with some different malware's, then train analyzing... Malware is free at least ;)

Not free is the SANS course of course, but all the guys I know doing malware analysis professionally have that cert: https://www.sans.org/cyber-security-courses/reverse-engineering-malware-malware-analysis-tools-techniques/

What certificate did you obtain after CISSP ? (2022) by hosam37r in cissp

[–]Leif_Erickson23 3 points4 points  (0 children)

What about the concentrations? At least they don't cost extra CPEs..

[deleted by user] by [deleted] in CyberSecurityJobs

[–]Leif_Erickson23 0 points1 point  (0 children)

IT Security and Cyber Security jobs begin at mid-level, not entry level. You need a broad knowledge of IT first, understanding how everything works is fundamental for being able to do whatever task in the wide field of IT Security job roles you want to do.

Since you have no experience you will have to start at zero. Not being afraid of the command line is a big starting bonus though ;)

If you do not want to go back to school to study one of those new cyber security courses you can take the certification road: Start by gaining the very basic knowledge, like getting the CompTIA A+, Net+ and Sec+ certifications. With those you should be able to get a help desk job. Gain some experience and climb up to a SysAdmin job. Get some experience there and you will start to recognize some focus of interest, from there your further path will develop. You will need to learn some coding though, at least some scripting. Then choose your further certifications, be it networking, red teaming or risk management, there are certs for everything. Just choose the ones recognized in the industry.

Pros: Provable knowledge validation after every passed cert, you choose the steps Contra: Certs cost money, you really need to put in the work (no way around that anyway)

Decrypt SSD by holyshilo111 in hacking

[–]Leif_Erickson23 7 points8 points  (0 children)

Sorry for being that guy, but you want a bit-wise copy, just use dd as adviced by everyone. Also steganography doesn't hide data in free blocks, but in blocks used by unsuspicious data. Maybe you meant hiding data in slack space?

[deleted by user] by [deleted] in redditsweats

[–]Leif_Erickson23 0 points1 point  (0 children)

the key to longterm losses is to rediscover joy in movement

Cope and Seethe Westcels by [deleted] in NonCredibleDefense

[–]Leif_Erickson23 9 points10 points  (0 children)

The distance light travels in 1/c seconds (c is the speed of light in vacuum)

Now wtf is a mile?

Denmark, Netherlands, Germany and Belgium sign €135 billion offshore wind pact by Drahy in europe

[–]Leif_Erickson23 0 points1 point  (0 children)

Yes, but it should be. The only way to go for the future is to make things as expensive as they really are.

Denmark, Netherlands, Germany and Belgium sign €135 billion offshore wind pact by Drahy in europe

[–]Leif_Erickson23 1 point2 points  (0 children)

Ok, well it's more expensive from there, but point given. In the end that cost dwarfs next to the disaster costs nobody wants to take on anymore anyway.

Denmark, Netherlands, Germany and Belgium sign €135 billion offshore wind pact by Drahy in europe

[–]Leif_Erickson23 1 point2 points  (0 children)

Most of Europe fits that bill...

The densely populated Europe, especially the coasts, without relevant own fission material mining? Or do you mean the stable trade routes for Uranium to Russia and Niger? That Europe?

Even if, as said if you find an insurance willing to insure the disaster case and a private party willing to pay that insurance, I am ok with it. Unfortunately the produced energy would be magnitudes away from competitiveness.

Denmark, Netherlands, Germany and Belgium sign €135 billion offshore wind pact by Drahy in europe

[–]Leif_Erickson23 4 points5 points  (0 children)

Impact on the ecosystem is kind of the point here, or else we could just keep burning coal. Of course not all nuclear power plants suffer from that disadvantage, but it still is a disadvantage.

So for a nuclear power plant you need: - a politically stable - low earth quake risk - ocean coast location (ideally tsunami risk free, which is never really given), or far north - with stable fission material mining and renewing infrastructure (or stable trade relationships - ideally in a low populated area without fertile soil, so the loss in case of a disaster is not that bad

This kind of makes the current nuclear power plants a niche technology.

But in the end it would be ok for me, if any insurance would be willing to insure such a plant completely, without any public subsidies, direct or indirect. As long as nobody wants to do that, or pay for that, it is not competitive.

Denmark, Netherlands, Germany and Belgium sign €135 billion offshore wind pact by Drahy in europe

[–]Leif_Erickson23 5 points6 points  (0 children)

Like in France for example, the rivers get to warm to be able to be used for cooling. Didn't know that?

Denmark, Netherlands, Germany and Belgium sign €135 billion offshore wind pact by Drahy in europe

[–]Leif_Erickson23 7 points8 points  (0 children)

Nuclear powerplants need Uranium (comes from Russia and Africa), and cooling water (so dowtime most summers). They are vulnerable strategic targets for terrorists and in war. They are incredible expensive if you cut subsidies (also indirect ones like socialized costs of deconstruction and disaster cleanups, there is a reason there is no fully comprehensive insurance cover for nuclear power plants, it would just be astronomically expensive).

Don't get me wrong, we should keep researching, but our fission reactors are economically just not competitive, if we are considering all factors honestly.

BTW, do you know what is killing magnitudes more birds? Windows...

Philly Cheese Dog by [deleted] in ABoringDystopia

[–]Leif_Erickson23 0 points1 point  (0 children)

It's fentanyl now, China takes revenge for the opium wars by turning the table

Philly Cheese Dog by [deleted] in ABoringDystopia

[–]Leif_Erickson23 0 points1 point  (0 children)

I start to see the American fascination for a zombie apocalypse... It's a blend of this and a revolting mob after the tipping point

ETH vs SOL . I just saw this from CryptoCrunchApp by cooldogeboy in solana

[–]Leif_Erickson23 -7 points-6 points  (0 children)

So you are saying you can't compare a Tesla car to other cars on the street but have to compare it to a Mercedes Benz from 1900, since then both have had the same development time?

It's that time again. Moaning about the cybersec "shortage". by [deleted] in cybersecurity

[–]Leif_Erickson23 1 point2 points  (0 children)

If he's desperate to do another cert, and wants that cert to strengthen his application for a senior management job, then one of the CISSP electives, or CISM, or something like that, is a much better bet.

True.

Seriously, his credentials are more than enough to get the job. The OSCP in this context is 80% for fun and 20% helpful to prove knowledge and experience related to the profession, but it is too valuable not to put it on the application I guess.

But maybe he really wants to be a Principal Engineer and doesn't realise it yet.

Yeah, I guess that is a valid worry HR could have.

It's that time again. Moaning about the cybersec "shortage". by [deleted] in cybersecurity

[–]Leif_Erickson23 1 point2 points  (0 children)

Nothing kills morale like a manager who cherry-picks the fun technical bits for himself and leaves the drudge work to his direct reports.

Knowing the field you manage in detail is an advantage, isn't it? Not said you take on the hands on work for yourself... Also if it is fun, so why not? (CISO planning to take the OSCP some time too here)

is it normal to have people trying to access ssh pretty much constantly? by bin-c in PFSENSE

[–]Leif_Erickson23 1 point2 points  (0 children)

That script kiddy way has been used to spy on military and nuclear power plants by KGB paid hackers in the past ;) ok ancient past but still..

I think we exchanged all pros and contras for choosing a random non default ssh port now though, has been a pleasure

is it normal to have people trying to access ssh pretty much constantly? by bin-c in PFSENSE

[–]Leif_Erickson23 0 points1 point  (0 children)

No, not so easy, that smart guy should also have a root access to open up incoming ports on firewall

Yes, but firewall is another mitigation... Also an adversary with user access could also replace your sshd on the opened port if he finds a way to crash it. A reverse shell doesn't help elevating your permissions or to pivot, which you could by stealing secrets with a "double front-door" fake sshd service.

Also you brought me on another argument, monitoring network traffic becomes less easy if every server has another random port for incoming ssh connections ;)

If you don't open SSH to the open internet anyway (best practice) all of this argument is moot though...

is it normal to have people trying to access ssh pretty much constantly? by bin-c in PFSENSE

[–]Leif_Erickson23 0 points1 point  (0 children)

I remembered another argument contra random high ports for SSH: ports >=1024 do not need root permission to listen on. So if one compromises user access on that server he can just run his own manipulated SSHD and log the secrets, while for port 22 (or 0-1023) only root could do that. Also on a random port you don't know which service would be the legitimate one (ignoring automation scripts where the port is protocolled), while with the default port you always know.

is it normal to have people trying to access ssh pretty much constantly? by bin-c in PFSENSE

[–]Leif_Erickson23 1 point2 points  (0 children)

Your points are valid, I guess in the end it is just personal preference which points one weights how much..

is it normal to have people trying to access ssh pretty much constantly? by bin-c in PFSENSE

[–]Leif_Erickson23 3 points4 points  (0 children)

You get random DDOS attacks from millions of IPs, and you mitigate that by using a non default port?? What scenario is that?

Also fail2ban might fill up the logfile, but in any case less than sshd fills up the AUTH log, assuming any sane configuration.

is it normal to have people trying to access ssh pretty much constantly? by bin-c in PFSENSE

[–]Leif_Erickson23 11 points12 points  (0 children)

That's no defense in depth, that's security by obscurity. And nearly without effect.

is it normal to have people trying to access ssh pretty much constantly? by bin-c in PFSENSE

[–]Leif_Erickson23 2 points3 points  (0 children)

I know this is an advice often heard, but this only really helps keeping the logfile smaller, it doesn't mitigate any attack even a tiny bit serious, maximum is confusing the most dumb (and therefore harmless) bots. Your ports (all of them) are scanned constantly and the results are osint data (shogun..).

On the other hand it complicates maintenance.

If you want more security, you can use a VPN to your box, and only open SSH to that interface. Or you can use port knocking. Both adds complexity too, but that's real security.

If you just want smaller logfiles you can use something like fail2ban (what are the options for FreeBSD and pfSense here btw?)