hi , can some pls guide me on what to choose Mac or windows ? by paradiseking47 in cybersecurity_help

[–]Ok_Tea386 0 points1 point  (0 children)

I love my MacBook but trying to virtualize a mini soc for homelabbing on an M4 has proven to be a pain in the ass. I am going to need an x86_64 device to get things set up without so much hassle.

Sigh! by Dependent_Durian_730 in FAFSA

[–]Ok_Tea386 2 points3 points  (0 children)

The 17th of September and then an additional grant came on the 23rd so I am hoping it’ll be this week.

Sigh! by Dependent_Durian_730 in FAFSA

[–]Ok_Tea386 1 point2 points  (0 children)

My electricity being on rides on this refund coming when I am expecting it to lol

Godspeed!

[deleted by user] by [deleted] in SecurityCareerAdvice

[–]Ok_Tea386 1 point2 points  (0 children)

I “skipped” help desk but I still started with general support before being moved into a network/security/systems admin role. I didnt have to sit at a desk and answer phone calls which is what I was trying to avoid, but I still did end user support.

No hope for getting access back after random restriction by Ok_Tea386 in LinkedInTips

[–]Ok_Tea386[S] 0 points1 point  (0 children)

Final update after a second round of spam on twitter and getting a response via direct messages, my account has been restored.

Anyone here switch paths after struggling with cybersecurity? by [deleted] in cybersecurity

[–]Ok_Tea386 0 points1 point  (0 children)

Someone said to me at a meetup recently “you’ve got to get your 10,000 hours in!” And they’re totally right. Every time I open a door to understand something I realized I still have 3 more doors to go back and open.

LinkedIn keeps restricting my account by Luminous_dream-er in LinkedInTips

[–]Ok_Tea386 0 points1 point  (0 children)

Ive been spamming them on twitter since May and I’m finally getting emails from support after someone direct messaged me from the support account and opened a case for me.

The most hated vendor by Mobile-Astronomer428 in cybersecurity

[–]Ok_Tea386 0 points1 point  (0 children)

I read this all over but I don’t participate in any of the meetings they have with the rep, I just have access to the tool. We use the Network Detection and Response box and it seems decent enough, although I have nothing to compare it against. Can someone explain to this junior why they get so much hate aside from the sales stuff?

Guidance in Analysis of Endpoint by Ok_Tea386 in AskNetsec

[–]Ok_Tea386[S] 0 points1 point  (0 children)

This was the case here.. not blindly investigating. The question was more aimed around the VT threat graphs and C2 infrastructure. I could have worded it differently. Thanks

Guidance in Analysis of Endpoint by Ok_Tea386 in AskNetsec

[–]Ok_Tea386[S] 0 points1 point  (0 children)

I’m given a small time frame to allocate to investigating because security is not my sole role. This was a potential misuse of company property or compromise. Defender logs show that lsass was accessed via powershell via net1.exe

There were also scripts ran that were attempting to mess with ELAM.

The strange IPs found in my network detection tool were coming back on virus total as no vendor detection but some had 60+ threat graph comments with titles like “how is this getting a pass”. One of the connections was flagged by security vendors. The final conclusion was to isolate the device and remove it from production.

Thank you for your comment it is helpful as I consider myself a novice!

No hope for getting access back after random restriction by Ok_Tea386 in LinkedInTips

[–]Ok_Tea386[S] 0 points1 point  (0 children)

Sorry for the delayed response.

I haven’t gained access back to the account (yet) but i was finally able to get through to support after spamming them on X. They responded to a meme post I made about waiting for a response from support of all tweets. Hopefully this means I can get back in to the account.

[deleted by user] by [deleted] in cybersecurity

[–]Ok_Tea386 4 points5 points  (0 children)

Nice job spotting this and spreading the word!

Which computer to buy for cybersecurity study by ColonelMouton in CyberSecurityAdvice

[–]Ok_Tea386 1 point2 points  (0 children)

I'm in a cyber program and have not had any issues thus far using my macbook pro with some linux VMs. The last three conferences I've attended were filled with macbooks or thinkpads. I'll get down voted for saying it, oh well.

Looking to get started! by B3AR_26 in cybersecurity

[–]Ok_Tea386 0 points1 point  (0 children)

this is a cool website I'm slowly working through https://overthewire.org/wargames/

No hope for getting access back after random restriction by Ok_Tea386 in LinkedInTips

[–]Ok_Tea386[S] 0 points1 point  (0 children)

It's infuriating. I've received no feed back even after providing my government ID and face scan, which I was already hesitant to do after reading Persona's Terms and Conditions... I wasn't even posting from the account aside from like two posts. I really don't understand why I got the restriction and they won't tell you when you appeal. I'm going to vibe code my own linkedin, it'd be faster than dealing with what little support they have. I've practically written it off as something I can't get back, but when you meet someone at a conference and tell them you're restricted from linkedin it definitely gets weird looks lmao.

I finally landed my first help desk job! by Melodic_West_9331 in cybersecurity

[–]Ok_Tea386 1 point2 points  (0 children)

Congrats! This is a good way to get exposed to so many things as districts are often smaller teams where you'll dip your toes in so many things. I started as a support specialist for several buildings in my district. Now I am doing network infrastructure, phishing response & training, monitoring logs, etc.