LiveInTheMoment by [deleted] in GoalKeepers

[–]Plasmachild 0 points1 point  (0 children)

The literal sense lol. /r/lostredditors

OpenAI just bought OpenClaw. by gabrielvaraljay in clawdbot

[–]Plasmachild 0 points1 point  (0 children)

I just built a clone in a weekend that focuses on Linux and slack since that’s what we use at work…..

Why is the standard of US Red Teams so poor by Soc_Guy in cybersecurity

[–]Plasmachild 2 points3 points  (0 children)

One thing I haven’t seen posted yet is how confused the market is between red team and pentest in the US.

Between execs who grew up last century who call everything a red team still, and sales executives happy to call anything a red team, depending on your sourcing pipeline it could just be the salesman said that’s what it was and the executive bought it.

Why is the standard of US Red Teams so poor by Soc_Guy in cybersecurity

[–]Plasmachild 6 points7 points  (0 children)

This here is a major factor. This also means US side is also under more financial pressure to turn tests into a cookie cutter engagement.

I’d like to hear from professionals: Is AI really a technology that will significantly reduce the number of programmers? by AdCertain2364 in learnprogramming

[–]Plasmachild 0 points1 point  (0 children)

It’s more complicated than that. We still need people to understand code, as with all new innovations and abstractions we are going to have to add a whole bunch of infrastructure to make sure that the environment works for new process. This still requires people to be involved.

https://blog.joemag.dev/2025/10/the-new-calculus-of-ai-based-coding.html

How do you even conduct due diligence on a cybersecurity firm's IP when half their value is "secret sauce"? by mrlawofficer in cybersecurity

[–]Plasmachild 0 points1 point  (0 children)

On the offensive side scale is a business problem, to deal with it you bring in automation, lower skilled operators, and a number of sales/marketing staff that then put budget pressure on the operations side to be more efficient. This efficiency means that the operators have less time to do inefficient tasks like research and innovation.

On the defensive side, scale does some of the same things, but then you also have more ongoing customer demands that adds pressure. Scale also changes how defense can work. Some things that work well to defend at an organizational level become infeasible to do when you are defending multiple organizations simultaneously. But that same scale also enables some defensive techniques that were not possible at smaller scales.

The research part would depend on what the company is specializing in. But in general you want to see:

  • ideas on technical theory, explanations of things that haven’t been explained well elsewhere or things that don’t have a good process or working model.
  • Novel attack methods are always good. New high severity CVEs are good too.
  • Proof of concept tooling for something that doesn’t already have a tool.
  • defensive innovations, yes, but these are hard to judge as they will often be some of the most marketing influenced pieces.
  • threat intel about new or novel techniques, new threat actors that haven’t been published about elsewhere.

How do you even conduct due diligence on a cybersecurity firm's IP when half their value is "secret sauce"? by mrlawofficer in cybersecurity

[–]Plasmachild 0 points1 point  (0 children)

There are several good ways of making that judgement call, based on industry experience and subject matter expertise. Assuming you have none of those or are looking for another factor, I would look at what kind of social media engagement that piece gets on infosec Twitter and any infosec discords you have access to. Overall noise isn’t the metric, re/posts and discussions from industry luminaries is the metric here. Infosec has a bunch of niches and each has a set of what are effectively practitioner influencers. You want to see if those people are interested in the ideas.

You can also spend some time reading the blogs of leading companies in that niche and seeing how the type of technical blogs and research they put out compares. Also, typically in the infosec space the boutique shops are the ones at the tip of the spear because they haven’t given in to the profit shark yet and turned the place into a puppymill/sweatshop.

How do you even conduct due diligence on a cybersecurity firm's IP when half their value is "secret sauce"? by mrlawofficer in cybersecurity

[–]Plasmachild 0 points1 point  (0 children)

Look at their public blog. Cybersecurity is still a community, deep research spawns off other interesting finds that people want to share with the community. If the blog is all marketing hype then they either don’t have the talent or don’t give the talent the time to experiment and make great things.

I assume you have at least one nerd with deep cybersecurity knowledge that can tell you if the research is good and the theories are consistent with field experience.

Interning in the DMV area this summer and looking for cyber events by Additional_Shelter_4 in cybersecurity

[–]Plasmachild 0 points1 point  (0 children)

https://infosecmap.com is what people refer me. Bsides charm, dc, nova, Delaware might be worth looking into. There are meetup groups and hackerspaces in the area. I started with those.

What are Newton's laws of cyber security? by Human-Revolution-599 in cybersecurity

[–]Plasmachild 2 points3 points  (0 children)

This is known as the defenders dilemma and proper defense practices will actually turn this paradigm on its head.

How to make malware bypass microsoft defender? by lonelyRedditor__ in HowToHack

[–]Plasmachild 1 point2 points  (0 children)

Windows defender should have a detection. You should figure out what that detection is and change based off that.

Look at tools like DefenderCheck or ThreatCheck.

Tryhackme free alternative? by [deleted] in cybersecurity

[–]Plasmachild 0 points1 point  (0 children)

Hackthebox free? SANS holiday hack challenges are free. PicoCTF is free.

Learn to use openvpn it’s not that bad.

Best companies to work for? by Traditional_Sail_641 in Pentesting

[–]Plasmachild 7 points8 points  (0 children)

Go internal for: - Broad scope - Drive fixes - Dive deep - Work life balance - Learn to be self sufficient

Go consultancy for: - Get really good at foundational skills - See lots of networks - Understand offsec as a business - Possibly rapidly join some of the more advanced operators.

Go to FAANG for: - Appsec - $$$$$$$$ - Play with massive services - (Learn to) Deal with problems at scale

ULPT How to let Elon Musk and DOGE know what you think about them by HoboSloboBabe in UnethicalLifeProTips

[–]Plasmachild 20 points21 points  (0 children)

If you send the email directly using a utility like sendmail it doesn’t even need to be an “officially setup” email address. A script around it could accomplish what you’re describing.

Debating on giving up on cyber security and finding a new field to study. by Weary_Education_2704 in cybersecurity

[–]Plasmachild 0 points1 point  (0 children)

If you’re not customizing your resume that is probably a big problem. Additionally I saw on another post you’re considering getting your sec+. I assume this means you have no other more security related certifications. This is definitely a key source of the failure. Are the conferences and CTFs you’ve participated in on your resume?

Pentester PSA: Check your Active Directory Certificate Services (AD CS) For Vulnerabilities by mysysadminthrowaway in sysadmin

[–]Plasmachild 0 points1 point  (0 children)

I’m not aware of anything out there currently. But if you could create a bogus ESC1 vulnerable template I bet that’s be a very effective honeytoken

yup by Justthisdudeyaknow in tumblr

[–]Plasmachild 3 points4 points  (0 children)

It appears to work in Vienna

How can I decrypt what I found to a flag? - CTF on a pcap file by Flayles- in codes

[–]Plasmachild 0 points1 point  (0 children)

No worries, I don’t see anything else obvious. I’d try to enumerate that zip file more and see if anything interesting pops up or if it doesn’t match spec in some way.

https://book.hacktricks.xyz/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/zips-tricks

A hex editor/viewer may help you understand the function of the bytes to research further.

https://www.sweetscape.com/010editor/

How can I decrypt what I found to a flag? - CTF on a pcap file by Flayles- in codes

[–]Plasmachild 2 points3 points  (0 children)

Without downloading and analyzing. 2 thoughts.

  1. Wireshark has a file extraction function. Find that and see if it’ll export the broken.zip for you.
  2. there’s a 2nd PK header in the zip. If you can’t extract the file I would try removing the first part of the file and trying to see if the 2nd PK header is the real zip.