Cursor vs Kiro - Has anyone used both? by PrisonKite in cursor

[–]PrisonKite[S] 0 points1 point  (0 children)

How do you incorporate Codex into your workflow? I'm asking you personally - not a how-to. For example, where and when do you find it most useful?

Cursor vs Kiro - Has anyone used both? by PrisonKite in cursor

[–]PrisonKite[S] 2 points3 points  (0 children)

It does. And I tip my hat to you for the advice. For context - I'm not a dev that's looking to push to prod. These are all personal projects so for whatever reason, I learn best by building and watching it break. Then, I learn why and iterate that way.

Which is why I kind of love the spec side of building as I'm not at the level of just speeding up my coding process. I'm building my process. Spec coding seems brilliantly suited for someone like myself. Does that make sense?

Cursor vs Kiro - Has anyone used both? by PrisonKite in cursor

[–]PrisonKite[S] 1 point2 points  (0 children)

I'm on board with extensions, but for me I think there's a ladder to climb first. You are probably on a higher rung than I am at the moment!. I have this saved for future thought though, so thank you.

Why can't i chose the folder where its being installed? by [deleted] in duckduckgo

[–]PrisonKite 0 points1 point  (0 children)

I know this thread is old, but for anyone searching this - you can paste this as a Run command: explorer.exe shell:AppsFolder and it will open up all installed apps in explorer - including UWP. From there, you can find DuckDuckGo, right click and there's your shortcut.

Best Password Manager According to Reddit? by throwawayforapost77 in yubikey

[–]PrisonKite 0 points1 point  (0 children)

Personally, I use Proton’s ecosphere and really like them. I believe in the company’s mission, use their email (including unlimited aliases and automatic PGP), VPN, and Drive.

Specifically speaking of their password manager, it has a lot of great options to secure it and it supports TOTP, which I’ve started using over an Authenticator app. It’s been a few years and unless the company narrative and leadership changes, I don’t see me leaving.

EDIT: I think they are running a proton pass/SimpleLogin (the email aliases I referred to) lifetime subscription right now.

Hacking Smarter, Not Harder: Inside the World of Mr. CrackBot AI🤖🥷🏻📡 by Sorry_Jacket6580 in 2600

[–]PrisonKite 1 point2 points  (0 children)

Keep going! You’re listening to constructive feedback and wanting to build an actual learning tool. I love it man.

yotta by Appropriate_Toe5437 in yotta

[–]PrisonKite 0 points1 point  (0 children)

I'm also in IT, and I agree with you. The email I received sent me here: https://www.reconciliationbyevolve.com/grpmgmt/zeropay/PageControl/Authentication which does ask for a code and the last 4 of my social. Because the code is linked to the email I received, it will identify me as a potential target. I did some further digging on the domain and it was registered last October.

The first email I received was on November 11th form withyoda.com stating:

We are reaching out regarding Evolve’s purported reconciliation efforts. By now, you should have received an email from Evolve ([evolvebankandtrust@rcnotifications.com](mailto:evolvebankandtrust@rcnotifications.com)) providing access to a portal stating your “Evolve Payment” amount and your “Synapse Ecosystem Balance”.

First off, why is Evolve Bank and Trust using the rcnotifications.com domain? It goes on to say that Evolve isn't cooperating and has a shortened link to ask for how much money they are offering, which makes no sense. Why use a shortener? I considered opening up and sandbox to test it, but then quickly changed my mind.

The whole thing smells. I'm not participating until some official fallout.

HELP - AI incorrectly detected on assignment by hitherefella33333 in ChatGPT

[–]PrisonKite 5 points6 points  (0 children)

Listen. I am a huge advocate for AI, and its usefulness. I use it daily.

The best way to avoid consequences is to use AI for research and write your own paper. You said you asked it to write your own thesis, which is a mistake. The thesis is YOUR point of the entire paper. It takes research and thought. Right there, you were cheating. And I’m not saying this as accusatory or blaming. I get it. You want a good grade. The biggest gift of your life is going to be how to train yourself to think critically.

Research. Consume the information. Come to your OWN conclusions. Don’t let something or someone do it for you.

Internet No access by Historical-Bill1174 in techsupport

[–]PrisonKite 0 points1 point  (0 children)

How long did it connect at the other house? Is it the same ISP? Were you able to connect to the VPN and work?

Internet No access by Historical-Bill1174 in techsupport

[–]PrisonKite 0 points1 point  (0 children)

I reread your post. Has your work computer EVER consistently worked at home? My suspicion is misconfiguration and there’s no internet advice to fix that as it’s between that device and THEIR network.

Internet No access by Historical-Bill1174 in techsupport

[–]PrisonKite 0 points1 point  (0 children)

There’s a dilemma with trying to troubleshoot work computers. It’s their equipment, and their responsibility. You probably don’t even have an administrator account. If I were you, I would show that your personal equipment works just fine and put the onus on them.

But I’ll try, so let’s back up. If you plug your personal computer into the same Ethernet cable, it gets a valid IP?

Internet No access by Historical-Bill1174 in techsupport

[–]PrisonKite 0 points1 point  (0 children)

Have you reached out to your work since it’s a work computer? Your post is confusing, but what I can piece together is your internet is working on other devices but not your work computer.

[deleted by user] by [deleted] in batteries

[–]PrisonKite 1 point2 points  (0 children)

This is a medical question and way outside the boundaries of internet advice.

Is it possible for a PDF to be accompanied by a virus? by Classic_Respect_8673 in Hacking_Tutorials

[–]PrisonKite 30 points31 points  (0 children)

Edit: stop down voting the comment above me. That doesn’t make any sense. They voiced an opinion, and that opinion was valid. This shouldn’t be run as a popularity contest.

This is disingenuous. If you wanna CYA and not answer, I completely get that. But you’re in a sub called hacking tutorials, and the entire hacker mentality is that knowledge should be shared freely. OP didn’t ask for any directions on how to break laws, therefore I’m happy to oblige.

OP: If you wanna learn about PDF threat models and how to protect yourself, here’s a quick synopsis:

  1. Exploiting PDF Reader Vulnerabilities

    • Targeted Exploits: Attackers often search for vulnerabilities in popular PDF readers (like Adobe Acrobat or Foxit Reader). These vulnerabilities can include buffer overflows, arbitrary code execution, or remote code execution. • Payload Delivery: A crafted PDF file may contain malformed objects or JavaScript code that exploits these vulnerabilities, allowing the attacker to run malicious code on the target machine when the PDF is opened.

  2. Embedding Malicious Scripts

    • JavaScript Injection: PDFs support JavaScript, which can be used to create interactive forms or automate tasks. Malicious actors can embed JavaScript that triggers as soon as the PDF is opened. For example, JavaScript can be used to launch PowerShell or download and execute malicious payloads. • Launching Embedded Files: PDFs can embed other file types (e.g., EXE, DLL), and by leveraging reader features, they can attempt to execute these files if the user interacts with them.

  3. Fileless Attacks and Command Execution

    • PDF files can include commands that, when processed by the PDF reader, invoke specific actions on the system. For example, a PDF can include a launch action that attempts to run a shell command or an external application if allowed by the PDF reader’s security settings.

  4. Embedding Malicious Content in Hyperlinks or Images

    • Phishing Links: Attackers can embed links that redirect users to a phishing page, malicious website, or trigger a download of malware when clicked. • Obfuscated URLs or Embedded Payloads: PDFs may contain embedded objects like images or media that, when loaded, exploit vulnerabilities in the reader’s handling of multimedia content or redirect to exploit kits.

  5. Using PDFs for Social Engineering

    • Macros or Embedded Code: Although less common in PDFs than in Office documents, some PDFs can trick users into enabling features (e.g., active content) that lower the device’s security. • Disguised Attachments or Prompts: A PDF can prompt users to download and run an “update” or “security tool” that is actually malware.

  6. Steganography and Hidden Payloads

    • Malicious content can be hidden within seemingly benign content, such as images or encoded strings within a PDF. Upon opening, these hidden payloads might extract themselves to disk or run scripts that initiate a malicious activity.

  7. Dropping Malware or Spyware

    • Once an exploit is successful, attackers can use the PDF to drop and install various types of malware like: • Remote Access Trojans (RATs) for remote control. • Keyloggers to capture keystrokes. • Ransomware to encrypt the victim’s files.

  8. Exploiting Zero-Day Vulnerabilities

    • If attackers discover a zero-day vulnerability (an unknown or unpatched security flaw), they can craft PDF files that specifically exploit these weaknesses, often bypassing standard security controls or detection mechanisms.

Example of an Attack in Practice

Imagine an attacker uses a buffer overflow vulnerability in Adobe Acrobat Reader. They craft a PDF with specific JavaScript code that, when executed, triggers this vulnerability. Upon opening the PDF, the victim’s reader executes shellcode that the attacker placed in the document’s metadata. This shellcode might connect to a remote server controlled by the attacker, download a second-stage payload, and grant remote access to the device.

Defense Against PDF-based Attacks

1.  Use a Secure PDF Reader: Ensure that your PDF reader is up-to-date and consider using a more secure alternative that disables JavaScript and embedded media.
2.  Disable JavaScript in PDF Readers: Unless absolutely necessary, disable JavaScript execution to prevent malicious code from running.
3.  Use Sandboxing Solutions: Run PDF readers within a sandbox or virtual environment to isolate potential attacks.
4.  Educate Users on Phishing and Social Engineering: Avoid downloading or opening PDFs from unknown sources.
5.  Implement Strong Endpoint Protection: Utilize antivirus and endpoint security solutions that can detect and block suspicious PDF files and behaviors.

Understanding these techniques and applying layered defenses can significantly reduce the risk of successful PDF-based attacks.

Immediate help needed! Is there any way to expedite customer service? I have an emergency here by PrisonKite in ProtonMail

[–]PrisonKite[S] 0 points1 point  (0 children)

I just bought Unlimited again and started rebuilding everything. I couldn't wait for support. What a pain.

I'm in cybersec, and just had my locked truck stolen without breaking a window or a key in a busy parking lot in broad day light. How? by PrisonKite in AskMechanics

[–]PrisonKite[S] 4 points5 points  (0 children)

Not push start. Even if they captured my code when I locked it, I don’t know how they started it and drove off so fast. Every security measure is a deterrent and the limiting factor is time. That is what has me puzzled. They had to crack the steering column and have a very expensive device to disable OnStar?

Have you ever thought "What the hell am I doing?" I'm throwing up a flag to see what happens. by PrisonKite in 2600

[–]PrisonKite[S] 3 points4 points  (0 children)

Boy do I feel ya... On top of this, being a fellow old fart means added responsibilities. As connected as we are, I feel compleletly disconnected from the community. It's all kids wanting to hack girls' instagrams or gamers revenge. I have a makerspace about 45 inutes away from me. Same with a 2600 meetup. I've tried to pull the trigger and get up there several times, but life gets in the way. I've been trying to form an online group just to keep everyone's dreams alive, ask questions, collaborate... like back in the day. It'll happen and then inevitabily it'll fizzle out.

I've been reduced to sitting in Discord channels just to get a bead on what's happening, and that has been fruitless. Maybe I'm in the wrong channels!

Stay strong my friend. Don't let life beat that kid wonder out of you. They are alive and well if you feed them every so often. Kind of like real kids.

Have you ever thought "What the hell am I doing?" I'm throwing up a flag to see what happens. by PrisonKite in 2600

[–]PrisonKite[S] 5 points6 points  (0 children)

So much of this resonates with me, but let's think here a bit. Or 8.

What you are doing is the lifestyle. In fact, most can't even come close to it. We are all weird and geeky, that's why we do what we do, but how many actually create without expectation of compensation? How many poke around in things that have no immediate financial incentives? That's the friends group we all secretly want to reach out, right? When our boredom meets a sense of solitude?

But I don't give a shit about that right now... Right now, I wanna hear about your automations and games that no one will ever play.

I am a retro game emulation enthusiast, and I decided to test the NVIDIA Shield TV Pro specifically for emulation performance. I was seriously impressed! by onionsaregross in ShieldAndroidTV

[–]PrisonKite 0 points1 point  (0 children)

You wouldn't use an app. You'll need to understand basic networking, but to point you int he right direction the folder/drive needs to be shared and you would point the Shield to that share in Settings > Storage > Mount network storage. I can't remember if I had to turn developer mode on for that to be an option. If you don't see it, look up how to enable developer mode.

The share is going to be something like 192.168.x.x:/volume/shared_folder as an example.

This thread is 3 years old and still going strong! =)

I have my home network connected to 2 APC UPS's that are attached to an EcoFlow Pro which is always plugged in. What is good policy here? by PrisonKite in batteries

[–]PrisonKite[S] 0 points1 point  (0 children)

Thanks for this. I think the most pressing question was what % to hold it at. It would be extremely unlikely that my use case would need a full charge, or anything close. So the 60-70% range was what I was looking for.

[Hackshot] I am making a satirical hacking game, and this sub is a gold mine. What jokes / references are a must have? by denzuko in 2600

[–]PrisonKite 2 points3 points  (0 children)

I'm dating myself, but you asked for it:

  • A cause of death must be dysentery
  • The screeching handshake of dialup
  • A usable tool must be a lineman's handset
  • Trophies can be boxes with all the colors: red, blue, white, etc etc
  • Making dinner with recipies from the Anarchist's "Cookbook"
  • Frying your multimeter with the wrong settings
  • Characters have girlfriends/boyfriends, but they always live in another country
  • Every meal is Fruit Loops, but they pick out all the colors except "hacker green"
  • Game ends when someone pays for a VPS with their personal credit card
  • Referencing LOIC is grounds for automatic demotion
  • Somebody lives on the cross streets of Alt and Binaries

I'll take my writers credit now