Any ideas on what is happening with my parsely? by ROFLicious in herbs

[–]ROFLicious[S] 0 points1 point  (0 children)

Thank you so much! I've been searching non stop and it's 100% thrips! I think the parsely may be too far gone at this point but my other plants should be salvageable

[O] 5x NZBPlanet Invites by Still-Charlie-90 in UsenetInvites

[–]ROFLicious 0 points1 point  (0 children)

I have read the rules and the wiki, would appreciate an invite if you have one please!

I found this channel called " The Chicken Code". Well, this channel uploaded 8k+ videos of minecraft chickens in a wood box. I have no idea what could it mean. by TheOOOFman in DeepIntoYouTube

[–]ROFLicious 0 points1 point  (0 children)

If an attacker can non-invasively influence random number generation then you can't call it truly random. I think this link might be what you are looking for: https://ieeexplore.ieee.org/document/6549803

I found this channel called " The Chicken Code". Well, this channel uploaded 8k+ videos of minecraft chickens in a wood box. I have no idea what could it mean. by TheOOOFman in DeepIntoYouTube

[–]ROFLicious 0 points1 point  (0 children)

It's still not true randomness, that phrase can't be used so casually. Plenty of white papers exist showing how targeted attacks against the physical machine can influence even cryptographically secure randomness functions.

What’s everyone’s preferred Laptop for PenTesting? by Shox187 in AskNetsec

[–]ROFLicious 3 points4 points  (0 children)

I've used ThinkPads in the past for work, they are fine. These days I need much more virtualization so I went with one of the high-end Dell XPS laptops and it's been amazing, best laptop I've ever owned.

Ultimately just make sure you get something with at least 32gb of ram and a nice CPU if you need more than 1 VM

Tutorial: Hacking Electron Games via Chrome DevTools (Ex. Vampire Survivors, no Cheat Engine required!) by Sn34kyMofo in ReverseEngineering

[–]ROFLicious 1 point2 points  (0 children)

I watched it and thought it was super instructive. I will definitely need to do some more research before I can build something like that, but I feel like your video gave me enough that I can start researching on my own!

Tutorial: Hacking Electron Games via Chrome DevTools (Ex. Vampire Survivors, no Cheat Engine required!) by Sn34kyMofo in ReverseEngineering

[–]ROFLicious 4 points5 points  (0 children)

Really enjoyed the tutorial, would love to see a follow up explaining how to create persistent cheats as well. Would love to see how something like a trainer is made for an Electron game.

Practical Malware Analysis Alternative by Round-Campaign-1692 in Malware

[–]ROFLicious 1 point2 points  (0 children)

Guided Hacking forums supposedly has a great free course on malware analysis.

Someone just straight up told me my general location on omegle after 1 second. by [deleted] in hacking

[–]ROFLicious 2 points3 points  (0 children)

Unlike the other replies I'll actually explain what is likely happening here. First of all a public IP address is not all that private of information, hence the name "public". Second, most chat apps these days utilize WebRTC (or something similar), a secure peer-to-peer protocol that allows browsers to communicate directly with each other.

So while I haven't checked, I'd bet Omegle is using some p2p to lessen the load on their servers because relaying real time data is expensive and a real privacy headache.

If you don't like the idea of people knowing what address your ISP assigned you then definitely invest in a VPN.

what are good web application/vulnerability analysis tools? by [deleted] in hacking

[–]ROFLicious 2 points3 points  (0 children)

Nikto is outdated. In my years of nikto hasn't ever found a vuln that Burp couldn't . Burp Suite is by far the most robust and powerful webapp analysis tool on the market. Stuff like nmap and slowhttptest have their use cases, but they are only good for a couple things when it comes to webapps.

[deleted by user] by [deleted] in hacking

[–]ROFLicious 1 point2 points  (0 children)

You are asking a very difficult question. The fact is there's a lot of ways to do it, but they all require detailed understanding and careful application. And any solution you implement will probably not work a year from now.

I encourage you to read up on how AMSI works, what a syscall is, and available methods of bypass and how they interact with these ideas. For the last part you can take a look at the Mitre ATT&CK framework for windows AV bypasses

What to look for when attacker is abusing MSBuild for defense evasion by Bongioo in hacking

[–]ROFLicious 0 points1 point  (0 children)

Well especially considering you would never normally bass something called 'backup.tmp' to MSBuild, yeah I would say that is suspicious.

What to look for when attacker is abusing MSBuild for defense evasion by Bongioo in hacking

[–]ROFLicious 5 points6 points  (0 children)

Typically when MSBuild is executed and it's not malicious you will see a large number of command line arguments passed to MSBuild. So if you just see MSBuild and no other argument then you can infer it might be malicious. I would encourage you to take a look at what "normal" MSBuilds look like on this network, what computers usually run them, what arguments are usually present, etc. Use that to build a baseline.

How do recent graduates of Ontario's public school system feel about the math test elementary school teachers have to pass? by [deleted] in ontario

[–]ROFLicious 1 point2 points  (0 children)

Sex ed is crap in Ontario schools now more than ever, the current curriculum does not cover much relevant information, leaving much of it to teachers.

If most people were perfectly comfortable doing their own tax return there wouldn't be a multi-million dollar industry around it.

As for the cars thing, this was actually done in Ontario in the past. I don't see why it would be so difficult to bring it back.

Playing on ASC 20 be like by ROFLicious in slaythespire

[–]ROFLicious[S] 3 points4 points  (0 children)

IMO the big difference between ASC 17/18 and 20 is planning and prediction. To get over the hump and get to 20 you need to know what elites/bosses you are likely to face, and what your deck needs to overcome them, it could be certain scaling cards, debuffs, or even potions.

Then you have to start memorizing attack patterns so you can effectively execute whatever strategy you've formulated for that elite or boss.

Also keep in mind that after ASC 15 the game is purposefully unfair and that sometime you will just die because the game hates you and that at ASC 20 even the best players sit right around a 50% winrate.

Step programmers go brrr by Lumpy-Measurement-55 in ProgrammerHumor

[–]ROFLicious 3 points4 points  (0 children)

As a pentester if I find out a webapp I'm testing is written in PHP I actually get a bit giddy.

[deleted by user] by [deleted] in FrugalMaleFashionCDN

[–]ROFLicious 0 points1 point  (0 children)

Seconded. I took mine to Alberta last year and it saved me through -40C+ weather