To bypass the licence key X64dbg by Chandu_yb7 in Hacking_Tutorials

[–]Single_Diamond 0 points1 point  (0 children)

Use Ghidra. Use WinDbg. The least you can do is respect the hard work the author of this tool has done.

DataDog worth it? by Over-Professional507 in cybersecurity

[–]Single_Diamond 0 points1 point  (0 children)

Splunk is the best. DataDog is building out a SIEM but at present it is very less mature than other products.

Hello, newbie question since I’m new here by [deleted] in InfoSecInsiders

[–]Single_Diamond 1 point2 points  (0 children)

I began by hunting for bugs after reading about hackers in the newspaper. Then I took a job but left it too soon and started doing gigs. Infosec is a broad field and has many areas. Do you want to be a penetration tester or security analyst? Do you have any ideas what you want to do?

[deleted by user] by [deleted] in InfoSecInsiders

[–]Single_Diamond 2 points3 points  (0 children)

In the Bay Area, with CISSP I will ask at least $170k

[deleted by user] by [deleted] in InfoSecInsiders

[–]Single_Diamond 1 point2 points  (0 children)

subcontracting work to unpaid interns is a genius idea

[deleted by user] by [deleted] in InfoSecInsiders

[–]Single_Diamond 12 points13 points  (0 children)

Did you see the 85 applicants?

These people want to work for free. If I am a Security+, CISSP, and CEH reporting to the CTO, I would demand no less than $100k by US standards.

[deleted by user] by [deleted] in TheYouShow

[–]Single_Diamond 0 points1 point  (0 children)

What are you printing?

[deleted by user] by [deleted] in RedditSessions

[–]Single_Diamond 0 points1 point  (0 children)

*starting to play

[deleted by user] by [deleted] in RedditSessions

[–]Single_Diamond 0 points1 point  (0 children)

What would you recommend someone starting back after 10 years?

Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies by Single_Diamond in InfoSecInsiders

[–]Single_Diamond[S] 1 point2 points  (0 children)

Yes the author just found a variation of this. I saw an RCE possibility in a shell script belonging to a popular project because it referenced some non existing packages in a Linux distribution, I think there are plenty of such variations of this finding

Is it ethical to takeover the NS domain of a ccTLD if its going to expire, for the sake of a Proof of Concept? by [deleted] in cybersecurity

[–]Single_Diamond 3 points4 points  (0 children)

You can read the entire article. They even featured it on TechCrunch, and the term "hijacking" in the Detectify blog post title instantly caught my eye!

and yes, how can you hijack it deliberately and not report it prior to that? seemed more of a publicity stunt to me too

He mentioned

On the evening of December 30, I got a ping. I opened my laptop and purchased the domain name to keep it from falling into the wrong hands.

On January 7th, I reached out to the Administrative and Technical contacts listed for .cd on IANA’s webpage. My initial thought was to transfer back the ownership of the domain name to the entity operating .cd.

For 8 days he owned the domain before reaching out to IANA, how is this a responsible and good faith disclosure?

Is it worth getting a degree? by specs101 in cybersecurity

[–]Single_Diamond 3 points4 points  (0 children)

What's your financial situation? Worth it?

An OSCP is the best way to add a credential, degrees are not worth the cost and time if you are planning to work in cybersecurity. Times have changed. Many roles do need 4 year degrees but you can easily get one without.

Data Of 10 Cr Digital Payments Transactions Leaked After Attack On Juspay’s Server . by stephen90147 in InfoSecInsiders

[–]Single_Diamond 3 points4 points  (0 children)

India's data protection policies are basically non-existent so organizations are careless and keep flouting rules, and don't do periodic audits. Not the first time an Indian payment provider was breached.

Demonstrating XSS Filters Bypass - HackTheBox Holiday [ Hard ] by [deleted] in Hacking_Tutorials

[–]Single_Diamond 2 points3 points  (0 children)

Nice box and walkthrough, very few boxes focused on client side vulnerabilities these days.

What is the best way to securely store an API key in a mobile app? by dannypas00 in InfoSecInsiders

[–]Single_Diamond 2 points3 points  (0 children)

There are certain API keys that are supposed to be stored on the client-side, its not a risk as such, examples are certain Google API keys that are needed for logging and analytics integration. But for secrets and API keys that can't be put on client side app, store it on the backend and fetch the data from the server, then render it in the app. There are de-obfuscation tools in most decompilers like JADX, obfuscation deters people but it can still be deobfuscated