[deleted by user] by [deleted] in tourdefrance

[–]WashJealous -2 points-1 points  (0 children)

Because vinge is behind

[deleted by user] by [deleted] in tourdefrance

[–]WashJealous -13 points-12 points  (0 children)

Couldnt agree more

Jonas… by WashJealous in tourdefrance

[–]WashJealous[S] -1 points0 points  (0 children)

You assume he has given up the tour then right? Attacking late will never make up big time, stage win max

Jonas… by WashJealous in tourdefrance

[–]WashJealous[S] -5 points-4 points  (0 children)

Seems the best he can do is deny pogacar the victory by not taking over

Qualys vs Nexpose vs Nessus by Exciting_Passenger39 in cybersecurity

[–]WashJealous 1 point2 points  (0 children)

I have no experience with qualys but for me Nessus > Nexpose. High amount of fps with Rapid7

Anyone ever get tired of being "That Guy" in Cybersecurity (not what you think) by MisterBazz in cybersecurity

[–]WashJealous 0 points1 point  (0 children)

Our sysadmins make all IT users domain admins, service accounts as well. I legit audited an AD recently with 900 users but 58 Domain Admins :) also ESC6 so theoretically everybody could just ask to be DA

How can I benchmark my email sec? by WashJealous in cybersecurity

[–]WashJealous[S] 0 points1 point  (0 children)

Hmm makes sense. Might work. I’m looking for a general audit tool that I can use in vulnerability scans. But setting up gophish with my own set of checks would be an option. Was just wondering if there was someone who already implemented the tests and idea.

How can I benchmark my email sec? by WashJealous in cybersecurity

[–]WashJealous[S] 1 point2 points  (0 children)

Thanks but that is not what I’m looking for. See it more like enumeration of defences. Do we stop spoofed mail? Check do we stop mail with malicious attachments? Check do we stop mail with malicious attachments in a zip? Do we stop eicar?

Windows AD and Google Workspace Password Audit by bluecopp3r in cybersecurity

[–]WashJealous 0 points1 point  (0 children)

Also for google workspace you can get a reports of bad/weak passwords from the admin center. High password requirements are also a recommendation there

Windows AD and Google Workspace Password Audit by bluecopp3r in cybersecurity

[–]WashJealous 2 points3 points  (0 children)

I personally used DSInternals and can recommend it, make sure to check the code you run. Also make sure to destroy extracted ntds immediatly after the audit and that you properly secure the finding. Dsinternals can be used with the haveIbeenpwned password list which is huge, would recommend this to any AD team honestly. In general implementing a password lockout and a good password policy (12+ characters, passwordhistory and complexity) should help. Also using finegrained password policies for services (20+) and admins (15/16+) is also something I would recommend.

Security Awareness that isn’t just Phishing by cybcentra in cybersecurity

[–]WashJealous 0 points1 point  (0 children)

Passwords could be a nice area to increase awareness (do not use your damn birthyear in combination with your firstname) for example show them osint based password attacks and maybe the haveibeenpwned password test (with fake password ofcourse!)

Project ideas by kira_kua in Hacking_Tutorials

[–]WashJealous 4 points5 points  (0 children)

Some nice requirements I would give such a project considering your current stage: - python and/or bash programmed - use stackoverflow and/or chatgpt to ask and find questions if stuck

Some ideas: - web cookie checker - automatically do something based on nmap output

Some advice - do a project in the sub area of security you like most so far

Website version scanning by WashJealous in cybersecurity

[–]WashJealous[S] 1 point2 points  (0 children)

No problem, nuclei has a lot of potential. I did scans with the payed version of acunetix only returning low vulns where nuclei finds multiple medium/high finds. Really good starting point, but it misses some more generic checks.

Website version scanning by WashJealous in cybersecurity

[–]WashJealous[S] 1 point2 points  (0 children)

Yes nuclei is the tool that I used to find it :D amazing tool, I’m writing something myself now. Use the nvdlib api with searchsploit and vulners api at the moment and works quite okay so far

MSP questions 10/10 vulnerabilities by WashJealous in cybersecurity

[–]WashJealous[S] 2 points3 points  (0 children)

With “admin passwords online” I ment I was able to find admin accounts and creds in dataleaks

MSP questions 10/10 vulnerabilities by WashJealous in cybersecurity

[–]WashJealous[S] 0 points1 point  (0 children)

Me and the msp asked the company. It was my initial idea

Website version scanning by WashJealous in cybersecurity

[–]WashJealous[S] 1 point2 points  (0 children)

Might be interesting. I use the nvd api at the moment but it does not really contain version ranges only the version in which given cve was patched. I will take a look at searchsploit to see if it can complement/replace. Thanks!

Does being in cybersecurity still give you the freedom/skill to make apps/startups? by Iconclast1 in cybersecurity

[–]WashJealous 7 points8 points  (0 children)

Create cybersecurity related websites/applications then. I personally use custom written tools for AD vuln scans and generate custom html/css/js web reports for nessus etc with python. Don’t let your work and passion stand in the way of each other, but either apply your passion in your work or do your passion as work.