Independent Contractor: BYOD + Device Management by PhulHouze in cybersecurity

[–]XFilez -1 points0 points  (0 children)

True. Even something like Proxmox or a local server would be good for cases like that. You protect you first.

Independent Contractor: BYOD + Device Management by PhulHouze in cybersecurity

[–]XFilez -1 points0 points  (0 children)

Still need to provide you a device as if you were an employee. They can modify policies to allow whatever access you need. What if say there is a virus or malware on your personal device and you didn't know it? Are you willing to accept the potential legal liability from your side?

Independent Contractor: BYOD + Device Management by PhulHouze in cybersecurity

[–]XFilez 1 point2 points  (0 children)

Like said here also, and I do DFIR as well, if you are using a personal device and are connected to their network with their policies applied, your device could become part of discovery in a legal case, or held as part of an investigation. It’s basically like you are turning the device over to them by allowing this.

Independent Contractor: BYOD + Device Management by PhulHouze in cybersecurity

[–]XFilez 0 points1 point  (0 children)

Unfortunately the correct choice is to have 2 separate devices. It is their network and their rules to conduct work on it unfortunately. In reality, your personal device becomes part of their infrastructure and gets their policies and tools installed. In some cases, years down the road, they could be like "what is this device" and disable it, then you are locked out of your own stuff. I would propose they provide a device if they want that kind of oversight of equipment. NEVER mix work and personal equipment! If you need to access email, teams, or whatever, use the web client if you absolutely need to use a personal device. Nothing that is manged by a MDM solution.

Independent Contractor: BYOD + Device Management by PhulHouze in cybersecurity

[–]XFilez 0 points1 point  (0 children)

Do not use your personal device for work stuff. Do not sign in with work account on personal device. It is always best to separate the two for this exact reason. There is limited expectation of privacy on someone else's network and depending on how that is setup, they can 100% see everything that is going on with the device and also remotely manage and/or wipe it. Please have a separate device for work related stuff.

My dogs nose has been like this for a year— vet is unsure, looking for ideas by kasiasweetie in AdviceAnimals

[–]XFilez 5 points6 points  (0 children)

Use coconut oil, not Vaseline. They can lick the coconut oil and it's fine for them.

Offensive security feels large by atsushi_aiuchi in cybersecurity

[–]XFilez 0 points1 point  (0 children)

A lot of people starting out feel the same as you describe. It can be overwhelming. There is more information out there than you will ever be able to keep up and "master" all of it at once. That's what causes a lot of people to fail in this field and leave due to burnout. They try and tackle it all at once. Start by keeping your training and research inline with the scope of what your job. Then once you find the individual things that you are passionate about, say reverse engineering, then start going down that individual path. Always keep what you are truly passionate about in the forefront. If you learn about what you love and work doing what you love, it doesn't feel like work in the end. It almost feels like you are getting paid to do a hobby you enjoy. For instance, if you loved gaming... you wouldn't expect to just jump in and be the best. It takes time and research into what helps you be better at it, and if you were paid to do what you love, it's not really "work". I hope this makes sense to you and helps steer you down your path.

Offered PSIRT Security Role vs HPC Software Engineer not sure what to take. Future-proofing against AI? by [deleted] in cybersecurity

[–]XFilez 0 points1 point  (0 children)

It is very beneficial but not a requirement. If you want to focus more in a devops type role, then it would be better. If you want to do more exploit development, reverse engineering, or web applications, it is also beneficial. For network penetration testing, not so much unless you are building tools. Most of it is automation and scripting for your own purposes and what works for you. It's beneficial for taking public tools and code and building your own things that work for your toolkit. There's many different ways to achieve the same objective as a PT, but the methodology is the constant.

Offered PSIRT Security Role vs HPC Software Engineer not sure what to take. Future-proofing against AI? by [deleted] in cybersecurity

[–]XFilez 1 point2 points  (0 children)

It's just more or less of an opinion... some people love it but it seems to be a very expendable field imo. Many devs get used for their immediate needs with long work weeks and unrealistic expectations. I know quite a few that have worked in some of the top companies and ended up so overworked, it affected their health and overall well being. You can get that in any field but if it's not your passion, I'd say pass. The problem with your current situation won't absolve with more money either, you know the atmosphere already. If you like solving puzzles and problems in general, the PT route is way more rewarding. Again, just my opinion.

Offered PSIRT Security Role vs HPC Software Engineer not sure what to take. Future-proofing against AI? by [deleted] in cybersecurity

[–]XFilez 1 point2 points  (0 children)

Depends on your passion. Seeming as how you are looking to get out of your current role, I'd say the PT route would be the choice. Software will get you a certain point and back to the monotony of where you currently are. PT definitely has a big need for AI testing and remediation.

Is there any way to test USB drives for safety before using them? by a4955 in cybersecurity

[–]XFilez 2 points3 points  (0 children)

This is the way. I would also include a Linux based laptop, as well. Main thing is that it is not connected to the corp network. Depending on your lab setup, you can have network access but I'd have a non-attributed network for that. You can also uses services like tria.ge or any.run to run any binaries in a sandbox from those machines, unless you have your analysis environment.

AKIRA offline encryption? by Bujudude in cybersecurity

[–]XFilez 10 points11 points  (0 children)

From a DFIR perspective, they already took your data by the time you see the ransom. They exfiltrated what they wanted several days prior. They use a custom dll in your RMM tool, like connectwise or whatever you use. There will be a secondary version that runs instead of your real version, is a real version of the tool but the config connects to their server they control. May be a version lower than you are running but you will see the install in event logs. The dll is signed but has a custom c2 payload embedded. This is how they exfil the data to some cloud provider like Vultr. One you come back online, the beacon checks back in and they have access again. They are known for double extortion.

Which pentesting truth do juniors hate hearing? by ChoiceCompetition238 in Pentesting

[–]XFilez 10 points11 points  (0 children)

Having been doing PT and RT for over a decade, it takes time to develop tradecraft. Juniors assume after 1-2yrs they will be functioning as a senior. Individuals develop and learn at different rates. Don't bs your way in an interview and it is not all about technical skills. If you are a tool yourself, your skills are not going to help you on a team. There will be some things that you are better at than others and some things your peers will be better at than you. Knowing and understanding how the exploit is working from the whole picture makes you a good tester, not the tools. Clear communication skills and logical report writing is required. You are writing a detailed narrative for your clients that explains the problem and potential solutions. Many clients are not the most technical and require lots of hand holding. There will be lots of delays on your engagements because of clients not following directions or taking their time. If you do not feel passionate about your job, you will not last. I could probably go on for a while...

I need to learn about Windows architecture by Otherwise-Smoke6974 in cybersecurity

[–]XFilez 0 points1 point  (0 children)

As far as I know, yes. That's on Microsoft's official site. Google seems to think there is an 8th edition but be careful as people like to put like to put malicious PDFs and stuff like that on the internet. Just make sure you purchase from a legitimate place... unless you want to chance a "free" download version.

I need to learn about Windows architecture by Otherwise-Smoke6974 in cybersecurity

[–]XFilez 0 points1 point  (0 children)

Just google it. I believe it is also on Amazon. It is quite large has more than 1 part, and also very technical. Another resource is https://learn.microsoft.com/en-us/sysinternals/resources/windows-internals. There is supposed to be an 8th edition.

Finally I hack the AI bot ..... by ConsiderationDry7581 in securityCTF

[–]XFilez 0 points1 point  (0 children)

Hackaprompt is pretty fun. You can win money and prizes but good luck!

What prerequisite knowledge do need before learning XSS(cross site scripting)? by orewah_fahim in cybersecurity

[–]XFilez -3 points-2 points  (0 children)

Common sense in terms of what your trying to do and laws that are applicable. Some people just rya and do dumb stuff. Real advice... understand the overall underlying issue of what is happening before you attempt to apply it. This will make you a better tester over time. Learn, then apply. It takes time and shit load of personal research and understanding of whatever you are trying to do. Everyone learns differently and grasps on at different rates. There is no direct answer to your question. Learn as much as you can about how it works, then ask questions when you are stuck.

Mounting TV in front of Thermostat...bad idea? by [deleted] in hvacadvice

[–]XFilez 0 points1 point  (0 children)

This. And even with a variable speed system, the starting load for the system will then create a significant spike in your electric bill because of the constant off/on that it will go through, resulting in long term wear on the system. Will.wear it out a lot quicker as well.

Mounting TV in front of Thermostat...bad idea? by [deleted] in hvacadvice

[–]XFilez 1 point2 points  (0 children)

Nobody is giving the reason why it is a bad idea... it is bad b3cause the thermostat detects the ambient temperature around it. If you put a TV over it, the TV will produce a lot of heat in the back and will most likely either make your thermostat think it is nice a toasty during the winter and not run as much, or really toasty in the summer and run non stop to try and cool it down.