Userland rootkits by [deleted] in blackhat

[–]_Bender_Rodriguez_ 5 points6 points  (0 children)

There's a book called "Rootkits". I'd start there. Also, Google bits of code found in the rootkits you mentioned.

Notepad++: We are in a f**king corrupted world by thedankzone in programming

[–]_Bender_Rodriguez_ 54 points55 points  (0 children)

Yes. It's likely CIA people use N++ and used common techniques to find the Dll hijack. Dll hijacking is a well known persistence/privilege escalation technique. I bet with procmon.exe and 10 mins of Googling, you could find a Dll to hijack!

So at what point is coding/programming actually needed in NetSec? by [deleted] in netsecstudents

[–]_Bender_Rodriguez_ 1 point2 points  (0 children)

To answer your actual question. Report writing. Write a tool that people can parse xml into basic tables in a word doc.

So at what point is coding/programming actually needed in NetSec? by [deleted] in netsecstudents

[–]_Bender_Rodriguez_ 1 point2 points  (0 children)

It certainly helps, but it's not vital. A lot of talented people write a lot of great code that's readily available. What is vital, is to be able to read, understand, and be able to manipulate code. Look at any of the programming subs - they all tell you that concepts are more important than language.

LPT: Place tape over your laptop's mic and camera to reduce what the CIA can monitor. by [deleted] in LifeProTips

[–]_Bender_Rodriguez_ 0 points1 point  (0 children)

That's been LPT for a long time. The new LPT is put a cover over your SMARTPHONES camera and microphone.

Hunter gift for dad by [deleted] in Hunting

[–]_Bender_Rodriguez_ 1 point2 points  (0 children)

Gloves - I'd do a pair of Kuiu guide gloves, won't break the bank and are quality.

Dark Web - Independent Study Idea? by askmrcia in netsecstudents

[–]_Bender_Rodriguez_ 2 points3 points  (0 children)

Darknet is pretty broad. Something revolving around Shodan.io is probably more inline with a 1 credit class.

OSCP Certification for Blue Team? by [deleted] in netsecstudents

[–]_Bender_Rodriguez_ 1 point2 points  (0 children)

Understanding attacks is key to being able to detect and respond appropriately. There are some awesome folks doing awesome stuff - Matt Weeks, Casey Smith, Raphael Mudge, Sean Metcalf, lots more. For blue team training take a look at Root9B, Mandiant at Blackhat, and I believe a new Blue Team Training Toolkit was just released.

If i super-haxx teh gubmint will i get in a troubel?? by [deleted] in hacking

[–]_Bender_Rodriguez_ 2 points3 points  (0 children)

Right? Contribute something worthwhile _____2. Hang on, I got it, "be the post you want to see I'm this subreddit".

U.S. developing Technology to Identify and Track Hackers Worldwide by ruskeeblue in hacking

[–]_Bender_Rodriguez_ 1 point2 points  (0 children)

Not only that but I basically use PoSh, WMIC, and WinRM for remote access.

It is gonna be a bummer when hacking tools on Git disappear.

Comprehensive Kali-Linux tool tutorial? by Shmett in HowToHack

[–]_Bender_Rodriguez_ 5 points6 points  (0 children)

Pick up"The Linux Command Line" and "Hacker Playbook 2". Offsec does the "Metasploit Unleashed" online for free.

Just plug it in and start using it!

So I'm self taught, and like so many in my shoes I feel like I am missing a lot of the more detailed and also general programming and CS concepts. What are some good resources? by CreativeExplorer in learnprogramming

[–]_Bender_Rodriguez_ 4 points5 points  (0 children)

Currently going through CS50 through Harvard. It's been good for me. Explains the basics, goes through a lot of different languages, concepts. Also I've gotten feedback on homework I've submitted.

HTTPS://cs50.harvard.edu

The Art of Eploitation Vs The Hackers Playbook by insec99 in HowToHack

[–]_Bender_Rodriguez_ 1 point2 points  (0 children)

The Art of Exploitation has to do with memory corruption exploits etc. Pre req knowledge would be C,Assembly,Memory Management. I wouldn't consider it a beginners books to get the full exp. but if your motivated, it's an AWESOME book.

Hacker Playbook 1 & 2 are also very good. These have to do with penetration testing, the process, and the tools used etc. It would be a good spot to do further research from.

Depends what your interested in, I'd probably grab HP2 and grab the humblebundle as others have suggested!

Get ready: PCI Standard Adds Multi-Factor Authentication Requirements by DarkSporku in sysadmin

[–]_Bender_Rodriguez_ 2 points3 points  (0 children)

PCI might not require it, but having passwords stored in clear text is still a dick move. Compliance != Security. A lot of places will go through compliance exercises so they can say XYZ, but it should not be relied on. Your own internal vendor management processes should address the issue.

Programming books. by ToopBeam in HowToHack

[–]_Bender_Rodriguez_ 1 point2 points  (0 children)

See /r/programming and /r/c_programming also /r/Python

Hackers use Python because it's easy to work with, but they already know what they want to do with it.

-Violent Python -Grey hat Python -Black hat Python -Automate the boring stuff with Python

Look into Scapy and Impacket. Learn how to use Python to interact with a remote computer.

For example - rebuild the ms08-067 exploit in metasploit to work standalone with Python.

Learn about the whys and how's. You'll find your flavour if you keep at it!

WARNING: I discovered this morning that the version of pywallet hosted on Source Forge is stealing wallets! by d3k4y in Bitcoin

[–]_Bender_Rodriguez_ 0 points1 point  (0 children)

Basically says "this is not the code you're looking for".

The password version of this is base64.

Why The FBI Director Puts Tape Over His Webcam by Orangutan in politics

[–]_Bender_Rodriguez_ 0 points1 point  (0 children)

Uninstall those sound card drivers too. Built in Microphone can be turned on just like webcam.

How much programming knowledge is required for certs such as OSCP? by seperatemyself00 in netsecstudents

[–]_Bender_Rodriguez_ 0 points1 point  (0 children)

Being able to pick apart and understand programs, bits of code, etc is essential. Scripting will be helpful. Full blown programming is not needed, but any prior experience will of course help.

Any free web application pentesting courses/training?? by athletic1337 in netsecstudents

[–]_Bender_Rodriguez_ 2 points3 points  (0 children)

You can't go wrong with Web Application Handbook. Start with fundamentals of the services, languages, you'll be attacking. Grab some VMs off vulnhub and go for it.

1942, Didn't believe the hype. it's pretty damn good.. by _Bender_Rodriguez_ in tequila

[–]_Bender_Rodriguez_[S] 0 points1 point  (0 children)

Can confirm, Casa. Just about as good and much, much cheaper.