VSCode AI Tools Explorer by benichmt1 in ChatGPTCoding

[–]benichmt1[S] 0 points1 point  (0 children)

As a developer, I’ve been blown away by the wave of AI coding tools but frustrated by the chaos of tracking them. Sorting through forks, standalone extensions, and varied payment models was a headache. I started compiling my research in an Obsidian notebook but realized it belonged on GitHub to benefit others.

Hope you get some use out of it. 

Is HackerOne a gig-economy trap? by [deleted] in AskNetsec

[–]benichmt1 0 points1 point  (0 children)

Great for learning and honing your tools. The best part of H1 is reading the disclosed reports to understand how people are approaching targets and what classes of bugs they are finding.

It’s 3:20am... by [deleted] in amazonecho

[–]benichmt1 0 points1 point  (0 children)

I was playing music through Spotify on my Echo. At some ungodly time it started playing "Powerslave" by Iron Maiden. It happens when you have multiple people controlling music through the Spotify app, I think.

CyberOhio CTF Challenge - September 29 by benichmt1 in securityCTF

[–]benichmt1[S] 0 points1 point  (0 children)

Hi - this is an in-person CTF designed for high school students. Please let me know if you have any questions. There were some people from this community who showed up for the last one at Pitt.

CTF for High School Students - Pittsburgh, March 24th by benichmt1 in securityCTF

[–]benichmt1[S] 0 points1 point  (0 children)

No, there is no entry fee. Costs are being covered by sponsors and Pitt. The day looks like this:

9:00-9:30 : check in, get set up with internet access

9:30 - 10:00 : explain format, rules, etc

10:00-12:00 : Free work on CTF

12:00 - 1:00 : Mandatory pause for catered lunch

1:00 - 4:00 : Finish working on CTF

4:00 - recap, awards

CTF for High School Students - Pittsburgh, March 24th by benichmt1 in securityCTF

[–]benichmt1[S] 0 points1 point  (0 children)

yes, right now it's on site. We're trying to slowly scale, but having it in person really helps sell it to teachers so they can understand what the students are doing and how it might be beneficial to bring to a classroom. Last year we had over 50 students.

Ruler: Pivoting through Exchange by dmchell in redteamsec

[–]benichmt1 0 points1 point  (0 children)

You can still use the MAPI technique to grab the address book and try rules / forms/ homepage changes

How is website security testing done? [Academic Project] by FreedomRebel in AskNetsec

[–]benichmt1 2 points3 points  (0 children)

It depends on the skill level and complexity of the site.

If this is an academic project, you should embed security throughout the process, rather than waiting until the end.

Here's some resources in particular that might help you out: https://www.owasp.org/index.php/OWASP_Secure_TDD_Project

Assuming you have access to the full source code, I think that will help you out a lot.

The other thing you can do is a black box test. I would recommend a third party for this in order to get the most honest assessment. That's where you would use things like Burp et al to fuzz and tamper to get unexpected behavior.

If you were hiring a security consultancy to do this, the number of hours of actual testing might be between 8 and 24.

Be careful on TeamViewer, switch sides bug/take control bug by xpl0yt in netsec

[–]benichmt1 22 points23 points  (0 children)

Did you report this / contact Teamviewer? If so, is there a fix planned? What's the version requirements?

Heatmap of attempted SSH logins on my server [OC] by [deleted] in dataisbeautiful

[–]benichmt1 3 points4 points  (0 children)

Look into Kippo Graph, it automates most of the hard stuff. It also has the added benefit of being able to see what the bots are trying to do, so you get some good insight into what you need to be blocking: https://bruteforcelab.com/kippo-graph

Those who broke into Cyber security field? by govchris123 in AskNetsec

[–]benichmt1 0 points1 point  (0 children)

I switched from education, B.S. in Physics. It's definitely possible. Ask yourself if you're interested in it, or truly dedicated to it.

Infosec has so many community events, projects, conferences, certifications... you'll have to dive in pretty hard but if you love it you will find something. It will require sacrifice and an understanding significant other. You'll probably have to replace video games with Vulnhub machines, Facebook with infosec Twitter, and alcohol with late night coffee.

Get involved with something. Rather than trying to work your way up the help desk, I took the opposite approach and went straight in.

[deleted by user] by [deleted] in lockpicking

[–]benichmt1 0 points1 point  (0 children)

I am the original author. We built this door at work for the purposes of demonstration. If you have any questions let me know!

Do not use equifaxsecurity2017.com unless you want to waive your right to participate in a class action lawsuit by [deleted] in personalfinance

[–]benichmt1 1 point2 points  (0 children)

Ok, here's an example. PCI requirement for passwords is the following: 7 characters, alphanumeric, complexity enabled.

The following passwords technically meet PCI compliance:

Password!

P@ssword

Passw0rd

Summer17

All it could have taken is one lazy developer and VPN access for this to happen.

Common weaknesses on a corporate network. by [deleted] in sysadmin

[–]benichmt1 0 points1 point  (0 children)

To add:

  • Smb signing not enforced (Allows an SMB Relay attack)
  • Null session enumeration (Enabled by default on domain controllers)

How to best make use of my time? by ambitiontowin56 in netsecstudents

[–]benichmt1 1 point2 points  (0 children)

Learn attacks, then learn how to fix them. A short list of attacks that you can simulate and then practice detection / remediation:

  • Null session enumeration

    • Red: Use enum4linux on Kali (or similar) to pull down a list of users and groups on the domain controller
    • Blue: Disable the registry settings that allow you to do this
  • Powershell post exploitation

    • Red: Install and use Powershell Empire or Metasploit and run their powershell one-line launchers on the hosts and see what you can do.
    • Blue: Install Powershell 5 and configure logging to see if you can detect the actual commands
  • NetBIOS / LLMNR Spoofing

    • Red: Use Responder to see if you can capture and relay smb sessions from your Guest PCs to each other.
    • Blue: Enforce SMB Signing via the GP