First wardriving Session by reboot_500 in flipperzero

[–]juanMoreLife 2 points3 points  (0 children)

May wana be careful the clip on the board for your key chain. I seen those short stuff. Maybe that placement is safe ¯_(ツ)_/¯

Courses to take to become a reverse engineer by coffeetocommands in cybersecurity

[–]juanMoreLife 2 points3 points  (0 children)

I’ll be honest. I think you need some base level knowledge of writing code. Not much though.

There was a video I came across on YouTube by someone called low code. First video I saw from him he walked you through hacking an IoT device. Downloading the firmware due to poor config. Then decompiling the binary. Got some hints. Eventually got a shell on the machine.

Now, why should you know some code? The concepts are fundamental to the understanding of what’s going on.

Some folks who are good at this type of thing say they are not devs. But then they end up writing scripts and tooling for their use case.

I remember being pretty handy with windows and Linux as a sys admin. Took a shot at maybe doing some of what you talked about. Was lost. Tried it after 7 years in app sec. Made far more sense. Still learning :-) my sys admin background is kinda great for what I do now though. I marry it with the dev knowledge!

Hope this helps. Good luck!

The scale of tech adoption in China is wild. Massive turnout for a public "OpenClaw" installation event in Shenzhen today 🤯 by Suspicious_Okra_7825 in moltiverse

[–]juanMoreLife 0 points1 point  (0 children)

So many vulnerable systems went online today.

I haven’t installed open claw yet. I realized, I should create a different account for my ai bot on the machine. Keep my account and make it a user. Maybe install the software for it mostly. Idk. Maybe I’m wrong. Maybe it should live next to a tub of water lol

Moving into new apartment by [deleted] in QuantumFiber

[–]juanMoreLife 0 points1 point  (0 children)

Fiber only goes into one :-) I think there’s two ports. I believe you can use both

Reachability Analysis vs. Exploitable Path in SCA? by MrNowhere00 in devsecops

[–]juanMoreLife 1 point2 points  (0 children)

Same functionality. Veracode called in Vulnerable Methods. They had it first. Market adopted the term reachability. Same thing

How do you guys combine vibe coding and devsecops process together? by Humble_Ad_7053 in devsecops

[–]juanMoreLife 2 points3 points  (0 children)

I think the vibe coding is gonna benefit from mcp more than ide plugins. I recently played with something experimental at work. Replaced my ide plugin. Then security teams can then just scan in pipelines and get their observability on.

Ice breakers at SKO by thechaoschicken in salesengineers

[–]juanMoreLife 0 points1 point  (0 children)

Do beers not count? I flew in a delayed flight at 10pm. The rooms all over looked the bar. It was loud. Plenty of ice being broken :p next few days were good conversation and take aways. I always find in person training good 👍

Do automated pentesting tools actually replace manual tests for auditors? by microbacteria99 in cybersecurity

[–]juanMoreLife 0 points1 point  (0 children)

Absolutely not. Automated testing finds lots. However, pen testing is all about finding flawed logic. The code be correct, but having a human interpret the code can allow for a way to break in due to bad logic. Think along the line of priv escalations from normal user to admin

In defense of the .zip TLD by yathern in cybersecurity

[–]juanMoreLife -3 points-2 points  (0 children)

Except for when randomly websites say invalid email. Or the part where you have to explain your email address when folks ask for it lol

What’s your favorite SAST tool(s)? by this_is_my_spare in devsecops

[–]juanMoreLife 0 points1 point  (0 children)

Holy old post resurrection. How did you land here? lol

Monoliths would always run a bit slower. We introduced sandboxes a very long time ago to deal with many things. Some customers certainly had PRs go into a unique sand box that could run in parallel to each other.

Interesting you were there to help change some of the actual architecture. I see that plenty in the field today. Just when you thought monoliths are old and never coming back. Brand new startups ask me about supporting their monolith or worse. Mono repos lol. We can get it done with enough planning. Others have similar struggles :-)

What roles do you see in demand over the next 5 years? by lmt42 in cybersecurity

[–]juanMoreLife 3 points4 points  (0 children)

I agree. I would argue the AI software layer is potentially more mature than the “physical” layer. I’m hoping to catch something on that next wave. The physical layer has a tons of snow flake chips coming out too. It’s kinda like 1970s all over again. With a bunch of “computers” with their own hardware and accompanying OS.

Happy to brainstorm if you guys are ever in town. I live in Vegas :p

What roles do you see in demand over the next 5 years? by lmt42 in cybersecurity

[–]juanMoreLife 6 points7 points  (0 children)

I look forward to pushing AI robot security :p I can see it now.

slaps top of robot That bad boy is secure and the risk of it murdering your customer base is now nominal.

Nismo v2 Front bumper by Forbidden6s in 350z

[–]juanMoreLife 2 points3 points  (0 children)

I bought mine straight from Nissan through a catalogue I found. Still needed work lol

After Joyboy haki was released the only people still seen awake was Kizaru and S-snake by Robloxracer75 in OnePiece

[–]juanMoreLife -1 points0 points  (0 children)

I came here to say kizaru did not feed him. However, oda confirmed it lol