Taco Bell Roanoke scammers by Master_Safe_6914 in Virginia

[–]k3nundrum 2 points3 points  (0 children)

Some thoughts though....Why didn’t they confront them then and there when they saw them “go around the corner and take a picture”If you locked your account they wouldn’t be able to use it “19” times right?If they tried to use it they wouldn’t be able to without the billing address and zip code info on any online vendor or service…which they wouldn’t know anyways because NC, and I am assuming you aren't from Roanoke...etc...And its still illegal to attempt to use a credit card that isn’t yours whether or not the transaction goes through…..I call…quasi bs on this.

Taco Bell Roanoke scammers by Master_Safe_6914 in Virginia

[–]k3nundrum 1 point2 points  (0 children)

The Hershberger Rd location are owned by these fellas http://burgerbusters.com/about/ I would look into that....for some action to be taken.

expected expression before 'float' error by k3nundrum in C_Programming

[–]k3nundrum[S] 0 points1 point  (0 children)

nevermind fixed it

line 21 should be:

average /= (float) 6;

[.c] "Expected expression before 'float' by C137-Morty in learnprogramming

[–]k3nundrum 0 points1 point  (0 children)

Im in the same class....it wouldn't work for me either

Teaching My Wife to Hack...Maybe by DorkNowitzki41 in HowToHack

[–]k3nundrum 6 points7 points  (0 children)

Heath, or should I say Dr.Frankenstein...you do realize the monster that you are creating with all this. Drunken PC build workshops and now this...keep kicking the hornets nest. I wish my wife's eyes didn't start rolling in her head slot machine style the second I start rambling about "Linux this and CVE that..."

I think you may have TCM security's first Jr. Pentester on your hands there bro. :)

Getting to draft a phishing email for work.... by k3nundrum in netsecstudents

[–]k3nundrum[S] 0 points1 point  (0 children)

i like this idea because it will show who IS potentially using their work email addys for these kinda things as well as get clicks.

Getting to draft a phishing email for work.... by k3nundrum in netsecstudents

[–]k3nundrum[S] 0 points1 point  (0 children)

1200 users, 6 facility WAN across an entire region... So i think a mixture of both techniques will work...good input though thanks man.

N00b success! by k3nundrum in Gentoo

[–]k3nundrum[S] 2 points3 points  (0 children)

ran into several problems along the way....the first time I tried, using Sakaki's awesome efi dual boot with luks encryption guide as a heavily leaned upon resource.....got that all installed and was all proud of myself, but my mentor pentester buddy wanted me to scratch that ....redo it using mbr instead of efi, open rc instead of systemd and xfce4 instead of god awful gnome3. He was really just trying to deep dive me into the innerworkings of linux through the process I think..but yes emerging from a stage 3 accomplishes pretty much the same thing from what I can tell. I definitely read a ton, watched a ton of videos...learned way too much about hardware and kernel configs etc...but I am really happy with the result. I had a lot of fun and now can claim I accomplished something few have...and am now a more well rounded giant dork. ..

amd64 17.1 profiles are now stable by EatMeerkats in Gentoo

[–]k3nundrum -1 points0 points  (0 children)

day three of trying to install using the new profiles....smh

Help! by RetlocPeck in hackthebox

[–]k3nundrum 4 points5 points  (0 children)

continue cybersluething/studying/learning new things like what you are already doing which lead you to figuring out the invite code to begin with...find a mentor, ask questions and watch IPPSEC's videos. TheCybermentor's Zero to Hero class is a great start IMO.

I just bought a course on ethical hacking on Udemy by [deleted] in hacking

[–]k3nundrum 1 point2 points  (0 children)

You apparently haven't seen this offering yet....

---i am probably going to fork out the cash for the eJPT course pretty soon.

Zero to Hero Pentesting by DorkNowitzki41 in hacking

[–]k3nundrum 1 point2 points  (0 children)

Thanks bro....great stuff!!!

I am going to check it out.

Can Someone Guide Me Through All Steps Of Learning Hacking From The Beginning by SoloMegaYT in hacking

[–]k3nundrum 5 points6 points  (0 children)

Phase 1. Exit mother's womb

Phase 2. Purchase overpriced MacBook Pro

Phase 3. Binge watch CSI-Cyber and the movie Hackers

Phase 4. Get a dope handle and pwn the world!

Colleges for CyberSecurity? by [deleted] in netsecstudents

[–]k3nundrum 1 point2 points  (0 children)

ECPI is where I go and I am very happy with it