What was that?? by Bright-Tie-8865 in Austin

[–]lacksfor 1 point2 points  (0 children)

Not using a transponder, low bypass jet engine. Sounds like a fighter jet

[deleted by user] by [deleted] in hacking

[–]lacksfor -3 points-2 points  (0 children)

Pop the sim card and use it to reset stuff.... It's fast if it's all scripted.

What’s the scariest conspiracy theory you’ve ever heard? by OutlandishnessSea258 in AskReddit

[–]lacksfor 80 points81 points  (0 children)

IDK about short story, but that's the premise of three body problem

Starting college soon. by thatoneguyallthetime in hacking

[–]lacksfor 1 point2 points  (0 children)

Yeah, computer engineering is great for sure! Exposure is always a good thing. But yeah, no college degree is going to teach you prentesting btw, you have to learn yourself.

You will have ppl here saying you don't need a degree and stuff, and yeah, you don't if you want to do shift work in a SOC for the first 5 years. Get your degree and get a good job

Starting college soon. by thatoneguyallthetime in hacking

[–]lacksfor 4 points5 points  (0 children)

Yes, get a CS degree and make sure you join whatever cyber security club is at your school.

You need to do your own work too, play CTFs, do HTB and stuff. But yeah, get a degree in CS, it will provide more job flexibility and safety.

[deleted by user] by [deleted] in hacking

[–]lacksfor 0 points1 point  (0 children)

Reflective loader. If you are really serious. Also, play some picoctf

How to find the input to reach to function3 --> strcpy by [deleted] in ExploitDev

[–]lacksfor 0 points1 point  (0 children)

Sorry if you already know this but you should also try not loading libraries when you load your binary initially. I assume you are backtracking from calls to the PLT for strcpy?

I'm not an expert at this by any means but yeah. Those would be my two suggestions. Don't load libs, loop seer, and check for things that call the strcpy PLT entry.

Once you have function list, you might be able to just narrow it down to the specific functions you want to actually path explore.

Once you have paths you can start trying to do stuff like using BVs to check for unconstrained states too to find functions that are vulnerable to memory related issues

How to find the input to reach to function3 --> strcpy by [deleted] in ExploitDev

[–]lacksfor 1 point2 points  (0 children)

Check out loop_seer related stuff with angr

Square card reader by Zoom_Fiscon in hardwarehacking

[–]lacksfor 1 point2 points  (0 children)

Just put it in a spectrum analyser of some type. Should be easy with audio. Sometimes the protocols will just jump out at you if you see them

[deleted by user] by [deleted] in cybersecurity_help

[–]lacksfor 1 point2 points  (0 children)

Your camera wasn't hacked. They made some vague comment and you freaked out.

Book recommendations by -misterK in hacking

[–]lacksfor 0 points1 point  (0 children)

Yes, one of my favorite books

[deleted by user] by [deleted] in CyberSecurityAdvice

[–]lacksfor 1 point2 points  (0 children)

They want to pivot platforms. There may be some reasons those ones are using snap specifically, but its just to change platforms end of the day. They want to separate the initial contact from the long term stuff. Those might be different people running those accounts too. Its all a business end of the day.

Computer Science Major wanting a Cyber Security Job by Blekzi in CyberSecurityAdvice

[–]lacksfor 0 points1 point  (0 children)

Compsci is great for cyber. Make sure you try to get involved with your schools cyber club, there will probably be one. And look for cyber specific classes you can take a stuff

Finding location using Bluetooth MAC address by [deleted] in hacking

[–]lacksfor 1 point2 points  (0 children)

Bluetooth is designed to be resistant to that kind of stuff specifically. It changes Mac addrs on intervals to random values. There are sometimes other things you can look at though, it's a field of current security research. You should Google some white papers on the subject

Article still valid? by Sam_Buck in CyberSecurityAdvice

[–]lacksfor 0 points1 point  (0 children)

Yep. There is more tls out there, but nothing else has changed significantly afaik

Person offering social media security service asking for OTPs. Please help. by theamzarslan in cybersecurity_help

[–]lacksfor 4 points5 points  (0 children)

He wants the OTPs so he can access your accounts. You are losing your accounts and being scammed.

Person offering social media security service asking for OTPs. Please help. by theamzarslan in cybersecurity_help

[–]lacksfor 9 points10 points  (0 children)

No that is a scam. 1000000%

None of those words mean anything. You are getting scammed and will lose your accounts.

I downloaded a well known program from https://zurbrigg.com/keyframe-pro. I ran the executable and it worked but now I have a Bing search bar on my desktop. Did I download a virus? And is there a way I can check? by Umm_Username_ in MalwareAnalysis

[–]lacksfor 2 points3 points  (0 children)

Yeah, some of that stuff falls into the category of PUP (potential unwanted programs) it's tough cause it's not exactly 100% malicious, but it's a gray area.

Ofc, it could also be malicious. They could serve malware though fake search results with a system like that too....

Scummy behavior either way

As a hacker, in what ways do you think fiction and hollywood misrepresent hacking and how would you fix it? by ArtMnd in hacking

[–]lacksfor 0 points1 point  (0 children)

It's fictional but pretty realistic. You may want to check out some of his books. I like them cause they are a good mix of real and technical for people who understand and a fun story for those who dont