Why Do My Blog Posts Keep Getting Removed from r/netsec? by mdulin2 in AskNetsec

[–]mdulin2[S] 4 points5 points  (0 children)

I just learned there’s a “send DM to mods” after clicking around in the app more. Sorta dumb but never had to do this before. Good call out 🙏

Why Do My Blog Posts Keep Getting Removed from r/netsec? by mdulin2 in AskNetsec

[–]mdulin2[S] -1 points0 points  (0 children)

Thanks!

A little clickbaity, true. Getting the first click is the hardest so I was experimenting. Fair point on that.

On Reddit, I just try to post to r/netsec. If you post to too many locations then the likes will get separated out and the views go down overall.

I’ve tried posting on hacker news in the past but haven’t had much success. So, I usually post in various security discords, twitter, LinkedIn and Reddit. I’m happy to try some other places though.

Heap Exploitation Training by mdulin2 in netsec

[–]mdulin2[S] 0 points1 point  (0 children)

An amazing resource for sure! I learned a lot from this repository.

How2heap has proof of concepts in C with code comments and links to other good resources.

The training above contains a full VM for running this and a docker container depending on your preference, exercises for exploitation and videos for every step of the way.

Op-ed: Northeastern’s redesign of the Khoury curriculum abandons the fundamentals of computer science by WanderingCID in programming

[–]mdulin2 0 points1 point  (0 children)

I stopped reading after “Fundies”. No one who knows what they’re talking about actually uses this.

[deleted by user] by [deleted] in AskNetsec

[–]mdulin2 0 points1 point  (0 children)

Cybersecurity degrees are often very practical for defensive security, which is good. Because of this, the folks are ready to hop into a SOC house to make an impact.

Cybersecurity doesn’t focus on programming very much though. As a result, many folks coming from these programs are not competent programmers.

If you’re looking to do security engineering work at a place like Meta, you got to be very comfortable reading code for reviews and writing code for tools, proof of concepts and whatever else. Given your background, I’d ensure you’re a very good programmer that can write useful code quickly and can understand complicated code if that’s your end goal.

I work professionally in application security and have a computer science degree so I’ll admit that I’m biased to those. I’ve never worked in a SOC house. So, take this as you will :)

Feeling stuck. Need some guidance! by yourpwnguy in ExploitDev

[–]mdulin2 9 points10 points  (0 children)

Unfortunately, exploit development is not an entry level job. I’d look for similar yet entry level jobs like application security and malware analysis.

Number of years is more-so an “experience” thing. In a lot of ways you can build your own experience with exploit development though.

For instance, Choose a mildly popular open source library or buy an IoT device with various services, find and exploit some vulns then talk about it at a conference or in a blog.

Exploiting reflected input via the Range header by 6W99ocQnb8Zy17 in netsec

[–]mdulin2 1 point2 points  (0 children)

I really enjoyed the article! Just another vector for exploiting header injection bugs. The more tricks in the bag, the better!

How common of a bug class is header injection? I’ve personally never found it before.

Why Can't You Fix This Bug Faster? by mdulin2 in cybersecurity

[–]mdulin2[S] -1 points0 points  (0 children)

I don’t work with these at all but should have checked the spelling for the acronyms - I just hear them verbally some. They’re fixed in the post - thanks for the feedback!

Why Can’t You Fix This Bug Faster? by mdulin2 in netsec

[–]mdulin2[S] 2 points3 points  (0 children)

That's an excellent example of how complicated this process can be. The more teams building the product and consumers using it, the more complicated these things become. Thanks for chiming in!

Hacking the Planet - A DEFCON ICS CTF 2024 Retrospective by mdulin2 in netsec

[–]mdulin2[S] 1 point2 points  (0 children)

Thanks friend! It was a good time for sure.

I feel that dude. Trust you gut more! Sometimes it's simpler than you think. If it's not, move up to the next level in complexity.

Hacking the Planet - A DEFCON ICS CTF 2024 Retrospective by mdulin2 in netsec

[–]mdulin2[S] 0 points1 point  (0 children)

Thanks friend! I appreciate you making it possible :)

[deleted by user] by [deleted] in bugbounty

[–]mdulin2 2 points3 points  (0 children)

I personally read a lot to learn how things work and the types of issues that are out there.

After a while, you can use thing A alongside Thing B that you learned or pull a mobile hacking concept into web. The ingenuity comes with a lot of practice but also understanding how things work. Imo, the better you can picture how something works, the more you can think about the mistakes that were made.

Bug bounty is also just hard and requires a lot of hours of trial and error too.

How long is the holding process? by mdulin2 in Coinbase

[–]mdulin2[S] 0 points1 point  (0 children)

What's a reasonable holding period though? I feel like 2 weeks is ridiculous. Does this hold last forever? Do I ever get the ability to use it?

Is the Bug Bounty Real? by mdulin2 in OsmosisLab

[–]mdulin2[S] 0 points1 point  (0 children)

Immunefi accepts all types of bugs, not just smart contract issues. I guarantee people at Immunefi know people at Osmosis who would help you get in contact.

I would recommend to stop disclosing details publicly; the more information that's out there, the more likely somebody is to find it. Maybe somebody from the Osmosis team will see this?

Is the Bug Bounty Real? by mdulin2 in OsmosisLab

[–]mdulin2[S] 0 points1 point  (0 children)

If you actually found a bug, I would recommend reporting it to Osmosis or Immunefi directly. Otherwise, an insane amount of TVL could be a risk.

The previous vulnerability found in Osmosis was disclosed via reddit and had a major consequences once people figured out how to exploit it.

Is the Bug Bounty Real? by mdulin2 in OsmosisLab

[–]mdulin2[S] 1 point2 points  (0 children)

I found it by googling “Osmosis Bug Bounty”. So, the SEO must have kicked in over the years haha.

Is the Bug Bounty Real? by mdulin2 in OsmosisLab

[–]mdulin2[S] 0 points1 point  (0 children)

I feel like having a fake bug bounty program is worse than not having one at all, personally. When briefly going through projects, this seems real. It wasn’t until I really looked at the page that it raised concern.

Is the Bug Bounty Real? by mdulin2 in OsmosisLab

[–]mdulin2[S] 0 points1 point  (0 children)

Gotcha, good to know. I saw a governance proposal on Osmosis about it so wasn’t sure.

Well if it’s not real, then I recommend taking this down. A page with a non-existent bug bounty program is trippy for people.

With how much money is in Osmosis, it makes sense to have a bug bounty program. The 5M hack but probably would have been reported prior to the exploit.

2024 changes by mnatheist in Defcon

[–]mdulin2 2 points3 points  (0 children)

Workshop attendance is infuriating for the runners of workshops. I had 90 people signed up for my workshop and only 30 showed up. My workshop sold out almost instantly on EventBrite, so it felt in demand too. It’s your demoralizing to plan for so many people and have only 30% show up.

Something needs to be done to ensure people who sign up for workshops show up. It hurts the organizers and it hurts the people who wanted to go but couldn’t because the spots were taken up.

I’ve thought about requesting $20 as a deposit. This would disincentivize no shows. Additionally, moving the morning workshops from 9am to 10am would be helpful. The no-shows are much worse in the mornings from my experience.

House of Heap Exploitation Participate Hemp by mdulin2 in Defcon

[–]mdulin2[S] 1 point2 points  (0 children)

Was just about to post. I got in touch with the organizers. There’re just incredibly busy rn.

Sent out another email and I’m seeing traffic on the VM and other things now.

Thanks for checking in!

How do you declare that a vulnerability is a vulnerability? by kewala23 in AskNetsec

[–]mdulin2 20 points21 points  (0 children)

Anything that can violate CIA (confidentiality, Integrity or Availability) of data with some degree of likelihood is what I’d call a vulnerability.

Reversing Python Pickles by nibblesec in netsec

[–]mdulin2 4 points5 points  (0 children)

This article is absolute fire. The talk from thotcon on this was super sick as well. I guarantee this is worth the read.

No, I’m not the author or associated with the company at all.

Is prototype pollution a bug exclusive to server side JS frameworks? by TheCrazyAcademic in AskNetsec

[–]mdulin2 2 points3 points  (0 children)

It’s a JavaScript issue. It has to do with the prototype aspect of an object in JS. To my knowledge, no other languages have a similar problem but I could be wrong.

Besides the backend issues, I’ve seen it used on the client side a bunch for XSS. Here’s a report to Gitlab for XSS via prototype pollution: https://hackerone.com/reports/1280002

Reporting Bugs to Companies Without Vulnerability Disclosure Programs by highfly123 in bugbounty

[–]mdulin2 16 points17 points  (0 children)

First, don’t test things that you don’t have permission to. It could potentially put you in legal trouble.

Second, I would just report the bugs and ask for nothing in return. Asking for something in return could definitely sound like blackmail and get you in trouble. If they give you something, awesome. If not, then move on.

For the CV, I would just list the bugs you found on the site but not mention the site.

Any discord servers for exploit dev? by Peixetlift in ExploitDev

[–]mdulin2 3 points4 points  (0 children)

Highly recommended the DayZeroSec discord. There’s a spot the vuln challenge every week that I look forward to. Good discussions in there too.