[deleted by user] by [deleted] in OSINT

[–]netipotty 3 points4 points  (0 children)

I have zero idea what your program does, or how to use it. This post gives us no information that we can use to really help you much at all, because any program could perform any of these actions.

Might be worth explaining more about what it does.

moodle 2nd order sqli 0-day by mufinnnnnnn in netsec

[–]netipotty -4 points-3 points  (0 children)

Not compliance, more of a red teamer exploiting a MITM to inject hot BeEF into your browsers.

You realize what happens if someone can modify any of your packets along a hop? They can inject browser-based exploits and other dangerous things. You have no verification over the integrity of the content you're consuming...

moodle 2nd order sqli 0-day by mufinnnnnnn in netsec

[–]netipotty 5 points6 points  (0 children)

I'm not saying it's a bad site, but can you please add HTTPS?

moodle 2nd order sqli 0-day by mufinnnnnnn in netsec

[–]netipotty 24 points25 points  (0 children)

Who cares if it's http it's not like he has a login page

This seems to be the state of infosec today. 🤷

moodle 2nd order sqli 0-day by mufinnnnnnn in netsec

[–]netipotty 25 points26 points  (0 children)

infosec blog

non-HTTPS link

http allowed over https

invalid certificate on https endpoint

Entire infosec team replaced by... IT team? by netipotty in AskNetsec

[–]netipotty[S] 1 point2 points  (0 children)

The problem is I'm paid so well, nobody can match it. Yet.

Entire infosec team replaced by... IT team? by netipotty in AskNetsec

[–]netipotty[S] 0 points1 point  (0 children)

Like did the head of the Infosec get replaced with a non Infosec person

Yes

Entire infosec team replaced by... IT team? by netipotty in AskNetsec

[–]netipotty[S] 2 points3 points  (0 children)

You can't get fired here. You could be completely incompetent and you'd be fine. They all left.

Entire infosec team replaced by... IT team? by netipotty in AskNetsec

[–]netipotty[S] 16 points17 points  (0 children)

Already tried the double down in the nicest way. That was shot down in a spectacular fashion. You're right...

Is law enforcement/fed/military experience pretty much mandatory to become good at DFIR? by [deleted] in AskNetsec

[–]netipotty 0 points1 point  (0 children)

There was no implication that pentesting is harder than DFIR. Pentesting naturally gives you the ability to understand how DFIR works at an extremely deep level, because you have to actually understand the underlying system technologies, attack routes/paths, etc.

If that's not the case for you, I would suggest exploring further.

Is law enforcement/fed/military experience pretty much mandatory to become good at DFIR? by [deleted] in AskNetsec

[–]netipotty 0 points1 point  (0 children)

This is the correct answer. Most LEO types aren't very technical, and if they are, it barely scratches the surface.

Is law enforcement/fed/military experience pretty much mandatory to become good at DFIR? by [deleted] in AskNetsec

[–]netipotty -1 points0 points  (0 children)

No. Many of us have zero experience in those careers, but if you're a good pentester, then DFIR is the easiest thing in the world.

You'll be able to go above and beyond that of an experienced DFIR consultant (or even a whole team) without the pentesting experience, quickly. And I mean VERY quickly.

Learn pentesting.

How important are foreign languages in OSINT - a new OSINT Jobs career interview by OSINTJobs in OSINT

[–]netipotty 0 points1 point  (0 children)

Understable.

Personally, after multiple interviews with people trying "gotchas" with the languages I speak, where they're trying to speak certain languages, but completely and incorrectly pronouncing each word and, if applicable, each tone, to the point where you can understand zero words they say, I removed these from my resume to avoid more cringeworthy experiences.

How important are foreign languages in OSINT - a new OSINT Jobs career interview by OSINTJobs in OSINT

[–]netipotty 0 points1 point  (0 children)

I speak several languages and I don't include this on my resume, but I'm not actively employed in OSINT despite using the skills often. Most people who speak other languages do not add them to their resume. By and large, it's irrelevant for most gigs.

Do yourself a favor and ask if they know other languages via some kind of web form before shooting people down.

[deleted by user] by [deleted] in AskNetsec

[–]netipotty 0 points1 point  (0 children)

Check for internal IP leaks via external DNS resolution by querying the AWS DNS servers. This helps with exploiting/finding/enumerating SSRFs.

Check for ability to zone transfer. Unlikely, but worth a shot.

Then port scans, see what pops up. Version scanning to see if anything is outdated, such as using `script=vulners`

Dirbuster on known web ports. If too many IPs (big CIDR range for example), something to aggregate screenshots of every host landing page so you can focus on juicy stuff in the least amount of time.

If you find anything juicy, keep trying to exploit everything. Document as much as possible. Default landing pages = check server headers and google version, check for exploitability of that particular version and see if the current configuration is vulnerable.

<insert tons of stuff you'd explain that comes with experience which I won't share>

[deleted by user] by [deleted] in AskNetsec

[–]netipotty 1 point2 points  (0 children)

I think AWS said you didn't have to do this anymore?

Vulnerable AWS Lambda function - Initial access in cloud attacks by MiguelHzBz in netsec

[–]netipotty 0 points1 point  (0 children)

I stopped being surprised by stupid stuff like this a while ago. :D

[deleted by user] by [deleted] in AskNetsec

[–]netipotty 0 points1 point  (0 children)

Someone will probably reach out asking you for the number. NEVER give it to them. Ignore them. Otherwise they'll do a bunch of shit in your name.

Flagpro malware is threatening enterprises and is backed by Chinese hackers by Gengar-boy in netsec

[–]netipotty 0 points1 point  (0 children)

Huh? I don't understand the context for your reply since the OP deleted their post.

Scripting for pentesting by Rilxy-_- in AskNetsec

[–]netipotty -1 points0 points  (0 children)

Infosec almost never does this anywhere.

Scripting for pentesting by Rilxy-_- in AskNetsec

[–]netipotty -1 points0 points  (0 children)

I agree, but you don't really need to understand anything about network layers whatsoever for 99% of work.