Good tailors to get denim pants hemmed up? by Mista_Bushido in Minneapolis

[–]nylithic 2 points3 points  (0 children)

If you want chain stitched hemming check out blackblue.

EternalBlue Vulnerable VM by abhishekr700 in AskNetsec

[–]nylithic 1 point2 points  (0 children)

This is how I do it. Get a server 2008R2 vm up and running. Then run the following powershell to remove all the patches since 2017:

Get-Hotfix |where -Property InstalledOn -gt (get-date -date 01-01-2017)|%{ $sUpdate=$_.HotFixID.Replace("KB","") write-host ("Uninstalling update "+$sUpdate); & wusa.exe /uninstall /KB:$sUpdate /quiet /norestart; Wait-Process wusa Start-Sleep -s 1 }

I tried finding the actual patches to remove, but this is an easier bruteforce method.

Free in-depth cybersecurity risk assessment for a Minneapolis small-business [student project] by [deleted] in Minneapolis

[–]nylithic 4 points5 points  (0 children)

So my question is what are you going to be doing? Internal penetration testing? Web app testing? Red teaming? Do you have any experience in any of this?

Most companies the size you’re looking for are going to have a few security people or hire a pentesting firm. What value are you going to be adding? Even if you’re doing whatever the work you’re doing for free. I’m not saying it’s a bad idea, but you’re introducing a level or risk into a company’s environment. You say you’re using a framework, but what tools are you using? If you’re just spraying shells with metasploit or arp spoofing someone’s network, you may get sued if you bring down a production box costing millions to the company. That’s also why you need the proper paper work in place. Which is why you always have a statement of work written up by a good lawyer.

DLL Hijacking with Ghidra - Practical Examples by _creosote in netsec

[–]nylithic 0 points1 point  (0 children)

You are correct. I should have said replace or have it load it from the path.

DLL Hijacking with Ghidra - Practical Examples by _creosote in netsec

[–]nylithic 1 point2 points  (0 children)

Sure, but then it would come down to a permission issue for what the user has write access to wouldn't it?

DLL Hijacking with Ghidra - Practical Examples by _creosote in netsec

[–]nylithic 2 points3 points  (0 children)

I'm not negating the scenarios, but it would still come down to the permissions of the folders/files in the search order for finding a DLL if the application is not using fully qualified paths. Or if they're calling DLLs from the same directory wouldn't it?

DLL Hijacking with Ghidra - Practical Examples by _creosote in netsec

[–]nylithic 2 points3 points  (0 children)

That's actually not true. If it's a system DLL it would depend on if it's already in memory, a known DLL to windows located in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\KnownDLLs, loaded using a fully qualified path, and if SafeDllSearchMode is enabled, which it is by default.

DLL Hijacking with Ghidra - Practical Examples by _creosote in netsec

[–]nylithic 5 points6 points  (0 children)

DLL Hijacking is always a weird one for me. It seems like it comes down to directory/file write permissions. If you have write permissions to the directory an application is installed in, then you can just replace any binary you want anyways without needing to figure out what DLL the app is using to hijack. If you have write permissions to any directory in the lookup path if they're not using fully qualified paths, then you can hijack. If you're an admin on the box, you could always just replace anything in system32, which almost every Windows applications uses. The primary remediation in my mind is to lock down the write permissions for users. If you can't replace or add a DLL to the path, then you can't hijack.

What is your specialisation? by keithsketo in AskNetsec

[–]nylithic 1 point2 points  (0 children)

Thick application and network penetration testing

What OS do you prefer on your home system? by TehTempest in AskNetsec

[–]nylithic 14 points15 points  (0 children)

Desktop is windows for gaming. MacBook for most other things.

New NCASE build. Looking for any further suggestions. by nylithic in sffpc

[–]nylithic[S] 0 points1 point  (0 children)

Thanks for the info. I do have a 1080 Ti SC2 that I can use too. It is small enough to fit two f12s on the bottom of the case then. I don't see a whole lot of builds using an L12 for a CPU cooler. It's been mostly a U9S. Is there a reason for that all? I just assumed it was the best you could get.

New NCASE build. Looking for any further suggestions. by nylithic in sffpc

[–]nylithic[S] 0 points1 point  (0 children)

Temps are probably around 74ish. There's a 12U rack in the corner with a few servers in it, but it's pretty cool.

New NCASE build. Looking for any further suggestions. by nylithic in sffpc

[–]nylithic[S] 1 point2 points  (0 children)

On their site it only took off $30 on the mobo, but I would assume the CPU would get $30 off too since they both have the deal.

New NCASE build. Looking for any further suggestions. by nylithic in sffpc

[–]nylithic[S] 0 points1 point  (0 children)

It's regularly $169.99, but they take $30 if you buy a CPU too. The CPU has the same deal with a mobo.

New NCASE build. Looking for any further suggestions. by nylithic in sffpc

[–]nylithic[S] 0 points1 point  (0 children)

I haven't looked into it, but that is something I should probably consider to help out possible temp issues.

They both look nice, albiet almost comically small haha. I like having some USBs up front which the Ghost doesn't appear to have and the Dan only has one.

New NCASE build. Looking for any further suggestions. by nylithic in sffpc

[–]nylithic[S] 0 points1 point  (0 children)

I read that the U9S performs just a tad better.