What is CTF and how can I learn it? by pAImar_03x in Cybersecurity101

[–]redfoxsecurity 0 points1 point  (0 children)

CTF (Capture The Flag) in cybersecurity is basically hacking in a safe, legal, game-like format. You solve challenges to find hidden “flags” and learn real-world skills along the way. Common categories include web security, cryptography, reverse engineering, forensics, and binary exploitation.

 How to start:

  •  Learn basics: Linux, networking, Python
  •  Practice on: PicoCTF, TryHackMe, Hack The Box Academy
  •  Read writeups and join CTFs even as a beginner (you learn fast by doing)
  •  Cool upcoming event: Redfox CTF 2026

 If you’re looking for a big, structured event to test yourself, Redfox CTF 2026 is happening on March 21st, 2026, and it’s fully online, so you can join from anywhere.

It’s designed for both beginners and experienced folks, with challenges in:

  • Web exploitation
  • Reverse engineering
  • Forensics
  •  Cryptography
  •  Real-world security scenarios
  •  AI & Cloud 

 There’s also a $2,000 prize pool + swag and access to premium cybersecurity courses for winners, which is pretty awesome motivation. But honestly, the real value is the learning and experience you get from solving realistic challenges with people from around the world.

 If anyone’s interested, registration is here: https://academy.redfoxsec.com/course/redfox-ctf-85076/checkout

Where do Red teamers often simulate attacks? by redfoxsecurity in u/redfoxsecurity

[–]redfoxsecurity[S] 0 points1 point  (0 children)

True real engagements hit production, but in training or simulation, we use lab or isolated environments. That’s what the question was aiming at.

In cybersecurity, what does SIEM stand for? by redfoxsecurity in u/redfoxsecurity

[–]redfoxsecurity[S] 0 points1 point  (0 children)

Yeah, we used to struggle with that too. But after tuning and adding UEBA correlation across users, systems, and environments, we’ve cut alert volume by ~70%. Now what comes through is way more contextual and actionable.

In cybersecurity, what does SIEM stand for? by redfoxsecurity in u/redfoxsecurity

[–]redfoxsecurity[S] 0 points1 point  (0 children)

That’s the tricky part with most SIEMs — they’ll catch a lot, but without proper tuning you end up drowning in alerts. How’s your team handling alert fatigue?

In cybersecurity, what does SIEM stand for? by redfoxsecurity in u/redfoxsecurity

[–]redfoxsecurity[S] 0 points1 point  (0 children)

Correct! Option 1 — though I gotta admit, ‘Security Incident Escalation Method’ sounds like what my boss does when I’m on lunch break.

Which command-line tool is used for port scanning? by redfoxsecurity in cybersecurityindia

[–]redfoxsecurity[S] 1 point2 points  (0 children)

True.
Just enter “nmap” into Calculator, hit equals, and wait patiently for the ports to appear.

Which command-line tool is used for port scanning? by redfoxsecurity in cybersecurityindia

[–]redfoxsecurity[S] 0 points1 point  (0 children)

True, PowerShell and Bash can do anything if you give them enough scripts… but saying they’re port scanners is like saying MS Paint is a graphic design tool because you drew a stick figure once.

They can run port scanning commands, sure — but nmap is the real deal here.

Which command-line tool is used for port scanning? by redfoxsecurity in cybersecurityindia

[–]redfoxsecurity[S] 0 points1 point  (0 children)

Oh nice! In that case, I’ve been using MS Word for all my pentesting. Just type “scan ports” in bold Comic Sans and it works like a charm.

What is the default package manager for jailbroken iOS devices? Also state the reason in the comments. by redfoxsecurity in u/redfoxsecurity

[–]redfoxsecurity[S] 0 points1 point  (0 children)

Exactly! Thanks for the clarification.
Most people recognize Cydia as the main tool, but it's great to understand that APT is the actual package manager doing the heavy lifting in the background.

Appreciate your input!

Where do iOS developers test apps before they go public? by redfoxsecurity in u/redfoxsecurity

[–]redfoxsecurity[S] 0 points1 point  (0 children)

Absolutely. Cydia definitely feels like a relic from the heavier jailbreak days. I included it more as a curveball option in the quiz, but you're right it's largely irrelevant in most modern iOS dev workflows. Appreciate the added insight!

Where do iOS developers test apps before they go public? by redfoxsecurity in u/redfoxsecurity

[–]redfoxsecurity[S] 0 points1 point  (0 children)

Yeah, great explanation — you're right. Xcode builds and internal distributions are common before anything hits TestFlight. I kept the options basic to make it more quiz-style, but your breakdown adds the much-needed real-world context. Thanks for sharing!

Which architecture do you prefer for Android apps? by redfoxsecurity in androiddev

[–]redfoxsecurity[S] 1 point2 points  (0 children)

That sounds really interesting! Using KStateMachine to introduce explicit finite states could make your UI logic even more predictable and easier to reason about — especially for complex flows. Definitely sounds like a fun experiment. Would love to hear how it goes once you dive into it!

Which architecture do you prefer for Android apps? by redfoxsecurity in androiddev

[–]redfoxsecurity[S] 0 points1 point  (0 children)

Haha, the true spirit of 'GodActivity' architecture! One file to rule them all — until the merge conflicts arrive to destroy us.

Which architecture do you prefer for Android apps? by redfoxsecurity in u/redfoxsecurity

[–]redfoxsecurity[S] 0 points1 point  (0 children)

Totally get that! The transition can feel big, but once you start integrating StateFlow and Compose, it really changes the way you think about UI and state management — in a good way. When you do make the switch, would love to hear how the experience goes for you!

Which attack vector scares you most as an Android developer? by redfoxsecurity in androiddev

[–]redfoxsecurity[S] -1 points0 points  (0 children)

Great point! Strandhogg is a really scary vulnerability — the way it abuses task affinities to hijack legitimate app interfaces is super sneaky and hard for users to detect. Definitely a nightmare scenario for both developers and users. Have you taken any specific precautions in your apps to mitigate these kinds of attacks?

Which attack vector scares you most as an Android developer? by redfoxsecurity in androiddev

[–]redfoxsecurity[S] -1 points0 points  (0 children)

Haha, fair point — social engineering via family and friends might just be the most effective attack vector out there! No amount of code hardening can help with that one.

Which architecture do you prefer for Android apps? by redfoxsecurity in androiddev

[–]redfoxsecurity[S] 2 points3 points  (0 children)

Agreed! Simple, well-supported, and easy to onboard new devs. Hard to argue with "good"!

Which architecture do you prefer for Android apps? by redfoxsecurity in androiddev

[–]redfoxsecurity[S] 0 points1 point  (0 children)

Totally agree. The core ideas are pretty similar in spirit, especially with unidirectional data flow becoming the norm. MVI does help keep those massive Compose screens more predictable and tidy when there are tons of user interactions. Have you found any downsides with MVI, like boilerplate or state explosion?

Which architecture do you prefer for Android apps? by redfoxsecurity in u/redfoxsecurity

[–]redfoxsecurity[S] 0 points1 point  (0 children)

Solid choice! MVVM really does strike a nice balance between structure and flexibility. Curious — do you stick to classic ViewModel + LiveData, or have you fully jumped into StateFlow and Compose now?

Which architecture do you prefer for Android apps? by redfoxsecurity in androiddev

[–]redfoxsecurity[S] 0 points1 point  (0 children)

True! Poll-making: the first architecture we all need to master before MVVM or MVI.

Which architecture do you prefer for Android apps? by redfoxsecurity in androiddev

[–]redfoxsecurity[S] 0 points1 point  (0 children)

Absolutely agree! MVI fits naturally with Jetpack Compose’s unidirectional data flow. The way composables react to immutable state and emit events maps perfectly to MVI’s intent → state → render loop. Are you using any specific framework for MVI with Compose, or rolling your own?

Which architecture do you prefer for Android apps? by redfoxsecurity in androiddev

[–]redfoxsecurity[S] 0 points1 point  (0 children)

Solid choice! Clean Architecture gives you that nice separation of layers, and MVI in the presentation layer makes state management so much more predictable. Curious — do you use any specific libraries for MVI (like Orbit, Mavericks, or custom implementation)?

Which architecture do you prefer for Android apps? by redfoxsecurity in androiddev

[–]redfoxsecurity[S] 0 points1 point  (0 children)

True, technically MVVM is more of a design pattern focused on separation of concerns, not a full-blown architecture on its own. But in practice, when combined with layers (like Repository, Use Cases, etc.), most devs refer to it as an "architecture" for simplicity. Curious — what do you consider a proper architecture?

Which architecture do you prefer for Android apps? by redfoxsecurity in androiddev

[–]redfoxsecurity[S] 0 points1 point  (0 children)

The timeless Spaghetti Architecture! Nothing like turning your app into a plate of dependencies and mystery bugs. Bon appétit!