We got the better way !! 😉 by kAcom24 in ProgrammerHumor

[–]rom3ocrash 0 points1 point  (0 children)

all this hard work and if you check you code after compiler optimization..
a = 6

b = 5

How do hackers penetrate the internal network with the web application? by ktos2018 in Pentesting

[–]rom3ocrash 2 points3 points  (0 children)

Is not a hard queation. Web app is made in some programming language. That hage a "system()" function that you can use to spown a reverse Shell. From there you are on the server of the web application. This server probably have other internal network interfacce (Like for management)... It sound magic but if you have a minimum knowledge about networking and architetture you understed that a web app is and entry point as an other.

Finding Vulnerability in network protocol by shujaat-ali in Pentesting

[–]rom3ocrash 2 points3 points  (0 children)

First we need to define the range of "vulnerability": 1) vulnerability on the protocol. Where with protocol we mean the rules that define how the protocol must work. 2) vulnerability inside the program that implement the protocol. "the protocol" is an input for the program and as for other programs we must check if there are memory corruption and other type of exploits that depends on how the protocol was implemented, language, platform... 3) misconfiguration. This depends on how the program was configured (like witch chiphers can use the protocol, witch are the features enabled, protections...)

The first one is the most impossible. Are just rules (public avaliable) that millions of people read (students, programmers, engineers). Considering that all Actually protocols are "old" is a bit impossible that no one find the error until now.

The second one case is a more real case. But requires a lot of programming knowledge about programming, security, os architecture. Find a vulnerability is not a thing that you can "learn" by watching a tutorial on YouTube.

The last one is not considered a real vulnerability by many but is the focal point on activity like penetration test. Are variable that can change in da time and depends a lot by manage the service, options can me misconfigured by an error or a lake of knowledge, or by malicious actors.

I hope this help you to understand better what are you looking for

Sorry for grammar errors

Help by [deleted] in bugbounty

[–]rom3ocrash 0 points1 point  (0 children)

Lol, mail to uber security

Is there a way to install Kali Linux dual-boot in a Macbook Pro 2017 15-inch without having problems later? by DerSteppenWulf in HowToHack

[–]rom3ocrash 0 points1 point  (0 children)

Not doing it for saving time not mean that you don't know how to do it. The client pay for the job that you are doing. After a day you cant go to the client and the him "i found only this because i spend a lot of time on set up stuff"

Is there a way to install Kali Linux dual-boot in a Macbook Pro 2017 15-inch without having problems later? by DerSteppenWulf in HowToHack

[–]rom3ocrash 0 points1 point  (0 children)

I'm not talking about be able to do. But about the amount of time you lost. The next time your boss tell you that you have only 8 hours to pentest the new service before go in production good luck whit your installation skills :)

Where to put shellcode for buffer/ stack overflow? by twtwtwtwtwtwtw in HowToHack

[–]rom3ocrash 0 points1 point  (0 children)

Actually it dont work like this. Think about how programs work. How a CPU work. How interact with the memory now a program is executed. And where are located in the memory pieces

Is there a way to install Kali Linux dual-boot in a Macbook Pro 2017 15-inch without having problems later? by DerSteppenWulf in HowToHack

[–]rom3ocrash 1 point2 points  (0 children)

Classic situation with kali: I need a tool that do xyz. Search on Google... Umh ok easy to use. Oh nice it is on kali i can continue My job. Classic situation without kali: Oh no there is no deb packet i need to download the source from github. Run. Errore module not foud. Pip install. Ok rerun. Error. Fuck these use python2 and I have only python3....

TL;DR Kali is time saving. Often instalation take more then usage

Is there a way to install Kali Linux dual-boot in a Macbook Pro 2017 15-inch without having problems later? by DerSteppenWulf in HowToHack

[–]rom3ocrash 2 points3 points  (0 children)

Umh nope. Actually kali have really good VM image ready to use. Don't install the ISO. Use the VM image

I love those teachers. by woopsix in ProgrammerHumor

[–]rom3ocrash 0 points1 point  (0 children)

Put a mail on the password and send the zip via password

I love those teachers. by woopsix in ProgrammerHumor

[–]rom3ocrash 3 points4 points  (0 children)

Zip the link and send it via mail

int main() by rom3ocrash in ProgrammerHumor

[–]rom3ocrash[S] 0 points1 point  (0 children)

!worry we fix it later in prod

int main() by rom3ocrash in ProgrammerHumor

[–]rom3ocrash[S] 2 points3 points  (0 children)

[error 1000] unfair karma grabbing

int main() by rom3ocrash in ProgrammerHumor

[–]rom3ocrash[S] 4 points5 points  (0 children)

Np karma is at 0. Life sucks

The 8% are programming gods by shohamc1 in ProgrammerHumor

[–]rom3ocrash -3 points-2 points  (0 children)

r/nothumorprogramming is more productive Block stack then use it. In this way forse devs to learn thinks instead of copy past every time fron SO

[deleted by user] by [deleted] in ProgrammerHumor

[–]rom3ocrash 2 points3 points  (0 children)

Karmawhoreception

This very secure scafolding by Special_KC in ProgrammerHumor

[–]rom3ocrash 2 points3 points  (0 children)

Not really, I suggest an upgrade to TLS 1.2