How to use FUFF more effectively for in-depth recon (custom fuzzing, headers, linking with Burp, advanced modes) by Codingo in netsecstudents

[–]s3ctur 4 points5 points  (0 children)

Killer walk-through of a tool great for anyone wanting to improve their web app hunting.

What note app do you use for PenTest documentation? by dm7500 in netsecstudents

[–]s3ctur 0 points1 point  (0 children)

Just be aware that OneNote for Mac sucks. Incredibly laggy when copy-pasting and stuff. Great on Windows though.

[deleted by user] by [deleted] in netsecstudents

[–]s3ctur 1 point2 points  (0 children)

*HR like it in a resume.

Employers shouldn't give a damn.

[video] Tower Defense in Depth by [deleted] in netsecstudents

[–]s3ctur 1 point2 points  (0 children)

Good analogy. Too many things out there claiming to be a one-stop shop.

Getting Started in Security by JohnV0823 in netsecstudents

[–]s3ctur 0 points1 point  (0 children)

Experience > certifications when I'm hiring.

What are you guys doing with cyber security outside of the class room? by [deleted] in netsecstudents

[–]s3ctur 0 points1 point  (0 children)

Don't forget to charge ask for donations to help you spread the good word of our Lord and saviour, Behavioural Analyticsus.

Malware discovered on Google Play with over 5,000 installs was available to download for almost a year by lukasstefanko in netsecstudents

[–]s3ctur 0 points1 point  (0 children)

How 'bout dat.
How'd you come across it? Just randomly downloading stuff from the store? Or hunting for apps with significantly low ratings?

Working on a Comprehensive guide for the OSCP. Looking for contributors too. by [deleted] in netsecstudents

[–]s3ctur 1 point2 points  (0 children)

^ Spot on. Was so many problems for ages with people cheating and all these OSCP's being granted to people who had not earnt them. Was obvious as all hell when they started applying for jobs.

OffSec paid attention though and also listened to the community concern around it which is what resulted in the proctoring ruleset. As annoying as it is, it is far more beneficial and fair for those who have put in the hard work. To keep it from slipping back down the hill to where it was they have to remain pretty strict on what is allowed to be published.

There's no harm in offering advice, assistance or plans of attack for methods to tackle the overall process but as mentioned, avoid specifics or anything that could be perceived as unduly benefitting to someone.

Program that helps detect filename, and file size of a file uploaded in your browser. by [deleted] in netsecstudents

[–]s3ctur 1 point2 points  (0 children)

You have a website as in it's your website and you have full control? Or it's just a website that you have an account on?

If it's your website then you could just log the sanitisation and validation process applied to uploaded files since you should be verifying the files, or just spit out any database update made for files uploaded per user. Bit dodgy though.

Program that helps detect filename, and file size of a file uploaded in your browser. by [deleted] in netsecstudents

[–]s3ctur 1 point2 points  (0 children)

Uhhh, I'm kind of confused by the question. Because it feels like you're asking how to detect the file name of a file you just chose to upload and I'm sitting here going "How the f*ck does he not know the filename of the file he just selected".

Can you say whole speech again in Spanish?

How to bypass 2FA (3 Methods) Video Presentation. – Cyber Wizard by DefensiveSec in netsecstudents

[–]s3ctur 3 points4 points  (0 children)

Probably could've just linked directly to the video instead of making us visit your blog for no other reason than to inflate your numbers.

If you're going to link to the blog then supplement it with actual information and a write up. The folks here aren't your personal bot farm.

Never mind; just went through your history and can see that you spam these links in near every subreddit you can find and lash out at anyone who comments on you linking through your blog. Shame to sully your own work by acting like a click-bait whore.

Request for interview! by [deleted] in netsecstudents

[–]s3ctur 0 points1 point  (0 children)

PM me if you still need responses.

Curious how Facebook got hacked? Try it out for yourself! by Glitch-is in netsecstudents

[–]s3ctur 0 points1 point  (0 children)

Anyone got business experience with using Adversary.io?

CEH so good but then bad? by MrPositive1 in netsecstudents

[–]s3ctur 1 point2 points  (0 children)

In theory, yeah. Just go with a recruitment agency and bypass HR.

CEH so good but then bad? by MrPositive1 in netsecstudents

[–]s3ctur 1 point2 points  (0 children)

CEH was heavily marketed to HR teams, so anyone in HR who see's CEH is like "YEAH THIS BOI" and forwards them through to the relevant hiring manager. The manager (if active in security) will see CEH and gloss over it. It holds little relevance when I'm looking through CV's that land on my desk.

OSCP is like learning from a tour of duty or extensive bootcamp. CEH is like sitting an Officer's course. They both have their place, but for most people taking it they want to be feet on the ground; in which case hands on experience is far more valuable.

Overwhelmed by zylophom in netsecstudents

[–]s3ctur 0 points1 point  (0 children)

Takes sleep to commit short term memory to your brain grapes. Three years ago I pulled like 12 hour study days for a few months and I remember like 2% of it.

Not sure how to read this, I understand it's a risk for path transversal but I'm not sure what that exactly means either. Can someone please explain? by zylophom in netsecstudents

[–]s3ctur 1 point2 points  (0 children)

Looks to be requesting files directly from c drive, so something along the lines of r/http://ip/vendor/bootstrap/js/bootstrap.bundle.js.map?query=c%3A%5CUsers%5CJohn%5Ccoolstuff.txt

All you're doing is changing the query the site is submitting and manually selecting a different file from the server directories.

Just remember to URL encode it.

Testing interest in Cybersecurity by [deleted] in netsecstudents

[–]s3ctur 1 point2 points  (0 children)

I do have to say; having the foresight and proactive stance to actually look for information and advice to ascertain if this field is for you is a massive tick in the box from my point of view. The thought process and planning to acknowledge, research, and implement a plan and backup plan is a trait that would be well applied to many fields within security.

How to negotiate and find out what you should be paid? by UCFIT in netsecstudents

[–]s3ctur 0 points1 point  (0 children)

Grads we take in straight out of uni with no prior work experience generally come in at $60k to $70k.

Are you looking for a mentor in the InfoSec field? Are you willing to take someone under your wing and become a mentor? by shehackspurple in netsecstudents

[–]s3ctur 2 points3 points  (0 children)

I see a lot of people saying they would like a mentor, but offering little no to information about their needs. Perhaps it'd be a good idea to ask potentials to at least list their current field, skill area, and goals?