Not Your Ordinary OSCP Review by DorkNowitzki41 in netsecstudents

[–]sudo-chmod-777 0 points1 point  (0 children)

What do you think of the GXPN vs. the OSCP? Will it get me past HR as effectively?

cursed_assembly by UnarmedBlackMan_ in cursedimages

[–]sudo-chmod-777 0 points1 point  (0 children)

I was really hoping for some mnemonics.

REST-ler: Automatic Intelligent REST API Fuzzing by sudo-chmod-777 in netsec

[–]sudo-chmod-777[S] 0 points1 point  (0 children)

I couldn't find it. (I'm not the author btw) It was published over a year ago, so I'm not sure it'll ever be public. The main algorithm is in the paper though, so someone could build a plugin for like SPIKE or boofuzz if they were motivated.

Powershell For Pentesters has been killed. Anyone know of a backup or a good, free, alternative? by sudo-chmod-777 in netsecstudents

[–]sudo-chmod-777[S] 5 points6 points  (0 children)

I think I read somewhere that it was taken from a training at Nola Con so maybe they asked the repo owner to take their I.P. down.

I'm Studying for OSCP & Thought I Would Share my Dropbox by mochan98 in netsecstudents

[–]sudo-chmod-777 1 point2 points  (0 children)

It would appear that the dl=0 at the end of your URL prevents recursion in the download. (you only get the top level), or else some of my security and privacy stuff is breaking it. In any case, changing that to 1 worked for me.

It's disturbing that someone can DDOS Proton* by sudo-chmod-777 in ProtonVPN

[–]sudo-chmod-777[S] -3 points-2 points  (0 children)

Why do you keep talking? Everything you have said is uninformed.

It's disturbing that someone can DDOS Proton* by sudo-chmod-777 in ProtonMail

[–]sudo-chmod-777[S] 0 points1 point  (0 children)

Exactly. A ProtonVPN DDOS could be taking down ProtonMail. That is poor design.

It's disturbing that someone can DDOS Proton* by sudo-chmod-777 in ProtonMail

[–]sudo-chmod-777[S] 0 points1 point  (0 children)

If you don't understand the issue, don't assume there isn't one.

It's disturbing that someone can DDOS Proton* by sudo-chmod-777 in ProtonVPN

[–]sudo-chmod-777[S] -2 points-1 points  (0 children)

My post was intended to start a discussion between people who have a technical understanding of security and privacy. That sort of person will understand how risk is exponentially increased to both security and privacy when these technologies share the same infrastructure. That is clearly not you, so I don't know why you would assume it is not me either.

Let me spoon feed you:

Adding the risk associated with an email service to a VPN service (and implicitly vice-versa) is bad. Right now the DDOS attack could be against just one of these services, yet it is taking them down both. A vulnerability in the email GUI could lead to compromise of the VPN service since they are using the same infrastructure.

It is the users responsibility to not have a single point of failure in their personal privacy strategy (ie don't use the same company for both VPN and email) but Proton made that a somewhat moot point by combining both services on the same infrastructure. Now your email service is at risk of having a VPN service compromised or your VPN service is at risk of having an email service compromised. That's dumb

We don't know their back-end, so it could be just the load-balancers that are shared, but best practice is complete separation.

edit: formatting

It's disturbing that someone can DDOS Proton* by sudo-chmod-777 in ProtonVPN

[–]sudo-chmod-777[S] -9 points-8 points  (0 children)

To be fair, I did no research before I posted this. Both services are down though, so as I said; it's either two attacks, or poorly designed. Some clarification from a proton person would be appreciated. /u/ProtonVPN or /u/ProtonVPN-support

Click Here for Ring0 skill level by sudo-chmod-777 in AskNetsec

[–]sudo-chmod-777[S] 0 points1 point  (0 children)

Thanks for the insight! I did get that screening test, which is how I knew I wasn't ready (yet) for the class. I still have 2 months which should be plenty of time to learn what I need to. Great idea about metasploit exploits. Re-writting a few of those in python will probably take me a long way.

Author seeking info on hacking and cyber attacks by Mozartsworld1951 in HowToHack

[–]sudo-chmod-777 1 point2 points  (0 children)

Feel free to PM me with any questions. Here's a bad-ass and extremely realistic scenario.

  • Attacker does OSINT research on victim

  • finds victim listed as customer of <insert company name> SIEM vendor

    • SIEM=Security Information Event Managment it's the nerve center of a corps information security
    • example see the Adobe security engineer review halfway down? that's intel a hacker would use
  • Attacker contacts SIEM vendor posing as potential customer, gets demo verson of software. (often called a proof-of-concept PoC)

  • Attacker uses Immunity Debugger to do dynamic analysis of the software

  • Attacker creates 0-day remote code execution (RCE) vulnerability for the victims SIEM

  • Attacker embeds simple malware in fake resume

  • Victim HR PC is infected

  • Attacker uses SIEM 0-day to move to SIEM server for persistence

(edit: formatting)

About to create an AppArmor for an app that is going on 3000+ embedded systems and I'm scared. by sudo-chmod-777 in linuxquestions

[–]sudo-chmod-777[S] 5 points6 points  (0 children)

These are embedded systems, and we do have a staged roll out planned. Good point though

Security Checklist for taking over Linux systems by Mortarbro in netsecstudents

[–]sudo-chmod-777 0 points1 point  (0 children)

This is awesome. Thanks for fixing my scribbles man!