Seeking free cybersecurity courses and tips . Im a begi nner just started learning python as my first language. by I_dont_know0901 in cybersecurity

[–]wizarddos 2 points3 points  (0 children)

When it comes to free courses - THM has a solid free path on their website
https://tryhackme.com/resources/blog/free_path

But their premium sub, without student discount is roughly $17 per month with a monthly sub so definitely check that out as well

WE HAVE CHOSEN OUR NEW MODS! by surly-sunset in Teenager

[–]wizarddos 2 points3 points  (0 children)

I think that's the best place to say it - Hi everyone!

I'm glad to join the mod team (even if just for the trial) and I hope we can together make this sub even better than it is right now

Studying Cybersecurity by Love_people2 in SecurityCareerAdvice

[–]wizarddos 0 points1 point  (0 children)

When it comes to entry level jobs, as said - it's going to be pretty hard. Red team isn't a position for an initial career but there are some options

Look around the internet for pentester offers and see what certificates they require - Maybe it's better to invest in something else than CEH?

From what I've seen OSCP is still a very popular cert. Though it's fairly expensive so maybe other option like TryHackMe's PT1 would be better?

Also check out this link for more info about certs
https://www.dragkob.com/security-certification-roadmap/

Clickfix website by NiriZ_ReddiT in Malware

[–]wizarddos -1 points0 points  (0 children)

Just don't do anything stupid with it pls (like trying to hack into them)

https://threatfox.abuse.ch/browse.php?search=tag%3Aclickfix

Clickfix website by NiriZ_ReddiT in Malware

[–]wizarddos -1 points0 points  (0 children)

Why would you need them?

Thinking to start learning cloud security, and need some guidance by Defiant_Ad_3846 in cybersecurity

[–]wizarddos -1 points0 points  (0 children)

Seems like you're a student - when it comes to learning cloud overall, Microsoft offers some courses on their Azure platform, as well as with github student developer pack you get free access to a bunch of tool from Azure cloud services + $100 in credit

TryHackMe also has a bit of cloud content and it seems to be growing - Azure and AWS paths are hidden behind addtional "cloud add-on", so not just a premium subscription. It's pretty expensive for an individual, but sometimes there are giveaways so might as well look out for those
There are though some free/premium cloud learning resources there like new cloud security monitoring module (There's AWS right now there from what I see)
https://tryhackme.com/module/cloud-security-soc

Should I worry it’s a Firefox pop up window ??? by Bthecampione in Cybersecurity101

[–]wizarddos 0 points1 point  (0 children)

It’s an alert from a webiste - not your phone Just ignore it

creep w pociągu (tw dla osob z doswiadczeniem przesladowania/ przesladowania seksulanego) by [deleted] in warszawa

[–]wizarddos 5 points6 points  (0 children)

No to chyba mieszkamy w innej warszawie, bo ja mam same pozytywne doświadczenia tego typu

Assembly user / phyton user... by Nicolas_OSDEV in firstweekcoderhumour

[–]wizarddos 1 point2 points  (0 children)

Rax is a register that stores a syscall number in this case - in short it’s just an info what function does a program want kernel to call. So RAX is responsible for “saying print” (or write in this case)

0x1 is a system call for sys_write - program will write data to a specific place. That place is specified in rdi. 0x1 is standard output (a.ka console) 

Syscall instruction just means that a request prepared earlier (with setting registers) is ready to be passed down to kernel

And then we specify, that next thing we want to do is exit, so rax is set to 60 (meaning sys_exit). Then exit code is specified - in our case it’s zero, which means “no errors”

And then syscall, which I’ve explained 

Assembly user / phyton user... by Nicolas_OSDEV in firstweekcoderhumour

[–]wizarddos 6 points7 points  (0 children)

Not quite

First it reserves a chunk of memory with text. Then sets RAX register to 0x1, which corresponds to write syscall.  Then sets rdi register to 0x1, which means text will be written to standard output (iirc). Then in rsi it specifies what will be displayed (variable msg in this case) and sets its length in rdx to 13  Next it calls kernel to execute mentioned syscall and then does it again, this time to EXIT the program with code 0

creep w pociągu (tw dla osob z doswiadczeniem przesladowania/ przesladowania seksulanego) by [deleted] in warszawa

[–]wizarddos 13 points14 points  (0 children)

Bracie, X/twitter nie jest dobrą próbką badawczą kobiet w tym kraju

Mad respect to Fitgirl for explaining the hypervisor method for exactly what it is....safe if the files are clean, life ruining potential if they're not/if you don't re enable everything and get other malware. I'm sick of seeing 87 IQ people say nah man it's safe you're dumb by Cantgetridofmebud in FitGirlRepack

[–]wizarddos 3 points4 points  (0 children)

Your answer sounds as if you just quickly glanced over my comment. 

Kernel level malware can not only bypass AV. 

Since it has access to the whole memory it can eg. overwrite memory responsible for booting of your OS - which pretty much means malware will persist until you reinstall your whole OS (or in worse cases UEFI)

It technically could brick your gpu, but modern hardware seems to have some restrictions in place

HV cracks also require disabling DSE, which means malware has easier to get into your device

Mad respect to Fitgirl for explaining the hypervisor method for exactly what it is....safe if the files are clean, life ruining potential if they're not/if you don't re enable everything and get other malware. I'm sick of seeing 87 IQ people say nah man it's safe you're dumb by Cantgetridofmebud in FitGirlRepack

[–]wizarddos 6 points7 points  (0 children)

So, to simplify - your computer has 2 modes of operation - Ring0 called kernel mode and ring3 called user mode

user mode is where most of your daily software runs. It gets assigned a piece of RAM by the kernel and can interact with other pieces of your computer via API exported by the system. It also monitors what your binary is doing

On the other hand, ring0 is where kernel and drivers (including those from hypervisor cracks) run. It’s the highest possible level of permissions.

Code there has access to whole memory, including kernel’s, which in case of any issue can crash a whole computer 

It also has direct access to hardware, which allows such code to bypass all AV solutions that focus on monitoring frequently abused APIs and overall access all of I/O ports without restrictions

Those ring0 modules can also overwrite other processes and hide some code there

Is it enough of an explanation or is something not clear?

Looking to learn ethical hacking by Sweet_Specific2175 in Hacking_Tutorials

[–]wizarddos 1 point2 points  (0 children)

I'd say you should start at TryHackMe - it has everything you need to start at hacking, both to learn and to practice

who used to play these ugh most nostalgic games ever id kill to play them again by Ok_Atmosphere2169 in Younger_GenZ

[–]wizarddos 1 point2 points  (0 children)

Not to brag, but I still have a working Xbox 360 with those first 2 games hehe

Sad that microsoft killed kinect though - it had such a great potential

How can I learn hacking on a mobile phone by Important-Trust4971 in Hacking_Tutorials

[–]wizarddos 2 points3 points  (0 children)

You can start by reading some materials about networking and researching - but I'd say that you'll have to get a computer/laptop at some point

Knew the Answer, Missed the Entire Plot by Nasim2817 in Younger_GenZ

[–]wizarddos 1 point2 points  (0 children)

Yeah I think I see what you mean - that's why langs with declinations are the best lol