Anyone got recommendations for a good security podcast?
Elijah Cooper
proxies are garbage thats baby tier security this isnt 20th century
James Powell
So about that esr dude. I like his writing and his ideas but how do you make a living being a hacker according to his view of the term? How do you get food in the table only writing open source / free software?
Cameron Evans
On the table *
Also I wonder how this topic seemingly attracts nobody. Not even (that many) snarky comments.
Josiah Sanchez
I'm interested but have no time because of work.
David King
does the hackrf one make a decent spectrum analyzer or is it really that much better to get expensive equipmen?.
Gabriel Moore
you get hired by a company doing open source development or create a software support company that sells technical support to companies using open source software. there's no money in giving your stuff away for free, but maybe you can hack that system and figure something out.
Alexander Morris
I've only ever heard that you should buy Ettus Research or better.
Jace Anderson
aes-xts-plain64
what does plain64 mean? is it plain text? Also i hear xts is bad. what should i use instead,and how to change it
Michael Morris
Defensive Security is pretty good
Robert Flores
Risky.biz is fab
Liam Taylor
How would one get started in bug bounties and such? Should I start off spending loads of time on sites like root-me, dvwa etc to build up skills then move on to bounties? Or should I just try and try and try on "real" websites and learn that way?
Parker Allen
>be me >want to debug elf file in debugger >download edb-debugger (open source). >doesn't have any 3rd party plugin, especially to hide debugger >missing features from closed source Windows debugger >run application >closes itself because it detects debugger >close edb-debugger >segmentation fault
4/10 see me after class.
Jayden Sanchez
i thought bug bounties were offered on specific products? maybe you should start by working on those products.
Levi Evans
They are - what I meant was should I start by trying to attack those products, or should I start by spending loads of time on practice sites (as in, which would I learn more from and make better progress in). Perhaps I am best to take the direct approach though!
Caleb Nelson
What about VPNs? Now lets say a VPN wasn't available and you needed to use a proxy, would proxies like hidemyass be good?
James Brown
what's with endbranch? can you still jump into the middle of an instruction as long as the bits match endbranch? what about direct jumps?
Gavin Foster
if you have the skills, don't waste time on contrived tests. the real stuff is much more tricky and as long as you can legally attack an application or system you should legally attack that application or system.
Adam Howard
only if you chain proxies through multiple jurisdictions and bounce through a few different anonymous hosts.