We have an irc edition

We have an irc edition

Join us at irc.rizon.net #/nsg/

This is a general thread for discussion, questions and help about cybersecurity and related topics.
Before asking questions, consider these helpful resources:
wiki.installgentoo.com/index.php/Netsec_general
wiki.installgentoo.com/index.php/Security
wiki.installgentoo.com/index.php/Passwords
wiki.installgentoo.com/index.php/Encryption
wiki.installgentoo.com/index.php/Anonymising_yourself

Current Topics can be found down here:

krebsonsecurity.com/
isc.sans.edu/https://www.schneier.com/

Things to do:

set up cyber war game
vote on these polls
strawpoll.me/12173169
strawpoll.me/12173197
create a pastebin full of useful links

Other urls found in this thread:

pastebin.com/UY7RxEqp
shodan.io/report/DCPO7BkV
protonmail.com/blog/tor-encrypted-email/
bleepingcomputer.com/news/security/new-satan-ransomware-available-through-a-ransomware-as-a-service-/
whitehouse.gov/america-first-foreign-policy
youtube.com/user/BlackHatOfficialYT
youtube.com/user/DEFCONConference
overthewire.org/wargames/
ssd.eff.org/en
wiki.rizon.net/index.php?title=CertFP#Introduction
fsf.org/resources/hw/endorsement/respects-your-freedom
twitter.com/SFWRedditGifs

...

Bump from the last page. Also, you did not include some useful links from the previous thread. But thank you for filling my irc request.

Bump for actual content on Sup Forums. Will join irc at some point

sorry about that just re-post the links i need to start making the pastebin

> Linux kernel
> None of that stuff is actually a kernel

pastebin.com/UY7RxEqp
this is the first batch of links so far we need more and organization

bump for interest in wargames and other CTF related things

bump

>He isn't part of Sup Forums's new security/hacking irc yet

bump

Old OP here, thanks for filling in, had a busy day today.

Current Topics

> State of Heartbleed January 2017: ca. 200000 servers still vulnerable
shodan.io/report/DCPO7BkV

> ProtonMail goes Tor
protonmail.com/blog/tor-encrypted-email/

> Ransomware as a Service "Satan" wants a 30% cut
bleepingcomputer.com/news/security/new-satan-ransomware-available-through-a-ransomware-as-a-service-/

> Trump announces cyber warfare against terrorist groups
whitehouse.gov/america-first-foreign-policy

YouTube channels suggested in the last thread

youtube.com/user/BlackHatOfficialYT
youtube.com/user/DEFCONConference

Other useful links from the last thread

overthewire.org/wargames/
ssd.eff.org/en
opensecuritytraining.info
Beginners.re

Good idea, I appreciate this thread. Hope it will catch up.

when you join the irc make sure you are using openssl

wiki.rizon.net/index.php?title=CertFP#Introduction

also free free to suggest things to add to the pastebin

...

this triggers me on a great many levels

would bleach

>Femnigger
/our girl/?

>Femnigger
???

I have a reasonable amount of security/hacking books in pdf I can contribute at some point if there's interest

Please do! If you can host them anywhere reliably the links could be added to that prospective pastebin.

i just fucking fuck

lol

Can I participate if I am a noob, as in non-programmer, mostly hobbyist enthusiast?

I've done minor sysadmin work at my job (since our main guy is a Microsoft purist and I'm the only one with extensive Linux knowledge) and I'm seriously starting to think about pursuing a career in security or devops instead of staying in software development.

where should one get started if he wishes to avoid going back to college?

both of you should join and check the pastebin out we have accumulated several resources span many subjects you are both among friends do not be shy

Blackarch.org
Read the man pages. All the man pages

Does it help you get in IT or net-sec if you have a math background? Working towards my bachelors in math but we only got 1 course thats related(Databases1).

>that color scheme
I am basically bleeding now

it helps with logic and programming but math is more for cryptography although creating a IDS is math intensive

thanks dude

Yeah it's pretty bad. Luckily it's changeable.

It's a bunch of penguins running a little factory! That's rich.

Now what's the most secure and up to date router I can buy that uses FOSS? I'm interested in something for home use. Price range is around 300 USD, but I'm not a poorfag so that budget is extremely flexible.

maybe try your had at buy a raspberry pi and install openbsd

Sounds like too much work. I want something that I can pull out of the box, set the wireless network names and passwords, then fap to webms on /gif/ all in under 20 minutes.

owning a FOSS router, as far as I know, involves flashing something openwrt or openbsd. I don't personally know of any vendor that ships fully libre firmware.

I personally own a Mikrotik RB2011UiAS and it's a solid machine. the only downside is no dual band. it's also supported by openwrt but I have yet to try it.

I already have a Librebooted laptop and a phone that has baseband hardware isolation and a FOSS OS. I need a stupid freetard router. Pls help.

Fuck you

Read the wiki on routers. You will have to flash it regardless.

Shit, well there goes my weekend I guess. I'll just buy whatever.

fsf.org/resources/hw/endorsement/respects-your-freedom
There are two libre routers on there, my nigger.

Pfsense router

IRC?

How do I into kernel?

windows or linux

I've never seen these threads before, would this be the right place to ask for a more experienced opinion about what I'm trying to do with my home network security wise?

ask the question

linux duh
Why would anyone want to into NT

...

I've got an Asus AC68U router. I want to firewall one of its LAN ports in such a way that the connected device has all access cut off (internet included) except a few specific services running on my network. It should also be able to respond to connections that are initiated by something else. I would also want to mess as little as possible with the router's default config.

What I've come up with is this:
>assign port to a different VLAN
>bridge it with the rest, so shit like DHCP still works
>using ebtables, drop all traffic heading to the router's IP
>redirect everything else that is going to my local network, so that it gets routed instead of forwarded (because I need TCP connection tracking)
>drop whatever is left, such as traffic heading to an external IP
>filter traffic in iptables FORWARD chain, allow established connections and packets heading to allowed services
>drop everything else
That's the short of it. It's probably hard to understand, I can dump the actual rules if that would help.

Basically, is there a recommended way of doing something like this? What I've done works now, but I don't know if I'm doing it in a retarded way or if I might have left any holes, since this is the first time I've used ebtables or fucked with VLANs.

sorry we can not help you but go a head a dump the rules

Sure. Everything is working, I'm just wondering if I went about it in a retarded way or not. This is in ebtables nat and I've added all the rules:
Bridge chain: PREROUTING, entries: 7, policy: ACCEPT
-s ! 0:1c:f0:e9:fa:2 -i vlan10 -j DROP
-p IPv4 -i vlan10 --ip-dst 10.23.45.1 -j DROP
-p IPv4 -i vlan10 --ip-dst 10.23.45.0/24 --ip-proto tcp -j redirect
-p IPv4 -i vlan10 --ip-proto udp --ip-sport 68 --ip-dport 67 -j ACCEPT
-p ARP -i vlan10 -j ACCEPT
-i vlan10 -j DROP
-p IPv4 -d 0:1c:f0:e9:fa:2 -i vlan1 --ip-proto tcp --ip-dport 8080 -j redirect

And iptables filter, there are some default rules here controlling the router, I only added 2:
-P FORWARD DROP
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD ! -i br0 -o vlan2 -j DROP
-A FORWARD -i vlan2 -m state --state INVALID -j DROP
### my rules #########################################
-A FORWARD -d 10.23.45.2/32 -i br0 -p tcp -m mac --mac-source 00:1C:F0:E9:FA:02 -m tcp --dport 80 -j ACCEPT
-A FORWARD -i br0 -m mac --mac-source 00:1C:F0:E9:FA:02 -j DROP
#####################################################
-A FORWARD -i br0 -o br0 -j ACCEPT
-A FORWARD -m conntrack --ctstate DNAT -j ACCEPT
-A FORWARD -i br0 -j ACCEPT

That MAC is from the device connected to the firewalled port (there's no physdev support so I'm using it to identify the traffic in iptables, since it's seen as coming from br0 and not the vlan10 itself for routing purposes)
>vlan1 = LAN from switch
>vlan10 = firewalled LAN port
>br0 = local bridge (i.e. switch LAN + vlan10 + WiFi)

has anyone completed a war game or ctf? if did not what did you get stuck on? if you did complete the challenge did you get hung up on anything?

Thanks m8.

I'm not an expert, but I can't see anything wrong there at first glance. I mean, if you wanna be 100% sure you could always do a pentest from outside your home network.

I hope I don't get bullied for just lurking the IRC

>femnigger
kek

it's supposed to be a "beginner-friendly" channel

Mac filtring is useless

what does /nsg/ think of blackphone 2?

Not that her stickers are good (looks cringeworthy to me), but we have seen waaaaaaaaaaay worse on those "show your stickers" threads

But hey, she looks young, and at certain age ranges people experiment and meke poor decisions, so it's ok

Sounds good, thanks for having a look.

How is it useless in this particular case, in the way I'm employing it? The device is physically connected using a cable. Even if somebody were to somehow change its MAC, it wouldn't bypass the rules, it would simply lose even the restricted access it does have. That's why the first ebtables rules is there, if the MAC is different than what is expected all incoming traffic is dropped.