/cyb/ /sec/

/Cyb/er/sec/urity general is for the discussion of anything and everything related to cyberpunk and cybersecurity.

What is cyberpunk?
>pastebin.com/jS37Vu7A (embed)

Nothing to hide? - The importance of a cyberpunk mindset applied to a cybersecurity skillset.
>[YouTube] Glenn Greenwald: Why privacy matters (embed)

Resources:
Cyberpunk:
Cyberpunk directory:
>pastebin.com/9JaJFqB2 (embed)
Cyberpunk resources:
>pastebin.com/7DWCsAc8 (embed)

Cybersecurity:
Cybersecurity essentials:
>pastebin.com/JWx5xeEM (embed)
Cybersecurity resources:
>pastebin.com/NaUPUDF0 (embed)

Harden your OS, reroute your DNS and fire up the VPN!
Shit just got real: - Looking for more resources, help is welcomed.
>pastebin.com/JXyM4fTe (embed)

The Old Skool: - Looking for more resources, help is welcomed.
>0ld 5k00l h4ck3rz: 67.225.133.110/~gbpprorg/#40

IRC:
Join: irc://irc.rizon.net:6697
>#Sup Forumspunk - Requires SSL
>#Sup Forumssec - Requires SSL
IRC guide:
>pastebin.com/bh3Uyq3a (embed)

Thread archive:
>archive.rebeccablacktech.com/g/search/subject/cyb/
>archive.rebeccablacktech.com/g/search/subject/sec/
>archive.rebeccablacktech.com/g/search/text//cyb/ /sec//

Thread backup:
>cyberpunked.org/

Previous thread:
WHERES THE REAL OP EDITION?

Other urls found in this thread:

tineye.com/search/150ae3908e3b3f687835b47f64f980ecce9ce978/
medium.com/@coin_and_peace/rarepepe-is-the-most-innovative-project-in-the-crypto-space-seriously-6d6b74749687
coindesk.com/monegraph-uses-block-chain-verify-digital-assets/
wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system
tutorials.ubuntu.com/tutorial/tutorial-install-ubuntu-desktop#9
tutorials.ubuntu.com/tutorial/tutorial-install-ubuntu-desktop#5
twitter.com/SFWRedditImages

keep calm

and

eat

your

instant noodles

I want everyone that comes into this thread to tell us what you are studying.

the blade

Nigga stop using pastebin.

Jesus

5th for I'm watching.

Also 6th for OP, you should have cleaned the (embed) parenthesis. You got it twice.

(You)

here's a gift :^)

please dont study me. all you see is a lot of being fat and me masturbating

interesting. i saw nothing by running strings on it, file says its just a picture, hmm

okay, xxd gives me nothing much either.,

well, specifically TOO MUCH

theres a fucktonne here, why cant i see it

The file contains noise in the alpha channel with no original image content. Try using that.

I'm zero, almost negative level on this kind of thing, but maybe the filename has something to do.

Ops

Don't reply to this data mining shill

not very good at this but maybe something to think about.
take image + original (difficult since it seems to be rescaled - tineyr has tons of this image:
tineye.com/search/150ae3908e3b3f687835b47f64f980ecce9ce978/
)
and xor to get the plain noise ?

curious about the answer

pls no i just want to see the thread flourish and see what interesting things people are learning :(

How do you people buy bitcoin anonymously? I'm finding it hard to find a site that doesn't have invasive verification requirements and there's no such thing as a bitcoin ATM anywhere near me.
I'm considering trading cash on craigslist, but since I'm also new to bitcoin trading (I understand how it works, just haven't used it) I have no idea what to expect and how to avoid getting ripped off.

>there's no such thing as a bitcoin ATM anywhere near me.
The only guy i know who uses one of these literally flies to the other end of the country to use it, sijnce wwe dont have one anywhere close to our town either

Try Localbitcoins, they have a reputation system so there is a much smaller chance in getting ripped off

...

usually reputation systems come with an unwillingness among users to transact business with anyone who doesn't have a reputation/feedback score though.

What's wrong with lifting and exercising tho? If you're not buying the jew powder I don't see how it's wrong. You can even /homegym/ master race if you want.

>If you're not buying the jew powder
BUT HE IS
ITS IN THE PICTURE
HE HAS TWO TUBS OF POWDERS

Dont pretend you arent just using this as a launching point to broadcast to everyone you lift.

They make it seem using barbells is the only way. Dumbbells are seen as worthless, let alone bodyweight exercises or any sort of cardio.

It's not the inherit act of exercising, but the narcissism and obsession with beauty that usually comes with.

medium.com/@coin_and_peace/rarepepe-is-the-most-innovative-project-in-the-crypto-space-seriously-6d6b74749687
coindesk.com/monegraph-uses-block-chain-verify-digital-assets/
Is it really possible to use the blockchain to prove you're the original creator of a rare pepe? If so, how?

probably using a file hash , timestamp and some identifying information like some password for that dataset. don't know what that verfificatin was called again tho

alright /cyb/ + /sec/, school is coming up and i got a couple low life ideas.

I want to mine Monero on the PC's on off hours which I've calculated would be about 12 hours. School has major funding from state, so could receive decent amounts of monero.
Mostly black neighborhood near school but still a white school, could make sales off of the neighborhood.
might also run a couple servers as dead drops where no one notice.

...

Call me noob but where is this from? I never researched it so idk where it comes from, but it always looks familiar to me.

then research it

not og poster but its the laughing man symbol from the ghost in the shell

can a brainlet into pentesting

"laughing man" from ghost in the shell :S.A.C.

What is the easiest way for a retard like me to encrypt or "harden" my Ubuntu drive? Reinstalling will be a pain in the ass but if it's the easiest way then I will do that.

I read through wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system

But it all looks fucking complicated, and it seems like you have to do it during installation.

please dont be too mean I am a complete noob to linux

Literally lurk /biz/ to learn a shittonne about crypto

practice on usbs, and non system drives until you get it under control. there isnt any easier program

how would I go about doing that? consider me a brainlet when it comes to anything to do with this stuff. I'm willing to learn it's just quite confusing

> (You)
>What? Please elaborate?

Tattoos are closely related to two groups: people working in the fire brigade and people in Japanese organised crime.

If you have visible tattoos you WILL be less than welcome many places and turned away from baths.

What is the most /sec/-compliant, privacy-respecting European/EEA country?
>14-eyes include UK, Netherlands, Belgium, Norway, France, Sweden, Spain, Denmark, Germany, Italy.

...

To answer that one anons question. The more you move into the nuts and bolts of something the less documentation there is or the documentation may require previous knowledge you didn't have to understand. There is almost always a glut of basic information resources written by people who have done x before and want to tell others how to do it, but once you move past that you end up in some no man's land where there may be a very small community of people who know more than you but have a lot of other knowledge they can draw from which makes talking to them difficult. It's crossing of that gap that I'm referring to.
Take side channel analysis. Up until two years ago poorfags didn't even have access to it because you had to have expensive equipment, knowledge of fields that you may not have studied like physics and almost everything was behind academic white papers. You might know it exists and that it effects certain things like storing crypto keys on the device, but how would you go about implementing it? These days we are lucky that the cost of doing it on a practical level has moved down to around $90 if you source everything yourself to about 200 if you need something more stable.
Malware analysis and reverse engineering was in the same spot in the mid 2000s. There were only a few good guides and a lot of shit information unless you knew exactly where to look. It's still that was in a lot of respects. Also windows is still shit whenever you run into something brilliant that moves up above kernel level because the documentation of its low level functions is awful.
These days we are lucky that we have ctf fags who constantly do writeups because they want to get hired at some silicon valley tech company. It makes finding information that used to be a pain in the ass to find much easier, but that is still only a community of a few thousand people at most.
Fuzzing micro controllers by manipulating flash memory and ways to protect against it.

How is reinstalling a pain in the ass? Just backup your home directory (including dotfiles), reinstall with encryption, then copy your backup to your encrypted HDD.

For bonus points, backup to an encrypted drive. You can create those easily with the Disks utility that comes with Ubuntu.

>tfw I have 3 TB of data on a 6TB drive
>tfw the next biggest drive I have is a 3TB drive
>tfw that 3TB drive is already 1TB full of Windows shit (games, mostly)
>tfw the other two drives I have are 1TB

This is why encryption is a pain in the ass for a lot of us coming into /sec/ a little late

I may have to do this.

To clarify, would just ticking "Encrypt my home folder" suffice? Like here: tutorials.ubuntu.com/tutorial/tutorial-install-ubuntu-desktop#9

Otherwise I'm not sure how to encrypt the whole drive with the reinstallation.

Depends on what you want to accomplish.

"Encrypt my home folder" uses ecryptfs, which runs in userspace (IIRC), so it uses slightly more resources. It doesn't encrypt system files, which means that sensitive stuff like your password hashes, the sources list of your package manager, your HOSTS file and system logs are not encrypted. An attacker with physical access could also tamper with your system files.

The "encrypt whole disk" option earlier in the installation uses LUKS, which is more efficient, and encrypts everything except /boot. If you're starting with a fresh install, this is the better option.

Is that the "Use LVM" option seen here?: tutorials.ubuntu.com/tutorial/tutorial-install-ubuntu-desktop#5

Thanks for your help

I'm retarded. Ignore me. Just seen the option above lol.

Looks like i'll be reinstalling, yay!

Fun trick: put /boot on a flash drive. That lets you pop the only unencrypted part of your system out and take it with you if you need to leave your machine unattended. (airport security, hotel rooms, etc)

nah encryption and LVM are two separate things. You can have one without the other, or neither, or both.

Usual OP here, I'm working through a large backlog of threads (that you lot keep adding to).

where is trinity? I want to fuck her

This is the backlog, by the way:
(07/12/17(Wed)04:05:45) - read through - apply any missed resources to pasta
(07/14/17(Fri)03:35:49) - read through - apply any missed resources to pasta
(07/16/17(Sun)20:32:44) - read through - apply any missed resources to pasta
(07/18/17(Tue)14:58:58) - read through - apply any missed resources to pasta
(07/21/17(Fri)14:10:19) - read through - apply any missed resources to pasta
(07/23/17(Sun)10:04:05) - read through - apply any missed resources to pasta
(07/29/17(Sat)12:58:05) - not mine - read through - apply any missed resources to pasta
(07/30/17(Sun)08:53:04) - read through - apply any missed resources to pasta
(08/02/17(Wed)08:55:21) - failed to reach bump - read through - apply any missed resources to pasta
(08/02/17(Wed)22:41:17) - not mine - read through - apply any missed resources to pasta
(08/05/17(Sat)14:05:40) - not mine - read through - apply any missed resources to pasta
Most of them are over the bump limit.

I think it's basically this, the noise looks like snowcrash, but I'm too lazy to even try.

Where can i get into the basics of Cybersecurity/ITS? I feel like I have all this random advanced knowledge, but no solid foundation.

Any user that could help with this would be great. I have a job interview coming up and I need to cram.

>(embed) (embed)

I've encrypted my headless server and use drop bear to decrypt it if i need to restart it or power goes out.

If you put /boot on a separate USB, do you have to set BIOS to boot from that USB or the HDD/SSD with the OS installed?

of course just run nmap, nessus and metasploit with veil

The usb. Just prioritize the order so disc>usb>hdd

You forgot cobalt strike.

I bet it's pizza

Thanks brother

r14
r14d
r14w
r14b

what do the d, w, b stand for?

Dword, word, byte.

Santa Barbara?

What is the likelihood that intel and amd cooperate with prism/nsa now?

incredibly likely.

Even if they do not cooperate willingly they will probably be forced to cooperate by secret court orders. Not only should all US chip manufacturers be expected to backdoor all major chips but so should also foreign chip makers. Remember that many chip makers now are from China. And ST is French/Italian which is not any better.

You might think that a soft core processor like RISC-V in an FPGA is safe but that assumes the FPGA also is kosher. Which it hardly is.

The main attach vector is probably the JTAG port. The second route is probably the internal state machines which are fairly capable alone.

your mother's vaginal cavity good sir
tis indeed quite impressive so far

> (You)
>Yes, I am still collecting the images. Going to update the imgur galleries soon and post the links again.

How about a zip file placed on the FTP server? I see it is still active,
ftp://collectivecomputers.org:21212/Cyberpunk/
Password: guest


Entering the slow patch, last post for me for today.

>terrorist
>get closer /into generic_comercialairplane
>hack into the onboard computer
>make the plane crash

i know it's unrelated but that makes me be scared of planes and I always wanted to know if it could be possible

Where you been lately?

None of them.

This punk ass kid took nude of my 16 yo daughter giving them out to his friends, doxing and swatting her friends. What can I do to stop this?

Go read through the Sec+ certification materials. Should be able to get a torrent of the book or something.

Have a not-slut daughter

He hid a camera in the bathroom, she didn't know she was being filmed. His parents are useless and don't care what he does.

Beat punk ass kid's father?

You can't do much, what's on the internet is there to stay. You could maybe sue the fucker, since I'm fairly sure taking a picture from a minor without consent is illegal, and more if it's nudes.

Then go to the police.

kick his ass

Thanks I'll just beat up his father.

He's already went to jail for swatting but is continuing to do it.

But if you sue him for the picture you can get some money.

Whoops, literally all I did was copy the entire post from the previous thread. I'm not normal op so I don't keep the pasta lying around

Well, I've been ill and had studying to do.
So, I haven't had a great deal of time to deal with threads.

I've literally been calling the new threads strange names to try and get a response from you lol. Anyway, I would suggest, honestly, based on the sheer number of people who do NOT read the pasta and just ask question in the thread, to leave it as it is.

I don't know if anything else can be added because it's monstrously large, and two topics aren't related enough to have any crossover in things you can keep adding.

People into cyb probably don't care for a list of reverse engineering books, and those who do probably won't find it in the pasta anyway due to its sheer scale

how would they backdoor the state machine

that's child porn possession, harassment, stalking and pretty sure swatting is really illegal

>cobalt strike.
what the fuck is this? it looks like an expensive version of armitage?

What's the best program to encrypt my drive?

luks

It's not.

prove it bitch

why so mad desu

...

i have zero idea what the fuck youre proving here

Hey Sup Forumsuys I've been paranoid as fuck lately with the whole CNN thing as well and I want to remove as must of my social presence as I can.

I have 5 Gmail accounts linked to my name and old android phone. I got a new number on my blackberry

I have a facebook account I never used it so it's just linked to my name. I think just deleting it just fine

I have Skype account made before the microsoft bullshit

A twitter account linked to my name I posted some pictures and tweets. Nothing super identifiable.

A instagram account I made when I was 15 I have pictures of me posted on other people's instagram with me tagged.

And 2 reddit account I maybe have doxable posts?

I get that I can't just delete the account I have to delete all posts and what not. What is the most I can do to fix all the mistakes younger me made?

Give me the names, I'll make them go away

If you were here about 4 years ago, /jp/, Sup Forums and some other boards had 'sound threads' that users uploaded images with embedded sounds using steganography.

People would use a media player extension to play the sounds extracted from the images which is what you see in that gif.

Moot killed off most of the sound uploading capability (such as embedding webms when webms weren't supported, embedding sounds in to webms, embedding sounds in to gifs, etc) and also put limitations to the file sizes in respect to the resolution, so no more 2mb 1px images anymore.