/cyb/er/sec/urity and cyberpunk

/Cyb/er/sec/urity general is for the discussion of anything and everything related to cyberpunk and cybersecurity.

What is cyberpunk?
>pastebin.com/jS37Vu7A

Nothing to hide? - The importance of a cyberpunk mindset applied to a cybersecurity skillset.
>youtube.com/watch?v=pcSlowAhvUk

Resources:
Cyberpunk:
Cyberpunk directory:
>pastebin.com/9JaJFqB2
Cyberpunk resources:
>pastebin.com/7DWCsAc8

Cybersecurity:
Cybersecurity essentials:
>pastebin.com/JWx5xeEM
Cybersecurity resources:
>pastebin.com/NaUPUDF0

Harden your OS, reroute your DNS and fire up the VPN!
Shit just got real: - Looking for more resources, help is welcomed.
>pastebin.com/JXyM4fTe

The Old Skool: - Looking for more resources, help is welcomed.
>0ld 5k00l h4ck3rz: 67.225.133.110/~gbpprorg/#40

IRC:
Join: irc://irc.rizon.net:6697
>#Sup Forumspunk - Requires SSL
>#Sup Forumssec - Requires SSL
IRC guide:
>pastebin.com/bh3Uyq3a

Thread archive:
>archive.rebeccablacktech.com/g/search/subject/cyb/
>archive.rebeccablacktech.com/g/search/subject/sec/
>archive.rebeccablacktech.com/g/search/text//cyb/ /sec//

Thread backup:
>cyberpunked.org/

Previous thread:

Other urls found in this thread:

pequalsnp-team.github.io/cheatsheet/steganography-101
youtu.be/tgLjhT7S15U
gearbest.com/headsets/pp_288915.html
strawpoll.me/13665376/r
theguardian.com/technology/2017/aug/11/marcus-hutchins-arrested-wannacry-kronos-cybersecurity-experts-react
github.com/hteso/iaito
neowin.net/news/full-disk-encryption-easily-broken-on-tens-of-millions-of-android-devices
upload.wikimedia.org/wikipedia/commons/a/a8/Steganography_original.png
newscientist.com/article/2143499-ships-fooled-in-gps-spoofing-attack-suggest-russian-cyberweapon/
en.wikipedia.org/wiki/Steganography#Example_from_modern_practice
twitter.com/NSFWRedditGif

lainchan is shway as fuarrk

What made you choose to pursue a career in security?

where the fuck is og OP edition

I just reposted the one from the last thread.
Post the old one in here and we can use it next time.

I'm just memeing dude

Hey bruss I'm here

I was just at work doing my weekly log in of all 6 of my separate defence logins.

Then I had a nice brew with my dad in his office and built a megablocks Huey helicopter.

Now I'm doing a large turd.

I love Fridays.

Sorry for not bumping the old thread, I don't use my phone at work much.

Do you have any links to this type of file embedding? It looks fascinating, especially things like pic related

Well I mean, all of the techniques mentioned above are essentially steganography. There's an entire field dedicated to performing this type of stuff.

Check out this intro to stego if you're curious: pequalsnp-team.github.io/cheatsheet/steganography-101

Sounds good man, thanks for the link

What we learning this weekend?

I'm going to make a new lab, seperate to my pen testing lab; a full data centre type environment.

I have no idea how to set one up in real life, so I feel this will be a good exercise for me

Im on a 8 hours car drive.
Should i read this book or shitpost on Sup Forums ?

so for this you would just do however many left shifts and it's reveal the kot? got a link to the original image? i want to try my hand

How the fuck can you read while driving and not feel sick

It makes me so nauseous

youtu.be/tgLjhT7S15U

We are so fucked

I cant

Im just going through exploit-exercises. No CTFs this weekend means I just get to do main sequence.

different user, but I've been reading in the car my whole life. As long as I can see the window from my peripherals I'm fine. Once that's gone I start to get ill but still never anything unbearable.

>umpc
>nexus 5 with nethunter
Which would you pick?

How safe is macOS as far as cyber security goes?

Can you please try this train wreck of a sentence again and elaborate upon what you actually want to know

nexus

I can never seem to find any cyberpunk themes for my phone, been looking for a while and nothing allows your own wallpaper

Try /wg/

Fuck why we so slow

Sorry. I guess I want to know how vulnerable macOS is? I've followed most of the stuff in the OP about securing my web browser and I've been working on reducing my internet identity footprint, but I'm concerned as to how exploitable the OS is. I do a lot of work while connected to public WiFi, and while I do what I can to keep myself safe in that regard I'm still paranoid.

contrary to popular belief, most on Sup Forums don't give a shit about cyberpunk stuff, or know anything about netsec

There are some very scary exploits out for OS X, that embed themselves into mainboard firmware

There are no where near the number as there is on Windows; two fold because the unix-like base makes it more secure than Windows and API hooks.

As it's been gaining serious popularity over the last ten years however, the market for OS X malware has ramped the fuck up.

It's secure enough skids aren't going to touch you. The scary government people however, are not stopped by OS X.

gearbest.com/headsets/pp_288915.html

from /csg/, but /cyb/ as fuck

Looks pretty nice but I don't know if I would risk 60 bucks for trying it.

What the actual fuck

anyone has used bone conduction headphones? are they any good?

i guess it makes breathing somewhat harder and i doubt it's comfortable for a longer period of time

but yeah, looks cool

it's headphones that you put on your mouth, what is it that you don't understand

Is AES truly secure?
Is the weak link the Key and Key exchange?

Is Diffie-Hellman

Why would I want that is what I don't understand

>Key exchange
Pass the hash is a major weakness that's exploited often

CTFs are for faggots
go crack some real stuff that actually tries to be secure instead of toy challenges designed to be solved under a day

Here's your (You).

>Now I'm doing a large turd.
Cyberdump?

>I love Fridays.
Yup!

>Sorry for not bumping the old thread, I don't use my phone at work much.
The strawpoll suggests a heavy European interest. I had expected more from the US and some from Asia.
strawpoll.me/13665376/r
We had 38 responses but last thread had about twice the posters.

Also: reminder of the Cyberpunk FTP archive:
ftp://collectivecomputers.org:21212/Cyberpunk/
password: guest

Being broke, having a lot of NEET time on my hands, and thinking that having a general background in computers would give me a head start or act as a "stepping stone".

I'm studying Infosec, digital forensics & datasciemnce. Infosec is by far the most difficult and requires a wide breadth of knowledge.

This might be slightly off topic but does anyone know exactly how Theresa May intends to ban encryption? Is she going to ban RSA? AES? I've heard nothing on how they intend to implement this. They say they want some "master key" system, but I don't think they have any idea on how to implement that. It goes without saying that whatever they do will be a disaster and a complete failure, but I'd at least like to know what to expect.

I don't know about the UK, but here in Aus the gov wants to pass legislation that will compel the us based companies to decrypt the messages the spooks ask for.

Let's read that again.

Australia will pass legislation that will compel US based companies to do things.

I don't know how the fuck turnball expects this to go, but I can see the companies just flat out ignoring it. Who the fuck does he think he is, making laws for other nations he isn't involved in?

Oh that's right, the laws of Australia come above the laws of mathematics. That is a direct quote from our prime minister.

They can already do that here. They want to ban end to end encryption. They want even PGP to be illegal unless it's backdoored. They're fucking idiots who don't know how encryption works. If I manually formed a PGP message with nothing but pen and paper, would they send me to jail? I have no idea how they intend for this system to work.

what makes you think May understands computers? Gary Mckinnon "hacked" nasa by searching empty passworded users and she sided with america to deport him because oh hes a bad man breaking those puters, no need to try the dude looking for UFOs in his own country, lets send him to one with a death penalty and shit...

the most she knows is what she hears from others at COBRA, which is a fucking supervillian corp name in the fuckin batman universe.

ayy lainon

>They can already do that here
No they can't, otherwise banning it wouldn't be necessary.

The secret is to sit in the back.

>Discontinued
You fucker.

Anybody know what the best throat microphone/bone-conduction headphone combination is?

I've never thought of anything being challenging. Just a lot of work that needs to get done and a lot of learning and practicing.
Just know that you'll eventually reach your goal.

ok so im running arch linux, my phone is rooted and flashed with a custom rom, i drive a hybrid car, i work in IT... now how do i start looking like i am from the future? khakis and a polo arent cutting it anymore

Maybe try something like this.

too old timey. i was thinking more jensen from deus ex but toned down a little

They can intercept client-to-server communications, but not client-to-client without effort.

...

You don't need to actively look like you're from the future. The more you do to bring yourself into the future, the more that the future expresses itself through you.

Also, consider getting /fit/ and becoming a /fa/ggot.

>hacked nsa
>by searching empty passworded users
Lel wtf. Human retards making it easy. Buts its dudes own fault for getting caught.

>COBRA is batman
Actually its GI Joe you gen Zer.

How to make an android smartphone more secure / private aside the following :
-managing permissions
-managing network connections
-encrypting phone
-using vpn
-not using google services

Why is IDA memed so much in the professional field? I understand it's the best at static analysis because of the hexrays decompiler but what advantage does it have over olly/x64dbg when dealing with packed and obfuscated stuff? Are you telling me most of the professional reversing is performed on unprotected software and people just analyze what the decompiler shits out instead of reading assembly?

I've just begun reversing stuff and I think people hold IDA in such high regard because it's good at making guesses about code and data constructs. It also supports a lot of different file formats/processors.

What do are your thoughts on Marcus Hutchkins (the guy who stopped WannaCry) getting arrested for "possibly writing malware-like code?

Excuse the Guardian link but none of my regular news sites has anything on it.
theguardian.com/technology/2017/aug/11/marcus-hutchins-arrested-wannacry-kronos-cybersecurity-experts-react

What are your*
Never post while on painkillers. They do bad things to your grammar

There are only 4 people in this thread who know anything at all about security and they don't post here often.
AES has been proven to be secure on a logic level, but it has a lot of issues with side channel analysis on consumer hardware.
CTFs are harder than the real thing. Here is your (you)
You are mixing a debugger with a disassembler. Ida supports everything and is dirt cheap if you are looking at it from a business perspective. Nothing even comes close. Radare2 only recently became good enough to use, but it's hard to collaborate on and binary ninja is still to alpha but will end up being the thing students use.
No idea need to wait for more information but leaning towards he did nothing wrong.

Most valuable things to me are how ida makes almost every internal function available in some way through its api (idapython) and it taking a lot of menial work out of the picture through its (fairly) competent and comprehensive analysis system.

Honorary mentions for allowing me to edit the colour of literally everything and the built in python interpreter.

As for decompiler vs disassembly, it depends on the person. Working with the decompiler requires knowing a lot about typing and you spend most of your time fixing the mess ida made. Working with the disassembler requires a lot more control flow and variable tracing, and perhaps a bit more experience to be good at.

Is there a good reason to move away from systemd? I've heard rumors of it being insecure but I fail to understand why that is

Arguably you could say that radare2 is easier to automate but it's lack of a user interface will hold it back from mainstream adoption.

It has a web-based UI that you can spawn from the command line but it's quite terrible.
I wish x64dbg was available for Linux but at the same time I understand why it's not after having written a low level resource monitor for Linux. WinAPI may be garbage but it allows you to do so much with the system compared to the crippled procfs that you have to use for most stuff.

r2 has a webgui now but it's kind of a pain in the ass to get setup and use...

How about: github.com/hteso/iaito

>android smartphone
>-managing permissions
doesn't work for processes and apps running as root. watch those
>-managing network connections
again, things running as root can circumvent these
>-encrypting phone
there's been several articles that the hardware crypto is broken because manufacturers fucked up. I don't have that article at hand, will report back
>-using vpn
making you easier to track imho.
be aware that VPN providers are well known and if you use your own, ... well.
>-not using google services
good start but you'll need to use some if you don't want your phone as a browser and watch

one of these articles
neowin.net/news/full-disk-encryption-easily-broken-on-tens-of-millions-of-android-devices

the one I read before which I read before stated that this issue isn't limited to Qualcomm. I just don't remember which site that article was on

bump

You can find the original image here: upload.wikimedia.org/wikipedia/commons/a/a8/Steganography_original.png

So is Protonmail good? I'm looking for a mail to move to completely.

Yeah, it's good.

Cockli

You should read the book. It is enormously influential and will most likely see a renaissance thanks to CRISPR/Cas9.

>gearbest.com/headsets/pp_288915.html
It mentions use of the cloud. That is bad /sec/.

Also it looks like Cybergoth is back with a vengeance.

wasn't that one of these whose canatries expired?

You know we had a straw poll about this?

How can I store a piece of data forever? all of the storage mediums currently in use won't be usable in even 20 years. Is storing data on the Bitcoin blockchain or a similar currency a good idea?

There are only 4 people in this thread who know anything at all about bitcoin and they're all on holiday right now.

Tfw electron is a step up

what are some good resources on satellite /sec/

There are only 4 people in this thread who know anything at all about satellites and they're all space right now.

Where's the user who knows where the 4 people who know anything are?

History tells us that clay tablets and vellum will last for thousands of years.

I can see a market for clay tablet printers with cuneiform print heads. This writing was also decoded, but we have no idea if written English will be understood in 2000 years time.

Long time storage is acknowledged as a hard problem.

NASA not NSA.

This is a good meme

There's only 4 people who know about the 4 people and they are all having sex in the missionary position with the lights off for the purpose of procreation

You guys watch N O D E?

I thought cockli got busted by the feds?

crystalline storage is becoming a thing and they are growing the crystals like in junior high science class. people involved estimate millions of years of storage. google 'superman crystal' for more.

You stole the line I wanted to say.

newscientist.com/article/2143499-ships-fooled-in-gps-spoofing-attack-suggest-russian-cyberweapon/

You can find the description of it here, nothing complex:
en.wikipedia.org/wiki/Steganography#Example_from_modern_practice

You mean the YouTube channel where he makes/mods shit? If so, yeah ive got half a dozen project videos lined up to watch this morning

how would Sup Forums filter this to prevent people spreading child porn then? a neural network or something?

That is just nav war, a sub set of electronic warfare. Pseudolites are commercially available and can be repurposed for this. With today's SDR systems the tech is available to anyone willing to spend some time putting the parts together.

This stuff should definitely in a /sec/ pasta. OP, are you copying this?

Literally fucking nothing

>Sup Forums

It wouldn't because it runs on servers serving mostly text data, not a lot of hardware there. Not to mention all kinds of other data can be obscured, not just images. Could be text, like links to torrents or playlists, archive files. The size is concern for bigger files as for a 3MB raster saving only 1 bit per single channel byte yields just 128kBs. This can be circumvented by splitting the file around several images and then using a special function concatenate obfuscated data.

Go read up on Vmware ESXI. It's free and it's the general way most big enterprises set up their virtualized environments.