/cyb/ + /sec/: Cyberpunk and Cybersecurity General

▐▌ All resources from past threads (paste and comments) will be present at OuterHeaven in the following days. >i2g3vsckj67dnjvb.onion

Θ Infosec questions: building an obsessive need to find your own answers could be a key for more than one chain.

Ω All are welcome here; the world is fucked and we are all in this together.

◙ Cypherpunk Manifesto >>activism.net/cypherpunk/manifesto.html
◘ Cyberpunk Manifesto >>project.cyberpunk.ru/idb/cyberpunk_manifesto.html
∆ Hacker Manifesto >>phrack.org/issues/7/3.html
± Guerilla Open Access Manifesto >>archive.org/stream/GuerillaOpenAccessManifesto/Goamjuly2008_djvu.txt

▓ Fables, realities, prophecies and mythology of a community:

░ What is cyberpunk >>hastebin.com/ayufiyuvew

▀ The importance of a cyberpunk mindset applied to a cybersecurity skillset.: >>youtu.be/pcSlowAhvUk

● Cyberpunk directory: >hastebin.com/efohokurid

▬ Cyberpunk resources >hastebin.com/onequqodih

▐ Cybersecurity essentials/resources >hastebin.com/oquzikafuz >hastebin.com/owulepames

Cntrl + F Basic Knowledges, Basic Training, Arms/Arm >hastebin.com/edutujabez

▼ Endware: Heavy armor for anons, by anons >>endchan.xyz/os/res/32.html

◄ Netrunner: anons are creating Miracle Shoes when few seem to give a fuck

⦿ Shit just got real: >hastebin.com/ewudirupuw

▪ 0ld 5k00l h4ck3rz; we stand on the shoulders of giants >67.225.133.110/~gbpprorg/#40

» Thread archive
>>archive.rebeccablacktech.com/g/search/subject/cyb/
>>archive.rebeccablacktech.com/g/search/subject/sec/
>>archive.rebeccablacktech.com/g/search/text//cyb/ /sec//
Thread backup
>>cyberpunked.org/

₪ /cyb/ FTP
ftp://collectivecomputers.org:21212/Cyberpunk/
user/password == guest

Lasts Threads

Other urls found in this thread:

youtube.com/watch?v=2Ex51kc3pOs
mega.nz/#!MKgiwTIA!04HJcRQJ4WwtU7z8WrO_qq5w-zBpkLTuZKgSOxxdg6U
amazon.com/Fundamentals-Wireless-Communication-David-Tse/dp/0521845270
amazon.com/001-Illustrated-Protocols-Addison-Wesley-Professional/dp/0201633469/ref=sr_1_5?s=books&ie=UTF8&qid=1510179317&sr=1-5&keywords=tcp&dpID=51jbAgYTQ8L&preST=_SX218_BO1,204,203,200_QL40_&dpSrc=srch
amazon.com/TCP-IP-Illustrated-Implementation-Vol/dp/020163354X/ref=pd_sim_14_1?_encoding=UTF8&psc=1&refRID=S2P8GYCAYB1SG5TH26N0
amazon.com/Unix-Network-Programming-Sockets-Networking/dp/0131411551/ref=asap_bc?ie=UTF8
amazon.com/UNIX-Network-Programming-Interprocess-Communications/dp/B01JXQNTX6/ref=asap_bc?ie=UTF8
discord.gg/eXk4bTC
twitter.com/h0t_max/status/928269320064450560
people.kth.se/~maguire/DEGREE-PROJECT-REPORTS/100402-Vassilios_Ververis-with-cover.pdf
twitter.com/SFWRedditGifs

pls respond

you are correct, everything that can't be blocked gets throttled to hell and both sides get a TCP RST every few seconds.
On top of that, it depends on the region you are in. If you travel around you may have little to no issues in one location and somewehere else it might be hard to access anythig at all.
I've read somewhere that the political stability of the region is a huge factor for this.

you could also look into running your own tor entry. iirc there was a more resilient connection protocol that could be enabled

only the september ones are available as mobi.
the july ones are alternatively available as epub, just two as mobi.
is epub fine, too?
On a sidenote, I've had no issues displaying them as PDF on my kindle

...

Future 9/11. Looks cool

this is literal commie shit

Where do I learn to be a super hacker? I started learning about wifi hacking from a group in college but I dropped out, I'm sure there's much more to being a hacker that can't be learned from aircrack-ng documentation. How do I learn the kind of things you'd need to do in a ctf?

What are you all working with in terms of decentralized things? What are you working on? Testing? Playing with?
OLSR? BATMAN? Tox? Scuttlebutt? Rumble? Gilga? Serval? Twister? I2P? Diaspora IPFS? Forban? URC?
Not to sound like I'm giving orders or anything, but IMO I really think we as a community need to become familiar with these things and make them part of our lives, replace IRC with URC, replace Skype with Tox, replace Facebook and Twitter with Diaspora and Scuttlebutt, Replace Dropbox with Syncthing or Librevault. We have to use and extend and improve these things ourselves, and then get other people to use them too.

I'm working on setting up a news feed RSS bot for Diaspora.

Next I want to make a Tox bot that can say things back to people with Ratox and Ruby. I can only make it say things back to one user at once, because I can only figure out how to say things to a Tox ID that is hardcoded into the program. So for 500 friends I'd need 500 separate programs. I don't know how the fuck to get around that.

After that I want to make a meshnet node with Pirate Box OS on a Raspberry Pi and test running URC, Tox and Scuttlebutt over it.

Post your cyberpunk waifu, Sup Forumsents.

youtube.com/watch?v=2Ex51kc3pOs

b-but your waifu is a guy~

i want jus the september ones so that's fine.

>On a sidenote, I've had no issues displaying them as PDF on my kindle
that's strange. all that i've tried sucked ass. perhaps im just too incompetent at converting the books

Try searching the following Google Dork:

"My Documents" "parent" intitle:index.of

experience and practice. lots of both

r8 this mobile setup pls.
-4x lte dongles
-4x tp link openwrt/"PORTAL/tor" mini routers
-4x usb ethernet port adapters
-1x laptop libreboot with openbsd
connect to above with ethernet
-1x laptop libreboot with trisquel, and vpn service
It'll cost me about $400 for first month hardware+services. Is this a good idea?

About to pull the trigger, so I'd like someone to opine on it.

No problem mate, thanks for checking out, i was looking for that kind of ressources. I'm currently pwning overthewire and random boot2root VMs

If anyone is interested i downloaded a locked RAR file that's supposed to be the PWK PDF course but its locked with a password. I'm running JTR + Rockyou on it on a little pi i keep running

Looks fun, what kind of usage ?

New collective computers link:
>> ftp://collectivecomputers.org:21212/Books/Cyberpunk/

here you go:
mega.nz/#!MKgiwTIA!04HJcRQJ4WwtU7z8WrO_qq5w-zBpkLTuZKgSOxxdg6U

Who here cjdns?

I'm not in the infosec industry so ican't answer you but checkout the info about infosec carreer online, there's a shiton of resources.

About specialzing on S.E, it depends what you'd like to do. S.E can be as much as physically breaking into an enterprise by social manipulation (check defcon), as targeted high level phishing. In the last case you'll need to write exploits, thus needing technical knowledge

>learning wifi hacking in a college group
Learn to program
Learn how a computer works
Learn how linux works
Learn about webdev
Then begin to learn about flaws

Also hacking is all about that spirit of going further

>Looks fun, what kind of usage ?
Just for fun/experimentation. What do you think of the set up? Is it security theater?

thanks my man you rock

you could try to upload the file to some online service first to check if it is worth cracking.
If they can, the password isn't too strong and should be crackable

If i had time and money i would play the hell with this. With some strong batteries, you could have your own small network within the city and go full nomad

You're welcome.
I didn't want to post them while the fundraising was still ongoing because I believe their cause.

But since the campain is no longer active, I'm happy if I can even help a single user that wouldn't get access to those excellent books otherwise. The regular price tag of some of them is quite hefty

Transhumanism is a death cult. "Becoming one with the computers" does not mean you get to fly around a 3D version of pornhub, it means a machine learned chatbot of you written by a Pajeet in Node.Js talks to your children for you after your actual death.

lel i was hoping that someone would talk me out of it, but I guess pulling the trigger isn't so bad. What would you do with a set up like this? I'm pretty much out of ideas other than using it to shitpost, and dl torrents.

Why do you need four data plans for 2 laptops?

>Why do you need four data plans for 2 laptops?
Dongles attached 1 ea to tplink, and load balanced on the first laptop. The second laptop connects through ethernet and uses a vpn.

Where do I learn datascience after datacamp took away student discounts & jacked up their prices?

No i would have a far better use.
I.E have some raspi with strong batteries that you could put at some strategic point of your city so they sniff local traffic/create a network between the raspi.

Or go full nomad, have one laptop used a server, and go outside, hike and shitpost from the top of a mountain.
But spending 400$ just to shit post is high level shit

Not but thanks for uploading, just got a shit ton of excellent material.
Here's a cozy cyb pic for ya

>I'm sure there's much more to being a hacker that can't be learned from aircrack-ng documentation.

From The Art of Exploitation by Jon Erickson:
The idea of hacking may conjure stylized images of electronic vandalism, espionage, dyed hair, and body piercings. Most people associate hacking with breaking the law and assume that everyone who engages in hack-
ing activities is a criminal. Granted, there are people out there who use hacking techniques to break the law, but hacking isn’t really about that. In fact, hacking is more about following the law than breaking it. The essence of hacking is finding unintended or overlooked uses for the laws and properties of a given situation and then applying them in new and inventive ways to solve a problem—whatever it may be.

>How do I learn the kind of things you'd need to do in a ctf?
By doing them.

>No i would have a far better use.
>But spending 400$ just to shit post is high level shit
I don't see the difference, It's not like I couldn't shitpost from a mountain, or anything.

So I guess hacking is just spending months or years researching how something works. Then once you have a deep understanding of that thing you can start finding ways to exploit it.

>>amazon.com/Fundamentals-Wireless-Communication-David-Tse/dp/0521845270
>>amazon.com/001-Illustrated-Protocols-Addison-Wesley-Professional/dp/0201633469/ref=sr_1_5?s=books&ie=UTF8&qid=1510179317&sr=1-5&keywords=tcp&dpID=51jbAgYTQ8L&preST=_SX218_BO1,204,203,200_QL40_&dpSrc=srch
>>amazon.com/TCP-IP-Illustrated-Implementation-Vol/dp/020163354X/ref=pd_sim_14_1?_encoding=UTF8&psc=1&refRID=S2P8GYCAYB1SG5TH26N0
>>amazon.com/Unix-Network-Programming-Sockets-Networking/dp/0131411551/ref=asap_bc?ie=UTF8
>>amazon.com/UNIX-Network-Programming-Interprocess-Communications/dp/B01JXQNTX6/ref=asap_bc?ie=UTF8

Sorry to /blog/ here but turning down a grad offer because I'd need to relocate. Considering spending a year hardcore self studying and getting certs (thinking OSCP) Does this sound like a retarded idea? A masters degree in sec here is retarded money for fuck all hours, teaching you the basics (hurr open wireshark). I know basics of netsec, (ie can do easier CTFs without much struggle) and I'd say I'm a solid programmer. Not much experience with RE which I'd like to change. Any advice?

jesus christ, i get that i don't know your situation; but turning down an offer is a bad idea providing you have nothing to fall back on. is relocating really completely out of the question for you?

What does it do? I need a visual example plox

WHY ARE YOU GETTING IT IF YOU HAVE NO USE FOR IT

YOU ENORMOUS RETARD

that's the opposite of security. If you don't know what you have it for, you shouldn't have it.

>datascience
What part of that makes you think the cyberpunk and cyber security thread is a good place to ask this question

Do you really think it's at all related?

Yeah unfortunately, I'd be leaving my family, gf and moving to a different country where i dont know anybody.

How do I protect all my accounts online? Is there ways to archive reddit, facebook etc. accounts so I have record of what I did on those accounts? I am getting a roommate soon in college, how do I protect my laptop so they dont try and hack it physically when I am not looking?

Questions from a newbie:

Is there a way to safely learn this stuff? (for example some kind of lab environment)

Is there a comprehensive guide or tutorial that deals with this type of thing?

what are the implications for when ajit finally kills net neutrality? is secure communication over the internet just going to be impossible?

>Is there a way to safely learn this stuff?
Reading is safe, as is learning the essentials of programming, analysis, decompiling/disassembly etc.

It is when you start portscanning something.gov that you should expect unmarked white vans to turn up in your neighbourhood.

not samefag, take them with you

Hide your physical stuff and install some smallform camera(s).
Though those might be illegal depending how you are living with your roommate

How am I going to hide my laptop from my roommate? What if they dig through my stuff? The room is only so big.

False bottom for a cupboard?
There are also locks for laptops if your laptops bottom has a hole for that.

>how do I protect my laptop so they dont try and hack it physically when I am not looking?
Keep it with you, and remember a very, VERY, small subsection of the population is even interested in hacking, let alone can actually do it.

I want to make a neural network that I can feed music to, and have it regurgitate something new, based off what it's been fed. That sounds cyb as fuck; a music making machine, that's personal and custom

read phrack, defcon/blackhat papers, research papers on exploits/network defense/crypto, blogs from experts on red teams/blue teams/purple teams, twitter infosec experts, search github for resources (awesome learning, etc.).

build a home lab that looks like a basic network: server, client, dmz, nids, hids, siem, web server, database server, email server, etc. then start hacking it. various ctfs can help, start with ones that have walkthroughs so you don't get stuck.

eat, sleep, breath c and assembly. understand circuits, logic gates, cpu design, compilers, os design, networking, language design, web protocols, database stuff and social engineering. practice with ida pro/radare/binary ninja, windbg/gdb/immdbg, gcc/clang/visual studio, burp/beef, set and get good.

brush up on your calculus and big o notation. know your basic algorithms in a couple languages. make sure you know all the os api calls to do a gui based network chat app that uses crypto. reverse some modern malware and do a little system/network forensics on a regular basis to stay sharp.

most importantly, get the fuck off Sup Forums and get to work.

discord.gg/eXk4bTC

Invite link for the biggest cyberpunk Discord. Lots of great channels and a new mod team that is really cleaning the joint up.

See you there, chummer.

are people using this again? I missed it

The first step to guiding someone down the path you want them to go down is making them forget where they came from.

>build a home lab that looks like a basic network: server, client, dmz, nids, hids, siem, web server, database server, email server, etc.

I need to write a book on how to do this. There doesn't seem to be anything in the field with this info

Just paste that into google; the results are pretty funny and sad.

>drawing
oh no now my collection of photoshop disapproving scooty grandpa cosplays will look unimpressive in comparison

Solid to-do list for all of the newbies asking stupid questions in this thread.

I capped it. For tax reasons.

>most importantly, get the fuck off Sup Forums and get to work.
it's always this step I fail on

Samesies

We are just flying through threads huh?

OuterHeaven up for immediate future; almost all the security improvements I wanted are in place.

Immediate future will be adding resources from past threads.

After that, will likely add Https/clearnet mirror and I2P accesses

>OuterHeaven up for immediate future
Sorry what?

As in it'll be up in the future, or it's up now?

...

I just tried connecting. It's still down for me.

bootin...

I don't know where this should go but Sup Forums seems like it would be more helpful for this than other boards

I want to make the helmet from ruiner. I am obviously out of my league on this. I'm trying to figure out what the best display type would be for this. It needs to be somewhat flexible which leads me to amoleds. Transparent+flexible would be ideal but do not exist let alone commercially available as far as I know. Now assuming I could even get the materials I would need to program the display. It's a cool project idea but fuck me if I'm ever going to actually be able to build it myself

I feel like diy or one of the cosplay boards would be more help

/cgl/ could help with the physical part of the helmet. Sup Forums I thought would know something about the displays I'm trying to use. didn't even consider /diy/ because I've never browsed it and I forget it exists

Shit.

Ok let me take a look. I may need to get a new onion address....transferring a hidden service onion should be as easy as moving the key and hostname with the /etc/tor/torrc config matching, but it hasn't worked that way yet....I've tried like fuck to keep the original onion, but it is becoming a pain in the ass..

Ive had some success in the past keeping the tor address persistent across VM instances. When im back in front of my main workstation tomorrow ill try and do it again amd will post results if i can get it to work.
Yay community

Adafruit has a lot of products that fit as well as tutorials for programming and making things, much relating to LED projects.

oooh that's a good tip user tyvm

outer is up for me

.

Thanks user. I got it though (finally)..
The issue is the configuration; I have a specialized config that I haven't seen elsewhere that I eblieve fits well with Citadel BBS and could form a persistent means of communication that is difficult to kill and (by the end of development) will make this particular hidden services more difficult to discover.

I call it Adamant Jacket REX right now; there is so much more that needs to to be done, but it intersects a project I was already working on for anonymity/privacy, so it has all been a happy coincidence.

Its time and material heavy now, I believe it will evolve along with us into something useful and difficult to kill...it is not where I'd like it yet, but also has to be and available for it to grow in other ways as well.

someone apparently found a JTAG interface to the intel ME via USB.
twitter.com/h0t_max/status/928269320064450560

I don't know how to feel

>twitter.com/h0t_max/status/928269320064450560
I don't know either. At least there's a way to remove the botnet. But they'll just change their malware i guess

I'll check in few minutes

Up for me to

>someone apparently found a JTAG interface to the intel ME via USB.
Expect millions of MEs to start bitcoin mining within a week.

Just don't use a wired connection to your nic. The POCs regarding controlling via ME requires power to the pc, and a physical, wired connection. Use wifi and ya clear bruss

>YOU ENORMOUS RETARD
Reporting in.
>If you don't know what you have it for, you shouldn't have it.
I know what I would have it for though. Mobile security.
>that's the opposite of security.
Where's the hole in the security m8?

...do you actually understand what they found? Because it quite clearly seems you don't.

not that one, apparently.
If it's the same as one of the slides he posted recently, all you need is a modified usb driver.
So, if shit hits the fan, any CE will do

>Where's the hole in the security m8?
Not having a clear, defined usage case means you don't have a clear, defined threat model.

Asking other people what you should use it for does not at all sound like you have a defined scope around limitations, zoning, ensuring it remains private and anonymous.

I don't think you're a retard for that reason. I think you're a retard for what sounds like you're pissing 400$ a month away for no good reason.

Im talking about this

people.kth.se/~maguire/DEGREE-PROJECT-REPORTS/100402-Vassilios_Ververis-with-cover.pdf

>Intel’s Active Management Technology (AMT) is, a hardware-based plat- form for remotely managing and securing personal computers out of band. AMT is available in most desktop and notebooks PCs equipped with an Intel Core 2, Centrino, or Centrino 2 processors with support for vPro technology. AMT operates independently of the platform processor and operating system. Remote platform management applications can access AMT securely, even when the platform is turned off, as long as the platform is connected to power supply and to a network. Developers can build applications that utilize AMT using the application programming interface (API) provided by Intel. While this might seem to enable creation of a powerful management tool, a secure infrastructure that is secure against insider and outsider attacks on an enterprise network is difficult. Unfortunately this technology can also potentially be used to create a powerful backdoor that is easily deployed and offers numerous features due to its almost unlimited permissions since the platform can be managed even though it is powered off.

bullrun seems like a good time to buy some xmr..watched 700$ worth add 30$ in two minutes..

Is anyone here following the "bio-hackers" thing?
Basically as CRISPR and other gene editing and GMO work is being monopolized by the government to prevent anyone from creating an AIDS transmitting mosquito, a lot of hacker types are starting their ghetto laboratories and making their home beer glow in the dark or their cat have pattern baldness and such.
Guy was talking about taking some of your flesh, some of your cancer, and comparing the genetic patterns, and tipping off your immune system to attack the difference by introducing small amounts of it so it learns to battle it.

How do you feel about what is essentially the /cyb/ aesthetic, but about genetics?

GMO is essentially hacking but with unclear long-term effects.
While it may be a almost universal cure for sickness, it may be(come) the ultimate downfall aswell.

imagine a world where CIA niggers actually glow in the dark.

whats the best book in c for someone who has no experience with c, but wants to put it to use in a pentesting environment?

is the knr book still good?

Yes, it can eliminate a lot of diseases (of the order of 1000) and slash what is the largest budget post in western countries, easily exceeding the defence budgets.

It can also form the basis for genetic warfare, making virus that will kill or debilitate specific ethnic groups. Wackypedia mentions such research has been going on for quite a while.

Some Sup Forums posters will insist that AIDS was such an attempt to kill black people, but it jumped ship to whites at some point.

>muh my gf and family!
>A foreign country!
Manchild

>Manchild
the fuck are you on about

>Some Sup Forums posters
No need to listen to them. The PK got their panties in a twist when it was stated that AIDS made the transition from apes to humans because they assumed certain humans performed unspeakable acts of depravity on apes. And that was never stated or or even implied by the researchers.

Eating monkey meat then?

cyberpunk isn't exclusively computer skills ;)

Yeah, it's also getting brutalized by corps hitmen when you don't have those.