/cyb/ + /sec/ - Cybersecurity and Information Security General

▌ All resources from past threads (paste and comments) will be present at OuterHeaven
> i2g3vsckj67dnjvb.onion

Θ Infosec questions: building an obsessive need to find your own answers could be a key for more than one chain.

Ω All are welcome here; the world is fucked and we are all in this together.

◙ Cypherpunk Manifesto
> activism.net/cypherpunk/manifesto.html
◘ Cyberpunk Manifesto
> project.cyberpunk.ru/idb/cyberpunk_manifesto.html
∆ Hacker Manifesto
> phrack.org/issues/7/3.html
± Guerilla Open Access Manifesto
> archive.org/stream/GuerillaOpenAccessManifesto/Goamjuly2008_djvu.txt

▓ Fables, realities, prophecies and mythology of a community:
░ What is cyberpunk
> hastebin.com/ayufiyuvew
▀ The importance of a cyberpunk mindset applied to a cybersecurity skillset.:
> youtu.be/pcSlowAhvUk
● Cyberpunk directory:
> hastebin.com/efohokurid
▬ Cyberpunk resources
> hastebin.com/onequqodih

▐ Cybersecurity essentials/resources
Reference books
> mega.nz/#F!YigVhZCZ!RznVxTiA0iN-N6Ps01pEJw
> PASSWORD : ABD52oM8T1fghmY0
> hastebin.com/oquzikafuz
> hastebin.com/owulepames
> Cntrl + F Basic Knowledges, Basic Training, Arms/Arm
> hastebin.com/edutujabez
▼ Endware: Heavy armor for anons, by anons
> endchan.xyz/os/res/32.html

◊ Free Shells and more
> sdf.org/
> shells.red-pill.eu/

₪ /cyb/ FTP
> ftp://collectivecomputers.org:21212/Books/Cyberpunk/
> user/password == guest

≡ IRC
> irc://irc.rizon.net:6697
> #Sup Forumspunk
> #Sup Forumssec
> (All require SSL)
> IRC guide:
> hastebin.com/zojomutudi

» Thread archive
>archive.rebeccablacktech.com/g/search/subject/cyb/
>archive.rebeccablacktech.com/g/search/subject/sec/
>archive.rebeccablacktech.com/g/search/text//cyb/ /sec//
> Thread backup
> cyberpunked.org/

Ψ Last Threads

Other urls found in this thread:

textfiles.com/hacking/
youtube.com/watch?v=vg9cNFPQFqM
youtube.com/watch?v=aj8mN_7Apcw
youtube.com/watch?v=cSp1dM2Vj48
pdfs.semanticscholar.org/b740/0abcd079535febf0686e5524a950fcf7d62b.pdf
lwn.net/Articles/740049/
github.com/meh/blender
archive.rebeccablacktech.com/g/thread/63004669/
rt.com/news/412778-hp-laptop-keylogger-code/
n-e-r-v-o-u-s.com/projects/albums/dress-in-motion/
gitgud.io/cyb/er/
twitter.com/lemiorhan/status/935578694541770752
wired.com/story/macos-update-undoes-apple-root-bug-patch/
twitter.com/BenoitLetondor/status/939127296266588160
support.apple.com/en-us/HT208332
reddit.com/r/iphone/comments/7inu45/psa_iphone_slow_try_replacing_your_battery/
wired.com/story/hackers-say-broke-face-id-security/
washingtonpost.com/news/the-switch/wp/2017/11/30/apple-is-sharing-your-face-with-apps-thats-a-new-privacy-worry/
thume.ca/2017/12/09/cvdisplaylink-doesnt-link-to-your-display/
twitter.com/AnonBabble

Can someone tell me what's wrong with my syntax? I keep trying to bruteforce a handshake file and it seems like aircrack either doesn't recognize my handshake file or sees it as a wordlist or something.

>crunch 4 4 charset.lst mixalpha-numeric-space | aircrack-ng -w - /root/handshake.cap -e (I put in the SSID here)

then it just immediately spits out "Passphrase not in dictionary, Quitting Aircrack"

...

nth for getting a radio transmitter

any other places you guys hang out?
im looking for some sites where knowledge is shared and serious discussions are made regarding computing but in cyberpunk manner, not stackoverflow type of thing. Im looking for relaxed but pro community.

Thanks for starting the thread!

>Is that legal? Would that be considered impersonating a firefighter?
You probably should remove the sirens, flashing lights and modify the text. Perhaps add small text like not PODUNK FIRE BRIGADE.

The most important thing is that it is spacious and has that Snow Crash vibe.


FTP site is down, anyone got a spare alternative?

/prog/
and anyother obscure board types that I won't tell you because I'm a cunt

Wish I knew where to start

pick something and start digging

visit irc you must

I want to learn programming potentially UI

Why doesn't aireplay-ng seem to be working as intended?

I tried it on my router, which seems to have DoS protection...

I tried it on my phone's wifi, and it doesn't affect it at all.

Is the network adapter possibly too weak, or do I have to change some arguments?

Just to satisfy my curiosity, put -e before -w

Then learn programming and potentially UI?

Hey guise!

Just got my CompTia Security+!

I learned the basics, how do you think I should progress now? These seem to be topics about non-company related enterprise stuff. Am I right? Really love the subject and just getting into it, would appreciate hearing how you got to where you are.

>I learned the basics, how do you think I should progress now?
Exactly what did you learn?

I learned how to be a L33t hackerman!

Find an area and get into it. Your class should have exposed you to different parts of security

It’s too crowded I might as take up bachelors in math and fall through a crack

Basic Encryption algo's, Oh and Hash Algo's
Key's and the Infrastructure.
Common Attacks.
Business Practices (Prevention and Forensic procedures)
What to do after an attack ( lessons learn, chain of custody)

TLS/SSH/ MITM/ TCP-UDP/ Spoofing

Just the topics, Tried to implement some, but never got too much past WireShark or Metasploit walkthroughs

>google suddenly asks for microphone access

G-guys

>It’s too crowded
No it's not, you just don't really want to do it.

>Just the topics,
>Tried to implement some but never got too much past WireShark or Metasploit

Don't you think a good way to bolster your learning would be fix the shortfalls you've just said you have?

>hastebins still broken

Hmm,

BTW have you considered giving advice to other's user? I think you would be really good at it!

BTW

This Part of the Sticky doesnt work:

₪ /cyb/ FTP
> ftp://collectivecomputers.org:21212/Books/Cyberpunk/
> user/password == guest

I do. Just not in a way that's recognisable. I don't want attention.

You DO realize I was being Sarcastic right?

Then you're a fool. You just highlighted where you're short on your learning, yet suggesting that you fill in those gaps isn't what you want to hear? What DO you want to hear? Because knowing you're short and not filling in that gap is a you problem, mate.

i found this website that has old hacking text files.
>>textfiles.com/hacking/

You need boot2roots. Grab images off vulnhub.

>try
>read walkthroughs
>understand and replicate walkthrougjs
>find a new method NOT in the walkthroughs

Once you feel there's NO other way you could possibly crack this, you've got a few new, unique methods not mentioned elsewhere, move onto another one. There's fucking shitloads of them, so as long as you work through the answers and understand how they got root using that method, keep looking at the answers.

Go on exploit-exercises and work through some old vulns; shellshock, heartbleed, etc.

if you want to learn more about implementing the tools, then implement them.

Cyberpunk has nothing to do with cybersecurity.

Your advice was as helpful to a new Gym-goer as saying Lift more weights and eat healthy.

Like, no DUH I need to do that, I know where I am, but not adding anything isnt my fault for your bad explaining.

THIS guy Has some steps I can actually take at my skill level and do something with. Tanks BtDubbs.


You surly cant be as autistic as saying 'watch this video and you should be all set!'

Link: youtube.com/watch?v=vg9cNFPQFqM

if i run a windows machine for awhile without any security other than maybe the windows firewall, how safe would i be?

Anyone seen alita trailer? Seems kind of like /cyb/er movie.

youtube.com/watch?v=aj8mN_7Apcw

that reminds me, the new ready player one trailer makes it look worse than before
youtube.com/watch?v=cSp1dM2Vj48

it spits out
"Segmentation faultlease wait..."

BRO

I am both guys.

Sorry, did you put your ssid in the appropriate spot after moving the flags?

It was down a few days but I just checked and now it is up.

It was mentioned in the last thread. A lot of people agree it is too far into uncanny valley.

I know, but I was too much in a hurry yesterday to scrap the old ones from the archive.
hastebin was a mistake

>hastebin was a mistake
Things are getting spread out over many places, pastebin, hastebin, gitgud, OH and the FTP site. It is getting a bit overwhelming.

>pic related


hahaha
#rekt

See:
>pdfs.semanticscholar.org/b740/0abcd079535febf0686e5524a950fcf7d62b.pdf

use google you autistic retard.
hurrdurr dis boot2root is rlly hard pls let me eat from the palm of your hand.
I can say, go to the gym. But if you don't find your own information this maybe it isn't for you.

>redundancy
Sure. The problem is that all of these are out of sync with each other. On pastebin alone there are 3 sets of collections relating to /cyb/, many slightly different.

RISC-V might represent a hope for a back door free CPU. Others gamble on Andestech, now working their platform into the Linux kernel:
lwn.net/Articles/740049/

The Altered Carbon teaser is suitably intriguing. /Cyb/ days are here again.

...

Yep. Sure did. Did the same "Passphrase not in dictionary, Quitting Aircrack" message

That's the beauty of it.

>page 9
bumpity bump

Just like any other practical skill, it's up to you to assess where you're lacking, what options you have, and actually execute a plan to build expertise and whittle away weakness in those areas. Don't get pissed because didn't spoonfeed you what you should do.

It's as if you said you wanted to be strong and wanted a definitive guide on how to get there. Everybody's definition of strong varies, and there are a fuckton of ways to each definition. Someone might tell you to squat and deadlift, someone else might say bench pressing and bicep curls, and another might say only calisthenics and pullups.

You should ask questions that are more focused than "I want to gitgud where do I go?". Figure out what "gud" means to you and ask questions how you can improve yourself in more specific areas, like exploitation, reverse engineering, or systems administration.

So many scrubs with low tier questions who just need to LURK MOAR

>Xeon E3-1270 workstation
>A6-5200 mini ITX
>Dell Core i3-2130 that I picked up from a junkyard
What is the best way to protect my network with these three unused computers/potential servers?

Will we ever see widespread destruction of data? The idea that every dumb thing I did on the internet from age 12 and up will be immortalized in some way forever keeps me up at night. Do you think the average person will ever feel the same way and actually facilitate a "do-over" of sorts? Maybe with a new implementation of the internet?

We get this question every few threads. No one cares what you did when you were 12. There is just too much information out there about everyone's pasts floating around who knows where. Unless you have something to hide or attract attention to yourself?

As for the destruction of data, I doubt information gathering agencies would just let all that data disappear. In fact, they have probably already archived all the shit you did

I don't regularly check these threads. It was less about me specifically(obviously no one cares or would even be easily able to pinpoint all of my digital footprints), and more about a general ethical dilemna. It's just very weird to me that the vast majority of the public has no issues with themselves and their kids having nearly their every thought archived from a very young age with nothing to really educate people on what NOT to do.

>t. mr i have never worked anywhere above the floor in a company

We check for old stuff when we hire you. All good companies do.
Very few actually smart people did stupid shit when they where kids, those who did aren't that smart/useful and are considered a liability.

>One way to estimate the communication capacity of the Internet is to measure the traffic moving through it. According to Cisco's Visual Networking Index initiative, the Internet is now in the "zettabyte era." A zettabyte equals 1 sextillion bytes, or 1,000 exabytes. By the end of 2016, global Internet traffic will reach 1.1 zettabytes per year, according to Cisco, and by 2019, global traffic is expected to hit 2 zettabytes per year.

Sure you browse through all that and pinpoint some anons 18 year old IP

If you chill out on your larping you'd realise there are entire businesses that both gather the data as well as search other companies archives.
Try googling a username you used on a forum when you where 12. Then realise how the mail you signed up with is probably public. Then realise its very very very likely its connected to more emails, more forums etc etc.

How exactly is someone getting my old username and/or email if I say nothing? Do they read my mind?

Oh yeah that's right, you're never gonna give out any personal details to work for a company.

See post where i correctly predicted that you never worked above the floor at a company, i will now extend that to you probably being under-age.

>Your name is the same as the name someone used when they signed up for a roblox forums account in 2006! You're fired!
You know that more than two people can have the same name, right? For most people, if they don't provide usernames from when they were 13 there would be almost no way that a stranger would be able to come up with a long list of info

>Will we ever see widespread destruction of data?
Probably never. EU has a few rules but are easily circumvented.

>No one cares what you did when you were 12.
Except from when there are two job candidates with similar skills you will probably see HR want to dig up anything differentiating. Mind you in reality it will most likely be a question of who did the best job of hiding past mistakes.


>I don't regularly check these threads.
Please do. The more the merrier and this general is already one of the comfiest in here.

HR will not care.

>₪ /cyb/ FTP
>₪
oy vey

And every email in existence is [email protected]

>applicant's name is David Berkowitz
>do a google search on his name
>refuse to hire him
It's not about HR caring or not, refusing to hire someone because someone with the same name has bad results when you search it online doesn't happen.

=== FAQ update
Preview 10 is now on the FTP site. A little about the Alita and the Altered Carbon trailers have been added. Cyberpunk in work and in .mil is underway.

Suggestions and feedback are always welcome.

Page 8? Again!?

Bump with pic related to futuristic clothing: when?

which version of windows

Bodysuits are gonna be a long wait, sadly.

8.1, up to date with patches

Telecommunication consolidations + social media + PRISM = everything you've ever said, purchased, or done online has been archived. It's just a matter of can that data be extracted in a meaningful way. The answer is, theoretically, yes. A human probably can't do it on a reasonable timescale, but future AI technology could. Just like how you can dox a person from a 30 second video clip by extrapolating the data, your shitposting from 5 years ago could be traced back just by comparing your billing statements and your IP address.

I would expect probably within 20-30 years nearly everyone will be subject to some manner of blackmail, and it will be done similar to a background check. Oh you want a job at Company? Well you said this about Position Y back in 2021 and that goes against prevailing groupthink. No job for you.

I wish I hadn't done dumb shit as a kid. Fucking groupthink making loli bad now.

I use websites under the assumption that all data will someday be leaked so i use different emails, passwords, etc when signing up for them if I deem it something I wouldn't want connected to me.
There's a chilling effect with what the NSA is doing and people agree that it's a bad thing.
But when random hackers release personal information to fuck with companies or just because they're mean, I never see the same argument made.
In the end it's regular people that lose. Sure you could make the argument that nothing anyone does online is private, but that's a shit excuse and a bad thing to embrace. I think instead of releasing people's personal information it would be better to just erase it outright, for their own privacy, and to fuck with whatever company that is the target.

probably pretty safe but it depends on what you're doing

How do you blame groupthink for the illegality of child porn? You're gross and deserve what you get.

>page 10
don't you die on me

I won't let it die, user. bump

WHat now that this doesnt work?

github.com/meh/blender

Where do you cucks see what page your on?

Why? Spandex daily wear was hot just a few decades ago.

Thanks.

Look at the right towards the bottom of the page and you will find 4 numbers. Just now those are 83 / 9 / 38 / 6. Those are Replies, Images, Posters and Page respectively

Used to be on Usenet News but it is pretty much deserted these days.

...

I have offline backups of everything. Where should I post it?

That should've been the last OP with the pastebins:
archive.rebeccablacktech.com/g/thread/63004669/
thank you user.
I've already restored the OP and will use pastebin or the next thread again - provided I'm around when this one goes down the drain

Hundreds of HP laptop models found to have hidden keylogging software

A security researcher has revealed that some HP laptops have hidden software which can log everything typed on its keypads. More than 460 models have been affected, dating back to 2012, according to the list released by HP.

rt.com/news/412778-hp-laptop-keylogger-code/

wanted to add something, but it's already in the article
This is the second keylogger code found in HP laptops this year. In May, Swiss security firm Modzero discovered a keylogger built into the HP audio driver.

Apple: it just works.

Good advice here.
It's literally impossible to git gud at everything.
But on the other hand as a newbie you generally don't have a clue where to start or even what your options are.


So a good questions would be:
What are the options you have?
How do I find out what fields are interesting for me?

And a good anwer would probably be more broad. If someone asks "how do I get strong?" you can tell them: "well there are different categories of strength you can develop. Do you want to have springiness, maximum strength or endurance? For endurance I recommend getting good at running medium distance first and then looking into calisthenics or lifting low weights with many repetitions .."

It's not always necessary to spoonfeed someone, but it's important to push someone in the right direction sometimes. Those that are willing to learn should at least know where to start..

...

I believe 3D-printed clothes such as this will probably come sooner than those you mention

n-e-r-v-o-u-s.com/projects/albums/dress-in-motion/

Some user from prev thread already posted a reup I think. Thanks anyway, redundancy is important.

>gitgud.io/cyb/er/

>google installed

Yeah... Last month in Apple:
twitter.com/lemiorhan/status/935578694541770752
wired.com/story/macos-update-undoes-apple-root-bug-patch/
twitter.com/BenoitLetondor/status/939127296266588160
support.apple.com/en-us/HT208332
reddit.com/r/iphone/comments/7inu45/psa_iphone_slow_try_replacing_your_battery/
wired.com/story/hackers-say-broke-face-id-security/
washingtonpost.com/news/the-switch/wp/2017/11/30/apple-is-sharing-your-face-with-apps-thats-a-new-privacy-worry/
thume.ca/2017/12/09/cvdisplaylink-doesnt-link-to-your-display/

Zara and H&M are two of the largest and most powerful businesses on the planet, and they deal with everyday "urban" clothing.
They wouldn't allow this unless they can control it, you can expect negative advertisement like the kind vegetarianism gets, and the popular perception would be that only mentally ill cuck freaks use 3D printed clothes.

Make a backup directory in the FTP site under /Books/Cyberpunk and put it there.