Can someone tell me what's wrong with my syntax? I keep trying to bruteforce a handshake file and it seems like aircrack either doesn't recognize my handshake file or sees it as a wordlist or something.
>crunch 4 4 charset.lst mixalpha-numeric-space | aircrack-ng -w - /root/handshake.cap -e (I put in the SSID here)
then it just immediately spits out "Passphrase not in dictionary, Quitting Aircrack"
Charles Peterson
...
Julian Long
nth for getting a radio transmitter
Kayden Kelly
any other places you guys hang out? im looking for some sites where knowledge is shared and serious discussions are made regarding computing but in cyberpunk manner, not stackoverflow type of thing. Im looking for relaxed but pro community.
Benjamin Johnson
Thanks for starting the thread!
>Is that legal? Would that be considered impersonating a firefighter? You probably should remove the sirens, flashing lights and modify the text. Perhaps add small text like not PODUNK FIRE BRIGADE.
The most important thing is that it is spacious and has that Snow Crash vibe.
FTP site is down, anyone got a spare alternative?
Ethan Sullivan
/prog/ and anyother obscure board types that I won't tell you because I'm a cunt
Colton Nguyen
Wish I knew where to start
Daniel Martin
pick something and start digging
Noah Roberts
visit irc you must
Wyatt Allen
I want to learn programming potentially UI
Robert Sanchez
Why doesn't aireplay-ng seem to be working as intended?
I tried it on my router, which seems to have DoS protection...
I tried it on my phone's wifi, and it doesn't affect it at all.
Is the network adapter possibly too weak, or do I have to change some arguments?
Elijah Roberts
Just to satisfy my curiosity, put -e before -w
Gavin Rogers
Then learn programming and potentially UI?
Carson Turner
Hey guise!
Just got my CompTia Security+!
I learned the basics, how do you think I should progress now? These seem to be topics about non-company related enterprise stuff. Am I right? Really love the subject and just getting into it, would appreciate hearing how you got to where you are.
Cooper Hernandez
>I learned the basics, how do you think I should progress now? Exactly what did you learn?
Anthony Martinez
I learned how to be a L33t hackerman!
Juan King
Find an area and get into it. Your class should have exposed you to different parts of security
Luis Torres
It’s too crowded I might as take up bachelors in math and fall through a crack
Camden Ross
Basic Encryption algo's, Oh and Hash Algo's Key's and the Infrastructure. Common Attacks. Business Practices (Prevention and Forensic procedures) What to do after an attack ( lessons learn, chain of custody)
TLS/SSH/ MITM/ TCP-UDP/ Spoofing
Just the topics, Tried to implement some, but never got too much past WireShark or Metasploit walkthroughs
Dylan Rodriguez
>google suddenly asks for microphone access
G-guys
Jeremiah Martinez
>It’s too crowded No it's not, you just don't really want to do it.
Dominic Edwards
>Just the topics, >Tried to implement some but never got too much past WireShark or Metasploit
Don't you think a good way to bolster your learning would be fix the shortfalls you've just said you have?
Michael Howard
>hastebins still broken
Caleb Edwards
Hmm,
BTW have you considered giving advice to other's user? I think you would be really good at it!
I do. Just not in a way that's recognisable. I don't want attention.
Austin Clark
You DO realize I was being Sarcastic right?
Justin Powell
Then you're a fool. You just highlighted where you're short on your learning, yet suggesting that you fill in those gaps isn't what you want to hear? What DO you want to hear? Because knowing you're short and not filling in that gap is a you problem, mate.
>try >read walkthroughs >understand and replicate walkthrougjs >find a new method NOT in the walkthroughs
Once you feel there's NO other way you could possibly crack this, you've got a few new, unique methods not mentioned elsewhere, move onto another one. There's fucking shitloads of them, so as long as you work through the answers and understand how they got root using that method, keep looking at the answers.
Go on exploit-exercises and work through some old vulns; shellshock, heartbleed, etc.
if you want to learn more about implementing the tools, then implement them.
Eli Adams
Cyberpunk has nothing to do with cybersecurity.
Mason Anderson
Your advice was as helpful to a new Gym-goer as saying Lift more weights and eat healthy.
Like, no DUH I need to do that, I know where I am, but not adding anything isnt my fault for your bad explaining.
THIS guy Has some steps I can actually take at my skill level and do something with. Tanks BtDubbs.
You surly cant be as autistic as saying 'watch this video and you should be all set!'
Sorry, did you put your ssid in the appropriate spot after moving the flags?
Nathaniel Rodriguez
It was down a few days but I just checked and now it is up.
Leo Cooper
It was mentioned in the last thread. A lot of people agree it is too far into uncanny valley.
Jordan Peterson
I know, but I was too much in a hurry yesterday to scrap the old ones from the archive. hastebin was a mistake
Elijah Cox
>hastebin was a mistake Things are getting spread out over many places, pastebin, hastebin, gitgud, OH and the FTP site. It is getting a bit overwhelming.
use google you autistic retard. hurrdurr dis boot2root is rlly hard pls let me eat from the palm of your hand. I can say, go to the gym. But if you don't find your own information this maybe it isn't for you.
Austin Edwards
>redundancy Sure. The problem is that all of these are out of sync with each other. On pastebin alone there are 3 sets of collections relating to /cyb/, many slightly different.
Jace Reyes
RISC-V might represent a hope for a back door free CPU. Others gamble on Andestech, now working their platform into the Linux kernel: lwn.net/Articles/740049/
Isaiah Cruz
The Altered Carbon teaser is suitably intriguing. /Cyb/ days are here again.
Jaxson Bell
...
Thomas Brooks
Yep. Sure did. Did the same "Passphrase not in dictionary, Quitting Aircrack" message
Robert Wood
That's the beauty of it.
Samuel Edwards
>page 9 bumpity bump
Noah Moore
Just like any other practical skill, it's up to you to assess where you're lacking, what options you have, and actually execute a plan to build expertise and whittle away weakness in those areas. Don't get pissed because didn't spoonfeed you what you should do.
It's as if you said you wanted to be strong and wanted a definitive guide on how to get there. Everybody's definition of strong varies, and there are a fuckton of ways to each definition. Someone might tell you to squat and deadlift, someone else might say bench pressing and bicep curls, and another might say only calisthenics and pullups.
You should ask questions that are more focused than "I want to gitgud where do I go?". Figure out what "gud" means to you and ask questions how you can improve yourself in more specific areas, like exploitation, reverse engineering, or systems administration.
Matthew Lee
So many scrubs with low tier questions who just need to LURK MOAR
Ayden Wilson
>Xeon E3-1270 workstation >A6-5200 mini ITX >Dell Core i3-2130 that I picked up from a junkyard What is the best way to protect my network with these three unused computers/potential servers?
Connor Campbell
Will we ever see widespread destruction of data? The idea that every dumb thing I did on the internet from age 12 and up will be immortalized in some way forever keeps me up at night. Do you think the average person will ever feel the same way and actually facilitate a "do-over" of sorts? Maybe with a new implementation of the internet?
Camden Davis
We get this question every few threads. No one cares what you did when you were 12. There is just too much information out there about everyone's pasts floating around who knows where. Unless you have something to hide or attract attention to yourself?
Logan Bennett
As for the destruction of data, I doubt information gathering agencies would just let all that data disappear. In fact, they have probably already archived all the shit you did
Kayden Moore
I don't regularly check these threads. It was less about me specifically(obviously no one cares or would even be easily able to pinpoint all of my digital footprints), and more about a general ethical dilemna. It's just very weird to me that the vast majority of the public has no issues with themselves and their kids having nearly their every thought archived from a very young age with nothing to really educate people on what NOT to do.
Adam Cooper
>t. mr i have never worked anywhere above the floor in a company
We check for old stuff when we hire you. All good companies do. Very few actually smart people did stupid shit when they where kids, those who did aren't that smart/useful and are considered a liability.
John Clark
>One way to estimate the communication capacity of the Internet is to measure the traffic moving through it. According to Cisco's Visual Networking Index initiative, the Internet is now in the "zettabyte era." A zettabyte equals 1 sextillion bytes, or 1,000 exabytes. By the end of 2016, global Internet traffic will reach 1.1 zettabytes per year, according to Cisco, and by 2019, global traffic is expected to hit 2 zettabytes per year.
Sure you browse through all that and pinpoint some anons 18 year old IP
Luis Bennett
If you chill out on your larping you'd realise there are entire businesses that both gather the data as well as search other companies archives. Try googling a username you used on a forum when you where 12. Then realise how the mail you signed up with is probably public. Then realise its very very very likely its connected to more emails, more forums etc etc.
Lucas Bailey
How exactly is someone getting my old username and/or email if I say nothing? Do they read my mind?
David Nguyen
Oh yeah that's right, you're never gonna give out any personal details to work for a company.
See post where i correctly predicted that you never worked above the floor at a company, i will now extend that to you probably being under-age.
Asher Barnes
>Your name is the same as the name someone used when they signed up for a roblox forums account in 2006! You're fired! You know that more than two people can have the same name, right? For most people, if they don't provide usernames from when they were 13 there would be almost no way that a stranger would be able to come up with a long list of info
Jaxon Jones
>Will we ever see widespread destruction of data? Probably never. EU has a few rules but are easily circumvented.
>No one cares what you did when you were 12. Except from when there are two job candidates with similar skills you will probably see HR want to dig up anything differentiating. Mind you in reality it will most likely be a question of who did the best job of hiding past mistakes.
>I don't regularly check these threads. Please do. The more the merrier and this general is already one of the comfiest in here.
>applicant's name is David Berkowitz >do a google search on his name >refuse to hire him It's not about HR caring or not, refusing to hire someone because someone with the same name has bad results when you search it online doesn't happen.
Leo Cox
=== FAQ update Preview 10 is now on the FTP site. A little about the Alita and the Altered Carbon trailers have been added. Cyberpunk in work and in .mil is underway.
Suggestions and feedback are always welcome.
Asher Perry
Page 8? Again!?
Bump with pic related to futuristic clothing: when?
Charles Parker
which version of windows
Jeremiah Ortiz
Bodysuits are gonna be a long wait, sadly.
Joseph Howard
8.1, up to date with patches
Ian Barnes
Telecommunication consolidations + social media + PRISM = everything you've ever said, purchased, or done online has been archived. It's just a matter of can that data be extracted in a meaningful way. The answer is, theoretically, yes. A human probably can't do it on a reasonable timescale, but future AI technology could. Just like how you can dox a person from a 30 second video clip by extrapolating the data, your shitposting from 5 years ago could be traced back just by comparing your billing statements and your IP address.
I would expect probably within 20-30 years nearly everyone will be subject to some manner of blackmail, and it will be done similar to a background check. Oh you want a job at Company? Well you said this about Position Y back in 2021 and that goes against prevailing groupthink. No job for you.
Kevin Rivera
I wish I hadn't done dumb shit as a kid. Fucking groupthink making loli bad now.
Levi Ward
I use websites under the assumption that all data will someday be leaked so i use different emails, passwords, etc when signing up for them if I deem it something I wouldn't want connected to me. There's a chilling effect with what the NSA is doing and people agree that it's a bad thing. But when random hackers release personal information to fuck with companies or just because they're mean, I never see the same argument made. In the end it's regular people that lose. Sure you could make the argument that nothing anyone does online is private, but that's a shit excuse and a bad thing to embrace. I think instead of releasing people's personal information it would be better to just erase it outright, for their own privacy, and to fuck with whatever company that is the target.
Connor Baker
probably pretty safe but it depends on what you're doing
Christopher Davis
How do you blame groupthink for the illegality of child porn? You're gross and deserve what you get.
Why? Spandex daily wear was hot just a few decades ago.
Thanks.
Look at the right towards the bottom of the page and you will find 4 numbers. Just now those are 83 / 9 / 38 / 6. Those are Replies, Images, Posters and Page respectively
John Thompson
Used to be on Usenet News but it is pretty much deserted these days.
Aaron Lewis
...
Elijah Gutierrez
I have offline backups of everything. Where should I post it?
Joseph Ortiz
That should've been the last OP with the pastebins: archive.rebeccablacktech.com/g/thread/63004669/ thank you user. I've already restored the OP and will use pastebin or the next thread again - provided I'm around when this one goes down the drain
Mason Brown
Hundreds of HP laptop models found to have hidden keylogging software
A security researcher has revealed that some HP laptops have hidden software which can log everything typed on its keypads. More than 460 models have been affected, dating back to 2012, according to the list released by HP.
wanted to add something, but it's already in the article This is the second keylogger code found in HP laptops this year. In May, Swiss security firm Modzero discovered a keylogger built into the HP audio driver.
Daniel Walker
Apple: it just works.
Blake Long
Good advice here. It's literally impossible to git gud at everything. But on the other hand as a newbie you generally don't have a clue where to start or even what your options are.
So a good questions would be: What are the options you have? How do I find out what fields are interesting for me?
And a good anwer would probably be more broad. If someone asks "how do I get strong?" you can tell them: "well there are different categories of strength you can develop. Do you want to have springiness, maximum strength or endurance? For endurance I recommend getting good at running medium distance first and then looking into calisthenics or lifting low weights with many repetitions .."
It's not always necessary to spoonfeed someone, but it's important to push someone in the right direction sometimes. Those that are willing to learn should at least know where to start..
Lincoln Mitchell
...
Jason Roberts
I believe 3D-printed clothes such as this will probably come sooner than those you mention
Zara and H&M are two of the largest and most powerful businesses on the planet, and they deal with everyday "urban" clothing. They wouldn't allow this unless they can control it, you can expect negative advertisement like the kind vegetarianism gets, and the popular perception would be that only mentally ill cuck freaks use 3D printed clothes.
Carter Williams
Make a backup directory in the FTP site under /Books/Cyberpunk and put it there.