>how Russia tracks every move and communication of the NSA script kiddies
Benjamin Nguyen
So you be sayin, Russia haxx Egnos so they're always 10 step ahead? Damn, that's like 5th Dimensional Chapayev.
Robert Peterson
How can Linux be hacked remotely?
Liam Sanders
Beginner here. Currently reading Hacking the Art of Exploitation I'm currently in chapter 3 but some of the code samples dont seem to work, for example: #include #include
int main(int argc, char *argv[]) { int value = 5; char buffer_one[8], buffer_two[8]; strcpy(buffer_one, "one"); /* Put "one" into buffer_one. */ strcpy(buffer_two, "two"); /* Put "two" into buffer_two. */
printf("[BEFORE] buffer_two is at %p and contains \'%s\'\n", buffer_two, buffer_two); printf("[BEFORE] buffer_one is at %p and contains \'%s\'\n", buffer_one, buffer_one); printf("[BEFORE] value is at %p and is %d (0x%08x)\n", &value, value, value);
printf("\n[STRCPY] copying %d bytes into buffer_two\n\n", strlen(argv[1])); strcpy(buffer_two, argv[1]); /* Copy first argument into buffer_two. */
printf("[AFTER] buffer_two is at %p and contains \'%s\'\n", buffer_two, buffer_two); printf("[AFTER] buffer_one is at %p and contains \'%s\'\n", buffer_one, buffer_one); printf("[AFTER] value is at %p and is %d (0x%08x)\n", &value, value, value); }
When run with 1234567890 as the argument, the last two numbers are suppose to overflow into buffer_one but they dont. So is this book still relevant? Or am I just an idiot worrying over nothing and should just understand the overall idea behind it and continue reading?
Xavier Perry
>Discord >Matrix/Riot
So this is how a general dies. Send my regards to the cyberpunk/cybersecurity threads that came before. Holy LARPing Christ.
Gavin Walker
How to remain user now that Tor is compromised? Inb4 VPN meme
Isaiah Brooks
Get some good habits, and search for a non backdoored CPU (gl with that), TOR is US Navy so what's the point. Try i2p? Zeronet is a meme too.
Contribute or fuck off. You're still the same salty faggot aren't you? Pathetic really.
Tyler Young
>code from a book written in 2003 doesn't work
Concepts are still relevant, check which versions your using.
Robert Carter
Who /Department of Energy CDC/ here?
Juan Bennett
It's the second edition, I'm pretty sure that's the latest edition. I'll continue reading it then.
Ayden Cook
Not a yank, but I got a question for ya:
The Department of Energy security clearance required to access Top Secret Restricted Data, Formerly Restricted Data, and National Security Information, as well as Secret Restricted Data, is a Q Clearance.
what did they mean by this? what could possibly happen if someone, lets say china/iran/russia finds their way to DoE network infrastructure?
t. illiterate in USA memes.
Grayson Lewis
Use the ubuntu .iso that comes with it, you can download it at nostarch site.
Ayden Nelson
Not him, but I tried DLing the .iso from NoStarch and shit didn't work, no seeders or w/e.
been doing CTFs and want to practice writing reports, anyone got any resources or templates for writing reports?
Joseph Foster
Had enough seeders when i tried few days ago.
Jack Jackson
>is this book still relevant
Yes. It's all about the concepts. I'm about 3/4 through it. Found the beginning a bit slow but still a really great and informative read.
Jose Moore
Oh, good to know then.
Joshua Cooper
The internet is US Navy.
Evan Rogers
...
Wyatt Sanchez
I once stole someone's password by secretly filming them and analyzing their hand movements on the keyboard.
Am I a hacker?
Wyatt Morgan
LOL, easily
Brayden Ward
Dude idk I'm just going to a cyber security competition they are hosting.
Josiah Perez
You can't remain user. The only option is to hide in plain sight, add some facebook and reddit in your history and nobody will give a fuck about you. The people who use tools and VPN's are already on a categorized watchlist.
Isaiah Gutierrez
Yup, completely untraceable and smart, actually.
Jayden Watson
like how?
Parker Carter
Steal all the energy
Wyatt Cruz
give one example, that would happen exclusively on linux on an up to date system
Aaron Rodriguez
>wanted to set up piratebox on a raspberry pi 1 >either the wifi adapter or just the whole system is too shit
Mason Ramirez
pi 1s don't have wireless IIRC, you need an adapter
Robert Turner
I did, but only have some ancient 802.11g ones which don't seem to support AP mode well
Jason Bell
Will do, thanks for the help. I appreciate it.
I'll read on then. And I felt the same, but i guess thats the gist of it, learning how everything works. Thats why I got so excited when I got to the point of stack overflows, because I could see that knowledge in use. Thanks for replying.
Elijah Roberts
pirate boxes are a meme anyway unless you live in some tech city, most people just connect since it's open then they can't get internet so they disconnect
Which is the to go freelance website in this field?
Ayden Jenkins
at least use IRC like an oldfag
Kevin Carter
"We" do that too. Ham radio guys who track satellites have mapped the course of several "anonymous" satellites. Apparently they are capable of basically, sniffing communications from other satellites.I guess tapping into the physical backbone of the internet wasn't enough.
Blake Morgan
WHY IS HE SO FUCKING UGLY!?
Jack Myers
Hey, hey, cut it.
Brayden Gonzalez
Thread's back I can shill my video! Hackthebox Node.
How to learn hardware hacking and where to start ?
Jason Perez
Learn ee
Bentley Rodriguez
Yes but where to start ?
Jason Rogers
Plug a battery into a light? IDK what to tell you, you're trying to enter an extremely complex field when you don't even understand the basics of how that field works
Jordan Cook
I have a question Hackerman. I know a lot of anons on g despise Apple, but is IOS on Iphones secure or is it easy to exploit.
t. brainlet
Austin Lee
it's no more secure than a well configured android phone, but could be less secure since hypothetically apple could have added backdoors or vulns to it, so it could be equal or worse, main reason it's actually secure is because it's a walled garden
Brayden Lewis
iOS exploits are worth far more than Android exploits, and it's generally regarded to be way more difficult
Jonathan Mitchell
It's not anymore but since half of the population is still using Android 5.0. It's hard to exploit pixel 2s pretty much like newest iphones.
Hunter Price
The Nexus/pixel line is the only decent one, and even then The rest is an absolute shit show, vendors add tons of useless kernel modules that get popped all the time
I'm not going to watch this while I'm at work, I'm sure it's something like 'apple had backdoors in their phones!!!!!' If so, do you think your Huawei phone is better? It's widely known in the VR community that apple phones are more secure, there's features like secure enclave that has absolutely nothing similar on android
Elijah Rodriguez
??? read
Carson Green
I didn't see they had a transcript available
Adam Lewis
The most secure knowledge is your own
Luis Thompson
Is the cybersec community on the verge of dying?
I get the feeling that it's getting there. :(
Chase Torres
I think you mean infosec and no it's thriving, why do you feel like it's dying?
Anthony Rivera
Well it's more to do with a gripe that I have of not finding like-minded cybersec enthusiasts irl.
>Why do you think the Internet exists, you dunce?
Yeah, but I find the experience much more thrilling if I can actually meetup with people rather than stick your head on IRC and Discord channels all day.
Carson Barnes
Eh, it's a podcast dude, you just have to listen. The story is better than that though.
Zachary Watson
google search for local infosec cons or hackerspaces
Noah Ortiz
they manage the nuclear stockpile and do fusion research. if you go after that stuff you'd better have the russians or chinese to cover your ass.