• 2 Posts
  • 62 Comments
Joined 11 months ago
cake
Cake day: July 25th, 2023

help-circle
  • Not at all what I meant. The premise was that this wouldn’t happen if they were being paid fairly. Supply chain attacks happen with or without fair pay.

    Look at what happened with the XZ backdoor. Whether or not they’re getting paid just means a different door is opened.

    The root of the problem is that we blindly trust anyone based on name-brand and popularity. That has never in the existence of technology been a reliable nor an effective means of authentication.

    If it’s not outright buying out companies it will be vulnerabilities/lack of appropriate management, if it’s not vulns it’ll be insider threat.

    These are problems we’ve known about for at least a decade+ and we’ve done fuck all to address the root of the problem.

    Never trust, always verify. Simple as that.




  • For anyone interested - I’d you are using umatrix to block shit you can punch these lines into a new text file and import as blocklist, then commit it with the tiny arrow that points left toward the permanent list to save it permanently:

    * www[.]googie-anaiytics[.]com * block

    * kuurza[.]com * block

    * cdn[.]polyfill[.]io * block

    * polyfill[.]io * block

    * bootcss[.]com * block

    * bootcdn[.]net * block

    * staticfile[.]org * block

    * polyfill[.]com * block

    * staticfile[.]net * block

    * unionadjs[.]com * block

    * xhsbpza[.]com * block

    * union[.]macoms[.]la * block

    * newcrbpc[.]com * block

    Remove the square brackets before saving the file - these are here to prevent hyperlinks and misclicks.

    Edit: this is not a bulleted list, every line must start with an asterisk, just in case your instance doesn’t update edits made to comments quickly.

    Edit2: added new IOCs

    Edit3: MOAR IOCS FOR THE HOARDE




  • Not quite!

    Try:

    mylist = [value for value in range(1,20)]

    This says I want to make mylist be a list where each element of the list (called value here) comes from doing a for loop on range, given the parameters 1, and 20.

    If you want to change how each element of this list is, you do it in the first bit on “value”

    So you could do

    mylist = [value*5 for value in range(1,20)] //5,10,15,…,95 (not 100, because ranges go up to the last item, not including it (non-inclusive))

    Etc. Hope this makes sense!

    Edit: MISSING CLOSING PARENTHESIS DOH



  • So when you hover over an item usually, it shows on the bottom left/right what the link is

    But in this case (edge and chrome) I see the link actively changing and like resolving or something of the sorts. Very odd. I don’t normally use these two put it was the only way I could see the sponsored links (thanks Firefox!)

    Normally I’d expect just a static “this link here, goes here” rather than it changing in real time like this. Wondering if it’s normal chrome/chromium behavior or if this is an exploitation of google search functionality stemming from the google search source code leaks from earlier last week or the week prior.

    Very interesting stuff.






  • You’re in luck! Cybersec people, for the most part, love sharing what they know/have done with each other. Many believe in freedom of information and find value in open collaboration. We just wanna show you the whacky thing we did with what we had.

    The biggest resource I’ll share with you is membership with ISAAC. Find whatever category you fit into here and push to get your org membership, if you don’t already. This puts you into a huge working group with your industries’ peers and they will have all sorts of resources for you to use including discussions, meetings with pros, etc.

    There’s also SANS who has some free stuff (check their Reading Room) but also has classes (paid, expensive, but veeery worth it imo, again if you can get buy-in)

    Outside of the paid membership options, there’s still a lot of good options:

    • MISP is a great threat intel sharing platform, but will require some setup as a product (free && opensource). Take this one slow, you don’t want data leakage. Start small and locked down, gradually open up as you gain buy-in/trust/confidence.

    • Cybrary IT is a free+paid learning platform, good stuff here - lots of diversity including business stuff

    • OWASP - more so for web-app security, still good knowledge to add to that toolbox

    • OpenSecurityTraining - heard some good things about this site, I think you may enjoy it - I have not used it myself, but please let me know if you have any problems/reasons you don’t like it.

    Then there’s always the classic CTF/Hack Challenges websites out there which let you get real experience with red-teaming/bolstering your knowledge of attacker TTPs (Techniques, Tactics, Procedures):

    • HackTheBox - challenges for practicing your skills. No hand-holding, just a sandbox for you to play in. They have academy offerings (paid, and a new service, recommend skipping unless you can get buy in from the company/have a team who would benefit from a bulk-license purchase), regular free boxes to challenge yourself with, etc

    • TryHackMe - this one is also CTFs but its more so lesson based/training stuff

    • Heard good things about KC7 as well, seems to be more threat hunting/blue team focused (blue team = defend, red team = attack)

    • LetsDefend - Free + paid options, more blue team stuff, great for SOCs which may or may not hit your mark.

    Hope this helps you out, biggest thing is getting integrated with the community, reading the news (religiously), and managing burn out. Security is an uphill battle, but we roll this boulder for others who cannot. Respect your body and take care of your mental, or you will burn out and scar yourself. LMK if you need anything!


  • I think so too tbh, kinda seems like the course for any new technology tbh. Implementations come and go as we refine the tech itself - not sure if you’ve read it before but “How We Got To Now” was a pretty good read. Talks about tech in general all the way from the invention of glass to modern tech and discusses the social reception along the way. Think they made a tv show about it too IIRC



  • Been playing around with Image generation for a little while now - so much fun. I’d never want to monetize off my work, mainly because I know that a lot of the image training is stolen (specific verbiage ‘stolen’ is my opinion, not legal damnation)

    With that being said, does anyone know of any specific projects/models which are solely trained on consensual training/sharing? I know if my own artistic abilities were better, I’d want to share with the community and would have interest in training my own models to generate new, creative stuff with my unique stroke added.

    edit: may as well share a couple gens I recently made that I thought were pretty neat:




  • I’m an InfoSec guy (cybersec, intel, risk)

    The biggest thing I attribute to my various success is mostly personal growth. You can learn everything in the world about tech, but it means squat if you can’t get buy in, don’t have trust, etc. As much as we hate to see it, silos are still very real and InfoSec can be hard to communicate sometimes. I look at it like this: most departments can hang up their jackets at the end of the day and say “im done working” and not have to worry about it from there. With security, it’s constant and affects pretty much every aspect of your life. Information/strats/etc are changing constantly, by the hour and that means we have to take a different approach to things.

    However, for the purposes of this discussion, I’d have to say OSINT frameworks and being one with the intel community are huge. You can learn a lot from peoples failures, success, and what threat actors/hacktivists/etc are doing. MISP is pretty cool, but it can be a bit unwieldy to the uninitiated. My recommendation would be to lock it down as much as you can off the bat, run it in a vm, and learn the inter-workings from youtube and their documentation/other sec. companies documentation until you feel more comfortable. I’d also recommend going to some conferences, competing in some ctfs, etc to not only network, but to also work on skills and learn from others and their techniques/paths/routes.

    Automation and scripting are also huge, of course. Learn Python (I can’t stress how much I fucking love python and it’s syntax - genuinely enjoyable to use for 99% of your ‘I need a thing that does this for me quick’), JavaScript (I know, I know, but the bad guys loooooove obfuscating JS - like it or not, these be yo’ vegetables. The faster you eat your vegetables, the faster you get to desert.), etc.

    There’s always certs too - I have mixed feelings about them, but I would recommend only going for certs you know are in high demand in your area. So many people shell out hundreds of bucks for what are essentially paperweights. I think Thor (youtube shorts guy aka piratesoftware) mentioned something about only going for keys that you know will unlock doors you want to open.

    Don’t feel like you have to learn everything at once either. Cybersec is fucking massive, and there are maaaaany facets for you to get snuggy inside. Pick whats interesting, and run it into the ground. Don’t stop until you get bored. When you’re bored, pivot into other areas that may now be more interesting to you.

    Which brings me to Cryptography. This is huge today, and it will become more important as we progress towards commercialization of quantum computers. This area is a bit book heavy, because its an intricate process, but push through it. Embrace the Chaos Theory! If math isn’t your thing, thats okay too. Like I said, there’s a lot of other areas you can become an expert/advanced in.

    As I also mentioned, networking and being social with the Cybersec/IT community is huge. Back in the day, hackin was about fuckin around with what you had and doing whacky stuff to show your buddies. Share with each other, be kind to each other, never stop learning and let those creative juices fly. Find what inspires you and love the fuck out of it.

    Hope this helps anyone who’s interested. Might not be the best advice, but it’s what has worked for me. Looking forward to any conversation!