|
wyoak posted:In the US key disclosure is now protected under the fifth amendment, but I don't know about other countries, and I don't know how specific that ruling is either. It'll get interesting when cases involving corporations refusing to comply with eDiscovery subpoenas start popping up.
|
# ¿ Jan 22, 2016 19:20 |
|
|
# ¿ Apr 25, 2024 22:29 |
|
sarehu posted:So the Apple thing is basically that on the iPhone 5C they're getting ordered to provide a signed firmware that'll let unlimited passcode attempts (or just reveal the password, or whatever). And this is something which would be technically impossible on later models. Right? https://blog.trailofbits.com/2016/02/17/apple-can-comply-with-the-fbi-court-order/ http://blog.cryptographyengineering.com/2014/10/why-cant-apple-decrypt-your-iphone.html
|
# ¿ Feb 18, 2016 02:24 |
|
How about starting with CIS's 20 Critical Security Controls and researching and understanding why each of them are implemented and how they fit into an enterprise environment? Probably better to have a base knowledge than mucking around with Kali and Metasploit tutorials.
|
# ¿ Apr 21, 2016 19:04 |
|
Swagger Dagger posted:For the people asking about learning infosec, I think you could do a whole lot worse than reading through these: https://www.humblebundle.com/books/no-starch-hacking-books
|
# ¿ Apr 28, 2016 14:35 |
|
Mustache Ride posted:Yeah, in the sit down the Sales Engineer had some intersting things to say about some of the questions I had, including, and I quote "We're not on Virustotal because we would catch everything and then the big 6 would use us as a reputation source and everyone would be using our engine." http://blog.eckelberry.com/a-bomb-just-dropped-in-endpoint-security-and-im-not-sure-anyone-noticed/
|
# ¿ May 5, 2016 18:16 |
|
I've been using Eric Conrad's CISSP Study Guide almost exclusively and I think it's well done. Far less dry than the old Shon Harris one.
|
# ¿ Jun 15, 2016 18:15 |
|
Diametunim posted:Anybody have tips for parsing PST files? I need to grab every email sent or received in an eight month time-span. Once I've done that I need to comb through the emails for certain keywords. I've tried using the built in advanced features in outlook but for some reason Outlook isn't returning all of the results. I'd like to do this programmatically but searching for python libraries that can parse PST files doesn't bring up much. Maybe this is a chance to export the PST and use one of the encase machines in my office. New-MailboxExportRequest -ContentFilter {((Received -ge "10/01/2015") -and (Received -le "12/31/2015")) -or ((Sent -ge "10/01/2015") -and (Sent -le "12/31/2015"))}
|
# ¿ Mar 17, 2017 12:26 |
|
BangersInMyKnickers posted:Not sure how long ago you took it, but they gutted the crypto areas where they test you on thing like AES modes, stream ciphers, 2DES vulns, stuff like that. I took it right at the beginning of the new test and the coursework was still teaching to the old one so I got to review all that stuff anyway, but I don't think they asked anything beyond the names of the people in the RSA acronym. The crypto stuff I got was more in line with how digital signatures work, what type of encryption is used for what, AH/ESP, etc...
|
# ¿ Mar 29, 2017 16:53 |
|
CLAM DOWN posted:CISSP is quickly becoming a paper tiger cert imo, the material you learn is good but the cert itself is vastly overblown. If there's any way you can afford it, or get your company to pay for it, do a SANS course/cert. They're stupid stupid expensive. Technical chops (or managerial in the case of CISSP) should always get vetted during the actual interview process.
|
# ¿ Mar 29, 2017 17:50 |
|
CLAM DOWN posted:I don't know what a "DoD 8570 industry" is, when we interview we do notice if you have a CISSP but it's not a filter in any way, and all it means is that you'd better know what you're fuckin talking about when we ask you security questions. http://iase.disa.mil/iawip/Pages/iabaseline.aspx
|
# ¿ Mar 29, 2017 18:04 |
|
Latest ShadowBrokers dump is apparently less of a nothingburger than their last one. https://twitter.com/x0rz/status/852851891285487616 https://twitter.com/hackerfantastic/status/852851946146975744
|
# ¿ Apr 14, 2017 13:18 |
|
MS already released the out of band patch. Nice response. https://twitter.com/msftsecresponse/status/861734360193552385
|
# ¿ May 9, 2017 12:51 |
|
That was certainly not doing the needful.
|
# ¿ Jun 12, 2017 17:27 |
|
Martytoof posted:Welp, I'll be happy to keep dumping podcasts on there then I guess Dump away. I put Security Weekly and Risky Business on there all the time and only 1 hour has ever been audited, which was eventually approved after i wrote a recap of the pod.
|
# ¿ Jul 31, 2017 14:07 |
|
https://twitter.com/MabbsSec/status/893166585736724481 No word on charges.
|
# ¿ Aug 3, 2017 19:01 |
|
Here's the indictment. https://www.documentcloud.org/documents/3912520-Marcus-Hutchinson-Indictment.html
|
# ¿ Aug 3, 2017 19:52 |
|
So this appears to be v bad.
|
# ¿ Aug 9, 2017 16:39 |
|
It's a no-priv RCE with a POC already in existence per the NIST calc. Good thing is that wsearch shouldn't be enabled by default on most servers. https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?calculator&version=3&vector=(CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
|
# ¿ Aug 9, 2017 18:49 |
|
Back online. https://twitter.com/MalwareTechBlog/status/897180606005694464
|
# ¿ Aug 14, 2017 20:46 |
|
I would say the Georgia Weidman book is pretty boss as far as introductory penetration testing skills and methodologies go. It lines up pretty well as a study guide for OSCP as well. Hacker Playbook 2 is also good.
|
# ¿ Aug 31, 2017 14:40 |
|
Cup Runneth Over posted:Infinite job security
|
# ¿ Sep 8, 2017 18:40 |
|
The worst part of CISSP study for me was poo poo like knowing what the 2nd to last stage of the software capability maturity model is. Kill Me. The stage is called Kill Me.
|
# ¿ Sep 12, 2017 21:23 |
|
Like 30 of my 40 CPEs were Security Weekly/Risky Business podcasts and watching SC Vendor Webcasts on lunch break. Shouldn't be too difficult to bang them out. https://www.scmagazine.com/webcasts/section/6821/
|
# ¿ Sep 14, 2017 17:59 |
|
Is Revo Uninstaller still a thing? Probably that.
|
# ¿ Sep 18, 2017 22:04 |
|
dont touch the poop, etc. https://twitter.com/GossiTheDog/status/912406976528863232
|
# ¿ Sep 25, 2017 22:17 |
|
CLAM DOWN posted:https://autodiscover.deloitte.com/owa/auth/logon.aspx?replaceCurrent=1&url=https%3a%2f%2fautodiscover.deloitte.com%2fecp Actual administrative functionality may still be disabled.
|
# ¿ Sep 26, 2017 19:14 |
|
Wait 2 hours. Someone on Twitter will RCE it through VNC or whatnot.
|
# ¿ Nov 28, 2017 23:28 |
|
EVIL Gibson posted:Look up hackbox . It's like a oscp lab without paying anyone. https://www.hackthebox.eu New boxes are released every week of varying difficulties. It's a lot of fun. e:Also, this isn't cert related but you should definitely be playing with the SANS Holiday Hack Challenge. https://holidayhackchallenge.com/2017/
|
# ¿ Dec 19, 2017 22:05 |
|
EVIL Gibson posted:I think msfvenom is okay??
|
# ¿ Dec 19, 2017 22:59 |
|
Embargo is lifted.
|
# ¿ Jan 3, 2018 23:28 |
|
Proteus Jones posted:Found in YOSPOS SecFuck thread:
|
# ¿ Jan 4, 2018 16:00 |
|
Cylance and Carbon Black have announced compatibility with Microsoft patches but wont be setting the required registry key just in case clients are using multiple endpoint platforms that could be incompatible. If you're using those you'll have to push out reg keys yourself.
|
# ¿ Jan 5, 2018 21:04 |
|
he/she wrote a manifesto on why swift was chosen. https://pastebin.com/mSYM5HS4 https://swiftonsecurity.tumblr.com/post/96422201504/do-you-worry-that-reporting-on-the-leaks-from-an
|
# ¿ Jan 19, 2018 20:23 |
|
Docjowles posted:In unrelated news: remember when everyone (including me) thought they were smart for dumping INTC shared before the embargo on Spectre/Meltdown was lifted?
|
# ¿ Jan 26, 2018 23:44 |
|
So this happened. I’m sure everything is fine. https://twitter.com/evacide/status/975862319472234496
|
# ¿ Mar 19, 2018 23:48 |
|
Unless it's specifically for a required compliance checkbox don't start looking into penetration testing until you have you have your house in order. That means taking a look at the CIS Top 20 Security Controls and honestly assessing your organization's security maturity level. Take care of the low hanging fruit. Do vulnerability assessments. Remeditate. Do more vulnerability assessments. Fix that poo poo too. https://learn.cisecurity.org/20-controls-download You'll also want to read up on threat modelling. The below is a pretty good read as far as 600 page tomes about loving threat modelling go. https://www.amazon.com/Threat-Modeling-Designing-Adam-Shostack/dp/1118809998 Diva Cupcake fucked around with this message at 14:29 on Apr 10, 2018 |
# ¿ Apr 10, 2018 14:26 |
|
whoops. lost my business model.
|
# ¿ May 10, 2018 23:44 |
|
Speaking of incompetent MSSPs and the SIEMs they run, thoughts on AlienVault?
|
# ¿ May 23, 2018 21:55 |
|
my bitter bi rival posted:I just finished Spam Nation and enjoyed reading it. Does anyone have any recommendations for other narrative-based books about hacking or security? Surveillance Valley is also on my list. Cuckoo’s Egg is obviously the great but if your inner BBS hacker teen didn’t love “Masters of Deception: The Gang That Ruled Cyberspace” then you’re wrong.
|
# ¿ Jun 26, 2018 23:49 |
|
|
# ¿ Apr 25, 2024 22:29 |
|
AT&T is buying AlienVault. lolquote:AlienVault is excited to announce the intended acquisition by AT&T. This acquisition will bolster AT&T’s and AlienVault’s ability to deliver cybersecurity solutions, including threat intelligence, across all sales channels. AT&T will continue to invest in and build on AlienVault’s foundational technology as the company integrates AlienVault into AT&T’s cybersecurity suite of services.
|
# ¿ Jul 10, 2018 21:37 |