Show more

I've had this going on for about five days now. Now, I pass it to you: youtu.be/rGKfrgqWcv0 Enjoy!

: day 1a: Missed yesterday. An internal org sent a link to a Wordle-type site as part of an awareness campaign for their services. At the end of the URL is some jumbled characters. Wonder if it's the word in encoded or encrypted format... Site let's one create a link to a word of their choosing. Trivial to go to the site and work out a key. They used the Vigenere Cipher. I win. (I'm also wkrup.)

: Day4 : A good chunk of time in Release Arena. Banged on Flight, a hard Windows box. I've gotten user with some nudges from a Discord group I worked with. Still working on root. Been a while since taking a crack at a Windows box.

ath0 boosted

Microsoft Warns on Zero-Day Spike as Nation-State Groups Shift Tactics

One of the most troubling manifestations of the trend is the increasing use among nation-state actors of zero-day vulnerability exploits in their attack chain. Microsoft's research showed that just between January and June of this year, patches were released for 41 zero-day vulnerabilities between July 2021 and June 2022.

darkreading.com/attacks-breach

: Day3 : More time working on PWST, sections 4-8 through 4-13. Videos were short, so don't too excited. There a 'more practice' video left in section 4, so plan is to spend some time on that tomorrow.

I've been keeping my Twitter account to protect my handle. And lurking. Also to keep lurking until the main folks I like to follow have moved. It keeps changing my setting from 'Latest Tweets' to 'Top Tweets'. What shit-housery.

ath0 boosted
ath0 boosted

: Day2 : Tuned in to @Alh4zr3d@twitter's twitch (twitch.tv/alh4zr3d). He streamed pwning the Tricky box. Watched @mttaggart's _Practical Webapp Security and Testing_ (academy.tcm-sec.com) (henceforth, PWST), sections 4-6 and 4-7. Need to spend some more time on 4-7 and the javascript trickiness.

: Day 1: Picked back up "Practical Webapp Security and Testing" by @[email protected]. Knocked out section 4-5, which is about sqli. Played around with ZAP Active Scan, tried out some different files for fuzzing and detecting sqli--fuzzdb, SecLists, and one I compiled from a couple of books. Will continue tinkering with manually enumerating the db before bed. Maybe see about getting mysql/mariadb table enum into my home-grown list.

Earlier this year I did a run. I got it done after a couple of stumbles and during that time I got a new gig as a . Also managed to start a course, but not finish. Plus, with being a new shiny, I need to refocus. Time for another run. Stay tuned...

ath0 boosted

Oi! ! For inside services, do you carry out any password spray attack exercises?

This ear worm has been rattling around my bald head all day. Your turn: youtu.be/iywaBOMvYLI

Oi! ! For inside services, do you carry out any password spray attack exercises?

ath0 boosted

Are you noticing some slowness? That's to be expected. We've become kinda popular lately, but don't worry. It usually subsides very quickly.

From infosec.exchange: infosec.exchange/@guamwatt/109 Dan Miessler is pretty smart. If you don't have a handle on your assets, you aren't protecting anything. You're practicing 'faith-based security' and 'faith-based systems administration'

ath0 boosted

My favorite joke:

How do you tell a plumber from a chemist?

Ask them to pronounce "unionized."

Show more

ath0

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.