[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
/nsg/ - netsec general
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 53
Thread images: 2
File: hacking hollywood vs reality.jpg (198 KB, 900x1283) Image search: [Google]
hacking hollywood vs reality.jpg
198 KB, 900x1283
/nsg/ - netsec general.

Last thread went pretty successful, lets keep the discussion going. The wiki page needs to be updated.
https://wiki.installgentoo.com/index.php/Netsec_general

This thread is about security, exploits, computer networks, hacking and mitigations. Questions more related to programming than security will probably belong on /dpt/
>>55431084

How To Become a Hacker: http://catb.org/~esr/faqs/hacker-howto.html

Learning:
http://cybrary.it/
http://n0where.net/
http://www.offensive-security.com/metasploit-unleashed
http://resources.infosecinstitute.com/
http://www.windowsecurity.com/articles-tutorials/
http://www.sans.org/reading-room/
https://www.corelan.be/index.php/articles/
http://opensecuritytraining.info/Training.html
https://www.blackhat.com/html/archives.html
http://www.securitytube.net/

News/CVE releases:
https://threatpost.com/
http://www.deepdotweb.com/
https://packetstormsecurity.com/
http://www.cvedetails.com/
http://routerpwn.com/
http://www.exploit-db.com/
https://www.rapid7.com/db/
http://0day.today/

Wargames:
http://overthewire.org/wargames/
https://www.pentesterlab.com/
http://www.itsecgames.com/
https://exploit-exercises.com/
http://www.enigmagroup.org/
http://smashthestack.org/
http://3564020356.org/
http://www.hackthissite.org/
http://www.hackertest.net/
http://0x0539.net/

What are you working on /g/?
>>
I hacked your IP, it is 192.168.0.0
Your fucking dead kiddo
>>
epic general op, we surely needed another general on /g/enerals
>>
>>55431208
Last thread had a lot of discussion. But I could always post what /g/ really needs: yet another GPU or cellphone thread.
>>
>>55431208
Yeah let's make room for more graphics card and smartphone threads
>>
>>55431238
rekt
>>
>>55431238
>>55431242
Samemind
>>
>>55431261
>Both posts made within 20 seconds from each other
>>
I'm currently using the DDG api for python. I'm making a script that takes a query in the form of a person's name, and then grabs all of that person's public data. I don't need any help, but if anyone has done this before or has any tricks that you've learned about data mining, let me know.
>>
>>55431327
What are you implying?
>>
Which kali linux programs are your favorite?
>>
>>55431436
vim
>>
>>55431436
The c compiler is my favorite Kali gnu + Linux program
>>
What's the point? Hacking is dead.
>>
>>55431524
Intrusions happen all the time. This thread is about security.
>>
>>55431524
Are you an idiot?
>>
>>55431564
Intrusions are either done to complete illiterate idiots or are government-funded and well out of your league.

A simple firewall and keeping your software up to date negates any possible non-gov intrusion.
>>
>>55431484
>>55431517
It's entirely possible that you're being pedantic and actually do pen testing and the like, but somehow I doubt it
Enjoy your dead thread
>>
>>55431603
>>55431636
Look man, we just want to talk about netsec/information security.
>>
>>55431775
There is no point. If you have nothing to hide you have nothing to fear.
>>
>>55431849
thanks for your valuable contribution.
now please get >>>/out/
>>
Wow you killed this thread good guys
>>
>>55432194
It's obvious that there aren't enough people on the board who can provide any valuable contribution. Most of what I've read so far has been misinformed shit.
The wiki page is good though.
>>
>>55432250
>Misinformed shit
Welcome to /g/
>>
>>55431603
Right, let me go to my team and tell them all that money invested in monitoring software was a waste, all we needed was a simple firewall.
>>
what is the most patrician attack vector /nsg/?
>>
>>55431169
>pic
>'real' hacking
You mean social engineering?
>>
>>55432421
Tell that to Mitnick.
>>
>>55431603
Completely depends on how much and how easily an attacker could profit from the intrusion.
I mean, the government gets it's experts from somewhere, and many of those are black hats.
They are not afraid use their expertise if they can make money off of it. They just got a better deal from the man.
>>
>>55432552
>the government gets it's experts from somewhere
Not from where you think it gets them.
>many of those are black hats.
Nah

There was an article recently that the FBI and NSA are short on experts, because they can't hire anyone with criminal offenses or anyone smoking pot.
Basically being a hacker in any illegal form prevents you from working for the government. Been like that since the Patriot act was signed.
>>
File: Frey.jpg (385 KB, 750x1051) Image search: [Google]
Frey.jpg
385 KB, 750x1051
tfw no meme hacker bf
>>
>>55431169
you guys should put basic videos of how some of the hacking work like the ones in computerphile in OP
>>
>>55432598
you are correct, but what I said does happen in China and Russia, they aren't afraid to cut corners especially since cyber warfare is the big thing
>>
>>55432598
>There was an article recently that the FBI and NSA are short on experts, because they can't hire anyone with criminal offenses or anyone smoking pot.
hint: intelligence agencies usually hire companies to do the dirty job.
>>
if anyone is starting to learn pentesting/hacking, I really suggest putting a Metaploitable VM and a Kali VM on a virtual network and just having a go at it. It won't make you much more than a script kiddie, but it will give you an idea of what happens in the easiest scenario.
>>
>>55432688
China and Russia have different approaches. China is similar to US, because like in any communist country ideology comes first, skills second. An ideologically corrupt criminal can't be hired.
Russia doesn't have any actual hackers, they are into social engineering and are either using throwaway independents via the "russian mafia" front or buy the information from an insider.

>>55432699
>hire companies

Are you from 2005?

They ARE the companies. Ever heard about Alphabet Corp? "Alphabet" as in "alphabet agencies". The one that has former CIA guys on the board of directors.
They aren't even hiding it.

The big 3 - Google, Facebook and MS are all owned by the government proxies.
>>
>>55432776
>China and Russia have different approaches. China is similar to US, because like in any communist country ideology comes first, skills second. An ideologically corrupt criminal can't be hired.
>Russia doesn't have any actual hackers, they are into social engineering and are either using throwaway independents via the "russian mafia" front or buy the information from an insider.
what the fuck am I reading?

btw, wtf does this have to do with infosec? how about you go argue elsewhere?
>>
>>55432598
criminal records is debatable, you can still get hired.

and as long as you dont show up to the interview high they dont care about smoking weed, you just have to stop
>>
>>55432657
Yes exactly
>>
>>55432895
at least there's something to discuss other than "how do I hack my neighbours wifi"
>>
>>55433128
>"how do I hack my neighbours wifi"
err, even that is more technical than
>hurr durr government hackers don't exist
or
>hurr durr government hackers are the only REAL hackers amirite
>>
>>55431849
Kysmm
>>
>>55432361
definitely 0-days you found yourself on embedded security devices
>>
>>55432361
Walking in wearing a fake moustache and a delivery man jumpsuit and walking out with the servers
>>
>>55432776
>thinks he knows what goes in the us intelligence sector
>holds up google, facebook, and ms as the top government contractors

it's like you didn't even try to research your post
>>
>>55433977
Sick dubs
>>
What's the best way to learn about code property graphs and graph traversal?

I've used gremlin to do some analysis on graphs I made in Neo4j, but that is about the extent of my experience.
>>
>>55431169
Remember to Link to /dpt/ and /wdg/ next time since they're hacker threads, too
>>
>>55431364
They can't be the same person, especially since neither provided an image.

Stay mad.
>>
>>55434813
/dpt/, not really, but

>/wdg/
>hacker thread

Honestly, kill yourself
>>
>>55434894
I thought you were implying it was the same person
>>
>>55434921
Fuck you nigger. Those 2 topics are closely related to the netsec whether or not those 2 threads are filled by idiots.
>>
>>55431775
You mean pretend to

Who the hell says to write port scanning shit in C when you can just use nmap?
Thread replies: 53
Thread images: 2

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.