linuxmagazine, to linux
@linuxmagazine@fosstodon.org avatar

Did you miss the Linux Update newsletter last week? Read it now and subscribe free to get it every Thursday. https://mailchi.mp/linux-magazine.com/linux-update-linux-scheduling-tools

linuxmagazine, to python
@linuxmagazine@fosstodon.org avatar

Did you miss the Linux Update newsletter yesterday? Read it now and subscribe free to get it every Thursday! https://mailchi.mp/linux-magazine.com/linux-update-python-in-the-browser

Heliograph, to mastodon
@Heliograph@mastodon.au avatar

nice write up in #TheCrux thanks @daedalus :awesome: 👏

"​Federated social media software #Mastodon had an impersonation vulnerability that was patched last week. More than half the instance admins patched it in less than 24 hours. I enjoyed the comment from Elliott Wilkes, chief technology officer at Advanced Cyber Defence Systems, saying “there's just not the same investment in security because there's not massive revenue supporting the platform, and each owner of an instance has to perform security management on their own” as I look wistfully in the direction of Microsoft and its massively lucrative portfolio of security binfires."
Bugs were reported by German #pentesting outfit #Cure53 during a #Mozilla-requested audit.
https://www.theregister.com/2024/02/02/critical_vulnerability_in_mastodon_is/ #fediverse #socksup

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

Reviving Exploits Against Cred Structs - Six Byte Cross Cache Overflow to Leakless Data-Oriented Kernel Pwnage https://willsroot.io/2022/08/reviving-exploits-against-cred-struct.html #Pentesting #CyberSecurity #Infosec

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar
YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar
YourAnonRiots, to infosec Japanese
@YourAnonRiots@mstdn.social avatar
YourAnonRiots, to windows Japanese
@YourAnonRiots@mstdn.social avatar
YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

Form Tools Remote Code Execution: We Need To Talk About PHP https://labs.watchtowr.com/form-tools-we-need-to-talk-about-php/ #Pentesting #CyberSecurity #Infosec

AstraKernel, to rust

🪲 Shellcode evasion using WebAssembly and Rust

👉 Delivering metasploit stager payload using the WebAssembly to evade AV detection

https://balwurk.com/shellcode-evasion-using-webassembly-and-rust/

ericmann, to php
@ericmann@tekton.network avatar

I write #php. I'm pretty good with #security. I'm open to doing tech/architecture/code/security reviews for either PHP or specifically #WordPress projects. This includes #pentesting.

I'm not spinning up a dedicated site to solicit leads yet. But if this is a space you work in and you're interested in hiring a consultant/contractor to get you to the finish line ... drop me a DM.

Or email eric@eamann.com and we can discuss scopes/timelines/budgets.

apiratemoo, to hacking

I found this article refreshing for its honesty.

On a side note, have you noticed how many “training” sites there are now? It’s almost like people are making more money teaching hacking than actually doing it."

I agree, but it's worth noting the education market has been saturated with non-material, often designed as a ploy to encourage spending for a very long time now.

A cogwheel grift to get people spending.

Training resources (and the industry) suffer from the following issues:

  • Redundancy
  • Unnecessary word bloat
  • Staleness to dynamic alternatives
  • Outdated and unrealistic

https://assume-breach.medium.com/im-not-a-pentester-and-you-might-not-want-to-be-one-either-8b5701808dfc


aeveltstra, to jenkins
@aeveltstra@mastodon.social avatar
aev, to jenkins
YourAnonRiots, to infosec Japanese
@YourAnonRiots@mstdn.social avatar
YourAnonRiots, to infosec Japanese
@YourAnonRiots@mstdn.social avatar
secbsd, to infosec Spanish
@secbsd@exquisite.social avatar

🔐 SecBSD 1.4 Released for ARM64!

We are thrilled to announce the release of SecBSD 1.4 for Raspberry Pi, Apple M1/M2 Pine64 and more!

Download SecBSD 1.4 for ARM64:

https://mirror.secbsd.org/pub/SecBSD/snapshots/arm64
https://mirror.laylo.nl/pub/SecBSD/snapshots/arm64

Supported hardware:

Apple Mac mini (M1, 2020)
Apple MacBook Air (13-inch, M2, 2022)
Apple MacBook Air (M1, 2020)
Apple MacBook Pro (13-inch, M1, 2020)
Apple MacBook Pro (13-inch, M2, 2022)
Apple MacBook Pro (14-inch, M1 Pro/Max, 2021)
Apple MacBook Pro (14-inch, M2 Pro/Max, 2023)
Apple MacBook Pro (16-inch, M1 Pro/Max, 2021)
Apple MacBook Pro (16-inch, M2 Pro/Max, 2023)
Apple MacBoot Air (15-inch, M2, 2023)
Apple Studio (M1 Max/Ultra, 2022)
Apple iMac (24-inch, M1, 2021)
Banana Pi BPI-M5
NanoPi A64
NanoPi R5S
Orange Pi PC2
Orange Pi Zero Plus
Pine64 H64
Pine64 Pine 64/64+
Pine64 Pinebook
Pine64 ROCK64
Pine64 ROCKPro64
Pinebook Pro
Qualcomm Snapdragon 7cx
Qualcomm Snapdragon 8cx Gen 3
Raspberry Pi 3
Raspberry Pi 3 Model B+
Raspberry Pi 4
Raspberry Pi 400
Raspberry Pi Compute Module 4

In the coming days, we'll be adding more hacking tools for arm64. Stay tuned for updates!

YourAnonRiots, to infosec Japanese
@YourAnonRiots@mstdn.social avatar

Introduction to Kismet | Kismet Wireless: Network Monitoring and Analysis | Hakin9

https://youtube.com/watch?v=NWpvswSlcKw

#infosec #cybersecurity #redteam #pentest #pentesting #hacking #hackers #coding #opensource #Linux #windows

jhx, to security
@jhx@fosstodon.org avatar

Quite a good roadmap for anyone interested in #security / #pentesting 😎

https://roadmap.sh/cyber-security

SecureOwl, to infosec

One of the best, and most underrated ways to get the most out of a pen test is to be a good pen test client. Seems easy, but you’d be surprised. What does it mean to be a good pen test client?

  1. make sure all the pre-test tasks, like provisioning of credentials, needed approvals etc, are completed well ahead of time. You ain’t paying the pentester to stand around and wait for access to be provisioned - so don’t. They also don’t want to stand around. They want to be pentesting.

  2. be responsive to questions and clarifications requested during the engagement. Pentesters have a tiny time window in which to maximize the value they can give you. Help them, don’t hinder them.

  3. give feedback on reports. Good, bad, neutral. Whatever, a lot of work goes into writing them (it should anyway, no ChatGPT you sneaky buggers), make people feel like their work has been reviewed accordingly.

  4. don’t fight to have things removed from the report because they are embarrassing. Fix the issue, have the tester retest and move on. You can say “we had a bug and our testing found it”, which is why you had a pen test in the first place. Putting pressure on people to hide finds isn’t fair.

  5. if you want a non-standard report format, mention that before the test begins. It’s your right to ask for the test results to be delivered to you however you please - in a spreadsheet for example, but asking a tester to reformat a report completely after delivery is lame. Don’t do it.

SecureOwl, to infosec

The Infosec Diaries: A collection of short stories, each episode in each series is based on a real-life story from the field.

Available on Kindle, Paperback and Audiobook

https://www.infosecdiaries.com

AstraKernel, to infosec

🪲 Don't just stop at creating a video to crack software; also tag the corresponding software provider in the tweet

🤯 😅😂

#infosec #cybersecurity #Pentesting

BishopFox, to opensource

Want to learn more about the Bishop Fox #opensource tool Sliver? Then make sure you attend our upcoming #BFLive training session where we’re dedicated the entire time to upping your #pentesting ante with this popular #CobaltStrike alternative.

https://bfx.social/3HezvSw

SecureOwl, to infosec
SecureOwl, to infosec

🔐 Get ready to join penetration tester Laura Knight on an electrifying journey through the world of cybersecurity in "Pen Test Diaries"! 🔍💻

💥 Dive into her thrilling experiences, based on real-world scenarios, unraveling the technical and non-technical aspects of fortifying an organization's security measures.

🛡️ Follow Laura's gripping adventures and discoveries as she uncovers vulnerabilities, all in a riveting, fictionalized narrative. 📖✨

Perfect for tech aficionados or those intrigued by the dynamic world of penetration testing.

Find out more: https://www.infosecdiaries.com/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • ethstaker
  • magazineikmin
  • vwfavf
  • InstantRegret
  • Youngstown
  • Durango
  • khanakhh
  • slotface
  • ngwrru68w68
  • rosin
  • thenastyranch
  • kavyap
  • PowerRangers
  • anitta
  • DreamBathrooms
  • everett
  • tacticalgear
  • osvaldo12
  • cubers
  • mdbf
  • cisconetworking
  • normalnudes
  • GTA5RPClips
  • tester
  • modclub
  • Leos
  • megavids
  • All magazines