• 0 Posts
  • 18 Comments
Joined 9 months ago
cake
Cake day: October 12th, 2023

help-circle







  • I have one.

    Its fun.

    But on the subject of rolling codes, I was able to get through a security gate that relies on, essentially, a garage door opener.

    The exploit relied on the ridiculously low amount of rolling codes it cycled through.

    Capture one, and try it a few times to get through.

    Cars are more robust. Despite tinkering with it for about 8 hours, I wasn’t successful with defeating it. That being said, I picked up the device, in part, to start messing around with various signals as an educational tool.




  • Me too.

    In high school, there was a kid who was always trying to make money. Like even then, he wanted his own business. In fact he had a couple small ones back then.

    One of his endeavours was massive LAN parties. He had the capital to rent spaces, hardware, and was even able to get sponsorships.

    He did not have the tech chops to do it though.

    Myself, and one circle of friends were THE computer nerds of the school, but it wasn’t really seen as a negative for us - then again we did orchestrate a “free day” and got away with it by taking down the schools network from inside and one person had a loud fucking mouth, but we covered our tracks.

    Anyways, we got in free to these LAN parties as long as we set up and maintained shit. Surprisingly very few problems, about once a LAN party we had to fix something. And it was useful experience.

    That shit was fucking amazing. I loved it.

    I got home from work. Wife works from home. She has had an ongoing tech issue I can’t really touch because it’s that companies property. But I just don’t want to hear it. At all. I’m dead inside in that regard.

    It’s gotten so bad that I had an issue with my gaming rig.

    I needed to reseat the RAM. Not hard, except the case is mounted on the wall as a display piece that would require moving a bunch of shit before getting a ladder and yada yada.

    I just didn’t game for three days. Just could not muster the energy to care about that. I hate it.


  • Bounties are a bit nebulous.

    Actual pen testing companies have red teams (attackers) that have a scope of what they are allowed to target, and how they go about it.

    For example, just because a red teamer can get into the data center to do stuff locally doesn’t meet the scope requirement of testing their web page externally. They would be prosecuted most likely.

    Pen testing companies also have lawyers, at least they should, who help negotiate scope and what is legally allowed and in what context.

    Due to the secrecy needed for some tests, the security staff may not be aware a test is in place. From what I understand, generally people have some sort of paperwork on their person, or at least the contact information of someone at the company with the authority to authorize this red team pen test.

    That being said, cops may still get called, you may still get arrested, and have to deal with the courts.

    Or worse, some trigger happy security guard shoots you.

    I’m just studying that stuff though at the moment, so take what I said with a grain of salt.







  • Social engineering, arguably, is one of the harder things to learn.

    It’s a collection of soft skills, and if you’ve been paying attention to rank and file tech jobs, places are looking for people with soft skills because they’re so impractical to train.

    This goes down to your basic help desk tech.

    Anyone with an interest in computers can sit down and learn how to analyze and exploit weakness in code. In fact, it’s a fun puzzle. Dealing with other people, let alone establishing oneself as another person and fucking SELLING that character enough to get what you need?

    People write off social engineering far too quickly. It’s quick, it’s effective, and if done well, the person you exploited doesn’t even realize they’ve been tricked.