r1cksec, to infosec

New cheatsheets pushed 🕵️‍♂️​

https://github.com/r1cksec/cheatsheets

Including:

A nice writeup about a XSS vulnerability found on chess.com♟️​
https://skii.dev/rook-to-xss

This tool can be used as a framework for CI/CD security analysis :github:​
https://github.com/CycodeLabs/raven

A great post about Process Injection in the context of Kernel Triggered Memory Scans :hacked:​
https://www.r-tec.net/r-tec-blog-process-injection-avoiding-kernel-triggered-memory-scans.html

YourAnonRiots, to infosec Japanese
@YourAnonRiots@mstdn.social avatar
YourAnonRiots, to infosec Japanese
@YourAnonRiots@mstdn.social avatar
YourAnonRiots, to infosec Japanese
@YourAnonRiots@mstdn.social avatar

Introduction to Kismet | Kismet Wireless: Network Monitoring and Analysis | Hakin9

https://youtube.com/watch?v=NWpvswSlcKw

SecureOwl, to infosec

One of the best, and most underrated ways to get the most out of a pen test is to be a good pen test client. Seems easy, but you’d be surprised. What does it mean to be a good pen test client?

  1. make sure all the pre-test tasks, like provisioning of credentials, needed approvals etc, are completed well ahead of time. You ain’t paying the pentester to stand around and wait for access to be provisioned - so don’t. They also don’t want to stand around. They want to be pentesting.

  2. be responsive to questions and clarifications requested during the engagement. Pentesters have a tiny time window in which to maximize the value they can give you. Help them, don’t hinder them.

  3. give feedback on reports. Good, bad, neutral. Whatever, a lot of work goes into writing them (it should anyway, no ChatGPT you sneaky buggers), make people feel like their work has been reviewed accordingly.

  4. don’t fight to have things removed from the report because they are embarrassing. Fix the issue, have the tester retest and move on. You can say “we had a bug and our testing found it”, which is why you had a pen test in the first place. Putting pressure on people to hide finds isn’t fair.

  5. if you want a non-standard report format, mention that before the test begins. It’s your right to ask for the test results to be delivered to you however you please - in a spreadsheet for example, but asking a tester to reformat a report completely after delivery is lame. Don’t do it.

SecureOwl, to infosec

The Infosec Diaries: A collection of short stories, each episode in each series is based on a real-life story from the field.

Available on Kindle, Paperback and Audiobook

https://www.infosecdiaries.com

avolha, to security Polish

Tego jeszcze nie było - darmowy kurs kohortowy z podstaw bezpieczeństwa dla tych, którzy chcieliby się przekonać, czy pentesty to coś dla nich. Prowadzi @kacperszurek, więc jakość gwarantowana:

https://blog.szurek.tv/post/od-0-do-pentestera-kohorta/

SecureOwl, to infosec
SecureOwl, to infosec

🔐 Get ready to join penetration tester Laura Knight on an electrifying journey through the world of cybersecurity in "Pen Test Diaries"! 🔍💻

💥 Dive into her thrilling experiences, based on real-world scenarios, unraveling the technical and non-technical aspects of fortifying an organization's security measures.

🛡️ Follow Laura's gripping adventures and discoveries as she uncovers vulnerabilities, all in a riveting, fictionalized narrative. 📖✨

Perfect for tech aficionados or those intrigued by the dynamic world of penetration testing.

Find out more: https://www.infosecdiaries.com/

SecureOwl, to infosec

🔒 Delve into the gripping tales of true cybersecurity challenges in the InfoSec Diaries – where real-world incidents, investigations, and penetrating test discoveries come to life.

📘 Discover these compelling stories, now available in Paperback, Kindle, and Audiobook formats.

Uncover the truth behind cybersecurity with the InfoSec Diaries: https://www.infosecdiaries.com/

gbraad, to Youtube
@gbraad@mastodon.social avatar
malanalysis, to infosec

Dragos is looking for a Principal Penetration Tester for their USA team.
https://careers.dragos.com/jobs/2027?lang=en-us

Qualifications Minimum of 5 years of hands-on cybersecurity experience. Proven ability to perform penetration testing and threat emulation using known/expected tactics employed by nation states and other advanced threat actors. Extensive hands-on experience with common assessment and pen testing tools including Windows (LOTL), Kali, Python, C2 Platforms, Ansible, Docker, AWS, etc. Thorough understanding of cyber threats, common attack vectors, exploits, and adversary tactics, techniques, and procedures (TTP’s). Ability to calculate the operational or safety impact of exploited vulnerabilities and recommend mitigations or controls. Ability to collect and analyze network data in a cybersecurity context. Capable of establishing excellent rapport with customers across different levels, from practitioners to senior management, including the ability to facilitate training and present complex information to various audiences. Willingness to travel up to 30% (on average) for on-site customer engagements.
Compensation Base Salary: $160,000 USD Base comp + Benefits + Equity = $340,000 USD Comprehensive benefits plan (medical, dental, vision, disability, life insurance, 401K with match) Equity at Dragos is quickly growing and the total compensation under-represents the future growth and refresh program. This will be discussed on the first call with the Dragos recruiter.

kylewritescode, to fediverse
@kylewritescode@allthingstech.social avatar

Good morning . Hope your weekend was great and you had a nice relaxing time.

Let’s kick off the week with our chat. For today, let’s discuss what we have planned for today and the week ahead.

For me, just the usual work stuff. Have to check into this PenTest assessment as it’s still going and has not finished. 🤔 Also didn’t get to do what I wanted this weekend.

SecureOwl, to infosec

The penetration testing industry has exploded in the last decade, as more and more organisations seek assurance that their cybersecurity strategies are being effectively implemented.

The Pen Test Diaries allow you to follow penetration tester Laura Knight through the technical, and non-technical processes involved in testing an organisations information security measures.

Based on the author's real world experiences, the diaries tell fictionalised versions of penetration testing discoveries. A must read for anyone interested in computer security or the penetration testing field.

Learn more: https://infosecdiaries.com

SecureOwl, to infosec

The penetration testing industry has exploded in the last decade, as more and more organisations seek assurance that their cybersecurity strategies are being effectively implemented.

The Pen Test Diaries allow you to follow penetration tester Laura Knight through the technical, and non-technical processes involved in testing an organisations information security measures.

Based on the author's real world experiences, the diaries tell fictionalised versions of penetration testing discoveries. A must read for anyone interested in computer security or the penetration testing field.

Learn more: https://infosecdiaries.com

SecureOwl, to infosec

Last few hours to go get EVERY Infosec Diaries story on Kindle for FREE:

That includes 15 stories, 5 in each series:

Digital Forensic Diaries
Blue Team Diaries
Pen Test Diaries

Check out https://infosecdiaries.com, and click on “the stories” to find out more about each title.

SecureOwl, to infosec

InfoSec Diaries - Black Friday Special:

All Kindle editions of every story in the series are FREE to download today!

Check out https://www.infosecdiaries.com for more info about each story based on real life information security tales.

SecureOwl, to infosec

InfoSec Diaries - Black Friday Special:

All Kindle editions of every story in the series are FREE to download today!

Check out https://www.infosecdiaries.com for more info about each story based on real life information security tales.

BishopFox, to azure

“Recently, one of our pen testers found a bastion host during an assumed-breach . We were given the credentials of an employee within Azure Active Directory. The pen tester was able to log into SSH with Azure credentials. So, he got onto the bastion host, which was a box. One of the users on that box made their home directory world readable for everyone. He rifled through that user’s directory and found credentials for Snowflake, a third-party database service. He used those credentials to connect to the 3rd-party provider and gained access to production .” - @sethsec on a recent episode of the Cloud Security Podcast.

https://bfx.social/3sr7t2i

deweyritten, to random

Did you know there are white hat grizzly bear hackers in Yellowstone?

These bears were so good at breaking into things, they became habituated (and thus dangerous) to humans. Rather than be euthanized, they live at this wildlife center and perform regular testing to QA bear-resistant products.

You can watch them work here:

https://www.grizzlydiscoveryctr.org/product-testing

andrewfeeney, to random
@andrewfeeney@phpc.social avatar
avolha, to random Polish

Nowy odcinek "Cyber, Cyber…" - tym razem o testach penetracyjnych, czyli po co się je przeprowadza, jak wyglądają w dużych i małych organizacjach, czego oczekują klienci itp.

https://www.cybsecurity.org/pl/cyber-cyber-357-koordynacja-i-zarzadzanie-testami-penetracyjnymi/

r3pek, to random
@r3pek@r3pek.org avatar

anyone knows where to get Rubber Duckys on the EU?

SecureOwl, to infosec

Breaking in is half the battle.

The penetration testing industry has exploded in the last decade, as more and more organisations seek assurance that their cybersecurity strategies are being effectively implemented.

The Pen Test Diaries allow you to follow a penetration tester through the technical, and non-technical processes involved in testing an organisations information security measures.

Based on the author's real world experiences, the diaries tell fictionalised versions of penetration testing discoveries. A must read for anyone interested in computer security or the penetration testing field.

Find out more: https://infosecdiaries.com

SecureOwl, to infosec

Hello Fediverse Friends, to celebrate National Cybersecurity Awareness Month, I'm doing a surprise Audiobook giveaway!

Each of the codes below will redeem a surprise Audiobook title from the InfoSec Diaries series from Audible (UK or US).

First come first served - if you grab a code and redeem it, please drop a review on the audiobook! Hope you enjoy!!

Redeem at either https://www.audible.co.uk/acx-promo or https://www.audible.com/acx-promo

UK ->

XFL5XWNM2C3CQ
2EQW9FP5XSF2K
6JQYH99HZWNLU
23S9UDNFNB6UB
4XZQM4W3QHMY9
AHW9NS6QAH7YH
BASNEZ45876QY
BB7L3YFJE9L4B
CE33T6EZBPSA7
UUWLUA8WZP92H
GWJHGGDHJXJUS
H4JDSCW9E3KQ3

USA ->

LNMZ2NGD9P5M7
HAEMBY9TY4WU2
Y7B6TYURQCNT6
TEL44MMDN6EHH
YT6XQCGW3TAXG
ZDTHYDNJ54MGG
X39T4UXYU2LAU
Y8RTLG7WQDW3Y
4N8XKH8N9FK34
5GL85L465F7Z3
NYNMJPQR4S698
P5CGM32E57T5F

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • khanakhh
  • kavyap
  • thenastyranch
  • everett
  • tacticalgear
  • rosin
  • Durango
  • DreamBathrooms
  • mdbf
  • magazineikmin
  • InstantRegret
  • Youngstown
  • slotface
  • megavids
  • ethstaker
  • ngwrru68w68
  • cisconetworking
  • modclub
  • tester
  • osvaldo12
  • cubers
  • GTA5RPClips
  • normalnudes
  • Leos
  • provamag3
  • anitta
  • lostlight
  • All magazines