Well then, it’s the new year and I already got one pentest almost done, with about seven others in the making!
Well then, it’s the new year and I already got one pentest almost done, with about seven others in the making!
I have some news about the SIM card setup, which may be interesting to no one, but if you are going this way, here are some snags I encountered along the way.
In this post, I would like to veer off-course for a bit and discuss a topic I find myself talking about more and more, which is freedom in all its senses. I will discuss certain kinds of freedom we have, ones we’re slowly gaining back, and what I understand under freedom of choice.
This will be a story about what I and a dear friend of mine are doing to keep our phone usage a little more private. I must admit he is faster at this, but I will try to weigh all the options before I go all in.
Good news, everyone! There is now a Libreboot image for the T480! Some purists may call this a sellout, a fake, but I call it a step forward. Anything less snooping than what is currently inside stock thinkpads is a step in the right direction.
It is with great sadness that I announce that I am back. This time, I would like to take a moment to talk about a topic I only recently realized is not talked about enough: Project management in penetration testing and the approach some companies take.
I’m back, baby! I fell back into the old lines. It took a few months, but I went from “Okay, I’ll go into the blue team for some more calm and a stable work environment” to “Well, since the pentests are already there, mind if I snatch one up?” This is my comfort zone. This is my happy place. After all that happened in the last 3 months, it’s good.
In this post, I will try to review, compare, and contrast two cybersecurity certificates I had the pleasure of passing in the same week: Certified Ethical Hacker v12 and BTL1 from Security Blue Team, which one I would pick if it hadn’t been paid for by my employer, and general tips on how to succeed.
Well, T-$(several days) until I start my new job. I am having some doubts about my skillset, and in this post I will try to describe my doubts, the way I intend to tackle them, and maybe a way to boost anyone’s self confidence who is trying to jump from red to blue or vice versa.
NOTE: Sorry for all you English-speakers, this one is mostly meant for the Czech audience. I will be posting a more general post on the same topic soon. In the meantime, Google translate is usable, but there will be terminology that will not fit your situation or legislature. Be advised.
In this blogpost, I will once again try to recapitulate my findings from this month. If you’re too busy to read, webapps are not as shit as previously believed and lockpicking is similar to buffer overflows. This sentiment is subject to change.
This is a response to a post by Garrett Mickley
Well, a lot has happened in the last week, and I want to talk about that, at least in part, and also about a topic that has come up in my discussions lately.
Time for the new year’s resolutions! A lot has changed in this year, and I want to summarize my thoughts. This article will probably go into too much detail from time to time, but hey, it’s my blog!
This one will be short, because I have my hobby getting ready.
Oh boy, I’m writing a lot now, aren’t I? For the last few days, I got myself thinking about tech, the sustainability and what I believe could be the future of tech.
Well, I guess I’ll put my thoughts on page once again. This time, I’ll do a little rant on my fears and goals regarding my profession and on what is waiting for me in 2024.
In this short post, I want to bring VPNs to your attention, show how I use them and dispel some myths that you may have. If you use VPNs and are familiar, this is probably not for you.
I have (somewhat successfully) reworked my VoIP setup, and would like to share it with you.
I had a beautiful experience this week and thought I’d mention it, for the benefit of all you folks building fake profiles to make yourselves harder to find (looking at some people from infosec.exchange.) This story is about how my misdirection got found, and worked very well indeed.
Well, I haven’t posted for a while! Lot of stuff happening in my personal life. But that is irrelevant for this blog post. We’re setting up a new home server!
You did not listen. To be honest, I doubt you read this, but still, you did not listen. Let’s try that again, in much clearer terms. In this blogpost, I will ommit any human rights and assume you are trying to ban encryption services with no regard for laws or my right to privacy.
I have had my HackTheBox account for a long time now. Getting close to a decade. For those of you who don’t know, HackTheBox is a training/CTF platform, similar to TryHackMe. It is also a little different, you cannot register a new account without an invite code. You would like an invite code? Sorry, I can’t give you one, and neither can anyone else. To get in, you have to find the invite code generator, use it, and get the code yourself.
I will consider this partially a rant, but also an open letter to the European Parliament (profanity included).
One thing you should do to maximize your personal privacy is to “change coats,” i.e. burning identities, burning bridges, not keeping a permanent record as often as possible.
I finally did it. I bought a Google phone and installed GrapheneOS (https://grapheneos.org). So far, after a month of usage, it’s not that bad!
Well, about 2 hours ago, my OSCP exam time ran out. At this point, I should be writing the exam report, right? Well, to tell you the truth, nothing would make me happier, except for one simple fact:
One week from now, I will be sweating in a lab. The OSCP, you know the one, 24 hours of ball-wrenching AD and other machines, made just for me. It will be purgatory, and I still feel woefully unready, but I’ll go for it. It’s a hill I wanted to climb for close to ten years now, so it’s only fair that I experience it and don’t chicken out. The failure is imminent, but every day in the labs, I am feeling a little more confident. Every box, every successful pwn is a thing I’m sure to remember.
I am almost through my OSCP lab time. I do not expect to pass on my first try. Why? Simple.
Last week, I found out a fun thing. My country has not one credit bureau, but four.
Well, I feel like I need to let off a bit of steam and vent about things I learned in the past week, month, in the regular, stream-of-consciousness fashion.
First of all, I must admit I have messed up this week. It started small, with an issue in my parents’ PiHole. The fix was not that complicated, but I had to upgrade the Raspberry pi zero to Raspbian Bullseye. After the update, I performed several updates. Autossh, VPN, I set all of that up no problem. During the update, I was pivoting through one of my private servers in the cloud.
Finally bought a Flipper zero! If you’ve seen me on twitter (how else would you find this post), you may have seen me posting some Flipper shenanigans. Now I will try to explain why I bought it and what it has done for me so far.
This is going to be fun. I have no stake in this, I am going to just yell at the clouds in this one. But I will also try to share what is available about the UP Phone (UnPlugged Phone) and the services underneath it.
In short, Roe v Wade was overturned by the Supreme Court.
I know I am late for the show (World Password Day was yesterday), but I had no access to the machine I usually write on, so I’ll get this off my chest now. I will illustrate my complaints about the proposed system, as well as potential solutions.
I moved to the “prepaid” card, and now every month, I get about $13 per month taken from my debit card. Sure, it’s still botnet, but it’s less of a botnet, since a virtual card number won’t lead attackers to everything I am.
To start this off, I have to say this: I have not ordered stuff in my real name for about a year now. I have one or two shops that know my name, but the vast number of e-shops have no idea who the package is for. Where I live, it’s not illegal to put a burner card number in (many banks support this feature nowadays) and a fake name in the order. If you can have your shit sent someplace else entirely, even better, although I cannot say I’ve done this (I do not have a private P.O. box at the time of writing).
In recent times, where most people work on their own (entrepreneurs, contractors, etc.), the field of branding has gone from being a thing corporations and companies do to something everyone should think of. However, in this post, I would like to explain the polar opposite I am striving for: Being a ghost (and leveraging that as branding).
Now, this is just gonna be a quick venting on what I heard today. It is for all the folks just starting in cybersecurity, and seems to be endemic to the US. The thing I’m talking about is bootcamps.
Guess who’s back!
It’s been a VERY long time since I’ve been offline, but now I’m back and I’m happy to say that everything’s going fine.
Okay, this will be a story with no tags and no connection to anything else. I just wanted to have fun with this one. This short story is about how I discovered a huge, incredible… standard tool and had fun with it as a teen and how I got a bottle of wine.
I have a phone. Surprising, I know. I also like my phone, so much so that I installed TWRP, LineageOS and Magisk. This means I can do whatever I want to my phone, take a full backup and do all sorts of snazzy shenanigans.
You may not feel like you need privacy. I know I felt the same way quite a while ago. Maybe you really know why you don’t want people in your private space, but don’t know feel comfortable enough defending your decisions (the question of do you have something to hide? is difficult to answer). This post will hopefully give you at least some ammunition for people who only have the idea of privacy in their subconscious.
So, we have another leak on our hands. The lucky winner of this year’s lottery is Facebook! And the unlucky losers are 533 million people. A few days ago it was published for free, and I actually made the effort this time. This post is not about what it means for users, because, as Facebook put it, It’s their fault for putting all that shit out there. I will talk about the version of the database I found and what we can do with it.
This is a small post about my experience with a project I recently did, an “OSINT flyover”. The projects are not finished yet, but once they are, I’ll update the post to say how the client accepted their report.
This is going to be a very short writeup for a very, VERY short and sweet box.
The Lazyadmin box is a box aimed at beginners. No information is provided save for the IP (once you spin up the box) and the tasks.
This is my reference sheet for tools and stuff I may need to look up when doing an AD pentest. If you find this interesting, feel free to browse. If you don’t, well… hi.
Well, here we are again. Yes, I WILL talk about passwords. No, you will not enjoy this, since in this blogpost, I will discuss my stance on passwords and what we should teach the younger generation to do. Furthermore, we will see why some people refuse to get longer passwords. Also, a side note on my current phone ponderings.
I enjoy cybersecurity, I do basically all of it. Weird rants may be incoming at any minute, so please, bear with me. If you suddenly find a post with ten different ways to poison a person or a critique of a TV series because humans don’t die that way, just skip to the good bits.