computerboss

joined 1 year ago

Ok so to be clear when I said team I mean a bunch of college students preparing for different ctfs, but these are some of the more helpful resources we have found:

Tryhackme: personal favorite especially for beginners Hackthebox: great for learning/practicing attacks Overthewire: another good ctf site

We try to build many of our own ctf like machines, then each person switches their machine with another person and the other person tries to secure the vulnerabilities without knowing anything about the machine. Once everyone has secured their machines we try to attack them using the notes made while setting them up. This is our step by step for that process.

  1. download an old version of a distro. (Ubuntu 14, deb 9, ect)
  2. install and setup the VM without any updates or changes to the default configuration
  3. google the distro version (Ubuntu 14.04) + vulnerabilities or exploits
  4. read through the different sites to find applications that had huge security issues on that version and begin installing some of the programs that have known exploits

So for example with Ubuntu 14.04 we know there are some Linux kernel exploits.

A quick Google search returned this exploit: https://www.exploit-db.com/exploits/43418

Using Ubuntu's website I looked up other critical vulnerabilities and found these: https://ubuntu.com/security/cves?q=&package=&priority=critical&version=trusty&status=

From here I could add some of the packages mentioned as having exploits and then attempt to exploit them. I could also check newer versions of Ubuntu like 16 to find vulnerabilities that would also apply to older versions.

There is also Mitre's list(s) of the most dangerous software vulnerabilities. They have one for 2023, but also a catalog of lists from previous years.

https://cwe.mitre.org/top25/archive/2023/2023_top25_list.html

Hopefully this helps!

[–] computerboss@sh.itjust.works 30 points 1 year ago (2 children)

I can give you an answer from someone who regularly downloads really old EOL versions of Ubuntu and Debian. I personally use them as part of attack and defense competitions. They are normally very close to unusable and are nearly impossible to update to a more recent or secure version. This forces my team to find creative ways to keep them working while also taking measures to isolate them as much as possible. I also use them to teach old exploits that have been patched in more recent versions, walking people through how it worked and why it existed.

It happens a lot more with Windows machines, but there might be some manufacturing systems out there that require software that won't run on modern versions of the OS. These systems often require new manufacturing tools in order to upgrade, or they need massive overhauls that smaller companies can't always afford.

[–] computerboss@sh.itjust.works 9 points 1 year ago* (last edited 1 year ago) (1 children)

No one seems to have thought about the fact that most schools have been out for those three months. Not sure exactly how much of the traffic is high schoolers and college students cheating, but that could account for at least some of the loss in traffic.

Edit: missed a word

If you download a wireguard/openVPN conf file from Proton it will let you enable nat-pmp which is basically automatic port forwarding. It seems to work fine on a Linux machine running qbittorrent, but your case might be different.

[–] computerboss@sh.itjust.works 0 points 1 year ago (1 children)

You might have some luck with a private trackers like Sportscult. They have open signups right now.

I'm kinda the opposite of you. I love Bethesda games, but the fantasy element doesn't do it for me. I never liked Skyrim or the elder scrolls series but loved the fallout series, as well as games like outer worlds. I am not going to preorder the game but I am very excited to see their take on a space rpg, because I love fallout and I love space exploration so if combined well it should become an instant favorite of mine.

[–] computerboss@sh.itjust.works 1 points 1 year ago (1 children)

I bought a fortunate 60e a few months ago to play around with. After setting up some vlans, subnets, and firewall rules I am considering just selling it. Without a license you don't even get security updates. So at this point opnsense might be my next firewall to learn on. I was just trying to my hands on what is actually being used by companies.

It would be cool to see companies start offering homelab licenses for people to play around with and get experience before buying into a whole ecosystem.

[–] computerboss@sh.itjust.works 1 points 1 year ago (2 children)

I heard about the fediverse before, but never made an account until a few days ago. It is kinda cool how Mastodon, Lemmy, and Kbin can interconnect somewhat, but it does not feel like a fleshed out feature to me yet. There are still too many bugs when interfacing with other parts of the fediverse.

I like how maluable it feels right now. I really feel like if I dedicate a bit of time and effort I can make changes to and improve things. Or at the least break off and do my own thing that interacts with the fediverse.

I don't like how spread out and small all the communities feel. I think piracy has 5 different communities at this point. I am also torn on not having at least a centralized login. I kinda trust sh.itjust.works with my account, but there is little assurance that the instance, and my account on it, won't just disappear or attempt to do something malicious with my email and password.

I want Lemmy to take off and I think it has potential, but I also believe it will take at least another year before I am completely satisfied with it.

There might be some issues with lemmy.ml itself after a while, but the community should be able to move to a different instance if it becomes a problem on one.

[–] computerboss@sh.itjust.works 2 points 1 year ago (1 children)

Thank you for making this community. I enjoy keeping up with interesting attacks on r/cybersecurity so I was glad to see a similar one pop up on lemmy.

I am a 3rd year CS student and I am running my schools cyber security club. I am studying for the OSCP over the summer and working on setting up a server stack for the club. I haven't made many posts in the past but I am trying to engage more with the community.

I am excited to see what this community brings in the future!

I'm kinda surprised this hasn't happened sooner.

view more: next ›