mastodon.online is one of the many independent Mastodon servers you can use to participate in the fediverse.
A newer server operated by the Mastodon gGmbH non-profit

Server stats:

11K
active users

#pentesting

25 posts15 participants4 posts today

[Update – 8 hours later]
BashCore still holding strong.

RAM steady at 700 MB

Load average: 0.25 0.18 0.20

No GUI, no disk writes, 6 active terminals

Running from a USB 2.0 stick (8 GB!)

Host: Acer Aspire One D160 (2009, 2 cores, 2 GB RAM, no battery, Wi-Fi only) 😅

Uptime test continues. 6.5 days to go.

Yo, IT-Sec crowd! ✌️

Anyone else noticing how *everyone* seems to be talking about AI-powered security tools these days? Yeah, it's everywhere. But let's be real for a sec – are they *truly* as amazing as the hype suggests? 🤔

I mean, okay, AI can definitely be useful for spotting anomalies and patterns, no doubt about that. But here's a thought: what happens if the AI itself gets compromised? Or what about when it starts churning out false alarms simply because it doesn't *really* grasp the situation? 🤖

Honestly, I've got my reservations. While automation is certainly nice to have, I'm convinced a skilled pentester, you know, one with actual brainpower and a strategic approach, still outsmarts any AI – at least for the time being. 😎 And look, if AI eventually *does* get significantly better, well, that just means it's time for us to add another skill to our toolkit. 🤷‍♂️

So, what's your perspective on this? Do you see AI completely taking over the pentesting scene, or is that human touch going to remain irreplaceable? 🔥 Let the debate begin!

Heads up, everyone! It looks like North Korea's targeting npm *again* with some sneaky supply chain attacks, often disguised as phony job offers. 😒

Here’s the kicker: standard automated tools frequently miss these kinds of threats! That's where the real work comes in. You really need a skilled pentester doing deep, manual analysis to uncover this stuff. 🕵️‍♂️

Don't forget, the health of open source relies on all of us. Always scrutinize new repos carefully and keep a close eye on your dependencies. And yeah, using 2FA isn't optional – it's pretty much essential these days!

What are your go-to security practices to guard against these kinds of attacks? Share your thoughts below!
#npm #supplychainsecurity #pentesting

Seriously, let's talk about these AI-generated "security" reports... Man, they really set off alarm bells for me. 🚨 Sure, AI *can* definitely speed up certain processes, no argument there. But honestly, a proper pentest? That's a whole different beast compared to just running a few automated scans. You need real human expertise and critical thinking behind it.

So many people seem to think AI catches everything, but let's be real – these tools can seriously hallucinate sometimes. They just make stuff up! And what happens then? The client ends up *thinking* their system is locked down tight, when it’s actually got holes wide enough to drive a truck through.

Look, security isn't just some product you buy off the shelf; it's an ongoing *process*. AI should absolutely be part of our toolkit, there to *support* us, not replace us entirely.

And hey, before you blindly trust that shiny AI report? Maybe, just maybe, get an actual human pentester to lay eyes on it too. Better safe than sorry, wouldn't you agree?

What are your own experiences with AI in the IT security world? Are you feeling more skeptical or optimistic about its role? Drop your thoughts below! 👇

Yikes! Only 19 and already slinging malware with the help of Russian bulletproof hosting? 😳 It really hammers home how low the barrier to entry has become these days...

Let's talk Bulletproof Hosting (BPH) for a sec: These are basically your "we don't give a damn *what* you host" providers. Unsurprisingly, they're a favorite among cybercriminals. Proton66 seems to be one of the bigger players in that shady neighborhood. And yeah, it's definitely a problem. 🙄

But here's the kicker – a total rookie mistake: This person left a directory wide open on their server. BOOM! Just like that, their whole infrastructure was exposed. A classic OPSEC fail! 😅 Look, everyone's gotta start somewhere, but maybe not *quite* like this.

The individual behind this, known as 'Coquettte,' is apparently pushing malware disguised as fake antivirus software. They're using the Rugmi loader to drop info stealers like Lumma, Vidar, and Raccoon. So, definitely keep an eye out for any sketchy ZIP files or installers doing the rounds! ☝️

Bottom line: Even beginners can cause real damage, especially with services like BPH readily available. And it just goes to show, nailing those OPSEC basics is absolutely crucial!

So, what's your take on BPH? Do you see it as a serious threat, or is it more of a minor nuisance in the grand scheme of things? 🤔 Let me know below!

Whoa, the situation with Ivanti is getting wild! 🤯 Had a client ping me today – their Connect Secure is acting up. Turns out, it's a nasty stack-based buffer overflow... and yep, it leads to RCE. Ouch! Sounds like quite a few versions are vulnerable.

Speaking from experience as a pentester: you know automated scans often miss stuff like this. That's where manual analysis becomes absolutely crucial! And unfortunately, N-Day exploits are just part of the game these days. Mandiant seems to have dug up quite a bit too (think TRAILBLAZE, BRUSHFIRE, SPAWN). And get this: they're apparently using routers for obfuscation – clever, but definitely sneaky. Word is the China-based group UNC5221 might be behind it.

So, folks, here's the drill: Patch IMMEDIATELY (get onto version 22.7R2.6!). Keep a close eye out for any web server crashes. You might even need to consider a factory reset. Definitely ramp up your monitoring, double-check those access controls, and get those passwords reset!

What's your take? Have you run into issues with Ivanti vulnerabilities before? 🤔 Let's hear it.

Whoa, this is wild: a supply chain attack using GitHub Actions *nearly* nailed Coinbase. Seriously intense stuff! 🤯

Turns out, all it took was a swiped Personal Access Token (PAT). If you're wondering, think of a PAT as basically the master key to GitHub... get your hands on one, and you can cause some *major* havoc. 🔑

Speaking from my pentesting experience, it's often the tiny details that lead to the biggest breaches. So, definitely double-check those GitHub Actions workflows and *please*, rotate your PATs regularly! Remember, Security by Design isn't just some fancy term – it's absolutely essential. And let's be clear: automated scans are *not* the same as a real penetration test. Sorry, not sorry.

Anyone else run into similar situations? What tools are you folks using to lock down your CI/CD pipelines? Drop your thoughts below!

From day one, TShark has been an essential part of #BashCore. It’s not just a substitute for Wireshark—it’s the same powerful engine, but fully command-line. If you’re serious about network analysis and pentesting, mastering TShark is a must.

It has nothing less than Wireshark, just no GUI. Learn it, and you’ll have full control over packet capture and analysis, even on minimal systems.

wireshark.org/docs/man-pages/t

www.wireshark.orgtshark(1)

Wow, things are really heating up in the threat landscape again! Hearing about Hijack Loader pulling new anti-VM stunts, *and* now SHELBY malware is actually abusing GitHub for its C&C? Seriously wild stuff! 🤯

You know, just when you think you've got things reasonably locked down, attackers get even more audacious. We're talking Call Stack Spoofing and Heaven's Gate – definitely not beginner tactics anymore. And using GitHub as your command hub? Honestly, who even thinks of that?! 🤪

Look, automated scans are alright, they certainly have their place. But let's be real, thorough penetration tests? They're absolutely invaluable. Pen tests are what really dig up those sneaky, hidden threats that automated tools often miss.

So please, folks: make sure you're using MFA! Keep those systems patched! And definitely take a closer look at your GitHub repos! Oh, and don't just blindly trust security certificates – sometimes they're little more than window dressing.

Have you bumped into similar nasty surprises recently? What tools are *you* finding effective for spotting these kinds of threats? Curious to hear your experiences! 🤔

FIN7 *again*? Seriously, these guys just don't quit, do they? 🙄

Heads up – they've cooked up an Anubis backdoor using Python. And nope, *it's not* the Android Trojan people know. It's pretty wild what this thing packs: we're talking remote shell capabilities, file uploads, messing with the registry... 🤯 Basically, the keys to the kingdom!

And let me tell you from a pentester's perspective: Just relying on AV? That's *definitely* not gonna cut it anymore. We all know that, right?

Looks like they're slipping in through compromised SharePoint sites now? Yikes. The nasty part? A Python script decrypts the payload *directly in memory*, making it incredibly tough to spot! 🥴 Plus, their command and control chats happen over a Base64-encoded TCP socket.

So, keep a *sharp eye* on those ZIP attachments! Double-check your SharePoint sites' integrity. You'll also want to monitor network traffic closely (especially that TCP activity!). And make sure your endpoint security is actually up to snuff – remember, they love finding ways to bypass defenses!

How are *you* tackling threats like this one? What are your go-to tools and strategies for defense? 🤔 Let's share some knowledge!

AI in the cyber world... kinda crazy, right? 🤯

Look, AI definitely has its upsides, helping us defend better. But let's be real – the threat actors are all over it too. Phishing attempts? They're getting scarily personal. Attacks? Happening faster than ever. And your trusty old standard antivirus? Well... it's probably not cutting it anymore.

As a pentester, I'm seeing this play out daily. There's no doubt AI is making the security game a *lot* trickier. Honestly, if you're not rethinking your strategy right now, you're falling behind. Big time. 🤷‍♂️

That's where concepts like Zero Trust become so vital. But here's the thing: it can't just be lip service. It needs actual implementation! 💪 Time to walk the walk.

So, what's *your* approach? How are you adapting to stay safe in this new landscape? Got any experiences to share? Let me know below! 👇

Whoa, heads up everyone! Looks like North Korea's back at it with some pretty nasty tricks. They're apparently pushing fake crypto job offers as a way to sling malware. The campaign's reportedly called "ClickFix" – sounds harmless enough, doesn't it? Make no mistake, though, this stuff is seriously dangerous.

Working as a pentester, I bump into these kinds of social engineering tactics way too often. It's just a fact: playing on human psychology is still the easiest way for attackers to get in. And you know how it is, the lure of crypto tends to attract people looking for quick gains, making them perfect targets.

So, here’s the lowdown for you folks: *Always* scrutinize job offers before jumping in. Don't download *anything* from unknown senders or sketchy websites – seriously. And please, for the love of security, get that Multi-Factor Authentication (MFA) switched on!

One more thing: make sure you're getting your systems looked over by actual professionals regularly. Those automated scans are helpful, sure, but they're absolutely no replacement for a real-deal penetration test!

What do you all think about this? Anyone else run into sketchy stuff like this before?

Seriously, web skimming is *definitely* a real threat. 😳 Get this: someone was actually using an outdated Stripe API purely to validate payment info *before* swiping it.

Wild, right? But it just goes to show how vital proper API lifecycle management really is. You know, those deprecated APIs? They're practically a goldmine for attackers looking for an easy way in. 💰

And here’s the scary part: automated scans often fly right past these kinds of vulnerabilities. That’s why you absolutely need skilled pentesters on the case! 💪 They catch what the machines miss.

So, bottom line for everyone shopping online: stay vigilant out there! And for all you shop owners: keeping your systems patched and tidy isn't just good practice, it's essential!

What's your take on web skimming? Have you ever encountered anything like this? Curious to hear your experiences! 🤔

Cloud security? Yeah, about those assumptions... 🙄

Just caught wind of that Google Cloud Run vulnerability, "ImageRunner". Honestly, it's pretty wild how straightforward privilege escalation can sometimes be. You know how clients often think, "Oh, it's the cloud, it must be secure!"? Well, the reality on the ground can paint a very different picture.

Here's the deal: IAM permissions are absolute gold! 🔐 Attackers are out there trying to snatch container images so they can inject malicious code. Speaking as pentesters, we unfortunately come across scenarios like this far too often.

Sure, automated scans are a decent starting point, no doubt. But let's be real, a thorough pentest usually uncovers much more hidden stuff.

So, spill the tea! What cloud security nightmares have kept *you* up at night? 🤔 And on the flip side, what best practices have genuinely been lifesavers for you? Let's hear it!