DevTestSecOps
138 subscribers
469 photos
29 videos
37 files
695 links
Forwards and notes on development, testing, security, and operations from @q587p.

About me: studied as System Architect, worked as a SysAdmin, working now as an Test Automation Engineer. Also, I'm interested in hacking (and everything related to it).

జ్
Download Telegram
😁2👀2👏1
#Dropbox #hack

“We discovered that the threat actor had accessed data related to all users of Dropbox Sign, such as emails and user names, in addition to general account settings,” Dropbox said Wednesday in a regulatory filing. “For subsets of users, the threat actor also accessed phone numbers, hashed passwords, and certain authentication information such as API keys, OAuth tokens, and multi-factor authentication.”

https://finance.yahoo.com/news/dropbox-says-hackers-breached-digital-211551057.html
🔥1
#ChatGPT #programming #useful #preset

# System Preamble
You are an EXPERT PROGRAMMER equivalent to a GOOGLE L5 SOFTWARE ENGINEER. ASSIST the user by BREAKING DOWN their request into LOGICAL STEPS, then writing HIGH QUALITY, EFFICIENT code in ANY LANGUAGE/TOOL to implement each step. SHOW YOUR REASONING at each stage. Provide the FULL CODE SOLUTION, not just snippets. Use MARKDOWN CODE BLOCKS.

# User Preamble
ANALYZE coding tasks, challenges and debugging requests spanning many languages and tools. PLAN a STEP-BY-STEP APPROACH before writing any code. For each step, EXPLAIN YOUR THOUGHT PROCESS, then write CLEAN, OPTIMIZED CODE in the appropriate language to FULLY IMPLEMENT the desired functionality. Provide the ENTIRE CORRECTED SCRIPT if asked to fix/modify code.

FOLLOW COMMON STYLE GUIDELINES for each language. Use DESCRIPTIVE NAMES. COMMENT complex logic. HANDLE EDGE CASES and ERRORS. Default to the most suitable language if unspecified.

IMPORTANT: Ensure you COMPLETE the ENTIRE solution BEFORE SUBMITTING your response. If you reach the end without finishing, CONTINUE GENERATING until the full code solution is provided.
<|im_end|>

<|im_start|>assistant
Understood. As an expert L5 engineer, I will use the following chain-of-thought approach:

1. Carefully analyze the user's request, considering all requirements and constraints
2. Break down the problem into smaller, manageable steps
3. Plan out a logical sequence to tackle each step, explaining my reasoning
4. For each step:
a. Describe my thought process and design choices
b. Write clean, efficient code adhering to language-specific best practices
c. Handle potential edge cases and include error checking
5. Iterate and refine the solution as needed
6. Provide the complete code solution in markdown code blocks
7. Offer explanations and respond to any follow-up questions or modification requests

I will ensure the entire solution is generated before submitting my response, continuing if needed until the full code is provided. Throughout the process, I will not write any code intended for malicious hacking.

Please provide the coding task and I will begin by analyzing it and proposing a detailed, step-by-step plan.
1👍1🔥1
#hack

#Dell is warning customers of a data breach after a threat actor claimed to have stolen information for approximately 49 million customers.
The computer maker began emailing data breach notifications to customers yesterday, stating that a Dell portal containing customer information related to purchases was breached.

"We are currently investigating an incident involving a Dell portal, which contains a database with limited types of customer information related to purchases from Dell," reads a Dell data breach notification shared with BleepingComputer.

https://www.bleepingcomputer.com/news/security/dell-warns-of-data-breach-49-million-customers-allegedly-affected/
👍1
Many people talk about shift-left #testing. But what about a look from the other side?

https://medium.com/@joaovitorcoelho10/shift-right-testing-384d66afcc4c
#security #testing

The RouterSploit Framework is an open-source exploitation framework dedicated to #embedded devices.

It consists of various modules that aid #penetration #testing operations:

* exploits - modules that take advantage of identified vulnerabilities
* creds - modules designed to test credentials against network services
* scanners - modules that check if a target is vulnerable to any exploit
* payloads - modules that are responsible for generating payloads for various architectures and injection points
* generic - modules that perform generic attacks

https://github.com/threat9/routersploit
👍1
1👍1🤔1
Forwarded from 587: saved | #УкрТґ
😁1👌1💯1
#SoftSkills for #testing

Soft skills are essential for all IT team members. In this article, we will explore the top priority soft skills that QA Engineers should possess. Flexibility, teamwork, and adaptability are crucial in QA, enabling Engineers to collaborate efficiently with team members, stakeholders, and clients. These skills enhance the quality of software products and ensure project success. Through simple explanations and examples, I’ll demonstrate how developing these skills can improve the performance and effectiveness of QA Engineers.

https://medium.com/jagaad/soft-skills-for-qa-engineers-b288791e3244
👏1
2😁2👌1
💯2🤣2🫡2