Mira
a glimpse from the book
apparently most of modern cars are vulnerable through a license plate. there was specifically a python 3 script written by Neiko to compromise KIA automobile (actually pretty much most vehicles). the snapshot was smh visible to the BBP hunters meetup in Vegas. turns out KIA cars are also vulnerable through the KIAtool app (it has been a disclosed vulnerability publicly after validating on September 26 last year)
> tells a bro to give me his MAC address to whitelist it on the router
> replies "i use hp"
> replies "i use hp"
π€£26
gotta be honest, the hacker community is harsh. dunno much about the local communities, but the ones i experienced before are way harsher. the DEF CON peeps are somehow welcoming. the one yapping nonsense and filled with too much ego are full of crap. hack a car; they call you a noob, do binary exploitation; they call you a noob, find a bug on a source code; they call you a noob. that's when the imposter syndrome kicks in. in fact, there are many communities with a positive vibe, but the toxic ones keep coming up. well, the best thing to do in order to avoid that is to literally ignore them and focusing only on your own skills. at the end of the day, you get your paycheck either defending a system or breaking in. the other way around is shadier and too deep.
tl;dr focus on progressing rather than a nonsense opinion of someone. if you wanna end up stagnant, ask everyone for their advice.
tl;dr tl;dr hone your skills in spite of toxic situation
tl;dr focus on progressing rather than a nonsense opinion of someone. if you wanna end up stagnant, ask everyone for their advice.
tl;dr tl;dr hone your skills in spite of toxic situation
π₯9β€1
Tip of the day I learned:
Start every phone call with
"my phone is about to die" then you can hang up whenever you want.
Start every phone call with
"my phone is about to die" then you can hang up whenever you want.
π14π6πΏ1
me: sigh, this flag is hard to capture (and yes started playing CTFs)
progress craving inner voice: your actual progress is not how hard you worked till you get tired; it's how long you will work after you get tired.
progress craving inner voice: your actual progress is not how hard you worked till you get tired; it's how long you will work after you get tired.
1π₯12
vx-underground
Based on comments and quoted retweets, I guess I'm just a scared old man who is afraid of new things and implementation capabilities of AI. Yes, it is a proof-of-concept, and I'm aware it's just mapping sounds to data (such as morsecode), but from an emotionalβ¦
smelly casually spitting some facts
As a pentester, you kinda need to keep track of your tools cuz chance of you needing that tool for future work is high. And, I've started archiving some tools so that I'll be able to discover tools that match my needs whenever i need to get my job done. So, I just made a site that does that.
- https://pentest-toolbox.netlify.app
Features:
Curated Tool List: A categorized list of popular open-source security tools, including tools for reverse engineering, web application security, network security, and more.
Tool Information: Each tool includes a description, features, and links to further documentation or GitHub repositories.
Community Maintained: The toolbox is maintained by the security community, ensuring that it stays up-to-date with the latest tools and techniques.
[Github Repo]
#MyProjects #PentestToolbox #resources
@Mi_Ra_Ch
- https://pentest-toolbox.netlify.app
Features:
Curated Tool List: A categorized list of popular open-source security tools, including tools for reverse engineering, web application security, network security, and more.
Tool Information: Each tool includes a description, features, and links to further documentation or GitHub repositories.
Community Maintained: The toolbox is maintained by the security community, ensuring that it stays up-to-date with the latest tools and techniques.
[Github Repo]
#MyProjects #PentestToolbox #resources
@Mi_Ra_Ch
π₯8β€βπ₯2β‘2π2β€1