[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology

Name
Options
Comment
Verification
4chan Pass users can bypass this verification. [Learn More] [Login]
File
  • Please read the Rules and FAQ before posting.
  • You may highlight syntax and preserve whitespace by using [code] tags.

08/21/20New boards added: /vrpg/, /vmg/, /vst/ and /vm/
05/04/17New trial board added: /bant/ - International/Random
10/04/16New board for 4chan Pass users: /vip/ - Very Important Posts
[Hide] [Show All]


[Advertise on 4chan]


File: 1606973671297.jpg (475 KB, 1920x1080)
475 KB JPG
>>108656842
"With software there are only two possibilities: either the users control the program or the program controls the users."
--Richard Stallman

>Cyberpunk
The FAQ: https://archive.is/mkDpa
What is /cyb/erpunk?: https://pastebin.com/pmn9vzWZ
How do I into /cyb/erpunk?: https://pastebin.com/5tpNFQds
Huge list of cyberpunk media: https://archive.is/6pQt6
The cyberdeck: https://pastebin.com/7fE4BVBg
Cyberlife: https://jinteki.industries/files/cyberlife.7z
Bibliothek: https://www.mediafire.com/folder/4m5hd2065hde8/Bibliothek

>Privacy
Tools: https://www.privacyguides.org/en/tools/
Hitchhiker's Guide: https://anonymousplanet.org/guide/
Hardware: https://ryf.fsf.org/products
Frontends: https://igwiki.lyci.de/wiki/Privacy_friendly_frontends
OSINT Guide: https://inteltechniques.com/index.html
Firmware: https://libreboot.org/
RMS on Facebook: https://stallman.org/facebook.html
Have I Been Pwned: https://haveibeenpwned.com/

>Security
"Shit just got real": https://pastebin.com/rqrLK6X0
Cybersecurity basics: https://igwiki.lyci.de/wiki/Cybersecurity_-_/sec/_guide
Basics and armory: https://igwiki.lyci.de/wiki/Cybersecurity_-_basics_and_armory
Learning/News/CTFs: https://igwiki.lyci.de/wiki/Cybersecurity_-_Learning/News/CTFs
/sec/ PDFs: https://mega.nz/#F!zGJT1QQQ!O-8yiH845GN26ajAvkoLkA
EFF Surveillance Self-Defense: https://ssd.eff.org/
Other library: https://mega.nz/file/UCgEGAjb#rwNcnMAQCUUbSp8supsFvn9QEHCWUW86eLcZa16ZG4Y
>>
>>108785672
>Recommended operating systems
General purpose: Debian, Fedora, Arch Linux, Xubuntu, Linux Mint
Security focused: Qubes OS, Whonix, Tails, OpenBSD

>Recommended mobile operating systems
Android based: GrapheneOS, CalyxOS, DivestOS, LineageOS
Linux based: postmarketOS, PureOS

>Recommended browsers
Chromium based: Brave, Chromium (ungoogled)
Firefox based: Waterfox, Zen Browser, LibreWolf, Tor Browser
Firefox with Zero user.js: https://pastebin.com/4qVUGU9S

>Advanced content blocking
https://github.com/gorhill/uBlock/wiki/Blocking-mode:-medium-mode

>Browser tests
https://www.deviceinfo.me
https://dnsleaktest.com
https://librespeed.org
https://time.gov

>Recommended search engines
Brave Search, SearXNG, DuckDuckGo, Startpage

>Privacy oriented DNS
https://adguard-dns.io/en/welcome.html
https://nextdns.io
https://quad9.net

>Privacy oriented email
Proton Mail, Tuta, Mailbox Mail, Riseup, Disroot

>Recommended instant messengers
Signal, SimpleX Chat, Briar, Element

>BIOS replacement
https://coreboot.org
https://libreboot.org

>Resources
https://www.privacyguides.org
https://anonymousplanet.org/guide/
https://ssd.eff.org
https://ryf.fsf.org/products
https://haveibeenpwned.com
https://inteltechniques.com/workbook.html
https://eldritchdata.neocities.org
https://stallman.org/facebook.html
https://chromium.woolyss.com
>>
Sr Cyber Engineer here, AMA.
>>
File: 1754258937053.png (455 KB, 675x611)
455 KB PNG
you're so thoughtful and unique anon
>>
>>108786331
certs?
>>
File: 1778331481718420.png (2.12 MB, 1376x768)
2.12 MB PNG
https://archive.org/details/GrizzlyBearsOnMethamphetamine
>>
>>108786587
>Or wait, is the dev of Toaru OS the same person as the dev of Pony OS?
Yes. PonyOS is a real OS skinned up as a joke. Usually new versions are issued on 1. April, which is kind of a hint.
>>
File: 1777399138047610.jpg (57 KB, 733x550)
57 KB JPG
>>108786331
I have a homelab. What should be focused on? I have a windows domain so far and basic provisioning. I am aiming to integrate some agentic stuff later for analysis/triage or whatever you guys call it. Goal: get into networking/IT.
>>
>>108787886
Make a Linux distro for an m1000e server for use as a hardened server on the alternative nets.
>>
>>108787886
You should have more specific goals with regards to your homelab and the role you're aiming for.
>>
Threadly reminder to go read Fisheye Placebo for more cyberpunk goodness!
>Vance just wanted to make the most out of his college experience under a totalitarian regime, and if that meant hacking into the university to assign himself a hot female roommate, then so be it. The last thing he expected was to be dragged into a crazy conspiracy to overthrow the government by his most-definitely-not-female roommate.

Archive
Chapter 1 Part 1
https://desuarchive.org/co/thread/138433030/
Chapter 4 Part 7 (latest)
https://desuarchive.org/co/thread/145447092/

https://www.yuumeiart.com/fisheye-placebo-chapters
>>
>>108786695
It's actually about 50/50.
https://www.youtube.com/watch?v=HA5YuwvJkpQ
>>
>>108786331
am I retarded for doing a Cybersecurity Bootcamp? what would be some better ways to get an entry level job
>>
>>108789619
>am I retarded for doing a Cybersecurity Bootcamp? what would be some better ways to get an entry level job
Yes, yes you are. The best way to learn hacking is to HACK! Certs are for pussies
>>
>>108786695
>>108788827
This shit is a limitation of human language and understanding.
Simulation implies certain behaviors and expectations. It implies a certain narrative to be true, and requires us to assume certain things are true. Our understanding of baseline reality is so poor, it seems egotistical to me for us to assume that our language has unlocked some kind of "hidden truth" about reality being fictional. It also ignores many other philosophical baselines such as, "I think, therefore I am", just to take agency away from the self. If we are in a simulation, my entire experience and behavior is the result of a simulated experience. Whereas the human experience, seems to be, closer to a mix of chemical reactions as well as a meta-contextual processing layer that is able to be "aware" of itself, whatever the fuck that means.

That all being said, even if reality is a simulation it is a physical place we can interact with. I have spent too much of my Low IQ typing the rest of this message trying to describe what little I've intuited from philosophy and physics so all I can really finish this message with is, it feels like intellectual laziness. "We don't know what our reality is, so we're just going to say it's a simulation and hope that our masters (God) will explain it to us!" It's a defeatist analysis based on half-understood systems, barely understood systems, and systems we don't even know about all interacting on a quantum and macro level.

im kind of retarded so hopefully there's something buried in there.
>>
File: doorbell chud titan anime.jpg (393 KB, 1024x1008)
393 KB JPG
So in light of this bafflingly fucking retarded age verification discourse I am building a cyberdeck as a backup portable computer. I have AR glasses and a bluetooth keyboard+clitmoude already. I have a powerbank. What I need is a good SBC with wifi and DP-alt over USB-c. Should I just deal with the RasPi and get a microHDMI adapter?
>>
>>108786331

do you think llms will take ur jerb
>>
>>108789911
So I should do like TryHackMe?
>>
Social engineering also works at the very top of society:
https://archive.is/VdcVq
>>
>>108792903
Yeah and doing some actual stuff like finding exploits.
>>
>I spent 7 days evading America’s 82 MILLION surveillance cameras
https://www.youtube.com/watch?v=zNrmeuU3csg
>>
>>108794732
That must be quite the odysee
>>
>>108790953
That's a good concept honestly, and a cluster
>>
Why tf is proton deleting my emails even though I logged in less than 12 months ago??!!!
>>
File: 1535832650368.png (43 KB, 650x650)
43 KB PNG
>>108796347
>Why tf is proton deleting my emails even though I logged in less than 12 months ago??!!!
https://encryp.ch/blog/disturbing-facts-about-protonmail/
https://news.ycombinator.com/item?id=29063779
https://arstechnica.com/information-technology/2021/09/privacy-focused-protonmail-provided-a-users-ip-address-to-authorities/
https://www.theregister.com/2021/09/07/protonmail_hands_user_ip_address_police/
https://www.wired.com/story/protonmail-amends-policy-after-giving-up-activists-data/
https://digdeeper.club/articles/email.xhtml#protonmail
https://scholar.google.com/scholar?cluster=18327644021252219658
>>
File: owl.png (1.24 MB, 968x1080)
1.24 MB PNG
ok, maybe this is useful to you.
This code opens a TCP Line plugged into the port `8080` using golang.

package main

import (
"fmt"
"net"
"log"
)

func main() {

l, e := net.Listen("tcp", ":8080")

if e != nil {
log.Fatal(e)
}

for {

c, e := l.Accept()

if e != nil {
log.Println(e)
continue
}

b := make([]byte, 1024)

_, e = c.Read(b)

if e != nil {
log.Println(e)
continue
}

fmt.Println(string(b[:]))

}

}



and this code sends an empty payload from the other side of that TCP line.
try to populate the buffer `b` with some data.
package main

import (
"net"
"log"
)

func main() {

c, e := net.Dial("tcp", ":8080")

if e != nil {
log.Fatal(e)
}

b := make([]byte, 1024)

_, e = c.Write(b)

if e != nil {
log.Println(e)
}


}


Both code must exist in different projects `go mod init programa` and in another folder `go mod init programb` and you paste one code in one folder and the other code in the other folder.

Read the code. READ THE DOCUMENTATION of `net.Listen`, `net.Dial` and other standard library constructs.
Understand through documentation what the function needs and what the function returns back.
Understand the documentation and assembly code using it.

https://pkg.go.dev/net@go1.26.3#Listener
https://pkg.go.dev/net@go1.26.3#Conn
https://pkg.go.dev/net@go1.26.3#Dial

>why?
Is good to learn how to write proof of concepts.
>>
>>108787886

learn to make a private IPv6 network inside of it.
acommodate an agent so can read data of that network with `tcpdump` and make it give you the telemetry back in natural language.
>>
Attached is a hacking-related image link from part 3 in my series "Undeleting deleted archive.org/details/ items". Part 3 plain HTML (no JS):
https://nguyenthi.site/raw/HY-FACu2_0z0-Rh6pZcDXzwseeURQ6ToEoGwR678EtY

(All parts should be revisited+republished once more links are added to them, so they'll be part 1.0, part 1.1, ..., part 2.6, etc.)

>>108787663
>https://archive.is/2026.05.05-005804/https://archive.org/details/GrizzlyBearsOnMethamphetamine
Last thread I forgot to say that the part about certain people dying due to being eaten alive by bear(s) was funny. A character said, as I remember, "Sometimes a YouTuber wanders off the trail for content and we find his camera in a pile of bear poop a year later, and we all have to pretend that him getting eaten was a tragedy."
>>
File: oa4Pi.png (30 KB, 1024x768)
30 KB PNG
ShinyHunters leaked the data of Hallmark (cards?) as they didn't pay the ransom:
http://91.215.85.103/pay_or_leak/
http://91.215.85.103/pay_or_leak/SHOULDVE_PAID_THE_FUCKING_RANSOM_HALLMARK.7z

It includes addresses of peoples' houses and stuff. (BTW, I was looking at Hallmark cards a couple days ago.)

>>108796975
*hacking-related image linked from part 3

Also, screenshot of that page because why not?
>>
>>108794732
Can't wait to destroy Flock cameras so I go to prison for years. Fuck this life, I think about killing myself in detail sometimes. I may in fact pursue such a path to destruction, whether that means destroying the cameras and/or offing myself.

>>108796991
Someone said this about ShinyHunters:
>>https://archive.is/2026.05.05-184001/http://91.215.85.103/pay_or_leak/instructure_affected_schools_list.txt
>yeah theres a bunch of public school districts and elementary schools listed. If these guys are doxxing little kids thats not cool, they should spend the rest of their life in gitmo
>>
cyberbumo
>>
Do you think hacking is still a fun activity? I feel like certs ruined it
>>
>>108785672
yo bros, point me to your dopest text/ascii art shit
>>
>>108800161
"Sicko[2007]DvDrip[Eng]-aXXo". This one's more interesting than the NFO file of "We.Need.To.Talk.About.Kevin.2011.LIMITED.DVDRip.XviD-SPARKS". File "sparks-wnttak-xvid.nfo" is this:
https://khoaito.site/raw/ppvAnDVvTOQqLxmuB2an4NNtyxN5LZYprD6rzxfdyz8

JPG file in that more-than-a-decade-old torrent/folder:
https://ar10.innostack.xyz/raw/Df0V9805fHCheBTAtE4b5O6gm27b8hBkuPOflveXkOw

Also see the previous thread:
https://web.archive.org/web/20260510014936/https://desuarchive.org/g/thread/108656842/#108761194

___
aXXo history from !w:
>aXXo first appeared in November 2005 on the message board "Darkside_RG".[4]
>
>In November 2007, aXXo deleted all of their files released after September 7, 2006 from The Pirate Bay protesting that the site was allowing harassing comments to be added to their torrents by "possible members of MPAA".[2] While past aXXo torrents remained available on other torrent sites, uploads of new aXXo files stopped on November 11, 2007.[1][2] After an absence of four months aXXo returned to uploading, starting with the movie I Am Legend on March 9, 2008.[1][5][6]
>
>On December 15, 2008, aXXo's thousandth movie upload, a copy of the Kiefer Sutherland horror film Mirrors, appeared on an Internet forum for the Darkside Release Group.[7]
>
>On March 11, 2009, aXXo stopped uploading new files after releasing Punisher: War Zone. For a while, they logged into Mininova until the site switched to only hosting torrents that were Content Distribution free or torrents with no copyrights.[8]
>
>On April 19, 2009 aXXo made their last known comment on message board "Darkside_RG", in response to rumours that they had stopped posting on Darkside_RG. They stated:
>
>I can only say a big thank you for your appreciation mates, I hope you all enjoy the darkside as much as you can My home is my beloved Darkside and as I've said so many times before on each of my torrents.... Be aware of bogus sites and lamers See ya.[9]
>>
>>108800139
Wtf are you talking about retard
Are you 14 years old?
>>
>>108801064
I'll rephrase it

Do you think hacking is still a fun activity? I feel like AI ruined it
>>
>>108801166
This so much. AI made it boring
>>
File: pia_menu_logo_light.png (7 KB, 149x48)
7 KB PNG
>>108785672
is PIA good for me?
>>
Wtf happened to sizeof.cat?
>>
>>108800139
Don't let infosec distract you from hacking.
>>
>>108802298
He was (at least partially) doxxed and had to stay under the radar.
>>
>>108802437
Shame. I was enjoying the cafe.
>>
>>108802521
Mysteriously, every server that hosts significant amount of /cyb/ files inevitably fall off the net. Collective Computers was great, CybSec.io always had a whiff of nameless agencies to it and many more have preceeded sizeof.cat than I can remember.
Even more mysteriously, none of these ever returned.
>>
Reposting the updated Data Broker Removal Links:
https://pastebin.com/cDbDXQvh
https://pastebin.com/raw/cDbDXQvh
>>
>>108796873

so the question arises, can you deploy a RCE that gives you a shell using this code?

Apply threat modelling

>what the code does?
>what can go wrong?
>what can you do to fix it.

The smallest threat I can think of is being able to stress a CVE. A common vulnerability, How can you induce a vulnerabilty.

Or for example if you want to talk with a service provider to test this thing and abstract yourself of locally deploy a vulnerable system because you don*t have the necessary security controls in your domestic infrastructure.

Would you be able to resolve a PortSwigger challenge using this code? Can you cannabilize this code to try and solve a PortSwigger Challgenge for example? If you want to focus your attention in Operating Systems, I understand you can throw this TCP Line to OverTheWire infrastructure. That infrastructure is available publicly, just like PortSwigger activities.

A you can use a TCP line to ship SSH crates or HTTPS crates or DHCP crates or DNS crates. But now ARP crates because they are one order of magnitude down the TCP line.
>>
File: wine.png (37 KB, 541x494)
37 KB PNG
>>108710405
>anyone know of good p2p blocklists (i.e. ip blocklists)?
I used this years ago back when I used M$ Windows:
https://www.peerblock.com/
https://en.wikipedia.org/wiki/PeerBlock

It could block "Anti-P2P organizations" and other things. The latest update is from 2020, and the block lists are paywalled now, I think? Based on what I read. I have a version of this Windows-only free software from 2010:
https://shreksson.store/raw/xckMic24oJvCuKaM0LUPVbhjjeGCtAjafIathEJliA4
>>
File: 1fp0KLBv23A+maxres.jpg (210 KB, 1280x720)
210 KB JPG
"Fight The Surveillance State While Driving"
https://www.youtube.com/watch?v=1fp0KLBv23A

His solution: transparent license plate cover that's opaque when viewed from a high angle, where the Flock camera are mounted.

Like how Groot got dusted in "Avengers: Infinity War" (https://lemonados.xyz/raw/9ivu-4l3s2-BpRUgSLGjHfnGMnethMg1aEDA_gEsJ9M = video of that), I want to Thanos-snap all Flock cameras out of existence.

:youniverse_face:
>>
>>108800139

now everyone can find 0day until the llms ruin it for people then it's back to the norm.
>>
>>108800402
swell, I might inspect it after work, thanks a lot
>>
>>108802623

eventually, the truth comes out and the doxx flow



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.