Hey everybody. In the interest of giving back to the community (and the fact that I *really* need to start advertising more), my company (EliteSec) has created a simple project for setting up Sonarqube to test against your own codebase.
Sonarqube is an open source static code analysis tool. I've created a simple Vagrant script that will:
1. Download an Ubuntu 18.04 VM
2. Install Docker
3. Install Sonarqube
4. Setup all routing for your local machine.
Check it out:
#businesshacks are harder than #computerhacks, IMO. Just switched my CRM from Hubspot to monday.com and I couldn't be happier. Hubspot was nice, but anything remotely powerful and you had to pay a massive fee. They tease you with it for sure, but not worth it IMO. Sure, a spreadsheet would work, but I want something "easier".
Tried the CRM template for monday.com. Found I'm 2 contracts away from going FT with EliteSec. Don't make the same mistake as me - invest the time and see what's what.
The Moonlander is really calling to me. Anyone with experience with it?
Doing a pentest is 90% timing. I've just nearly finished an assessment and decided to try a few last things I had overlooked/delayed. Pulled that thread and this otherwise "decent" application is starting to fall apart. Might have to delay the final report by a day to catch up on all the findings. Love it.
Defensive Security Podcast Episode 254
Podcasters are not journalists, we don't have to protect our sources. Plus some of the logic jumps and arguments in this episode were just too much for me.
I've unsubscribed from Darknet Diaries. I've never been a Patreon supporter, but if I were then I would have been crazy pissed off about this.
Everyone is free to decide what they find acceptable for content, but this one was just too much for me. /fin
Being a hacker is all about exploring boundaries and challenging norms. I do draw the line at hacks and such that cause harm to everyday people, and I sure as hell have no patience when it comes to hurting innocents like children.
This "porn trader" fits that "out of bounds" definition. I don't care if he's just trading itl he's *enabling* it. Telling them to just get rid of the evidence makes you an accessory, so WTF?!
Surely this guy is going to prison, right? That's why Jack is speaking with him now? Nope. This guy reached out to Jack asking what to do, because he suddenly had grown a concious and wanted to know what to do. See, he's a porn collector, and he just happened to collect some CP as well. What does Jack say to do? Delete it and just stop dealing with it, and act as if it never happened.
No Jack, some lines should never be crossed. EVER.
Fun fact - I applied to work at Kik as a Security Engineer back in 2018. I ultimately turned them down, but I thought this was interesting.
The guests were the usual mix of hackers or other underground individuals, but there was a difference with one of them. Jack altered his voice, which was a first as far as I can recall. Why?
Well, later in the episode you hear that this guy was also trading in this ilicit material. Not producing, but distributing.
I've had some issue with Jack in the past with the way he draws conclusions on some of his stories, but this latest one was just mind boggling to me.
Before I get into it, I want it to be known that I was a huge fan of the show, having listened to it since the first episode and recommending it to friends and family for some of the great stories, but not any longer.
The latest episode dealt with Kik, an IM app, and how prolific child porn was on the platform.
So time for a mini rant. Unix_guru, aka Michael Ball, has been arrested and charged with quite a few things related to child pornography. I recently had a former colleage who did the same thing. I'm not going to go into the whole "monsters under our noses" thing as I knew both and never suspected a thing from either. No, this is a different rant.
Listening to the lastest episode of Darknet Diaries, I have decided to unsubscribe and express my dissapointment in the host, Jack Rhysider.
To anyone in #infosec, it's a known fact that we need to constantly read up on the latest TTPs that attackers use to protect against them, but it's equally important to offensive-focused folks (pentesters, red teamers, etc.) to do the same. I have been lazy and lost my relatively good ranking on TryHackMe because I wasn't keeping up. I will now find the time to rectify this issue. Remember, #infosec is a field where everything moves quick, so best to try to keep up.
I'm spending the weekend cleaning out my garage and one of the spare rooms. Any concerns about filling a 14-yard container were thrown out the window. Now the question turns into whether or not I have enough room left in it for the last few items. 😛
But I will say, taking a break from technology and everything has been a nice break. Very therapeutic to toss crap I haven't touched in 10+ years.