[ home / rules / faq ] [ overboard / sfw / alt ] [ leftypol / edu / labor / siberia / lgbt / latam / hobby / tech / games / anime / music / draw / AKM ] [ meta ] [ wiki / shop / tv / tiktok / twitter / patreon ] [ GET / ref / marx / booru ]

/tech/ - Technology

"Technology reveals the active relation of man to nature" - Karl Marx
Name
Options
Subject
Comment
Flag
File
Embed
Password(For file deletion.)

Not reporting is bourgeois


File: 1715028880742.png (40.61 KB, 427x400, 08e.png)

 

I want to tighten my opsec. I figured the best way is to try to get experienced hackers to try to bust me, as unwise as that might sound. is there a website, forum or community where you can ask people to pwn you?

>>24781
It's kinda hard, but I guess there are ways you could DIY. You either need to learn yourself or have someone (or some group, company, whatever) TRUSTABLE do a (paid) pentest on your devices and network for you (and it's expensive).
There are tools that could help you, tools that defensive/SOC and offensive security people use, like vulnerability and network scanners (Nessus, ), centralized monitoring tools, antivirus and EDRs (Endpoint Detection and Response software), binary/source code scanners for prevention and detection, traffic monitoring, packet inspection tools…
None of these tools are 100% reliable, they give false positives AND negatives.

get into a toxic and codependent relationship with a genuine crazy person. dump them and then see how hard it is for them to stalk you

>>24781
If you're not hosting anything, then other than having a good firewall most attacks would involve you explicitly doing (downloading/uploading) something no? Think phishing or PDFs; best way would be to upload a PDF in this thread, and you would inevitably download it etc.

>>29392
>most attacks would involve you explicitly doing (downloading/uploading) something no?
Most, but there are attacks that may exploit 0-day vulnerabilities (or 1-day vulns, or even old vulns if you don't update your shit) that do everything automatically, so the complexity of your defenses depends on your threat model.
A firewall with a whitelist could be useful but depends on the program(s) being exploited, the exploit(s) used and the privileges gained.

>>29389
BTW, I forgot to mention that there are LOTS of free and/or open-source security tools out there for offensive and defensive operations. In fact, some FOSS tools are the best ones in their categories. DYOR, or ask here if you want to know more.

The via implant we gave you can not be disabled


Unique IPs: 5

[Return][Go to top] [Catalog] | [Home][Post a Reply]
Delete Post [ ]
[ home / rules / faq ] [ overboard / sfw / alt ] [ leftypol / edu / labor / siberia / lgbt / latam / hobby / tech / games / anime / music / draw / AKM ] [ meta ] [ wiki / shop / tv / tiktok / twitter / patreon ] [ GET / ref / marx / booru ]