arisuchan    [ tech / cult / art ]   [ λ / Δ ]   [ psy ]   [ ru ]   [ random ]   [ meta ]   [ all ]    info / stickers     temporarily disabledtemporarily disabled

/cyb/ - cyberpunk and cybersecurity

low life. high tech. anonymity. privacy. security.
Name
Email
Subject
Comment

formatting options

File
Password (For file deletion.)

Help me fix this shit. https://legacy.arisuchan.jp/q/res/2703.html#2703

Kalyx ######


File: 1492405347168.png (41.5 KB, 512x512, VmgvHT6P.png)

 No.44

good day lains. I was wondering about this
http://pastebin.com/raw/0SNSvyjJ
and thinking, what would the setup he recommends look like with modern-day technology? obviously, we should replace trucrypt with veracrypt. In addition to that, most of the tools he gives will have to be replaced as they deal with specific versions of vulnerable software. what else must we do to modernize HackBack?

 No.45

veracrypt is more geared towards windows full disk encryption. cryptsetup, dm-crypt and LUKS are the pre-eminent linux full disk encryption solution (don't forged openbsd softraid crypto as well).

 No.46

It's getting people to actually do something that is the hard part, People have to be willing to contribute to the cause.

 No.47

>>45
I'm aware. Is there a windows program for making encrypted volumes? It's been so long since I used windows, I haven't kept up with the good software for it.

 No.48

Does it need to be modernized, really? i don't see how it does.

 No.49

>>47
diskcryptor.

 No.50

There aren't really.Lainons should write a hackback 2.0

 No.51

>>48
the resources are all from 2-3 years ago. I remember trying to use one of the tutorials on there, but the tool it recommended was for an old version of the linux kernel and I had to use archive.org to get it. But I've forgotten what tool it was - there's tons of resources on the document.

 No.52

>>51

so it only encourages users to do research themselves on what to use, these things are supposed to encourage people to educate themselves, not be recipies for skids.

 No.53

>>52
The real trick is getting people to learn period, albeit tools or otherwise.

 No.78

>>52
I mean yeah, but I don't think that was the point of the guide originally. The point of hackback is that hacking is easy as hell, people just have this mental block about it (as they do with technology in general, tbh), and I feel like a part of that is because of attitudes like "RTFM" when "the manual" is out-of-date, and written by someone who never saw the value in a language course.

I've dealt with many programmer types who are like this. It's annoying.

 No.103

>>78

nobody should be spoon feed though, tbh. people need to learn to think and learn for themselves or they will never be good hackers anyway.

 No.117

File: 1493267549322.jpg (49.6 KB, 480x480, 59qkwNOqX0U3Ohz5peHUkTyHJa….jpg)

>>103
They will never be a good anything if they cant think.

 No.246


 No.252

>>44
I've got the "Guccifer" hackback text files still I think.
Should I post them?

Can someone explain why sec and cyb were merged?

 No.253

>>78
Theoretically anyone who can read tutorials can hack right?
As long as they google hoe to exploit x etc. then they can get pretty far.

 No.2431

>>103
wrong, more people using enryption tor etc lets us hide. we're the signal in the noise. increase the noise!



[Return] [Go to top] [ Catalog ] [Post a Reply]
Delete Post [ ]