Details
Joined devRant on 7/30/2017
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
-
Hacking/attack experiences...
I'm, for obvious reasons, only going to talk about the attacks I went through and the *legal* ones I did 😅 😜
Let's first get some things clear/funny facts:
I've been doing offensive security since I was 14-15. Defensive since the age of 16-17. I'm getting close to 23 now, for the record.
First system ever hacked (metasploit exploit): Windows XP.
(To be clear, at home through a pentesting environment, all legal)
Easiest system ever hacked: Windows XP yet again.
Time it took me to crack/hack into today's OS's (remote + local exploits, don't remember which ones I used by the way):
Windows: XP - five seconds (damn, those metasploit exploits are powerful)
Windows Vista: Few minutes.
Windows 7: Few minutes.
Windows 10: Few minutes.
OSX (in general): 1 Hour (finding a good exploit took some time, got to root level easily aftewards. No, I do not remember how/what exactly, it's years and years ago)
Linux (Ubuntu): A month approx. Ended up using a Java applet through Firefox when that was still a thing. Literally had to click it manually xD
Linux: (RHEL based systems): Still not exploited, SELinux is powerful, motherfucker.
Keep in mind that I had a great pentesting setup back then 😊. I don't have nor do that anymore since I love defensive security more nowadays and simply don't have the time anymore.
Dealing with attacks and getting hacked.
Keep in mind that I manage around 20 servers (including vps's and dedi's) so I get the usual amount of ssh brute force attacks (thanks for keeping me safe, CSF!) which is about 40-50K every hour. Those ip's automatically get blocked after three failed attempts within 5 minutes. No root login allowed + rsa key login with freaking strong passwords/passphrases.
linu.xxx/much-security.nl - All kinds of attacks, application attacks, brute force, DDoS sometimes but that is also mostly mitigated at provider level, to name a few. So, except for my own tests and a few ddos's on both those domains, nothing really threatening. (as in, nothing seems to have fucked anything up yet)
How did I discover that two of my servers were hacked through brute forcers while no brute force protection was in place yet? installed a barebones ubuntu server onto both. They only come with system-default applications. Tried installing Nginx next day, port 80 was already in use. I always run 'pidof apache2' to make sure it isn't running and thought I'd run that for fun while I knew I didn't install it and it didn't come with the distro. It was actually running. Checked the auth logs and saw succesful root logins - fuck me - reinstalled the servers and installed Fail2Ban. It bans any ip address which had three failed ssh logins within 5 minutes:
Enabled Fail2Ban -> checked iptables (iptables -L) literally two seconds later: 100+ banned ip addresses - holy fuck, no wonder I got hacked!
One other kind/type of attack I get regularly but if it doesn't get much worse, I'll deal with that :)
Dealing with different kinds of attacks:
Web app attacks: extensively testing everything for security vulns before releasing it into the open.
Network attacks: Nginx rate limiting/CSF rate limiting against SYN DDoS attacks for example.
System attacks: Anti brute force software (Fail2Ban or CSF), anti rootkit software, AppArmor or (which I prefer) SELinux which actually catches quite some web app attacks as well and REGULARLY UPDATING THE SERVERS/SOFTWARE.
So yah, hereby :P39 -
Halloween joke, anyone?
"If you want a slutty costume for Halloween, you should go as my professor. He barely covers anything important" 😁9 -
I'm literally the only one who locks the screen here at work.
Always makes me wanna do something to teach then.
My boss always leaves the screen unlocked with sublime opened and goes to lunch!
I think someday he was logged into production also...
And I'm like: seriously? wtf...
I lock my screen even when I'm home alone... yes I'm that paranoid...
No one is gonna "Greek question mark" me 😂18 -
As a firm supporter of information security, it really "irks" me to see people get up and walk away form their desks without locking their machines... Anyone else with me on this?!18
-
1. Create user on website.
2. Receives mail with username and password.
3. Changes password.
4. Receives mail with new password.
5. Delete account and look for another service.3 -
Found this one in Facebook 😂 This one seems quite popular and IDK if someone's posted it here yet.6
-
I went camping for 10 days. Decided to finally listen to devRant podcast, so I downloaded all episodes to my headphones. Listened to all of them in first day. The only thing I can say is... When the fuck is the next one coming out? That shit is amazing! I can't wait!4
-
Normal app: "DEV I NEED THIS, 1 STAR. WITHOUT THIS IS SHIT"
devrant app: "Guys, I've created a client for desktop computer for devrant, tell me if I can upgrade anymore"
Such beautiful community ♥4 -
Fuck the incompetent and "pretentious psuedo devs" !!
I have been developing a web portal for a student club for this really big company (as intern) and then they assign this fuckin group of these 4 stupid intern devs to work with me !
The fuckin tweked my code and redirected the CONTACT FORM to the fuckin LOGIN CONTROLLER !!
Then these sons of Einstein inserted dummy users without a username and password into the fuckin production site !!
Now each fukin time someone submits contact form is redirected into some random user account !!
Who the fuck needs Hackers when we have these legendary coders -_-11 -
When you get a mail from a recruiter for a Java job, because you have JavaScript on your LinkedIn and it's obviously the same...4
-
Finally, I'm full of joy. I just came home after long Recruitment drive and first thing I saw on table is this.
I was totally screaming "YES!!! YES!!!! THEY'RE FINALLY HERE" (sorry for caps). Thank you very much @dfox and @trogus and no doubt devRant is the best app I ever had.13 -
got a call from a recruiter for a job. said "wokey, let's see what you got to offer"
get to the interview, the first question is "why do you want to work in our company?"
me: i don't know, you called me!1 -
HR - There is a 2 years gap on your CV!
Candidate - I was in jail.
HR - Why?
Candidate:- I killed the guy who told me : "We'll call you back".
HR :- Welcome on board, You have the Job.6