Cybersecurity professional with an interest in networking, and beginning to delve into binary exploitation and reverse engineering.

  • 1 Post
  • 126 Comments
Joined 7 months ago
cake
Cake day: March 27th, 2024

help-circle
  • This is very anecdotal, but both myself and the vast majority of my peers use macOS as their base host system. I work in cybersecurity, specifically offensive penetration testing. Myself, most of my coworkers, and probably half of my peers I’m competing against at local conference CTFs or that I know at local meetups are using a MacBook host with VMs spun up to need.

    Something like 75% of my job is done in a Linux VM. Doing it on a MacBook is infinitely more pleasant than any other laptop I’ve ever tried using, regardless of what OS it’s running.

    Also, and again extremely anecdotal, the most technical people I’ve ever known were all using hackintoshes when I knew them, and would use MacBooks when away from the home/office.

    I really don’t understand where this “Mac products are for non-technical people who want to appear technical” trope comes from. MacOS is a phenomenal product for non-technical people. My partner is the least technical person in the world, but they started using macOS in art school and found it intuitive and easy to use. As a technical person, I appreciate the polished UI built on top of the Unix kernel and that I can do everything I need to do from a terminal shell. The fact that the product is excellent for both wildly disparate types of users is testament to how great it is imo.















  • I’m a huge proponent of Yubikeys, and I use them every day. I use it for every account I have that supports non-resident FIDO2. I have my ssh keys set up on there so i can just sit down at any computer and ssh in to my remote servers without having to rely on being on a computer with its pub key already on the server. I use it for my pgp keys. I use it for TOTP on a few of my more sensitive accounts that don’t support anything better.

    In addition to my regular w2 9-5 pen testing job I do pen testing as a contractor for a place like hacker one on steroids. I am forced to use Duo by them. Can’t use another TOTP app, can’t use a yubikey. While in most cases you can use another TOTP instead of duo, it is not always possible. That said, I highly doubt a school system has set up Duo in a way that prevents you from using alternate TOTP apps.






  • borari@lemmy.dbzer0.comtoSelfhosted@lemmy.worldNetwork Switch
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    1 month ago

    You presented one that doesn’t have security vulnerabilities? Here’s yet another CVE out for trendnet: https://nvd.nist.gov/vuln/detail/CVE-2018-19239

    Every. Single. Brand. Has. CVEs. I’ve used Mikrotik, I’ve used Cisco, I’ve used Juniper, I’ve used Ubiquiti. I have a trendnet Poe switch in my attic powering some cameras and an AP right now. I have no “problem” with any brand of anything.

    I do have a problem with you implying that a company doesn’t take security seriously when they do. I start to think you’re intentionally lying when you lift up trendnet as the model, because they have quite an especially atrocious history of it.