Full infection flow, brought to you by OpwnAI, as affectionately dubbed by @_CPResearch_
(thread)
1. Researchers at Check Point used AI models, including OpenAI's ChatGPT and Codex, to create a full infection flow for a cyber attack without writing any code themselves.
2. The attack began with a spear-phishing email, impersonating a hosting company, generated by #ChatGPT
How to use gobuster in pentesting. I used #AI to summarize my video (results below).
(thread)
1. I downloaded the subtitle of the video, convert it to text, then used #gpt3 to summarize it. Here's the video and below is the summary. I'm pretty amazed of the results.
2. Go Buster is a tool used for penetration testing and bruteforcing web directories.
It should only be used on targets with permission to do so.
5 tips on how I used Burp Pro in my 85+ pentests in 2022:
(thread)
1. Use “TLS Pass Through” to cancel out as much noise as possible, and save your configuration to file. Here’s a small portion of my personal config.
Alternatively, you can use scoping, but I find that as being more restrictive.
2. Use regex filtering with negative search in “HTTP History” and Target “Site map” to further clean your testing. Here’s how my personal config looks like.
HackTheBox challenges are often more advanced and may require a deeper understanding of different technologies and techniques. This can be a great opportunity for TryHackMe users to learn and practice more advanced skills.
2. Real-world scenarios
HackTheBox challenges are designed to be more realistic and often mimic real-world scenarios. This can provide a valuable learning opportunity for TryHackMe users who want to gain experience in more realistic environments.
What I love: triagers, quality and variety of targets, scope width, fast payouts, tight community, dashboard
What I don't love (yet): LP+, vulnerability rewards
What I love: community, community, community, quality of triaging, dashboard, hybrid pentests (despite I didn't get any)
What I don't love (yet): variety of tragets, private programs, vulnerability rewards