• 1 Post
  • 20 Comments
Joined 2 years ago
cake
Cake day: June 14th, 2023

help-circle



  • Most hacks interact with Linux because its in almost every corporate environment. People can still get scammed on Linux on their personal device too since rdp clients are compatible and a common method used. Linux Desktop is 4% market share (according to steam surveys?) but server infrastructure is largely Linux based, from firewalls to Web servers to database infrastructure. Most people host some form of Linux environment and lots of ransomware actors have Linux specific encryptors.

    Think of it this way: if the environment you just hacked has their corporate SQL database with all of their trade secrets sitting on Linux infra, and you’re a ransomware actor, you’re not going to give up and go hack someone else. Well, not if you’re any good I guess.

    The Linux community is better at finding and detecting this stuff due to more people looking at it and open source making it available etc. It’s attack surface (software that could be attacked) is still huge and the danger comes from outdated versions and misconfigurations just like anything else.

    Patch often, install from trusted sources, have backups. That’s really all you can do. Every environment has vulnerabilities. They sit at desks and push keys on the keyboard.






  • Always back up your stuff, but after doing so, the process is pretty much boot to bios, set boot priority with linux usb at the top, and away you go.

    If you have secure boot enabled, you might have to enter a pass code or passphrase but otherwise its identical to traditional bios. If you want secure boot, which prevents someone else from doing this process to your machine, re enable after you’ve installed nvidia drivers otherwise you’ll have to provide it your secure boot password during and sometimes it likes to break.




  • I’m thinking data entry for threat hunters, and integrations with our other platforms apis but I couldn’t say anything specific. SSDs are a good shout, I might have tried setting it up with hdds if you hadn’t said.

    Did you find it easier to add connectors in seperate docker containers or within the main octi container?

    It feels like there’s a pretty high ceiling for this platform and the data you can generate. Do you find it easy to create good data? Do you have any habits?

    I’m pretty keen to learn so feel free to answer what you can.


  • Really don’t care much about my cv. This program is a great way to learn about the STIX protocol so no idea what you mean about “no actionable skills”. STIX is an interesting information sharing method, the program is well designed to educate the user on it and seeing the format it imports and exports data will teach me a buttload.

    More to the point, maybe could you be less cynical and share some advice. I’m not going to flex my qualifications cos they’re mediocre but I’ve got smart people around me who just don’t know this particular program and I’m interested to hear from those who do.

    Do you run this program at work or at home? Have you learned anything interesting from using it? Are there avoidable mistakes I could not repeat from hosting it? Answers to those questions would be very useful.


  • I dont see myself doing too much configuration with connectors to begin with which brings some of the difficulty down. I was asking to see if others run anything similar in their home configuration. I’ve met people who run MISP from home before so it sounded feasible to me.

    I was also looking for the community aspect of this, I already knew they had a docker-compose config. I wanted to know who had attempted this before and what they’d learned, that sort of thing.




  • In the update settings she can reset her apt sources back to “default”. It’s not too hard and there’s a gui throughout the process (from memory).

    The package conflicts is an interesting one, if you have the time to post one of these on lemmy I’m sure someone will suggest a fix. It’s probably a apt install --fix-broken or something simple (hopefully) but I’m sure we could work it out.

    Totally agree that these are annoying issues though. See if you can use Nala, it’s a TUI front end for Apt and it’s got some nice user changes like if you run upgrade it updates and upgrades. It also has a fetch feature which finds nearby sources, so you’re always downloading from the closest/fastest source.