veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

47
active users

#pentesting

1 post1 participant1 post today
0x40k<p>Whoa, that Google phishing scam was pretty wild, wasn't it? 🤯 Seriously, DKIM replay *and* abusing Google Sites... somebody got *really* creative there.</p><p>Look, we all know phishing isn't new. But the ingenuity attackers are showing lately? It's genuinely getting a bit unnerving. And the real kicker? Too many companies still think a simple automated scan has their back. Spoiler: it doesn't. Catching sophisticated stuff like this often takes a proper penetration tester who knows where to look.</p><p>It's always a good feeling when we help clients spot these things before they blow up. Honestly, though, security really needs to be driven from the top and actually get the budget it deserves.</p><p>Makes you think, huh? How long 'til we see the first wave of AI-driven phishing attacks that are *scarily* good? Gives me the chills!</p><p><a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a></p>
nickbearded<p>BashCore isn’t about having hundreds of tools.<br>It’s about having the right ones.</p><p>45 carefully selected CLI tools: fast, powerful, no GUI, no bloat.<br>Perfect for pentesters, sysadmins, and students who love the terminal.</p><p>Don’t need a tool? Remove it.<br>Want more? Install it.</p><p>You’re in control.</p><p><a href="https://bashcore.org" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bashcore.org</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/BashCore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BashCore</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Minimalism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Minimalism</span></a> <a href="https://mastodon.social/tags/CLI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CLI</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://mastodon.social/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a> <a href="https://mastodon.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://mastodon.social/tags/HackTheCLI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackTheCLI</span></a></p>
13reak :fedora:<p>Watch out with your <u>Azure Automation Account</u> / <u>Runbooks</u>.</p><ul><li>they often include hard-coded credentials</li><li>their output is not protected. So attackers can see your results</li><li>they can use <u>Shared Resources</u> (i.e. credentials or certificates)</li><li><u>Hybrid Worker</u> and <u>Azure Arc</u> allow access to your on-premise infrastructure </li></ul><p>Dangerous stuff if not managed correctly!</p><p><a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://infosec.exchange/tags/azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>azure</span></a> <a href="https://infosec.exchange/tags/knowledgedrop" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>knowledgedrop</span></a> <a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/privilegeescalation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privilegeescalation</span></a></p>
nickbearded<p>Completed this Web Hacking &amp; Pentesting course two years ago — my entry point into ethical hacking.</p><p>I had a slow PC with poor RAM, so I built the first BashCore on a separate, even older machine.<br>Worked with both PCs connected through my phone’s hotspot. That was my lab. </p><p>Minimal setup, real-world practice. No excuses.</p><p><a href="https://mastodon.social/tags/BashCore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BashCore</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://mastodon.social/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://mastodon.social/tags/DIYLab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DIYLab</span></a></p>
dan_nanni<p>This infographic showcases Linux-based tools commonly used by red teams to simulate attacks and test defenses 😎👇</p><p>This tool collection is shared to promote awareness of potential threats and defensive tactics. Use responsibly—unauthorized use is both illegal and unethical. Stay informed , but stay ethical! <a href="https://mastodon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a></p><p>Find high-res pdf books with all my <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> and <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> related infographics at <a href="https://study-notes.org" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">study-notes.org</span><span class="invisible"></span></a></p>
halil deniz<p>Hello everyone. In today's article, we are collecting information about the phone number with python.</p><p><a href="https://denizhalil.com/2025/04/18/information-from-phone-numbers-with-osint-a-practical-guide-python/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">denizhalil.com/2025/04/18/info</span><span class="invisible">rmation-from-phone-numbers-with-osint-a-practical-guide-python/</span></a></p><p><a href="https://mastodon.social/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a> <a href="https://mastodon.social/tags/pythonwithcybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pythonwithcybersecurity</span></a> <a href="https://mastodon.social/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.social/tags/osint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>osint</span></a> <a href="https://mastodon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://mastodon.social/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a></p>

Come join my team: Target is hiring for a Senior AppSec Pentester. Message me if you want to know what the role/team is like. Lots of benefits, plenty of time for training. Must be close-ish to Brooklyn Park, MN.

target.wd5.myworkdayjobs.com/t

target.wd5.myworkdayjobs.comSenior Cybersecurity Engineer - Penetration TesterThe pay range is $95,000.00 - $171,000.00 Pay is based on several factors which vary based on position. These include labor markets and in some instances may include education, work experience and certifications. In addition to your pay, Target cares about and invests in you as a team member, so that you can take care of yourself and your family. Target offers eligible team members and their dependents comprehensive health benefits and programs, which may include medical, vision, dental, life insurance and more, to help you and your family take care of your whole selves. Other benefits for eligible team members include 401(k), employee discount, short term disability, long term disability, paid sick leave, paid national holidays, and paid vacation. Find competitive benefits from financial and education to well-being and beyond at https://corporate.target.com/careers/benefits. JOIN TARGET CYBERSECURITY AS A SENIOR ENGINEER - PENETRATION TESTER About Us Target is an iconic brand, a Fortune 50 company and one of America’s leading retailers. Target as a tech company? Absolutely. We’re the behind-the-scenes powerhouse that fuels Target’s passion and commitment to cutting-edge innovation. We anchor every facet of one of the world’s best-loved retailers with a strong technology framework that relies on the latest tools and technologies—and the brightest people—to deliver incredible value to guests online and in stores. Target Technology Services is on a mission to offer the systems, tools and support that guests and team members need and deserve. Our high-performing teams balance independence with collaboration, and we pride ourselves on being versatile, agile and creative. We drive industry-leading technologies in support of every angle of the business, and help ensure that Target operates smoothly, securely and reliably from the inside out. Attention: This role is defined as hybrid in Minneapolis, MN. The candidate selected for this role must reside in Minneapolis or the surrounding area. Relocation packages are available if you currently do not live in the required area for this role. Residing in Minneapolis or the surrounding area is a requirement for the role and is not negotiable. About You As a Senior Engineer Penetration Tester on the Security Testing Services team, you help our team mission of protecting Target’s guests by leveraging deep context of our environment, strong partnerships, and relentless curiosity as we drive industry-leading pentesting at scale. Our team values are collaboration, respect, being highly adaptive, and purposeful with our work. Our team of in-house penetration testers are conducting a variety of tests but are mainly focused on large comprehensive evaluation of our key Target business functions and processes along with PCI required testing. You’ll be in direct contact with teams in a variety of business portfolios, giving you first-hand knowledge of how Target operates. Use your skills, experience and talents to be a part of groundbreaking thinking and visionary goals. You’ll take the lead as you… Perform penetration testing against our Target-developed applications, and our scoped PCI assets Manage the entire lifecycle of penetration testing from discovery, triage, testing, and validation of findings Identify and report security vulnerabilities in web applications, APIs, networks, and enterprise systems Provide clear, well-written assessments and findings with clearly defined business impact Consult with Target Tech and Security partner teams to explain findings, address security concerns, and provide guidance Support mentorship and knowledge sharing within the team Triage Bug Bounty program reports and escalate high and critical security issues with our partner teams Engage in threat model activities and provide domain expertise to best support identifying threats Provide technical oversight and coach others to resolve complex technical issues Advocate for team penetration testing and bug bounty program process and tool improvements Core responsibilities of this job are described within this job description. Job duties may change at any time due to business needs. Minimum Requirements: 4-year degree or equivalent experience 5+ years of penetration testing experience Demonstrates strong domain-specific knowledge regarding penetration testing and web application security testing Advanced knowledge of Burp Suite and other security tools (nmap, nuclei, etc) Ability to work independently and collaborate with teams effectively Strong time management and ability to meet deadlines Ability to prioritize impactful findings Experience working with Mac, Windows, and Linux Builds strong commitment within the team to support the appropriate team priorities Strong verbal and written communication skills - clearly communicates security concepts to leadership and partners within product team Demonstrates a solid understanding of the impact of own work on the team and/or guests Ability to automate and script tasks using preferred language (GoLang, Python, etc) Strong problem-solving and critical-thinking skills Passionate about mentorship and knowledge-sharing Stays current with new and evolving technologies via formal training and self-directed education This position will operate as a Hybrid/Flex for Your Day work arrangement based on Target’s needs. A Hybrid/Flex for Your Day work arrangement means the team member’s core role will need to be performed both onsite at the Target HQ MN location the role is assigned to and virtually, depending upon what your role, team and tasks require for that day. Work duties cannot be performed outside of the country of the primary work location, unless otherwise prescribed by Target. Click here if you are curious to learn more about Minnesota. Benefits Eligibility Please paste this url into your preferred browser to learn about benefits eligibility for this role: https://tgt.biz/BenefitsForYou_D Americans with Disabilities Act (ADA) In compliance with state and federal laws, Target will make reasonable accommodations for applicants with disabilities. If a reasonable accommodation is needed to participate in the job application or interview process, please reach out to candidate.accommodations@HRHelp.Target.com. Application deadline is : 05/13/2025 Target is one of the world’s most recognized brands and one of America’s leading retailers. We make Target our guests’ preferred shopping destination by offering outstanding value, inspiration, innovation and an exceptional guest experience that no other retailer can deliver. Target is committed to responsible corporate citizenship, ethical business practices, environmental stewardship and generous community support. Since 1946, we have given 5 percent of our profits back to our communities. Our goal is to work as one team to fulfill our unique brand promise to our guests, wherever and whenever they choose to shop. We'll contact you if you're selected for next steps. In the meantime, follow us at A Bullseye View for the latest news. Our Benefits We care about and invest in you as a team member, so that you can take care of yourself and your family. Target offers eligible team members and their dependents comprehensive health benefits and programs, which may include medical, vision, dental, life insurance and more, to help you and your family take care of your whole selves. Other benefits for eligible team members include 401(k), employee discount, short term disability, long term disability, paid sick leave, paid national holidays, and paid vacation. Find competitive benefits from financial and education to well-being and beyond at https://corporate.target.com/careers/benefits.

Man, this whole AI hype train... Yeah, sure, the tools are definitely getting sharper and faster, no doubt about it. But an AI pulling off a *real* pentest? Seriously doubt that's happening anytime soon. Let's be real: automated scans are useful, but they just aren't the same beast as a genuine penetration test.

Honestly, I think security needs to be woven right into the fabric of a company from the get-go. It can't just be an afterthought you tack on when alarms are already blaring.

Now, don't get me wrong, AI definitely brings its own set of dangers – disinformation is a big one that springs to mind. But here's the thing: we absolutely *have* to get our heads around these tools and figure them out. If we don't keep pace, we risk becoming irrelevant pretty quick.

So, curious to hear what you all think – where do the greatest pitfalls lie with AI in the security field? What keeps you up at night?

Whoa, Gamaredon/Shuckworm is back at it again. Seriously, these guys just don't quit! They've got a new GammaSteel variant making the rounds, and it's targeting foreign military missions over in Ukraine. But honestly, this kind of threat? It has implications for *all* of us.

Get this: their way in is infected USB drives! I mean, seriously folks, who's still plugging random USB sticks into their machines these days?! Come on!

Here's the deal: GammaSteel quietly siphons off data in the background. Plus, their C2 servers act as the attackers' command and control hub. Toss in some PowerShell scripts, and you've got a recipe for disaster brewing.

Speaking as a pentester, sadly, I see this kind of thing way too often. It's usually simple tactics paired with surprisingly clever malware... a nasty combo.

So, what's the takeaway? Time for a serious look at your USB policy! And employee training on this stuff is absolutely crucial. Regular pentests? They're non-negotiable. Sure, automated scans are helpful, but they're *no* substitute for a seasoned pentester's eyes digging deep. (Quick side note: Ever dug into the UserAssist keys in the Windows Registry? You can uncover some interesting trails there...)

Let's talk strategy: What USB security measures do you have running in your environment? Drop your thoughts below!

Seriously, what *is* going on with the Play Store these days?! 🤯 Clients constantly ask me if the apps are actually secure... and tools like PlayPraetor? They're basically screaming NOPE!

You wouldn't believe the junk floating around. Fake apps are out there just harvesting your data. Think banking trojans, sneaky PWAs set up for phishing, Remote Access Trojans (RATs) – you name it, it's probably there. An absolute nightmare! 😠

Wondering about PWAs? They're essentially websites packaged as apps, which makes them a prime vector for phishing scams. And RATs? Those give attackers *complete* control over your device. Seriously nasty stuff! Then there's Phantom malware leveraging Accessibility Services to watch everything you do... It's intense!

Actually, this takes me back to a recent pentest where we nearly overlooked a very convincing PWA phishing page. Thinking automated scans will catch everything? Yeah, don't count on it. 🙈

So, how can you shield yourself from this mess?
1. Stick strictly to official app stores!
2. Do your homework on the developers – vet them!
3. Always check app permissions *before* installing! What do they *really* need access to?
4. Make sure you've got solid mobile security installed!

Have you ever stumbled upon a fake app? How are you keeping your Android device locked down? Share your best tips below! 👇

[Update – 8 hours later]
BashCore still holding strong.

RAM steady at 700 MB

Load average: 0.25 0.18 0.20

No GUI, no disk writes, 6 active terminals

Running from a USB 2.0 stick (8 GB!)

Host: Acer Aspire One D160 (2009, 2 cores, 2 GB RAM, no battery, Wi-Fi only) 😅

Uptime test continues. 6.5 days to go.

Yo, IT-Sec crowd! ✌️

Anyone else noticing how *everyone* seems to be talking about AI-powered security tools these days? Yeah, it's everywhere. But let's be real for a sec – are they *truly* as amazing as the hype suggests? 🤔

I mean, okay, AI can definitely be useful for spotting anomalies and patterns, no doubt about that. But here's a thought: what happens if the AI itself gets compromised? Or what about when it starts churning out false alarms simply because it doesn't *really* grasp the situation? 🤖

Honestly, I've got my reservations. While automation is certainly nice to have, I'm convinced a skilled pentester, you know, one with actual brainpower and a strategic approach, still outsmarts any AI – at least for the time being. 😎 And look, if AI eventually *does* get significantly better, well, that just means it's time for us to add another skill to our toolkit. 🤷‍♂️

So, what's your perspective on this? Do you see AI completely taking over the pentesting scene, or is that human touch going to remain irreplaceable? 🔥 Let the debate begin!