安装 Steam
登录
|
语言
繁體中文(繁体中文)
日本語(日语)
한국어(韩语)
ไทย(泰语)
български(保加利亚语)
Čeština(捷克语)
Dansk(丹麦语)
Deutsch(德语)
English(英语)
Español-España(西班牙语 - 西班牙)
Español - Latinoamérica(西班牙语 - 拉丁美洲)
Ελληνικά(希腊语)
Français(法语)
Italiano(意大利语)
Bahasa Indonesia(印度尼西亚语)
Magyar(匈牙利语)
Nederlands(荷兰语)
Norsk(挪威语)
Polski(波兰语)
Português(葡萄牙语 - 葡萄牙)
Português-Brasil(葡萄牙语 - 巴西)
Română(罗马尼亚语)
Русский(俄语)
Suomi(芬兰语)
Svenska(瑞典语)
Türkçe(土耳其语)
Tiếng Việt(越南语)
Українська(乌克兰语)
报告翻译问题
do yall have any experience with programming? expertise?
you don't have to share your linkedinn with me, don't worry. XD
but b.t.w. i have this briliant scam idea....
jk.
It doesn't make it good show.
If you are really curious, you will even find all the onscreen IP addresses, URLs, and QR codes actually lead viewers to real destinations. Quite like hidden easter eggs.
One example: The following IP addresses in the show shown as: 192.251.68.239, 192.251.68.250, and 192.251.68.254, all lead to a pretty taunting and very disturbing image of a laughing pixilated FSociety mask, mockingly informing the user that "Your Personal Files Are Encrypted."
There's a 24 hour countdown on the bottom of the screen. You can either hack it or wait 24 hours for the surprise quote, encoded in a base64 string. Then use a base64 decoder on it.
ps: I'm an ex-hacker, not a nerd! Haha, it's pretty basic stuff, but still a bit of amusement.
https://www.youtube.com/watch?v=V4MF2s6MLxY
Lol at easter eggs, any good ones?
One I mentioned above...
For those that can't decode it: PGRpdiBjbGFzcz0ib3ZlciI+PGRpdj4iSSBzaW5jZXJlbHkgYmVsaWV2ZSB0aGF0IGJhbmtpbmcgZXN0YWJsaXNobWVudHMgYXJlIG1vcmUgZGFuZ2Vyb3VzIHRoYW4gc3RhbmRpbmcgYXJtaWVzLCBhbmQgdGhhdCB0aGUgcHJpbmNpcGxlIG9mIHNwZW5kaW5nIG1vbmV5IHRvIGJlIHBhaWQgYnkgcG9zdGVyaXR5LCB1bmRlciB0aGUgbmFtZSBvZiBmdW5kaW5nLCBpcyBidXQgc3dpbmRsaW5nIGZ1dHVyaXR5IG9uIGEgbGFyZ2Ugc2NhbGUuIjwvZGl2PjxkaXYgY2xhc3M9ImF1dGhvciI+LSBUaG9tYXMgSmVmZmVyc29uPC9zcGFuPjwvZGl2PjwvZGl2Pg==
Is Base 64 Encryption decrypted to the message:
"I sincerely believe that banking establishments are more dangerous than standing armies, and that the principle of spending money to be paid by posterity, under the name of funding, is but swindling futurity on a large scale.
– Thomas Jefferson"
Then by inspecting the SSL certificate for that webserver, you get a list of others.
DNS Name=www.racksure.com
DNS Name=racksure.com
DNS Name=*.serverfarm.evil-corp-usa.com
DNS Name=www.e-corp-usa.com
DNS Name=iammrrobot.com
DNS Name=www.conficturaindustries.com
DNS Name=www.iammrrobot.com
DNS Name=*.seeso.com
DNS Name=*.evil-corp-usa.com
DNS Name=e-corp-usa.com
DNS Name=*.bxjyb2jvda.net
DNS Name=whoismrrobot.com
DNS Name=seeso.com
DNS Name=fsoc.sh
DNS Name=www.fsoc.sh
DNS Name=conficturaindustries.com
DNS Name=whereismrrobot.com
DNS Name=www.whoismrrobot.com
DNS Name=www.whereismrrobot.com
DNS Name=evil-corp-usa.com
DNS Name=www.seeso.com
Another is the puzzle at the website: https://fsoc.sh
You may notice that the cursor is blinking with random intervals. That's morse code, but I suck with decoding morse code and would rather snoop the script file under '/assets/main.js'
Then there's the eye movement. What does it spell?
"Leave me here"
There's a bunch of them.
Another will lead you to the End Game: https://www.whoismrrobot.com/endgame/
Base64 isn't encryption. It is an ecoding scheme it does not follow either Symmetrical such as AES or Asymmetrical encryption. Or Public Key Cryptography such as RSA and Public-key-private-key infrastructure.
Other encoding schemes are
Base64
Base32
Base16 (Hexadecimal)
Base10 (Decimal)
Base8 (Octal)
Base7
Base2 (Binary)
And so on. Also to be a "security" expert You'd need knowledge in a number of fields, namely
But before any of the below you'd need to be familiar with PDU encapsulation and OSI model layer Encapsulation e.g
Layer 7 (Application HTTP, FTP, SIP,etc) protocols
Layer 6 (Presentation how data is presented to an application layer encryption is also carried out here)
Layer 5 (Initiation /
Layer 4 (Transport UDP / TCP port setup / association)
Layer 3 (IP packet encapsulation either Datagrams or Streams)
Layer 2 (Frames, HDLC,PPP,V.25 and Frame-Relay)
Layer 1 (Physical wiring/ Radiowaves/ Microwaves, Fibreoptic cabling).
Firewall configuration / Evasion (Some CISCO Firewalls are exceptionally smart)
Vulnerability assessment
Host recon-analysis
IDS / IPS configuration, evasion, and exploitation.
You must know programming, you can't be a "Security Expert in IT" without at least a in depth knowledge of C, C++ and ASM not to mention you also need knowledge in python as most "pen-test tools" allow for dynamic scripting via python code usually. NMAP, Nessus and even THCHydra and OCLCUDACAT / OCLHASHCAT
And lastly you'd also need an in depth knowledge of the Linux OS and shell. Scripts are often used for automated testing like using grep-like expressions to test permutation or combination space of passwords.
Thing is I do study / know C, C++, Python, and partial ASM. I know how the "general CPU registers work". Writing ASM on INTEL chips is complicated because you don't just contend with the 64bit instructions RDX, RCX RDI,