mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

640
comptes actifs

#oscp

1 message1 participant0 message aujourd’hui

#Introduction

Hello, my name is Christoff.

I live in Illinois, USA, outside the St. Louis area. Below I'll talk about my technology and creative interests, and a bit about me personally. I'm going to hashtag the heck out of this post.

the whole "deadbeef" thing is the magic number from #Solaris for freed memory. I simply chose .monster TLD because it seemed cool and I like "extended" TLDs.

#Technology

I have been using a OpenBSD, #NetBSD, or #GNU/#Linux since the late 1990s as a primary workstation. I used macOS from 2020 to 2025, switching to the #KDE neon distro (KDE plasma is amazing and KDE isn't bloated anymore, yay!).

My current career is as a #pentester where I break into web applications, IP networks, mobile applications (especially #Android), and people to their face or over the phone; code #malware; write documentation; and enjoy helping clients in a third party contractor/consultant role. I started that job change in 2020, when I earned the #OSCP certification at the height of "#infosec twitter" when I did well there.

Previously I worked for about 20 years as a senior-level programmer, and systems, infrastructure, and database administrator. Burnout was very real and I was extremely bored/unfulfilled.

Now that programming and sysadmin stuff isn't my career, I find I enjoy programming and tinkering again.

I am a big fan of NetBSD and always have been. I am not a huge fan of GNU/Linux but I do appreciate things "just working", even if it is full of closed-source binary blobs and other garbage. It was fun in the 1990s.

I know many programming languages but have been paid professionally to code in #C, #Perl, #Python, #PHP, #Java, and #Groovy for big commercial entities like eBay, small companies, and the US government.

I've maintained 99.99% uptime for a 60MM+ platform for years, including failover and backups (that were regularly tested... you test your failover and backups, right?!).

I always wanted to be a cool C and low-level programmer, which I thought for the longest time was being a kernel programmer, but now I know that isn't the life for me.

Emacs is something I've enjoyed since the beginning and I still can't code a #Lisp well. I'd love to be a cool #lisper with #CommonLisp, but haven't gotten there yet. I'm on the #c64 and #embedded #retrocomputing train now.

#Creative

For creative stuff, I aim to do a lot but tend to hop around as interests take me. I could use some discipline there (someday?).

For #music, I have an electric #bass (Fender Jazz) and electric #guitar. I love #jambands (#GratefulDead, #Phish, #Goose) and that's the type of music I like to play along to.

For #art, I like #acrylic and #watercolor painting. I rarely do it, but think about it a lot and love it when I do it. I don't have any skill or talent, but that's not the point. It's for me and no one else.

For #computing, I am venturing into #C64 #demoscene programming and exploration. Not only was I too poor to get one when I was little but I sorta forgot about it over time. The desire to do cool things in a restricted environment where folks are playing in the sandbox, too, is very exciting and attractive to me. I don't know how to code the #Commodore64 stuff yet, but will! Learning the assembly language (I have zero desire to code in BASIC again and I can just code assembly).

I like #chess, but gave up playing a long time ago. I enjoy following the sport and ChessNetwork (Jerry) is someone I'm a big fan of and got to meet once at a chess club!

#Personal

I live with my soulmate and our five amazing cats in a small town outside St. Louis living a quiet life. Just doing our jobs, taking care of daily life stuff, and enjoying each other and life as much as we can. Ups and downs of life chaos, like anyone else, but we're doing alright!

We enjoy exploring places within driving distance and there are a lot of places to go to.

Currently, we're really into playing two-player games together and just started collecting #boardgames. Right now, we're really digging #SkyTeam, #RoyalGameOfUr, #ForrestShuffle, #SentinelsOfTheMultiverse, and this magnet game I don't know the name of. We have #SpiritIsland and #ArcNova to unwrap and learn. We tried really really hard to get into #ArkhamHorrorTheCardGame but the rules are too complicated and confusing, where it felt like we were doing the wrong thing all the time.

I am 46. I grew up loving Star Wars, Star Trek, #SciFi, reading novels non-stop, horror, and watching movies. I collect classic SciFi books from 1960s and 1970s.

I had two IQ tests as a kid and scored in the genius level. I killed a lot of brain cells from a youth finding myself, grateful for it, but thankfully made it out well. Other than being overweight, my physicals are straight down the middle perfect line (yay, genetics!) and my brain is still in top condition!

I would perhaps describe myself as an extremely curious person, that loves #puzzles and #mysteries, #exploration, figuring out #HumanBehavior like I'm an alien studying humans (I'm good at it, it turns out), that has a keen eye for detail, remembering random little things, and a good listener. I'm fairly adaptable and fluid in most things, which works well for me. My brain works differently than a lot of people, and while frustrating a lot of the time for things I don't understand fully, it is me and serves me well in niches.

Making people laugh makes me happy. I am a #hacker and #tinkerer.

I follow NCAA football #Buckeyes, professional #tennis, and #NFL #ClevelandBrowns. I enjoy it with other people and my other half, but not a huge fan for it solo.

Hello kind people of Mastodon! Mastodon is a big part of my life, so I'm going to give finding work here a go as well.

I'm looking for a junior penetration tester or cyber security analyst role. Should you have any leads, or simply be able to provide info, please reach out.

To give you a thumbnail background sketch: I'm a former Lecturer in Anthropology pivoting to Cyber Security. I recently passed the #OSCP and loved it. I have interests in writing and advising to make pentesting more accessible, IoT pentesting, and purple team work.

While I am looking for a first role, I'm open to freelance, contract, and part-time roles. I'm located in Seattle, though remote is welcome.

Boosts will be noted and the favor returned in due course!

Thanks everyone.

I'd like to share some of my projects that are hosted on @github. Let's start with my public #exploits that span more than two decades of #pwning.

github.com/0xdea/exploits

"You can't argue with a root shell." -- Felix "FX" Lindner

Probably the most known is raptor_udf.c that targets #MySQL (those of you who solved the @offsec #OSCP training labs should recognize it).

My favorite is still raptor_rlogin.c, a glorious #Solaris #RCE from the early 2000s. Take your pick!

GitHubGitHub - 0xdea/exploits: A handy collection of my public exploits, all in one place.A handy collection of my public exploits, all in one place. - 0xdea/exploits

It's been about a week since this happened so I'm probably cool-headed enough to talk about it. First a little background info.

A sales person from Offensive Security (offsec.com/) has been trying to reach out to me for days. First by work email, which I ignored, then through my personal LinkedIn account, which I also ignored.

Then, last week, my son texts me and says, "some guy called me looking for you." I told him I was your son and he said he would try to email. I know that absolutely no one in my professional circle has my son's personal cell number, so I asked him to send me the number that called him.

I call the number back and it's the sales guy from Offensive Security. I immediately asked him how he got my son's number and found out it was part of a ZoomInfo (zoominfo.com/) record for me. I told him to immediately delete any record he has with my son's information.

I then let him know in no uncertain terms that his company was using some shady data gathering practices if they had my son's cell number and because of that I will personally never do business with OffSec again. I also made it clear that he should never reach out to me again.

Even though I hold the #OSCP and #OSCE certifications and even though they were a career changer for me and for my colleagues, I will no longer do business with their company.

OffSecThe Path to a Secure Future | OffSecBuild cyber workforce resilience with our unmatched skills development and hands-on learning platform and library.

One thing I find terribly annoying about some #OSCP lab boxes are how they’re entirely a CTF gimmick that offers no practical lessons worth learning for the exam. I mean really - this is supposed to be a fairly expensive and elite certification, and it sure doesn’t feel like it sometimes.

A répondu dans un fil de discussion

@alyssam_infosec I've been a software developer for 20+ years, but spending my own time getting educated on #infosec because that's where I'd like to go next in my career. I got my #OSCP last year. My concern is that it seems like I can't make the same amount of money transitioning to infosec and it feels like starting over. Do you have any thoughts on if that sounds true/false?

The list of command-line and menu entry commands.

Source: GNU manual

blocklist: Get the block list notation of a file

boot: Start up your operating system

cat: Show the contents of a file

chainloader: Chain-load another boot loader

cmp: Compare two files

configfile: Load a configuration file

debug: Toggle the debug flag

displayapm: Display APM information

displaymem: Display memory configuration

embed: Embed Stage 1.5

find: Find a file

fstest: Test a filesystem

geometry: Manipulate the geometry of a drive

halt: Shut down your computer

help: Show help messages

impsprobe: Probe SMP

initrd: Load an initrd

install: Install GRUB

ioprobe: Probe I/O ports used for a drive

kernel: Load a kernel

lock: Lock a menu entry

makeactive: Make a partition active

map: Map a drive to another

md5crypt: Encrypt a password in MD5 format

module: Load a module

modulenounzip: Load a module without decompression

pause: Wait for a key press

quit: Exit from the grub shell

reboot: Reboot your computer

read: Read data from memory

root: Set GRUB's root device

rootnoverify: Set GRUB's root device without mounting

savedefault: Save current entry as the default entry

setup: Set up GRUB's installation automatically

testload: Load a file for testing a filesystem

testvbe: Test VESA BIOS EXTENSION

uppermem: Set the upper memory size

vbeprobe: Probe VESA BIOS EXTENSION