IT/Software career thread: Invert binary trees for dollars.

brekk

Dancing Dino Superstar
<Bronze Donator>
2,191
1,746
"IT administration department head" asks where our software saves the database location.
I mail him it's
Hkey_local_machine\......

he calls me, he can't find it. I teamview onto his machine, he's in his fucking windows explorer, looking for a directory called "HKey_local_machine" on C:\

Where's the "Any" key!?
 
  • 1Like
Reactions: 1 user

Kuro

Naxxramas 1.0 Raider
8,372
21,301
At my college an irritated computer lab watcher put "any" labels on the space bar.
 
  • 1Like
Reactions: 1 user

Quineloe

Ahn'Qiraj Raider
6,978
4,463
downloaded from microsoft, the hybrid tool to convert from exchange to office 365

file size 1kb and the exe wouldn't run. So...

1615380726849.png
 

Aychamo BanBan

<Banned>
6,338
7,144
So.. how do people make money with python? Is it just because people have certain tasks they need in a defined environment? I ask bc I’m enjoying learning it, it’s very clever and so advanced from what I know of programming 20 years ago, but you can’t really compile it, and a lot of libraries are OS dependent, etc. Not complaining. But just seems like you can’t really compile an app and distribute it .. can you? So when you do apps with like tkinter etc, those are really all just internal things to accomplish a task, but not something you are deploying for sale?
 
  • 1Garbage
Reactions: 1 user

TJT

Mr. Poopybutthole
<Gold Donor>
40,968
102,870
So.. how do people make money with python? Is it just because people have certain tasks they need in a defined environment? I ask bc I’m enjoying learning it, it’s very clever and so advanced from what I know of programming 20 years ago, but you can’t really compile it, and a lot of libraries are OS dependent, etc. Not complaining. But just seems like you can’t really compile an app and distribute it .. can you? So when you do apps with like tkinter etc, those are really all just internal things to accomplish a task, but not something you are deploying for sale?
Python excels at quick and dirty programming. For this reason its good for data science, network tasks, general tasks, anything simple that is otherwise tedious to do manually, etc. It causes lots of issues when you need to make something big with it because so much in python is generally out of your control (memory management, threading, etc).

99% of the stuff I've used python for in the past 9 years is for some very routine task. Write some bullshit in python for it in 20 minutes, throw it on a box and run it on a cronjob. This is way easier than using Java to do the same thing.

At my current job I wrote an application in python to manage the hundreds of ETL tasks I put together for the company's backend. Another one was a console application for the finance buys where they could just enter a target date and a few other parameters and it would query our billing platform for projected billings from today to X chosen date and a few other assumptions. This was just a way to interface with the billing system's API that a non technical person could use. It then spits out an excel doc with all that in it. Python is real good for that shit.
 
Last edited:
  • 2Like
  • 1Solidarity
Reactions: 2 users

Aldarion

Egg Nazi
8,946
24,469
Or learn perl, which is just like python except for people that enjoy freedom.

(Not commenting on making money with python, its just that my spider sense goes off when I detect people saying positive things about python)
 

TJT

Mr. Poopybutthole
<Gold Donor>
40,968
102,870
People just take it too far. Yes Python is easier to understand. It was intentionally designed to be easier to understand. It is also, however, lacking a ton of features and flexibility of the "harder" languages like Java or C#.

The asspain management gets is when their dev teams try and use python or Javascript for all layers of the application. That always creates problems down the road.

Pythonistas writing code like a bunch of faggots is just that. I fucking hate pythonistas.
 

Nirgon

YOU HAVE NO POWER HERE
12,746
19,646
I'm trying to learn more shit, I'd love to one day be extremely well educated in cyber security / network security, etc. I have basic understanding of programming, but haven't done shit in a really long time. You think Python is a great new language to learn?
Python, Java + Spring boot, Javascript and of course SQL
 

Asshat wormie

2023 Asshat Award Winner
<Gold Donor>
16,820
30,964
Julia is a great new language to learn. Python is a great old(ish) language to learn.
 

TJT

Mr. Poopybutthole
<Gold Donor>
40,968
102,870
Cybersecurity is gay but I learned a lot about it from this site @Falxy-US . I say gay because most people in the Cybersecurity sector work completely boring ass jobs like running commerical pen test software. Letting it spit out a result then telling devs that this is wrong fix it without understanding even what the piece of shit application they use spits out. Other than that its a lot of things like user account/pw management and shit. I'd never work in cybersecurity.

 
  • 1Like
Reactions: 1 user

Aychamo BanBan

<Banned>
6,338
7,144
Cybersecurity is gay but I learned a lot about it from this site @Falxy-US . I say gay because most people in the Cybersecurity sector work completely boring ass jobs like running commerical pen test software. Letting it spit out a result then telling devs that this is wrong fix it without understanding even what the piece of shit application they use spits out. Other than that its a lot of things like user account/pw management and shit. I'd never work in cybersecurity.


Thank you!

I was hoping it would teach me a lot more about networking and stuff. Like I see people talk about their “labs” wirh VMs. I was able to get Kali Linux running in a VM but didn’t see the point. And I hear about Docker and all that.
 

Asshat wormie

2023 Asshat Award Winner
<Gold Donor>
16,820
30,964
This might be good:


Cant speak for this course as I have no interest but I have done the Haskell and python data analysis courses offered and they were great. They had automatic exercise checkers which is always nice, and rare, when it comes to university courses online and this cybersecurity class seems to as well.

🤷‍♂️
 

Ao-

¯\_(ツ)_/¯
<WoW Guild Officer>
7,879
507
Cybersecurity is gay but I learned a lot about it from this site @Falxy-US . I say gay because most people in the Cybersecurity sector work completely boring ass jobs like running commerical pen test software. Letting it spit out a result then telling devs that this is wrong fix it without understanding even what the piece of shit application they use spits out. Other than that its a lot of things like user account/pw management and shit. I'd never work in cybersecurity.

Sir I am very offended at this, as it is mostly correct and holy shit it's mainly internet janitor work. Cybersecurity is cool if you're doing Forensics (disk forensics is cool but memory forensics is CRAZY), Threat Intelligence work (though phishing analysis is boring) or actual red-teaming/Offensive Security (right chaos chaos ?). The rest of it "what does this alert mean, why is this user dumb?" or "Holy shit why is SMB exposed to the internet?" and you clean up tech debt.

HackTheBox is another set of cool stuff like that.


I would reaaaaally strive to differentiate "Cybersecurity" vs "Hacking" though. The difference exists even if there is overlap.
 
  • 1Like
Reactions: 1 user

TJT

Mr. Poopybutthole
<Gold Donor>
40,968
102,870
Sir I am very offended at this, as it is mostly correct and holy shit it's mainly internet janitor work. Cybersecurity is cool if you're doing Forensics (disk forensics is cool but memory forensics is CRAZY), Threat Intelligence work (though phishing analysis is boring) or actual red-teaming/Offensive Security (right chaos chaos ?). The rest of it "what does this alert mean, why is this user dumb?" or "Holy shit why is SMB exposed to the internet?" and you clean up tech debt.

HackTheBox is another set of cool stuff like that.


I would reaaaaally strive to differentiate "Cybersecurity" vs "Hacking" though. The difference exists even if there is overlap.
My favorite experience with idiotic "cybersecurity."

Dude: Runs whatever security software bullshit on our code. Spits out a report. Says that I am exposing api keys or something.
Me: No dude, that is wrong, this line is referencing our key vault in AWS where that actual API key exists. Once called, this returns the encrypted key for this transaction then discards it.
Dude: If they hacked our app they could get this reference then get our key out of the AWS vault.
Me: Uhhh, no because they don't have any way to reach AWS. The location of that vault can only be reached from our internal server that is the only one of like five with IPs that can connect to it to retrieve it. The AWS role is the only one in our entire org that can open the key vault other than the admin role. This is SAAS product best practice. Just having the reference does nothing. They would need access to the product server itself and the keys to make a transaction with this user role or the admin role in AWS. None of which are exposed.
Dude: That's not whats happening (he has no idea what's happening). Make it better.
Me: I suspect the software is scanning some pointless bullshit. I use a simple base64 encoding on that particular line and add another step to decode it. This doesn't trip the scanning tool.
Dude: Good job you made it secure.

....?

But I do agree the high level Security Research type stuff is cool as fuck. But you need to be hella smart and have a LOT of experience with various stuff to be any good at it.
 
  • 2Worf
Reactions: 1 users

chaos

Buzzfeed Editor
17,324
4,839
That's how VM works. They run the tool, spits out the report, then they are supposed to do some validation. Or someone should do the validation. But the dude's response should have been "cool, we'll note that" instead of making you end run around the tool.

Threat hunting looks fun. Threat intel can be but it's mostly tons of analysis and repackaging. Red team/pentesting is fun, sometimes, sometimes very very frustrating. When I first started doing red team shit, the groups I was going against were just absurd, straight up retarded stuff like being able to reach a DC from the internet or not patching. It's changed a lot, the social engineering component is like the main thing now and exploit dev has become the trials of hercules just to defeat stack protections. Ao- is right though, there's "cyber" which involves a lot of management jerkoff shit and then there's hacking which is the cool shit people want to do but instead get roped into making powerpoints all day.

You can compile python into an executable if you need to, Falxy, but you shouldn't unless you're making a shellcode launcher or something. Also try hackthebox.eu, I haven't actually done tryhackme but I've done a lot of htb and it's really good.
 
  • 1Like
Reactions: 1 user

alavaz

Trakanon Raider
2,001
713
At my last job our "cyber" guy asked in one of our weekly meetings if we could open up this long list of ports or disable the firewalls on all of our servers so that he could "scan for vulnerabilities." I've never seen so much laughter at a work meeting.

I do think that certain aspects of cyber could be cool, but it just seems like the field is so bloated with entry level dudes watching for a red light in splunk that's usually false alert anyway. I had our cyber department get all riled up a couple of weeks ago because they thought they found an active attack when they noticed thousands of attempted logins against our DCs. Upon closer examination, it was simply thousands of "events" that they pulled from the event log...
 
  • 2Worf
Reactions: 1 users

Mist

Eeyore Enthusiast
<Gold Donor>
30,414
22,202
The rest of it "what does this alert mean"
Hey, I like event management/incident response/monitoring tools+alert configuration/problem management.

What is this alert? Oh it's garbage. Oh this alert garbage happened 6 times this month? I only want you to tell me if this garbage happens 3 times in a day, or 5 times in a week, otherwise toss it in the trash.

It's like playing a super grindy video game.

You don't really get to see the interesting parts of incident response if you're just doing it for your own mid-size internal company, but when you're doing it for hundreds of companies at once with thousands of sites it gets a lot more interesting.
 

TJT

Mr. Poopybutthole
<Gold Donor>
40,968
102,870
At my last job our "cyber" guy asked in one of our weekly meetings if we could open up this long list of ports or disable the firewalls on all of our servers so that he could "scan for vulnerabilities." I've never seen so much laughter at a work meeting.

I do think that certain aspects of cyber could be cool, but it just seems like the field is so bloated with entry level dudes watching for a red light in splunk that's usually false alert anyway. I had our cyber department get all riled up a couple of weeks ago because they thought they found an active attack when they noticed thousands of attempted logins against our DCs. Upon closer examination, it was simply thousands of "events" that they pulled from the event log...
That is my main gripe with them. The part where you have someone managing user accounts/pws? Yes that absolutely needs to be done, although much of it can be automated. But this can be also done by a system admin without even adding extra responsibilities to their role. It doesn't have to be a "cybersecurity" dude. I am fully capable of pressing EXECUTE PEN TEST on whatever dumbass scanning tool you're using. Why do you have a job again?

It is as you say. Most of them ride coattails of people and shit they don't understand. Oh you saw a red alert in splunk? Who set it up? What is it looking for? Rather than investigate or understand this they just raise the alarm that OMG SECURITY VULNERABILITY. Bro, this is why people hate you. The wise cybersecurity professional would be the one spending time creating splunk rules and intelligent alerts looking for meaningful events that should prompt action. But it is the extreme minority that actually does this. As splunk is usually configured by devs who want splunk to tell them about shit they care about. Which is usually related to their current projects and workload rather than from the perspective of "is this secure?" Somehow this gets adopted by cybersecurity without even changing it and just rolling with it. Probably because they read some article about splunk being "great for cybersecurity."
 

Aldarion

Egg Nazi
8,946
24,469
For what you should be using Python for, I can't think of a reason why you'd want to use perl instead.
How about its not ugly as shit, doesnt force you to write your code in a terrible unreadable format, and for the love of FUCK, doesnt impose meaning on whitespace characters?

I mostly kid my python friends in a good natured way, but seriously, any language that has rules for whitespace characters should be dragged out in the alley and shot.
 
  • 1Like
Reactions: 1 user