sigmoid.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A social space for people researching, working with, or just interested in AI!

Server stats:

525
active users

#tryhackme

1 post1 participant0 posts today
Daniel Kuhl ✌🏻☮️☕️<p>Keeping up my streak (4 days) with <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> 101 on <a href="https://infosec.exchange/tags/TryHackMe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TryHackMe</span></a>.</p><p>Started with the next section <a href="https://infosec.exchange/tags/LinuxBasics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxBasics</span></a> Fundamentals. It started smooth. 🤓</p><p><a href="https://tryhackme.com/path/outline/cybersecurity101" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tryhackme.com/path/outline/cyb</span><span class="invisible">ersecurity101</span></a></p>
Cyb3rk1d<p>🗺️ Where to Practice Ethical Hacking — Safe Learning Platforms 🔐</p><p>Sharpen your skills legally on platforms like TryHackMe (beginners), Hack The Box (intermediate/advanced), PortSwigger Academy (web), and CTF sites — safe, structured labs and communities for hands-on learning. 🎯💻</p><p><a href="https://defcon.social/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://defcon.social/tags/TryHackMe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TryHackMe</span></a> <a href="https://defcon.social/tags/HackTheBox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackTheBox</span></a> <a href="https://defcon.social/tags/PortSwigger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PortSwigger</span></a> <a href="https://defcon.social/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://defcon.social/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://defcon.social/tags/LearnToHack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LearnToHack</span></a> <a href="https://defcon.social/tags/PenTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTesting</span></a> <a href="https://defcon.social/tags/WhiteHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhiteHat</span></a></p>
Lune (ne va pas sans Lautre)<p>OMG, ils sont plus vénère que je croyais chez TryHackMe 😅<br><a href="https://piaille.fr/tags/tryhackme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tryhackme</span></a> <a href="https://piaille.fr/tags/acab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>acab</span></a></p>
Michael Garweg<p>I just completed <a href="https://mastodon.online/tags/MITRE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MITRE</span></a> room on <a href="https://mastodon.online/tags/TryHackMe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TryHackMe</span></a>. This room will discuss the various resources MITRE has made available for the <a href="https://mastodon.online/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> community. <a href="https://tryhackme.com/room/mitre?utm_source=twitter&amp;utm_medium=social&amp;utm_campaign=social_share&amp;utm_content=room" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tryhackme.com/room/mitre?utm_s</span><span class="invisible">ource=twitter&amp;utm_medium=social&amp;utm_campaign=social_share&amp;utm_content=room</span></a></p>
Florian<p>As a <a href="https://infosec.exchange/tags/blind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blind</span></a> <a href="https://infosec.exchange/tags/hacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacker</span></a> I often get the question of how to break into the <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> field when <a href="https://infosec.exchange/tags/accessibility" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>accessibility</span></a> is a concern. What courses, platforms and tools would work best?<br>One consequence of this is the IC_Null channel on <a href="https://infosec.exchange/tags/Twitch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Twitch</span></a> where I look into various aspects of this in live streams through the lens of a <a href="https://infosec.exchange/tags/screenReader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>screenReader</span></a> user.<br>What I haven't done yet, is an outright head-to-head between the various answers you usually get to this question: <a href="https://infosec.exchange/tags/hackTheBox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackTheBox</span></a>, <a href="https://infosec.exchange/tags/tryHackMe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tryHackMe</span></a>, <a href="https://infosec.exchange/tags/picoCTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>picoCTF</span></a>, <a href="https://infosec.exchange/tags/parrotCTFS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>parrotCTFS</span></a>, <a href="https://infosec.exchange/tags/letsDefend" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>letsDefend</span></a> , etc.<br>In tonight's stream that is a question we'll start responding to. This is useful for people who develop for the <a href="https://infosec.exchange/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a>, are active in the <a href="https://infosec.exchange/tags/ctf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ctf</span></a> organizing space or just work in <a href="https://infosec.exchange/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> in general. In two hours, I shall be dissecting a few of these platforms from an accessibility perspective and point out the failings, as well as things that are actually really good!<br>Would love to have you join, over at <a href="https://twitch.tv/ic_null" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">twitch.tv/ic_null</span><span class="invisible"></span></a> and/or <a href="https://youtube.com/@viewpointUnseen" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtube.com/@viewpointUnseen</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/selfPromo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfPromo</span></a> <a href="https://infosec.exchange/tags/stream" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stream</span></a></p>
Florian<p>Today on the IC_Null strimmz: We'll talk certifications framed by the <a href="https://infosec.exchange/tags/tryHackMe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tryHackMe</span></a> PT1 cert released this week. We'll do some THM rooms while discussing the <a href="https://infosec.exchange/tags/accessibility" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>accessibility</span></a> obstacles in certs by <a href="https://infosec.exchange/tags/offSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offSec</span></a>, <a href="https://infosec.exchange/tags/COMPTIA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>COMPTIA</span></a> etc. when using a <a href="https://infosec.exchange/tags/screenReader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>screenReader</span></a>. I'm trying a new timeslot for these so would love to see if saturday's easier for folks wanting to see this kind of thing. We're starting in an hour over at <a href="https://twitch.tv/ic_null" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">twitch.tv/ic_null</span><span class="invisible"></span></a> and/or <a href="https://youtube.com/@blindlyCoding" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtube.com/@blindlyCoding</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/goingLive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>goingLive</span></a> <a href="https://infosec.exchange/tags/selfPromo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfPromo</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/shamelessPlug" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shamelessPlug</span></a> <a href="https://infosec.exchange/tags/infoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infoSec</span></a> <a href="https://infosec.exchange/tags/whateverOtherHashtagsWeAreMeantToUseTheseDays" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whateverOtherHashtagsWeAreMeantToUseTheseDays</span></a></p>
🌱 Ligniform :donor:​<p>My new <a href="https://infosec.exchange/tags/blog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blog</span></a> post got accepted as a write-up featured on a <a href="https://infosec.exchange/tags/TryHackMe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TryHackMe</span></a> room. Hell yeah baby. </p><p><a href="https://ligniform.blog/posts/ms-sentinel-just-looking/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ligniform.blog/posts/ms-sentin</span><span class="invisible">el-just-looking/</span></a></p>
Arthur Lutz (Zenika)<p>Très content d'avoir obtenu une nouvelle certification auprès de TryHackMe : SOC (Security Operations Center) Level 1. 🏅</p><p>Il s'agit d'un cursus de Cyber qui se focalise sur l'approche défensive (Blue Team 🔵), avec plein de contenus sur la défense et l'investigation. Et plein de chouettes technologies dedans : MITRE, OSInt, Yara, MISP, Snort, Zeek, Brim, Wireshark, tshark, osquery, wazuh, ELK, Splunk, Autopsy, Volatility, Velociraptor, PhishTool, etc. </p><p><a href="https://tryhackme.com/certificate/THM-BNJBGOY9VQ" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tryhackme.com/certificate/THM-</span><span class="invisible">BNJBGOY9VQ</span></a></p><p><a href="https://pouet.chapril.org/tags/TryHackMe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TryHackMe</span></a></p>
🌱 Ligniform :donor:​<p>Back on my boring post grind to document my learning. </p><p>New <a href="https://infosec.exchange/tags/Blog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Blog</span></a> post going through a <a href="https://infosec.exchange/tags/TryHackMe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TryHackMe</span></a> challenge. This time detecting two different attack types with snort!</p><p><a href="https://ligniform.blog/posts/snort-live-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ligniform.blog/posts/snort-liv</span><span class="invisible">e-attacks/</span></a></p><p>💜 🌱 </p><p><a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/Learning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Learning</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlueTeam</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a></p>
Florian<p><a href="https://infosec.exchange/tags/tryHackMe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tryHackMe</span></a> has a new certification out, the Security Analyst Level 1 or <a href="https://infosec.exchange/tags/SAL1" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SAL1</span></a> for short. I will NOT be covering it on my channel to assess its <a href="https://infosec.exchange/tags/accessibility" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>accessibility</span></a> for <a href="https://infosec.exchange/tags/screenReader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>screenReader</span></a> users, because in a sense I already have. I did a stream on their <a href="https://infosec.exchange/tags/SOC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SOC</span></a> simulator recently which is a big part of this cert, and that was a disaster. Add to that that on the "About' page, they couldn't even be bothered to <a href="https://infosec.exchange/tags/altText" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>altText</span></a> the one logo in the descriptive text makes me feel it is utterly unnecessary to even give this a chance. It's a <a href="https://infosec.exchange/tags/fail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fail</span></a>. plain and simple.</p>
Linux Magazine<p>We are celebrating our 400th issue of the Linux Update newsletter! Check out this week's feature from Chris Binnie on ethical hacking. Thank you to our readers and partners for your continued support!<br><a href="https://mailchi.mp/linux-magazine.com/linux-update-ethical-hacking" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mailchi.mp/linux-magazine.com/</span><span class="invisible">linux-update-ethical-hacking</span></a><br><a href="https://fosstodon.org/tags/TryHackMe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TryHackMe</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://fosstodon.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://fosstodon.org/tags/newsletter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newsletter</span></a> <a href="https://fosstodon.org/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalHacking</span></a> <a href="https://fosstodon.org/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ubuntu</span></a> <a href="https://fosstodon.org/tags/GNOME" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GNOME</span></a> <a href="https://fosstodon.org/tags/Bash" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bash</span></a> <a href="https://fosstodon.org/tags/LibreWolf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LibreWolf</span></a> <a href="https://fosstodon.org/tags/jobs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jobs</span></a> <a href="https://fosstodon.org/tags/events" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>events</span></a> <a href="https://fosstodon.org/tags/PyConUS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PyConUS</span></a> <a href="https://fosstodon.org/tags/LAS2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LAS2025</span></a></p>
gyorb<p>Published a new blog post how I created a virtual machine<br>for a pentest learning environment and to solve TryHackMe challenges.<br><a href="https://gyorban.net/blog/setup-a-pentest-vm-for-tryhackme/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gyorban.net/blog/setup-a-pente</span><span class="invisible">st-vm-for-tryhackme/</span></a><br><a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/tryhackme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tryhackme</span></a> <span class="h-card" translate="no"><a href="https://infosec.exchange/@RealTryHackMe" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>RealTryHackMe</span></a></span> <a href="https://infosec.exchange/tags/ParrotSecurityOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ParrotSecurityOS</span></a> <a href="https://infosec.exchange/tags/parrotsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>parrotsec</span></a> <a href="https://infosec.exchange/tags/quemu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quemu</span></a> <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a></p>
Florian<p>Ok, we're almost done with these. I have literally one more video to make.</p><p>VERDICT: ...yeah sorry guys but it's bad. It's really bad, actually.</p><p>I'd say at the very least half of the tasks are not doable outright due to bugs in the <a href="https://infosec.exchange/tags/tryHackMe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tryHackMe</span></a> platform if you use a <a href="https://infosec.exchange/tags/screenReader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>screenReader</span></a>. From the ones that ARE doable, some require advanced knowledge a beginner just wouldn't have, which is a problem for a supposed beginner-friendly event.<br>I did manage to flag down someone who might actually be able to fix some of the issues I've pointed out for years. Here's hoping we FINALLY see some improvements in 2025 but given the current track record... yeah, not holding my breath. I'm a <a href="https://infosec.exchange/tags/blind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blind</span></a> person and i'll believe it when I see it. <a href="https://infosec.exchange/tags/adventOfCyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>adventOfCyber</span></a> <a href="https://infosec.exchange/tags/infoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infoSec</span></a> <a href="https://infosec.exchange/tags/accessibility" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>accessibility</span></a></p>
Florian<p>Do I know anyone who works for/on <a href="https://infosec.exchange/tags/splunk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>splunk</span></a> ?<br>I'm evaluating its <a href="https://infosec.exchange/tags/accessibility" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>accessibility</span></a> for <a href="https://infosec.exchange/tags/screenReader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>screenReader</span></a> users v8.26 for the <a href="https://infosec.exchange/tags/tryHackMe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tryHackMe</span></a> <a href="https://infosec.exchange/tags/AdventOfCyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AdventOfCyber</span></a> challenges and let's just say I have some feedback to share. I can absolutely see that work has been done but I think an expert review is sorely needed :) Who do I talk to about that? <a href="https://infosec.exchange/tags/infoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infoSec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>

I've been busily working away at the videos and today, in about an hour, we'll do several more days of it on stream. For those who are new, fully enthusiast tackling these challenges with a and commenting on the
- Yes, actually blind.
- No, no remaining vision.
- Yes, since birth.

Come join the fun over at twitch.tv/ic_null and/or youtube.com/@blindlyCoding

TwitchIC_null - TwitchFully blind person hacking, coding and tinkering while using a screen reader. THM, HTB, accessibility, all the things.

I saw that TryHackMe's Advent of Cyber 2024 had a Web Sockets challenge and was hoping to bust out ronin-support-web's Web Socket helper methods to write up a script to exploit some kind of arbitrary bug chain. Unfortunately, it appears that you just have to change a user_id in one JSON message to get another user's data.

TryHackMeAdvent of Cyber 2024Dive into Christmas with festive beginner-friendly security challenges released daily throughout December, and win big with over $100,000 worth of prizes!