Hacker Newsnew | past | comments | ask | show | jobs | submit | ImpulseGuided's commentslogin

>the Greek government fleeced them first in the big scam

For somebody who is not so familiar with Greek history: What are you referring to here? What was this scam you're speaking of?


Life felt so meaningless. Don't ever do this to me again.


Browsing to HN was the first thing I tried to do this morning after accidentally sleeping in. When it failed to load, my panicked thought was: "Is this how it all ends? Did Putin finally press the red button?"


>better option for some cases

Can you tell us more about the kind of problems for which you receive better search results via andisearch.com?


For general search, andisearch and google gives you the same results... in andysearch i don't need to try 10 different combinations of the same sentence to get the expected results like in google, in andisearch i get the expected results almost at the first try (sometimes at the second one) for very specific searches.


>Powered by Illuminati technology.

PG operating the switchboard.


>I've read some fun research in the past about infrared communications, magnetic strips, etc. Things that are all around us but we don't really think of as attack vectors.

Any particular source that you would recommend to start learning about these vectors?


The resources that come to mind are actually all videos of Defcon talks by the same person (Major Malfunction aka Adam Laurie). They are pretty old now, but still interesting.

Infrared Hacking: https://www.youtube.com/watch?v=61Fo-zg-DqI

Magstripe Hacking: https://www.youtube.com/watch?v=ITihB1c3dHw

Satellite Hacking: https://www.youtube.com/watch?v=PyXZX63etog

These all hit the sweet spot for me of technologies we use all the time but don't really consider the security implications.


Thank you very much for linking these.

By the way, did you catch yesterday's thread on the Hack-a-Sat(ellite) CTF?

>https://news.ycombinator.com/item?id=31559117

Also congratulations on passing the OSED. Reading your 5-part report it looks like you got your money's worth.

Did you study for the OSED full-time or did you manage to complete all studying and tasks after work?


Thanks! I actually took three OffSec courses last year. The first one I did was the OSWP (wifi) as a sort of warm up because it's the easiest course they offer and I knew I could knock that out pretty quick. Then I took the OSEP course which was a ton of content. Finally I took the OSED which was another ton of content and the most technical of those three. My work gave me 40 hours of in-office time to last year for training. I can't recall if I used that 40 hours for the OSEP or OSED, but I know I used it for one of those two. However, I still put in a ton of hours on my own time too. It's just a lot of content to go through. 40 hours isn't enough time for either of those courses in my opinion. Having no children (and an understanding spouse) made it easier for me to dedicate a lot of personal time on the training. I love OffSec's stuff though and recommend it to anyone who is into offensive security and wants practical training.



Very interesting. For years now, I have a similar project in the back of my head, with the same Captain Future inspiration - a small flying drone with a speaker box and a personality (voice assistant) basically a flying wisecracking Alexa.

Therefore I'm excited for the next installment of the author's project.


Oh yes! That would be a very cool project and a real flying Prof Simon - Hope to see some uptimes about it :)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: