Daniel Lowry (66:28)
What's up, everyone? Welcome to Jawjacking. We just got done reading a bunch of crazy, actually decent day of articles in my estimation on on the Daily Cyber Threat Brief. I have a couple things I actually want to run down a little bit further. Maybe even have some fun, play around things, get some hands on. That could be a good time. Hopefully you enjoyed that. Kind of petered out there at the end, but we started off really strong and then kind of walked across the finish line. We were sprinting out of the gate and then. Yeah, but hey, I like djb. Say, and we're back. Yep, we are back. But this is Jawjacking. This is an ama. You get to ask me questions. Make sure if you have a question, throw a big Q in front of it. That way I can see it from the rest of the chit chat that's going on in the chat. Not that I don't love that. I certainly do. And yeah, first question of today is, is there a stream on Friday? Great question. There will be a stream on Friday. There will not be a stream tomorrow. So thank you for reminding me to tell people that. That is a great question. The articles had blown my mind so much I just forgot to mention it. But that's what we got ad tech in the house for. To remind everybody. So the Daily Cyber Threat Brief. There will be nothing tomorrow. There will be no Jawjacking tomorrow. It is a day off for everyone. It is the new year. It will be the first day of 2026. Enjoy. Have a great time tonight. Please drink responsibly, call an Uber, a cab, a ride share, whatever you need to do. Do not drive while intoxicated at all. I have loved ones that are out there. I do not want to see you or anyone else get hurt. So there's my PSA for today. My hand is really cold. It's like keeping it away from your body makes it lose blood flow. I'll do this. I'll switch hands. But yeah, yeah, that's. That's a great thing. But Friday we'll be back and it will be me. Jerry will not return until next week. So I will be doing daily cyber threat brief on Friday. And Jawjacking is well. And Cybercast IRL will be on Friday as well, just to pitch my own stuff. All right, let's jump in here. Let's find those questions. Questions. Where for art thou questions? Just have to make sure I catch up with everyone here. Here's one. Booyah from Arty. Do you think privacy as a pre. Do you think privacy as a premium should be a business model or should it come as baseline? Baseline, like privacy should not be like. It should just be like standard operating procedure. My privacy is not a commodity. It's a right. I. I believe that privacy is a human right. Let's see. Here's one from Space Tacos follow at Tech. Will you be living on live stream on Friday? Yes. And Cybercast irl. Yes. Thank you for following up with that. Space Tacos. I look forward to seeing you there. This one comes from Cryptic Roses. What's the best techniques you guys use for cybersecurity research? Well, it just depends on what kind of research you're doing, right? If you're doing web applications, if you're doing, like, software applications, if you're like, again, if you're doing hardware hacking stuff, it all depends. So that's a kind of a subjective question. I would think that most people that are looking for software vulnerabilities, they're fuzzing out things like buffer overflows or like logic flaws, whether or not there are injections, things of that nature. They're using tools like as simple as strings, which will give you all human readable strings that are in a binary. What else are they doing? They're looking for injection points. They're fuzzing them with data, seeing if they can crash the application. You're building a lab at home. So I'm just kind of giving you one for instance. By the way, this is not the end all be all of how to do this. You're going to fuzz the application out. You're going to try to decompile these applications using things like IDA Pro or ghidra and looking through the code for how it flows and if there's any kind of mistakes that were made, maybe they're using some pro, like I say, you know, problematic coding practices, you know that, that are known to have security issues and then attempting to exploit those. And if you're fortunate enough to make that happen, then you crown, you come up with a poc. You run that down to the responsible disclosure form for whatever organization you're, you're hacking for or researching and start doing due diligence with them, get into contact with them, help them work through it, help them. And they should be coming up with a patch and then you submit that to Miter, get your CVE and you're good to go. So with a web application you kind of do the same thing I say, kind of it's similar where you're fuzzing inputs on the, you know, look for injections kind of running through the OAS top 10. See if you can find any vulnerabilities that match some of that stuff, because they're going to be the best. And if you find one, then same kind of procedure, you contact the organization, let them know what you found, give them your evidence, let them triage that, ask them for permission to disclose once they've got it triaged and fixed, and then submit for your cve. Let's see here, what else, what else we got here? We got Doom, Kraken. What are your thoughts on using LinkedIn from a cybersecurity perspective? A lot of my references suggest using it, but I personally don't trust it with my PII since it's owned by Meta. This is a great question, great question. Honestly, I don't trust anybody that owns my PII and I work with them as much like I make the decision on what to give them, knowing full well that I, I am either gonna like just play the game and go, I can't, can't go to the next level unless I give them what they asked for. And I'm willing to make that calculated risk. LinkedIn. I've been heavily active on LinkedIn for a few years now. I don't have nearly as many followers as somebody like Jerry or, or others. I have a few of right under 30, 000 followers on LinkedIn. I haven't been active on it lately. I took some time off from LinkedIn. I just needed a break, right. It's the end of the year, starting a new job. I just, I just needed to take a step back, right? I don't. I was feeling burnout you know, its breath was on my neck. It was that close, you know what I mean? So I was like, let me, let me just step back from a few things. I'll get back to it probably this week. I, I do want to start posting again and so LinkedIn can be a good thing. Most of these things are double edged swords. Okay. So you, you've got to really go in with a jaundice eye. Understand? Yes. They're gonna, you think of people like Michelle, Michelle does everything he can if, if you don't explicitly require something and then that requirement. Can I lie? You know, am I able to tell you like, oh, the school I went to was FU University. Right. And they go, okay, right. I don't have to give you all that detail. It doesn't have to be real. I can do misinformation and therefore you're good to go. So that's one way you can go about it. If you want to kind of skirt around, you gotta, you gotta do what you can do, get, get creative with this stuff. But I, I like LinkedIn. I think LinkedIn can be a really good link. Research. I say I like it. I think you'd be a useful resource if you're willing to put the time and effort into it. So that's my, that's my real advice when it comes to LinkedIn. You absolutely should be wary of whether or not it's is using your data in a way that you don't want it to. So by all means, feed it a bunch of bull crap whenever and wherever you can. I highly recommend, other than that it could be a useful tool for networking, gaining an audience, getting your name out there and networking because that's what, that's really what it was originally meant for and still can be used for. It's not as good as it used to be, but it can be useful. So just keep that in mind. All right, so there's your LinkedIn answer. I got a few that I have pinned. See here from cryptic Roses. How social is cloud engineering? Jobs as office environments seem fun. I've only experienced it for two weeks as an intern. I mean, depending on the crew in office stuff can be awesome. I actually have come to the conclusion myself. I prefer a hybrid. I think hybrid like half a day at work. I want to go into the office every day, but I don't want to stay in the office all day. I want to do work that requires me to focus at home in my ivory tower. I want to do work that forces me, that, that requires me to interact at work. I think there's, there's pros and cons to both side of work from home and return to office stuff. And that's just my personal opinion. So I like going in the office to an extent. So you get a good crew. It's going to be awesome. Have fun. I've worked with some great people and I enjoy working with them. This one again from Arty Steve Leto covered a Philly criminal case where the cops used Google to track a person and the precedence is bad for fourth Amendment. Have you heard about it yet? I have not heard about it. Did they use Google like Osint? Like I. I'd have to know more about how they used Google and how it, how it would be a violation of their fourth Amendment rights. Right. If it was public information. That's, that's not a violation of fourth amendment rights. If they like broke into their Google account. That is absolutely without a warrant. That's absolutely a violation of their, of their fourth Amendment rights. So I have to learn more about that one from Face Doyle, super technical question. What would your favorite apt group entrance music be if they were a wrestler? We can call the Event Server Slam 2026. So my, my favorite band is Ultra Bridge and there was a wrestler that used their song Metalingus as their intro. So that's what's up. They have some great times. Call of Achilles, that's a great tune as well. So fun, fun. Great question, great question. Let's see here again from Doom Kraken. Doom Kraken. I keep learning or I keep seeing stuff about seminars and courses to take for cyber security training and these SC podcasts. Are there any out there that come with a certificate or are great to show on a resume? I mean a lot of them do come with certificates. Completion I've seen just depends. I mean if they're costing you a bit of money, yeah, you want to do your due diligence, you're going to have to get specific on asking the community, kind of reach out and go, hey, I'm looking at this cyber security seminar cost 25 bucks. Cost whatever. So it's a little money. Is it worth it? What do you guys think about that and kind of get some feedback on that? So do your research. Go into Reddit, go into the Discord servers of people that were probably gonna have done the same kind of thing and get their take on it. Maybe somebody goes, oh yeah, they're total crap. Or they go, oh no, that's amazing. That's 25 bucks well spent. That but you got to be specific. Can't just say, hey, there's a bunch of subscript. Which one do you recommend you're gonna get? You might as well just Google search it at that point, figure out what it is that you want to learn. Go find out who's teaching that or putting a seminar on or a podcast or whatever. Then go ask people what they think about it. That's how. That's, that would be how I would do it. This one's from FedEx. What's for today's celebrations? What's New Year's Day look like? It looks like me sitting at the house. I love New Year's Day because I don't do nothing. I don't go out. I don't do jack. I'm a fuddy duddy. Oh, man, I forgot to do that. Let's do that. Go back to all comments. Hide that message. I hate when I do that. All right, looking for the questions. Let me go back to the last one I starred, which was FedEx. There it is. You said you thought LinkedIn was owned by Microsoft. It absolutely is owned by Microsoft. What is the st finale? I don't know what that is. Dj. Okay, what are we doing here? Looking through. Looking through. Where's your questions? Get your questions here. Get your questions answered. FedEx says he likes his hybrid setup, too. Yeah, Team hybrid. That's what's up, right? A little bit of this, little bit of that. See, I like options. I'm an option. Guys, what's. That's what drove me to Linux, honestly. I mean, first it was all about, like, somebody told me, if you want to be a real hacker, you got to use Linux. So I was like, okay, I'm learning Linux, I guess. And then I was like, man, I really like the customization of this. How it doesn't just, like, it gives me the ability to change just about anything I like. If I've got the wherewithal, it will give me the capability. I have the capability of, of modifying and customizing it. It's up to me. It gives me the tools. I like options. That's why I run every operating system. I have MacBook, I have multiple Linux. I've got Windows. Right. I've got Android. Only thing I don't have is iOS just because I'm not running an iPhone. I'm sorry, not this guy. I, I, I rode that, right? I wasn't a fan. Zack Morris on Is he breaking the fourth wall? What is the most exciting part of a GRC career in cyber security? I don't know because I don't do grc. But if you in chat, do, please chime in because Zach Morris is wanting Zach Morrison. I mean, it's wanting to know the most exciting parts. I don't know what, what would be the most exciting part of grc? GRC is kind of a reputation of being kind of magoo. Like actually you have violated. You have not followed the standard. You're not going to get your sock to type 2 compliance certification because you did not. Blah, blah, blah. It's very, very, very necessary. But you're, you're basically just looking for what people aren't doing right, and advising them on what to do right and how to do it right. So I mean that it could be. I, I would guess it would, could be exciting on seeing people that are excited about bettering their cyber security maturity and program and, and watching their little faces light up as, as you're like, well, you can do this and you can implement that. It's like it's. Oh, it's Christmas Day. Oh, I'm writing all this down. It's so amazing. It's like, because you do have a cyber security expert right there helping you out. Oh, man. Almost an alarm. What's the time? Okay, we're still good. So, yeah, anybody who knows, reach out to Zach Morrison. Let them know what's exciting about being grc. DJ B sec. Is Tech Net gonna blow stuff up tonight? Around the trailer park, man. Here's the thing. If you do it on New Year's, cops are everywhere, right? You gotta, you gotta wait. Actually, Saturday, Technic is going, going out with my boys. We gonna lay some lead down range. I need to get me some tannerite, though. I don't have any tannerite. So. Yeah. Blowing stuff up. Yes. Shooting stuff that blows stuff up. Yes. Just not doing it tonight. I got little kids, man. I gotta hang out with them kids, watch the ball drop with the wife, right? But Saturday is a different story. Saturday, Daniel's gonna put some 5, 5, 6 and some 7, 3, 7, 6, 2 by 39 down range. Maybe a little 45 ACP if he's feeling good, right? Turn on the eotech, maybe do some night fire. It could be a good time. All right, let's see here. DJB6 says we got football games today. Cool. A lot of people like the football. I used to be one of them. Oh, that's right. Stranger Things is out. Marcus Kyler, find the true. Thank you for reminding me. Oh, that's what you meant by St. Stranger Things that is straight up. I will watch some Stranger Things. I haven't seen any of the news season yet. Gotcha. I. I've watched Stranger Things since it started. I've never heard it called st. Of course, I don't like talk to people either, so there's that. I talk to the camera and this is the only way in which I actually see people talk back. Is there a step down below help desk? Because this comes from cryptic roses. Because I don't know why I'm not getting to the CV stage. And I've got advice to do help desk and tune. Not as a source of income and experience. Okay, hold on. Let me see if I can decipher what you're trying to say here. Is there a step down below help desk? So you not. I mean, so a lot of time. Let's just start here. A lot of times, people like myself, Jerry, and others will have you try to get for jobs on a help desk as a first cyber job. There are reasons for that. What are those reasons? You say? Great question. Glad you asked. Those reasons are you have to work with the public. You have to talk to people, users, clients. Basically think of them that way. They are your clients. You have to learn good customer service. You have to learn soft skills to be effective at that job. So it's really good for that. Number two, you're gonna see a variety of different problems. So you get really good at troubleshooting. Right. Number three, you start to see where misconfigurations happen. You get to see how users screw things up on a daily. And you go, huh? And you start to see like. So it's. It's a really good building block. Right. You're already with an organization. Chances are they do cyber security. Fingers crossed that they do. You're now an insider into that organization. You already have trust. So now you can start to say, hey, who's on that team? Learn who those people are. Start talking to them. Hey, I was. I'm really curious about X, Y and Z. I'm into cybersecurity. Could I take you to lunch and buy you lunch and just maybe get your team some lunch, a coffee, whatever the case is. I like to pick your brain about X, Y and Z. You're not asking for a job. You say, I'm learning cybersecurity. This is something that they are passionate about. Free lunch on top of it. I'm saying yes. Maybe they don't, but maybe they do. You do cool things. Hey, if you ever need an extra set of hands during a Project. I work for Dirt Cheap, AKA Free. I already work here, so I'll. I'll get coffee, I'll crawl under floorboards, I'll run cables, I'll do the toner. I'll do anything you don't want to do just so I can be a part of the show and smell the cyber on me. And then if and when something so you know, like those people become like, hey, you know what? We need an extra set of hands. Permanently. Well, Cryptic Roses has always been fresh to the scene and always been a cool person. Let's see if. If we can get them hired. Right? You're human networking. You're already in the organization. It makes it a whole lot easier to kind of transition. So that's why we recommend starting a lot. It's not the only way to do it. You can do freelance work, you can volunteer bug bounty. There's a lot of stuff that you can do that's not necessarily a step down, but you get the idea. Right. It will give you the kind of like it's. It's a lower barrier to entry than maybe getting on a help desk. So there you go. Moving on. Moving on. Zach Morris. Was that like being on Save by the Bell? Yeah. Or what was it like being on Save by the Bell? Zach Morrison. You gotta love that name, man. It's just great. It's a great name. It's a great show. I don't care who you are. It was great. Doom Kraken. What might be some good cybersec career fields to explore. Starting out as an FPS game designer. Looking to break into cybersec as a career. I have experience with version control systems. GitHub. Okay, that's great. As a cyber security developer, right? Someone who code review. A lot of pen testers hate doing code review. Hate it. Right. So if you already know how to do code and you're into cybersecurity, learn how to do secure code and you're the go to unicorn. That. No, no, because nobody else wants to do it. You will have no end of work on the code review. That would be my advice. Hopefully that helps. Look into it anyway. Right? How much time we got? Oh, we got one minute left. Edit on. Okay, I'm. I'm sorry, I cannot read that. The. My vision is not what it once was. But how solid is the sock career path in light of all the AI bus? Honestly, I. I won't be sea. I don't know. It's changing. It's different. It's making the. The. The. The bar to entry higher. So I don't know how fast you can catch up. You'd have to learn AI at this point. So. Yeah, just saying, you know what has done really well in spite of AI grc. Let's see here. Questions, questions, questions. I'll go a little bit over because we went a little bit over. Zach Morrison says my favorite co star was Mario Lopez. He's sweet looking guy, right? He's just the dimples and he's got that charm about him. I bet he was a, a real pleasure to work with. All right, let's see here. Get your last questions in before I call it a day. The real Kyle. Kyle, what training learning resources do you recommend for learning about WI fi? Thinking about drones, bots, cameras, etc as the world is changing. If you want to learn about WI fi specifically, just build a home lab with go go buy a $10 router from like Goodwill or something and then misconfigure it and hack it. If you're talking about getting into the more of the Iot side of things, not just strictly into WI fi, but hardware and things of that nature, there's a lot of good books out there. Practical Iot hacking, I think from no starts. They also have hardware hacking as an nostart has a couple of good books. Adify has a training course. It's not super duper pricey, but it costs you a couple of bucks. I mean it's, it's on the edge of like, oh, okay, that's money. But I, I haven't taken it, but it seems pretty solid. Do you consider yourself a journalist? Is there room for in depth journalism in cybersec? Man, I, I thought about that very question last night as I walked my dog. I was like, these articles today, right? I was like, what is up? What would that look like? To start my own, you know, journalistic outlet to, you know, the, the doing the research on the, on the stories and reaching out to people for comments and doing investigative research so I can get the real scoop. Having people from those organizations on the down low reaching out to me and telling me this is the real deal. This is why they won't tell you what happened because it's horrible and we suck. That's probably what's what would happen. I, I hope that someone would start something like that. I don't know how to do it. I wish I did because that would be great. All right. Just trying to catch up with you guys in chat and which I just did. All right, kids, looks like we have reached the end of the show today. Thank you for joining me. Hopefully you enjoyed it. I know I sure did. But as we say every time we end the show from Simply Cyber and all the Simply Cyber community, stay secure. Have a happy new Year. Goodbye. Goodbye.