Brutkey

da_667
@da_667@infosec.exchange

Now, I'm not doing this to be a bully, but I'm going to just note that this fella stated he was knowledgable about Snort, Suricata, Regular expressions, Vulnerability Management, Wireshark, and tcpdump.

I wanna remind you, that I gave him a quick tutorial blog post on how to generate pcaps from a proof of concept exploit. and that his resume says he is competent in this skillset.

https://community.emergingthreats.net/t/come-sail-the-cves-part-2-turning-data-into-rules/2751

My boy took four hours to tell me that his pcap was empty and had nothing int it. So I ask 'em.
what is the command you're using?

he copies it to me. The
-i option is reserved for the interface you want to sniff packets on. I have not a single clue why, but his -i switch was an IP address.

darf :BlobhajMlem:
@darfplatypus@infosec.exchange

@da_667@infosec.exchange why is someone with 3 years of experience an intern?