Luke Turvey
4.7K posts

Luke Turvey
@TurvSec
Professional Hacker. Founder of PenTest reporting tool https://t.co/wU45D4wCUG Collects infosec tools like Pokémon cards at: https://t.co/HUC8oTdRCo



So many phonies, so few who are the real deal


Introducing @trynoscope by TryHackMe! AI Pentesting with deep web app coverage, automatic remediation, unlimited retests, and results in hours not days. NoScope has found major vulnerabilities in a huge range of companies (including a critical on a crypto trading platform - manipulating live trading data). Over the last 3 months NoScope was tested on many beta clients (more info on the site)! You can also use NoScope alongside a pentesting team. It goes deep so they can focus on prioritisation, remediation, and the findings that matter most. Human-led pentests are expensive and cover a fraction of applications. NoScope goes deeper for significantly less. Pentesters aren't going away, but the way pentests have been done for the last decade has changed. Getting an AI pentest has never been more important with attackers using AI-powered cyber capabilities. 👉 Oh! and! Your AI pentest is FREE if NoScope finds nothing - no findings, no payment! Check NoScope out! noscope.com






Probably one of my favorite @NetworkChuck Videos - youtube.com/watch?v=dbMXi9…, loved the take on his hatred for ai, but also loves it. Definitely in the same boat, it scares me how capable it has become in such a short time. The other thing that really scares me is the frontier labs will likely always be a black box. The specific thing that scares me is how they use the data they collect. AFAIK - The Terms of Service when paying for the API and Subscription are wildly different, and I don't see much talk about that. I believe the API gives the user a lot more ownership over the data, where-as subscription, it is retained longer, and there are far fewer legal protections. I hear numbers like my $200 subscription can cost them anywhere from $2000 to $10,000/m. That's a lot of money to lose, and I know the money loss is offset by many things like the majority of users not making full use of their subscription -- But I can't imagine AI always being this cheap. So, a fear is that I will become dependent on a service that I will be priced out of in the future. Additionally, many platforms (ex: reddit/twitter) put things in place to stop AIs from freely harvesting data, but I don't think those types of stops really block them when users are installing tools on their devices. For example, the "anti-bot captcha" isn't really doing much when the user has an extension that gives the Frontier Lab the data behind that block anyway. Is this data sent to them? I really don't know but it seems the threat landscape has rapidly changed when it comes to data collection. I don't hate AI; it is wildly fun and does make me feel like a "10x engineer". I just hope it's a service that always remains available, and places don't start closing the doors once they have everything they need. As odd as it sounds, and I can't believe I'm saying this, but I hope GRC can aid us here. It would be nice if AIs obeyed when sites told them to go away, but my experience is the AI recognizes the site doesn't want them, but also acknowledges it could be prompt injection, so it trusts the user over the service. Obviously, the user could do some type of prompt injection so the AI doesn't see the refusal, and local models can always ignore it -- but atleast it would help places stop the unintentional leakages due to ignorance. I imagine it's easier to kick users off the platform that use prompt injection to bypass gaurdrails versus when nothing is stopping them. I really hope I'm just ignorant here, and someone can post why I'm wrong.


@levelsio @nfcodes I created a redis instance on hetzner with public port open for few minutes and someone was running a cryptominer the next moment taking 50% CPU 💀 After that I always use @Tailscale 👌



For the love of anything you believe in, can we please stop referring to anyone who has ever even briefly dabbled in offensive security as a “red teamer”? You’re part of the f*cking problem!!!

I have been doing bug bounty since 2011 and ran a program for a multinational bank. Put everything I've learned into bugbounty.info. Target selection, recon pipelines, chain patterns, report templates, the business side. Free, no paywall, no course upsell.









