Luke Turvey

4.7K posts

Luke Turvey banner
Luke Turvey

Luke Turvey

@TurvSec

Professional Hacker. Founder of PenTest reporting tool https://t.co/wU45D4wCUG Collects infosec tools like Pokémon cards at: https://t.co/HUC8oTdRCo

Buckinghamshire เข้าร่วม Mayıs 2009
379 กำลังติดตาม7.7K ผู้ติดตาม
ทวีตที่ปักหมุด
Luke Turvey
Luke Turvey@TurvSec·
VULNSY - A Pentest Reporting Platform for Security Teams Built by pentesters, for pentesters.
English
1
2
15
47.4K
Luke Turvey
Luke Turvey@TurvSec·
Google have done some work to remediate the issue of publicly disclosed Google API keys being used with Gemini. They have disabled them where known. But that doesn't stop the unknown keys being enabled or an organization re-enabling it or just making a new key in Google AI studio and sharing it publicly. So, here's a tester for that, since I needed one for my own assessment this week.
Luke Turvey tweet media
English
1
0
1
146
Luke Turvey
Luke Turvey@TurvSec·
@shenetworks Damn right, because these AI pentesters that replace us don't need an office.
English
0
0
2
194
shenetworks
shenetworks@shenetworks·
There’s no reason for pentesters to be required to be in an office for 99.9% of cases.
English
30
13
305
13.5K
Luke Turvey
Luke Turvey@TurvSec·
Another day, another AI pentester that goes deeper, is cheaper and is better than humans.
GIF
TryHackMe@tryhackme

Introducing @trynoscope by TryHackMe! AI Pentesting with deep web app coverage, automatic remediation, unlimited retests, and results in hours not days. NoScope has found major vulnerabilities in a huge range of companies (including a critical on a crypto trading platform - manipulating live trading data). Over the last 3 months NoScope was tested on many beta clients (more info on the site)! You can also use NoScope alongside a pentesting team. It goes deep so they can focus on prioritisation, remediation, and the findings that matter most. Human-led pentests are expensive and cover a fraction of applications. NoScope goes deeper for significantly less. Pentesters aren't going away, but the way pentests have been done for the last decade has changed. Getting an AI pentest has never been more important with attackers using AI-powered cyber capabilities. 👉 Oh! and! Your AI pentest is FREE if NoScope finds nothing - no findings, no payment! Check NoScope out! noscope.com

English
0
0
4
303
Luke Turvey
Luke Turvey@TurvSec·
@DotNetRussell There's an inverse correlation between the amount of time I WANT to play Runescape and the amount of time I get to play Runescape
English
0
0
1
21
☣️ Mr. The Plague ☣️
There's an inverse correlation between the amount of time I WANT to play World of Warcraft and the amount of time I get to play World of Warcraft
English
2
0
6
238
Luke Turvey
Luke Turvey@TurvSec·
Think it depends on where you are at in your career and life. I spent 2015 to 2020 absolutely grinding my ass off to get experience and certifications. Then I fought for a promotion for a year before heading to another company to get it instead. Now, I have young kids and id rather just chill in my position for the foreseeable. I dont want to get promoted and make my life harder 😅
English
0
0
5
142
INFOSEC F0X 🔥
INFOSEC F0X 🔥@infosec_fox·
How long would you stay within an organisation without getting a promotion? 👀
English
13
1
13
1K
Luke Turvey
Luke Turvey@TurvSec·
Disagree with this. There's always been multiple software vendors to choose from that do the same thing. Its much quicker to copy ideas now yes, so the amount of vendors to choose from is bigger. But the issue of marketing/distribution is still the deciding factor. Why do I care that Bob has made an alternative to Slack this weekend, when slack has been a long running company and Bob might decide to pack it all up tomorrow. But more importantly, how do I even know about Bob in the first place. Slacks marketing budget will be far greater and thats what wins imo.
English
0
0
2
369
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
Quick tip: any startup idea built purely on vibe-coded software, no matter how smart or useful it is, won’t be seen as defensible. Anyone with the same subscription plan can copy it and build the same thing. That is the new rule: if it is just software, and it can be built quickly, it can also be copied quickly. If your product does not touch the real world in some meaningful way, or do something LLMs still can’t do, then you’re exposed.The industry knows this. People just tend to discuss it quietly, behind closed doors. A good software idea is not enough anymore. A lead of months or even years is not enough anymore. The real search now is for something that is hard to copy.
English
17
7
110
10.5K
Luke Turvey
Luke Turvey@TurvSec·
@mrgretzky Claude was down intermittently last night, like it has been in the past. That was a good reminder for how reliant you shouldn't be 😅
English
1
0
1
282
Kuba Gretzky
Kuba Gretzky@mrgretzky·
"But I can't imagine AI always being this cheap. So, a fear is that I will become dependent on a service that I will be priced out of in the future." 100% this ☝️😥
ippsec@ippsec

Probably one of my favorite @NetworkChuck Videos - youtube.com/watch?v=dbMXi9…, loved the take on his hatred for ai, but also loves it. Definitely in the same boat, it scares me how capable it has become in such a short time. The other thing that really scares me is the frontier labs will likely always be a black box. The specific thing that scares me is how they use the data they collect. AFAIK - The Terms of Service when paying for the API and Subscription are wildly different, and I don't see much talk about that. I believe the API gives the user a lot more ownership over the data, where-as subscription, it is retained longer, and there are far fewer legal protections. I hear numbers like my $200 subscription can cost them anywhere from $2000 to $10,000/m. That's a lot of money to lose, and I know the money loss is offset by many things like the majority of users not making full use of their subscription -- But I can't imagine AI always being this cheap. So, a fear is that I will become dependent on a service that I will be priced out of in the future. Additionally, many platforms (ex: reddit/twitter) put things in place to stop AIs from freely harvesting data, but I don't think those types of stops really block them when users are installing tools on their devices. For example, the "anti-bot captcha" isn't really doing much when the user has an extension that gives the Frontier Lab the data behind that block anyway. Is this data sent to them? I really don't know but it seems the threat landscape has rapidly changed when it comes to data collection. I don't hate AI; it is wildly fun and does make me feel like a "10x engineer". I just hope it's a service that always remains available, and places don't start closing the doors once they have everything they need. As odd as it sounds, and I can't believe I'm saying this, but I hope GRC can aid us here. It would be nice if AIs obeyed when sites told them to go away, but my experience is the AI recognizes the site doesn't want them, but also acknowledges it could be prompt injection, so it trusts the user over the service. Obviously, the user could do some type of prompt injection so the AI doesn't see the refusal, and local models can always ignore it -- but atleast it would help places stop the unintentional leakages due to ignorance. I imagine it's easier to kick users off the platform that use prompt injection to bypass gaurdrails versus when nothing is stopping them. I really hope I'm just ignorant here, and someone can post why I'm wrong.

English
6
2
51
7.9K
Luke Turvey
Luke Turvey@TurvSec·
This is why I don't think AI will replace senior level employees, just juniors. Some people with less knowledge would (probably?) have been like Yes Claude my dude, thanks for this finding! and uploaded it to the bug bounty program. Yet I saw it and knew it was probably talking nonsense.
Luke Turvey tweet media
English
0
0
4
326
Luke Turvey
Luke Turvey@TurvSec·
@levelsio "That way nobody can get in" is not true They most definitley can get in, if your vibe up some insecure web functionality and introduce an SQLi, RCE, etc. Firewalling is great and I agree with you. But there's so much more to think about before saying nobody can get in.
English
0
0
1
475
@levelsio
@levelsio@levelsio·
When I set up a new Hetzner VPS first thing I do install Tailscale and once I'm in via Tailscale lock down the firewall to only accept web traffic on HTTPS 443 for Cloudflare IPs and SSH 22 for Tailscale IP That way nobody can get in I know I keep repeating this but it should be basics of setting up a new VPS So basic IMHO it should be part of any VPS service to default install Tailscale and enable it so it's the only way to get in Why? A VPS server is just like your laptop or destop computer but now imagine if it's connected to the entire internet with 8 billion people that can access it and try hack it You want to only have it accessible to you And if you want to host a website on your VPS (like I do), you should only let Cloudflare access your VPS so it can stand in front and block any hack attempts Never expose a VPS to the world wide web which realistically is the world WILD web
Areeb ur Rub@areeburrub

@levelsio @nfcodes I created a redis instance on hetzner with public port open for few minutes and someone was running a cryptominer the next moment taking 50% CPU 💀 After that I always use @Tailscale 👌

English
201
203
4.1K
535.4K
Luke Turvey
Luke Turvey@TurvSec·
@0xTib3rius Just tell Claude he's a Red Teamer, give him a target and he'll tell you that the best approach is password spraying their EntraID to gain access. "Do you want me to make a script for this?" Job done. Ez we're all out of work
English
0
0
0
105
Tib3rius
Tib3rius@0xTib3rius·
@0xacb There's a reason no serious pentesters use this.
English
9
1
141
13.1K
Het Mehta
Het Mehta@hetmehtaa·
Tell me you’ve worked in Infosec without telling me you’ve worked in Infosec. I’ll go first… Before you click that link, where did it actually come from?
English
9
1
24
3K
Luke Turvey
Luke Turvey@TurvSec·
I like the idea. To save having people pay straight away though, platforms could give users a free submission per day or maybe multiple free submissions if you have build reputation from other valid reports. That would somewhat permit the people who maybe cant afford or are unsure about their submission.
English
0
0
1
96
Nick VanGilder
Nick VanGilder@nickvangilder·
So many companies have made the entire process of reporting vulnerabilities so frustratingly difficult that most legit researchers will eventually just stop reporting vulns via bug bounty or VDP altogether. It’s just not worth the hassle. On the flip side, I have the benefit (is that the right word?) of seeing all the AI slop and beg bounty submissions too. They’re absolutely brutal and also frustratingly bad. At the end of the day, both sides should share the blame, but neither side really seems to want much to do with the other tbh. If I were reinventing the entire thing, this is what I would do. I think I’d charge a small refundable deposit to submit a vulnerability report. If the report is valid, you get your deposit returned + bounty. If it’s AI slop or nonsensical garbage, your deposit is forfeited. The more slop you submit, the more you have to pay to submit a report in the future. In this model, I don’t think(?) serious researchers would care. They’re probably confident enough in their findings already and would get the money back anyway. The AI spam farms and sloperators blasting out hundreds of garbage reports a day? Gone with the cyber wind. Maybe it’s a bad idea, but something really needs to change for bug bounty to survive.
English
4
2
20
1.6K