Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Antillie
Mar 14, 2015

Swagger Dagger posted:

For the people asking about learning infosec, I think you could do a whole lot worse than reading through these: https://www.humblebundle.com/books/no-starch-hacking-books

There are some stinkers on there (lol bitcoin, zombies), but a lot of the books are really good and it's hard to beat 15 bucks for the set.

That looks really nice. I may pick that up.

I was quite impressed with Bulletproof SSL and TLS. Its more a set of best practices accompanied by well written explanations but it also has a number of very interesting stories of how PKI has been breached in the past. Sometimes via actual malicious acts and sometimes just through incompetence.

Its specific to just one protocol. But given how incredibly common TLS is on the internet I feel its worth picking up.

Antillie fucked around with this message at 16:13 on Apr 28, 2016

Adbot
ADBOT LOVES YOU

Rufus Ping
Dec 27, 2006





I'm a Friend of Rodney Nano
e: Wrong thread nvm

Rufus Ping fucked around with this message at 16:50 on Apr 28, 2016

pr0zac
Jan 18, 2004

~*lukecagefan69*~


Pillbug

ItBurns posted:

In the end it comes down to whether or not you trust facebook.

:psyduck: I just.. what? Did you read my post? I laid out explicitly the technical reasons it doesn't come down to trusting facebook. The entire point is the provability of the encryption. Like, you're arguing with math here. I'm seriously just confused.

ItBurns
Jul 24, 2007

pr0zac posted:

:psyduck: I just.. what? Did you read my post? I laid out explicitly the technical reasons it doesn't come down to trusting facebook. The entire point is the provability of the encryption. Like, you're arguing with math here. I'm seriously just confused.

Noted.

Edit:

You also ignored my post, especially why you should funnel your communications, encrypted or not, through fb's servers, when they have at the very least the ability to log them and tie them with other information.

Fake second edit: Also try to post your replies here and not in yospos so I don't have to hunt for them.

ItBurns fucked around with this message at 19:29 on Apr 28, 2016

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

ItBurns posted:

Noted.

Edit:

You also ignored my post, especially why you should funnel your communications, encrypted or not, through fb's servers, when they have at the very least the ability to log them and tie them with other information.

Fake second edit: Also try to post your replies here and not in yospos so I don't have to hunt for them.

Why bother using the Internet if your ISP can log your encrypted connections and tie them with other information?

Wiggly Wayne DDS
Sep 11, 2010



ItBurns posted:

Noted.

Edit:

You also ignored my post, especially why you should funnel your communications, encrypted or not, through fb's servers, when they have at the very least the ability to log them and tie them with other information.

Fake second edit: Also try to post your replies here and not in yospos so I don't have to hunt for them.
He'll post where he pleases, and be glad you're getting such precise answers to your inane opinions

ItBurns
Jul 24, 2007

Wiggly Wayne DDS posted:

lick lick slurp slurp

um ok

OSI bean dip posted:

Why bother using the Internet if your ISP can log your encrypted connections and tie them with other information?

Why bother posting if you're just a third-tier coattail rider?

(USER WAS PUT ON PROBATION FOR THIS POST)

(USER WAS PUT ON PROBATION FOR THIS POST)

pr0zac
Jan 18, 2004

~*lukecagefan69*~


Pillbug

ItBurns posted:

Noted.

Edit:

You also ignored my post, especially why you should funnel your communications, encrypted or not, through fb's servers, when they have at the very least the ability to log them and tie them with other information.

Fake second edit: Also try to post your replies here and not in yospos so I don't have to hunt for them.


Exactly what, in your mind, would logging encrypted messages allow for? Have you actually signed up for whatsapp before? Do you understand how iOS device tokens work? Do you need me to explain why the answers to those last two questions make avoiding metadata collection on whatsapp trivial for anyone whos concerned about that? Do you actually have any knowledge about anything technical being discussed? Do you need help dragging those goal posts?

ItBurns
Jul 24, 2007
<< lol drat

mod saas
May 4, 2004

Grimey Drawer

pr0zac posted:

Do you understand how iOS device tokens work? Do you need me to explain why the answers to those last two questions make avoiding metadata collection on whatsapp trivial for anyone whos concerned about that?

I'd unironically like to know more about both of these

FlyingCowOfDoom
Aug 1, 2003

let the beat drop
Thank you for the SIEM advice, Splunk is actually one I was looking at already and am looking into FIDO now. Appreciate the help.

long-ass nips Diane
Dec 13, 2010

Breathe.

Adix posted:

I'd unironically like to know more about both of these

:same:

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

How do I get in on the coat tails thing? Sounds p sweet.

Antillie
Mar 14, 2015

Boris Galerkin posted:

Is let's encrypt actually worth taking the x minutes to set up? I remember ready somewhere that all having a cert from them says is "this guy has a cert from us" but doesn't actually mean/do much else. Could be wrong though.

Considering how much your average internet user knows about certificates, PKI, and encryption, this about all that any cert from any CA does. Even the EV ones.

Antillie fucked around with this message at 22:13 on Apr 28, 2016

Dex
May 26, 2006

Quintuple x!!!

Would not escrow again.

VERY MISLEADING!

Subjunctive posted:

How do I get in on the coat tails thing? Sounds p sweet.

hold a non-insane opinion

ultramiraculous
Nov 12, 2003

"No..."
Grimey Drawer

Dex posted:

hold a non-insane opinion

"Computer security is hard and I'm willing to admit I don't understand everything about it/pr0zac might know more than me."

Am I in?

Antillie
Mar 14, 2015

ultramiraculous posted:

"Computer security is hard and I'm willing to admit I don't understand everything about it/pr0zac might know more than me."

Am I in?

Sure.

Kassad
Nov 12, 2005

It's about time.

Adix posted:

I'd unironically like to know more about both of these

Me too.

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Tavis Ormandy turned his terrible gaze towards Symantec and hit paydirt. Expect big rounds of emergency patching in the next 3 months if you're running their products. Or maybe they don't do anything and you get some 0day CVEs when he goes public.

https://twitter.com/taviso/status/725816306209951744

apseudonym
Feb 25, 2011

BangersInMyKnickers posted:

Tavis Ormandy turned his terrible gaze towards Symantec and hit paydirt. Expect big rounds of emergency patching in the next 3 months if you're running their products. Or maybe they don't do anything and you get some 0day CVEs when he goes public.

https://twitter.com/taviso/status/725816306209951744

But AV is a good idea because reasons!

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

"remote ring0 vulns" is my John McAfee cover band.

doctorfrog
Mar 14, 2007

Great.

Is that the sort of thing where you're vulnerable because you're running a Symantec product? You'd be safer with nothing?

long-ass nips Diane
Dec 13, 2010

Breathe.

doctorfrog posted:

Is that the sort of thing where you're vulnerable because you're running a Symantec product? You'd be safer with nothing?

He found the vulnerabilities in the Symantec products, so it's running those products that exposes you to whatever he found.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

doctorfrog posted:

Is that the sort of thing where you're vulnerable because you're running a Symantec product? You'd be safer with nothing?

Yes. Vastly so.

apseudonym
Feb 25, 2011

doctorfrog posted:

Is that the sort of thing where you're vulnerable because you're running a Symantec product? You'd be safer with nothing?

Symantec.txt

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

apseudonym posted:

Symantec.txt

AV.gif (it loops)

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

doctorfrog posted:

Is that the sort of thing where you're vulnerable because you're running a Symantec product? You'd be safer with nothing?

You can replace "Symantec" with other vendor names too.

Mustache Ride
Sep 11, 2001



Like Microsoft.

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Lots of AV vendors like to run their analysis/sandbox engine under a system context for whatever reason (stupidity, wrote the thing back in XP days, sloth) which is just begging for problems when a vulnerability is inevitably discovered. It's crap.

Twerk from Home
Jan 17, 2009

This avatar brought to you by the 'save our dead gay forums' foundation.

doctorfrog posted:

Is that the sort of thing where you're vulnerable because you're running a Symantec product? You'd be safer with nothing?

You really shouldn't be running any sort of Antivirus product in 2016.

co199
Oct 28, 2009

I AM A LOUSY FUCKING COMPUTER JANITOR WHO DOES NOT KNOW ANYTHING ABOUT CYBER COMPUTER HACKER SHIT.

PLEASE DO NOT LISTEN TO MY FUCKING AWFUL OPINIONS AS I HAVE NO FUCKING IDEA WHAT I AM TALKING ABOUT.

Twerk from Home posted:

You really shouldn't be running any sort of Antivirus product in 2016.

I would qualify this by saying "you shouldn't be running antivirus as a primary line of defense in 2016". There are some use cases for it, but it's better supplemented with additional tools (on endpoints at least).

I can point to a real world example with a customer I just finished working with that had no security software on approximately 1000 endpoints in a healthcare environment, even though they had a standing contract with a major AV vendor. They didn't replace AV with anything, they just didn't have anything on their systems. When they got hit by a 7-year-old worm and came screaming to us, we pointed out that the exact hashes they had would have been picked up by their AV solution and they really had no excuse as to why it hadn't been deployed.

Traditional AV is on life support, but as a last line of defense (e.g. if AV detects something you're already hosed but maybe it might save you a little bit) it's worth having.

EDIT: I should note that there were a lot of internal politics that led to that decision (due to acquisitions and such) but people are literally taking the saying "AV is dead" at face value and running with nothing, in the real world, in 2016. The security industry needs to be careful about what they soapbox.

co199 fucked around with this message at 22:55 on Apr 29, 2016

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

co199 posted:

Traditional AV is on life support, but as a last line of defense (e.g. if AV detects something you're already hosed but maybe it might save you a little bit) it's worth having.

No.

quote:

people are literally taking the saying "AV is dead" at face value and running with nothing, in the real world, in 2016

Hi.

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Bleep blorp I am computer super user my brainpan is plugged directly in 2 "da net" every piece of software I run is hashed and you better believe I check it three times for extra safety I understand every single thing my software is doing at all time and my brain runs native assembly get that amateur "anti-VIRUS" crap outta here! ! !

Wiggly Wayne DDS
Sep 11, 2010



co199 posted:

I would qualify this by saying "you shouldn't be running antivirus as a primary line of defense in 2016". There are some use cases for it, but it's better supplemented with additional tools (on endpoints at least).
The current use cases for AV are checking a box on audits and providing an entrypoint for everyone else.

co199 posted:

I can point to a real world example with a customer I just finished working with that had no security software on approximately 1000 endpoints in a healthcare environment, even though they had a standing contract with a major AV vendor. They didn't replace AV with anything, they just didn't have anything on their systems. When they got hit by a 7-year-old worm and came screaming to us, we pointed out that the exact hashes they had would have been picked up by their AV solution and they really had no excuse as to why it hadn't been deployed.
7 year old worm? So they weren't keeping systems up to date, don't expect any security software on those machines to have up to date definitions if they were deployed. What services were you offering the client in this case, and how was remediation handled?

co199 posted:

Traditional AV is on life support, but as a last line of defense (e.g. if AV detects something you're already hosed but maybe it might save you a little bit) it's worth having.
It's not worth having and we've been beating the drum on this for over a decade, the highlighted vulnerabilities lately are showing that the situation (as usual) is much worse than anyone considered. The joke is the security software wasn't getting seriously audited as no professional wants it near their machine.

co199 posted:

EDIT: I should note that there were a lot of internal politics that led to that decision (due to acquisitions and such) but people are literally taking the saying "AV is dead" at face value and running with nothing, in the real world, in 2016. The security industry needs to be careful about what they soapbox.
The soapbox you should be more concerned about is a one-stop protection suite for families and small companies around the world that convinces them to hand over money for reduced security. It's been said before but it's going to take at least a worm before anyone stops and takes note of the underlying issue.

Pryor on Fire
May 14, 2013

they don't know all alien abduction experiences can be explained by people thinking saving private ryan was a documentary

Any professional security researchers or academics in here? My iPhone 6 keeps unlocking itself randomly despite me not touching it, trying to figure out exactly what the cause is but not sure how to go about doing that. I'm guessing some hardware component is faulty and sending a touch id passed event when it shouldn't or something, regardless I'd like to pin down the exact cause and possibly report it to Apple, but have no idea where to start on something like this. Any suggestions?

Latest iOS, no past jailbreaking or anything. Haven't downloaded any apps in ages so I'd say it's unlikely that it's some strange virus, but can't really rule that out yet.

apseudonym
Feb 25, 2011


But who are we to not trust AV.

co199
Oct 28, 2009

I AM A LOUSY FUCKING COMPUTER JANITOR WHO DOES NOT KNOW ANYTHING ABOUT CYBER COMPUTER HACKER SHIT.

PLEASE DO NOT LISTEN TO MY FUCKING AWFUL OPINIONS AS I HAVE NO FUCKING IDEA WHAT I AM TALKING ABOUT.

Wiggly Wayne DDS posted:

The current use cases for AV are checking a box on audits and providing an entrypoint for everyone else.

7 year old worm? So they weren't keeping systems up to date, don't expect any security software on those machines to have up to date definitions if they were deployed. What services were you offering the client in this case, and how was remediation handled?

It's not worth having and we've been beating the drum on this for over a decade, the highlighted vulnerabilities lately are showing that the situation (as usual) is much worse than anyone considered. The joke is the security software wasn't getting seriously audited as no professional wants it near their machine.

The soapbox you should be more concerned about is a one-stop protection suite for families and small companies around the world that convinces them to hand over money for reduced security. It's been said before but it's going to take at least a worm before anyone stops and takes note of the underlying issue.

The circumstances around this engagement were more complicated than just "oh they weren't running AV lol it would have fixed them". I think we're all aware of the travesty that is the healthcare IT environment, especially concerning legacy applications and operating systems. You're absolutely correct that they weren't keeping systems securely up-to-date and again, it's more than just a case of AV solving the problem - I was simply using it as an example where actually having an AV product deployed would have helped with one aspect of the issue. There are other, better answers (including tools like Carbon Black) for getting visibility into endpoints, and I'm certainly not hopping on the AV dick to say everyone "needs" AV. I agree completely that there are better tools out there - again, not saying AV is a necessity - in this case it would have been better than the nothing they had, even if not the optimal (multiple layer) solution. You obviously have to balance hardware, software and personnel solutions along with actual effective policies internally.

We were deployed in an IR capability, predominantly to identify just what the gently caress was happening as the customer had no visibility and no idea what the gently caress was going on. Our initial reaction was "burn the whole thing to the ground and start again", but unfortunately that wasn't realistic so we actually engaged other teams that had standing relationships with the customer (and SMEs on the tools in their environment) to help with remediation.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

co199 posted:

I was simply using it as an example where actually having an AV product deployed would have helped with one aspect of the issue

It's also possible that wearing a seatbelt can kill you by trapping you in a car, but the seatbelt soapbox is still exactly the right one to stand on. You can have a fatal reaction to a vaccine, but you should still get them. The most likely outcome of having AV installed is worse than the most likely outcome of skipping it.

co199
Oct 28, 2009

I AM A LOUSY FUCKING COMPUTER JANITOR WHO DOES NOT KNOW ANYTHING ABOUT CYBER COMPUTER HACKER SHIT.

PLEASE DO NOT LISTEN TO MY FUCKING AWFUL OPINIONS AS I HAVE NO FUCKING IDEA WHAT I AM TALKING ABOUT.

Subjunctive posted:

It's also possible that wearing a seatbelt can kill you by trapping you in a car, but the seatbelt soapbox is still exactly the right one to stand on. You can have a fatal reaction to a vaccine, but you should still get them. The most likely outcome of having AV installed is worse than the most likely outcome of skipping it.

I'm not trying to be an rear end in a top hat here, but can you give me a real-world example of securing an environment of say, 10,000 endpoints (we'll softball it with a mix of XP, 7 and 10, Server2k3,2k8r2 and 2k12) without using AV and without getting laughed out of a boardroom for presenting a cost of $texas?

Adbot
ADBOT LOVES YOU

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

co199 posted:

I'm not trying to be an rear end in a top hat here, but can you give me a real-world example of securing an environment of say, 10,000 endpoints (we'll softball it with a mix of XP, 7 and 10, Server2k3,2k8r2 and 2k12) without using AV and without getting laughed out of a boardroom for presenting a cost of $texas?

My company has > 10K end-user machines and we don't run AV.

But I'm curious: what would you do that would replace AV but be really expensive?

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply