Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
MF_James
May 8, 2008
I CANNOT HANDLE BEING CALLED OUT ON MY DUMBASS OPINIONS ABOUT ANTI-VIRUS AND SECURITY. I REALLY LIKE TO THINK THAT I KNOW THINGS HERE

INSTEAD I AM GOING TO WHINE ABOUT IT IN OTHER THREADS SO MY OPINION CAN FEEL VALIDATED IN AN ECHO CHAMBER I LIKE

22 Eargesplitten posted:

Can't the government track through TOR pretty easily if they decide it's an act of :derp:E-TERRORISM:derp:?

I think TOR changed their connection methods/algorithms which I believe was the issue? Eventually the gov't figured it out, whatever the vulnerability was, and could track people given a little bit of time of that person being connected. I could be talking out of my rear end though and perhaps TOR did nothing to resolve the problem and everyone jumped to some new platform.

Adbot
ADBOT LOVES YOU

Powered Descent
Jul 13, 2008

We haven't had that spirit here since 1969.

22 Eargesplitten posted:

Can't the government track through TOR pretty easily if they decide it's an act of :derp:E-TERRORISM:derp:?

I don't know about easily, though of course only the spooks know for sure.

A method they've used in the past is that if you go to a site they control (be it a regular website or illegalsitethefedstotallydidnttakecontrolof.onion), and if you're using an older version of torbrowser, they can use an exploit in that browser to make it connect to somewhere in the clear (instead of via tor), thus revealing your actual IP. So of course it seems to me that the way to protect yourself from that (apart from being sure you have the latest version of everything) would be to have a physically separate tor router. Then the computer running your actual browser could be owned to hell and back and it wouldn't matter, the ONLY connection it has to the outside world is through tor and it has no way of even determining its own actual public IP. (Building a raspberry pi into an anonymizing middlebox is an easy and educational little project. Try it yourself.)

:arghfist::nsamad:

22 Eargesplitten
Oct 10, 2010



Huh, interesting. Of course, going to a busy starbucks is probably easier. When I was a teenager all that tor and darknet stuff seemed cool, but I never knew enough to get involved with it and I never had the drive to learn because at that point my computer knowledge was limited to putting together my PC.

TBH in that dude's situation and knowing how likely it would be to lead to the government deciding he was doing unauthorized pen tests, I'd be pretty tempted just to let it go and make it someone else's problem.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

22 Eargesplitten posted:

TBH in that dude's situation and knowing how likely it would be to lead to the government deciding he was doing unauthorized pen tests, I'd be pretty tempted just to let it go and make it someone else's problem.

Same, and I could fight that suit better than most.

Trabisnikof
Dec 24, 2005

Powered Descent posted:

I don't know about easily, though of course only the spooks know for sure.

A method they've used in the past is that if you go to a site they control (be it a regular website or illegalsitethefedstotallydidnttakecontrolof.onion), and if you're using an older version of torbrowser, they can use an exploit in that browser to make it connect to somewhere in the clear (instead of via tor), thus revealing your actual IP. So of course it seems to me that the way to protect yourself from that (apart from being sure you have the latest version of everything) would be to have a physically separate tor router. Then the computer running your actual browser could be owned to hell and back and it wouldn't matter, the ONLY connection it has to the outside world is through tor and it has no way of even determining its own actual public IP. (Building a raspberry pi into an anonymizing middlebox is an easy and educational little project. Try it yourself.)

:arghfist::nsamad:

then there's this

http://packetstorm.foofus.com/papers/attack/jackin-tor.txt

quote:

[*] TOR exit node(s), with a reduced policy.
[*] Wrote a basic http proxy to inject javascript links, iframes, etc.
[*] Used iptables to pipe all the TOR web traffic to my evil proxy.

This turns out to work incredibly well. I averaged getting a new box hooked
about every thirty minutes. Surprisingly, Metasploit browser modules
also worked. I assumed TOR users would have been more security conscious...
Using Metasploit I was getting a reverse shell back to me every couple of hours
or so at _minimum_. For those of you that have a problem with this, there is a
great Youtube video that should clear everything up [5].

Rufus Ping
Dec 27, 2006





I'm a Friend of Rodney Nano
There have been various attacks on Tor users:

- The CMU SEI / cancelled Black Hat talk took advantage of RELAY_EARLY cells to perform a traffic confirmation attack. This has been fixed

- The watering-hole attack on Freedom Hosting exploited an already-patched vuln in Firefox 17 ESR. Users with an outdated Tor Browser Bundle were served a payload which attempted to phone home outside of Tor

- The Operation Torpedo watering-hole attack took advantage of users whose browser settings automatically ran Flash embeds. This is not the default setting in the TBB. The payload was the old Metasploit decloaker

- Tor is not designed to be safe against adversaries with a full view of the network. NSA/GCHQ have a sufficiently full view of the network to be able to perform statistical traffic analysis attacks


In addition, use of Tor to access the normal internet (i.e. not hidden services) leaves you open to types of attack known to be used on the normal internet, like packet injection.


In light of these points, you can help make your use of Tor safer in a few ways. Which are important depends on when and how you're using Tor.

- Reduce your susceptibility to vulns by using the hardened build of TBB which is compiled with ASan. Take advantage of exploit mitigation techniques (e.g. grsec) and MAC (e.g. grsec rbac, apparmor)

- Firewall yourself off so that non-Tor traffic cannot leak out and ensure these rules cannot easily be disabled. Tails and Qubes can do this automatically

- Connect from someone else's network that cannot be linked to you easily

Mr Chips
Jun 27, 2007
Whose arse do I have to blow smoke up to get rid of this baby?
Noice.
Generally speaking, is it a reasonable assumption that other AV software is likely to have similar design and implementation flaws? Do other vendors do dumb poo poo like run things at ring0 that shouldn't be running there?

Rufus Ping
Dec 27, 2006





I'm a Friend of Rodney Nano

Mr Chips posted:

Generally speaking, is it a reasonable assumption that other AV software is likely to have similar design and implementation flaws?
yes, I don't think taviso has ever mentioned he's looking at a particular AV and then failed to find some horrific problem with it

Mr Chips posted:

Do other vendors do dumb poo poo like run things at ring0 that shouldn't be running there?
yes, absolutely


His suggestion regarding AV:
https://twitter.com/taviso/status/647409908967604224
https://twitter.com/taviso/status/676799692936581120

mAlfunkti0n
May 19, 2004
Fallen Rib
Looks like LinkedIn database was leaked .. yay security!

http://motherboard.vice.com/read/another-day-another-hack-117-million-linkedin-emails-and-password

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Good, maybe someone will go clear out all my unread notifications.

mAlfunkti0n
May 19, 2004
Fallen Rib

Subjunctive posted:

Good, maybe someone will go clear out all my unread notifications.

Congratulate Joe Blow on his unemployment!

Wiggly Wayne DDS
Sep 11, 2010



They're claiming it's an additional cache from the 2012 breach

mAlfunkti0n
May 19, 2004
Fallen Rib

Wiggly Wayne DDS posted:

They're claiming it's an additional cache from the 2012 breach

Good point, somehow I missed that this morning. Guess that was before coffee.

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo
Guy found a bank mobile app had a method that didn't check if the user actually had access to an account. This is the kind of stuff you would find in a Very Vulnerable Web App by OWASP where you think, "Who would actually program the application like this?".

https://boris.in/blog/2016/the-bank-job/

The guy did a few very bad things that if he did in the states, he would be in federal prison. Things like using accounts not owned by him for tests (he did mention he used family accounts but that is not him) or threatening for some kind of bug bounty.




Powered Descent posted:

I don't know about easily, though of course only the spooks know for sure.

A method they've used in the past is that if you go to a site they control (be it a regular website or illegalsitethefedstotallydidnttakecontrolof.onion), and if you're using an older version of torbrowser, they can use an exploit in that browser to make it connect to somewhere in the clear (instead of via tor), thus revealing your actual IP. So of course it seems to me that the way to protect yourself from that (apart from being sure you have the latest version of everything) would be to have a physically separate tor router. Then the computer running your actual browser could be owned to hell and back and it wouldn't matter, the ONLY connection it has to the outside world is through tor and it has no way of even determining its own actual public IP. (Building a raspberry pi into an anonymizing middlebox is an easy and educational little project. Try it yourself.)

:arghfist::nsamad:

Heard stories that investigations with a mission to track down and nail users trying to look up insidious sites like kiddie porn hosts that there were a good portion of users who would burn all creds as soon as they think anything is going funny. Things like the pages changing a bit, weird private messages they received, or even if they are being routed weirdly. Hard to pin down.

But this does not stop from random Joe Smoe treating Tor like the internet and sees no cause for alarm in putting their real full names, addresses, or phones into a page if the site requests it. That is the type of user that keeps getting nailed because it's the lowest branch but with the difference a lot of people hang around that level.

EVIL Gibson fucked around with this message at 21:56 on May 18, 2016

Cugel the Clever
Apr 5, 2009
I LOVE AMERICA AND CAPITALISM DESPITE BEING POOR AS FUCK. I WILL NEVER RETIRE BUT HERE'S ANOTHER 200$ FOR UKRAINE, SLAVA
What is the thread's input on consumer-level firewall software solutions? Is firewall software on the whole more credible than anti-virus software? I've seen GlassWire recommended, but could use a second opinion.

Unrelated: how about Zemana Anti-Logger?

Edit: While I'm at it, I might as well inquire why the gently caress a Cisco Meraki MX64W would email my password to me in plain text upon creating a user on it?

Cugel the Clever fucked around with this message at 23:00 on May 18, 2016

Sheep
Jul 24, 2003

Cugel the Clever posted:

Edit: While I'm at it, I might as well inquire why the gently caress a Cisco Meraki MX64W would email my password to me in plain text upon creating a user on it?

A one-time use password, a one-time use token, a one-time use link - it's all the same thing. How else are they going to get the initial login credentials to users?

Pile Of Garbage
May 28, 2007



Cugel the Clever posted:

What is the thread's input on consumer-level firewall software solutions? Is firewall software on the whole more credible than anti-virus software? I've seen GlassWire recommended, but could use a second opinion.

Unrelated: how about Zemana Anti-Logger?

Edit: While I'm at it, I might as well inquire why the gently caress a Cisco Meraki MX64W would email my password to me in plain text upon creating a user on it?

Your OS already has a perfectly functional firewall (Unless you've turned it off and in that case turn it back on you dummy).

That Zemana Anti-Logger software looks like snake-oil and is probably as equally ineffective as any other "internet security" software (And based off a quick Google search, just as vulnerable).

Cugel the Clever
Apr 5, 2009
I LOVE AMERICA AND CAPITALISM DESPITE BEING POOR AS FUCK. I WILL NEVER RETIRE BUT HERE'S ANOTHER 200$ FOR UKRAINE, SLAVA

Sheep posted:

A one-time use password, a one-time use token, a one-time use link - it's all the same thing. How else are they going to get the initial login credentials to users?
No--I entered my password on account creation and then it emailed it back to the address I provided. Isn't that particularly awful security policy?


cheese-cube posted:

Your OS already has a perfectly functional firewall (Unless you've turned it off and in that case turn it back on you dummy).

That Zemana Anti-Logger software looks like snake-oil and is probably as equally ineffective as any other "internet security" software (And based off a quick Google search, just as vulnerable).
Sounds good. Definitely haven't turned off my OS firewall--just curious about additional services that might augment things. Of course, each additional service is potentially an additional attack vector...

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Cugel the Clever posted:

No--I entered my password on account creation and then it emailed it back to the address I provided. Isn't that particularly awful security policy?

Yes.

Mustache Ride
Sep 11, 2001



Hey this is good news: http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/

spankmeister
Jun 15, 2008







It is. There are not going to be many victims however who haven't either a) restored from backup b) paid ransom or c) accepted the loss of their files, AND kept their encrypted files around.

Pile Of Garbage
May 28, 2007



Cugel the Clever posted:

Sounds good. Definitely haven't turned off my OS firewall--just curious about additional services that might augment things. Of course, each additional service is potentially an additional attack vector...

The effectiveness of additional services entirely depends on where you're using the product. On your home network where your PC is behind NAT and you trust the internal network it's essentially useless.

redreader
Nov 2, 2009

I am the coolest person ever with my pirate chalice. Seriously.

Dinosaur Gum
Hi. I am looking to start using a vpn or a seedbox, for the reason I'd use a seedbox (that is, hosting my own personal files of course). Could someone tell me a recommended vpn/seedbox company? I feel like googling for it will give me a bad answer...

Unormal
Nov 16, 2004

Mod sass? This evening?! But the cakes aren't ready! THE CAKES!
Fun Shoe

redreader posted:

Hi. I am looking to start using a vpn or a seedbox, for the reason I'd use a seedbox (that is, hosting my own personal files of course). Could someone tell me a recommended vpn/seedbox company? I feel like googling for it will give me a bad answer...

I don't (well, now, didn't) even know what a seedbox is, but I thought this was an interesting concern so I googled "best seedbox" and google said:

WhatBox: 1TB space, 10 Gbit/s network, 10 British Pounds per month
Feral Hosting: 60 GB space, 150 Mbps connection, $10 US per month

Curious how bad of an answer that actually is.

Dubstep Jesus
Jun 27, 2012

by exmarx

redreader posted:

Hi. I am looking to start using a vpn or a seedbox, for the reason I'd use a seedbox (that is, hosting my own personal files of course). Could someone tell me a recommended vpn/seedbox company? I feel like googling for it will give me a bad answer...

Whatbox.ca has been good to me.

Boris Galerkin
Dec 17, 2011

I don't understand why I can't harass people online. Seriously, somebody please explain why I shouldn't be allowed to stalk others on social media!

redreader posted:

Hi. I am looking to start using a vpn or a seedbox, for the reason I'd use a seedbox (that is, hosting my own personal files of course). Could someone tell me a recommended vpn/seedbox company? I feel like googling for it will give me a bad answer...

You're probably better off asking in the usenet thread. I know usenet is not torrents but some of us dabble in both over there.

Unormal posted:

I don't (well, now, didn't) even know what a seedbox is, but I thought this was an interesting concern so I googled "best seedbox" and google said:

WhatBox: 1TB space, 10 Gbit/s network, 10 British Pounds per month
Feral Hosting: 60 GB space, 150 Mbps connection, $10 US per month

Curious how bad of an answer that actually is.


Seedboxes are private servers that you use to download and seed your linux iso files, of course. OP for what it's worth I've heard a lot about those two that he linked as well.

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

Cugel the Clever posted:

No--I entered my password on account creation and then it emailed it back to the address I provided. Isn't that particularly awful security policy?



To be specific, it means they are storing your password in the clear ready to become the next rock you.txt. doesn't sound like they are expecting you to change it like a normal one time use pass.

Mustache Ride
Sep 11, 2001



Goddamn, I'm sitting in a FireEye MVX presentation, and all I can here is "signature signature signature signature".

When will these assholes learn that signatures aren't the answer?

RISCy Business
Jun 17, 2015

bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork
Fun Shoe

found your problem

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

online friend posted:

found your problem

FireEye sure didn't

RISCy Business
Jun 17, 2015

bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork
Fun Shoe

Subjunctive posted:

FireEye sure didn't

:mmmhmm:

PeppysDilz
Oct 9, 2011

cheese-cube posted:

The effectiveness of additional services entirely depends on where you're using the product. On your home network where your PC is behind NAT and you trust the internal network it's essentially useless.

I disagree. An OS firewall that blocks/alerts you when a new process attempts an outbound connection (like LittleSnitch on OSX) is very valuable. I know GlassWire works for this use case, but who knows if you should trust it, give Tavis 20 minutes with it and we might find you introduced new attack surface. So basically just stop using Windows :-P.

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

PeppysDilz posted:

I disagree. An OS firewall that blocks/alerts you when a new process attempts an outbound connection (like LittleSnitch on OSX) is very valuable. I know GlassWire works for this use case, but who knows if you should trust it, give Tavis 20 minutes with it and we might find you introduced new attack surface. So basically just stop using Windows :-P.

The only time I tell people to stop using Windows is when they tell me they're too paranoid to use Bitlocker because "it's closed source".

mAlfunkti0n
May 19, 2004
Fallen Rib

OSI bean dip posted:

The only time I tell people to stop using Windows is when they tell me they're too paranoid to use Bitlocker because "it's closed source".

Of course they would step through the code if it was open .. if only they understood it. So they'll let someone else do it and hope they are trustworthy.

Daman
Oct 28, 2011
giving Tavis 20 minutes with a dot net GUI to Windows firewall will produce nothing bc that is all glasswire is.

Also it's a joke that anyone pays attention to alerts from that or littlesnitch, malware will be injecting itself into processes that normally do network poo poo anyways.

Daman fucked around with this message at 18:58 on Jun 6, 2016

Dessert Rose
May 17, 2004

awoken in control of a lucid deep dream...

Daman posted:

giving Tavis 20 minutes with a dot net GUI to Windows firewall will produce nothing bc that is all glasswire is.

Also it's a joke that anyone pays attention to alerts from that or littlesnitch, malware will be injecting itself into processes that normally do network poo poo anyways.

The browser is the obvious target as it's likely to be fully whitelisted, but if Overwatch started trying to connect to my-first-c2-server.totallylegit.net then yeah I'd probably notice Little Snitch's warning.

Mustache Ride
Sep 11, 2001



I made this during a vendor meeting today. For you

Thanks Ants
May 21, 2004

#essereFerrari


Surely 'compliance' and 'policy' should be in there somewhere

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

I'd also like "persistent" and "transparent". Maybe "patented".

Adbot
ADBOT LOVES YOU

Wiggly Wayne DDS
Sep 11, 2010



not apt enough

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply