Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
pr0zac
Jan 18, 2004

~*lukecagefan69*~


Pillbug
https://www.usenix.org/system/files/conference/woot16/woot16-paper-wustrow.pdf

quote:

DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work

In this paper, we present DDoSCoin, which is a cryptocurrency with a malicious proof-of-work. DDoSCoin allows miners to prove that they have contributed to a distributed denial of service attack against specific target servers. This proof involves making a large number of TLS connections to a target server, and using cryptographic responses to prove that a large number of connections has been made.

Adbot
ADBOT LOVES YOU

Kuvo
Oct 27, 2008

Blame it on the misfortune of your bark!
Fun Shoe
finally, a cryptocurrency actually worth something

Phone
Jul 30, 2005

親子丼をほしい。
it's a rewards program for ddosing

but you don't get a free footlong sub at the end

Captain Foo
May 11, 2004

we vibin'
we slidin'
we breathin'
we dyin'

spankmeister posted:

Here's some really cool research that i can finally share with you guys:

https://www.vusec.net/projects/flip-feng-shui/

It leverages memory deduplication and rowhammer to introduce arbitrary bit flips in VM's on the same host as the attacker's VM.

They demonstrate the technique by compromising the authorized_keys on a victim VM and also by compromising apt and gnupg to install malicious packages.

This is fuckin sick

FlapYoJacks
Feb 12, 2009
My gym's website is a entire security fuckup De jour.

1) The signup doesn't ask for a password.
2) They email you a non-temp password in plain text to you.
3) The default password is 7 characters long. Mine was: I135479
4) It doesn't ask you to change your password.
5) When you eventually DO find the area on their website to change your password here are the requirements:

Password must be between 5 and 12 characters, containing at least 1 letter and 1 number. (Nice varchar guys!)

At least they obscure your credit card number! I wouldn't be surprised if you could straight up inject sql code into the password field.

Carbon dioxide
Oct 9, 2012

http://www.reuters.com/article/us-france-internet-encryption-idUSKCN10M1KB

ate shit on live tv
Feb 15, 2004

by Azathoth

This cyberpunk future we live in loving owns.

Perhaps if your counter-terrorism end-game is to ban math you should try a different approach?

ate shit on live tv fucked around with this message at 20:48 on Aug 11, 2016

Shame Boy
Mar 2, 2010

Powercrazy posted:

This cyberpunk future we live in loving owns.


Perhaps if your counter-terrorism end-game is to ban math you should try a different approach?

The end-goal isn't so much to get rid of encryption programs but to make possession or use of them an arrestable offense or at the very least probable cause for a search warrant.

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?


Well not so fast: https://www.washingtonpost.com/loca...9d78_story.html

wyoak
Feb 14, 2005

a glass case of emotion

Fallen Rib
this lends more credence to 'the russians did it'
gotta tie up loose ends (I know this because I watch The Americans on FX)

Winkle-Daddy
Mar 10, 2007

Assange should listen to less Alex Jones, probably.

Thanks Ants
May 21, 2004

#essereFerrari


i'm having this waved in my face as a thing that i need to religiously stick to if i am using aws - https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf - but it seems like common-sense stuff and then also completely arbitrary at the same time (90 days for rotating keys), and doesn't really make the 'minimum required access on every account you make' angle hard enough. i think you could make a user that had access to everything on your aws account and put the keys into a lovely aws management app that you secure with a terrible password and that would tick all the boxes in that document.

Thanks Ants fucked around with this message at 22:19 on Aug 11, 2016

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

ratbert90 posted:

My gym's website

Yeah you could have just ended it there.

ate shit on live tv
Feb 15, 2004

by Azathoth

Parallel Paraplegic posted:

The end-goal isn't so much to get rid of encryption programs but to make possession or use of them an arrestable offense or at the very least probable cause for a search warrant.

I suppose civilian grade weaponized encryption is Cyberpunk as gently caress though.

ChickenOfTomorrow
Nov 11, 2012

god damn it, you've got to be kind

spankmeister posted:

Here's some really cool research that i can finally share with you guys:

https://www.vusec.net/projects/flip-feng-shui/

It leverages memory deduplication and rowhammer to introduce arbitrary bit flips in VM's on the same host as the attacker's VM.

They demonstrate the technique by compromising the authorized_keys on a victim VM and also by compromising apt and gnupg to install malicious packages.

i may be way behind but oh my god this is really loving cool

suffix
Jul 27, 2013

Wheeee!

spankmeister posted:

Here's some really cool research that i can finally share with you guys:

https://www.vusec.net/projects/flip-feng-shui/

It leverages memory deduplication and rowhammer to introduce arbitrary bit flips in VM's on the same host as the attacker's VM.

They demonstrate the technique by compromising the authorized_keys on a victim VM and also by compromising apt and gnupg to install malicious packages.

rowhammer the great sandbox killer

is there any estimate for when computers will not be vulnerable to this? are new chipsets and ram less susceptible?

quote:

One significant remark about the Key ID changing (as a result of a bit flip) is that this caused the self-signature on the public keyring to be ignored by GPG! The signature contains the original Key ID, but it is now attached to a key with a different ID due to the public key mutation. As a result, GPG ignores the attached signature as an integrity check of the bit-flipped public key and the self-signing mechanism fails to catch our bit flip. The only side-effect is harmless to our attack ­ GPG reports that the trusted key is not signed. apt ignores this without even showing a warning.

canis minor
May 4, 2011

ratbert90 posted:

My gym's website is a entire security fuckup De jour.

1) The signup doesn't ask for a password.
2) They email you a non-temp password in plain text to you.
3) The default password is 7 characters long. Mine was: I135479
4) It doesn't ask you to change your password.
5) When you eventually DO find the area on their website to change your password here are the requirements:

Password must be between 5 and 12 characters, containing at least 1 letter and 1 number. (Nice varchar guys!)

At least they obscure your credit card number! I wouldn't be surprised if you could straight up inject sql code into the password field.

The place I play badminton in has the password set as my post code and I can't change it. I haven't played around with because #care

spankmeister
Jun 15, 2008






suffix posted:

rowhammer the great sandbox killer

is there any estimate for when computers will not be vulnerable to this? are new chipsets and ram less susceptible?

Well ECC doesn't fully mitigate it and DDR4 has a mitigation called TRR, but this doesn't always seem to work. I'd say it'll be at least a year or two until H/W mfg get their poo poo together and at least 5 years before most old hardware has been rotated out of service.

bobfather
Sep 20, 2001

I will analyze your nervous system for beer money

quote:

Tavis Ormandy (‪@taviso‬)
8/11/16, 7:15 PM
There's a bunch of obvious vulnerabilities in Dashlane, I'll report them later this afternoon. KeePass and KeePassX both look sane

John Mark Schofield (‪@schof‬)
8/11/16, 7:22 PM
‪@taviso‬ Haven't heard you report anything on 1Password. Clean bill of health so far?

Tavis Ormandy (‪@taviso‬)
8/11/16, 9:11 PM
‪@schof‬ I've sent them some vulnerabilities, but it's not the worst I've looked at.

1Pass supremacy remains.

Jewel
May 2, 2009

bobfather posted:

1Pass supremacy remains.

quote:

KeePass and KeePassX both look sane

:colbert:

bobfather
Sep 20, 2001

I will analyze your nervous system for beer money
Mobile apps for Keepass lack polish.

Ironically, the mobile 1Pass apps are leaps and bounds better than either the Windows or MacOS versions, solely because they support multiple Dropbox accounts.

EndlessRagdoll
May 20, 2016

Parallel Paraplegic posted:

The end-goal isn't so much to get rid of encryption programs but to make possession or use of them an arrestable offense or at the very least probable cause for a search warrant.

If it was gotten rid of completely then the governments wouldn't be able to keep their information secrets and we just can't have that.

fins
May 31, 2011

Floss Finder

spankmeister posted:

Well ECC doesn't fully mitigate it and DDR4 has a mitigation called TRR, but this doesn't always seem to work. I'd say it'll be at least a year or two until H/W mfg get their poo poo together and at least 5 years before most old hardware has been rotated out of service.

5 years? Maybe at the far side of the bell curve!

Also, easily mitigated by single bit ram :colbert:

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
You know, a sufficiently paranoid system could probably mitigate it by only using half the rows in a given bit of dram. Has anyone investigated the relative likelihood of bit-flips in rows that aren't immediately adjacent?

Raere
Dec 13, 2007

ESXi disables memory dedupe by default now, right?

spankmeister
Jun 15, 2008






Raere posted:

ESXi disables memory dedupe by default now, right?

yeah

flakeloaf
Feb 26, 2003

Still better than android clock

Raere posted:

ESXi disables memory dedupe by default now, right?

vms that should be separated for security reasons ought not to have their resources combined for security reasons

Winkle-Daddy
Mar 10, 2007

as of what version? I just patched to 6-something and it was still on.

e: I didn't actually do the upgrade, so maybe it stayed on, or was turned back on. idk

Winkle-Daddy fucked around with this message at 15:59 on Aug 12, 2016

spankmeister
Jun 15, 2008






Winkle-Daddy posted:

as of what version? I just patched to 6-something and it was still on.

e: I didn't actually do the upgrade, so maybe it stayed on, or was turned back on. idk

As of 5.1 ish it was turned off by default. Mind you that ESXi still does page sharing on a per-vm basis, but inter-VM TPS has been turned off by default.

e: this page has all the info: https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2080735

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

flakeloaf posted:

vms that should be separated for security reasons ought not to have their resources combined for security reasons
sure but if you're a reseller of vmses you're not going to segregate everyone's hardware, because that's expensive, so you're gonna make multitenant clusters

Pile Of Garbage
May 28, 2007



flakeloaf posted:

vms that should be separated for security reasons ought not to have their resources combined for security reasons

exactly this. we had a big argument with our customers sec ops leader over this. we wanted to enable page sharing as we are already massively over-provisioned however the dink overruled us with some diatribe about exactly that

basically if the threat posed by the successful exploitation of a page sharing info disclosure vuln is big enough then you'd already be running your poo poo on physical hardware. ofc this is assuming that you'd done threat modelling and come to the conclusion that a hypervisor escape being exploited is far more likely than some incredibly esoteric info disclosure vuln being exploited...

Pile Of Garbage fucked around with this message at 18:50 on Aug 12, 2016

Bhodi
Dec 9, 2007

Oh, it's just a cat.
Pillbug

flakeloaf posted:

vms that should be separated for security reasons ought not to have their resources combined for security reasons
look at this special snowflake who lives in a land made of money

Pile Of Garbage
May 28, 2007



outfits that have no money always very quickly and conveniently stop caring about security

edit: vvv lucky bastard vvv

Pile Of Garbage fucked around with this message at 19:31 on Aug 12, 2016

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

cheese-cube posted:

outfits that have no money always very quickly and conveniently stop caring about security
this is the place i work at now, except they have money now so it is time to fix things

codl
Jul 28, 2013


my favourite part of this is

quote:

Websites could also attempt to thwart DDoSCoin by
participating in the mining themselves. Because the victim
website will have local access to its private key, they
will have an advantage over remote clients.

Carbon dioxide
Oct 9, 2012

This is kinda silly.

https://www.youtube.com/watch?v=H7lQXmSLiP8

https://arxiv.org/ftp/arxiv/papers/1608/1608.03431.pdf

Agile Vector
May 21, 2007

scrum bored



thanks for spoiling the next mr robot :mad:

syscall girl
Nov 7, 2009

by FactsAreUseless
Fun Shoe

Agile Vector posted:

thanks for spoiling the next mr robot :mad:

we've already talked about the air gap vector and how that person is psychotic


oh yeah, you're right :kingsley:

Raere
Dec 13, 2007

use ssds for increased security

Adbot
ADBOT LOVES YOU

surebet
Jan 10, 2013

avatar
specialist


i need some advice with the legal side of reverse engineering stuff. i'm not looking for an actual legal opinion, more like how sarcastic i should set my tone

we have many logistics partners, and the software for one of them is a huge pain in the rear end to work with because all the data entry has to be done by hand, which basically means someone full time in our case

the software has n features to it

for whatever reason, in tyool 2016 those features neither included the ability to do batch importation of stuff (ie ingest a csv full of stuff instead of typing everything in) nor the ability to pull down info from any external system

we contracted the partner to add a batch import feature (for several thousand dollars, and this was before my time, otherwise i would have call dingo on them right then and there) and they eventually delivered 2 months late with me basically having to guide them the whole time

during this period i was basically spending 5-6 hours a week rummaging through their poo poo show of a code base via ida pro and no one complained

we were supposed to online the system today, but we realized that the import thing only did n-1 features, in this case automatic email subscription to status updates. we can't run with this without those updates, email or otherwise, because we need real time monitoring of events like customs issues and train derailments (happens alarmingly often). of course, there's no way to retroactively subscribe to these updates and there's no way to fetch the info otherwise (ie via api)

the partner vaguely hinted that they could add support for the missing feature for an additional cost. rummaging through some more with ida i can see that the code to subscribe us to stuff is in there, but it's just not enabled.

at this point i can reasonably state that they intentionally bricked a feature with the intent of asking for more money to fix this. i have sent them code excerpts validating my claim that poo poo should work, and for the first time someone decided to try and play the "the eula explicitly states no reverse engineering, stop it" card

at no point have i been presented with or accepted a eula, but as a developer/project manager, my understanding is that i'm not actually an end user anyway

furthermore, this whole thing is pretty much textbook interoperability work therefore receives broad exclusions from dmca & c-42 statutes regarding reverse engineering

bottom line, have you ever dealt with a vendor like this and what tips could you give me? i know :sever: is going to be popular, tbh i'm considering it

  • Locked thread