Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Shame Boy
Mar 2, 2010

hackbunny posted:

I don't get the point though! it seems completely unrelated to anything the malware does

btw remember that webdav folder that investigators missed? and the files I downloaded from it? I managed to decrypt two out of four, and they're lists of accounts on gmx.com. nothing new basically, just a copy of data investigators already found elsewhere. I wonder about the other two files... my sample contains no reference to them. I'll try to brute force them, all I need to do is reverse sha1 a couple short, simple strings. why can't I use existing rainbow tables you ask, because the idiot hell fucker who cumpissed this abortion of a malware encodes the strings in utf-16 before hashing them, I answer

lol malware written by shaggar

Adbot
ADBOT LOVES YOU

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

I never considered character encodings as a way to protect against rainbow tables, but in hindsight it's obvious. who has ebcdic tables?

Wiggly Wayne DDS
Sep 11, 2010



it still sounds like stitched together hackforums tutorials

hackbunny
Jul 22, 2007

I haven't been on SA for years but the person who gave me my previous av as a joke felt guilty for doing so and decided to get me a non-shitty av

Wiggly Wayne DDS posted:

it still sounds like stitched together hackforums tutorials

kinda yeah

ate all the Oreos posted:

lol malware written by shaggar

... but I'm afraid this is closer. do you know what format these configuration files are in? they are serialized .net objects. specifically, NameValueCollection objects serialized with BinaryFormatter, a ridiculously verbose format for a key-multivalue map that can only contain strings

Subjunctive posted:

I never considered character encodings as a way to protect against rainbow tables, but in hindsight it's obvious. who has ebcdic tables?

there are some really clever and effective ideas in there but I think this one is entirely accidental

the way remote files are encrypted, string encodings notwithstanding, is one of the clever and effective ideas, imo. files are encrypted with their filename as the key, and the filename is replaced with its hash before it's written anywhere. only the original code, where the filename is in cleartext, can both locate the files and decrypt them: the two files I could decrypt? I could only do it so quickly because the names (ghkch and hgrch) are in clear text, in the code. it also shows a degree of opsec foresight that not all information is included in all agents: if you catch one, you can only decrypt the files relevant to it. all local files (like caches of remote files, or temporary files) are similarly encrypted, and sometimes padded with random data. it's somewhat well thought out

on the other hand the key derivation from the filename is very weak (key = md5(utf16(filename)), iv = sha256(utf16(filename))), the encryption is 3des for some reason (pity it isn't des), and the obfuscation of the filename is a straight unsalted sha1 hash instead of something more expensive, like bcrypt or scrypt (sure, salting the hash means you can't just open the file by its filename hash, you have to list the directory and check the filenames one by one, but since all remote files are on webdav or ftp, you can list directories no problem). the weak hashing of the filename, and the nature of filenames used elsewhere in the code (short, lowercase alpha strings), make me confident that I could probably bruteforce them

not to mention the jucier details in the order of custody (that I really really really should read) that show that the siblings communicated operational details on cleartext channels, but that's a story for another day

hackbunny fucked around with this message at 15:15 on Jan 31, 2017

Crime on a Dime
Nov 28, 2006
impressive reverse engineering

Shaggar
Apr 26, 2006

Bonfire Lit posted:

turns off UAC and "UAC remote restrictions". if you connect to a computer via smb with a local account with admin privs (as opposed to a domain account with local admin privs) windows usually disables the admin group in your token. the second setting turns that off, I don't know where the point is when UAC is already disabled but maybe it's in order to keep access if someone turns UAC back on via the control panel

the uac remote restrictions can be disabled w/out disabling uac entirely.

Munkeymon
Aug 14, 2003

Motherfucker's got an
armor-piercing crowbar! Rigoddamndicu𝜆ous.



hackbunny posted:

encodes the strings in utf-16 before hashing them, I answer

that'd just be what would happen if you encrypted the output of string.ToCharArray

Dolomite
Jul 26, 2000
Cars & Legs

flosofl posted:

He explains later on that there's a hash for each image (or something like that). So the new file won't display because there's no way that someone that has managed to compromise the computer to load the images can replace the hashes.

i wonder if they're all like that. we have a sign for the football stadium that doesn't check anything, it just displays what the scheduler tells it. as long as the filename is the same you could swap out the image or movie and it won't care.

Shaggar
Apr 26, 2006
I bet the software or hardware they use has a way to sign packages to prevent tampering but nobody has ever used it.

hobbesmaster
Jan 28, 2008

Dolomite posted:

i wonder if they're all like that. we have a sign for the football stadium that doesn't check anything, it just displays what the scheduler tells it. as long as the filename is the same you could swap out the image or movie and it won't care.

they're all completely different because of course they are

infernal machines
Oct 11, 2012

we monitor many frequencies. we listen always. came a voice, out of the babel of tongues, speaking to us. it played us a mighty dub.
the most common ones here in toronto are just a display segment off a standard windows pc. you occasionally see the image app crash and there's a standard windows desktop with a few common remote control apps. usually teamviewer or vnc

Wheany
Mar 17, 2006

Spinyahahahahahahahahahahahaha!

Doctor Rope

Shaggar posted:

I bet the software or hardware they use has a way to sign packages to prevent tampering but nobody has ever used it.

oh no, i bet they used it a few times at first.

but it was too cumbersome or someone forgot to do it, and it seems to work just fine.

then that guy taught the new guy to do it and then the old guy left and now nobody knows that you can sign the packages.

Migishu
Oct 22, 2005

I'll eat your fucking eyeballs if you're not careful

Grimey Drawer
> Security Fuckup Megathread - v13.2 - car go bep bep


yessssssssssssssssssss

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

Countdown until Giuliani gets invited to Keynote RSA and/or BlackHat

duTrieux.
Oct 9, 2003


beepsandboops
Jan 28, 2014
https://twitter.com/ericgeller/status/826524501294903296

:smith:

Wiggly Wayne DDS
Sep 11, 2010



i guess it was too mundane of an order

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

He needs to fire a few people with spines first so that it goes smoothly.

Winkle-Daddy
Mar 10, 2007

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

ayyyyy

also

http://whatsinmyredis.com/

Trabisnikof
Dec 24, 2005


I AM LIABLE

Winkle-Daddy
Mar 10, 2007

quote:

How does the latest version of redis fix this issue?

The latest version of Redis alieses the words POST and HOST to QUIT commands, this when incoming HTTP requests contain those words, they terminate the TCP connection.
lmao

gonadic io
Feb 16, 2011

>>=
This allows for a cleartext HTTP request to be sent to a listening Redis server. Redis will ignore the HTTP headers, and as soon as it sees a valid redis command in the body, it will execute it.

The MUMPSorceress
Jan 6, 2012


^SHTPSTS

Gary’s Answer

i see myself in more of an alies type role

Cocoa Crispies
Jul 20, 2001

Vehicular Manslaughter!

Pillbug
antirez has been dragging his idiot feet on ssl support for redis for two goddamn years, and running that even with self-signed certs would stop this (your browser would freak out)

Storysmith
Dec 31, 2006

rumor was that phineas fisher was arrested in a raid in catalan

but lol maybe not

A Pinball Wizard
Mar 23, 2005

I know every trick, no freak's gonna beat my hands

College Slice

Shame Boy
Mar 2, 2010


good to see gitlab has worse backup practices than my dumbass personal website

Deep Dish Fuckfest
Sep 6, 2006

Advanced
Computer Touching


Toilet Rascal
actually doing the full backup restore procedure for real just to test if it works? that's crazy! waste of time! it's just copying files from point a to point b! nothing can go wrong! do it all the time! dead simple!

i mean we even keep the backups in a network share on a raid array just to make sure it's as simple as possible

Storysmith
Dec 31, 2006

ate all the Oreos posted:

good to see gitlab has worse backup practices than my dumbass personal website

why does your dumbass personal website have a half terabyte of postgres database

Shame Boy
Mar 2, 2010

Storysmith posted:

why does your dumbass personal website have a half terabyte of postgres database

where else am i going to keep my meticulously catalogued and documented notes about porn :colbert:

Angela Merkle Tree
Jan 4, 2012

the definition of open: "mkdir android ; cd android ; repo init -u git://android.git.kernel.org/platform/manifest.git ; repo sync ; make"
College Slice
i can sympathise since i accidentally blew away our production database in 2011 myself, and our first backup didn't work (the second did, thank gently caress)

but database size isn't an excuse, we're doing daily backups and restores of a 500gb postgres db in production as well, and we're doing it on australian internet connections, so these guys have no excuse

Cybernetic Vermin
Apr 18, 2005

they also have no excuse in that their entire business proposition is to be a repository of peoples data. not being able to keep peoples data does put a bit of a dent in the plan

James Baud
May 24, 2015

by LITERALLY AN ADMIN

Cybernetic Vermin posted:

they also have no excuse in that their entire business proposition is to be a repository of peoples data. not being able to keep peoples data does put a bit of a dent in the plan

This failure only took out the free tier, the enterprise 'on your premises' (40-200/user/year) / hosted customer instances (80-800/mo) survived.

So doing a crappy job on the free tier surely just convinces people to give them money, right? (Likewise, the value of any user who walks away forever over outage / data loss is close to zero)

Carthag Tuek
Oct 15, 2005

Tider skal komme,
tider skal henrulle,
slægt skal følge slægters gang



quote:

h. Somehow disallow rm -rf for the PostgreSQL data directory? Unsure if this is feasible, or necessary once we have proper backups

lol

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
I'm still not sure why people habitually use -f when deleting stuff.

Shame Boy
Mar 2, 2010

Jabor posted:

I'm still not sure why people habitually use -f when deleting stuff.

same reason people put sudo in front of everything cuz it doesn't work otherwise!!!

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

ate all the Oreos posted:

same reason people disable uac cuz it doesn't work otherwise!!!

redleader
Aug 18, 2005

Engage according to operational parameters
i guess we have an ad hoc, informal backup test thing going on whereby most devs grab a recent copy of whatever production database they need and restore it on their laptops

Adbot
ADBOT LOVES YOU

spankmeister
Jun 15, 2008






Jabor posted:

I'm still not sure why people habitually use -f when deleting stuff.

Because it complains about directories otherwise.

  • Locked thread