|
Mirroring it here just in case it is taken down...code:
|
# ? Apr 25, 2017 01:40 |
|
|
# ? Jun 7, 2024 17:12 |
|
OSI bean dip posted:Mirroring it here just in case it is taken down... pro read
|
# ? Apr 25, 2017 02:08 |
|
I think I'm ready to Hack Back! *doesnt use a vm with proxy to ddos a minecraft server*
|
# ? Apr 25, 2017 02:17 |
|
god drat
|
# ? Apr 25, 2017 02:50 |
|
i want to join a band called leopard boy and the decepticons
|
# ? Apr 25, 2017 03:10 |
|
Meat Beat Agent posted:i want to join a band called leopard boy and the decepticons
|
# ? Apr 25, 2017 03:28 |
|
A Pinball Wizard posted:pro read Yeah, I love reading stuff like this.
|
# ? Apr 25, 2017 05:14 |
|
Cocoa Crispies posted:put it on wheels so it drives around like a mars rover and emails you pictures https://www.nytimes.com/2017/03/17/arts/design/desert-x-show-things-go-awry-shy-bot-disappears.html
|
# ? Apr 25, 2017 07:00 |
|
Jimmy Carter posted:https://www.nytimes.com/2017/03/17/arts/design/desert-x-show-things-go-awry-shy-bot-disappears.html oh no my favorite robot
|
# ? Apr 25, 2017 08:37 |
|
anthonypants posted:my boss got a bug up his butt and wants to disable 3des on a webserver. is this pro-rear end BangersInMyKnickers post with the ciphers in it still good or were there updates? bangers stuff is extremely pro and still relevant however as i've found with SCHANNEL it's often much easier to disable individual protocols/ciphers/hashes/key exchange algos rather than enforcing a list of cipher suites. in your instance you can disable 3DES with the following reg key: code:
|
# ? Apr 25, 2017 10:11 |
|
Shaggar posted:tbh Microsoft should really be signing all of its system files but lol all the same they are signed but it's a detached signature (.cat files) which the antivirus doesn't know about
|
# ? Apr 25, 2017 13:17 |
|
anthonypants posted:lol https://twitter.com/fleximinx/status/856604090666803201 (courtesy: rufo) 5
|
# ? Apr 25, 2017 13:33 |
|
Webroot went on a rampage and quarantined LINQPad and bits of a bunch of other dev tools and stuff like nVidia settings utilities last night in another stunning victory of signature based AV over productivity
|
# ? Apr 25, 2017 14:29 |
|
so like if i'm designing a virus would it be possible to include chunks of system files in such a way as to intentionally cause that? i'm not actually sure how the "signature" works, i assume it's not an actual hash or something like that since then the slightest change would defeat it
|
# ? Apr 25, 2017 14:36 |
|
I'm sure it's super complicated under the hood but I did successfully hide an old driver installer I keep in Dropbox from it by stuffing it in a 7-zip so eh
|
# ? Apr 25, 2017 14:49 |
|
ate all the Oreos posted:so like if i'm designing a virus would it be possible to include chunks of system files in such a way as to intentionally cause that? i'm not actually sure how the "signature" works, i assume it's not an actual hash or something like that since then the slightest change would defeat it their malware analysts look for "unique" strings (or sequences of bytes) in the samples spankmeister fucked around with this message at 15:01 on Apr 25, 2017 |
# ? Apr 25, 2017 14:53 |
|
oh iframes: https://www.brokenbrowser.com/sop-bypass-uxss-tweeting-like-charles-darwin/ websites opening blank iframes for whatever reason, and they can be exploited
|
# ? Apr 25, 2017 14:59 |
|
Chris Knight posted:oh iframes: https://www.brokenbrowser.com/sop-bypass-uxss-tweeting-like-charles-darwin/ microsoft, bad at security? inconceivable
|
# ? Apr 25, 2017 15:31 |
|
anthonypants posted:my boss got a bug up his butt and wants to disable 3des on a webserver. is this pro-rear end BangersInMyKnickers post with the ciphers in it still good or were there updates? Yeah that's still current with the latest Win10/2016 releases to my knowledge. If you're turning off 3DES then you might as well be looking at all AES128 ciphers too because they're about as strong.
|
# ? Apr 25, 2017 15:37 |
|
cheese-cube posted:bangers stuff is extremely pro and still relevant however as i've found with SCHANNEL it's often much easier to disable individual protocols/ciphers/hashes/key exchange algos rather than enforcing a list of cipher suites. in your instance you can disable 3DES with the following reg key: Its better on Win10/2016 because they broke the curve selection out in to its own policy entry so you aren't butting up against the character limit because you have to load in three curve variants for each ECHDE cipher.
|
# ? Apr 25, 2017 15:43 |
|
BangersInMyKnickers posted:Yeah that's still current with the latest Win10/2016 releases to my knowledge. If you're turning off 3DES then you might as well be looking at all AES128 ciphers too because they're about as strong. I've always wondered why 3des can't just be cracked by running the relatively easy crack on normal DES 3 times, it's just DES layered on itself with a different key each time right? Is the problem that you can't tell if you've broken a single layer because the layer below it looks random?
|
# ? Apr 25, 2017 16:19 |
|
Basically, yeah. 3DES is 3 rounds of DES with (typically) two 56 bit keys chained in an ABA sequence so you're blind to what's going on in the middle. After DES was broken someone came up with 2DES but you could attack it from both ends and it proved no better than DES and in some ways worse because it has a bigger attack surface (oops). https://en.wikipedia.org/wiki/Meet-in-the-middle_attack BangersInMyKnickers fucked around with this message at 16:35 on Apr 25, 2017 |
# ? Apr 25, 2017 16:30 |
|
ate all the Oreos posted:I've always wondered why 3des can't just be cracked by running the relatively easy crack on normal DES 3 times, it's just DES layered on itself with a different key each time right? Is the problem that you can't tell if you've broken a single layer because the layer below it looks random? done properly, it's exponential, yeah. you have to completely crack the second layer for each potential key at the first layer, and you have to completely crack the third layer for each potential key in the second layer every time you attempt to crack the second layer for a first-layer key
|
# ? Apr 25, 2017 16:32 |
|
ah ok, i had a feeling it was something like that but never quite got it, thanks
|
# ? Apr 25, 2017 16:37 |
|
BangersInMyKnickers posted:Basically, yeah. 3DES is 3 rounds of DES with (typically) two 56 bit keys chained in an ABA sequence so you're blind to what's going on in the middle. After DES was broken someone came up with 2DES but you could attack it from both ends and it proved no better than DES and in some ways worse because it has a bigger attack surface (oops). cheese-cube posted:bangers stuff is extremely pro and still relevant however as i've found with SCHANNEL it's often much easier to disable individual protocols/ciphers/hashes/key exchange algos rather than enforcing a list of cipher suites. in your instance you can disable 3DES with the following reg key:
|
# ? Apr 25, 2017 17:45 |
|
anthonypants posted:specifically, my boss found out about a "birthday attack" which he believes is a new attack against 3des and not a type of attack. Probably the news about sweet32 finally filtered down to whatever media outlet bosses use
|
# ? Apr 25, 2017 18:01 |
|
anthonypants posted:idk what registry key he was looking at but he says disabling a 3des registry key broke rdp lmbo the only way this is possible is if he's using XP/2003 somewhere which doesn't have any AES ciphers in schannel. There's an optional KB you can install on 2003 to give it RSA_AES_CBC_SHA support. XP is poo poo out of luck and the only cipher/protocol overlap left on it is 3DES over TLS 1.0 which is why I generally still leave it on. https://support.microsoft.com/en-us...ows-server-2003
|
# ? Apr 25, 2017 18:30 |
|
BangersInMyKnickers posted:lmbo the only way this is possible is if he's using XP/2003 somewhere which doesn't have any AES ciphers in schannel. There's an optional KB you can install on 2003 to give it RSA_AES_CBC_SHA support. XP is poo poo out of luck and the only cipher/protocol overlap left on it is 3DES over TLS 1.0 which is why I generally still leave it on.
|
# ? Apr 25, 2017 18:41 |
|
Even with all the attacks 3DES is still fine.
|
# ? Apr 25, 2017 18:56 |
|
spankmeister posted:Even with all the attacks 3DES is still fine.
|
# ? Apr 25, 2017 19:22 |
|
qualys keeps an up to date list of ciphers in their best practices docs but idk how good those are.
|
# ? Apr 25, 2017 19:25 |
|
i just use iis crypto https://www.nartac.com/Products/IISCrypto
|
# ? Apr 25, 2017 19:31 |
|
anthonypants posted:but our qualys score yeah I mean there is really no reason to support 3DES anymore so you should turn it off unless you're dealing with legacy stuff. But it's not like 3DES is broken or anything.
|
# ? Apr 25, 2017 19:33 |
|
flakeloaf posted:they're not flagrantly violating the rules to make their business model work, they're disrupting the app industry That is something that needs to be disrupted, so good on Uber in this case.
|
# ? Apr 25, 2017 19:35 |
|
heres a good one, i was debugging an internal app and noticed weird network behavior for remote users. anyways after doing some research i have found that our ASAs are running 7.2
|
# ? Apr 25, 2017 19:36 |
|
spankmeister posted:yeah I mean there is really no reason to support 3DES anymore so you should turn it off unless you're dealing with legacy stuff. But it's not like 3DES is broken or anything.
|
# ? Apr 25, 2017 19:40 |
|
BiohazrD posted:heres a good one, i was debugging an internal app and noticed weird network behavior for remote users. anyways after doing some research i have found that our ASAs are running 7.2 speaking of which has anyone gotten replacement hardware affected by that c2000 hardware bug
|
# ? Apr 25, 2017 19:41 |
|
anthonypants posted:our asas are on 9.something and it was decided to put off patching them while we waiting for rmas to go through we're dropping cisco anyways but jesus christ theres like 5+ 10 score CVEs these are vulnerable to and we have almost 40
|
# ? Apr 25, 2017 19:43 |
|
BiohazrD posted:we're dropping cisco anyways but jesus christ theres like 5+ 10 score CVEs these are vulnerable to and we have almost 40
|
# ? Apr 25, 2017 19:49 |
|
|
# ? Jun 7, 2024 17:12 |
|
anthonypants posted:"legacy stuff" means windows xp and i'm pretty okay with not supporting external clients who use xp, but i guess we'll see so many hospitals and other providers still have xp kicking around.
|
# ? Apr 25, 2017 20:35 |