Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Jewel
May 2, 2009

nice NICE NICE NICE

https://twitter.com/newsycbot/status/911305527384256512

https://twitter.com/jupenur/status/911286403434246144

Adbot
ADBOT LOVES YOU

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum
lmao i was just about to post this

anthonypants fucked around with this message at 20:27 on Sep 22, 2017

Workaday Wizard
Oct 23, 2009

by Pragmatica
oh my GOOOOOOOOOOOOOOD

Workaday Wizard
Oct 23, 2009

by Pragmatica
what even prompted them to post the key on their blog private or otherwise?

Wiggly Wayne DDS
Sep 11, 2010



Shinku ABOOKEN posted:

what even prompted them to post the key on their blog private or otherwise?
they updated it on the 18th, so presumably it's been there since then and only got publicly noticed now

in response they've revoked the key and removed the blog post entirely, it's still kicking around on caches though

good luck talking to psirt until they've put out a new key though? then again pgp is such a clusterfuck on email that no one really uses it

oh and mailvelope warns on exporting the private key as well so multiple fuckups

Kuvo
Oct 27, 2008

Blame it on the misfortune of your bark!
Fun Shoe

wolrah
May 8, 2006
what?

Shinku ABOOKEN posted:

what even prompted them to post the key on their blog private or otherwise?

It's relatively common for security groups to post their public key on their web site so you can encrypt messages to send to them.

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum
yeah if you find a security issue with their poo poo, you take their public key and sign a message so that the nsa or whoever can't tell what the vulnerability is

Proteus Jones
Feb 28, 2013



https://twitter.com/me_irl/status/911328527248699392

Diva Cupcake
Aug 15, 2005

this is the choice poo poo secfuck

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

A good shirt

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

anthonypants posted:

yeah if you find a security issue with their poo poo, you take their public key and sign a message so that the nsa or whoever can't tell what the vulnerability is

you encrypt, not sign.

Rufus Ping
Dec 27, 2006





I'm a Friend of Rodney Nano

Subjunctive posted:

you encrypt, not sign.

same difference

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Rufus Ping posted:

same difference

of course

Workaday Wizard
Oct 23, 2009

by Pragmatica
lol the broadpwn bug is a plain-old 90's style buffer overflow

apseudonym
Feb 25, 2011

Shinku ABOOKEN posted:

lol the broadpwn bug is a plain-old 90's style buffer overflow

Bugs in 2017 aren't different than bugs in 1990.

Trabisnikof
Dec 24, 2005

apseudonym posted:

Bugs in 2017 aren't different than bugs in 1990.

idk was xss an issue in 1990 :v:

El Mero Mero
Oct 13, 2001

Security Fuckup Megathread - v14.0 - oh poo poo Adobe

surebet
Jan 10, 2013

avatar
specialist


anthonypants posted:

lmao i was just about to post this



i always wanted to buy that shirt and well google reverse image search really isn't helping here

surebet
Jan 10, 2013

avatar
specialist


(i'm going to assume that somehow the preferred stock photo for confederate flag t-shirts is a black man with swag)

surebet
Jan 10, 2013

avatar
specialist


also since they revoked the key, through the magic of google cache here's an archived version if someone wants to frame it or something

http://archive.is/MrWkg

Workaday Wizard
Oct 23, 2009

by Pragmatica

Trabisnikof posted:

idk was xss an issue in 1990 :v:

yes. i pranked a guy stupid enough to have iframes allowed in his vbulletin board by changing my sig to a funny iframe and having some script in the frame request the user control panel to change the user sig to the same iframe.

next day the forum was wiped :xd:

Workaday Wizard
Oct 23, 2009

by Pragmatica
rip geocities.

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

surebet posted:

also since they revoked the key, through the magic of google cache here's an archived version if someone wants to frame it or something

http://archive.is/MrWkg
lol that it's an archive of the google cache

Proteus Jones
Feb 28, 2013



Shinku ABOOKEN posted:

yes. i pranked a guy stupid enough to have iframes allowed in his vbulletin board by changing my sig to a funny iframe and having some script in the frame request the user control panel to change the user sig to the same iframe.

next day the forum was wiped :xd:

Shinku ABOOKEN posted:

rip geocities.


iframe not a thing until 1997.
Geocities not a thing until 1994.
vBulletin not a thing until 2000.

But yeah, you totally did xss in 1990

EDIT: Had to look it up, but HTML WAS NOT A THING UNTIL 1993 (at least in terms of the first draft of how we know it)

Proteus Jones fucked around with this message at 02:37 on Sep 23, 2017

Workaday Wizard
Oct 23, 2009

by Pragmatica

Proteus Jones posted:

iframe not a thing until 1997.
Geocities not a thing until 1994.
vBulletin not a thing until 2000.

But yeah, you totally did xss in 1990

he said the 90s of which 1997 or whatever belongs. also i am pretty sure vbulletin existed before that.

oops. i read it as 1990s.

Proteus Jones
Feb 28, 2013



Shinku ABOOKEN posted:

he said the 90s of which 1997 or whatever belongs. also i am pretty sure vbulletin existed before that.

He said 1990, and not according to wikipedia. It was developed in 1999 and first released in 2000.

OK, misread I get it. I was just like "Wha? WTF is he on about?"

McGlockenshire
Dec 16, 2005

GOLLOCKS!
vBulletin existed in 1999 as a private port of UBB to PHP/MySQL by a Visual Basic community (vB, get it) but it wasn't a commercial product until 2001

UBB had a whole fuckton of vulnerabilities and they basically hired me because I ended up having to call them up and demonstrate to them on the phone why you don't pass unfiltered input into perl's open()

UBB had a whole bunch of fun security bugs that existed only because nobody at the time ever considered that people might be malicious. Like all of the data files were stored with the file extension .cgi because then when end users tried to view those files Apache would try running them as CGI scripts and that'd 500 on them. Oh also user data files were named after the username. The first line of the file was the canonical user name, the second line was the unencrypted password. Someone figured out that they can name themselves, say, #!/usr/bin/perl and that was pretty much the end of that as soon as they figured out the 100% predictable directory name for user data storage.

Same thing with not allowing parenthesis in URLs. That limitation was put in place as the most incredibly stupid and simple way to stop the XSS attacks of the day.

That entire product was a clusterfuck. That entire company was a clusterfuck and in the end they deserved to lose the market even if it meant that the internet had to deal with vBulletin instead.

McGlockenshire fucked around with this message at 02:46 on Sep 23, 2017

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

surebet posted:

i always wanted to buy that shirt and well google reverse image search really isn't helping here

same :(

surebet
Jan 10, 2013

avatar
specialist


anthonypants posted:

lol that it's an archive of the google cache

well i mean despite my repeated attempts, i've yet to master time travel so this will have to do lol

also fwiw archive.is apparently doesn't give a gently caress about robots.txt, which i'm making a mental note of

Shame Boy
Mar 2, 2010

McGlockenshire posted:

vBulletin existed in 1999 as a private port of UBB to PHP/MySQL by a Visual Basic community (vB, get it) but it wasn't a commercial product until 2001

UBB had a whole fuckton of vulnerabilities and they basically hired me because I ended up having to call them up and demonstrate to them on the phone why you don't pass unfiltered input into perl's open()

UBB had a whole bunch of fun security bugs that existed only because nobody at the time ever considered that people might be malicious. Like all of the data files were stored with the file extension .cgi because then when end users tried to view those files Apache would try running them as CGI scripts and that'd 500 on them. Oh also user data files were named after the username. The first line of the file was the canonical user name, the second line was the unencrypted password. Someone figured out that they can name themselves, say, #!/usr/bin/perl and that was pretty much the end of that as soon as they figured out the 100% predictable directory name for user data storage.

Same thing with not allowing parenthesis in URLs. That limitation was put in place as the most incredibly stupid and simple way to stop the XSS attacks of the day.

That entire product was a clusterfuck. That entire company was a clusterfuck and in the end they deserved to lose the market even if it meant that the internet had to deal with vBulletin instead.

it's adorable in its weird quaintness, like how old timey cars were shifted with three different pedals and had a lever for manually changing the ignition timing

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...
Xpost from grey forums

MrBling posted:

https://medium.freecodecamp.org/how-i-hacked-hundreds-of-companies-through-their-helpdesk-b7680ddc2d4c

that is some pretty impressive work and some fairly huge security holes in ticketing systems.

Lutha Mahtin
Oct 10, 2010

Your brokebrain sin is absolved...go and shitpost no more!

that's hella beer money for that little trick! gj guy

Wheany
Mar 17, 2006

Spinyahahahahahahahahahahahaha!

Doctor Rope

infernal machines posted:

the fact that there aren’t more high profile breaches of retail chains like target is purely because of the laziness of criminals

lazy millennials are killing the cybercrime industry.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

Wheany posted:

lazy millennials are killing the cybercrime industry.

Don't worry, plenty of Eastern European/Russian/Asian millennials are taking up the flag.

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

CommieGIR posted:

Don't worry, plenty of Eastern European/Russian/Asian millennials are taking up the flag.

Just register avoca.do as a hacking site and watch them flood in.

Chris Knight
Jun 5, 2002

me @ ur posts


Fun Shoe

Volmarias posted:

Xpost from grey forums

that's fantastic

Rat Poisson
Nov 6, 2010

the university rolled out a new system for making edits to the catalog and course descriptions.

login is your univ email address (first.lastname@school.edu) and we were all told to use the same password: school mascot + what i assume is some high level adminstrator's birth year (i.e. crimsontide68). suddenly it's really easy to login in as everyone in the approval chain (helpfully listed on the site) and shepherd your changes through to completion.

two weeks later they finally integrated our single sign-on and put a stop to that capability. one presumes that the unidentified admin probably uses that same password for everything else they do online.

Workaday Wizard
Oct 23, 2009

by Pragmatica
what's the thread opinion on qubes os? how does it compare to whonix or tails?

Adbot
ADBOT LOVES YOU

Rooney McNibnug
Sep 2, 2008

"Life always hopes. When a definite object cannot be outlined, the indomitable spirit of hope still impels the living mass to move toward something--something that shall somehow be better."

Shinku ABOOKEN posted:

what's the thread opinion on qubes os? how does it compare to whonix or tails?

Qubes OS is catered towards a need for security via compartmentalization and has a pretty slick management system for creating different VMs within the OS for this. It includes a Whonix gateway and workstation template VM by default, actually, and you can create a number of other VMs that throw all traffic through the tor network (including a throw-away one)

Tails is meant to run as a bootable USB (good anonymity in a pinch) where Qubes relies pretty highly on some hardware compatibilities and won't really work that way afaik.

Qubes was created primarily for security where Tails was created primarily for privacy - that obviously doesn't mean that they can't have both, but its something to keep in mind.

tl;dr - both are cool and good, but Qubes OS works better as a daily system where Tails is a "boot and bin"

Rooney McNibnug fucked around with this message at 09:21 on Sep 24, 2017

  • Locked thread