Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Pablo Bluth
Sep 7, 2007

I've made a huge mistake.

CyberPingu posted:

It's very fun though. Try hack me is also another great similar platform
I haven't got very far at the moment; just working my way through Starting Point. I went down a rabbit hole of trying to manually launch nc and powershell reverse shells via php and lost too many hours to what turned out to be noddy mistakes on my part...

Adbot
ADBOT LOVES YOU

CyberPingu
Sep 15, 2013


If you're not striving to improve, you'll end up going backwards.

Pablo Bluth posted:

I haven't got very far at the moment; just working my way through Starting Point. I went down a rabbit hole of trying to manually launch nc and powershell reverse shells via php and lost too many hours to what turned out to be noddy mistakes on my part...

This will be a lot of your experience with boxes.

The makers intentionally put rabbit holes on a lot of them to throw you off.

Which is actually fun to do in real life machines too tbh. But I hope no one ever gets to see any of my rabbit holes I've put on our infrastructure. Otherwise that means I hosed up somewhere else.

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
One upside: it just made me mindlessly do an nmap on my pi-hole, only to discover that when I was getting apticron configured to email me upgrade notifications, I'd accidentally installed a running postfix server....

Postfix gone and the firewall enabled & configured to catch any future mistakes...

Pablo Bluth fucked around with this message at 22:41 on Mar 15, 2021

spankmeister
Jun 15, 2008






One thing I _really_ dislike about debian based systems is that it always enables and immediately starts any service you install.

And then also apt by default installs recommended and suggested packages, which often can pull in all kinds of daemons like exim, apache, samba, whatever.

Not a good combo.

Cup Runneth Over
Aug 8, 2009

She said life's
Too short to worry
Life's too long to wait
It's too short
Not to love everybody
Life's too long to hate


Package managers in general, for all their usefulness, seem to have a lot of flaws.

Or maybe they're just more transparent about their flaws than Windows installers.

BlankSystemDaemon
Mar 13, 2009



spankmeister posted:

One thing I _really_ dislike about debian based systems is that it always enables and immediately starts any service you install.

And then also apt by default installs recommended and suggested packages, which often can pull in all kinds of daemons like exim, apache, samba, whatever.

Not a good combo.
How can this not be a giant red flag with every kind of warning sign next to it?

RFC2324
Jun 7, 2012

http 418

BlankSystemDaemon posted:

How can this not be a giant red flag with every kind of warning sign next to it?

Same way its totally not when java does it

People are dumb and don't realize how bad it is

BlankSystemDaemon
Mar 13, 2009



RFC2324 posted:

People are dumb
:yeah: and :same:

RFC2324
Jun 7, 2012

http 418


If I knew how bad it was do you think I would do it for a living?

gently caress no

BlankSystemDaemon
Mar 13, 2009



RFC2324 posted:

If I knew how bad it was do you think I would do it for a living?

gently caress no
Look at the bright side, you get to look to the camera and go "It's a living", like the intelligent talking dinosaurs, while the one that can't talk gets to sleep inside after his owner puts up a token fight.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug
As usual: To be in infosec, you'd better have a healthy sense of humor.

tacit
Aug 1, 2002

BlankSystemDaemon posted:

How can this not be a giant red flag with every kind of warning sign next to it?

DevOps: Hold my beer

Given the attempts that linux repo maintainers make to check the integrity of the code and still have issues, the fact that you can typo squat popular packages and get code running is just :suicide:

This post takes it one step further and looks for private packages in public code, then uploads a package with the same name into the public repo. And build systems by default will use the public package in preference over the private package source. :piss:

There is a paper here from MS talking about possible mitigations / best practices. But it's still not great for those in DevSecOps given their threat landscape probably needs to include the individual security of popular npm/pip package maintainers, given your build systems are going take any new version update without question. Not to mention what we've seen with popular chrome extensions etc once the maintainer loses interest and transfers ownership. . .

Cup Runneth Over
Aug 8, 2009

She said life's
Too short to worry
Life's too long to wait
It's too short
Not to love everybody
Life's too long to hate


Why on earth would you default to public packages anyway? Why ever take the public one over the custom, in-house one designed for the app being built specifically?

BlankSystemDaemon
Mar 13, 2009



tacit posted:

DevOps: Hold my beer

Given the attempts that linux repo maintainers make to check the integrity of the code and still have issues, the fact that you can typo squat popular packages and get code running is just :suicide:

This post takes it one step further and looks for private packages in public code, then uploads a package with the same name into the public repo. And build systems by default will use the public package in preference over the private package source. :piss:

There is a paper here from MS talking about possible mitigations / best practices. But it's still not great for those in DevSecOps given their threat landscape probably needs to include the individual security of popular npm/pip package maintainers, given your build systems are going take any new version update without question. Not to mention what we've seen with popular chrome extensions etc once the maintainer loses interest and transfers ownership. . .
Yeah, I saw it when it was initially making its rounds.

I've been trying to figure out ff FreeBSD Ports is susceptible to this, but I don't think so?
Firstly, because FreeBSD Ports relies on checksums, and at least for the packages built by the project, networking is completely turned off in the jails, so any dependency has to be already-satisfied by something that's been previously built by the same package builder.
Secondly, and this is mostly a result of the first, the porters have come up with some pretty creative ways of relying on the information supplied by the software itself.

It's not perfect, of course, as there's still a human involved somewhere - but in order to have commit access, there are some pretty strict requirements (at least compared to most other opensource projects, I'm told)

bolind
Jun 19, 2005



Pillbug
Uhm, hi. I'm in no way a security professional, but I do dabble in it as part of my job, and I have a fascination with it in sort of a spectator kind of way.

Last night I happened upon this video:

https://www.youtube.com/watch?v=_eSAF_qT_FY

Which is WELL worth a watch, IMO.

BlankSystemDaemon
Mar 13, 2009



bolind posted:

Uhm, hi. I'm in no way a security professional, but I do dabble in it as part of my job, and I have a fascination with it in sort of a spectator kind of way.

Last night I happened upon this video:

https://www.youtube.com/watch?v=_eSAF_qT_FY

Which is WELL worth a watch, IMO.
You absolutely need to follow Mark Ermolov and Maxim Goryachy - they tweet about fun stuff like this basically all week long. :allears:

Proteus Jones
Feb 28, 2013



That video is so good. Thanks for linking it.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

bolind posted:

Uhm, hi. I'm in no way a security professional, but I do dabble in it as part of my job, and I have a fascination with it in sort of a spectator kind of way.

Last night I happened upon this video:

https://www.youtube.com/watch?v=_eSAF_qT_FY

Which is WELL worth a watch, IMO.

That was a good one, and the last one I got to see in person.

bolind
Jun 19, 2005



Pillbug
Here's another one from a while ago. Not quite as impressive as the previous one, but I really dig the fact this was all done with QEMU and publicly available firmware images. Anyone with a computer made in the last decade and an internet connection could theoretically pull this off.

https://www.youtube.com/watch?v=B8DjTcANBx0

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

bolind posted:

Here's another one from a while ago. Not quite as impressive as the previous one, but I really dig the fact this was all done with QEMU and publicly available firmware images. Anyone with a computer made in the last decade and an internet connection could theoretically pull this off.

https://www.youtube.com/watch?v=B8DjTcANBx0

A couple of my favorites:

https://www.youtube.com/watch?v=5CzURm7OpAA
https://www.youtube.com/watch?v=oHf1vD5_b5I
https://www.youtube.com/watch?v=NG9Cg_vBKOg

Euphoriaphone
Aug 10, 2006


As a layman I really enjoyed these stories, but goddamn did the presentation not age well. I know Defcon presentation are usually dripping with sarcasm ('teh' in 2013?), but I don't think the fedora or abundant use of the word 'retard' were tongue-in-cheek.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

Euphoriaphone posted:

As a layman I really enjoyed these stories, but goddamn did the presentation not age well. I know Defcon presentation are usually dripping with sarcasm ('teh' in 2013?), but I don't think the fedora or abundant use of the word 'retard' were tongue-in-cheek.

True, a lot has changed in the years since.

klosterdev
Oct 10, 2006

Na na na na na na na na Batman!
The software that does the initial setup to bridge on-prem Exchange and Exchange Online got compromised https://practical365.com/blog/exchange-hcw-replaced/

BaseballPCHiker
Jan 16, 2006

This latest round of Exchange CVEs has been interesting to watch develop. My org was able to get patched within 24 hours of the patch release thankfully.

But we've seen a HUGE increase of incoming mail from known vendors/users that have had their Exchange servers compromised. We've broke the news to probably 5 other orgs that were vendors for us within the past week. Every single one of them has said some variation of "Yeah we know we need to patch just hadnt gotten to it yet". For one particular vendor at least this was the last strike and corporate has said we will no longer be doing business with them.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

BaseballPCHiker posted:

This latest round of Exchange CVEs has been interesting to watch develop. My org was able to get patched within 24 hours of the patch release thankfully.

But we've seen a HUGE increase of incoming mail from known vendors/users that have had their Exchange servers compromised. We've broke the news to probably 5 other orgs that were vendors for us within the past week. Every single one of them has said some variation of "Yeah we know we need to patch just hadnt gotten to it yet". For one particular vendor at least this was the last strike and corporate has said we will no longer be doing business with them.

The fun part is all the Infosec people just going "Well, just move to O365, problem solved!"

Buddy, they can't even PATCH on time, and you want them to jump into a multi-month project to migrate off on-prem exchange? Good loving luck. Help them patch, THEN encourage them to migrate. If they are struggling so much that patching is a pain, there's no way they likely have the bandwidth to up and move right now. But for most of these medium sized businesses, the cost for migrating is a huge hurdle. They still have to handle some of the management tasks of O365 too, so its not some silver bullet to suggest they move to O365.

Sickening
Jul 16, 2007

Black summer was the best summer.
Its not "can't" its "won't". Orgs like that are choosing service availability over data confidentiality. I am fine with them choosing their own destiny.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

Sickening posted:

Its not "can't" its "won't". Orgs like that are choosing service availability over data confidentiality. I am fine with them choosing their own destiny.

True, this happens too. But there is honestly a lot of clients I've worked with in the past week who REALLY are stretched thin or didn't even know they had on-prem exchange. We had one or two who did refuse to patch even when told they needed to, and yeah we washed our hands of it. But the vast majority wanted to patch.

Absurd Alhazred
Mar 27, 2010

by Athanatos
So is this the same F5 BIG-IP vulnerability being exploited or is this newer?

https://twitter.com/wugeej/status/1372392693989445635

CLAM DOWN
Feb 13, 2007




Absurd Alhazred posted:

So is this the same F5 BIG-IP vulnerability being exploited or is this newer?

https://twitter.com/wugeej/status/1372392693989445635

That's the iControl REST vuln I believe

Internet Explorer
Jun 1, 2005





BaseballPCHiker posted:

This latest round of Exchange CVEs has been interesting to watch develop. My org was able to get patched within 24 hours of the patch release thankfully.

But we've seen a HUGE increase of incoming mail from known vendors/users that have had their Exchange servers compromised. We've broke the news to probably 5 other orgs that were vendors for us within the past week. Every single one of them has said some variation of "Yeah we know we need to patch just hadnt gotten to it yet". For one particular vendor at least this was the last strike and corporate has said we will no longer be doing business with them.

It's also that the exploit had been in the wild for like 2 months before we knew about it or had a patch. A bunch of people likely had their entire AD infrastructure hacked.

Internet Explorer fucked around with this message at 17:28 on Mar 18, 2021

brains
May 12, 2004

BaseballPCHiker posted:

For one particular vendor at least this was the last strike and corporate has said we will no longer be doing business with them.

imo this is the only way to actually force anything to change. there have to be business consequences, a tangible impact to the bottom line, to not patching or using basic security practices. until companies are turned into pariahs for stuff like this, there won't be any industry-wide change.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

brains posted:

imo this is the only way to actually force anything to change. there have to be business consequences, a tangible impact to the bottom line, to not patching or using basic security practices. until companies are turned into pariahs for stuff like this, there won't be any industry-wide change.

Yup. Otherwise its the same old same old forever.

Internet Explorer
Jun 1, 2005





I absolutely agree with the premise, but I'm not sure HAFNIUM is the best example of "dumb idiots didn't patch." Maybe in your specific case, sure, but this exploit was out and being used long before there was a patch. And while it is a best practice to put an Edge Transport server in a perimeter network, it's still domain joined and it still uses AD LDS to talk to the domain. I'm not sure if that type of configuration was as dangerous if exploited as a full Exchange environment. I suspect not. If not, then the exploit wasn't the problem, the architecture was. But as we're seeing, everyone is scrambling for a reason, either because the "correct" architecture was still too dangerous when exploited, or because most places didn't have it architected "correctly." It has been a long time since I worked at a 1k+ person company, but I have never seen someone use an Edge Transport server in a perimeter network.

Internet Explorer fucked around with this message at 18:03 on Mar 18, 2021

evil_bunnY
Apr 2, 2003

Internet Explorer posted:

It's also that the exploit had been in the wild for like 2 months before we knew about it or had a patch. A bunch of people likely had their entire AD infrastructure hacked.
Bing bing. Everyone has to do remediation for exchange. Everyone.

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

bolind posted:

Uhm, hi. I'm in no way a security professional, but I do dabble in it as part of my job, and I have a fascination with it in sort of a spectator kind of way.

Last night I happened upon this video:

https://www.youtube.com/watch?v=_eSAF_qT_FY

Which is WELL worth a watch, IMO.

I was sitting on in this talk when it happened.

It was/is still a very wild ride. Reminds me of all those BASIC secret flags on systems like C64s and PETs where you poke addresses to trigger easter eggs/proof of creation signatures but ... gives you root.

Proteus Jones
Feb 28, 2013



EVIL Gibson posted:

I was sitting on in this talk when it happened.

It was/is still a very wild ride. Reminds me of all those BASIC secret flags on systems like C64s and PETs where you poke addresses to trigger easter eggs/proof of creation signatures but ... gives you root.

LOL, I had a similar reaction, but it made me think about deliberate track errors as copy protection for C64 floppy discs.

Sickening
Jul 16, 2007

Black summer was the best summer.
Dumb question time, is there a website that shows all the active unpatched vulnerabilities of windows server 2003?

brains
May 12, 2004

Sickening posted:

Dumb question time, is there a website that shows all the active unpatched vulnerabilities of windows server 2003?

lol backstory please

CyberPingu
Sep 15, 2013


If you're not striving to improve, you'll end up going backwards.

Sickening posted:

Dumb question time, is there a website that shows all the active unpatched vulnerabilities of windows server 2003?

Shodan technically....

Adbot
ADBOT LOVES YOU

Sickening
Jul 16, 2007

Black summer was the best summer.

brains posted:

lol backstory please

Its not really interesting. We acquired some companies and one of them have a few of these ancient shitters. I have researched this a bit before, but outside of the cve's posted by Microsoft, I feel like vulnerabilities of EOL servers just goes dark from the community at large when they go EOL.

A server being ancient EOL poo poo is enough for me to flag it as a no go, but I am curious what the known unpatched vulnerabilities are and it seems almost impossible to find per my googling.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply