Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Wiggly Wayne DDS
Sep 11, 2010



well go on

Adbot
ADBOT LOVES YOU

Internet Explorer
Jun 1, 2005





Has anyone heard anything odd with Instagram recently? My wife had someone log into her account from a different state. She didn't have MFA, but it was a unique password generated and stored from 1Pass. I asked if she had used it as SSO for another service or anything, thinking maybe she got phished that way, but she's saying no. And it's not like she's logging in to it on her computer. Not linked to Facebook, no Facebook account.

She got a text link the day before that looked like phishing from ig.me, but she ignored and marked as spam. Wouldn't Instagram be doing basic MFA and texting/emailing her if a new device logs in? She's saying it doesn't and the only way she knew that someone logged into her account was an email from IG saying someone had logged in from a new location and when she opened the app she saw it in the login history.

Internet Explorer fucked around with this message at 04:16 on May 30, 2022

Potato Salad
Oct 23, 2014

nobody cares


Could have gotten phished recently.

Could have been cred stuffed.

Insta has good auth security but they do have fuckups on the books. They seem to have a steady slow churn of fraudulent authentication attacks performed at scale and with no particular monetization scheme in mind. Just a steady burn of accounts getting compromised for no seemingly good reason.

Y'all need to make sure MFA is enforced.

Potato Salad fucked around with this message at 04:15 on Jun 1, 2022

Raymond T. Racing
Jun 11, 2019

Internet Explorer posted:

Has anyone heard anything odd with Instagram recently? My wife had someone log into her account from a different state. She didn't have MFA, but it was a unique password generated and stored from 1Pass. I asked if she had used it as SSO for another service or anything, thinking maybe she got phished that way, but she's saying no. And it's not like she's logging in to it on her computer. Not linked to Facebook, no Facebook account.

She got a text link the day before that looked like phishing from ig.me, but she ignored and marked as spam. Wouldn't Instagram be doing basic MFA and texting/emailing her if a new device logs in? She's saying it doesn't and the only way she knew that someone logged into her account was an email from IG saying someone had logged in from a new location and when she opened the app she saw it in the login history.

I've seen a few reports of this happening lately with the ig.me URL

some kinda jackal
Feb 25, 2003

 
 
Speaking of MFA, does Amazon really not give you an option to revoke TOTP authenticator devices?



I just added TOTP using Microsoft Authenticator because I was hoping that “add a new app” would invalidate what’s there now. I have no idea what the first of the “2 apps enrolled” is, don’t see anything in my inbox about an authenticator being enabled on my account.

Like, is my option really to disable MFA altogether and hope that wipes all existing QR codes? Amazon? Really?

I’m pretty meticulous about adding QR codes to my authenticator apps when I generate them so this is weird. I also screenshot my codes and store them in a temporary encrypted DMG that I dump onto two separate USB keys in my safety deposit box at my local bank branch. I guess I’ll have to see if I have an existing amazon one I forgot to add??

some kinda jackal fucked around with this message at 11:49 on Jun 1, 2022

SlowBloke
Aug 14, 2017

some kinda jackal posted:

Speaking of MFA, does Amazon really not give you an option to revoke TOTP authenticator devices?



I just added TOTP using Microsoft Authenticator because I was hoping that “add a new app” would invalidate what’s there now. I have no idea what the first of the “2 apps enrolled” is, don’t see anything in my inbox about an authenticator being enabled on my account.

Like, is my option really to disable MFA altogether and hope that wipes all existing QR codes? Amazon? Really?

I’m pretty meticulous about adding QR codes to my authenticator apps when I generate them so this is weird. I also screenshot my codes and store them in a temporary encrypted DMG that I dump onto two separate USB keys in my safety deposit box at my local bank branch. I guess I’ll have to see if I have an existing amazon one I forgot to add??

Affirm, you can only add new from the web page, to remove previous setups you need to shut down mfa and turn it back on again(i recently did that cause i wanted to re-enroll away from authy and into another app). Also no u2f even if aws does support it, which is perplexing.

Thwomp
Apr 10, 2003

BA-DUHHH

Grimey Drawer
Side question: any particular reason you are rolling away from Authy? Just curious as it’s my main personal Authenticator.

KozmoNaut
Apr 23, 2008

Happiness is a warm
Turbo Plasma Rifle


I like Aegis, which lets you export your vault and just has a better interface. It's on F-Droid.

Defenestrategy
Oct 24, 2010

Suggestion for IDS providers? Boss wants to move away from security onion, and I havent touched anything but that.

Sickening
Jul 16, 2007

Black summer was the best summer.

Defenestrategy posted:

Suggestion for IDS providers? Boss wants to move away from security onion, and I havent touched anything but that.

Picking an IDS is going to be pretty dependent on what your networks/systems look like and also your budget. What do you not like about security onion?

SlowBloke
Aug 14, 2017

Thwomp posted:

Side question: any particular reason you are rolling away from Authy? Just curious as it’s my main personal Authenticator.

Moving to yubico authenticator since i got a handful of 5Ci and never saved that specific qr code in my archives. It's not bad per se but i feel like it's a bit neglected by twilio (it never got any major new feature since the acquisition).

Mustache Ride
Sep 11, 2001



Defenestrategy posted:

Suggestion for IDS providers? Boss wants to move away from security onion, and I havent touched anything but that.

Corelight and Extrahop are the big ones. Corelight is just professional Bro Zeek, but also has Suricata built in like SecOnion. No Elastic stack though so you're on your own as far as logging.

Extrahop is pretty good, but expensive.

CLAM DOWN
Feb 13, 2007




Thwomp posted:

Side question: any particular reason you are rolling away from Authy? Just curious as it’s my main personal Authenticator.

I'm starting to move from Authy to Aegis because Authy's UI is atrocious.

Dans Macabre
Apr 24, 2004


What's the best way for me to secure a wordpress site to reduce the chance of someone logging in to the admin console?

So far:
1. Aggressive plugin review / no plugins
2. Have /wp-admin/ to allow only specific IP addresses (I would like to remove this rule, that's why I'm asking the question)
3. MFA
4. Monitor traffic to wp-login

Not an option:
1. Don't use wordpress


Thank you in advance goons

CLAM DOWN
Feb 13, 2007




nvrgrls posted:

What's the best way for me to secure a wordpress site to reduce the chance of someone logging in to the admin console?

So far:
1. Aggressive plugin review / no plugins
2. Have /wp-admin/ to allow only specific IP addresses (I would like to remove this rule, that's why I'm asking the question)
3. MFA
4. Monitor traffic to wp-login

Not an option:
1. Don't use wordpress


Thank you in advance goons

Given the number of vulnerabilities in Wordpress, #2 should be required.

Dans Macabre
Apr 24, 2004


CLAM DOWN posted:

Given the number of vulnerabilities in Wordpress, #2 should be required.

But all the "zero trust" buzz garbage says not to do that

CLAM DOWN
Feb 13, 2007




nvrgrls posted:

But all the "zero trust" buzz garbage says not to do that

"zero trust" describes the amount of trust I have in Wordpress' security state

Evis
Feb 28, 2007
Flying Spaghetti Monster

I’d probably set up an nginx reverse proxy or load balancer that just blocked access to that path. Also be careful to also block things like “///wp-admin” or “/../wp-admin” through canonicalization if that’s a concern with the system. I’d have to look into that bit more. When someone actually needed access to the admin interface they should get there through a VPN/bastion/proxy set up to only allow access to authorized users.

This is by no means what I do as my day job and I’m not an expert nor do I work with Wordpress, so there might be ways around this or easier options. I don’t claim this is sufficient.

Evis
Feb 28, 2007
Flying Spaghetti Monster

nvrgrls posted:

But all the "zero trust" buzz garbage says not to do that

I think if you wanted to do this in a zero trust way you should still block /wp-admin but allow access via an authorized proxy.

Dans Macabre
Apr 24, 2004


CLAM DOWN posted:

"zero trust" describes the amount of trust I have in Wordpress' security state

I mean... yeah. same.

Dans Macabre
Apr 24, 2004


Evis posted:

I’d probably set up an nginx reverse proxy or load balancer that just blocked access to that path. Also be careful to also block things like “///wp-admin” or “/../wp-admin” through canonicalization if that’s a concern with the system. I’d have to look into that bit more. When someone actually needed access to the admin interface they should get there through a VPN/bastion/proxy set up to only allow access to authorized users.

This is by no means what I do as my day job and I’m not an expert nor do I work with Wordpress, so there might be ways around this or easier options. I don’t claim this is sufficient.

Thank you!

BaseballPCHiker
Jan 16, 2006

nvrgrls posted:

What's the best way for me to secure a wordpress site to reduce the chance of someone logging in to the admin console?

Thank you in advance goons

As far as I can recall most/all recent Wordpress vulns have been tied to plugins, in recent memory at least.

some kinda jackal
Feb 25, 2003

 
 
If you have a WAF/DDoS service like cloudflare or imperva to throw in front of your external facing assets, you may have options there to enable a second challenge on certain URL paths. I hate relying on this kind of stuff but it might be a solution. Moving administration out-of-band or restricting the IP is probably the fastest hit though, zero trust be damned haha

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Wordpress itself is as solid as anything else at this point. Plug-ins are the path to pain.

Install Okta’s SAML auth plugin (:chloe:) and auth that way if you want tighter control.

Defenestrategy
Oct 24, 2010

Sickening posted:

Picking an IDS is going to be pretty dependent on what your networks/systems look like and also your budget. What do you not like about security onion?

I like it just fine, but we're looking to replace the system entirely as its gotten long in the tooth and my boss wants options beyond just building new seconion boxes.

Network is something like 3gbits of throughput and something like 600 clients/servers doing various dev tasks.

CLAM DOWN posted:

"zero trust" describes the amount of trust I have in Wordpress' security state

Also the amount of trust I have in anyones given definition of zero trust.

some kinda jackal
Feb 25, 2003

 
 
Zero trust *yanks ethernet cable*

CLAM DOWN
Feb 13, 2007




some kinda jackal posted:

Zero trust *yanks ethernet cable*

thread title

Absurd Alhazred
Mar 27, 2010

by Athanatos
This is bad, right? Have I missed a discussion of this?

Follina — a Microsoft Office code execution vulnerability

quote:

In English, So What

It’s a zero day allowing code execution in Office products. Historically, when there’s easy ways to execute code directly from Office, people use it to do bad things. This breaks the boundary of having macros disabled. Vendor detection is poor.

Dans Macabre
Apr 24, 2004


some kinda jackal posted:

Zero trust *yanks ethernet cable*

:hmmyes:

BaseballPCHiker
Jan 16, 2006

Absurd Alhazred posted:

This is bad, right? Have I missed a discussion of this?

Follina — a Microsoft Office code execution vulnerability

Detection right now isnt great. Theres a pretty simple GPO that can be enforced that makes a reg key change to mitigate in the meantime.

SlowBloke
Aug 14, 2017

BaseballPCHiker posted:

Detection right now isnt great. Theres a pretty simple GPO that can be enforced that makes a reg key change to mitigate in the meantime.

Also you can enforce it with intune/defender ASR if you prefer mdm/modern workplace.

stevewm
May 10, 2005
The GPO for disabling troubleshooters does work on this. It completely disables the msdt tool from executing which the vulnerability relies on.

Went ahead and applied to our entire domain after I tested it on a few machines.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

I hear office doesn’t run the dangerous code if you have the byte sequence 0x43, 0x49, 0x53, 0x53, 0x50 in your user preferences. Some kill switch thing, I guess.

Ynglaur
Oct 9, 2013

The Malta Conference, anyone?

some kinda jackal posted:

Zero trust *yanks ethernet cable*

CLAM DOWN posted:

thread title

BlankSystemDaemon
Mar 13, 2009



nvrgrls posted:

What's the best way for me to secure a wordpress site to reduce the chance of someone logging in to the admin console?

Thank you in advance goons
Evis touched on it some, but nginx reverse proxy would be my recommendation too - with the addition that I'd insist on putting LetsEncrypt and HTTP basic auth on it too.

You can limit it to just the admin area, of course - but it works for everything, including all manner of self-hosted services where you don't trust the authentication to be able to stand up to being exposed on the internet (which, unfortunately, is most of them).

The nginx implementation of HTTP basic auth can break too, of course - but it's pretty well-tested already, and if it gets broken, there's a bigger chance of a fix getting implemented quickly as it's used in a lot of places.

some kinda jackal posted:

Zero trust *yanks ethernet cable*
:emptyquote:

Internet Explorer
Jun 1, 2005





I got you.

Achmed Jones
Oct 16, 2004



Subjunctive posted:

I hear office doesn’t run the dangerous code if you have the byte sequence 0x43, 0x49, 0x53, 0x53, 0x50 in your user preferences. Some kill switch thing, I guess.

lol

CLAM DOWN
Feb 13, 2007




Subjunctive posted:

I hear office doesn’t run the dangerous code if you have the byte sequence 0x43, 0x49, 0x53, 0x53, 0x50 in your user preferences. Some kill switch thing, I guess.

sir

RFC2324
Jun 7, 2012

http 418

Subjunctive posted:

Wordpress itself is as solid as anything else at this point. Plug-ins are the path to pain.

Install Okta’s SAML auth plugin (:chloe:) and auth that way if you want tighter control.

speaking of stuff like okta, I recently found authelia. anyone know if its any good?

I don't want to deal with standing up an ldap server, but maybe I can find a little container to throw on the rpi

Adbot
ADBOT LOVES YOU

Diva Cupcake
Aug 15, 2005

lol. lmao. I think most orgs are using SaaS but still.
https://twitter.com/HackingLZ/status/1532480905335345152

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply