Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
mllaneza
Apr 28, 2007

Veteran, Bermuda Triangle Expeditionary Force, 1993-1952




Shumagorath posted:

I can’t believe how much the DoJ has weakened since the 90’s / 00’s such that Alphabet isn’t getting busted up for controlling the #1 browser, ad business, search, and video site. It’s just so utterly poisonous; all four of those products are demonstrably worse for it, and the synergy between two of them is actively pushing society off a cliff only slightly less energetically than Facebook.

It doesn't get a lot of attention, but Google has an active antitrust suit against them.

https://www.justice.gov/opa/pr/justice-department-sues-google-monopolizing-digital-advertising-technologies

Adbot
ADBOT LOVES YOU

App13
Dec 31, 2011

I’d be interested in some hot takes on working for defense contractors, ethics wise.

I’m former Navy and sort of a hippie so I’ve always dismissed the work off hand, but I’ll be damned if an incredibly enticing offer came in to be a ISSO for one that’s got me trying to do the mental gymnastics to justify it. It’s getting increasingly more difficult to ignore the defense sector as I get further into my infosec career

Achmed Jones
Oct 16, 2004



it's not actually hard to avoid the defense sector. it's super easy. if you take this job, it's because you want to, not because it's unavoidable. i dont really understand what that sector could offer in terms of defensive security. mediocre pay, time cards, etc. for offensive security, they do awesome poo poo but then you have the whole "did the exploit i developed kill someone" as a live and material question, which is why i did not accept an offer from raytheon. i dont really know why somebody would do defensive security work for defense contractors if they didn't also have a positive desire to be military-adjacent. of course it also makes sense as an "i need a job" sort of thing, but this ain't that

Thanks Ants
May 21, 2004

#essereFerrari


There's a world of difference between no company being truly moral and working for a company that develops products specifically designed to be dropped on people attending a wedding.

App13
Dec 31, 2011

I should specify that I’m in GRC, so in terms of that stuff the defense industry makes up 80-90% of job listings I see in my area. In GRC land the “cutting edge” is anything gov-adjacent it seems

I’m gainfully employed as a GRC goon for the pharmaceutical industry right now so I guess I don’t really have an ethics foot to stand on

Thanks Ants posted:

There's a world of difference between no company being truly moral and working for a company that develops products specifically designed to be dropped on people attending a wedding.

Yeah that’s a very very very good point. gently caress em (the defense industry, not the wedding goers)

Otis Reddit
Nov 14, 2006
it's possible to avoid blood money in our industry. you might just look harder, earn less, and have less bennies.

App13
Dec 31, 2011

Yeah gently caress it. Not about that life.

Thank you all for bringing me back from the brink. That was a close one.

Kesper North
Nov 3, 2011

EMERGENCY POWER TO PARTY

App13 posted:

I’d be interested in some hot takes on working for defense contractors, ethics wise.

I’m former Navy and sort of a hippie so I’ve always dismissed the work off hand, but I’ll be damned if an incredibly enticing offer came in to be a ISSO for one that’s got me trying to do the mental gymnastics to justify it. It’s getting increasingly more difficult to ignore the defense sector as I get further into my infosec career

If you're looking, you might consider my firm. Come help me secure local government and critical infrastructure (hospitals, power plants, water systems, etc), we're hiring for one GRC and one DFIR role. "Former navy, sort of a hippie" is our cultural jam, as long as you don't mind punk rock; work/life balance is pretty good, and the work is honest, meaningful, impactful stuff. The work is fully remote. Clearances are nice but in no way required. Drop me a PM if you're interested.

Same goes for anyone else looking in those areas.

Shumagorath
Jun 6, 2001
I just got a LastPass breach incident update to the security notice e-mail of the account I closed a week ago. gg guys

Keito
Jul 21, 2005

WHAT DO I CHOOSE ?

Shumagorath posted:

I just got a LastPass breach incident update to the security notice e-mail of the account I closed a week ago. gg guys

Well if you closed the account a week ago you would still have been affected by the breach which happened much earlier, no?

SlapActionJackson
Jul 27, 2006

I did it fellas - migrated almost 300 passwords off of Lastpass into Bitwarden. Changed about 200 of them, decided the rest was cruft I didn't care about and will leave my accounts at bobspurpletoasters.com and the like to fate.

Goddamn that is an enormous pain in the rear end and I hope I never have to do it again. So many sites are just dumb or hostile about security.

Lots of places with maximum password lengths
Lots of places with short max lengths. 24, 20, 16, 12 are still common out there, and it is completely goddamn pointless.
Almost everybody enforcing the wrong kind of password complexity requirements
Almost nobody has a "delete account" option - this would really be helpful for cleaning up that cruft
"Change my password" is often well hidden
Some site designs don't offer it at all, and I had to use forgot-my-password flows to effect a change

Bitwarden is better than LastPass at completing form fills, but not as good as recognizing change-of-password events.

All in all, a land of contrasts, 2/10, do not recommend, breaches suck rear end.

Shumagorath
Jun 6, 2001
I never like leaving accounts to rot. Taking out the digital trash is satisfying and my password migration was a great opportunity to have my various e-mail aliases in that many fewer places.

I definitely agree with you that LastPass was the king of recognizing password creation and changes, but wow if they weren’t terrible at the rest. Just shutter the vault business and get into malicious javascript (but I repeat myself….)

Come to think of it I kinda wish I’d gone full Proton and aliased everything instead of having however many buckets my current provider allows.

Ynglaur
Oct 9, 2013

The Malta Conference, anyone?
Do that and you'll learn how many sites think the + character isn't allowed in email addresses. :shepface:

Euphoriaphone
Aug 10, 2006

I migrated my passwords to Dashlane recently and one thing about the Dashlane iOS mobile app that’s miles ahead of LastPass is it will recognize when you’re autofilling on a site that isn’t associated with your password and ask if you want to link it.

I originally began using LastPass from a Keepass migration. I didn’t have any URLs linked to my Keepasd logins, so it’s great to have Dashlane prompt me to clean up those missing details.

Work has migrated us from LastPass to 1password, so I’m experiencing using both services. 1password has a cleaner look and its OTP integration is great for shared work accounts (definitely less safe for security but gently caress it, it’s not my data anyway). However, I’m really hating the desktop app integration with the browser extension.

AlternateAccount
Apr 25, 2005
FYGM
Thanks, Microsoft. You fuckin' turds.

Sickening
Jul 16, 2007

Black summer was the best summer.

AlternateAccount posted:

Thanks, Microsoft. You fuckin' turds.

What now?

cr0y
Mar 24, 2005




9.8 cve for outlook

Wizard of the Deep
Sep 25, 2005

Another productive workday
I thought you were talking about CVE-2023-23415, which is a Remote Code Execution vulnerability in Microsoft's Ping, but yea, the Outlook one isn't great either.

Sickening
Jul 16, 2007

Black summer was the best summer.

Wizard of the Deep posted:

I thought you were talking about CVE-2023-23415, which is a Remote Code Execution vulnerability in Microsoft's Ping, but yea, the Outlook one isn't great either.

The outlook one is horrible.

https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-outlook-zero-day-used-by-russian-hackers-since-april-2022/

If you have exchange online, i would run that script asap.

AlternateAccount
Apr 25, 2005
FYGM

Sickening posted:

If you have exchange online, i would run that script asap.

Start now. It's not fast.

Sickening
Jul 16, 2007

Black summer was the best summer.

AlternateAccount posted:

Start now. It's not fast.

You are using a shared compute spaces that a lot of orgs are all now using all at once.

FungiCap
Jul 23, 2007

Let's all just calm down and put on our thinking caps.
Well, I suppose we were due.

Obviously if you allow 445 outbound to the internet, fix that. but in this case since the path to the attacker server is attacker defined it's leveragable if they have a foothold elsewhere on your network to send the NTLM hash to while triggering it externally via e-mail.

Pretty neat, would use in an assessment, 10/10.

FungiCap fucked around with this message at 17:43 on Mar 15, 2023

Thanks Ants
May 21, 2004

#essereFerrari


:sludgepal:

Sickening
Jul 16, 2007

Black summer was the best summer.

FungiCap posted:

Well, I suppose we were due.

Obviously if you allow 445 outbound to the internet, fix that. but in this case since the path to the attacker server is attacker defined it's leveragable if they have a foothold elsewhere on your network to send the NTLM hash to while triggering it externally via e-mail.

Pretty neat, would use in an assessment, 10/10.

A lot of people working from home these days. And this all hinges on if windows firewall allows this by default, which I am pretty sure it does.

cr0y
Mar 24, 2005



Do we have a cool name for this one yet, I propose "Look out!"

i am a moron
Nov 12, 2020

"I think if there’s one thing we can all agree on it’s that Penn State and Michigan both suck and are garbage and it’s hilarious Michigan fans are freaking out thinking this is their natty window when they can’t even beat a B12 team in the playoffs lmao"
:thunk: isn’t NTLM old and busted and known to be vulnerable or was it some other dumb MS authentication I was disabling when I used to do windows OS work

cr0y
Mar 24, 2005



i am a moron posted:

:thunk: isn’t NTLM old and busted and known to be vulnerable or was it some other dumb MS authentication I was disabling when I used to do windows OS work

You're going to have to be more specific with some other dumb Microsoft authentication, but yes ntlm is deprecated.

It's reported that this has been around for a year, mostly targeting European industrial control and military.

FungiCap
Jul 23, 2007

Let's all just calm down and put on our thinking caps.
POC exists, it's simple to execute. Patch now, it will definitely be exploited.

https://www.mdsec.co.uk/2023/03/exploiting-cve-2023-23397-microsoft-outlook-elevation-of-privilege-vulnerability/

NTLM authentication is horrible and outdated but still exists everywhere because Microsoft values backwards compatibility over security.

Proud Christian Mom
Dec 20, 2006
READING COMPREHENSION IS HARD
okay thats insanely cool

cr0y
Mar 24, 2005



Proud Christian Mom posted:

okay thats insanely cool

Reminds me of doing {s /con/con in AOL

Shumagorath
Jun 6, 2001
Fuzzy recollection here, but can't anyone on the domain dump out NTLM hashes or does it require local / domain admin?

I found this but it's a bit dated: https://0xdedinfosec.github.io/pages/windows-decryption/

... and then the main weakness being that you can hashcat your way through NTLM with a toaster?

FungiCap
Jul 23, 2007

Let's all just calm down and put on our thinking caps.

Shumagorath posted:

Fuzzy recollection here, but can't anyone on the domain dump out NTLM hashes or does it require local / domain admin?

I found this but it's a bit dated: https://0xdedinfosec.github.io/pages/windows-decryption/

... and then the main weakness being that you can hashcat your way through NTLM with a toaster?

Generally, you need to be admin/system to pull the hashes from a windows computer, but that's just the local hashes. What most hackers want to do is obtain NTLM hashes of other users in the network that may have access to their end-goal (whatever it may be, domain admin account for example).

There have been many ways to do this in the past, like with a tool called responder that can be mitigated. NTLM hashes are a weak algo and you can achieve very high hash rates for cracking, but beyond that, even if you don't crack them they are usable via pass-the-hash.

This is a new way to pull NTLM hashes, and can be triggered remotely (and SPECIFICALLY for the user you want to steal from) which is what makes it unique and interesting.

Edit: Sorry to answer your question directly, no a normal domain user can't just pull NTLM hashes of other users in the domain with regular permissions without some type of exploitation (unless it's cached locally and they have local admin).

FungiCap fucked around with this message at 18:32 on Mar 15, 2023

spankmeister
Jun 15, 2008






Enticing SMB authentications does not give you plain NTLM hashes. It's a challenge-response thing. Having the hash is as good as the password, but an NTLMv2-SSP often needs to be cracked before it is useful. Yes you can relay NTLM in some cases but usually not from the outside.

cr0y
Mar 24, 2005



spankmeister posted:

Enticing SMB authentications does not give you plain NTLM hashes. It's a challenge-response thing. Having the hash is as good as the password, but an NTLMv2-SSP often needs to be cracked before it is useful. Yes you can relay NTLM in some cases but usually not from the outside.

This makes me wonder if this was just one link in the chain and the attacker already had something else compromised that could be used to pivot.

FungiCap
Jul 23, 2007

Let's all just calm down and put on our thinking caps.

cr0y posted:

This makes me wonder if this was just one link in the chain and the attacker already had something else compromised that could be used to pivot.

100% a golden pivot opportunity. Falcon Crowdstrike engineer stating they aren't sure it will be detected if used right now : ).

cr0y
Mar 24, 2005



FungiCap posted:

100% a golden pivot opportunity. Falcon Crowdstrike engineer stating they aren't sure it will be detected if used right now : ).

Furthermore if something else was already compromised that could host SMB to receive the malicious call from the mail client. In big environments I wouldn't think that outbound SMB to the public internet would be open but you know...

Yea, pretty nasty all around.

AlternateAccount
Apr 25, 2005
FYGM
Considering deploying a firewall policy to block all 445 outbound traffic from company machines to non-private IP space. Like... just in general, seems like common sense.

Sickening
Jul 16, 2007

Black summer was the best summer.

AlternateAccount posted:

Considering deploying a firewall policy to block all 445 outbound traffic from company machines to non-private IP space. Like... just in general, seems like common sense.

Its something that is easy to say but not easy to actually do. Workstation firewall management can be a lot of loving pain in the rear end poo poo to configure and support. I would say a lot of companies end up with results of being too restrictive and creating too many support tickets, or not being restrictive enough and getting into these situations.

spankmeister
Jun 15, 2008






That's why you should block outbound 445 at the perimeter, not on individual machines.


Business need for your dudebro marketing software rawdogging smb over the internet? Tough luck, get a vpn.

Adbot
ADBOT LOVES YOU

Internet Explorer
Jun 1, 2005





How does blocking at the perimeter work when 90% of your userbase is at home? Some ISPs do, but that's obviously not something you want to rely on. InfoSec isn't my area of speciality, but to me, relying on the perimeter seems old and dated.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply