Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
I listen out of curiosity rather than any relevance to anything I do, but I've take to listening to the weekly Risky Business podcast on my way to work and find most of it pretty interesting.

https://risky.biz/

Adbot
ADBOT LOVES YOU

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
An article about Google's AMP.
http://www.salon.com/2017/09/24/russian-hackers-exploited-a-google-flaw-and-google-wont-fix-it/

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
It seems to me the security of mailing stuff also depends on the the of type of letterbox prevalent in your country. Nearly all mail in the UK is delivered through slots in front doors, making it harder to intercept mail compared to the roadside boxes that television and movies tell me dominate rural and suburban america.

Fraudsters have been experimenting with sticking fake letterboxes to the outside of houses.
http://www.manchestereveningnews.co.uk/news/greater-manchester-news/fraudsters-glueing-fake-letter-boxes-11435864

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
So rogue SMB servers can bypass Windows Defender by feeding a different clean file to Defender before delivering the real payload for running, and MS consider fixing this a "feature request". I can't claim to be an expert in the field, but making sure sure you're scanning a copy of what's actually going to be run/opened seems like a key step.

edit: forgot the link
https://www.bleepingcomputer.com/news/security/new-illusion-gap-attack-bypasses-windows-defender-scans/

Pablo Bluth fucked around with this message at 21:48 on Oct 1, 2017

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
The Hollywood Move would be to turn up to the meeting with the personal details of everyone else in the room and point out that under their proposal you'd now have a loan out in their name.

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
GnuPG who weren't contacted by the original team but have seen the paper hath spoken...

https://lists.gnupg.org/pipermail/gnupg-users/2018-May/060315.html

The EmbargoFAIL website is now up....
http://email.de

Pablo Bluth fucked around with this message at 11:14 on May 14, 2018

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
Got an email a short while ago to say I'd been 'pwd.
https://www.troyhunt.com/the-773-million-record-collection-1-data-reach/

However as he can't/won't provide any information about the password, it's a frustrating bit of knowledge. I think blissful ignorance was more pleasant! Fortunately I don't have that many accounts using that email so I'm just updating them all and making sure they're long lones. Hoping it's just an old password from simpler times that is floating around and has been repacked in to a new collection.

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
There's been another dozy... In an alert from haveibeenpwned:

Breach: Verifications.io
Date of breach: 25 Feb 2019
Number of accounts: 763,117,241
Compromised data: Dates of birth, Email addresses, Employers, Genders, Geographic locations, IP addresses, Job titles, Names, Phone numbers, Physical addresses
Description: In February 2019, the email address validation service verifications.io suffered a data breach. Discovered by Bob Diachenko and Vinny Troia, the breach was due to the data being stored in a MongoDB instance left publicly facing without a password and resulted in 763 million unique email addresses being exposed. Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. The Verifications.io website went offline during the disclosure process, although an archived copy remains viewable.

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
I got a haveibeenpwned email, as the dump from the previously announced 500px hack has now turned up.

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
Marcus Hutchins aka @MalwareTech has been released on time-served with a years probation that can be served in the UK.

https://techcrunch.com/2019/07/26/m...iaC26ItolTaYuMQ

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.

Combat Pretzel posted:

What I want is PiHole on my VPN polling stuff via DoH from a trustworthy provider?
Like this?
https://docs.pi-hole.net/guides/dns-over-https/

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
And most smaller sites are on shared hosting with lots of sites behind the same IP address. Was the person visit the site of a local restaurant or the local furry community?

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
Yet another huge data breach...
https://www.wired.com/story/billion-records-exposed-online/

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
Unpatched Samba flaw now public...
https://arstechnica.com/information-technology/2020/03/windows-has-a-new-wormable-vulnerability-and-theres-no-patch-in-sight/

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
I always forget that SMB isn't pronounced Samba...

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
I don't think I'll be installing Tiktok (not that I had any desire to)
https://www.boredpanda.com/tik-tok-reverse-engineered-data-information-collecting/
https://arstechnica.com/gadgets/2020/06/tiktok-and-53-other-ios-apps-still-snoop-your-sensitive-clipboard-data/

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
There's been a take down of a criminal-exclusive encrypted communication network.
https://www.theguardian.com/uk-news/2020/jul/02/blow-for-uk-organised-as-command-and-control-network-is-hit

I think this falls in the 'Don't put all your eggs in the same basket' clause of DON'T ROLL YOUR OWN CRYPTO.

Edit:
https://www.vice.com/en_uk/article/3aza95/how-police-secretly-took-over-a-global-phone-network-for-organised-crime

Pablo Bluth fucked around with this message at 13:02 on Jul 2, 2020

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.

CyberPingu posted:

Well it's owned by China's own brand of white supremacists I guess.
Han supremacists.

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
My last year of school had a PC in the student common room running what must have been Win95 plus some third party security program that was meant to lock it down to a few approved programs. I think it took me a few days to figure out a way of using a Word macro to launch a command prompt that eventually let me re-enable safe boot and ultimately disable the lockdown program. Reboot and PC and use it to play games instead. I don't think they ever figured out who was doing it or how...

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.

Internet Explorer posted:

I know this has been done before, but I feel like it's been a while. What 3 resources would you all recommend for IT generalists who want to stay up to speed on InfoSec stuff? I feel like I get enough through osmosis these days, but I want something that I can recommend to colleagues who aren't as plugged in.
I don't know if it's what your after but I find the Risky Business podcast an interesting listen.
https://risky.biz/

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
I used to use X-Forwarded-For to get around the geoblocking on Comedy Central videos and was sad when they finally fixed it.

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
I have a .co domain so every exchange if my email address has to include the discussion 'not dot UK?'

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
What are the odds that this wasn't known as a zero day by at least one of the major state-backed hacking groups?

BlankSystemDaemon posted:

Nah, there's going to be a new fun bug in Windows any day now.

No matter how much pair programming, code review, static analysis, automated fuzzing, and automated code sanitization you do, it won't be enough.

Just look at FreeBSD; all of those are practiced, the source code is "only" ~13 million lines, and yet there's inevitably more fun things like this to find.

For comparison, the Linux kernel itself is over 20 million lines (and that ignores all the userland code that makes up the libraries and utilities in a typical Linux distribution, because as an example Debian is ~60 million lines if you exclude the kernel), while Windows is estimated to be over 100 million lines.

The sudo project is ~150k lines of code.

Assuming a standard developer makes one bug per 100 lines of code, a good developer makes one bug per 1000 lines of code, and the ratio being 100 standard developers to 1 good developers, that leaves the various examples with somewhere on the order of 130k bugs for FreeBSD, 250k bugs for the Linux kernel, 600k bugs for Debian, over a million bugs for Windows, and ~1500 for sudo.
The thing that surprises me about sudo is that there's no independent check for raising the privilege level. It's just granted root when it's run and assumed to be trustworthy (where it turns out it's not been trustworthy for nine years...).

I do wonder what a modern from-the-ground-up OS where security was the over-riding factor, would look like. Where every design decision is about treating all code as untrustworthy, limiting everything only to the designed behaviour and having multiple independent checking mechanisms.

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.

The Fool posted:

Seems like a lot of work when you could just turn your computer off.
But how do I then grow my porn collection from Russian web forums? I demand a OS where I can run sex-orgy-game-3D-[RU].exe safely without having to worry....

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
I've just started playing around with HackTheBox. It's a terrible time-sink...

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.

CyberPingu posted:

It's very fun though. Try hack me is also another great similar platform
I haven't got very far at the moment; just working my way through Starting Point. I went down a rabbit hole of trying to manually launch nc and powershell reverse shells via php and lost too many hours to what turned out to be noddy mistakes on my part...

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
One upside: it just made me mindlessly do an nmap on my pi-hole, only to discover that when I was getting apticron configured to email me upgrade notifications, I'd accidentally installed a running postfix server....

Postfix gone and the firewall enabled & configured to catch any future mistakes...

Pablo Bluth fucked around with this message at 22:41 on Mar 15, 2021

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
Just use exploit-db .com to search for all the exploits that have in-the-wild exploitation code.

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.

EVIL Gibson posted:

code:
sudo apt update && sudo apt -y install exploitdb
Or just use Kali Linux and it's all there...

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.

CommieGIR posted:

You mean broken Linux.
I only use Kali inside a VM for playing HackTheBox but I can't say I've found it broken in any sense. Wildly inappropriate as a main OS but fine for it's niche.

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
Having got in to HackTheBox, it's amazing how much of the request for help in the official forum is "I want to do X and it's not working. WHY?" pleas. The sort of zero-detail help-ticket I'd expect my Mum to write. So I can believe that 75% of the Kali userbase is 14 year-olds who have mistaken themselves for Elliot Alderson.

Pablo Bluth fucked around with this message at 01:21 on Mar 25, 2021

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
Kali should be run as a VM on top of Hannah Montana Linux.

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
Isn't AWS a dumpster fire of badly configured permission due to the spiderweb of services and configurations?

Pablo Bluth fucked around with this message at 02:06 on Mar 31, 2021

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
Dumpster fire was perhaps too strong. I'm not a AWS user (other than one time playing with the free tier) but when I listen to the Risky.Biz infosec podcast, misconfigured AWS seems to be a perennial problem. Perhaps I'm just remembering the early years too much and it's better it's now more mature?

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
If you can compromise their pc, just replace the exe with a version that uploads everything the first time you unlock it.

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
Isn't GPG a dumpster fire of overcomplexity and outdated design that people want to go away but won't?

Is there a decent file encryption tool based on libsodium?

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
The Guardian are doing a big thing on spyware
https://www.theguardian.com/news/2021/jul/18/huge-data-leak-shatters-lie-innocent-need-not-fear-surveillance

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
I assume that despite it's privileged execution status, the windows print spooler is a horrendous wobbly tower of legacy code with a core design that dates back to 3.11, and if Microsoft tries to do a ground-up replacement, it'd break every printer out there because trying to get the printer manufacturers new, high quality drivers would be like herding cats?

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
I often listen to the Risky Business podcast, and every so often the guy behind thinkst canary is on the show. How well do canaries work in the real world? Perhaps not surprisingly, there's not too many people shouting about finding out their network is being owned...

Adbot
ADBOT LOVES YOU

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.

BaseballPCHiker posted:

I've actually used them before and had a whole project getting it spun up.

The way we used it (I was working local government for many cities/orgs at the time) was to create tokens and place them in file servers here and there. We supported a lot of police and fire departments, public utilities, etc. So we made tokens that looked like police officer address spreadsheets or utility SCADA diagrams, and we'd place them in directories that people had access too but would've had to go out of their way to get to. So for example all of the users in the PD had access to a shared drive that was something like G:\Whatever Town\Police\. We'd put the token in G:\Whatever Town\HR\Police\token.xls. The mapped drives would go straight to police but people could browse to HR\Police and poke around.

We only ever caught employees snooping around. The alerting worked well and I was happy with the setup and how the canaries performed when triggered.
It'd be interesting to know how well they work against the top-tier APT crews. I can see them being useful against automated ransomware and naïve rummagers, but can they be insidious enough that enough the smartest Russian/Chinese/US/Israeli hacker can't help but trip over them even if they're looking for them?

I can see the samba server and AWS tokens being hard to tell without having the bit the bullet and try them. On the other hand, stuff like the Excel canary tokens seem like they risk showing your hand, allowing a smart actor to notice the token without triggering it.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply