Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo
I use KeePass 2. I store the file on Google Drive with password and a 2048 bit cert I transfer manually to all devices/laptops (ie, never touches storage controlled by a third party).

I know Google Drive is a third-party so why am I using it and the answer is it's easier to access than Dropbox for me in Android/Windows/Linux.

General question for you out there. I have a bug I've been meaning to write up for a Cisco product. Do I contact them even if I no longer have access to the device to retest (took a new job)? The only CVE's I've written is when I still had access to the device at the end.

Adbot
ADBOT LOVES YOU

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

Magnetic North posted:

Since you were talking password managers, and I asked in the android thread with no luck, I figured I'd ask here.

I use Password Safe. I started keeping my safe on my Android phone because I needed to access my passwords on multiple computers. I used to be able to just hook it up, use USB Mass Storage to access the phone like a drive, and open my safe. That doesn't work the same way with my new phone, since it uses MTP; Password Safe doesn't want to access it from the phone, possibly because it's a device and not a drive, so there is no path? I'm not honestly sure. I could copy it each time I wanted to use it, but the idea is to consolidate the location so I don't accidentally overwrite some new entry by mistake.

Is there a way to restore or replicate my old functionality with Password Safe? While I would like to avoid migrating, I will if I have to, and would appreciate any suggestions for what to migrate to. (I see mention of KeePass as an open source option, which I will look into.)

Drive will work. Each time you access your file from drive it makes a temp file of the latest version of the file. The issue is then you can't save it because its temp. I am not sure you can save back to drive on Android.

In my case, I don't change my passwords fast enough that when I do its on my pc. I save the new file there and then I have access to the new one.

Does your password storage app use certs as well along with password auth?

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

Magnetic North posted:

I guess I will mess with Drive to see if Password Safe will play nice with it.


I believe Password Safe encrypts by default? I mean, I don't see an option that says "encrypt vault" but Wikipedia says it encrypts.


I'm sorry, but I don't fully understand what this means.

It means you can make it so it also requires your private keyfile that you manually configure on the clients since it is also encrypted with your public

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

PBS posted:

If you log into a website with a user id and an rsa token (generated on a laptop / mobile, using a pin), would the login to the website be considered 2fa?

It seems to meet the requirements. (something you have, something you know)


No. For proper 2fa you need something you know (password) and something you have (token).

The userid can easily not be something you only know especially in an environment that combines first names and last names for the username or where you publicly post.

edit: example: I am John Anthony Smith. You are Angela Julia Faraday. My user name is "jasmith". I take Angea's token. Just because I happen to know that her username is most likely "ajfaraday" is not enough to satisfy "something you know". It is better said as "something you privetly know" or in most cases password.

Just don't be like some sites I've assessed where they used tokens and replaced the "you know" password with a grid of images so you select the one that you picked during account creation or something Web 2.0.

EVIL Gibson fucked around with this message at 00:38 on Feb 16, 2016

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

PBS posted:

So if your PIN is 123456, you input this into the SecureID token client and it will spit out something like 01923227.

Go back to the webpage, enter userid in userid field, enter 01923227 in the passcode field, hit login.


Where/how/why is doing the calculation to take "123456" to "01923227". Where in relation to the application requiring the authentication. How is it converting a the FOB token to 01923227. And why exactly is the client requirement to come up with something like this?

Just from thinking of what your system is trying to do you are going to a get a lot more problems of people passing token time outs while they go through this conga-line of confusion.

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

Dex posted:

his application isn't involved in this part of the chain, it's all rsa securid and their client software. i'd suggest reading their docs if you're curious about the how and why of it

You are right. I remember one place where I used a personal pin plus token to log into the vpn. Then I moved a place that connected your password (really the hash I think) from your ad creds to the token device. The apparent usefulness this got was that this place was on the ball in removing people from ad so that removing the user meant their token could no longer be used because they no longer existed. Plus the other bonus is that the user password follows the password policy is also applied to the pin.

I had a pin for the token for about 24 months and I only changed it when I lost the drat thing.

Edit: of course you need to keep the ad and the rsa servers

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

deep impact on vhs posted:

can confirm that it's awful, we have one in place where i work now.

i hate it. :colbert:

I found a Cisco device where, without any creds on the login page, could run commands on the server, as root, through the password field.

I use it for a demonstration (while not mentioning the product or model) of why you sanitization is a thing when dealing with user input.

Same box also allowed me to change a password without knowing the previous password by making sure the pass auth response was changed a "false" to "true" (easy to do with Burp Suite) to submit back to the server.

In summary, it is like saying I give the guy that checks my previous password garbage and he tells me to gently caress off. I step to the next guy in the process who asks me what the previous guy said about me and I tell him the other guy just loved me.

"Everything checks out, your password is changed."

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo
So here's a random tool I always use when scoping out a target; Bing.

Stop laughing.

But really, Bing has a feature no other search engine out there has including Google. It gives the user the ability to search for domains by IP.

Why is this useful? It gives possible ways to get into the target domain via another vulnerable domain.

So the sequence of events that have to happen is

1) The target site is fully patched
2) The target site is on a shared-host with a site (it could be a firewall rule giving the sites the same IP remember), let's call it the side-target, that is not fully patched (Wordpress, Drupal are super good targets)
3) The side-target installation has a path traversal issue or the ability to run remote commands via the site
4) If there is no virtualization or weak very sandboxing.
5) Compromising the side-target can allow for access to the host all the sites are served on including your target


Bing lets you get a bit of Shodan functionality for free.

Type the following to Bing search for where SA is hosted at.

code:
ip:104.25.246.12
Now admire how many gambling site and dentists sites are hosted on the same IP as Senor Lowtax

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

Rufus Ping posted:

That's cloudflare you idiot

It's an example you idiot.

Meaning, IT WOULDN'T WORK IN THIS CASE

But it's not like anyone sets up other domains such a private github account on the same ip, or maybe a monitoring web app, or everything to add to the stupidity of IoT.

If you do not understand this, sorry!

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

OSI bean dip posted:

Not-quite-a-SIEM-but-almost-good-enough but Splunk has a cloud solution.

Splunk can be difficult to set up to pull in data from various logtypes, and massaging it correctly so it doesn't run the peg the CPU by indexing all the time, but once it's going it goes great especially when running correlations.

I have not used/configured it, but I heard FireEye TAP works really well.

Make sure to research and include the costs of pushing your logs/events into the cost. If you generate lots of events and want to push them all to the cloud, it can wipe out the savings.

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo
Guy found a bank mobile app had a method that didn't check if the user actually had access to an account. This is the kind of stuff you would find in a Very Vulnerable Web App by OWASP where you think, "Who would actually program the application like this?".

https://boris.in/blog/2016/the-bank-job/

The guy did a few very bad things that if he did in the states, he would be in federal prison. Things like using accounts not owned by him for tests (he did mention he used family accounts but that is not him) or threatening for some kind of bug bounty.




Powered Descent posted:

I don't know about easily, though of course only the spooks know for sure.

A method they've used in the past is that if you go to a site they control (be it a regular website or illegalsitethefedstotallydidnttakecontrolof.onion), and if you're using an older version of torbrowser, they can use an exploit in that browser to make it connect to somewhere in the clear (instead of via tor), thus revealing your actual IP. So of course it seems to me that the way to protect yourself from that (apart from being sure you have the latest version of everything) would be to have a physically separate tor router. Then the computer running your actual browser could be owned to hell and back and it wouldn't matter, the ONLY connection it has to the outside world is through tor and it has no way of even determining its own actual public IP. (Building a raspberry pi into an anonymizing middlebox is an easy and educational little project. Try it yourself.)

:arghfist::nsamad:

Heard stories that investigations with a mission to track down and nail users trying to look up insidious sites like kiddie porn hosts that there were a good portion of users who would burn all creds as soon as they think anything is going funny. Things like the pages changing a bit, weird private messages they received, or even if they are being routed weirdly. Hard to pin down.

But this does not stop from random Joe Smoe treating Tor like the internet and sees no cause for alarm in putting their real full names, addresses, or phones into a page if the site requests it. That is the type of user that keeps getting nailed because it's the lowest branch but with the difference a lot of people hang around that level.

EVIL Gibson fucked around with this message at 21:56 on May 18, 2016

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

Cugel the Clever posted:

No--I entered my password on account creation and then it emailed it back to the address I provided. Isn't that particularly awful security policy?



To be specific, it means they are storing your password in the clear ready to become the next rock you.txt. doesn't sound like they are expecting you to change it like a normal one time use pass.

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

Subjunctive posted:

It's much easier to get hostile content into a browser than into an app, and typically that hostile content operates in a more flexible environment (scripting, wide access to system APIs). Faked email, Twitter "viruses", compromised ad networks, takeover of non-https sites on public wifi, site hacking. Even if an app exposes a URL scheme, it tends to be quite narrow.

I think WebBT is fine and necessary, but it's definitely a different security landscape from BT-privileged apps.

Apps are sort of the reverse. They are much more vulnerable to trusting the client too much/giving way more information than the client app actually needs or is providing.

If I am understanding you correctly, you are considering the web service endpoints that the app talks to as the URL scheme?

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo
Who's going to derbycon?

If anyone is going to be there tomorrow morning by 8am, me and 10 others are going on a bourbon tour and there is a couple seats open from people not being able to attend. Stopping at 6 distilleries including buffalo trace hard hat tour which I keep hearing as being a really good tour.

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

stevewm posted:

Not big enough to need QSA, self reporting.

Strangely no one I have talked to has been particularly helpful on this. Even our own processor, they just refer me to the PCI website and won't answer any questions.

Mainly because pci can't loving make up its mind what the hell its talking about and keeps changing its standards and definitions of words. It has it made it so you need to hire a consultant to make sure you are doing things right (which I recommend you try you hardest to do)


Such as what you can store about a card and what you can't. I think at one point it didn't mention cvv should not be stored which.... Could be interpreted as you could store cvvs.

Also processors give no fucks. They just want a check box to click saying the customer said they are good so they have plausible deniability when you share you mysql connection to the outside world.

Just think about it this way. Some good advice can be bad advice if you don't know the other factors of their situation.

If you give a person good advice to put a lock on the door to their house without asking enough follow-up questions they can blame you for giving bad advice even though they didn't say anything about how the door in question was a screen door.

EVIL Gibson fucked around with this message at 17:17 on Oct 26, 2016

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

fyallm posted:

I want to learn how.

And I love Derby, I go every year, been to the past 4 I believe? I am about 2+ hours away, but I have a client that I usually try and go visit every few months there.

And management is paying for the bootcamp, exam and going to give me a raise.. I have put it off for as long as I possibly could :/

Since you are taking a bootcamp, they should be drilling most of the stuff and give you material to research later (since all the students in there are in the same situation as you)

I used Eleventh Hour CISSP for refreshing my head.

https://www.amazon.com/Eleventh-Hour-CISSP%C2%AE-Third-Study/dp/0128112484/ref=sr_1_4?ie=UTF8&qid=1477844800&sr=8-4&keywords=cissp

There is also the Pocket Prep smartphone guides which really worked for me because it let's you focus on domains instead of doing the whole test repeatedly. In my case, I worked a good while on a contracted project where the product was chip cards. I picked up lots, and I mean LOTS, of crypto during that time. There is one domain for that kind of stuff that I could build a test WITHOUT that crypto domain.

I also liked the fact you can configure the tests to show you the correct answer along with a reason why it was the correct and why the other answers were incorrect (though they can be bullshit, like "Answer A is wrong because it's not Answer B".)

edit: Oh, forgot to remind you. The CISSP will have questions with some of the answers NOT from the domain that look good enough to trick people who did not really study.

EVIL Gibson fucked around with this message at 17:44 on Oct 30, 2016

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

Mustache Ride posted:

Mostly consulting groups it seems. What a waste of time the past 2 interviews have been.

What type of security are you hiring for. I could help you with some questions I would ask for those positions.

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo
Story for an app I use with weird authentication.

I got into making retropies for friends. The problem is that when you import a game, there is no meta data for it. There is a built in meta scanner but it is slow and has real problems with correctly indentifying games titles.

I looked around and found this site with their own videogame DB and a standalone client that accesses the DB quickly and with more accuracy.

How it works is that you make a forum account and authenticate with that account through the application; that tells you how many "threads" you are allowed to use. Everyone starts with 1 but if you donate to support the database , you get more threads. Threads are how many download streams you can open to the DB.

Within the application options there is a button to press that , I assumed, talks to the api to query how many threads you are allowed. There are some apps, web and thick client , where the client is sent a message of some kind which the app converts to know what permissions you are allowed. A thing you can do with Burp Suite is to auto replace response text which I've used to give me more access than is allowed (this is why i believe smart phone apps is the wild frontier of new findings as many people are already finding out. Badly done apis lead to severe damage). What I was looking for in the response was some type of data element (XML, JSON, etc ) that refered to my current allowed thread count (1) and replace it with the another number (2+) and see if the application will change permissions without me having to break out IDA .

With Burp you can capture thick client app traffic (where you can't adjust the proxy setting like this app) by finding out what domains the app talks to and then changing your hosts file to send all of that domain's traffic to Burps proxy. You still need to know which specific domains so use Wireshark to look at the communication while using the app and identify your apps traffic.

I did not run this application since Christmas so a new version was released and asked me if I wanted to update. One of the notes said to fix a "small security issue". Well... Now I don't want to update .

Looking at the communication going out I saw I was sending out an HTTPS request with my username and pass to the api call whenever I told the app to get my current thread count. I would not put the creds in the get params but it's a throwaway email .

What I saw was a second set of creds though that weren't mine; they were the developers. The username was the same as the forum user that made it and what was even better was the password was a timestamp of the release date of the client with two random alphanumeric characters at the end. Which means I could predict his password in the future by just looking up the last release date of the client and guess it in 32*32 attempts.

I upgraded my client and that call is now gone but I hope that is somewhat instructive of how to start testing thick web clients with Burp.

EVIL Gibson fucked around with this message at 03:36 on Feb 22, 2017

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

gallop w/a boner posted:

.

I've read various bits about PowerShell Empire and the different staging methods, such as DLL injection, but they all seem to rely on powershell.exe or at least some sort of executable running at some point.

Can someone help me understand this? My background is in general IT ops, so apologies if I have misunderstood anything.

This will help:

https://silentbreaksecurity.com/powershell-jobs-without-powershell-exe/

To summarize : At PowerShell's core is an implementation of System.Management.Automation C# framework. By making a new C# exe with access and run commands on that framework it is a gimped version (no threading and slow as poo poo) of PowerShell but PowerShell nevertheless. Then you hide this gimped PowerShell into a new whitelisted process and that is your stager.

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

Potato Salad posted:

h- wh- how

okay freggin how

Bit flipping until you get the hash. I am assuming that even though most of the colors are black and red, they aren't all exactly the same shade and how gif works you can force a frame to update a part that doesn't need to change. Update a red pixel with red while, usually, normal gif animation will automatically ignore that pixel update.

Edit:Also gif has text metadata sections which can be messed with. http://forensicswiki.org/wiki/GIF

EVIL Gibson fucked around with this message at 20:49 on Mar 8, 2017

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

B-Nasty posted:

Don't roll your own. Microsoft Identity has a hasher built in: Microsoft.AspNet.Identity.Core/PasswordHasher.cs. It uses PBKDF2 (1000 iterations) to generate a 128 bit salt and 256 bit key. It automatically adds a version number, appends those items together, and returns a nice Base64 string that you can store in the DB. It also has a VerifyHashedPassword method that does a constant-time comparison and (smartly) returns an enumeration of whether it passed or not.

The 1000 iterations is a bit low, but it shouldn't matter much for stronger passwords. The versioning they built in allows for MS to add additional algorithms and easily upgrade, though they haven't done it yet.

edit: They actually have updated it. Version 3 will use: PBKDF2 with HMAC-SHA256, 128-bit salt, 256-bit subkey, 10000 iterations.

One thing I liked one company did for deciding iterations is to pick an amount of time you are willing to have the user want. For our case, 3 seconds.

On the same production system create a script to run a hash starting with with default iterations and just add to that count (by a thousand ) and keep times until the acceptable time passed.

For a pdkf the default count is a thousand. We found 3 seconds of time on our system required 32000 or so iterations.

The system was then made upgradeable (whenever a user changed or reset the password) so if we got better systems the count was increased and we made sure the count could never be decreased.

It might be overkill but our organization had to protect information on people that not only had to be under the general standards but also HIPAA which is a loving bitch to work with sometimes.

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

Hollow Talk posted:

Eh, not really. It just means I can use the same function for checking hashed emails and hashed passwords, i.e. the difference between these two, which I suppose becomes moot if I don't bother to hash emails.

code:
;; User, input+salt
(struct scrypt-hash (user input salt) #:prefab)

;; User, email+salt, password+salt
(struct scrypt-full (user email password salt datetime) #:prefab)

;; Calculate scrypt hash+salt for input
(define (scrypt-input->hash input #:length [length 32] #:N [N 16] #:r [r 8] #:p [p 1])
  (let ([salt (crypto-random-bytes length)])
    (scrypt-hash null
		 (bytes->hex-string (scrypt input salt N r p length))
		 (bytes->hex-string salt))))

;; Check whether scrypt'ed input matches provided scrypt hash+salt
(define (scrypt-check-hash hash input #:length [length 32] #:N [N 16] #:r [r 8] #:p [p 1])
  (equal? (scrypt-hash-input hash)
	  (bytes->hex-string (scrypt input (hex-string->bytes (scrypt-hash-salt hash)) N r p length))))


I suppose that was the idea. But it seems it's unnecessary, so I will probably switch this to username (plain) + email (plain) + password (hash) + salt + datetime.

edit: And done, switched to plaintext emails now. :sun: The two different structs remain (though the two tables have been consolidated into one), since those scrypt functions are also used for instances where people enter passwords for something else without having to supply an email address at all. Thanks for the comments!

You should be focussing on difficulty and not mashing stuff together because you can.

Your N is only 16. Default scrypt N is 16384.

What is your biggest worry of why you believe username , email, and date time needs to go in there? Are you allowing weak passwords and need other sources to make it more complex? Is this a very sensitive service no one should have account names listed and stored in the clear?

Where are you requirements coming from and what is your user base that you need this over the top hashing method?

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

loving GOOD!

People have been kind of harping on me because I just hate anything related to the cloud or iot and now people are finally loving realizing that this poo poo is totally hosed up.

It is literally the reason i had my avatar changed because someone decided to give me red text saying the cloud is stupid and to be feared in jest, now see what poo poo could happen? Because a device needs to talk to things, servers or otherwise, it is still talking to the outside which means it has to listen (at some point).

People dont loving need coasters ( there was a kickstarter for one to make sure everyone drank enough water), teddy bears,toasters, fridges,tvs, or what-the-poo poo YOUR PHYSICAL DOOR LOCKS to talk to the outside.

What this attack did is now these manufacturers need to answer why the machine was compromised (which we already know why) but, most importantly, either may or not pay their customer. If the customers don't receive enough compensation i believe this is going to spread distrust from the customer base into the lovely iot industry .

Just imagine... A world where the cloud is seen as a risk (which all companies need to do even when considering something as tried and true like AWS) you need to consider instead of a magical, do nothing wrong, service

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

Double Punctuation posted:

I loving love Cloud To Butt right now.

:captainpop:


Also, is that malware that has you play a game to decrypt your stuff legit?

I ... I want to be infected to play shmups.

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

:perfect:


But seriously, IoT will always be bad but people won't stop buying them because the "Internet is Stupid".

One of the few things that would help is an industry standard to clear before a product is released like, i dunno, maybe not leave the telnet port open with default creds "admin/admin"

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

wolrah posted:

One of my friends has this smoker: https://www.charbroil.com/smartchef-digital-electric-smoker

For some idiotic reason the app is required to set the temperature. When he brought it down to my house a few weeks back during a LAN party the fact that my WiFi SSID has a space in it was the root cause behind a full hour of frustration when trying to get dinner going. This was with four people who all work in various IT fields prodding it and using monitor mode on Linux to watch the actual WiFi traffic. A normal person wouldn't have had a chance at figuring this out.


BTW I love setting Wi-Fi passwords with spaces in them because no one ever expects it to be a valid character. I think the main password lists out there don't have spaces in them unless you write some thing like a filter in hashcat.

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

Doug posted:

This isn't true. The ?s mask in hashcat which covers all special characters also includes the space. So if a mask uses ?s or ?a it's going to catch your space.

That's what I meant, masks not filters.

Do the rockyou default mask include spaces?

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

pr0zac posted:

Lol. You don't know what you're talking about. Smart lock is unequivocally a good idea and most likely more secure than a password manager.

Both can be implemented poorly and that's all it matters.

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo
Speaking of third party auth...

Everyone be SUPER CAREFUL of opening any share invites to view anything on google docs. A phishing attack is being discovered now that scrapes all your google contacts and has free reign over your gmail.

From random names, but it always seems the first recipient is hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh[@]mailnator.com


Here's a twitter post with a gif of what it looks like: https://twitter.com/zachlatta/status/859843151757955072


More info: https://www.theverge.com/2017/5/3/15534768/google-docs-phishing-attack-share-this-document-with-you-spam

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo
So that Intel bug was worse.

It's the AMT implementation which allows you to remotely log into Intel servers remotely. As an admin you could log in and do adminly things after putting in your password, which would be hashed, and then authenticate you

Turns out any password works! Not only will any password work, but no password is perfectly okay as well!

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

apseudonym posted:

That's not an accurate description of the bug. The bug was they were comparing only up to the attack supplied length.

The truth is funnier.

Gotcha.

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

Mr Chips posted:

it's not quite like that, if you try manually logging into the admin account via the web interface with no password you won't get anywhere. You actually need to fiddle with the HTTP a bit, there's a synopsis from the guy who found it here: https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf

Now this is interesting. Using an unsafe read to get past the auth part of the binary. Neat.

I just remember finding an HP equiv weak auth where you could choose which kind of creds you wanted to use, either local or nt auth.

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

Volmarias posted:

"We need to get this thing out yesterday and they're not paying us to do anything after it's feature complete" mostly

This is exactly right. Crunch time means the project manager will look for the easy and really lovely implementation to get them across the finish line.

Here's another example where a car insurance company decided to not have authentication in really dangerous API calls.

https://www.andreascarpino.it/posts/how-my-car-insurance-exposed-my-position.html

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo
The guy that registered that deactivation domain just registered it because it was a random sting they found and didn't connect it (at the time) to a function (which we now know prevents the spread). His frame of thought was in a tweet he did after the fact.

Thinking about it more that was an actual super dangerous thing to do to register a domain without knowing why it's in the malware. It could have been a flag delete all keys immediately​ to prevent recovery, a signal to begin ramp up of the spread, or a sign for the malware to constantly mutate itself to prevent pattern based AV.

EVIL Gibson fucked around with this message at 23:56 on May 14, 2017

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

flosofl posted:

It wasn't a whim to register. SOP when trying to "disarm" and analyze an outbreak is to try to sinkhole the C&C, which is what MalwareTech assumed this was. You do that so you can start to a) capture any active traffic for analysis and b) disrupt the C&C functions. The fact it was unregistered just made it easier to sinkhole, and you want to jump on it quickly in case it was an oversight and the attacker could correct it at any moment.

The fact that the domain itself was the killswitch was happenstance, which MalwareTech points out in his twitter feed.

It's all about liability.

Read the Twitter message again. He didn't know what it did. They probably just did a strings and found the URL.

There was no reason why the dude registered the domain without knowledge of what it would do when it happened besides it wasn't registered. Heres the actual tweet: https://mobile.twitter.com/MalwareTechBlog/status/863187104716685312

Thinking from a company point of view where if registering a domain did cause more damage, MalwareTech could be brought to court and be held liable for damages the moment the domain went online. It really seems out there, but lawsuits can be issued for less.

If they had enough data to show the malware would dump after seeing the domain up; sure go ahead. It was just super dumb to register it before if they spent more time looking at it.


EVIL Gibson fucked around with this message at 06:53 on May 15, 2017

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

Last Chance posted:

I don't know much about nothin' here, but wtf is this when I visit that URL:



Worked on certs for the DOD. They have their own series of private CAs they use to authenticate everything including using it to auth base entry and their websites.

They track every single cert by calling up the crl list every time you want to do something with your id. There is only one place in the org where you are allowed not to use your CAC card and that is if you are in the middle of the sea but you will get a new one as soon as you land on shore.

Also, really super illegal to let someone look at or hold your card. They are always told to keep it close because if they do lose it or it's stolen, it is going to be a lovely nightmare for them.

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

flosofl posted:

I'll bet you say ATM machine and PIN number.


You monster.

If you took the ciscp or you did anything with certs, then all these should be common terms.

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

Doug posted:

No reason to be an rear end in a top hat, he was making a joke that you said 'CRL list' Certificate Revocation List List...hence the statement about ATM (automatic teller machine) machine and PIN (personal identification number) number.

I was being a butt because I took his reply wrong.

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

milk milk lemonade posted:

I don't remember it being all that serious. I lost my CAC card at a dog park and they just gave me a new one. I had access to some relatively interesting stuff :shrug:

Edit: the card had a picture for visual identification obviously, but the PKI is only 1/2 or less of the equation in terms of accessing any part of any information systems

As soon as you report it missing they immediately deactivate it in the tracking system (DEERS I think. Woo acronyms. It's a loving nightmare).

The pin will be locked out after a couple times permanently unless you go the office to give biometrics.

Mainly there are baaad bases with questionable security practices that flashing the cac might be enough to get you in but you should hit a swipe machine someway along the way. The worldwide system is updated enough that current card you reported lost will not work on the swipe.

For the other person talking about it being used for vet benefits, that is one of a few reasons you can use it outside of military use. I was just saying that if you don't keep track on it or have control of it beyond the normal uses, the rules say there are punishments.



Funny story. You know how to get a card, you need to get it electronically signed by someone else in the system (and from the CA)? There was a little business going on where one of the issuers found a way to sign the same person while they had multiple versions of legit cacs. Utter poo poo storm when they found out Joe Smoe buying from the military store and finding no Joe Smoe actually there because the card was being used by someone else who changed the pic on it. This was like ten years ago or something .

EVIL Gibson fucked around with this message at 07:15 on May 24, 2017

Adbot
ADBOT LOVES YOU

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

Thermopyle posted:

You can just install one of the apps from the Chrome store that unzip 7zip files.

I'll admit it, this gave me a little chill.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply