Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Winkle-Daddy
Mar 10, 2007

If you want to play with this, I wrote a quick Golang tool to do so: https://github.com/ZedCode/autofill-pwn
code:
 ./autofill-pwn -p 8080 -f index.html
2017/01/05 12:41:24 Starting server...
2017/01/05 12:41:29 Serving GET Request...
2017/01/05 12:41:30 Serving GET Request...
2017/01/05 12:41:31 Field address = []
2017/01/05 12:41:31 Field postal = []
2017/01/05 12:41:31 Field city = []
2017/01/05 12:41:31 Field country = []
2017/01/05 12:41:31 Field name = [abc]
2017/01/05 12:41:31 Field email = [abc@yahoo.com]
2017/01/05 12:41:31 Field phone = []
2017/01/05 12:41:31 Field organization = []
2017/01/05 12:41:31 Serving GET Request...
^C
It just has one URL route (to the file you specify) and will display the file, or all of the POST data it receives. Stupid and simple but maybe interesting if someone wanted to investigate that whole thing further.

Adbot
ADBOT LOVES YOU

Winkle-Daddy
Mar 10, 2007

Sharktopus posted:

if you're scrolled above a full address form and half of it is off screen do you think autofill should fill the whole form or just the fields you can see???

I'm pretty sure it should only auto-fill fields you can see, otherwise you don't know what it's filling in. If you care about this kind of poo poo you're not using auto fill in the first loving place, though.

Winkle-Daddy
Mar 10, 2007

pseudorandom name posted:

does it autofill credit card information?
maybe, but you'd have to have your browser set to auto fill that (please don't do this)

Winkle-Daddy
Mar 10, 2007
is autofill per domain? I'm copying various login page form fields and serving it and it's not auto completing poo poo.

e: maybe this could happen if someone doesn't turn off autocomplete on that form field?

Winkle-Daddy fucked around with this message at 22:09 on Jan 5, 2017

Winkle-Daddy
Mar 10, 2007
I don't see the auto-fill behavior described in Chromium. When I test it, I have to click into each form field to see a list of options. I don't seem to have a way to auto fill the whole form? maybe someone else can do something more interesting with my code.

Winkle-Daddy
Mar 10, 2007
Hey sec fuckup thread! I know I've seen some awesome posts about what cipher suites should be enabled...does anyone have a config or can link to an ideal nginx SSL config? Specifically for ssl_protocols and ssl_ciphers?

Winkle-Daddy
Mar 10, 2007

Truga posted:

My personal procedure is to use https://www.ssllabs.com/ssltest/analyze.html until it shows A or A+. It says what the problematic ciphers are if you have them enabled.

Yeah, I use that too, but this isn't internet accessible, so I was just hoping for a solid config for those two options.

Winkle-Daddy
Mar 10, 2007

this is awesome. thank you!

Winkle-Daddy
Mar 10, 2007

ratbert90 posted:

Random question:

Is there a way for me to NOT have a self-signed certificate on an production embedded device that may not be connected to the internet?

afaik, no. since you'd have to provide a host name and i'm assuming you won't know that in advance.

Winkle-Daddy
Mar 10, 2007

ate all the Oreos posted:

depends on what the cert is being used for, if it's just to identify the device as valid it's common name could be a serial number or something instead of a domain name

e: this assumes you're not using it for HTTPS if that's not clear

yeah, i was assuming https was the purpose of that...

Unrelated question for OSX users. When using our internal CA to sign a cert, and having added our Intermediary Chain to the pem serving up the cert/chain, when I visit the site in Chrome on OSX I am unable to add an exception to the invalid cert and continue on to the site (like I can on Windows and in Firefox). The reason for this appears to be that Chrom(ium) uses the system to decode the certificate and the chain is throwing the error "This certificate cannot be used (unrecognized critical extension)" -- When I expand the certificate in Chrome I only see two critical extensions, Basic Constraints and Name Constraints.

Is there a way in OSX to see what extension it's complaining about?


e: I'm reading OSX just doesn't support name constraints, so nevermind. GG Apple.

Winkle-Daddy fucked around with this message at 21:30 on Jan 6, 2017

Winkle-Daddy
Mar 10, 2007

zen death robot posted:

that drive is way too new

thats the one that has the location of this one:



e: it's no longer as new as in that picture.

Winkle-Daddy
Mar 10, 2007
this is an interesting and cool post. keep us updated on the details because I've not seen much but ~Trump News~ over this way.

Winkle-Daddy
Mar 10, 2007

McGlockenshire posted:

if he can't even figure out that SuperMicro makes servers not routers and that those devices exposing IPMI to the world also has nothing to do with routers being hacked, I'm not really sure I trust anything else in that article to be factually correct

Krebs is actually pro-tier awesome and a very good and reputable info sec journalist (though his areas of expertise tend to be more of the organized cyber crime type). The part you're complaining about to sound so smart and knowledgable to all of us, and to show how much better you are than my man with the giant forehead is pretty silly though since it's a summary from verisign mentioned as a throw away:

quote:

Verisign said the 2014 attack was launched by a botnet of more than 100,000 hacked routers sold by a company called SuperMicro. Days before the huge attack on ProxyPipe, a security researcher published information about a vulnerability in the SuperMicro devices that could allow them to be remotely hacked and commandeered for these sorts of attacks.

quote:

same thing with crediting Microsoft for Minecraft

jesus learn to read

quote:

The most frequent target of the lelddos gang were Web servers used to host Minecraft, a wildly popular computer game sold by Microsoft that can be played from any device and on any Internet connection.

e: sorry, this came off a lot more dickish than I meant.

Winkle-Daddy fucked around with this message at 23:01 on Jan 18, 2017

Winkle-Daddy
Mar 10, 2007

Winkle-Daddy
Mar 10, 2007

quote:

How does the latest version of redis fix this issue?

The latest version of Redis alieses the words POST and HOST to QUIT commands, this when incoming HTTP requests contain those words, they terminate the TCP connection.
lmao

Winkle-Daddy
Mar 10, 2007

lmbo, if PostScript is the attack vector this is all Adobe's fault...again.

Winkle-Daddy
Mar 10, 2007
E: ^^^ I was like you once before. Then I learned I was being stupid. :/

infernal machines posted:

is it still sop for "internet security" suits to mitm ssl traffic with self-signed certs?

like, i can't imagine a bigger way to make yourself less secure than that.

MitM SSL strip isn't just about security, it's also about liability. In that regard it does what it needs to.

I think F5 is one of the companies to stay away from. We reported some tls issues to them and they were huge cocks about how they know what they're doing (despite providing a poc exploit).

We're working on our ssl decryption project now so I've been indulged in business meetings where it's made clear security is secondary to appeasing lawyers. But our biggest concern at the moment is industrial espionage.

Winkle-Daddy fucked around with this message at 01:21 on Feb 8, 2017

Winkle-Daddy
Mar 10, 2007

Dylan16807 posted:

go ahead and MitM if you need to, but doing it on the end device with a self-signed cert seems like a terrible way to get there

And the better way would be to............?

Winkle-Daddy
Mar 10, 2007

BangersInMyKnickers posted:

Yeah, when I was looking over Eset's implementation they generated a unique self-signed cert and added it to the trust store. Each install was unique and it seemed to be the best way of going about that at the endpoint if that's what you're trying to accomplish. Hopefully they were dumping all the crypto in and out through schannel instead of some bundled openssl library or custom horseshit but there's still plenty of wiggle room to gently caress up cert validation and plenty of other vendors have been extremely guilty in that area.

my post was more directed at trying to find out what alternative to mitm'ing ssl that poster might be suggesting, obviously there are poo poo vendors (F5 *cough*) and better ones. There are poo poo deployments and good deployments. but your packets are getting inspected in corporate america.

Winkle-Daddy
Mar 10, 2007

infernal machines posted:

well the other option is gateway filtering through an appliance or dedicated server, whether that's better or worse depends on your budget and key-management policies.

oh, what, I thought that's what we were talking about the whole time. The only acceptable scenario I'm aware of (outside of just air-gapping) is a well managed chain of trust with company certs pushed down to all end points so that your appliances can seamlessly decrypt all traffic. I was referring to that scenario as being inevitable and necessary. what the gently caress kind of whack rear end a/v bonkers poo poo product were you guys talking about?

Winkle-Daddy
Mar 10, 2007
can you give some examples? our research team had fun with some endpoints protection stuff recently and I'd love to throw them some suggestions of things to look at next

Winkle-Daddy
Mar 10, 2007

infernal machines posted:

nothing i can show being exploited, although i'll see if i can find something.

just one that looks lovely, we have a research team that's traditionally been auditing IoT devices, but some of the members have had an increased interest in endpoint security. So I'm always looking for something to name drop for them to look at.

Winkle-Daddy
Mar 10, 2007

lmao what timing

Winkle-Daddy
Mar 10, 2007
All the discussion in media of file-less malware has got me interested in how this is actually accomplished. Does anyone have any links to decent write ups for how you can actually inject malicious code into memory without touching the filesystem at all? I'm not sure what the techniques for this are.

e: i found this: https://securelist.com/blog/research/77403/fileless-attacks-against-enterprise-networks/ which is a decent primer, so far.

Winkle-Daddy fucked around with this message at 19:47 on Feb 16, 2017

Adbot
ADBOT LOVES YOU

Winkle-Daddy
Mar 10, 2007

cheese-cube posted:

pretty much all modern malware which is spread via drive-by infects clients entirely in memory before ever touching the file system, usually through arbitrary code execution using buffer overflow exploits and then chained with a privilege escalation exploit to run as system. after that they'll usually touch the file system in some way to root the machine thus ensuring that they remain resident.

however after i wrote the above i saw the link you posted which clarifies "file-less" malware as simply malware which covers its tracks when interacting with the file system. so yeah, same stuff applies i guess?

edit: ive been making a lot of dumb posts recently so someone please call me out if im an idiot

yeah, I heard a bunch of news articles talking about this new fileless malware and was trying to understand if this was some "new" technique. seems like a whole lotta nothin' new.

  • Locked thread