Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

gently caress, I literally came to post that. drat you yos pos infosec thread.

drat youuuuuuuu.

Also, are we doing a defcon meetup or not?

Adbot
ADBOT LOVES YOU

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

fishmech posted:

I wonder how many average people would actually give the correct answer to both of those if they were legit trying to buy into whatever scam the guy was selling. They can barely manage to type addresses correctly.

"Hi, this is you bank calling. We've had some gently caress up with a new teller. Can you take a picture of your check and confirm your account number is 443567843?"

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

French Canadian posted:

Indeed, and I know cyber "whatever" has been around forever but I am unaware of when just "cyber" became a term. It's like saying "I like mountain" and forgetting to add "climbing", "biking" or "making GBS threads".

c'mon son

quote:

Even though cyber- had been attaching itself to other words for more than two decades already, the term cyberspace only appeared in 1982, apparently coined by William Gibson in his science fiction novella Burning Chrome. According to its Oxford English Dictionary (OED) entry, cyberspace is the space of virtual reality; the notional environment within which electronic communication (esp. via the Internet) occurs. Although other cyber- formations cropped up, including cyberworld, cyberland, Cyberia (punningly after Siberia), and cybersphere (which is actually attested to earlier than cyberspace), cyberspace remains by far the most popular cyber- term used to refer more broadly to the world of electronic communications (including the Internet), although its popularity peaked in the late 1990s

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?


LOL here I thought DEFCON hadn't quite jumped the shark just yet they go ahead and prove me wrong.

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

https://twitter.com/lehtior2/status/895551057744470016

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

maskenfreiheit posted:

jk gently caress the police

https://www.youtube.com/watch?v=9ZrAYxWPN6c&hd=1

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

I just did my OSCP and you can only use meterpreter on one box. You *could* use multi/handler with -j on some port and have all your exploits connect to that (using shell_reverse_tcp in msfvenom) but at that point just use ncat or something in its own window with screen -L or somesuch.

TBH the Lab was ok but WAY out of date. Like, using exploits from 2008/2010 most of the time.

Took me about 18 hours all told. Mostly dead ends and jumping between boxes. Then another 4 hours on the report. And now I can add OSCP to my

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?



lol

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?



is this banime?

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

fins posted:

brb, registering hashaveibeenpwnedbeenpwned.com

YES!

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

cinci zoo sniper posted:

https://www.bleepingcomputer.com/news/security/blueborne-vulnerabilities-impact-over-5-billion-bluetooth-enabled-devices/

Security researchers have discovered eight vulnerabilities codenamed collectively as BlueBorne in the Bluetooth implementations used by over 5.3 billion devices.

Researchers say the vulnerabilities are undetectable and unstoppable by traditional security solutions. No user interaction is needed for an attacker to use the BleuBorne flaws, nor does the attacker need to pair with a target device.

BlueBorne affects all Bluetooth enabled devices
They affect the Bluetooth implementations in Android, iOS, Microsoft, and Linux, impacting almost all Bluetooth device types, from smartphones to laptops, and from IoT devices to smart cars.

Three of these eight security flaws are rated critical and according to researchers at Armis the IoT security company that discovered BlueBorne they allow attackers to take over devices and execute malicious code, or to run Man-in-the-Middle attacks and intercept Bluetooth communications.

Furthermore, the vulnerabilities can be concocted into a self-spreading BlueTooth worm that could wreak havoc inside a company's network or even across the world.

Most serious Bluetooth vulnerabilities identified to date
"These vulnerabilities are the most serious Bluetooth vulnerabilities identified to date," an Armis spokesperson told Bleeping Computer via email.

"Previously identified flaws found in Bluetooth were primarily at the protocol level," he added. "These new vulnerabilities are at the implementation level, bypassing the various authentication mechanisms, and enabling a complete takeover of the target device."

Armis warns of attacks that combine physical presence with the BlueBorne flaws. For example, a delivery person dropping a package at a bank could carry weaponized code on a BlueTooth-enabled device. Once he enters the bank, his device infects others and grants attackers a foothold on a previously secured network.

Not all devices will receive patches
Armis reported the vulnerabilities to major hardware and software vendors, such as Apple, Google, Microsoft, and the Linux community. Some patches are being developed and will be released today and in the coming days and weeks.

Nonetheless, some devices will never receive a BlueBorne patch as the devices have reached End-Of-Life and are not being supported. Armis estimates this number at around 40% of all Bluetooth-enabled devices, which is over two billion devices.

BlueBorne vulnerabilities are tracked under the following identifiers: CVE-2017-0781, CVE-2017-0782, CVE-2017-0783, and CVE-2017-0785 for Android devices; CVE-2017-1000251 and CVE-2017-1000250 for Linux; and CVE-2017-8628 on Windows. The iOS flaw does not have identifiers at the moment.

Who is affected
All Android phones, tablets, and wearables of all versions are affected by the four above mentioned vulnerabilities. Android devices using Bluetooth Low Energy only are not affected. Google patched the flaws in its September Android Security Bulletin.

Windows versions since Windows Vista are all affected. Microsoft said Windows phones are not impacted by BlueBorne. Microsoft is expected to release patches later today.

All Linux devices running BlueZ are affected by an information leak, while all Linux devices from version 3.3-rc1 (released in October 2011) are affected by a remote code execution flaw that can be exploited via Bluetooth. Samsung's Tizen OS, based on Linux, is also affected.

All iPhone, iPad and iPod touch devices with iOS 9.3.5 and lower, and AppleTV devices with version 7.2.2 and lower are affected, but the issue was patched in iOS 10.



Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

exploded mummy posted:

http://gwn.fightnetwork.com/


lets start a wrestling ott streaming service that has a broken paywall, nonfunctional region sensing, and sends passwords in plain text

no don't

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

cinci zoo sniper posted:

and get charged for tampering with evidence, great idea

ianal but say I had a postit that said 'password: imverysmart2017' that when entered would delete the crypto key for my drive and reboots the box. I do this to prevent my snooping wife from finding my porn folder but the cops take my machine and see the postit and try the password which leads to all the data being effectively erased.

My question is, who the gently caress cares. gently caress da police, 2017.

https://www.youtube.com/watch?v=_BxBs4f4RIU&hd=1

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?


:wink:

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

the real option is a shadow os on phones/laptops.

There was a story about kevin mitnick (or someone) going to the border and getting hauled aside and told to log on to his laptop so they could check it. He had some other account setup and logged on with that showing that it was just a boring old windows account or something.

The real pro-tip: fly without anything and buy a chromebook/phone when you land and sell/return when you leave. But if you're that paranoid just don't travel at all.

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?


the best part, while they were getting hosed up the rear end they were pressuring lawmakers to limit their liability to the point where this was submitted in may.

https://www.congress.gov/bill/115th-congress/house-bill/2359

quote:

o amend the civil liability requirements under the Fair Credit Reporting Act to include requirements relating to class actions, and for other purposes.

Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,
SECTION 1. SHORT TITLE.

This Act may be cited as the FCRA Liability Harmonization Act.

SEC. 2. MAINTAINING CONSISTENCY IN CIVIL LIABILITY UNDER THE FAIR CREDIT REPORTING ACT FOR CLASS ACTIONS.

(a) Willful Noncompliance.Section 616 of the Fair Credit Reporting Act (15 U.S.C. 1681n) is amended

(1) in subsection (a)

(A) by striking paragraph (2);

(B) by redesignating paragraph (3) as paragraph (2); and

(C) in paragraph (1)(B), by inserting and after the semicolon;

(2) by redesignating subsection (d) as subsection (e); and

(3) by inserting after subsection (c) the following new subsection:


(d) Class Action Lawsuits.With respect to a class action (as such term is defined in section 1711 of title 28, United States Code), or series of class actions arising out of the same failure to comply of a person, brought by consumers against a person who willfully fails to comply with any requirement imposed under this title, such person is liable to such consumers in such an amount as a court may determine, except that

(1) the court may not apply a minimum amount of damages for each member of the class; and

(2) the total recovery (excluding reasonable attorneys fees as determined by the court) of the class shall not exceed the lesser of

(A) $500,000; or

(B) 1 percent of the net worth of such person..

(b) Negligent Noncompliance.Section 617 of the Fair Credit Reporting Act (15 U.S.C. 1681o7) is amended by adding at the end the following new subsection:


(c) Class Action Lawsuits.With respect to a class action (as such term is defined in section 1711 of title 28, United States Code), or series of class actions arising out of the same failure to comply of a person, brought by consumers against a person who negligently fails to comply with any requirement imposed under this title, such person is liable to such consumers in an amount equal to the sum of any actual damages sustained by the consumers as a result of the failure, except that the total recovery (excluding reasonable attorneys fees as determined by the court) of the class shall not exceed the lesser of

(1) $500,000; or

(2) 1 percent of the net worth of such person..


:thunk:

e: am I reading this right? Any class action lawsuit brought against Equifax would've had a cap of $500,000? God damned I'm not even angry, this is next level cyberpunk.

Optimus_Rhyme fucked around with this message at 18:03 on Sep 19, 2017

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

Wiggly Wayne DDS posted:

in news absolutely no one saw coming it turns out there was a secondary payload delivered via the ccleaner backdoor: https://blog.avast.com/progress-on-ccleaner-investigation


now if you want to know which companies were targeted ask talos: http://blog.talosintelligence.com/2017/09/ccleaner-c2-concern.html


Are those internal domains?

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

CommieGIR posted:

CIOs are a FYGM of IT decisions.

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

Apt use to mean low and slow attacker. The logica breach is a good example of someone who was advanced (knew more about the infrastructure than the people running it) and persistent (he was kicked out multiple times and kept coming back and getting in and took his time).

Then marketing people found out about the term and now it means "an attack" because the term is so watered down. Also it helped give CSOs an out cause you can't stop someone who's advanced AND persistent!

If anyone is interested the derby streams are up:

http://www.irongeek.com/i.php?page=derbyconstreams

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

Cocoa Crispies posted:

let's be completely clear

"APT" used to mean china or russia

It implied state actor (cia, mossad, >emotion < bear, whatever we call the Chinese team) but only because they can train people and they have the time and patience.

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

Better job prospect cause now you can say you worked at big 4. Before it became big 3.

Also you'll get invited to.alumni events where they kiss your rear end hoping you give them business.

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

Number19 posted:

these all have to be deloitte honeypots

right?

right???????

what does your heart tell you?

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

This never would've happened under stebe

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

Muscle memory passwords are great until you have to go to the printer and log in with their poo poo touch screen.

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

Qwijib0 posted:

doesn't look like love, sex, secret, or god to me.

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

Carbon dioxide posted:

Has anyone heard of this app and is it good/does it have a future?

https://tox.chat

Oh good, ANOTHER chatting app. gently caress its like 2003 again with the drat chat apps. Meebo, please come back as a single app I can install to manage all these chat apps.

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

infernal machines posted:

razor and blade? they're flakes!

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

https://twitter.com/TheHackersNews/status/930133662141689856

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

anthonypants posted:

what are you going to do about it

:justpost:

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?


https://www.youtube.com/watch?v=dUMH6DVYskc

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

Powaqoatse posted:

solution: drink at home, alone

Adbot
ADBOT LOVES YOU

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

spankmeister posted:

Speaking of MMO's: Here's a podcast in two parts about hacking online games. It's pretty good. They interview "Manfred" a guy who's apparently a big deal in the mmo hacking scene. You may remember the ultima online house deletion debacle, well this guy did it and he explains how. He also explains how he made a living for years by cloning items and gold in MMO's and selling them on eBay.


https://darknetdiaries.com/episode/7
https://darknetdiaries.com/episode/8

I was gonna reply to a link to his awesome DEFCON talk but NOOOOOPE youtube took it down

https://www.youtube.com/watch?v=PfbMZJsb1cQ&hd=1

  • Locked thread