Netsec – Telegram
Netsec
7.44K subscribers
22.4K links
This channel posts the feed from r/netsec.
For any suggestions dm @streaak
Donate to keep the bot running https://www.paypal.me/akhilgv
Download Telegram
GUI Tool for crafting ROP chains (WIP)
http://ift.tt/2D35Jhn

Submitted December 19, 2017 at 09:41PM by chillingswordfish
via reddit http://ift.tt/2D69liw
Thoughts/Advice
I'm currently going through a vetting exercise on a new vendor/solution for my business.The vendor is offshore, but is touting that they are compliant with a litany of things (NIST, HIPAA, PCI, ISO, etc) as well as saying that the employ a zero-trust policy with everything they do. That's all well and good. That should be a pretty basic standard when you're providing this kind of service.Here's where it gets interesting. As part of the review that my team performs, we ask how vulnerabilities are remediated. Here's the answer that we've gotten:"<software/application that they've written internally> maintains a clear separation between various systems. The policy is enforced realtime and on a continual basis. It is simply impossible to access any internal systems without first authenticating, authorizing role, and providing an intent. <Vendor> follows a zero trust policy for cybersecurity."This seems really off to me. First, I would never, in the history of ever, say that something was impossible to access. Further, the vendor has peppered throughout their entire vetting their tool and how it employs passphrase technology and no user IDs to make their solution "impossible to hack".Thoughts?

Submitted December 19, 2017 at 09:27PM by OldFennecFox
via reddit http://ift.tt/2klgLqw
Keeping a list of passwords safe..?
Hi there, Our small business has the need for several passwords (bank accounts, visas, third party software, etc etc..). We've been running into the problem of losing our passwords, I think due to the lack of organization. Losing these passwords is a HUGE pain, i'm spending more time than I should on getting passwords reset. These are the two options I can think of, comments/questions/concerns are greatly appreciated! 1- a small book of accounts/passwords kept in a small safe. 2- online password keepers**one of our team members had voiced concern over keeping the accounts/passwords on an online service. Are there any trustworthy companies where this is not a concern? Recommendations?Cheers

Submitted December 19, 2017 at 11:02PM by elifast
via reddit http://ift.tt/2oLX8g0
Changing IP & MAC on iPhone
Is it possible to change your IP & MAC address on iPhone the same way you can on Mac?

Submitted December 20, 2017 at 01:53AM by ALEXA-Music
via reddit http://ift.tt/2BA16eg
Noob question- How do p2p botnets get stolen data to the attacker without a centralized server?
There were many well known p2p botnets like Zeus, ZeroAccess, Storm and Agobot over the years. The way I understand it, there are some victim nodes that contact a bunch of other computers and that forms the botnet.I just don't know how the attacker is to get the data. If the data is stored on the node, what if it goes offline? Then wouldn't they miss out on a bunch of stolen data.Perhaps it has nothing to do with being stored on the victim, and the malware just sends it to a dropzone or email or something?Any explanation would be greatly appreciated.EDIT: an example would help me understand. How would Zeus, for example, get stolen credit card data to an attacker?

Submitted December 20, 2017 at 05:56AM by fredfredburger88
via reddit http://ift.tt/2z0uUOp
Mastercard Internet Gateway Service: Hashing Design Flaw
http://ift.tt/2eGK9YH

Submitted December 20, 2017 at 03:34PM by nishaanthguna
via reddit http://ift.tt/2z3hDo3