Netsec – Telegram
Netsec
7.41K subscribers
22.4K links
This channel posts the feed from r/netsec.
For any suggestions dm @streaak
Donate to keep the bot running https://www.paypal.me/akhilgv
Download Telegram
Shellen - Interactive shellcoding environment to easily craft shellcodes
http://ift.tt/2F4VcqH

Submitted March 02, 2018 at 10:17PM by pacotes
via reddit http://ift.tt/2FjekAr
New SMBv3 DoS exploit for Windows 8.1 & Windows Server 2012
http://ift.tt/2FeHuka

Submitted March 02, 2018 at 10:38PM by Neo-Bubba
via reddit http://ift.tt/2FjXaCO
Red Team Laptop & Infrastructure (pt 1: Architecture)
http://ift.tt/2CT9xR4

Submitted March 02, 2018 at 11:28PM by thugl0r
via reddit http://ift.tt/2Fatbd0
Is it allowed to send (and collect on the bounty) a Responsible Disclosure statement to my own employer?
I have seen multiple security issues within my own company and normally I disclose them to the one responsible via the channels within the company. However, I am sick of the irresponsibility and lack of precaution taken when deploying new features. Just yesterday they deployed some code that makes it possible to see a lot of customer information, and also provides a loophole to inject SQL and see the results of the query executed (as well as the errors you might produce).I am a Software Developer, not a Security Engineer...PS: I work don't work with the team that is deploying this code (I don't even have access to it, so I do not have any advantage over a malicious person)

Submitted March 03, 2018 at 12:31AM by xoorl
via reddit http://ift.tt/2FKUV9l
Join a growing a Pentesting/Hacking Community.
Hello World!PentestSec is a community of Pentesters, Infosec professionals, and Students. We have the idea that information should be free to those want to learn and master their skills. There are ton of places on the internet to learn hacking, it can be a bit overwhelming, and so this community has everything in one. We have a private section for newbie’s to learn and ask questions with professionals, as well as daily lesson to try out. We have partnership with other servers who have Professional talk in their server via voice chat with industry Pros!!! We do CTFs, such as Vulnhub, Hackthebox, and more to practice. If you are going for a cert we have a section with material as well. Of course we don’t spoil anything or hold anyone’s hand, but if you are willing to work hard, you can gain a lot of knowledge. So join us! The only thing missing in the community is …..You!Hack The Planet!https://twitter.com/pentestsechttps://discord.gg/4hqkRgZ

Submitted March 03, 2018 at 03:09AM by grimessec
via reddit http://ift.tt/2FLElWQ
Public disclosure in the public interest?
I have discovered a security bug related to authentication on a major US based website (estimated 10M monthly users). The bug allows anyone with local physical access to a computer to access the last logged-in users full account - even after that victim believes they've signed out. This includes after the browser is closed, quit, and the computer has been restarted. This bug exposes personal identity information, financial information, and financial account access - including the ability to withdraw funds (some accounts may have additional security protecting against funds withdrawn, but not all).I have responsibly disclosed this bug through the company's bug bounty program on January 26th. I have made at least four attempts to be aggressive in helping the company support/security team recognize the severity of this bug. But their responses have all been a form of "working as designed" and "it's not great, but that's the way it works". (Unbelievable I know, but those are the facts for this case).I attempted to report this bug to the relevant US government regulators. The regulators responded, but did not request any details about the specifics of the bug. They had no follow up after a simple "who are you" call. I have informed the company that I contacted the US regulators.I believe this bug is likely one of the worst kind of bugs - because while it is not a remote access vulnerability, it is a very high impact vulnerability. It is very likely to cause a lot of damage to a few users. To those users, and perhaps even to the company, it will be completely inexplicable. Victims of un-authorized funds transfers will know they are victims, but to the company it will appear as a "one off case of user-error". Because there are so many users on this site, the exploit could occur many times before the company, regulators, or users identify the access vulnerability.Questions:1) Are there any resources or experts that I could consult on whether public disclosure, for the purposes of applying pressure to the company, would be appropriate? (My hypothesis is that public disclosure is appropriate, based on the severity of the impact, the disinterest of the company, and the elusiveness of the cause)2) Are there any other paths for disclosure that I should attempt before public disclosure?3) If I were to publicly disclose, I would inform the company of a date of pending public disclosure. How many days of pre-disclosure time should I provide the company? (It has already been 30 days).

Submitted March 03, 2018 at 05:23AM by dreamingwell
via reddit http://ift.tt/2F7VAV7
Issues installing Kaspersky on Windows 10.
Anybody here every seen issues with this? I only use Kaspersky cause it's the one I pay for and it works. Just got Windows 10 installed and it gets 10% then says error can't connect to server, check your internet connection. My connection is perfect. My friend thinks it's the firewall.

Submitted March 03, 2018 at 07:33AM by ChampionDreamerMusic
via reddit http://ift.tt/2I13OvZ
Turning your web traffic into a Super Computer
http://ift.tt/2FN16JP

Submitted March 03, 2018 at 08:57AM by eloquinees_husband
via reddit http://ift.tt/2CVjP2M
23,000 TLS certificates compromised because the CA's CEO emailed all the private keys to a partner without encryption
http://ift.tt/2GU2JEW

Submitted March 03, 2018 at 03:23PM by thestarflyer
via reddit http://ift.tt/2oMBLI3
Upgrading security cameras
Currently I am upgrading our security system and cameras come first. We currently have a 16 channel nvr that is outdated and barely works so here are my questionsIs there an nvr out there that is affordable that can utilize more than just one brand?I have blue iris software that I could use but I’m not sure it’s cost effective to build a computer for this or better to go with an nvr.Should I just stick to one brand? If so, I’d amcrest going to be around a while? Reolink? What brand will allow me to not get stuck 4 years later being outdated and unable to expand?Amcrest makes a 32 channel nvr that is cheap. Are they a good brand?I am open to whatever suggestions. I currently have an outdated interlogix system with 16 poe 1mp cameras. I upgraded to blue iris software thinking I could expand that way because the program can use any poe camera. Unfortunately my computer (16gb ram, i7-4900 processor, with he graphics card and 4tb nas) can’t keep up with the recording process.Any advice?

Submitted March 03, 2018 at 08:20PM by jeffers049
via reddit http://ift.tt/2FaLoau
Hacking into NET router for fun and profit [FULL DISCLOSURE]
http://ift.tt/2FjGVWg

Submitted March 03, 2018 at 09:45PM by mthbernardes
via reddit http://ift.tt/2F7U5Xg
Is Your School Safe? Our Mission: Make it Safer
http://ift.tt/2FN6Hjr

Submitted March 03, 2018 at 11:50PM by Zaddyboy
via reddit http://ift.tt/2F7opNp
Is your Wi-Fi network secure?
http://ift.tt/2Fn3UzQ

Submitted March 04, 2018 at 09:26AM by djmackphunk
via reddit http://ift.tt/2tezV8n
Betraying the BIOS: Where the Guardians of the BIOS are Failing [See Comment for more Details]
http://ift.tt/2HZ2B8u

Submitted March 04, 2018 at 12:07PM by TechLord2
via reddit http://ift.tt/2Fid54z