Netsec – Telegram
Netsec
7.39K subscribers
22.3K links
This channel posts the feed from r/netsec.
For any suggestions dm @streaak
Donate to keep the bot running https://www.paypal.me/akhilgv
Download Telegram
Asset Discovery: Doing Reconnaissance the Hard Way
https://ift.tt/2HXTQ26

Submitted May 07, 2018 at 11:12PM by patrikhudak
via reddit https://ift.tt/2jFmoim
sudo_pair 0.9.0 released (a dual control plugin for sudo)
https://ift.tt/2FKslTR

Submitted May 08, 2018 at 12:05AM by stouset
via reddit https://ift.tt/2KFHl98
Prestashop code exec writeup
https://ift.tt/2HVEo6R

Submitted May 07, 2018 at 11:43PM by websecdev
via reddit https://ift.tt/2rqu10r
XXEinjector – Automatic XXE Injection Tool For Exploitation (With Sources)
https://ift.tt/1TJAWrw

Submitted May 08, 2018 at 12:15AM by TechLord2
via reddit https://ift.tt/2wrMEpA
Asset Discovery: Doing Reconnaissance the Hard Way
https://ift.tt/2HXTQ26

Submitted May 08, 2018 at 01:59AM by patrikhudak
via reddit https://ift.tt/2wk6EdP
Study: Attack on KrebsOnSecurity Cost IoT Device Owners $323K
https://ift.tt/2rrffG2

Submitted May 08, 2018 at 02:06AM by volci
via reddit https://ift.tt/2IjqxXk
Getting weird access attempts in Nginx logs, should I ban them?
I don't check my logs ofter, which I should, but I saw that I have a lot of weird GET attempts to endpoints that I don't have anywhere on my server. Are these people trying to break into my server? I have auto ban setup that will ban after a certain number of attempts and my server is really locked down, I just wanted to know make sure these are attempts so I can ban their IP'S.And then I have a few access attempts to Php Myadmin as well.Is there any common access points that I can find somewhere that would let me know they're using some type of software or something to break into the server, so I would be able to ban them automatically?

Submitted May 08, 2018 at 02:00AM by Bilal_Tech
via reddit https://ift.tt/2K0OL5K
Azure AD Login correlation false positives when users are traveling
This seems to be a fundamental flaw in how our security is designed but I wanted to see what everyone else is doing.We track user logins to Azure Active Directory, when a log event occurs from within one Country and then from another Country within a certain amount of time, it generates a "Impossible travel time" error and alerts us. The idea is that if you sign into your computer in US and then within 1 hour you sign in from Japan, there is a strong likelihood the account was compromised since it would take another 9+ hours to hop on a plane from the US to Japan. This works really well but recently we’ve had a lot of users traveling and their cell phones seem to undermine the entire system.Users have a mail account on their phone, when they're traveling their phone seem to still communicate to a US datacenter even though their on an international plan/carrier with their US phone (I guess it routes from Europe back to US?). That then constantly triggers the "Impossible travel time" alert as a false positive since they are physically in the other country with their laptop, signing in, but their cell phone still beacons back to a US address.That’s one guess, another guess is there is some sort of token/cache on their phone which is still talking about to the US server. Either way it completely undermines the purpose of this product (except for the users who don’t travel but when they go on vacation the same thing happens)Please let me know your thoughts. This is functionality that is built into Azure Active Directory, so this isn’t anything custom.https://docs.microsoft.com/en-us/azure/active-directory/active-directory-reporting-risk-events

Submitted May 08, 2018 at 02:44AM by mactalker
via reddit https://ift.tt/2jCV7Ns
Protectwise cloud based network detection service (bandwidth utilization???)
Does anyone have experience with Protectwise? I got a demo and read the little technical documentation they have publicly available. One component i'm trying to figure out is how bandwidth intensive it is, seeing they claim full pcap to the cloud. Does anyone have experience or knowledge with the product?Any additional thoughts or comments are welcome as well.Thanks in advance!

Submitted May 08, 2018 at 03:41AM by Stevefsmith
via reddit https://ift.tt/2I4vYWI
Ghera, a repository of Android app vulnerability benchmarks
https://ift.tt/2z2DHnl

Submitted May 08, 2018 at 07:09AM by rvprasad
via reddit https://ift.tt/2HWA2fI
Tracy - Assists with finding all sinks and sources of a web application and displays these results in a digestible manner
https://ift.tt/2wmGx6e

Submitted May 08, 2018 at 09:18AM by TechLord2
via reddit https://ift.tt/2ruhBDQ
StreamingPhish - Uses Supervised Machine Learning to Detect Phishing Domains from the Certificate Transparency Log Network (Full Sources)
https://ift.tt/2rsOhhS

Submitted May 08, 2018 at 09:43AM by TechLord2
via reddit https://ift.tt/2FTUDvk
kids these days
https://ift.tt/2K4RB9X

Submitted May 08, 2018 at 12:12PM by Majortom80
via reddit https://ift.tt/2rsdRE1
How secure is CloudFlare "flexible SSL" option
CloudFlare "flexible SSL" puts the TLS termination point into CloudFlare's cloud, under their control. They can inspect any data sent to and from your web-server and the security is as strong as theirs.That means that the web-traffic can be intercepted between the CloudFlare and your own environment. That could happen:at your own servers;at your ISP and any routers between them and CloudFlare; orinside CloudFlare cloud.The security of your data is no longer fully under your own control - it is very much in the hands of CloudFlare. In practical terms, it doesn't have to be significantly less secure, but it creates several new weak points.... and a couple more points about the Flexible SSL, which boil down to a slider between "convenience" and "control".I wonder, which way are people likely to push this slider.How secure is CloudFlare “flexible SSL” option

Submitted May 08, 2018 at 01:20PM by dc352
via reddit https://ift.tt/2KHM8qG