Netsec – Telegram
Netsec
7.39K subscribers
22.4K links
This channel posts the feed from r/netsec.
For any suggestions dm @streaak
Donate to keep the bot running https://www.paypal.me/akhilgv
Download Telegram
Microsoft, Google: We've found a fourth data-leaking Meltdown-Spectre CPU hole. Design blunder exists in Intel, AMD, Arm, Power processors
https://ift.tt/2IBfbuI

Submitted May 22, 2018 at 05:21AM by spartanatreyu
via reddit https://ift.tt/2s3cevI
What is an S/PDIF port? What functions can it fulfill? What are some little unknown capabilities?
I think I have had a security breach with my computer and I would like to understand this port.

Submitted May 22, 2018 at 06:37AM by KublaiKhanDayzed
via reddit https://ift.tt/2IGOEvR
How to crack hash type PKZIP2 on kali linux?
Hi, I have my .zip file that I would like to open, I forget the password, when I tried to recover it with John The Ripper in Kali Linux, but I get an error "No Password hashes loaded".When i run the command to obtains the password hash, i've got a hashes like this :prep.zip:$pkzip2$1*2*3*0*250d*2fa9*eda32bdf*0*62*8*8*eda3*04aa*prep.zip*$/pkzip2$:::::prep.zipIt seems John The ripper on Kali Linux can't crack this "pkzip2 encryption" , I say it, because when I try to crack this hash-type on Windows with John TR, it's works, it crack this hash type. Linux is supposed to be designed for this sort of thing, so I want to know why it does not work on Linux.I put the commands that I make on Linux et Windows.ON LINUXroot@kali:~# cd Bureauroot@kali:~/Bureau# zip2john prep.zipver 14 efh 7075 prep.zip->Pr�sentation Personnelle.docx PKZIP Encr: 2b chk, TS_chk, cmplen=9485, decmplen=12201, crc=EDA32BDFprep.zip:$pkzip2$1*2*3*0*250d*2fa9*eda32bdf*0*62*8*8*eda3*04aa*prep.zip*$/pkzip2$:::::prep.ziproot@kali:~/Bureau# zip2john prep.zip > prep.johnver 14 efh 7075 prep.zip->Pr�sentation Personnelle.docx PKZIP Encr: 2b chk, TS_chk, cmplen=9485, decmplen=12201, crc=EDA32BDFroot@kali:~/Bureau# john --incremental prep.johnUsing default input encoding: UTF-8No password hashes loaded (see FAQ)root@kali:~/Bureau#The same commandsON WINDOWSC:\johnj\run>zip2john /cygdrive/c/Users/*****/Desktop/prep.zip4 [main] zip2john 8688 find_fast_cwd: WARNING: Couldn't compute FAST_CWD pointer. Please report this problem tothe public mailing list [cygwin@cygwin.com](mailto:cygwin@cygwin.com)ver 14 efh 7075 prep.zip->Pr▒sentation Personnelle.docx PKZIP Encr: 2b chk, TS_chk, cmplen=9485, decmplen=12201, crc=EDA32BDFprep.zip:$pkzip2$1*2*3*0*250d*2fa9*eda32bdf*0*62*8*29*eda3*04aa*/cygdrive/c/Users/*****/Desktop/prep.zip*$/pkzip2$:::::/cygdrive/c/Users/*****/Desktop/prep.zipC:\johnj\run>zip2john /cygdrive/c/Users/*****/Desktop/prep.zip > C:\Users\****\Desktop\prep.john2 [main] zip2john 7284 find_fast_cwd: WARNING: Couldn't compute FAST_CWD pointer. Please report this problem tothe public mailing list [cygwin@cygwin.com](mailto:cygwin@cygwin.com)ver 14 efh 7075 prep.zip->Pr▒sentation Personnelle.docx PKZIP Encr: 2b chk, TS_chk, cmplen=9485, decmplen=12201, crc=EDA32BDFC:\johnj\run>john --incremental /cygdrive/c/Users/*****/Desktop/prep.john3 [main] john 6504 find_fast_cwd: WARNING: Couldn't compute FAST_CWD pointer. Please report this problem tothe public mailing list [cygwin@cygwin.com](mailto:cygwin@cygwin.com)Loaded 1 password hash (PKZIP [32/32])Will run 2 OpenMP threadsPress 'q' or Ctrl-C to abort, almost any other key for status0g 0:00:00:09 0g/s 840.5p/s 840.5c/s 840.5C/s 11022..andeoprofe (prep.zip)1g 0:00:01:10 DONE (2018-05-22 02:35) 0.01407g/s 246830p/s 246830c/s 246830C/s pubwa..tyihfUse the "--show" option to display all of the cracked passwords reliablySession completedSorry for my english!

Submitted May 22, 2018 at 12:41PM by T-drum
via reddit https://ift.tt/2kfIok4
What is the typical 'secret' flow?
What's your suggestion 'secret' flow from the moment it is received from a 3rd party vendor (e.g. API key) to the moment it appears within the process environment variable and is accessible by code. You may assume typical cloud environment + typical Docker orchestrator.Example flow: store in vault, write a deployment noscript that reads from the vault and inject into the process env var (I can see flaws within this flow, just an example)

Submitted May 22, 2018 at 04:55PM by yonatannn
via reddit https://ift.tt/2KHxP4Q
Can't make calls on Telegram in Qatar
Hello, I'm visiting Qatar. I used Telegram to make calls without problems for several days, but yesterday I've noticed something weird: I can't makes calls on Telegram and the all Internet connection slows down.I've tested both using WiFi and SIM data. Some other useful information:Internet connection seams sloweryesterday whatsapp calls doesn't work; today works fineFacebook calls using Messanger work fineI use an iPhoneCan someone help understanding what is going on?

Submitted May 22, 2018 at 04:22PM by aadeg
via reddit https://ift.tt/2IULCaX
New Research Uncovers ‘Simplified’ Means of Launching Rowhammer Attacks
https://ift.tt/2xbOlIv

Submitted May 22, 2018 at 05:22PM by whitehattracker
via reddit https://ift.tt/2kgv1k0
Testing Arbitrary Code Guard against Kernel Code Injections
https://ift.tt/2khaR9q

Submitted May 22, 2018 at 06:03PM by Scene_News
via reddit https://ift.tt/2keUeLn
What are your opinions on using DuckDuckGo instead of Google?
I know Google has more features but are you willing to give them up in order to get more privacy?

Submitted May 22, 2018 at 07:50PM by TooFiveFive
via reddit https://ift.tt/2LnVx79
Red Hat's sterling reputation for security means the company has a workable process for preventing problems and responding to them. Even if you don't use Linux, the company's approach has a lot going for it, and some of its practices might be worth adopting in your own shop.
https://ift.tt/2IFRTIl

Submitted May 22, 2018 at 09:43PM by yourbasicgeek
via reddit https://ift.tt/2rVGLfV