A new super light protocol resistant to Eclipse Attacks
http://bit.ly/2WvagW8
Submitted May 31, 2019 at 08:08AM by yahsintw
via reddit http://bit.ly/2WfE61z
http://bit.ly/2WvagW8
Submitted May 31, 2019 at 08:08AM by yahsintw
via reddit http://bit.ly/2WfE61z
diode.io
Blockquick Super Light Blockchain Client For Trustless Time
- Click here if you just want to read the Paper -In the last two posts of this series, we first introduced the governance issues in PKI and then the circular dependency between establishing trust in PKI certificates and establishing the current time on a…
My thoughts after my first (real) attempt at Hackthebox - Beginner Guides - 0x00sec
http://bit.ly/2Mlz6nH
Submitted May 31, 2019 at 01:33PM by Evil1337
via reddit http://bit.ly/2HMwGdp
http://bit.ly/2Mlz6nH
Submitted May 31, 2019 at 01:33PM by Evil1337
via reddit http://bit.ly/2HMwGdp
0x00sec - The Home of the Hacker
My thoughts after my first (real) attempt at Hackthebox
After my previous post I’ve been thinking about the next step, should I start a series where I implement all OWASP TOP10 vulnerabilities and then break them? It could’ve happened, but I decided to try myself at hackthebox. I had an account for almost…
I made this tool to look for all the build logs of CI tools such as Travis-CI which can then be used to find sensitive information
http://bit.ly/2KgHKkK
Submitted May 31, 2019 at 03:55PM by darshkpatel
via reddit http://bit.ly/2YWQu3x
http://bit.ly/2KgHKkK
Submitted May 31, 2019 at 03:55PM by darshkpatel
via reddit http://bit.ly/2YWQu3x
GitHub
darshkpatel/BuildScour
Python tool which scours popular CI tools build logs - darshkpatel/BuildScour
Bypass default AppLocker rules - A post about a small discovery in AppLocker
http://bit.ly/2wEIHLT
Submitted May 31, 2019 at 05:50PM by oddvarmoe
via reddit http://bit.ly/30X1oZ0
http://bit.ly/2wEIHLT
Submitted May 31, 2019 at 05:50PM by oddvarmoe
via reddit http://bit.ly/30X1oZ0
Oddvar Moe's Blog
A small discovery about AppLocker
While I was prepping for a session a while back I made a a little special discovery about AppLocker. Turns out that the files that AppLocker uses under C:\Windows\System32\AppLocker can be used in …
Infosec career path
http://bit.ly/2Z00M36
Submitted May 31, 2019 at 09:08PM by trajanhorses
via reddit http://bit.ly/2MvEHbk
http://bit.ly/2Z00M36
Submitted May 31, 2019 at 09:08PM by trajanhorses
via reddit http://bit.ly/2MvEHbk
reddit
r/netsec - Infosec career path
0 votes and 1 comment so far on Reddit
Public DNS in Taiwan the latest victim to BGP hijack
http://bit.ly/2Wcog7Y
Submitted May 31, 2019 at 11:30PM by danyork
via reddit http://bit.ly/2I9Dota
http://bit.ly/2Wcog7Y
Submitted May 31, 2019 at 11:30PM by danyork
via reddit http://bit.ly/2I9Dota
MANRS
Public DNS in Taiwan the latest victim to BGP hijack
Yet another incident of Border Gateway Protocol (BGP) hijack, with the latest victim this time in Taiwan. Earlier this month (May 8), traffic going through a public DNS run by Taiwan Network Inform…
Analyzing a Coin Mining and Remote Access Hybrid Campaign
http://bit.ly/2KhoDHl
Submitted May 31, 2019 at 11:45PM by kindredsec
via reddit http://bit.ly/2Ke08uq
http://bit.ly/2KhoDHl
Submitted May 31, 2019 at 11:45PM by kindredsec
via reddit http://bit.ly/2Ke08uq
Kindred Security
Dota Campaign: Analyzing a Coin Mining and Remote Access Hybrid Campaign
Note: all files associated with this analysis can be found at here. Please contact me on twitter @kindredsec for any additional queries. A personal honeypot of mine picked up on a particularly nast…
Exploiting File Uploads Pt. 1 – MIME Sniffing to Stored XSS
http://bit.ly/2WAaLOR
Submitted May 31, 2019 at 11:53PM by deft3
via reddit http://bit.ly/2XjE8Sz
http://bit.ly/2WAaLOR
Submitted May 31, 2019 at 11:53PM by deft3
via reddit http://bit.ly/2XjE8Sz
reddit
r/netsec - Exploiting File Uploads Pt. 1 – MIME Sniffing to Stored XSS
0 votes and 0 comments so far on Reddit
Pgen – Command-line passphrase generator
The EFF has made and published three lists of words to use that are easy to spell and generally easy to remember.I wrote a command-line tool in Rust for generating passphrase using these wordlists. I use it myself any time I need a password.My tool is fast, free of charge, open source and it can also tell you the entropy that will result for any given choice of number of words.For example let’s say I want it to give me four words from the long wordlist, and I want to know how many bits of entropy this corresponds to.
Submitted May 31, 2019 at 10:27PM by codetrotter
via reddit http://bit.ly/2ENBxsS
The EFF has made and published three lists of words to use that are easy to spell and generally easy to remember.I wrote a command-line tool in Rust for generating passphrase using these wordlists. I use it myself any time I need a password.My tool is fast, free of charge, open source and it can also tell you the entropy that will result for any given choice of number of words.For example let’s say I want it to give me four words from the long wordlist, and I want to know how many bits of entropy this corresponds to.
pgen -l -n 4 -e Current settings will create passphrases with 51.70 bits of entropy.51.70 bits of entropy.What does that mean, you might ask.The Wikipedia article on password strength (https://en.wikipedia.org/wiki/Password_strength) explains it well:A password with an entropy of 42 bits calculated in this way would be as strong as a string of 42 bits chosen randomly, for example by a fair coin toss. Put another way, a password with an entropy of 42 bits would require 242 (4,398,046,511,104) attempts to exhaust all possibilities during a brute force search. Thus, by increasing the entropy of the password by one bit the number of guesses required doubles, making an attacker's task twice as difficult. On average, an attacker will have to try half the possible number of passwords before finding the correct one.Ok, so how good is 51.70 bits of entropy?Wikipedia, same article again:The minimum number of bits of entropy needed for a password depends on the threat model for the given application. [...] RFC 4086, "Randomness Requirements for Security", presents some example threat models and how to calculate the entropy desired for each one. Their answers vary between 29 bits of entropy needed if only online attacks are expected, and up to 96 bits of entropy needed for important cryptographic keys used in applications like encryption where the password or key needs to be secure for a long period of time and stretching isn't applicable.So let's say that you are satisfied with 51.70 bits of entropy in this case. What does a password like that look like? Let's generate one.
pgen -l -n 4 plastic case refocus demisePretty memorable right? :)Oh yeah, and about the claim that it's fast. Just how fast is it? Have a look.
time pgen -l -n 4 browbeat hummus sandbox unfixable real 0m0.005s user 0m0.001s sys 0m0.006sThat's 5 milliseconds.But hey, let's say we wanted to generate a bunch of passphrases at once.How much time does it take to generate 10.000 passphrases and dump them into a text file?
time pgen -l -n 4 -k 10000 > 10k.txt real 0m0.132s user 0m0.073s sys 0m0.058sAbout zero point one seconds. Not that generating 10.000 passphrases is something that you are likely to do, but it just speaks to how fast this tool is ^^Source and instructions on how to install it are on GitHub.https://github.com/ctsrc/Pgen
Submitted May 31, 2019 at 10:27PM by codetrotter
via reddit http://bit.ly/2ENBxsS
Passive DNS - a tutorial to setup your own Passive DNS using D4 Project
http://bit.ly/2WzGpvR
Submitted June 01, 2019 at 02:13AM by adulau
via reddit http://bit.ly/2Mm1MwL
http://bit.ly/2WzGpvR
Submitted June 01, 2019 at 02:13AM by adulau
via reddit http://bit.ly/2Mm1MwL
reddit
r/netsec - Passive DNS - a tutorial to setup your own Passive DNS using D4 Project
0 votes and 0 comments so far on Reddit
The /r/netsec Monthly Discussion Thread - June 2019
OverviewQuestions regarding netsec and discussion related directly to netsec are welcome here.Rules & GuidelinesAlways maintain civil discourse. Be awesome to one another - moderator intervention will occur if necessary.Avoid NSFW content unless absolutely necessary. If used, mark it as being NSFW. If left unmarked, the comment will be removed entirely.If linking to classified content, mark it as such. If left unmarked, the comment will be removed entirely.Avoid use of memes. If you have something to say, say it with real words.All discussions and questions should directly relate to netsec.No tech support is to be requested or provided on /r/netsec.As always, the content & discussion guidelines should also be observed on /r/netsec.FeedbackFeedback and suggestions are welcome, but don't post it here. Please send it to the moderator inbox.
Submitted June 01, 2019 at 10:06AM by AutoModerator
via reddit http://bit.ly/2HP2A9e
OverviewQuestions regarding netsec and discussion related directly to netsec are welcome here.Rules & GuidelinesAlways maintain civil discourse. Be awesome to one another - moderator intervention will occur if necessary.Avoid NSFW content unless absolutely necessary. If used, mark it as being NSFW. If left unmarked, the comment will be removed entirely.If linking to classified content, mark it as such. If left unmarked, the comment will be removed entirely.Avoid use of memes. If you have something to say, say it with real words.All discussions and questions should directly relate to netsec.No tech support is to be requested or provided on /r/netsec.As always, the content & discussion guidelines should also be observed on /r/netsec.FeedbackFeedback and suggestions are welcome, but don't post it here. Please send it to the moderator inbox.
Submitted June 01, 2019 at 10:06AM by AutoModerator
via reddit http://bit.ly/2HP2A9e
Reddit
Technical Information Security Content & Discussion
/r/netsec is a community-curated aggregator of technical information security content. Our mission is to extract signal from the noise — to provide value to security practitioners, students, researchers, and hackers everywhere.
Disclosing TOR users' real IP address through 301 HTTP Redirect Cache Poisoning
http://bit.ly/30YpGSl
Submitted June 01, 2019 at 10:32AM by piotrd_
via reddit http://bit.ly/2WhPFFJ
http://bit.ly/30YpGSl
Submitted June 01, 2019 at 10:32AM by piotrd_
via reddit http://bit.ly/2WhPFFJ
blog.duszynski.eu
Disclosing TOR users' real IP address through 301 HTTP Redirect Cache Poisoning
This blog post describes a practical application of the ‘HTTP 301 Cache Poisoning” attack that can be used by a malicious TOR exit node to disclose real IP address of chosen clients.
Using osquery for remote forensics
http://bit.ly/2We36X2
Submitted June 01, 2019 at 10:53AM by digicat
via reddit http://bit.ly/2JSoNFI
http://bit.ly/2We36X2
Submitted June 01, 2019 at 10:53AM by digicat
via reddit http://bit.ly/2JSoNFI
Trail of Bits Blog
Using osquery for remote forensics
System administrators use osquery for endpoint telemetry and daily monitoring. Security threat hunters use it to find indicators of compromise on their systems. Now another audience is discovering …
Hack The Box - Sizzle Write-up by 0xRick
http://bit.ly/2XkxmMm
Submitted June 01, 2019 at 08:33PM by Ahm3d_H3sham
via reddit http://bit.ly/2Iaig5N
http://bit.ly/2XkxmMm
Submitted June 01, 2019 at 08:33PM by Ahm3d_H3sham
via reddit http://bit.ly/2Iaig5N
0xRick Owned Root !
Hack The Box - Sizzle
Quick Summary Hey guys today Sizzle retired and here’s my write-up about it. Sizzle was a great machine, everything about it was great. It was very realistic, fun and of course challenging as it was rated Insane. Personally one of my favorites and one of…
Information Security Mental Models
http://bit.ly/2VZYOhd
Submitted June 02, 2019 at 01:09PM by atomlib_com
via reddit http://bit.ly/2KhQhno
http://bit.ly/2VZYOhd
Submitted June 02, 2019 at 01:09PM by atomlib_com
via reddit http://bit.ly/2KhQhno
Chris Sanders
Information Security Mental Models
I’ve argued for some time that information security is in a growing state of cognitive crisis. Even with a deluge of freely available information, we do a poor job identifying and teaching th…
A life of crime
http://bit.ly/2wlN9Pu
Submitted June 02, 2019 at 03:12PM by bvdbijl
via reddit http://bit.ly/2wwY34T
http://bit.ly/2wlN9Pu
Submitted June 02, 2019 at 03:12PM by bvdbijl
via reddit http://bit.ly/2wwY34T
reddit
r/netsec - A life of crime
0 votes and 0 comments so far on Reddit
First of a kind? Mobile web application vulnerability scanner app for Android by Vulners
http://bit.ly/313lDnV
Submitted June 03, 2019 at 01:03PM by isox_xx
via reddit http://bit.ly/2Wfhh9K
http://bit.ly/313lDnV
Submitted June 03, 2019 at 01:03PM by isox_xx
via reddit http://bit.ly/2Wfhh9K
Google Play
Vulners Scanner - Apps on Google Play
Vulners Scanner is developed by Vulners Team, the founders and maintainers of one of the world largest security databases.
It implements technology of passive vulnerability scanning based on software version fingerprint.
Q&A
Is it legal?
Absolutely.
Application…
It implements technology of passive vulnerability scanning based on software version fingerprint.
Q&A
Is it legal?
Absolutely.
Application…
Social influence on security sensitivity
http://bit.ly/2KgBTfa
Submitted June 03, 2019 at 05:03PM by PrizeControl
via reddit http://bit.ly/2Z6MaP9
http://bit.ly/2KgBTfa
Submitted June 03, 2019 at 05:03PM by PrizeControl
via reddit http://bit.ly/2Z6MaP9
Medium
We need to talk about security
Despite the huge effort that cybersecurity companies take to raise world’s population security sensitivity, people still tend to ignore…
Code Analysis of Basic Cryptomining Malware
http://bit.ly/2EOq64o
Submitted June 03, 2019 at 09:54PM by kindredsec
via reddit http://bit.ly/312kEEo
http://bit.ly/2EOq64o
Submitted June 03, 2019 at 09:54PM by kindredsec
via reddit http://bit.ly/312kEEo
Kindred Security
Code Analysis of Basic Cryptomining Malware
In my last post (which you can read here), we walked through a semi-sophisticated attack which involved installing multiple backdoors, setting up coin mining operation, and maintaining persistence.…
NVIDIA GeForce Experience OS Command Injection: CVE-2019-5678
http://bit.ly/2W8SML3
Submitted June 03, 2019 at 09:24PM by hackers_and_builders
via reddit http://bit.ly/2WEj5xb
http://bit.ly/2W8SML3
Submitted June 03, 2019 at 09:24PM by hackers_and_builders
via reddit http://bit.ly/2WEj5xb
Rhino Security Labs
NVIDIA GFE OS Command Injection: CVE-2019-5678
This post walks through the discovery process of the NVIDIA GeForce Experience OS command injection vulnerability, assigned to CVE-2019-5678.
Fraud and Deception (Part 1)
http://bit.ly/2QJ0PNS
Submitted June 04, 2019 at 12:59AM by skeeto
via reddit http://bit.ly/2EQehKZ
http://bit.ly/2QJ0PNS
Submitted June 04, 2019 at 12:59AM by skeeto
via reddit http://bit.ly/2EQehKZ