Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
CLAM DOWN
Feb 13, 2007




22 Eargesplitten posted:

Are we not supposed to use a password manager anymore? Is that what the SmartLock thing was? Because my Keepass2Android is no longer finding the Keepass database file, despite the sync program finding it. Or is Keepass2Android broken now?

1) What, no, please use a password manager
2) Smart Lock is the Android location or Bluetooth based unlock mechanism
3) It's not broken, it works fine for me, no idea what your issue is. I use mine from Google Drive.

Adbot
ADBOT LOVES YOU

22 Eargesplitten
Oct 10, 2010



Okay, good. I use mine locally, synced between devices on my home network.

I'll try deleting the copy on my phone and re-syncing, maybe it got corrupted.

apseudonym
Feb 25, 2011

CLAM DOWN posted:

2) Smart Lock is the Android location or Bluetooth based unlock mechanism
No that's smart unlock, smart lock is basically a password manager.

CLAM DOWN
Feb 13, 2007




apseudonym posted:

No that's smart unlock, smart lock is basically a password manager.

GD it, sorry, too similarly named

CLAM DOWN
Feb 13, 2007




2017 Verizon Data Breach Report is out, it's usually pretty interesting

http://www.verizonenterprise.com/resources/reports/rp_DBIR_2017_Report_en_xg.pdf

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
I wonder if the prevalence of online patient info sites increases or decreases breaches from misdelivery re healthcare.

Also never allow employees to use email.

andrew smash
Jun 26, 2006

smooth soul

seems to be this?
https://twitter.com/taviso/status/861747942314487809

Absurd Alhazred
Mar 27, 2010

by Athanatos

:stonk:

CLAM DOWN
Feb 13, 2007





I love this part:

quote:

NScript is the component of mpengine that evaluates any filesystem or network activity that looks like JavaScript. To be clear, this is an unsandboxed and highly privileged JavaScript interpreter that is used to evaluate untrusted code, by default on all modern Windows systems. This is as surprising as it sounds.

Absurd Alhazred
Mar 27, 2010

by Athanatos
Antivirus: not even once.

ETA:
https://twitter.com/FAANews/status/861697994323787776

Absurd Alhazred fucked around with this message at 05:13 on May 9, 2017

Boris Galerkin
Dec 17, 2011

I don't understand why I can't harass people online. Seriously, somebody please explain why I shouldn't be allowed to stalk others on social media!

CLAM DOWN posted:

I love this part:

:aaaaa:

:wtf:

Double Punctuation
Dec 30, 2009

Ships were made for sinking;
Whiskey made for drinking;
If we were made of cellophane
We'd all get stinking drunk much faster!
What do I win?

Diva Cupcake
Aug 15, 2005

MS already released the out of band patch. Nice response.

https://twitter.com/msftsecresponse/status/861734360193552385

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender
It is also the stupidest thing I've seen in a while.

a witch
Jan 12, 2017

So what's the right way of handling secrets these days? I have a couple dozen VMs and they all need encryption keys, database credentials, API keys etc.

Right now it's all in /etc directories and files with rigid permissions, managed by ansible. It works, but it feels like a disaster waiting to happen.

Forgall
Oct 16, 2012

by Azathoth

a witch posted:

So what's the right way of handling secrets these days? I have a couple dozen VMs and they all need encryption keys, database credentials, API keys etc.

Right now it's all in /etc directories and files with rigid permissions, managed by ansible. It works, but it feels like a disaster waiting to happen.
Check out https://www.vaultproject.io/

bitprophet
Jul 22, 2004
Taco Defender
Yup, Vault seems to have a lot of the mindshare in that space lately. I had to look into this semi recently myself (in a "likes to use open source, is cloud hosted" context, FWIW) and threw a bunch of bookmarks into Pinboard: https://pinboard.in/u:bitprophet/t:secretsmanagement

Some of those are articles or adjacent resources; I'd say the big names to look into are Vault, Torus, Keywhiz, Cerberus, or $CLOUD_PROVIDER_SOLUTION if you're on a single cloud, like Amazon's KMS (which has dozens of projects built on it or can be used directly.)

I haven't gotten super deep into Vault yet, practically speaking, but what I have used has been pretty solid and I like a lot of the overall design, the number of secrets backends, etc. It definitely seems like the solution to beat if it fits your parameters.

Sheep
Jul 24, 2003
Have an HP laptop with a Conexant audio device? How do you feel about having all of your keystrokes logged to disk?

quote:

Conexant's MicTray64.exe is installed with the Conexant audio driver package and registered as a Microsoft Scheduled Task to run after each user login. The program monitors all keystrokes made by the user to capture and react to functions such as microphone mute/unmute keys/hotkeys. Monitoring of keystrokes is added by implementing a low- level keyboard input hook [1] function that is installed by calling SetwindowsHookEx().

In addition to the handling of hotkey/function key strokes, all key-scancode information [2] is written into a logfile in a world-readable path (C:\Users\Public\MicTray.log). If the logfile does not exist or the setting is not yet available in Windows registry, all keystrokes are passed to the OutputDebugString API, which enables any process in the current user-context to capture keystrokes without exposing
malicious behavior.

Sheep fucked around with this message at 14:20 on May 11, 2017

Thanks Ants
May 21, 2004

#essereFerrari


:psyduck:

Mopp
Oct 29, 2004

I don't know if this is the right thread for this, but I'm stuck on a problem. I have some binary blobs which are encoded in some way, but I can't tell how. Looking at the hexdump of one of them, it seems to be an ASCII representation of hex values.

code:
00000000  30 30 30 30 31 31 30 30  30 35 30 30 37 38 64 61  |00001100050078da|
00000010  32 62 34 61 34 64 34 63  61 39 30 34 30 30 30 36  |2b4a4d4ca9040006|
00000020  33 37 30 32 31 36                                 |370216|
My best guess so far is that it's some kind of protobuf or similar encoding, but I can't seem to reverse it. Anyone got suggestions?

One possible hint is that 0x4a4d4c represents JML in ASCII, but I haven't found anything from there.

Thermopyle
Jul 1, 2003

...the stupid are cocksure while the intelligent are full of doubt. —Bertrand Russell


I always wish I could talk to the people who implemented these stupid things and find out what the hell they were thinking.

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

Thermopyle posted:

I always wish I could talk to the people who implemented these stupid things and find out what the hell they were thinking.

"We need to get this thing out yesterday and they're not paying us to do anything after it's feature complete" mostly

hobbesmaster
Jan 28, 2008

Thermopyle posted:

I always wish I could talk to the people who implemented these stupid things and find out what the hell they were thinking.

"Meets specs, ship it"

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

Volmarias posted:

"We need to get this thing out yesterday and they're not paying us to do anything after it's feature complete" mostly

This is exactly right. Crunch time means the project manager will look for the easy and really lovely implementation to get them across the finish line.

Here's another example where a car insurance company decided to not have authentication in really dangerous API calls.

https://www.andreascarpino.it/posts/how-my-car-insurance-exposed-my-position.html

Pile Of Garbage
May 28, 2007



As long as we agree that every single person involved should be fired out of a cannon into the sun.

SeaborneClink
Aug 27, 2010

MAWP... MAWP!
edit: wrong thread

SeaborneClink fucked around with this message at 21:19 on May 11, 2017

Furism
Feb 21, 2006

Live long and headbang

EVIL Gibson posted:

This is exactly right. Crunch time means the project manager will look for the easy and really lovely implementation to get them across the finish line.

Here's another example where a car insurance company decided to not have authentication in really dangerous API calls.

https://www.andreascarpino.it/posts/how-my-car-insurance-exposed-my-position.html

I hope someday a law will make this a crime. Security should not be an afterthought.

ThatNateGuy
Oct 15, 2004

"Is that right?"
Slippery Tilde
So, Trump actually did something good with this new EO. We can discuss whether or not the man even knows what he's signing off on, but bottom line, this is a good move. The EO strengthens US cybersecurity and holds LEAs accountable for risk management.

https://techcrunch.com/2017/05/11/trump-signs-long-delayed-executive-order-on-cybersecurity/

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Most of the EO looks good and strengthening standards at the federal level will cascade in to a bunch of different sectors that work with them so it should shore things up quite well. The standard they use for Critical Infrastructure is from 2001 and rather vague so I expect either it will get reworded or all the agencies will re-assess what constitutes Critical Infrastructure and a lot more things are going to come under some kind of scrutiny *cough* SCADA *cough*

This bit though:

quote:

(b) Deterrence and Protection . Within 90 days of the date of this order, the Secretary of State, the Secretary of the Treasury, the Secretary of Defense, the Attorney General, the Secretary of Commerce, the Secretary of Homeland Security, and the United States Trade Representative, in coordination with the Director of National Intelligence, shall jointly submit a report to the President, through the Assistant to the President for National Security Affairs and the Assistant to the President for Homeland Security and Counterterrorism, on the Nation's strategic options for deterring adversaries and better protecting the American people from cyber threats.

could have unintentional consequences resulting in legal reprisal mechanisms for people who do security research and disclosures which scares me.

ThatNateGuy
Oct 15, 2004

"Is that right?"
Slippery Tilde

BangersInMyKnickers posted:

Most of the EO looks good and strengthening standards at the federal level will cascade in to a bunch of different sectors that work with them so it should shore things up quite well. The standard they use for Critical Infrastructure is from 2001 and rather vague so I expect either it will get reworded or all the agencies will re-assess what constitutes Critical Infrastructure and a lot more things are going to come under some kind of scrutiny *cough* SCADA *cough*

This bit though:


could have unintentional consequences resulting in legal reprisal mechanisms for people who do security research and disclosures which scares me.

You think so? Even with all of the new bug bounty programs that even the DoD is starting to implement?

hobbesmaster
Jan 28, 2008

BangersInMyKnickers posted:

Most of the EO looks good and strengthening standards at the federal level will cascade in to a bunch of different sectors that work with them so it should shore things up quite well. The standard they use for Critical Infrastructure is from 2001 and rather vague so I expect either it will get reworded or all the agencies will re-assess what constitutes Critical Infrastructure and a lot more things are going to come under some kind of scrutiny *cough* SCADA *cough*

This bit though:


could have unintentional consequences resulting in legal reprisal mechanisms for people who do security research and disclosures which scares me.

That's just telling people send him a report, wait until something real is proposed to be scared.

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Requesting the report indicates they plan on doing something. Our government loves reprisals on whistleblowers, we have a long history of it. There's plenty to be concerned about right now.

The Fool
Oct 16, 2003


We are currently evaluating Filecloud (https://www.getfilecloud.com/) as a method to share files with external users.

They offer an on prem version and a hosted version, we're testing the hosted version.

Guess who just discovered that you can go through the entire login process as a user without seeing https anywhere.

Diametunim
Oct 26, 2010
If anyone needs a list of hashes for the WannaCry / Wcry going around right now so you can block your endpoints from executing, links below.

https://gist.github.com/Blevene/42bed05ecb51c1ca0edf846c0153974a
https://isc.sans.edu/forums/diary/Massive+wave+of+ransomware+ongoing/22412/

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Who is the person in the GitHub link? We're a bit wary of shooting down hashes from some random GitHub post when I can't even find a corresponding twitter feed.

Thanks Ants
May 21, 2004

#essereFerrari


Is there anything in these ransomware payloads in general that would prevent multiple machines from encrypting the same network shares, requiring decryption in the reverse order to get the data back?

Diametunim
Oct 26, 2010

BangersInMyKnickers posted:

Who is the person in the GitHub link? We're a bit wary of shooting down hashes from some random GitHub post when I can't even find a corresponding twitter feed.

Pulled it from: https://twitter.com/malwrhunterteam?lang=en if you search the page for "md5" the gist link will come up.

CLAM DOWN
Feb 13, 2007




This is what they get for running XP and not patching systems, what are the chances this will be a wakeup call? (answer: zero)

ufarn
May 30, 2009
Holy poo poo https://twitter.com/josephfcox/status/863171107217563648

Adbot
ADBOT LOVES YOU

CLAM DOWN
Feb 13, 2007





:lol:

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply