Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Actuarial Fables
Jul 29, 2014

Taco Defender

stevewm posted:

Even worse.. the email and phone number are clickable links. Clicking on them lets you update the email or phone number used to "verify".

I love this

Adbot
ADBOT LOVES YOU

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

stevewm posted:

Some time ago I posted about a card processing companies' website we use having absolutely useless 2FA.

After trying multiple times to get a hold of someone about it and never receiving a response, nearly 2 years later it is still this way. Ready to name and shame... FirstAmerican Payment Systems is the name. This is their backend website known as "FirstView".



This is the challenge screen you are presented with. You can select to receive a code via email or text. Except you don't need to do it. You can just click "User Settings" at the bottom which takes you to the settings screen inside the account. From there you can click Home to get to the main screen. Since the introduced "2FA" i've never actually had to do it!

Even worse.. the email and phone number are clickable links. Clicking on them lets you update the email or phone number used to "verify". So if someone did get your username/password. They could easily change the email/phone number the "2FA" codes go to.


Thankfully you can't really do anything on this website. It only shows the last 4 of card numbers, no names, and you cannot perform any type of transactions. It is reporting only.

Oh good, the old methodology of "Escape the Security Requirement through a couple clicks" lives on past Windows 95.

Nothing says "Secure" like "Being so helpful in our UI that you don't have to be secure"

stevewm
May 10, 2005
Every time I login, I feel like the tired old movie cliche where someone gets around security by just typing "BYPASS". It takes less clicks to bypass then it does to actually use the "verification" process.

I would like to point out it SHOWS which email address and/or phone number it is sending the code to. Most other 2FA implementations usually hide this, or only show the last couple characters. It also helpfully tells you that you can click on the email or phone to update it!

Bonus: When you change the email, it ALSO changes the email address on the account as well. And it does so without verification. It doesn't send any notification that it has been changed.

CyberPingu
Sep 15, 2013


If you're not striving to improve, you'll end up going backwards.

stevewm posted:

Some time ago I posted about a card processing companies' website we use having absolutely useless 2FA.

After trying multiple times to get a hold of someone about it and never receiving a response, nearly 2 years later it is still this way. Ready to name and shame... FirstAmerican Payment Systems is the name. This is their backend website known as "FirstView".



This is the challenge screen you are presented with. You can select to receive a code via email or text. Except you don't need to do it. You can just click "User Settings" at the bottom which takes you to the settings screen inside the account. From there you can click Home to get to the main screen. Since the introduced "2FA" i've never actually had to do it!

Even worse.. the email and phone number are clickable links. Clicking on them lets you update the email or phone number used to "verify". So if someone did get your username/password. They could easily change the email/phone number the "2FA" codes go to.


Thankfully you can't really do anything on this website. It only shows the last 4 of card numbers, no names, and you cannot perform any type of transactions. It is reporting only.

I'd totally do more digging around this site.

I guarantee you there's some default creds or some dev tokens stored in a css page somewhere

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug
That or didnt scrub the commit pages like one page I found and had poor folder permissions for the webhost

CyberPingu
Sep 15, 2013


If you're not striving to improve, you'll end up going backwards.

CommieGIR posted:

That or didnt scrub the commit pages like one page I found and had poor folder permissions for the webhost

Guarantee they have a poo poo responsible disclosure system too.

Impotence
Nov 8, 2010
Lipstick Apathy

CyberPingu posted:

Guarantee they have a poo poo responsible disclosure system too.

What is responsible disclosure? Do you mean immediate lawsuit threats?

trashy owl
Aug 23, 2017

Biowarfare posted:

What is responsible disclosure? Do you mean immediate lawsuit threats?

:emptyquote:

CyberPingu
Sep 15, 2013


If you're not striving to improve, you'll end up going backwards.

Biowarfare posted:

What is responsible disclosure? Do you mean immediate lawsuit threats?

Do responsible disclosure stuff not exist in the US?

Kazinsal
Dec 13, 2011



CyberPingu posted:

Do responsible disclosure stuff not exist in the US?

If you can be successfully sued for it despite covering your rear end and doing it in good faith, you don't do it in America.

Frozen Peach
Aug 25, 2004

garbage man from a garbage can
Three months ago I responsibly disclosed an issue I found in a website that allows me to login without a password.

I've gotten sick of waiting and am reporting their site to both Square and Stripe, as they integrate for payment processing and their blatant disregard for security horrifies me.

Truga
May 4, 2014
Lipstick Apathy

Kazinsal posted:

If you can be successfully sued for it despite covering your rear end and doing it in good faith, you don't do it in America.

over here the company in question just tells the cops you hacked and stole something from them and they put you in jail if it's large enough lol

balkan ftw

xtal
Jan 9, 2011

by Fluffdaddy

CyberPingu posted:

Do responsible disclosure stuff not exist in the US?

It does in the sense that "responsible" is "over Tor and pastebin"

RFC2324
Jun 7, 2012

http 418

xtal posted:

It does in the sense that "responsible" is "over Tor and pastebin"

isn't TOR compromised by the NSA at the very least at this point? I know they had taken over several of the entry/exit nodes a few years back, and would expect that to have become more commonplace

Impotence
Nov 8, 2010
Lipstick Apathy

RFC2324 posted:

isn't TOR compromised by the NSA at the very least at this point? I know they had taken over several of the entry/exit nodes a few years back, and would expect that to have become more commonplace

You post to a v3 hidden service, not the public internet via an exit

Dr. Fishopolis
Aug 31, 2004

ROBOT

RFC2324 posted:

isn't TOR compromised by the NSA at the very least at this point? I know they had taken over several of the entry/exit nodes a few years back, and would expect that to have become more commonplace

only if you use an exit node, which if you're using tor properly you shouldn't.

klosterdev
Oct 10, 2006

Na na na na na na na na Batman!
Wasn't TOR released to the public by the NSA for the specific purpose of obfuscating which of the nodes were actually controlled by the NSA

Shouldn't it have been considered compromised from launch given who designed the spec?

xtal
Jan 9, 2011

by Fluffdaddy

klosterdev posted:

Wasn't TOR released to the public by the NSA for the specific purpose of obfuscating which of the nodes were actually controlled by the NSA

Shouldn't it have been considered compromised from launch given who designed the spec?

Basically, no. The fact that the NSA uses it means it's probably mathematically secure. A lot of crimes have been committed over Tor but there has been no record of Tor being the reason why someone is prosecuted or convicted.

For case studies:

1. With Ross Ulbricht, his server leaked the IP address and then he was tracked through conventional means.

2. With Freedom Hosting, the USA deployed Javascript exploits targeting Tor Browser on Windows with the purpose of revealing the IP..

If they could easily break Tor, they wouldn't rely so much on revealing the public IP through side channels.

I think there was also a case of someone delivering a bomb threat over Tor to avoid an exam. This was easily tracked down because they could see which computers in the area had connected to Tor and start their investigation there, regardless of what they did. It's true, according to Snowden's leaks, that just using Tor marks people for further surveillance.

xtal fucked around with this message at 15:51 on Aug 28, 2020

Dr. Fishopolis
Aug 31, 2004

ROBOT
TOR is perfectly fine if you know what it can and can't do, and how your OS works. The fact that there's a windows client with javascript enabled by default just seems like a huge obvious trap to me, but combined with whonix or tails or whatever it can be very useful.

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

klosterdev posted:

Wasn't TOR released to the public by the NSA for the specific purpose of obfuscating which of the nodes were actually controlled by the NSA

Shouldn't it have been considered compromised from launch given who designed the spec?

It was designed by the Naval Research Lab as a way for spies (?) to be able to securely communicate. That said, using Tor is going to put you up there on the "do watch" list.

BlankSystemDaemon
Mar 13, 2009



Volmarias posted:

It was designed by the Naval Research Lab as a way for spies (?) to be able to securely communicate. That said, using Tor is going to put you up there on the "do watch" list.
Posting on SomethingAwful will also land you on watchlists.
Everything does, when the loving lunatics are running the asylum, as is the case with this hellworld.

Powered Descent
Jul 13, 2008

We haven't had that spirit here since 1969.

D. Ebdrup posted:

Posting on SomethingAwful will also land you on watchlists.
Everything does, when the loving lunatics are running the asylum, as is the case with this hellworld.

Hell, just working as a sysadmin puts you in the spooks' crosshairs, since just about anything they'd like to get into, there's a sysadmin who already has access to it, and we're likely to be the weakest link.

https://theintercept.com/2014/03/20/inside-nsa-secret-efforts-hunt-hack-system-administrators/

The Intercept posted:

Once the agency believes it has identified a sys admin’s personal accounts, according to the posts, it can target them with its so-called QUANTUM hacking techniques. The Snowden files reveal that the QUANTUM methods have been used to secretly inject surveillance malware into a Facebook page by sending malicious NSA data packets that appear to originate from a genuine Facebook server. This method tricks a target’s computer into accepting the malicious packets, allowing the NSA to infect the targeted computer with a malware “implant” and gain unfettered access to the data stored on its hard drive.
...
While targeting innocent sys admins may be surprising on its own, the “hunt sys admins” document reveals how the NSA network specialist secretly discussed building a “master list” of sys admins across the world, which would enable an attack to be initiated on one of them the moment their network was thought to be used by a person of interest.

And people wonder why I run noscript and route all my traffic through a good VPN... :tinfoil:

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

Powered Descent posted:

Hell, just working as a sysadmin puts you in the spooks' crosshairs, since just about anything they'd like to get into, there's a sysadmin who already has access to it, and we're likely to be the weakest link.

https://theintercept.com/2014/03/20/inside-nsa-secret-efforts-hunt-hack-system-administrators/


And people wonder why I run noscript and route all my traffic through a good VPN... :tinfoil:

If you're on the Mossad side of the Mickens' Mossad/Not-Mossad threat model, you're still vulnerable to rubber hose based attacks.

Powered Descent
Jul 13, 2008

We haven't had that spirit here since 1969.

Volmarias posted:

If you're on the Mossad side of the Mickens' Mossad/Not-Mossad threat model, you're still vulnerable to rubber hose based attacks.

With that attitude, why take any infosec steps at all? If adversaries are always either incapable or omniscient, with no in-between, then what's the point?

In this case, the point is that I just don't want to be an obvious soft target. I'm not likely to be their actual goal, after all. If (by some bizarre circumstance) the feds wanted to warrantlessly hack into my employer's systems, they'd have much better entry point candidates than me. Say, the DBA down the hall who runs all those janky third-party Facebook plugins on his work laptop.

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

Powered Descent posted:

With that attitude, why take any infosec steps at all? If adversaries are always either incapable or omniscient, with no in-between, then what's the point?

In this case, the point is that I just don't want to be an obvious soft target. I'm not likely to be their actual goal, after all. If (by some bizarre circumstance) the feds wanted to warrantlessly hack into my employer's systems, they'd have much better entry point candidates than me. Say, the DBA down the hall who runs all those janky third-party Facebook plugins on his work laptop.

I'm suggesting you be realistic about what you're actually defending against and how.

Powered Descent
Jul 13, 2008

We haven't had that spirit here since 1969.

Volmarias posted:

I'm suggesting you be realistic about what you're actually defending against and how.

I'm defending against malware and advertiser tracking by blocking scripts on most sites.

I'm defending against my ISP seeing everything I do online (and potentially selling it, now that that's perfectly legal for them to do) by running most of my traffic through a VPN. That same VPN also defends against the MPAA suing me for the small bit of torrenting I still do, keeps every random site I visit from knowing my home IP and physical location, and also enables simple tricks like watching youtube videos that are only supposed to be available in other countries.

What exactly is unrealistic about those?

It is true that all the stuff about the spooks is a hell of a lot more speculative. But if it's at least partially defended against by the precautions I'm already taking, then hey, that's great. I apologize if I gave the impression that the tinfoil-hat stuff was my only motivation for doing any personal infosec.

wolrah
May 8, 2006
what?

Powered Descent posted:

I'm defending against my ISP seeing everything I do online (and potentially selling it, now that that's perfectly legal for them to do) by running most of my traffic through a VPN.
I have never understood the logic that leads someone to conclude "My ISP might be monitoring what I connect to and selling that data, so I'm going to keep it from them by routing it to another party who is specifically advertising for me to send them my private traffic and could do the exact same things with it". I'm sure they swear they don't log anything, but we've seen time and again that gets proven to not be true.

If you're concerned about privacy from an intrusive network operator, run your own VPN at a trusted location. Your home, your office, a $5/mo VPS with a trusted provider, whatever. Algo makes it drat near trivial to deploy one basically whenever you want, you could pretty easily create them on demand and destroy them when you're done.

quote:

That same VPN also defends against the MPAA suing me for the small bit of torrenting I still do, keeps every random site I visit from knowing my home IP and physical location, and also enables simple tricks like watching youtube videos that are only supposed to be available in other countries.
Now this, for the most part, is what a commercial VPN service is actually good for. Evading georestrictions and dodging copyright enforcers. Not data you actually care about.

Balsa
May 10, 2020

Turbo Nerd
Hrm.. Thats a interesting idea, making a rclone mount of SA Forums... Time to start hacking!

RFC2324
Jun 7, 2012

http 418

I wonder when Jeffrey is going to start selling SA user data

Fame Douglas
Nov 20, 2013

by Fluffdaddy

RFC2324 posted:

I wonder when Jeffrey is going to start selling SA user data

Jeffrey doesn't own the forums and SA user data is worthless to anyone but the Secret Service, to find out the identities of the C-SPAMmers posting death threats against elected officials.

Fame Douglas fucked around with this message at 22:48 on Aug 28, 2020

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Jeffrey doesn’t need to own the forums if he has deploy rights to code that runs with database access. Snowden didn’t own the NSA either.

BlankSystemDaemon
Mar 13, 2009



Powered Descent posted:

Hell, just working as a sysadmin puts you in the spooks' crosshairs, since just about anything they'd like to get into, there's a sysadmin who already has access to it, and we're likely to be the weakest link.

https://theintercept.com/2014/03/20/inside-nsa-secret-efforts-hunt-hack-system-administrators/


And people wonder why I run noscript and route all my traffic through a good VPN... :tinfoil:
It's sad that it's not listed on the ANT catalog, but there's a lot of cool stuff on there.

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

Subjunctive posted:

Jeffrey doesn’t need to own the forums if he has deploy rights to code that runs with database access. Snowden didn’t own the NSA either.

What would the URL for the new shartded site be?

Fame Douglas
Nov 20, 2013

by Fluffdaddy
Jeffrey could be sued, and considering his posting history shows him to not be a "risk-taker", that's not somethin he'd be willing to do.

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...
That's extremely long for a domain name

CLAM DOWN
Feb 13, 2007




lol if you think I haven't already hacked you all with my elevated privileged access as a mod just lol

Cup Runneth Over
Aug 8, 2009

She said life's
Too short to worry
Life's too long to wait
It's too short
Not to love everybody
Life's too long to hate


CLAM DOWN posted:

lol if you think I haven't already hacked you all with my elevated privileged access as a mod just lol

How come you never clicked on the suspicious link I PMed you? I mean, not that I would know if you did or not

CLAM DOWN
Feb 13, 2007




Cup Runneth Over posted:

How come you never clicked on the suspicious link I PMed you? I mean, not that I would know if you did or not

I am far far too elite to fall prey to your petty whaling schemes

Cup Runneth Over
Aug 8, 2009

She said life's
Too short to worry
Life's too long to wait
It's too short
Not to love everybody
Life's too long to hate


CLAM DOWN posted:

I am far far too elite to fall prey to your petty whaling schemes

But there's hot single women in {YOUR_AREA}

Adbot
ADBOT LOVES YOU

CyberPingu
Sep 15, 2013


If you're not striving to improve, you'll end up going backwards.

Subjunctive posted:

Snowden didn’t own the NSA either.

Well he did in a sense

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply