|
https://twitter.com/pcgamer/status/1305823956503613442 can't understand why having to log into my mouse is a bad idea
|
# ? Sep 15, 2020 16:27 |
|
|
# ? Apr 25, 2024 22:36 |
|
flakeloaf posted:https://twitter.com/pcgamer/status/1305823956503613442 oh no someone's gonna hack all the ouyas
|
# ? Sep 15, 2020 17:08 |
|
ouyaboros
|
# ? Sep 15, 2020 17:14 |
|
Lmao I literally bought a Razer mouse yesterday and when it asked me to make an account I closed the window immediately. Glad my instinct was correct
|
# ? Sep 15, 2020 17:24 |
|
meanwhile in nvidia land you need an account to log in to an app that runs locally on your pc to manage video settings and check for driver updates
|
# ? Sep 15, 2020 17:29 |
|
in logitech land I need to log in to an app to make a configuration change to my remote control
|
# ? Sep 15, 2020 17:31 |
|
Shame Boy posted:oh no someone's gonna hack all the ouyas
|
# ? Sep 15, 2020 17:43 |
|
flakeloaf posted:meanwhile in nvidia land you need an account to log in to an app that runs locally on your pc to manage video settings and check for driver updates or you could not and just manage the driver settings through the driver settings panel. the "geforce experience" requires an account, but the geforce experience isn't required to do anything with the driver settings, it's an optional install
|
# ? Sep 15, 2020 19:06 |
|
infernal machines posted:or you could not and just manage the driver settings through the driver settings panel. the "geforce experience" requires an account, but the geforce experience isn't required to do anything with the driver settings, it's an optional install last I tried it was really annoying to do anything with DSR that way
|
# ? Sep 15, 2020 19:13 |
|
Subjunctive posted:last I tried it was really annoying to do anything with DSR that way where do you even change dsr in experience
|
# ? Sep 15, 2020 19:18 |
|
infernal machines posted:or you could not and just manage the driver settings through the driver settings panel. the "geforce experience" requires an account, but the geforce experience isn't required to do anything with the driver settings, it's an optional install "update automatically" is not in that panel if you do not have geforce experience you aren't notified about new driver versions and have to install them manually every time by downloading them from a bad website
|
# ? Sep 15, 2020 19:30 |
|
heaven forfend e: i'm of the opinion that not automatically updating drivers is a feature, so YMMV Subjunctive posted:last I tried it was really annoying to do anything with DSR that way IDK how annoying it is, but it's there
|
# ? Sep 15, 2020 19:38 |
|
I feel like I must be misunderstanding what's going on here because it feels like they're using AES as some sort of janky hashing method? Like it mentions throwing away the IV, but afaik IVs aren't secret and are usually just sent prepended to the ciphertext. What the hell is going on here?
|
# ? Sep 15, 2020 19:57 |
|
A Man With A Plan posted:I feel like I must be misunderstanding what's going on here because it feels like they're using AES as some sort of janky hashing method? Like it mentions throwing away the IV, but afaik IVs aren't secret and are usually just sent prepended to the ciphertext. What the hell is going on here? as I understand it: -ms didn't bother to randomize their IV, it's just all zeroes every time on both ends of the connection -when you generate a random AES key and use it to encrypt a plaintext that's all zeros, there is a chance (1/256) that the first byte of the ciphertext is still zero -if you do the cyclic encryption process with a block size of 1 starting with all zeroes (most of the all-zero IV plus the single zero byte from the intermediate ciphertext) the final payload ciphertext is, again, still all zeroes -the server generates the AES key at random each time you initiate authentication and for some reason does not have retry limits so, if you repeatedly hit the server with a string of zeroes, eventually you get lucky and all zeroes happens to be what it was expecting, and the server will be receptive to your RPC request despite never having known the shared secret the rest of the paper is about how to move from one "authenticated" connection to some more straightforward security holes haveblue fucked around with this message at 21:14 on Sep 15, 2020 |
# ? Sep 15, 2020 21:00 |
|
Yeah thanks haveblue. I think I understand the exploit's process well enough, I just wish they provided more detail on what nonsense MS is using as an authentication scheme. Idk if the author left it out to help avoid replication, or for clarity or space reasons
|
# ? Sep 15, 2020 22:42 |
|
there's already pocs and it works on samba soooo
|
# ? Sep 15, 2020 23:32 |
|
I love Neil Breen. Also https://research.digitalinterruption.com/2020/09/10/giggle-laughable-security/ Starts off with common-or-garden secfuck, continues on into shithead-devfuck.
|
# ? Sep 16, 2020 00:04 |
|
Wiggly Wayne DDS posted:there's already pocs and it works on samba soooo Yeah I tried it today and the one from the fox it guy worked flawlessly. I didn't know it also applied to samba, that's cool.
|
# ? Sep 16, 2020 00:22 |
|
A Man With A Plan posted:I feel like I must be misunderstanding what's going on here because it feels like they're using AES as some sort of janky hashing method? Like it mentions throwing away the IV, but afaik IVs aren't secret and are usually just sent prepended to the ciphertext. What the hell is going on here? I think they're "throwing away" the IV in the sense that they're not transmitting it because it's all zeros (and everyone involved knows it). You're correct that if they used a real IV they would need to send that along for anyone to make use of the encrypted value. e: like, consider a one-byte message, where the ciphertext is a single byte equal to plaintext ^ AES(key, IV)[0]. without knowledge of both the key and IV you have no idea what the right-hand side of that xor is and can't recover the plaintext ninepints fucked around with this message at 10:45 on Sep 16, 2020 |
# ? Sep 16, 2020 10:38 |
|
flakeloaf posted:https://twitter.com/pcgamer/status/1305823956503613442 What does this have to do with the Isle of Man though?
|
# ? Sep 16, 2020 15:56 |
|
the kids are alright https://twitter.com/jessicashortall/status/1306024580780380162
|
# ? Sep 16, 2020 16:22 |
|
Mr.Radar posted:the kids are alright
|
# ? Sep 16, 2020 16:32 |
|
Mr.Radar posted:the kids are alright
|
# ? Sep 16, 2020 16:55 |
|
https://twitter.com/mangopdf/status/1306020053280841730 basic security poo poo from that old defcon talk
|
# ? Sep 16, 2020 17:14 |
|
Schadenboner posted:What does this have to do with the Isle of Man though? i prefer software that doesn't tail me
|
# ? Sep 16, 2020 17:55 |
|
Kuvo posted:https://twitter.com/mangopdf/status/1306020053280841730 it’s an entertaining read.
|
# ? Sep 16, 2020 19:18 |
|
Worth it for the ending. Pretty sure logging into Qantas is still technically a crime though.
|
# ? Sep 17, 2020 02:50 |
|
a decent story poorly-told imo. worth reading but be prepared to skim over the twee affectations
|
# ? Sep 17, 2020 03:19 |
|
Computer people have a pretty bad track record of trying to be funny. Probably shouldn't try
|
# ? Sep 17, 2020 05:15 |
|
yeah, i mean, look at this site
|
# ? Sep 17, 2020 05:40 |
it was actually funny, y’all old
|
|
# ? Sep 17, 2020 11:52 |
|
cinci zoo sniper posted:it was actually funny, y’all old Oh hey, the baltic mosquitoes didn't devour you!
|
# ? Sep 17, 2020 15:59 |
|
cinci zoo sniper posted:it was actually funny, y’all old 30 isn't old. It's the children who are wrong.
|
# ? Sep 17, 2020 16:05 |
|
i thought it was a fun read, sounds like sec nerds are just brokenly jaded from dealing with security poo poo
|
# ? Sep 17, 2020 17:41 |
Schadenboner posted:Oh hey, the baltic mosquitoes didn't devour you! yeah, alive and well. bored out of my mind and on 10th month of unemployment, but well nevertheless
|
|
# ? Sep 18, 2020 11:56 |
|
iexplore.exe is a lolbin Y[ ] N[ ]
|
# ? Sep 18, 2020 12:02 |
|
cinci zoo sniper posted:yeah, alive and well. bored out of my mind and on 10th month of unemployment, but well nevertheless I'm sorry to hear that, friendo. You're a big data guy (or something quanty IIRC)? I'd bet that's pretty cyclical, unfortunately (COVID -> no more jobs -> not a lot of people buying poo poo -> no sexy big datasets to mung for recommendations -> no more jobs)?
|
# ? Sep 18, 2020 13:11 |
Crime on a Dime posted:iexplore.exe is a lolbin
|
|
# ? Sep 18, 2020 13:18 |
|
hey rufus if you wanna update the OP: the v1.0 secfuck thread was moved to the mod forum because i posted a directory traversal exploit i'd discovered on the itSMF website and a bunch of us piled-in on it. iirc the exploit was with a PHP script they used to render image thumbnails on the fly for some reason. it took a path parameter but didn't have any checks in place so you could feed it any path like /../../../../etc/passwd and it would happily spit the file back at you so yeah, not exactly epic, just textbook irresponsible disclosure by my dumb self. i and some others copped bans, the website in question has since moved to WP. good times e: tl;dr as alereon so eloquently put it in my ban: "You made a series of very bad decisions."
|
# ? Sep 18, 2020 14:26 |
|
|
# ? Apr 25, 2024 22:36 |
|
Pile Of Garbage posted:hey rufus if you wanna update the OP: the v1.0 secfuck thread was moved to the mod forum because i posted a directory traversal exploit i'd discovered on the itSMF website and a bunch of us piled-in on it. iirc the exploit was with a PHP script they used to render image thumbnails on the fly for some reason. it took a path parameter but didn't have any checks in place so you could feed it any path like /../../../../etc/passwd and it would happily spit the file back at you mods gnu
|
# ? Sep 18, 2020 16:08 |