netsec

wreckedcarzz , in Bluetooth vulnerability allows unauthorized user to record and play audio on Bluetooth speaker without user awareness
@wreckedcarzz@lemmy.world avatar

play audio [...] without user awareness

Does this vulnerability also make the user deaf, orrrrr...?

elshandra ,

Just skate over the "record and" there.

Steamymoomilk ,
@Steamymoomilk@sh.itjust.works avatar

starts blasting dmc's its tricky

homesweethomeMrL OP , in Microsoft left internal passwords exposed in latest security blunder

Microsoft was notified about the vulnerability on February 6th, and locked it down by March 5th.

I just . . . It . . . they . . .

Hominine , in Behind the doors of a Chinese hacking company, a sordid culture fuelled by influence, alcohol and sex
@Hominine@lemmy.world avatar

So are they hiring or what?

Downcount , in Auto DNS poisoning: while charging Android smartphone via computer it is possible to perform automated and even remotely controlled DNS poisoning without any user interaction

So, to achieve this:

  • the windows user has to login with a user who has admin rights
  • then plugin an android phone with said script installed

Sounds like darwinism.

mozz Admin , (edited )
mozz avatar

Yeah. It was pretty interesting to hear the details of pretending to be a HID device and how you could use it in practice to make malicious changes to the host computer. But surely adding to /etc/hosts is not the most preferred sneaky thing you can do with your unrestricted access.

Potatos_are_not_friends ,

Isnt the average Windows user not logged in as admin?

Most Americans I know own their own computer. Unless it's with young kids in the house, every individual windows PC is one account with admin access.

Downcount ,

I also own my computer. Doesn't hold me back to remove my user all admin rights.
If you still log in with admin rights, being hacked by a charging phone won't be the first bad thing happening to your system.

heavy ,

You would also get several prompts asking if you want to do this, both from Windows under UAC (by default, even if you can escalate), the Android driver, and the phone itself. It's rarely the case now that Windows users execute privileged actions without notification, but it's possible.

I don't want to discourage people testing ways to compromise security for the good of everyone, but this is a well known vector and a lot of jumps have to succeed to give the attacker value.

You can cut down a lot of room for failure by just using a rubber ducky USB instead. It doesnt have to be an Android phone. Even then, there's more than a few controls in the way.

azron ,

No one pays attention to the prompts. If you've ever watched a standard computer user they click away a prompt as fast as it appears without even reading it.

heavy ,

So I understand better, could you explain the scenario where you would use this and what it would get you as the attacker?

Is it like: "Hey bud, please plug my phone into your computer." Then, they click through everything, you get privileged execution, and you choose to modify the hosts file?

You believe that would have a high chance of success? What do you get afterwards?

mspencer712 , in As if you needed another reason not to ever use SSO to your Google account for anything

My account uses 2FA and my browser remembers my password. If I get a sign in prompt but my browser doesn’t / won’t auto fill my password, I assume it knows something I don’t and I’m immediately suspicious.

Your scenario is absolutely valid and would probably catch a lot of people who don’t think about security.

keefshape , in Open Source - Terminal based AI Powered Ethical Hacking Assistant.

Sou died like a neat idea. I clicked the link, greeted with

First i would like to thank the All-Mighty God who is the source of all knowledge, without Him, this would not be possible.

Closed the link.

Tolstoshev , in CVE-2023-52161: inet-wireless daemon (iwd) APs allowed clients to connect with a NULL key, bypassing the WiFi password

This sounds…really bad.

fl42v , in Auto DNS poisoning: while charging Android smartphone via computer it is possible to perform automated and even remotely controlled DNS poisoning without any user interaction

Would be more robust for the phone to say "hey, I'm your new network interface" (a.k.a. usb tethering). AFAIK, it'd use DNS provided by the device.

The pro's are that it works on all the os'es ootb and doesn't create suspicious windows on connection, so you don't need to distract the victim

surewhynotlem , in Your Firewalls and Proxies are about to be blind to real TLS destinations: Learn about Encrypted Client Hello

If it's your network and your firewall and your proxy, then you can issue your own certs and MITM the connections you want to see.

Kyrgizion , in As if you needed another reason not to ever use SSO to your Google account for anything

I only once got a real security notice from Google and this was several years ago, before Covid even. It simply stated that a (correct) login attempt was made, but from an IP address in China, and Google blocked this by default because it was "suspicious".

I changed all my passwords and have never had a problem since, but I agree with your scenario. There's ample stories of people even having 2FA set up and still getting locked out from their own accounts, although I suspect the grand majority of these cases are through social engineering rather than actual hacking.

acetanilide , in Bluetooth vulnerability allows unauthorized user to record and play audio on Bluetooth speaker without user awareness

Could this happen with bluetooth enabled hearing aids? I think mine are still discoverable when connected.

SpaceNoodle , in Optum / Change Healthcare Breach

Can't wait for Optum to gobble up more providers! The enshittification will continue until everyone is dead.

magnusrufus , in Elrouby Decrypted Desktop: The Best safe place for your files.

Contribute a readme maybe.

ramble81 , in How I Hacked My Air Purifier to Remove Cloud Dependency [Detailed Write-Up]

That is awesome. Though since he could patch the firmware and they had custom encryption code, I would have patched that out to get unencrypted calls. Those his method allowed for stock operation.

ThePantser , in How I Hacked My Air Purifier to Remove Cloud Dependency [Detailed Write-Up]
@ThePantser@lemmy.world avatar

What is the device? Brand model? Is it winix or Philips?

thegreekgeek ,
@thegreekgeek@midwest.social avatar

Looks like they don't want to name names because capitalism and lawsuits but this should work for any Wi-Fi based smart device that uses an ESP32.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • netsec@lemmy.world
  • test
  • worldmews
  • mews
  • All magazines