netsec

SzethFriendOfNimi , in Decoding ScamClub’s Malicious VAST Attack

Misread that as ScamSchool at first and I was like what did Brian Bushwood do?

Jean_Lurk_Picard , in Behind the doors of a Chinese hacking company, a sordid culture fuelled by influence, alcohol and sex
@Jean_Lurk_Picard@lemmy.world avatar

Great article.

ramble81 , in Bypassing CSP with Form Hijacking

And that’s why you make sure you have sanitization checks on the backed too. From end should just provide your users with quicker feedback and save on network traffic. The backend should prevent anything from actually being executed that shouldn’t. That way it doesn’t matter how it gets submitted. Same if you were have a UI and API. The API may get inputs outside of a UI so you should have your checks there.

agent_flounder , in APT29 adopts new TTPs, according to a bunch of agencies
@agent_flounder@lemmy.world avatar

Interesting. I saw articles earlier about Russian hackers turning their focus to the cloud. Not as much detail as this provides, of course

morras , in Python Risk Identification Tool for generative AI (PyRIT)

Damn...
I'm a Linux user that basically hates the MS way of life, but I must admit that they are taking AI seriously AND share their tools. So kudos, please continue !

I shamelessly reused the AI assesment template at work and this RIT will be pushed to some colleagues.

joranvar , in scanme vs nmap

I would guess this would link to https://github.com/CyberRoute/scanme maybe. Or a comparison document with nmap?

CombatWombatEsq , in Deceptive Deprecation: The Truth About npm Deprecated Packages

lol, I would totally archive and deprecate like 80% of my node modules if I got a CVE without a second thought.

BradleyUffner , in As if you needed another reason not to ever use SSO to your Google account for anything

If this were an actual flaw, it would completely break all of OAuth everywhere. How likely do you think it is that the entire security industry, and all hackers everywhere, would have overlooked something like this?

mozz OP Admin ,
mozz avatar

Can I set up a web site and ask you to go do your Google SSO on it? I promise it's legit

BradleyUffner ,

I'll take a look at your site, I'm curious to see what it looks like, but I'm not entering any real credentials.

mozz OP Admin ,
mozz avatar

I thought you were extremely confident that what I was describing wouldn't work though 🙂

BradleyUffner ,

I'm confident there will be some sign that it's a forged OAuth prompt rather than Google's prompt, and I'm not entering credentials into an obviously fake prompt.

mozz OP Admin ,
mozz avatar

Well, that's lucky, because I don't want to sign up for OAuth tokens with Google and then immediately start doing something nefarious with them just to prove a point. 🙂

I looked around a little though, and I was able to find an example of this technique being used for real maliciously "in the wild." My envisioning of it was somewhat different (overriding or obfuscating the URL bar in a real window showing malicious HTML, as opposed to constructing an entire fake window), but the principle's pretty much exactly the same.

I also learned that Google's response, after some not-real-similar attacks which also exploited doing nasty things with real OAuth vendor credentials, was to tighten up a lot on their security on who can have OAuth vendor credentials (which sounds like a pretty sensible approach to me.)

RedditWanderer , in As if you needed another reason not to ever use SSO to your Google account for anything

Companies will include an image of your choosing when you enter your credentials to know it's really the host, and that can't be faked really. Obviously people don't notice and a fake website is often enough, but there is a mechanism.

mozz OP Admin ,
mozz avatar
  1. Google Oauth currently doesn't do that
  2. We're doing man-in-the-middle under my proposed scenario anyway (we have to, to defeat 2FA and get a real Oauth token.) It's trivial to show the user the Google-provided image of the user's choosing.
taladar , in Access Controls: ABAC vs RBAC

This seems like the kind of system that might be quite useful in extremely large organizations but is total overkill for any organisation that doesn't have dozens of departments, locations in different countries,...

In general, the flawed access control systems I have seen in the past have almost always been too convoluted and complicated compared to what a few years of use showed would have been actually needed.

taladar , in Scame

You missed an n in the title.

ramble81 , in Vulnerabilities on Bosch Rexroth Nutrunners May Be Abused to Stop Production Lines, Tamper with Safety-Critical Tightenings

Is this what Boeing is gonna blame the door plug on?

baggins , in Vulnerabilities on Bosch Rexroth Nutrunners May Be Abused to Stop Production Lines, Tamper with Safety-Critical Tightenings

Pneumatic?

Grimy , in Breaking the Flash Encryption Feature of Espressif’s Parts

Love the cartridge board design he uses. Cool article.

gravitas_deficiency , in AWS's Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation – Sysdig

It looks like this whole thing depends on targets not having their IAM policies locked down correctly, which is one of the foundational security aspects any good cloud devops engineer should be familiar with.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • netsec@lemmy.world
  • test
  • worldmews
  • mews
  • All magazines