This forum is in archive mode. You will not be able to post new content.

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - 2d8

Pages: [1]
2
Hacking and Security / Re: WAF pro/con - which one to choose
« on: January 21, 2015, 01:25:34 PM »
WAF is great solution on application level. Actually some problems is much easier to protect on WAF (add CSRF tokens or enable Cookies http-only,secure flags) than ask developers to implement it on application itself. However, usually it is not very difficult to cause DoS on WAF, force it to shut down, enable HA-bypass-mode and access application directly.

Quote
Concerning mod_security : it is a cool tool, but like you say it is very heavy.
No, it isn't itself. Mod_security uses regex as attack signatures and regex operations consume lot of computing resources. All you need - to find balance between signatures quantity and used hardware resources. By the way, most of "simple WAF" in routers, UCMs, etc. have mod_security core with custom signatures. Actually default set of signatures prevents wide range of attack vectors and there are not many ways to bypass it.
Quote
In fact you don't find it on many company because that cost to many time to configure it well !
Mod_security is not widely used on enterprise because:
 - it has no nifty dashboard
 - it is not scalable
 - it requires very skilled specialist in regex (it's pretty much hard to figure out why particular signature leads to false-positives and correctly rewrite it)
 - and yes, it takes huge amount of time to tune it for custom application
Quote
For whitelist WAF : yes in fact it is the better configuration but I never see it in a production environment, or with a large whitelist rules that is the worst thing that you can do.
It is good in theory. In real life most applications are constantly in developing phase. Even if you've created white-list model it might be useless on next big fix that changes some application structure. Some WAFs provide self-learning mechanism, that is supposed to build white-list model of application (e.g. imperva adds regexs that describe what characters are allowed in particular fields). And it works fine in production with large set of white-list rules.

3
Hacking and Security / Re: http basic access authentication
« on: November 30, 2014, 01:52:11 PM »

That is just my 2 cents.If there is no SSL and you can wiretap connection between server and client it is easy to retrieve user's credentials.
In each HTTP packet of authenticated user there will be HTTP-header like Authorization: Basic YWRtaW46YWRtaW4=
And simple base64 decoding will give you user:password pair.

4
Hacking and Security / Bootkit via SMS
« on: November 21, 2014, 11:03:36 PM »
Saw video demo on youtube. (seclist link)
What do you think? Is it just PoC or may have real life implementation?

5
Hacking and Security / Re: DDOS cloudflare protection
« on: November 04, 2014, 07:30:45 PM »

It doesn't work. It seems that urrlib doesn't handle the redirection correctly. Maybe I should see what happens (with wireshark, for example) and use httplib directly...
To check if redirect persist there is geturl() option.
You could also look into mechanize as alternative to urllib, since it emulates full-fledged firefox browsing, supports redirects etc.


EDIT: my bad, geturl() won't follow redirects, nevermind

6
Hacking and Security / Re: DDOS cloudflare protection
« on: November 04, 2014, 07:05:31 PM »
In CloudFlare API is described, that browser check searches for uncommon HTTP headers and valid User-Agent.
So, you should set User-Agent in your script. E.g.:
Code: [Select]
urllib.URLopener.version = 'Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0; T312461)'

7
Anonymity and Privacy / Re: Best paid -no log- VPN?
« on: November 02, 2014, 06:48:59 PM »
If you havn't read info from links:

Q. What could be the countermeasures?
A. Refreshing the entry nodes after every transaction (assuming that a new connections are chosen at random) should prevent the attack. The attack would also not work if many users share a proxy. However if such proxy is publicly known the attacker can force Bitcoin servers to ban its address.

8
Anonymity and Privacy / Re: Best paid -no log- VPN?
« on: November 02, 2014, 06:02:39 PM »
Bitc is always the way to go
Not many hosting accept it and just using bitcoin is not a silver bullet (relevant links)

9
Anonymity and Privacy / Re: Best paid -no log- VPN?
« on: November 01, 2014, 09:56:50 PM »
Any VPN doesn't keep you 100% anonymous. On third-party service you are never sure if no logs are stored and how closely they cooperate with law enforcement.
Even if you set up VPN on your private VPS server it's still possible to track you via billing for server/hosting service (this is also relevant for paid VPN services).
Personally, i know lot of cases how hackers were caught despite using tor+vpn and such. Though, that is more relevant for money theft and fraud in financial sector, so you'll be barely tracked because of some website deface.

10
User have to follow the link and run by himself downloaded file, in order to execute malicious script.
Just a new way to install dropper on user's host, or RAT if it's better option for you.

11
General discussion / Re: Browser Addons
« on: October 31, 2014, 05:18:23 PM »
If you want to find something interesting or useful, see FireCat project (Firefox Catalog of Auditing exTensions). They even have mindmap available.

12
General discussion / Re: passby WAF for help
« on: October 30, 2014, 01:06:09 PM »
Most of WAFs are based on signatures, so there are plenty of ways to modify request and bypass them.
e.g.:
Code: [Select]
/?id=1+union+select+1,2,3/* => /?id=1+un/**/ion+sel/**/ect+1,2,3--
/?id=1;select+1,2,3+from+users+where+id=1-- => /?id=1;select+1&id=2,3+from+users+where+id=1--

13
I doubt that it's backdoor or something complex. This CMS has lot of vulnerabilities (SQLi, LFI, XSS etc), so quite anyone could gain access to db and get password hash.
Short-term solution:
- deploy some waf (modsecurity is free and open source), to prevent simple attacks
- update CMS to the latest version
- at least check that public exploits not working


In long-term perspective - find more secure solution.

14
Security by obscurity is always a bad choice. Using this cookie is quite the same, as hardcoded passwords, keys etc. But without HTTPS you will transfer it in celartext with each request of authenticated user.
Also there is bunch of attack vectors even with HTTPS, e.g. you are also vulnerable to XSS and didn't set Secure and Httponly flags to this Cookie.
Btw, parameterized querie issue (under certain conditions) may allow attacker to access your source code and simply read this cookie.

Pages: [1]


Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.