Cybersecurity professional with an interest in networking, and beginning to delve into binary exploitation and reverse engineering.

  • 28 Posts
  • 46 Comments
Joined 1Y ago
cake
Cake day: Jun 08, 2023

help-circle
rss

That’s been my life for the past 10 years, you won’t regret it at all.


boraritoAsklemmy@lemmy.mlAmazon
link
fedilink
6
edit-2
2M

Yeah, the answer here is cancel prime and pirate whatever amazon video content you want. if you absolutely have to have prime for some reason, don’t sign in to amazon video on any of your devices and pirate the stuff you want to watch so at least your not contributing to views or their prime video ad revenue.

Edit - I see in another comment you said you unsubscribed, good on you.


It is part of the deep web, just like Discord or any sites hosted on private companies intranets. Lemmy is not, you can just hit any instance with a web browser and view stuff.

To be completely clear, dark web/net and deep web are two different things. That wiki link you used is describing dark web stuff like tor etc.


detailing that he had been promised 500,000 rubles ($5,418).

Fuck me, this really hammers home that first world privilege. More than that amount of USD hits my checking account each month in my direct wages. This guy knew what would happen to him when he was caught then decided that risking misery in Siberia before being executed was worth less than a month of my take home pay. I mean i get that some level of radicalization is involved here, but still what the fuck.


that’s exactly what i’d expect a dark empath to say. sheathe your knife unless you want to get saddled with karmic debt bro. you’re limited to paying off karmic debt in transactions of no more than 3k eurohms each, and with this dark energy you’d be in karmic debt into the millions.


It’s an amazing feeling, enjoy it. It’s a probably equally as awesome a feeling as when you see ads while on public wifi somewhere and realize that the no ad experience has been completely normalized for you again.


So which is it?

Is the US unable to hold Tiktok accountable or is it/should it be allowed to dictate the ownership of Tiktok?

I was wrong, TikTok has a US subsidiary, so accountability can been enforced. I was under the mistaken impression they didn’t, so operating on the assumption that any accountability action would be functionally unenforceable.


Run a pihole dns server on your network, I didn’t even realize they ran ads on the site. I just popped off wifi and on to cellular, and wow yeah it’s rough.


The US could, if there was the political will, hold Facebook accountable for this because Meta is an American company. The US would not be able to hold a non-American company accountable in the same way. I do not see a conflict between wanting Meta held accountable for allowing things like Cambridge Analytica to occur and not minding the US taking proactive action on TikTok.


Agreed on the Republican party bit.

If Facebook could be considered a nefarious conspiracy (or at least subservient to the powers engaging in said conspiracy), why is it unbelievable that TikTok could also be?


It is not about preventing foreign or private influence that his harmful to the citizens. It is about controling that influence.

No, it is about preventing foreign influence on citizens. The fact that some level of control (or more accurately accountability) can be exerted by the US government on companies like Meta is true but unrelated. If ByteDance was a company in the EU we wouldn’t be having this conversation.


Preventing an oppressive government from exerting undue influence on another sovereign nation’s citizenry is an oppressive act itself?



If having a nuanced and often extremely critical opinion is being a subservient puppy, woofwoof I guess?


Imagine the uproar if China demanded that Google stopped being a US military contractor.

China is actively demanding that all Chinese companies excise American hardware and software from their technology stacks. They know that they can’t divorce a US tech company headquartered in the US from the US intelligence agencies, so it is the next best option. This is colloquially known in China as “Delete A” or “Delete America”. Who is being xenophobic again?


or installing a great firewall to prevent US citizens from accessing their site.

Literally no one is suggesting this, but keep firing yourself up I guess.

Right. So if they sell ads on it, it’s not a speech platform right? Reddit, not a speech platform? The Washington Post? The Guardian? Lemmy, when lemmy instances start running ads, Not a speech platform? Gmail? Not a speech platform?

It’s not a speech platform, at best it could be loosely defines as “press”. Even if I’m generous and concede that, pretty sure there’s Supreme Court precedent for allowing the government to block the publication and dissemination of foreign press. Also no, Gmail is not a speech platform in this context lol.

It’s my ability to use the speech platform that gets banned in the process.

You need to stop picking the things in my comment you want to argue with and ignoring the rest. The First Amendment prevents the government from criminalizing or penalizing you, an American citizen, from engaging in protected speech. It does not prevent them from forcing a foreign company to divest or cease local US operations. Doing so does not infringe on your speech. Infringing on your speech would be something like criminalizing the act of downloading a tiktok apk and using the app after ByteDance was forced to shutter US operations.

You see the difference right? You’ll still be able to use TikTok after the (probably not happening) ban without any criminal or civil liability. If ByteDance says fuck it and geoblocks the US, you still haven’t been blocked from your speech by the US government, you’ve been blocked by ByteDance, and if you felt like suing them in China you could full send it if that was for you.

They can ban TikTok from being able to “do business” in the US, that is different from pulling it from the app store

Ban TikTok from earning any revenue in the US and they will pull the app themselves. Do you think TikTok is a charity or a non-profit or something?

And frankly, “doing business” has been an inherent part of speech platforms for decades, selling advertising on speech platforms is how they can exist, all the way back to the days of newspapers and radio.

Sure, press publications sell ads, no one said otherwise, not really sure what purpose stating the obvious serves. Ultimately, the US government is under no obligation to allow a foreign company to offer goods or services within its borders, regardless of whether it’s a “press” good or service.

To recap:

  1. Banning tiktok does not ban your speech specifically.
  2. As no entity protected by the Constitution is being censored, the government isn’t violating the Constitution.
  3. There is no 3, that’s it. Congress is free to swing the ban hammer.

Unless you think that the Constitution applies to everyone in the entire world, in which case I guess I’ll need to buy some stock in Northrop and Lockheed.


Jesus christ bro you’re insufferable.

They get to do whatever they want because they’re a dicatorship. Saying the US government should be allowed to do something “because China does it” is a real slippery slope.

It’s a weird blend of trade war and cyber warfare, but for all intents and purposes it’s a trade war right now. No one was complaining that the US is blocking the sale of H100s in China are they? No.

We aren’t talking about oil extraction or car sales here, we’re talking about something which is explicitly a speech platform. They are different.

Except it’s not, it’s an ad platform.

It’s not just a “company” being banned, it’s the government telling you that you can’t use that companies services for your speech.

Nope, absolutely incorrect, it is indeed just a company being banned. I don’t think you fully understand what “speech” is, or really who the Constitution applies to. You do realize that the First Amendment means that the government may not jail, fine, or impose civil liability on people or organizations based on what they say or write, right? You also realize that preventing a company from doing business in the US because they’re beholden to an openly antagonistic nation-state is decidedly not the same as banning a company from doing business in the US because of its speech right?

Freedom of speech and the press has literally nothing at all to do with this.


Except that’s not my point, but you already knew that didn’t you? It’s pretty obvious you’re not actually here for a conversation.


Who are they worried China is going to influence? Children, right? If it’s adults, that’s almost more insulting, they think we don’t deserve to be able to see all sides of an argument and are too stupid to discern fact from fiction.

Yeah fam, you and me are definitely way too smart to ever be manipulated by military units whose sole job is to effectively manipulate large swaths of the population.

The answer is everyone. They’re worried about anyone and everyone, because they do it also.

https://youtu.be/VA4e0NqyYMw?si=u_d-eDOMYA-FetVn


If China is going prevent US companies from doing profitable business within its economic borders I don’t see why the US should allow Chinese companies to engage in profitable businesses ventures within its country.

Blocking a company from doing business in the US is not the same as the US Government infringing on citizens rights. The better way to do it imo would be to toss ByteDance on the Sanctioned Entities list and block any US financial institution from servicing their US subsidiary. ByteDance wouldn’t stay in the US market for long if they couldn’t get any ad revenue, then it’s their choice to pull out instead of the US Government kicking them out.

It’s really not an infringement of rights either way though.


I mean I’m not saying that this is being gone about the right way or for the right reasons, but when an adversarial nation-state is working to undermine US economic interests within its borders is there really anything wrong with punching back? I personally don’t think so, but I’m fully aware that I’m probably in the minority on this here.

https://twitter.com/lizalinwsj/status/1765615508357779477

(paywalled article from author above https://www.wsj.com/world/china/china-technology-software-delete-america-2b8ea89f)


Yup, it’s a compiled binary that is executed on the victim user’s system.

I edited the post to point to the actual report published by Trellis here. It’s a malware analysis report so it doesn’t go in to the methodology of the initial delivery but there is a little section at the beginning detailing some steps the malware developers took trying to trick users into thinking the “app” was buggy instead of malicious.


It would be cool to see companies start offering homelab licenses for people to play around with and get experience before buying into a whole ecosystem.

Like you said, I think companies should be prohibited from locking security updated behind a license paywall. Features are one thing, and while I would also like free homelab licenses, I understand why companies don’t offer them, especially for products like enterprise firewalls, routers, and switches. A company shouldn’t require you to pay more money to secure something they shipped with a vulnerability. Honestly this kind of shit should take precedence over the squabbling about USB-C, App Store monopolies, or whatever other flavor of the month issue the EU or the US is lambasting tech companies for.


Team Cymru published a report detailing infrastructure and configuration changes to the Vidar info-stealer malware that were made in an attempt to evade detection and anonymize activities.
fedilink

ESET researchers identified an updated version of the Android GravityRAT spyware being distributed as the messaging apps BingeChat and Chatico.
fedilink

It seems like attackers have discovered a way to leverage NPM packages to deliver malicious binaries without needing to make any changes to the NPM package itself.
fedilink

This is an interesting report by Symantec about a Russian 'Cyber Campaign' against Ukraine, targeting security services, military, and government organizations. It's crazy that we're witness to the first case in history of cyber warfare campaigns being waged alongside, and in support of, a hot war, in real time.
fedilink

Looks like Mandiant has discovered active exploitation of [CVE-2023-20867](https://www.vmware.com/security/advisories/VMSA-2023-0013.html), which was given a CVSS score of **3.9** when it was assigned.
fedilink

This new malware strain, written in Go, has been seen compromising systems across Europe, Southeast Asia, an the U.S. It's stealing sensitive information from Discord, web browsers, etc.
fedilink

This won't apply to anyone here, because we're all reviewing any code we clone from GitHub prior to executing it on our system, right?
fedilink



You shouldn’t spend the money now because normalizing payment to a corporation worth $2.47 trillion for future services rendered is a terrible thing to do.


I’m just going to add that the web ui on mobile is great. Good enough that I’ve stopped using mlem. Mlem doesn’t show you the different instances that users and communities are coming from which doesn’t really matter for users but is super annoying for communities, and the main dev said that’s intentional. It also shows you your “karma”, through what I’m assuming is just adding up the raw up/downvotes your posts/comments have accrued. Seeing that is what ultimately made me bounce, it seems like the complete antithesis of what Lemmy is trying to be about.

Also, while they’re working on adding a NSFW blur, it doesn’t exist yet and fuck seeing all that loli ai porn on my feed. I don’t mind having to scroll past stuff I’m not interested in, but come on at least blur it.

Finally the web ui has the rainbow indent lines, while there’s nothing but whitespace to indicate child comments on mlem. I’m sure they’ll fix most of the stuff up given time, but I’m not using it until they dump the cumulative karma tracking.


6 now with my comment. It’s 200% more lively here!


Despite their issues I put hundreds of hours into each one and enjoyed them all. I see no reason to think this won’t be the same, and have no problem betting $70 on it.

Really the issue here is that there are very few reasons to hand a company your money before they are prepared to deliver you a product. There are even fewer reasons when the product is most likely going to be purchased and delivered digitally, since there is zero chance the product will be sold out. When a game is being developed by Microsoft-owned Bethesda, they don’t need preorder money to finish the game.


I’m not 100% sure on the answer to that.

Twitter relies on Google Cloud to host services…

So I’m assuming that means that Twitter is either using GCP to host cloud-based internally developed services, or SaaS deployments in the cloud, but that’s just a complete guess on my part.> n Musk’s takeover. Since “at least” March, Twitter has been pushing to renegotiate the contract

Edit - This section was in the next paragraph lol.

Now, Platformer has reported that a Twitter service called Smyte—an automated anti-abuse and anti-harassment tool that was previously operating on Google Cloud Platform (GCP)—will potentially shut down on June 30. This could lead to a flood of spam bots and CSAM on Twitter as bots and content could fail to be removed.

So it sounds like it’s an internally built Twitter service that they host in GCP.


Can't wait for all these monolithic sites to die.
fedilink

This new stealer has five stages, and shows a high level of sophistication, akin to APTs. Targeted victims have been seen in Europe, the USA, and Latin America. Several pieces of Russian text were found in the malware. > The first part of the C2 URL is “Privetsvoyu” which is a misspelled transliteration of the Russian word for “Greetings.” Secondly, we found the string “salamvsembratyamyazadehayustutlokeretodlyagadovveubilinashusferu.” Despite the weird transliteration, it roughly translates to: “Greetings to all brothers, I’m suffocating here, locker is for bastards, you’ve messed up our area of interest.” MD5 sum and C2 URL IOCs are included at the end of the report.
fedilink

The researcher chained an insecure password reset API route to bypass authentication, then discovered an IDOR vulnerability could be leveraged to access sensitive customer data. For everyone that says "The real world *can't* be as easy as training labs make it seem out to be!", sometime it really do be that ez.
fedilink

Fortigate published a patch for CVE-2023-27997, a Remote Code Execution vulnerability reachable pre-authentication, on every SSL VPN appliance.
fedilink

Scroll to the bottom of your page and click the Instances link. For you it should be https://beehaw.org/instances.


There’s no corporation or company in the mix here.


Well I’m hyped for this now. I’ve been craving a good, story-driven, single-player space game for a while now. As much as I love Elite:Dangerous, sometimes I want a story driving my actions in game instead of just grinding credits for nicer ships, even if flying those ships is a beautiful experience. If the reviews come back positive I’ll buy this day one.


Yeah, that’s not optimal. My single-sourced, non-verified quick Google search tells me that brute forcing a 10-char password of lower case letters only would be instant, subbing out one char for an upper-case letter would increase to one month, and subbing out another char for a number raises that to 6 years. Simply allowing for a special char would take 50 years.

That’s assuming the password is truly random. Use a dictionary with some rule sets, and make some assumptions like people will probably just append a number to the end of their password, and you’ll knock those times down drastically.

There’s no excuse for not allowing your users to use safe passwords.


Well, this isn’t exactly how I saw the Singularity Church of the MachineGod getting started but I’m still here for it.


I’ve messed with binary exploitation a bit, just to the level of basic buffer overflows that the PEN-200/OSCP go in to. That exposure piqued my curiosity, but learning more lower-level stuff like using Windows APIs directly in C# with P/Invoke to do Process Injection/Migration and AV evasion really fueled my desire to keep digging until I hit I point where things are just too advanced for me to understand.

Reverse engineering is super frustrating for me, but very rewarding when you finally get it figured out.

Yeah, that dopamine hit when you finally figure out the thing you’re struggling with is what hooked me, and it hooked me hard.


I created a cybersecurity community: !cybersecurity@sh.itjust.works

Whether you’re a seasoned cybersecurity professional, a student, or someone with a passing interest, feel free to join and contribute! I’ve been posting relevant news articles and research as I find them, but I would love for there to be more social/conversational posts as well.


OffSec Mid-Year Hack-A-Thon - 16JUN2023-18JUN2023
I thought I'd take a break from posting stories that come across my RSS feed to let people know about an upcoming Hack-A-Thon/CTF event that OffSec is running next weekend. I'm not really sure what the challenges will entail, since I'm not eligible for any of the prizes I haven't been paying much attention to info about it at all. I do know that in order to compete you will have to have an active PG Practice subscription, which is $19 USD/mo, more info is [here](https://www.offsec.com/labs/individual/). I don't really like that they're requiring people to already have a paid subscription to compete, but it's their ecosystem and their rules. There are three different tiers you can compete in, a PEN-300 tier, an EXP-301 tier, and an PEN-200 tier. The 1st prize for each tier is a year long LearnOne subscription to the tier course, 2nd place is a 90 day course subscription to the tier course, and 3rd place is a 90 day subscription to the PG Practice environment. While SANS is the king of wildly expensive courses, the OffSec subscriptions definitely aren't cheap either, especially if you're self-paying. I get the irony of making people pay for entry into a contest where they *might* win a subscription they otherwise couldn't afford, but it's better than nothing I guess.
fedilink

I did not even realize this was something that existed. I am now also worried for it lol. I don’t think I’ll even pirate this, it looks too bad to even hate watch if this trailer is anything to go by.


Elastic Security Labs has discovered the SPECTRALVIPER malware targeting a national Vietnamese agribusiness.
fedilink

Looks like a patch was released yesterday for the SQL injection vulnerabilities discovered in the MOVEit Transfer application. The direct link to the official announcement is [here](https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-CVE-Pending-Reserve-Status-June-9-2023).
fedilink

I feel like I’ve been specifically called out by the “borderline lethal amounts of adderall” bit, especially since it’s listed for Hackerman.


I’m pretty sure there has been mention, either by the Lemmy devs on a post here or on the projects GitHub repo, about adding a feature analogous to the multireddit feature on that site. It’s definitely a feature I would appreciate, and would go hand in hand with what you’re describing as well.


The best part about this whole indictment to me is that they redacted portions of the classification markings themselves. Dude took shit that’s so sensitive we can’t even know exactly how sensitive it is.


Welcome!
Hello and welcome! I joined the Lemmy fediverse a week ago, and settled in to the sh.itjust.works instance yesterday. I had pulled back from most of my social and general use of Reddit a few years back, and mostly just used it as a more social RSS feed to keep abreast of things going on in the cybersecurity and information security world. One of the first things I noticed when exploring the Lemmy Fediverse was that outside of the general tech communities, there was only a single cybersecurity community which hadn't seen any activity in over a year or more. I've gone back to my old stalwart RSS feeds, so I decided to create this community and post any articles I find interesting that come across my feed. Hopefully others will find it helpful as well! I really hope that the social aspect of the community will take hold here too, and encourage anyone to make any link or text posts related to cybersecurity that they want. I don't really want this to turn into a place where every other question is "How do I get into cybersecurity?" or "Will you be my mentor?", but the Lemmy community is small so at this point I'd welcome any sort of community interaction. To kick things off with a little about myself, started my career working as a network engineer for a WISP, scampering across city roofs, throwing up non-pen mounts for PtP radios, and slinging multi-Gbps links from building to building. I slowly transitioned into a SOC through a few calculated job transitions, then after a few more I've found myself working on a team that splits our time providing penetration tests for internal business lines and running red team/adversary emulation engagements against my company. Over the past few years I've earned my OSCP, OSEP, and OSWE, along with a handful of GIAC certifications. I'm currently working on the study materials for the OSED. I don't have any coding experience, just a bit of scripting ability, but I am *very* excited to jump in to binary exploitation and reverse engineering. It's the closest thing to magic to me in this space, and I can't wait to deconstruct and demystify it a bit. Thanks for reading, and glad you're here!
fedilink

Microsoft researchers have discovered an emerging cluster of TTP's they have named **Storm-1167** being used by an unknown threat actor to target banking and financial services institutions. This threat actor has been utilizing phishing emails for initial compromise, then using compromised inboxes to further distribute their malicious phishing emails. The threat actor has been observed taking steps to minimize detection and to establish persistence.
fedilink

The tool cannot be liable itself, obviously, but the creators of the tool and those who wield it absolutely can…

I absolutely agree with you here. The creators of the tool are responsible for its content. I’m a complete supporter of Section 230 in the US, but I absolutely do not think that sort of protection should apply to companies like OpenAI. Their tool created the content, their tool “published” the content, they are responsible for that content.


ESET released an analysis of the **Asylum Ambuscade** crimeware group that has been active since at least early 2020. This group targets bank customers and cryptocurrency traders in regions including North America and Europe. The TTP's related to initial access include spearphising emails containing malicious **XLS** and **DOC** files.
fedilink


Operation Triangulation: Zero-Click iPhone Malware - Schneier on Security
Kaspersky is reporting a new zero-click iOS exploit in the wild, through message received via iMessage with an attachment containing the payload. Persistence is not supported, most likely due to limitations of the OS. The Kaspersky writeup can be seen [here](https://securelist.com/operation-triangulation/109842/).
fedilink

C2 infrastructure mimics sites belonging to the Libyan Ministry of Foreign Affairs. Earliest artifacts date back to October 2022. Suspected that threat actor is targeting Egyptian and Libyan journalists and human rights activists.
fedilink



2023 Data Breach Investigations Report Released
Verizon's annual DBIR reports analyze a crazy amount of corporate security incidents, then publish the interesting statistics and trends that were discovered in the data. It's always quite an interesting read.
fedilink

I guess after using the NPM and PyPI repositories to distribute compromised packages, malicious actors have moved to Minecraft plugin/mod repos. Minecraft mod BOM's when?
fedilink

[The proof of concept code was released on GitHub](https://github.com/numencyber/Vulnerability_PoC/blob/main/CVE-2023-29336/poc.cpp).
fedilink

Service Rents Email Addresses for Account Signups – Krebs on Security
Sounds like spam/phishing emails might get a bit harder to block. Apparently this service was also used to spam Mastodon registrations last month as well.
fedilink