Matasareanu
-
Posts
30 -
Joined
-
Last visited
Posts posted by Matasareanu
-
-
Primiti doar vaccinati, nu?
- 2
- 1
-
-
48 minutes ago, Nytro said:
Dap, se discuta si pe la ei: https://forum.vbulletin.com/forum/vbulletin-5-connect/vbulletin-5-connect-questions-problems-troubleshooting/vbulletin-5-support-issues-questions/4422616-important-vb5-remote-exploit-in-the-wild
PS: Sper sa nu te atace si pe noi hackerii cu acest exploit.
Pot sa incerce 😂
-
Am un deja-vu
-
10 hours ago, Nytro said:
Added support for Chrome 64 (only 64 bits right now).
Ne pregatim de conferinta ?
-
sputniknews.com nu era mecanismul de propaganda a lui Putin si cohorta?
- 1
-
20 hours ago, Ossian said:
perioada, si detalii despre voluntariat. Daca e ceva ce trebuie stiut inafara de ce au mentionat ei pe site.
Edit: In acelasi an se desfasoara in aceeasi perioada oare?
Edit2 : doamne, acuma am vazut ce obosit is, scuzati exprimarea.
Perioada mereu a cam fost aceasi, plus minus o saptamana.
Despre voluntariat, poti aplica aici cred https://def.camp/become-a-volunteer/ si te contacteaza ei.Le poti scrie si pe FB si or sa iti raspunda
- 1
- 1
-
Nu stiu, nu detin. Doar stiu ca citisem faza cu VISA.
Poate te ajuta asta:
https://steemit.com/bitcoin/@bitcoinshirtz/a-full-list-of-bitcoin-debit-cards-for-2017
-
Ce detalii te-ar interesa?
@Andrei cred ca poate sa te ajute.
Intreaba aici si daca stim si noi, iti raspundem.
-
E card VISA sau Mastercard?
Am vazut pe undeva ca VISA parca au cerut blocarea tuturor cardurilor care au treaba cu BTC.https://www.newsbtc.com/2018/01/06/visa-suspends-bitcoin-debit-cards-issued-wavecrest/
-
Care e mai exact intrebarea?
Eu am gasit in 2 sec pe google inmultirea a doua numere in asm.
-
- 1
- 3
-
Acum vreo doua saptamani userul chethan177 a postat pe Apple development forum si well, Apple missed it
Momentul ala cand lumea il considera feature.
Se pare ca mizeria merge si remote daca ai Screen sharing activat.
Temp fix: parola custom pusa pentru root. Disable root user nu afecteaza.
Eu personal nu am putut reproduce pe doua mac-uri mai vechiute(un air si un pro) cu High Sierra pe ele. Tot upgrade de la Sierra.
-
1 hour ago, Massaro said:
Un pdf pentru "Level 7" (Ultimatum - ultimele zile ale unui razboi atomic) de Mordecai Roshwald? Nu gasesc nicaieri, am vrut s-o cumpar dar pe unde am gasit-o nu o mai au pe stoc.
Ti-am dat un PM.
- 1
-
Cea mai ok explicatie de pana acum pe care am gasit-o:
- 4
-
-
Ai aici o parte din cuvintele dex-online.ro : https://dexonline.ro/static/download/dex-database.sql.gz
Si aici gasesti o lista de prenume pe care o poti folosi: https://ro.wikipedia.org/wiki/Listă_de_prenume_românești
- 1
-
Just now, Nytro said:
Patch-urile sunt disponibile de ani de zile...
Si ce te faci cand ai doar asa ceva in casa:
https://goo.gl/images/LCN4rK ? -
6 minutes ago, TheTime said:7 minutes ago, TheTime said:
Ceva de genul:
- update firmware pe router
- panou de administrare cu parola strong
- setari din router pentru a nu permite clientilor sa comunice intre ei
- VPN intre clienti si un server extern sau VPN intre clienti si router
- Setari statice pe clienti pentru IP si DNS.
- HTTPS peste tot, inclusiv pentru site-urile din reteaua interna; asta ar trebui sa faca oricum, indiferent de vulnerabilitatea asta
1. Updateuri e posibil sa nu vedem prea curand. Avand in vedere ca sunt routere vechi peste tot care nu au mai primit de secole updateuri sau nu o sa stea nimeni sa faca updateuri.
2. Nu cred ca ajuta. E in protocol vulnerabilitatea.
3. WiFi-ul in sine ca si canal de comunicatie face broadcast in aer. Nu este single channel ca prin cablu
4. cred ca momentan este cam singura solutie.
5. doar mitigheaza riscul de MiTM cu astea.
6. asta cred ca este cel mai important.
In concluzie cred ca doar sa ai un server de vpn in LAN ar mitiga problema. Chiar daca esti interceptat o sa fie gibberish.
Alta problema: Toate IoT devices need to be burned. Majoritatea nu or sa primeasca updateuri la wpa_supplicant. Toate deviceurile cu XP care mai exista nu or sa primeasca update, deci or sa fie easy targets.
-
@Nytro ai dat select in baza dupa IP ?
- 1
-
Title:Phishy Basic Authentication prompts
URL: https://securitycafe.ro/2017/09/06/phishy-basic-authentication-prompts/
Author: @TheTime
QuoteIn one of our previous posts, we noted that a popular tool – Responder – uses Basic Authentication prompts to harvest user credentials when they accidentally enter invalid domains in web browsers.
Responder’s approach is pretty good and it does some “magic” to catch and respond to DNS requests for in-existing domais, however I think that there is way more potential in using Basic Authentication for phishing purposes.
What I like (or dislike) most about basic authentication is that it is NEVER clear who is asking for your credentials and where they will end up. This type of confusion often tricks users into falling for simple phishing tricks, allowing attackers to easily gather user credentials.Users should be able to determine if a Basic Authentication request is genuine based on 2 security indicators:
the IP address or domain of the entity that requests authentication. This often doesn’t help users since attackers can register domain names that resembles trusted domains. For example, when trying to leak the credentials for targetdomain.com, an attacker can register similar domains:
targetdomain.co / .net
target-domain.com
targetdomain-oauth.com
targetdomain-cdn.com
targetdomain-images.com
login-targetdomain.com
the authetication parameter “Realm”, however this is a string that can be arbitrary provided by the attacker. Depending on the context, simple strings might trick users to consider that the Basic Authentication prompt is genuine:
“Network proxy authentication required”
“You were logged out due to inactivity, please login again.”
Too much theory, let’s see a few examples where basic authentication prompts can be really confusing for the users. Presuming that targetdomain.com is a genuine website, an attacker can simply register (and control) target-domain.com, a website which might be confused with the original by some users.- 1
- 4
-
Going Further with Responder's Basic Authentication
There are a good number of situations when we find ourselves abusing the LLMNR and NBT-NS protocols on an infrastructure penetration test, more specifically on an Active Directory setup. These 2 protocols are enabled by default on most of the Windows operating systems. What are they doing is they facilitate the communication between network machines when searching for a DNS hostname regardless if it’s a share, a server or a web hostname.
The overview picture of the attack vector:
- the victim is looking for a non-existing hostname
- the DNS server cannot resolve the request
- we reply and resolve the hostname resolution query
- we ask the victim for authentication
- 4
-
https://isc.sans.edu/podcast.html - A ajuns si in daily podcastul de la SANS
https://traffic.libsyn.com/securitypodcast/5339.mp3
- 1
-
Ok.
Multumesc mult.
Alternativa gratuita teamviewer/anydesk?
in Off-topic
Posted
@spiderincearca https://parsec.app daca nu ai rezolvat pana acum.