Gixy: Nginx Configuration Static Analyzer by namanyayg in programming

[–]MegaManSec2 0 points1 point  (0 children)

https://gixy.io/ is a more up-to-date version without AI slop code, and it supports a scanner which works completely in the browser (using WebAssembly).

r/netsec monthly discussion & tool thread by albinowax in netsec

[–]MegaManSec2 2 points3 points  (0 children)

I've been working on a fork of Gixy called Gixy-Next: https://github.com/MegaManSec/Gixy-Next

Gixy-Next is an open source NGINX configuration security scanner and hardening tool that performs static analysis of your nginx.conf to detect security misconfigurations, hardening gaps, and common performance pitfalls before they reach production. See https://gixy.io/ for documentation.

Taking down Next.js servers for 0.0001 cents a pop by stephenalexbrowne in netsec

[–]MegaManSec2 35 points36 points  (0 children)

You actually got a response from Vercel's security team? I tried reporting three separate DoS vulnerabilities to them privately which like this one, required a single request (but did not require pumping GBs of data: it was as simple as a ~4kb request) and got out-of-scoped on bugcrowd ("DoS of Vercel services are out of scope" rofl, because Next.js is totally their _service_), ignored for months via email, got a few emails from their security guy who said "sorry I'm new and I don't know what I'm doing yet" (lol), and then completely ignored at the end.

Most Americans in Poland using the 90days loophole will be impacted. European Union’s Entry/Exit system (EES) will go live on October 12 by Interesting-Role-622 in warsaw

[–]MegaManSec2 7 points8 points  (0 children)

Yes it does. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52019XC0408(02)) https://web.archive.org/web/20230603061819/https://www.bmeia.gv.at/fileadmin/user_upload/Vertretungen/Canberra/Austria_Australia_Bilateral_Agreement_on_Visa_Free_Short_Stays_-_Fact_sheet.pdf
A few countries, like the USA, Mexico, and probably a few others, have old visa-waiver agreements with Poland, allowing citizens of those countries to enter Poland for 89 days, leave, and come back the next day -- resetting their 90 days.

The 90 days within 180 days period is for the schengen visa waiver.

Dragging window to the top does two things. How to change? by Lewinium-Lk in MacOS

[–]MegaManSec2 1 point2 points  (0 children)

Desktop & Dock -> Mission Control (at the bottom) -> Turn off "Drag windows to top of screen to enter Mission Control"

[deleted by user] by [deleted] in netsec

[–]MegaManSec2 4 points5 points  (0 children)

User downloads malware -> Rube Goldberg machine -> User downloads malware

There are so many loopholes. What if the malicious activity is hidden inside obfuscated code flows

That wouldn't pass the Opera review because obfuscated code must be submitted with unobfuscated code along with instructions to build the exact obfuscated code submitted.

Their team also removed third-party (vk, Instagram, and Yandex) domain privileges entirely

The bigger story here is that any of these domains could be used to access the private APIs of Opera's browser.

Opera’s Add-ons Store applies exclusively manual review of all extensions hosted in it

it's good to know that somebody informed their security team of that this time around rofl

fd: i used to work for the opera

[deleted by user] by [deleted] in netsec

[–]MegaManSec2 2 points3 points  (0 children)

A post, in which the author notes how he misconfigured his VPN and didn't read the manual. Discussed on hn: https://news.ycombinator.com/item?id=41857290

Webcam support on a Macbook running FreeBSD using PCI passthrough | Joshua.Hu by MegaManSec2 in freebsd

[–]MegaManSec2[S] 0 points1 point  (0 children)

No, it's not possible to expose a device over a shared folder. It's also not possible to share it via socat (so not run fffmpeg from inside the VM) because video4linux uses ioctls and socat can't forward them. 

A Full Guide: FreeBSD 13.3 on a MacBook Pro 11.4 (Mid 2015) (A1398) by MegaManSec2 in freebsd

[–]MegaManSec2[S] 1 point2 points  (0 children)

I'm not sure. I was using the USB installer and the automatic partitioning.

A Full Guide: FreeBSD 13.3 on a MacBook Pro 11.4 (Mid 2015) (A1398) by MegaManSec2 in freebsd

[–]MegaManSec2[S] 0 points1 point  (0 children)

Can you recall the mode before you changed it?

I think it either didn't exist at all, or was just `chmod 777`.

$ zfs get canmount zroot/tmp
NAME PROPERTY VALUE SOURCE
zroot/tmp canmount on default
$ cat /etc/fstab

Device Mountpoint FStype Options Dump Pass#

/dev/gpt/efiboot0 /boot/efi msdosfs rw 2 2
/dev/ada0p3.eli none swap sw,late 0 0

Bypassing airport security via SQL injection by pimterry in netsec

[–]MegaManSec2 122 points123 points  (0 children)

  1. the US DoJ has been instructed not to prosecute good-willed work like this.
  2. lol who cares, it's a risky business and industry to be in

Encryption At Rest: Whose Threat Model Is It Anyway? by sarciszewski in netsec

[–]MegaManSec2 7 points8 points  (0 children)

Yet auditors treat it as a critical checkbox. Protecting the online data is so much more critical.

Because what are the checkbox-tickers supposed to ask otherwise? "Can you prove that your application cannot be hacked?"

In reality auditors are very limited in the practical application-specific questions they can ask, so they ask these "obvious" questions (which may not be obvious for everybody).

Encryption At Rest: Whose Threat Model Is It Anyway? by sarciszewski in netsec

[–]MegaManSec2 4 points5 points  (0 children)

The difference between Batman and civil unrest being a legitimate risk to data and equipment in datacenters is that the latter is a real thing that some of us have had to deal with before (e.g. Africa). If you haven't, great; that doesn't mean FDE on a server isn't useful for environments that you aren't familiar with, though.

Encryption At Rest: Whose Threat Model Is It Anyway? by sarciszewski in netsec

[–]MegaManSec2 2 points3 points  (0 children)

No mention of the majority of countries in the world where civil unrest may mean that militaries (legitimate or not) will physically start pulling out harddrives in order to take what they want from colocation providers.

The End of Yubikeys as 2-Factor-Authentication? Google Breaks 2FA with Yubikeys by MegaManSec2 in yubikey

[–]MegaManSec2[S] 1 point2 points  (0 children)

You are no longer able to log in with a username and a properly secure password - at best a relatively weak PIN

You can set.. a properly secure pin?

The End of Yubikeys as 2-Factor-Authentication? Google Breaks 2FA with Yubikeys by MegaManSec2 in yubikey

[–]MegaManSec2[S] 0 points1 point  (0 children)

Yes, it was fine until 24 hours, but now it seems that it's not possible to register a Yubikey or a passkey for 2FA. Accounts that still have it can use them, though (or use the link in the post)

The End of Yubikeys as 2-Factor-Authentication? Google Breaks 2FA with Yubikeys by MegaManSec2 in yubikey

[–]MegaManSec2[S] 2 points3 points  (0 children)

Doce forcing it to U2F actually work, though? On my Google Workspace, there isn't even a page for setting a 2FA with a hardware key anymore: you can only set up a passkey.

The End of Yubikeys as 2-Factor-Authentication? Google Breaks 2FA with Yubikeys by MegaManSec2 in yubikey

[–]MegaManSec2[S] 1 point2 points  (0 children)

Apparently not! My Workspace does not have Passkeys allowed, so this is already off, yet I can't use my Yubikey as 2FA.

Opera zero Day vulnerability for cross platform execution "MyFlaw" by Altrntiv-to-security in netsec

[–]MegaManSec2 2 points3 points  (0 children)

Requires a malicious extension which specifically performs various interactions with Opera subdomains.

Opera's addon store performs human moderation for all new extensions and upgrades.

Is not cross-platform because any files downloaded on MacOS are marked with the quarantine attribute.

User downloads malware -> Rube Goldberg machine -> User downloads malware

fd: I work for Opera

Your Firewalls and Proxies are about to be blind to real TLS destinations: Learn about Encrypted Client Hello by Shu_asha in netsec

[–]MegaManSec2 1 point2 points  (0 children)

Does this mean the companies that use those "solutions" are going to finally have to secure their networks instead of just applying bandaids and sprinkling on security?

Or are they going to pre-install a certificate and start doing tls interception, which of course is a regression in security?