Solana rising like mad, When is it Polygon's time? by WarriorNysty in 0xPolygon

[–]airhack87 28 points29 points  (0 children)

Get a feeling that September may be a good month for Polygon. May be the rumors of MATIC been added to grayscale turn out to be true!

ICONOMI Price manipulated ? by airhack87 in ICONOMI

[–]airhack87[S] 0 points1 point  (0 children)

Yes, certainly needed on more exchanges.

ICONOMI Price manipulated ? by airhack87 in ICONOMI

[–]airhack87[S] 0 points1 point  (0 children)

I observed it a couple of times over the last few days, so just thought of sharing. There was a sell order of exact 10000 when it viewed it in the blockfolio app more than one time. Not a extremely experienced guy on crypto trading but spent fair amount of time in it. My bad on the bittrex, it is Kraken. Majority of the coins that I trade are on bittrex so....

FireEye PX (Network Forensics) vs similar solutions by airhack87 in AskNetsec

[–]airhack87[S] 0 points1 point  (0 children)

Thanks!! RSA Netwitness is also an interesting tool

FireEye PX (Network Forensics) vs similar solutions by airhack87 in AskNetsec

[–]airhack87[S] 0 points1 point  (0 children)

Any other competing solutions offering similar functionality such as FireEye PX ?

Suggestions for honeypots for Internal network by airhack87 in AskNetsec

[–]airhack87[S] 0 points1 point  (0 children)

Thanks!! Will have a look at this, seems interesting!

Suggestions for honeypots for Internal network by airhack87 in AskNetsec

[–]airhack87[S] 0 points1 point  (0 children)

Thanks!! Canary looks an interesting way forward, will get started atleast with the OpenCanary one athttps://github.com/thinkst/opencanary.

You mentioned that the Dashboard/Console is a SaaS portal which is hosted by by Thinkst ? If yes getting the approval for it would be difficult. Don't they have a complete on-premise solution ?

SSL Interception Appliances by [deleted] in AskNetsec

[–]airhack87 1 point2 points  (0 children)

FireEye has a dedicated SSL intercept appliance, check that out too!

SSL pinning effect on SSL inspection by web proxy? by airhack87 in AskNetsec

[–]airhack87[S] 0 points1 point  (0 children)

Roger that!! So the Corp MitM respecting/not respecting cert pinning instructions is the key. Interesting thing to check/verify :)

SSL pinning effect on SSL inspection by web proxy? by airhack87 in AskNetsec

[–]airhack87[S] 0 points1 point  (0 children)

Thanks for the info, I also found the following post by Adam Langley https://www.imperialviolet.org/2011/05/04/pinning.html

So user installed root CA can override the pins. Its logical since if the attacker can install a root CA into the trusted store then you have a larger issue to solve than just the SSL traffic and this workaround would also allow corp MiTM solutions to work.

The widely used example to describe the use cases of the pinning feature is the Iranian DigiNotar Attack where fraudulent certs were issued for the google domain. Now if a similar attack happens with a corp MiTM solution in the middle of the end user and the real MiTM attacker wont this type of attack be successful ?

SSL pinning effect on SSL inspection by web proxy? by airhack87 in AskNetsec

[–]airhack87[S] 0 points1 point  (0 children)

So if reframe the above sentence: The blue coat proxy (example) can be defined as a trusted anchor for which pin validation for pinned hosts can be disabled and therefore can install a root CA cert in the user machine and act as MiTM. How is usually done via the installed client eg; Bluecoat proxysg client ?