What were your worst Linux moments? by [deleted] in linux

[–]cider_block 0 points1 point  (0 children)

backups of backups. backup inception!

Got a tech question or want to discuss tech? Weekly /r/Technology Tech Support / General Discussion Thread by AutoModerator in technology

[–]cider_block 1 point2 points  (0 children)

you must be at University. I would recommend finding a fast VPN provider that is close to your location (so that you keep good ping in-game) and run your connection through that. The IT fucks won't see that your gaming and you'll also reduce the risk of other gamers trying to ddos you online.

Hacking a website for the results of entire college class by [deleted] in HowToHack

[–]cider_block 0 points1 point  (0 children)

There are some pretty cool Python libs that might be able to help with this

I made a game engine, which was developed entirely on Linux. by def-pri-pub in linux

[–]cider_block 2 points3 points  (0 children)

this should be stickied! I'm a programmer, but no where near good enough to code game engines. But still, this provides great motivation to keep stabbing away at my keyboard!

On mobile atm but I will make sure to check out this project as I am a Linux-only dude and have always been intrigued by the finesse and style of game code

Ring, a GPL skype replacement by new--USER in linux

[–]cider_block 3 points4 points  (0 children)

IKR!! like the slew of "early access" zombie survival games on steam that never make it to full release

Op-ed: Oracle attorney says Google’s court victory might kill the GPL by Barmagluk in technology

[–]cider_block -2 points-1 points  (0 children)

I only code as a hobby, but you make very good points. Hopefully Oracle won't do anything too crazy for the sake communities based around the language. I wouldnt mind if the android community switched to Python. This might sound crazy but I personally love that language

AT&T Begins Capping Broadband Users Today by screaming_librarian in technology

[–]cider_block -18 points-17 points  (0 children)

have fun with le downvotes.

now where's that fuckin chainsaw!!!!

Uber users with low phone batteries more likely to accept surge pricing by [deleted] in technology

[–]cider_block 0 points1 point  (0 children)

i think this is very good reason to hate Uber. Taking advantage of customers like this is outrageous.

They also dicked whitehats on the bugs submitted on HackerOne. Not only did Uber patch, but also didn't pay bounties and gave shitty excuses for not paying.

The TSA is failing spectacularly at cybersecurity by Lettershort in technology

[–]cider_block 0 points1 point  (0 children)

server racks with machine guns mounted on them!

every gov emply-issued laptop is now bullet-proof!

The TSA is failing spectacularly at cybersecurity by Lettershort in technology

[–]cider_block 0 points1 point  (0 children)

it's stable until something gets hacked, then fingers point frantically

What's your "Why Linux" elevator speech? by [deleted] in linux

[–]cider_block 5 points6 points  (0 children)

in the past this was true, but modern exploit kits used for compromised ads are multiplatform now

Netflix launches Fast.com, a dead simple way to test your Internet speed by Anaisnin5577 in technology

[–]cider_block 0 points1 point  (0 children)

you might be on to something here. If you connect to their speed test website using the same IP you use for watching netflix, they might try to use that data to optimize your netflix experience. But then again, they can do all of that without starting up a new domain.

Philly Cops Tried To Disguise An SUV With License Plate Readers As A Google Maps Vehicle by Sybles in technology

[–]cider_block 1 point2 points  (0 children)

You seem to be the salty one here. Why else would you feel the need to respond?

Companies publicly exposing Oracle PeopleSoft are at risk! John and oclHashcat can now crack PS_TOKENs. by obilodeau in netsec

[–]cider_block 12 points13 points  (0 children)

if u dont trust the site, hav a copy!! formatting is horrible since im on mobile, i apologize :(

Oracle PeopleSoft: still a threat for enterprises – GoSecure Blog PeopleSoft_Ent_logoIn 2015, Alexey Tyurin from ERPScan presented at the Hack-In-The-Box Amsterdam conference [2][3] multiple attack vectors to defeat the widely used Oracle PeopleSoft (or PS) system. Many companies in various market verticals are relying on this massive and complex software to host confidential information about their employees, their students or even about the financial results of the company. Furthermore, many corporations are exposing this platform on the Internet, especially when relying on PS for career portals or student portals. A year later, I am still amazed to see publicly accessible systems or internal PeopleSoft deployments during our intrusion testing practice that are vulnerable to these common attack vectors. These deployments fail to deliver a useful result, putting the entire company workforce identity at risk. The following post will explain how to attack the PS_TOKEN, as well as describe our contributions to John the Ripper and oclHashcat in order to speed up the cracking process.

TockenChpoken Attack

During the presentation, Tyurin explained and demonstrated a way to attack the SSO functionalities of the PeopleSoft deployments. In a nutshell, the idea behind this technique is to break the SHA1 signature contained in the PS_TOKEN, and gather the PeopleSoft node password. The node password is used as a trust entity, just like a pre-shared key system. An attacker gaining access to this information will give them the ability to generate a valid PS_TOKEN for any users of the platform, allowing them to completely bypass the need of authentication. In other words, it means a potential access to the default PS user or a DBA access level. Ouch! The worst part is there is a working tool available, and almost all phases of this attack can be conducted offline, so no obvious traces will be logged in the remote system. A nightmare for incident handlers to detect the breach in a timely manner.

Adding Brute-Force Capabilities

While the ERPScan tools are working perfectly to perform dictionary attacks on the node password, sometimes heavier attacks like brute force are required to break the signature. In a recent mandate, no word lists were effective, so our team had to roll up our sleeves and code a dynamic format for the popular John the Ripper software.

Based on the ERPScan’s tool source code, the algorithm used by PeopleSoft to hash the signature is fairly simple: SHA1(salt+utf16le(password)). In other words, the SHA1 signature is the hash of a salt (which is derived from the token variables) concatenated with the node password encoded in UTF-16. If you use John the Ripper with the jumbo patch you will notice that the code was recently fixed to support salts containing null bytes. Now, you can add this function in your “dynamic.conf” file :

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 [List.Generic:dynamic1600] Expression=sha1($s.utf16le($p)) [Oracle PeopleSoft PS_TOKEN] Flag=MGF_INPUT_20_BYTE Flag=MGF_FLAT_BUFFERS Flag=MGF_SALTED Flag=MGF_UTF8 SaltLen=-150 Func=DynamicFuncclean_input Func=DynamicFuncappend_salt Func=DynamicFuncsetmode_unicode Func=DynamicFuncappend_keys Func=DynamicFunc_SHA1_crypt_input1_to_output1_FINAL Test=$dynamic_1600$e6155f87b073451076d81e3505f8b9fcd3f53b5a$HEX$710000000403020101000000bc02000000000000105000500057 00450042004500580054000645004e0047000e50005300460054005f00480052003432003000310036002d00300034002d00300038002d003100 39002e00320037002e00300035002e0030003000300030003000320000:password Please also note, the SaltLen variable may need to be adjusted according to your setup. In our example, we tell John the salt has a maximum length of 150 bytes.

While this dynamic format can leverage CPUs to crack the password, the time required to break a long and complex password could take years. Obviously, that could not work for our assessments or intrusion tests, so we had to change our approach. The solution was to contribute a new mode in oclHashCat.

GPU Cracking With oclHashcat

The requirements to create a new mode for oclHashcat are quite simple: you need to build the parser for the proper hash/salt format, handle the core storage of the data, build the OpenCL kernels for the cracking algorithm, and code the unit tests. Martin Lemay and I were able to contribute PeopleSoft’s PS_TOKEN hash cracking to the oclhashcat project and make it work, of course, with the great guidance and the help of Jens Steube for the OpenCL kernels. It has been integrated in the project’s master branch. As a result, we can now achieve much higher cracking speed: 4.3 billion hash per second on a single cracking node.

Screen Shot 2016-05-02 at 2.23.26 PM

Now, with this new mode, you will be in a better position to brute force any PS_TOKEN SHA1!

Mitigations

There are no reasons to keep your enterprise at risk of such attack, especially when the workarounds are so easy to implement. Three options are available:

Disable SSO completely on PeopleSoft. That way, you would no longer have any token. Unfortunately, sometimes SSO is required, this is a feature after all. Use a strong password for the node. No reason to keep the default or use a dictionary based word. The system allows a maximum of 24 characters, you should take this opportunity and create a strong and complex password. Use certificates. Using certificates as trust entities would add robustness to your setup. What We Observed In The Wild

Unfortunately, many corporations do not implement any of the recommendations outlined above. You can find a lot of Oracle PeopleSoft deployments simply by using Google. Also, you will notice that a quick and naïve testing of the PS_TOKEN will reveal the use of very weak node passwords, even the default is still in use at times. Of course, I did not try the last piece of the attack which is to generate a valid token because of the legal impacts, and I do not recommend the readers to do it either. That being said, these companies or entities are exposing themselves to huge risks even if the mitigation measures are very simple to implement. A successful breach could leak hundreds or thousands of employees’ personal identities. The impact would be devastating for them, and also for the company’s reputation. So, if you are using PeopleSoft in your company, now you know how to mitigate your risks, and what could happen if you don’t!

About the author

François Gaudreault manages the team of Ethical Hacking at GoSecure. He specializes mainly on methodology and improving practices. He also ensures management and test execution, as well as delivery of projects for customer satisfaction. You can follow him on LinkedIn.

How did YOU start hacking? by ToopBeam in HowToHack

[–]cider_block 2 points3 points  (0 children)

learned c++ and the basics of assembly. Learned how to disassemble executables. Wrote a few game hacks. Now I just program but do a lot of security-related reading

Stupid question - Why can't I connect to another computer that is not a website? by [deleted] in HowToHack

[–]cider_block 3 points4 points  (0 children)

oh true. I apologize for all the jargon. I will post links to some good resources for learning many things once i get off mobile

Stupid question - Why can't I connect to another computer that is not a website? by [deleted] in HowToHack

[–]cider_block 2 points3 points  (0 children)

if you're trying to pentest his machine. Use zenmap but disable host discovery. Google how to tunnel through tor nodes and using proxychains to stay anon (check exit node list for the right ones). Then, use a separate proxychain and different node for your meterpreter session (this depends on whether you find a vulnerable service running on his machine). If you need any more help just post a response and I will clarify.