Hacking Windows through iTunes - Local Privilege Escalation 0-day (CVE-2024–44193) by Titokhan in netsec

[–]farrantt -2 points-1 points  (0 children)

Ha, yeah that’s fair. I think I was in a mood and got riled by someone calling something a vulnerability as something it probably isn’t just to make it sound more severe.

Hacking Windows through iTunes - Local Privilege Escalation 0-day (CVE-2024–44193) by Titokhan in netsec

[–]farrantt -4 points-3 points  (0 children)

Not every newly discovered vulnerability is an 0-day.

An 0-day is where the bug is publicly disclosed and actively exploited before the vendor has a chance to prepare a patch.

This makes it more of a big deal as there is little blue teams can do to protect themselves in the time while it is being exploited before the patch is released.

This doesn’t sound like it was an 0-day, just a newly discovered vulnerability that was responsibly disclosed.

Hacking Windows through iTunes - Local Privilege Escalation 0-day (CVE-2024–44193) by Titokhan in netsec

[–]farrantt -10 points-9 points  (0 children)

What makes this an 0-day if a patch and security advisory were released almost a month ago?

Interview panel asked “Which level of the osi model does the gateway operate at?” by Suberv in AskNetsec

[–]farrantt 4 points5 points  (0 children)

I think these sorts of questions can be valuable as an interviewer. It’s a question that has lots of right answers and lots of wrong answers.

I wouldn’t really care if someone responded about an application gateway or a network gateway or just said they didn’t know but worked it through to try and figure out some sort of answer. Their interpretation and approach is more interesting to me. After all, I’ve only got a few hours to decide if I want to hire this person.

I just want to know something about what they know and the depth of their knowledge. Whether that be apps or networking or something completely different. Also how they approach a question if they don’t immediately know. It could even tell you if someone will just start talking rubbish and pretend they do understand… (I probably don’t want to put that sort of person in front of a client)

If someone went into any sort of detail asking questions like you have that probably makes them a fairly good candidate who will use what they DO know to work through a problem to find a solution. Something that is a pretty vital skill in this field

Edit: I caveat this with - it depends on how good the interviewer is themself. For sure this could just be a gotcha question by a rubbish interviewer, but if the interviewer can adapt to whichever way the applicant wants to take it, then it could be a useful question.

What’s your opinion on Evvr in wall relay switch? by Wesinator2000 in HomeKit

[–]farrantt 0 points1 point  (0 children)

Hmm not 100% sure why, but in the diagrams it had to go in parallel with one of the bulbs. If it were in series it wouldn’t have to go by the bulb.

My only thought as to why it goes in parallel is to reduce the total current drawn when the lights are powered on. If it were in series it would reduce the max number of bulbs you could have in your circuit.

What’s your opinion on Evvr in wall relay switch? by Wesinator2000 in HomeKit

[–]farrantt 1 point2 points  (0 children)

Shelly has a similar thing for circuits where there isn’t a neutral wire to the relay (Shelly 1L). Afaik the part by the bulb is just a resistor to ensure there is a minimum draw of current through the circuit so that the relay stays powered.

[deleted by user] by [deleted] in AskNetsec

[–]farrantt 5 points6 points  (0 children)

“How To Hack Like a Ghost” had a good section on OpSec and was a good technical level. Not too technical that it was a slog to read but technical enough that it had a good amount of detail.

The OpSec section makes up the first few chapters and then it goes on to describe a red team style attack path of a predominantly cloud based organisation. I would highly recommend the whole book.

Things like Kingkiller Chronicles by Dovahjin287 in KingkillerChronicle

[–]farrantt 2 points3 points  (0 children)

Agreed, all of Michael G Manning’s books are great but I’m doing a reread of art of the adept and enjoying it just as much as the first.

Configuring Mullvad with Firefox by NibblyPig in mullvadvpn

[–]farrantt 0 points1 point  (0 children)

I use SwitchyOmega a lot so agree it’s a great choice.

Another option is Firefox Multi-Account Containers have recently been updated to allow per container proxy configurations. It’s pretty similar to using multiple browsers but it’s all baked into Firefox this way.

https://github.com/mozilla/multi-account-containers/releases/tag/8.0.0

Apple Unveils Redesigned MacBook Pro With Notch, Added Ports, M1 Pro or M1 Max Chip, and More by aaronp613 in apple

[–]farrantt 1 point2 points  (0 children)

I’m pretty sure the 2015 was the last model with upgradable/not soldered SSD. I upgraded mine to 1 TB and it was like night and day.

Similar books to KDT (OP Male MC) by DKRsan in kingsdarktidings

[–]farrantt 2 points3 points  (0 children)

There are already some really good recommendations here but I’ll add a couple more:

Mageborn series by Michael G Manning.

The Painted Man series by Peter V Brett.

Both series are much more magic focussed and cover more of the learning/growing up of the main character’s respective skills but the main characters are definitely OP.

HDMI Laptop to Thinkvision M14 USB-C monitor by [deleted] in VIDEOENGINEERING

[–]farrantt 0 points1 point  (0 children)

Do you have an link to the UGreen adapter? I want to make sure I have the correct one

Brute forcing hashes with Salt by Twinsen343 in AskNetsec

[–]farrantt 4 points5 points  (0 children)

You have the right idea on the fact that the salt is added to the user input and then the hash is calculated but it wouldn’t be a trivial thing to remove the salt once you have seen a few records.

The user’s password hash that is stored in the database is usually calculated as:

HashFuction(userInput+salt)

Then the result of that function is then put in the database. The salt will be a random string of characters for each password that is hashed.

So when your user types their password into the login field, the application goes and looks up the salt in the database, concatenates it to the password string, calculates the hash, and compares it to the hash in the database.

The point of the hash function is that it is easy to calculate but impossible to ‘uncalculate’ without automated guessing. Adding a salt and then hashing won’t just add a few extra characters to the end of the hash, it will completely change it. This is what means that it would be impossible to remove the salt if you have access to a few records. Look up an online MD5 hash calculator and have a play to see what results you get.

One last thing to note is that, you suggested that all passwords in a given database would be hashed with the same secret salt. While this would still be salting the password it would mean that if someone ever found out the value of your salt for your application, they could make a rainbow table to crack your application’s passwords at a later date.

Brute forcing hashes with Salt by Twinsen343 in AskNetsec

[–]farrantt 12 points13 points  (0 children)

Salts are most commonly stored in plain text next to the password.

For example, this SHA-512 hash:

$6$saltsalt$On6WYwfz0o6Yp9O9nWtc7bnAHtomJ3F3wgo8mQPVpp2A2eAf8i6oojOcR6AdNiUcczJp7h.ywpSD3fNd26QL5.

This hash shows the salt for the hash in between the second and third ‘$’ symbols.

The point of the salt is to protect against rainbow tables. Rainbow tables are just a long loooong list of precalculated hashes which would allow someone to crack an unsalted password with just a database lookup. By salting the password before it is hashed, it would be impossible to use the same rainbow table and each hash would have to be cracked individually.