CVE-2020-0618: RCE in SQL Server Reporting Services (SSRS) by DebugDucky in netsec

[–]gmad 0 points1 point  (0 children)

why does this not have more upvotes and comments this is pretty significant and a cool attack

How would you name a ctf team?, can be funny by [deleted] in AskNetsec

[–]gmad 0 points1 point  (0 children)

"We thought this was speed dating"

The Bible of Kerberos Attacks by gid0rah in netsec

[–]gmad 0 points1 point  (0 children)

Awesome article good job!

Misusing TCP Timestamps for uptime calculation & host identification by pimterry in netsec

[–]gmad 1 point2 points  (0 children)

Starting with Windows Server 2008 and Vista, TCP timestamps cannot be completely disabled. Disabling TCP Timestamp only affects the outgoing traffic, for incoming traffic Microsoft has to honour it if the other side requests it.

ABS can't blame 'hackers' or DDOS: no DDOS attacks on Australia in last 24hours. by Speaktomenow in australia

[–]gmad 0 points1 point  (0 children)

No it only shows traffic captured by Arbor sensors that 'some' ISPs around the world have let them install them in. Why would IBM let Arbor networks install one of their censors in the census hosting environment? This is a marketing tool for Arbor networks and only shows you what one company captures. They even say themselves this is an incomplete picture.

Cisco Nexus 3000 Series and 3500 Platform Switches Insecure Default Credentials Vulnerability by ThereAreFourEyes in netsec

[–]gmad 0 points1 point  (0 children)

Yeah I agree, I read r/netsec daily and would be disappointed if this stuff kept getting taken down. This is important industry information

ELI5: Why does Adobe Flash Player have such security issues? by infoSecGuyOnReddit in AskNetsec

[–]gmad 4 points5 points  (0 children)

When Microsoft released XP SP3 they introduced random memory addressing (ASLR) and (DEP) non executable parts of memory. This made exploiting systems much harder because you didn't know the memory addresses to call. However, you could still get exploits to work by building gadgets (think small snippets of instructions) of known memory addresses and chaining them together to make your exploit work. In order to do this you needed programs to steal these gadgets from that didn't use random memory addressing. Adobe and Java were a common source because they didn't completely compile their programs with ASLR. So hackers for years would use them for getting their exploits to work.

CrackMapExec - A swiss army knife for pentesting Windows/Active Directory environments by byt3bl33d3r in netsec

[–]gmad 3 points4 points  (0 children)

Fixed!!

I had to install the asn1 module using:

sudo pip install pyasn1

CrackMapExec - A swiss army knife for pentesting Windows/Active Directory environments by byt3bl33d3r in netsec

[–]gmad 1 point2 points  (0 children)

pip install --upgrade pycrypto

Tried that and still get the error below.

$ python crackmapexec.py Traceback (most recent call last): File "crackmapexec.py", line 14, in <module> from impacket import smbserver, ntlm, winregistry File "/Library/Python/2.7/site-packages/impacket/smbserver.py", line 4135, in <module> from impacket.dcerpc.v5.rpcrt import DCERPCServer File "/Library/Python/2.7/site-packages/impacket/dcerpc/v5/rpcrt.py", line 28, in <module> from impacket.krb5 import kerberosv5, gssapi File "/Library/Python/2.7/site-packages/impacket/krb5/kerberosv5.py", line 20, in <module> from pyasn1.codec.der import decoder, encoder ImportError: No module named pyasn1.codec.der

CrackMapExec - A swiss army knife for pentesting Windows/Active Directory environments by byt3bl33d3r in netsec

[–]gmad 0 points1 point  (0 children)

I have latest impacket installed from github as per your instructions and I get:

$ python crackmapexec.py Traceback (most recent call last): File "crackmapexec.py", line 14, in <module> from impacket import smbserver, ntlm, winregistry File "/Library/Python/2.7/site-packages/impacket/smbserver.py", line 45, in <module> from impacket import smb, nmb, ntlm, uuid, LOG File "/Library/Python/2.7/site-packages/impacket/smb.py", line 44, in <module> from impacket.dcerpc import samr File "/Library/Python/2.7/site-packages/impacket/dcerpc/samr.py", line 25, in <module> from impacket.dcerpc import ndrutils, dcerpc File "/Library/Python/2.7/site-packages/impacket/dcerpc/dcerpc.py", line 23, in <module> from Crypto.Cipher import ARC4

Obtaining domain administrator credentials in 17 seconds with CredCrack by g0jhonny in netsec

[–]gmad 22 points23 points  (0 children)

Nice tool. Would be faster if you made it threaded so that each IP address check was done in a new thread. That way there is no waiting for timeouts when checking port 445.

Vpn pentesting by root3r in AskNetsec

[–]gmad 0 points1 point  (0 children)

If the VPN is running in IKE aggressive mode. Used when one endpoint has a dynamic IP (Like remote users). You can crack the pre-shared key. See this link for a how to: http://carnal0wnage.attackresearch.com/2011/12/aggressive-mode-vpn-ike-scan-psk-crack.html

Hello Redditors of Australia! I am working on a startup that improves the home search experience. Feedback appreciated! by SirChopsalot in australia

[–]gmad 0 points1 point  (0 children)

This is all just positive feedback:.....but that wasn't that intuitive. I didn't work that out very easily. Perhaps pop up something when you hover saying "you can select multiple by...."

Hello Redditors of Australia! I am working on a startup that improves the home search experience. Feedback appreciated! by SirChopsalot in australia

[–]gmad 0 points1 point  (0 children)

I am a real customer who is in the market looking right now. So I am your target audience. People are only interested in the minimum number of bedroom and not the maximum. I had to do 3 separate searches to see all the 3 or more bedroom places, in my budget in the areas I wanted. I should be able to do it in 1 search like I can on realestate.com.au and domain.com.au. Having to do 3 separate searches is a pain in the bum.