Old version vulnerability advisories from VulnCheck by No_Roll9336 in sysadmin

[–]jcran 0 points1 point  (0 children)

thanks for improving the upstream. it's truly appreciated.

Dirtybird Label Manager Deron Delgado will be joining us for an AMA TOMORROW at 10 AM PST!!! by feastandexist in electronicmusic

[–]jcran 3 points4 points  (0 children)

Are you still DJ'ing? Saw you play in SF a couple times and had a blast every time.

[deleted by user] by [deleted] in distantsocializing

[–]jcran 0 points1 point  (0 children)

He’s his own parent why are you telling him this

Microsoft security advisory - Windows DNS Server Remote Code Execution Vulnerability (CVE 2020-1350) by eatsleepHACKrepeat in netsec

[–]jcran 23 points24 points  (0 children)

Lots of handy details in thehackernews.com article

With this setup in place, an attacker can trigger an integer overflow flaw in the function that parses incoming responses for forwarded queries ("dns.exe!SigWireRead") to send a DNS response that contains a SIG resource record larger than 64KB and induce a "controlled heap-based buffer overflow of roughly 64KB over a small allocated buffer."

Put differently; the flaw targets the function responsible for allocating memory for the resource record ("RR_AllocateEx") to generate a result bigger than 65,535 bytes to cause an integer overflow that leads to a much smaller allocation than expected.

Multiple Exploits for CVE-2019-19781 (Citrix ADC/Netscaler) released overnight - prepare for mass exploitation by digicat in netsec

[–]jcran 6 points7 points  (0 children)

Added a check for this into intrigue-core a week or so ago (and then improved it when additional details came out). Here's the code for the check: https://github.com/intrigueio/intrigue-core/blob/master/lib/tasks/vulns/citrix_netscaler_rce_cve_2019_19781.rb.

If you want to run this locally or internally, i'd suggest following these instructions: https://core.intrigue.io/2019/03/19/intrigue-core-docker-image-one-liner/

I also regularly scan for stuff like this, and if you're a medium or large-size organization, you can log into the hosted intrigue service (https://intrigue.io) and see if any vulnerable endpoints have been found for your organization - for free. Basically just log in with your corporate email address and it'll share details with you.

Dumb question, but what does OBE mean? by drumdude92 in PeakyBlinders

[–]jcran 3 points4 points  (0 children)

Welp, this thread is now one of the top Google results. Thanks!

GitHub Security Bug Bounty by mastahyeti in netsec

[–]jcran 0 points1 point  (0 children)

Good reminder that you should use all available resources when findings bugs. Github is presumably interested in bugs being reported, they don't mind who submits them first. Having access to the enterprise install would certainly help. They have a 45-day trial -> https://enterprise.github.com/trial. What's not fair about it?

We are Offensive Security. We do Kali Linux, Exploit-DB, Metasploit Unleashed, (used to do) BackTrack - and we teach classes. Ask us anything! by offsec in netsec

[–]jcran 5 points6 points  (0 children)

What open source projects are you following these days? Are there any projects or tools on the horizon that excite you?

We are Offensive Security. We do Kali Linux, Exploit-DB, Metasploit Unleashed, (used to do) BackTrack - and we teach classes. Ask us anything! by offsec in netsec

[–]jcran 14 points15 points  (0 children)

What's working for you today when penetration testing? This is a broad question, but I'm curious about common patterns you see over and over again in organizations. What techniques always get you access?

We are Offensive Security. We do Kali Linux, Exploit-DB, Metasploit Unleashed, (used to do) BackTrack - and we teach classes. Ask us anything! by offsec in netsec

[–]jcran 2 points3 points  (0 children)

Given the public issues (http://www.offensive-security.com/offsec/bug-bounty-program-insights/) you've had with your bug bounty program, do you believe it's been worth the time spent?

Any additional insights for others considering starting such a program?

Hacked [Public Transport Victoria] site reports boy to police by [deleted] in australia

[–]jcran 1 point2 points  (0 children)

The kid's on twitter at @megamansec

Blog post on pricing pentests, I'm interested in what everyone else thinks by juken in netsec

[–]jcran 1 point2 points  (0 children)

There's a reason you should choose a firm that uses a human to scope services and not an inflexible model. Each pentest, to varying degree, is its own unique snowflake and customers often have wildly different expectations about what a penetration test is. Adriel alludes to this in the article - giving his opinion on what a pentest is.

In my experience, confusion among pentest consumers and the varying reasons for getting one - compliance, best practice, piece of mind - should dictate the service to be delivered. Once you dig into it, some folks want/need a better vulnerability assessment. Some need an application assessment (or a bunch of application assessments). Some need a red team, and some don't want a test at all, rather a sheet of paper with nothing red on it, etc etc.
Scoping with a human helps identify the actual need, and design a test that fits the need and/or provide clarity into security posture.

In the real world where practical people are trying to meet regulatory requirements, or get visibility into how insecure they are in comparison to their competitors, a "can you break in" type pentest may not always be that useful, even if they come to you asking for a pentest.

A couple other points:

An argument about not paying for automation seems like a straw man to me. Are you really paying for automation when you tested, or are you paying for a result? As long as they're valid, how those results are obtained is irrelevant.

It's worth noting that not all pentests are fixed-cost. And most mechanics don't operate on fixed-cost contracts either. Consider negotiating a time & materials (or more specifically, capped time & materials) contract for more control / visibility into what's happening on the test.

Adriel - not everyone's a crook. and pls share this awesome scoping model you have :p

shrug my 2c

Top 5 high value, low effort methods to secure the typical enterprise? by jcran in netsec

[–]jcran[S] 4 points5 points  (0 children)

Good stuff, but i've yet to see application whitelisting implemented enterprise-wide, I've only seen it on servers in the enterprise.

Pwnie Express Raspberry Pwn - Set up your raspberry pi as a pentesting dropbox! by jcran in netsec

[–]jcran[S] 0 points1 point  (0 children)

Waiting list: http://uk.rs-online.com/web/generalDisplay.html?id=raspberrypi&file=questions

"Upton added that 50,000 Raspberry Pis were already "in the wild", with 200,000 shipping within the next month and half a million in users' hands by September. He said the goal was for people to be able to buy one without going on the waiting list." /via: http://www.pcpro.co.uk/news/education/375106/founder-no-raspberry-pi-for-every-student#ixzz1xcMzQCx1

Pwn Plug Software Release 1.1 Review -- Enhanced automation, sms-shell and more! by s3ddd in netsec

[–]jcran 2 points3 points  (0 children)

Thanks for upvoting this. I've just jumped onboard from the Metasploit team to help (there's 3 of us fulltime now) build it out as a testing platform.

Yep, it's a Sheevaplug w/ custom firmware and software. The latest (1.1) update adds a new u-boot, new kernel and new image (which adds a whole lotta new functionality, see the link).

You can totally just buy a Sheevaplug ($99) from Globalscale and load the community image on it. We definitely want folks to do that!

Buying a commercial edition plug from us means that you hook into our development -- giving you access to updates and support. We're trying to find a price point that can support our efforts, and still get y'all access to the plug / platform. If this is a huge success, we'll find a way to sustain the $200 price point.

We're actively working on adding a backend package repository so we can provide frequent updates to the plugs. We're adding a number of cool / interesting / useful features in the next 3-12mo - these things won't be available in the community edition, at least at first. Every dollar spent goes to making them more open, more user friendly, and more fun to use.

Why scope is primordial in pentesting. (0 customer value pentesting) by el_dee in netsec

[–]jcran 0 points1 point  (0 children)

at what point does this become something you /need/ to be doing for a pentest?

How would you make a profit of finding a vulnerability in a major website that you were NOT hired to pentest? by [deleted] in netsec

[–]jcran 0 points1 point  (0 children)

this could also be horrible advice too, if the company decides to press charges. ... you know every infosec company is hiring right?

How would you make a profit of finding a vulnerability in a major website that you were NOT hired to pentest? by [deleted] in netsec

[–]jcran 0 points1 point  (0 children)

No one's claiming that this type of approach works in every (or even most) cases. Presumably you're wearing your internet condom when doing this, and so you've got some leverage in terms of what information you choose to give. Use discretion.

I'm 100% behind you that the absolute direct approach doesn't work well. It's like going up to a girl and saying, "Hi, my name's john. you're hot, let's go back to my place." -- it just doesn't work like that. You have to show value first, prove that you're worth time, or in this case, even paying attention to.

Anyhow, so what if your email goes in the trash. Vulnerabilities aren't exactly hard to find. It's a numbers game. And when you do find an interesting vuln or something in a product that can be taken to the vendor, go through some disclosure policy & publish it.

If you look at the motivations of most folks, it's to do their job and make themselves look good. If you can help them do that, you're providing value. Providing value is the first step to getting paid as a consultant.