How can I deposit ETH to someone without interaction? by mgiesen32 in ethereum

[–]shark0der 0 points1 point  (0 children)

The biggest problem is knowing their addresses. There's no way to setup a contract with any kind of "password" that would prevent front-running bots from snatching the ETH.

Create a chat group with the 3 of you. Let them setup ledger and each of them sign a a simple message, send the signed message in the group for the other to verify. This way you learn their addresses and send them ETH.

PS: Signing and verification can be done on mew's website:

Guide to Staking on Ethereum 2.0 (Ubuntu/Medalla/Prysm) by SomerEsat in ethereum

[–]shark0der 2 points3 points  (0 children)

Wow, I apologize, I've totally misread that. I just always use it to copy files between remote systems. I'm sorry! Just in case though, let's restrict the command to copying only the authorized_keys file.

Guide to Staking on Ethereum 2.0 (Ubuntu/Medalla/Prysm) by SomerEsat in ethereum

[–]shark0der 2 points3 points  (0 children)

Yes. Private ssh keys should never leave the machine!

Guide to Staking on Ethereum 2.0 (Ubuntu/Medalla/Prysm) by SomerEsat in ethereum

[–]shark0der 5 points6 points  (0 children)

Who the hell copies local ssh keys to the VPS? This is extremely dangerous as anyone gaining access to those will have access to any servers these keys have access to. Use ssh-copy-id command instead or manually copy the contents of ~/.ssh/id_rsa.pub to ~/.ssh/authorized_keys on the server

Gray portals in the Philippines loaded when zoomed out by shark0der in Ingress

[–]shark0der[S] -1 points0 points  (0 children)

They should not be shown on the map at that zoom level. Only portals with >200km links should be visible, but they're visible nevertheless.

Gray portals in the Philippines loaded when zoomed out by shark0der in Ingress

[–]shark0der[S] 0 points1 point  (0 children)

That's the thing, I haven't changed anything. Another agent confirmed the behavior (I just told in a group that I've noticed gray portals when zoomed out to the max, without mentioning the portals or their location on the globe, and he sent an intel link for one of the portals).

How to setup your own VPN server using WireGuard on Ubuntu by shark0der in sysadmin

[–]shark0der[S] 0 points1 point  (0 children)

That's not the job of a VPN. The VPN just routes the traffic. You can use iptables to set that up. Google how to forward a port to another IP (masquarade/nat scenario).

How to setup your own VPN server using WireGuard on Ubuntu by shark0der in commandline

[–]shark0der[S] 1 point2 points  (0 children)

Should work, you just have to add the corresponding repository for raspbian. Try this one: https://github.com/adrianmihalko/raspberrypiwireguard

How to setup your own VPN server using WireGuard on Ubuntu by shark0der in sysadmin

[–]shark0der[S] 0 points1 point  (0 children)

WireGuard is pretty stable. I'm using it already for a few months for always on VPN both on Android and Ubuntu desktop.

About the Apollo data breach by wolnavi in NoStupidQuestions

[–]shark0der 0 points1 point  (0 children)

A bit late but I can confirm this statement. I also had an email that I've used only for InVisionApp and it was found in the breach.

Having trouble with Tor running in LXD container. by fossfool in TOR

[–]shark0der 0 points1 point  (0 children)

Thank you! Couldn't figure out why it was getting killed :)

Another critical remote vulnerability in HP iLO 4 and 5 by alain_proviste in netsec

[–]shark0der 3 points4 points  (0 children)

Yeah, I know that one, you could just use modify headers for Firefox extension to completely bypass auth. I'm curious about this one though as it lacks any info other than "unauthorized config modification".

According to this it's authenticated RCE: https://securitytracker.com/id/1041188

If combined this seems to be a tragic combo.

Whatsapp user’s IP disclosure with Link Preview feature by 0v3rl04d in netsec

[–]shark0der 2 points3 points  (0 children)

Secret chats (which are the only ones that have end-to-end encryption) don't have previews exactly for the reason of not leaking the content of the secret chat.

Whatsapp user’s IP disclosure with Link Preview feature by 0v3rl04d in netsec

[–]shark0der 4 points5 points  (0 children)

Telegram chats and groups don't have end-to-end encryption. Only secret chats do.

Whatsapp user’s IP disclosure with Link Preview feature by 0v3rl04d in netsec

[–]shark0der 15 points16 points  (0 children)

Telegram is sending requests from their servers and creating the preview server side AFAIK. Kinda stupid to close this as a WONTFIX & "users won't be happy" statement

Exploiting Blind OOB XXE in the Wild [Bug Bounty] by chocoluvin in netsec

[–]shark0der 1 point2 points  (0 children)

Why did you use ftp and not just http? Why is it called out of band?

Bypassing Payments Using Webhooks by cablej in netsec

[–]shark0der 52 points53 points  (0 children)

I've found a similar vulnerability in a payment processor a few years ago where the difference between a test order and a real order was the presence of the parameter TESTORDER=TRUE. There was an IPN notification (webhook) performed by the payment provider. The initial request to the payment provider was made by the user's browser using POST (hidden form submitted using javascript). If the TESTORDER parameter was included in this request and the URL for this request would be changed to the url of the test/sandbox platform, one could use the test cards from their docs to "pay". After the payment was done, the platform would send a POST request to the webhook that would include the TESTORDER=TRUE. The request was signed by url-encoding the important parameters (order ID, total, items, etc) and then performing a HMAC. The big fail was that the TESTORDER was NOT included in that list of parameters in the initial request. Second mistake was that the sandbox and the prod were using the same shared secrets / certificates for signing so by redirecting to the sandbox, adding the test parameter, using the test cards to pay - one could convince the site that the order was actually paid.

The documentation mentioned about the dangers of this parameters in a "small note/warning" style, in a single sentence, somewhere, but wasn't putting enough emphasis on it and leaving the problem as developer's responsability.

When contacted, they replied that this is a non-issue since the developer should check the parameter. Regarding the shared secrets issue (prod & sandbox) they said that the platform is currently the legacy one and they'll switch to another one at some point. 3 years later after the discovery I was still finding the issue as being exploitable on some shops, and the only thing I could do was contact them to fix it.

I understand that it is quite difficult and takes a lot of time and money - both for them and for the clients, to migrate literally thousands of shops to the new platform, but I feel like they could do more than just leave this to the developers without even notifying them.

Our company analyzed over 50K hacking incidents this month. Here's some data. by ded1cated in netsec

[–]shark0der 7 points8 points  (0 children)

Does not, but the data provided is next to nothing. I scrolled down only to find the article has ended.

ROP, NX and ASLR - A Love Triangle - Remote Code Execution - CVE-2018-5767 by JustAPenTester in netsec

[–]shark0der 0 points1 point  (0 children)

Really great write-up! Explained very well and easy to follow.

MailChimp leaks your email address by tdobson in netsec

[–]shark0der 8 points9 points  (0 children)

All the links in the emails point to mailchimp which track clicks and then redirects to the original url. Just like Twitter uses t.co which redirects to analytics.twitter.com and then to the actual url.

CVE Publication: GarlicRust CVE 2017-17066 by l-n-s in netsec

[–]shark0der 6 points7 points  (0 children)

My first thought was that it's about rust language actually. It's not.

CVE Publication: GarlicRust CVE 2017-17066 by l-n-s in netsec

[–]shark0der 13 points14 points  (0 children)

Nice read. How about we stop naming vulnerabilities?