Dailydave mailing list archives

Re: The next age of strategic surprise


From: Kristian Erik Hermansen <kristian.hermansen () gmail com>
Date: Fri, 6 May 2016 06:45:36 -0700

Excellent points. Another great example is the DLL hijacking class of
attacks that were "discovered" by HDM in 2010, but were clearly a part of
the NSA offensive playbook even before 1998. The awesome ex-NSA guys at
Synack presented at Cansecwest on dyld vulns and referenced an unclassified
document below. If makes you really wonder how many vulns the NSA has in
their classified tool belts that the public won't "discover" until decades
later...

https://i.imgsafe.org/e987527.png

https://www.slideshare.net/mobile/Synack/can-secw

I still think it is crazy that everyone "trusts" HTTPS when the NSA surely
has root CAs to intermediate any Internet traffic they like in transit --
except the handful of sites at Google that actually utilize HPKP ;)
On May 6, 2016 6:16 AM, "Dominique Brezinski" <dominique.brezinski () gmail com>
wrote:

Actually, the core vulnerability was disclosed in 1996, and I spoke about
it at Black Hat in 1997:
http://www.blackhat.com/html/bh-usa-97/speakers.html

There have been a bunch of derivations of it as Microsoft and Samba
changed the protocols and implementations slightly. The core vulnerability
has a bunch of variations including reflection, active MITM, credential
relaying, etc. The variations have caused further confusion over the years,
in some cases causing several people to think they discovered something
new. See https://www.veracode.com/blog/2008/11/credit-for-researchers

On Mon, May 2, 2016 at 9:19 AM, Andre Gironda <andreg () gmail com> wrote:

On Mon, May 2, 2016 at 8:36 AM, dave aitel <dave () immunityinc com> wrote:
To sum up a few things: Those of you who engaged in laughing at how lame
Badlock was were all wrong

Andre Gironda, April 13 at 2:47pm ยท

This banter about BadLock is another great reason to hate the infosec
community.

The vulnerabilities around BadLock have been known since as early as
2007. Dino Dai Zovi had a whole slide deck describing the attacks way
back in the day. Microsoft and SMB environments are not protected
because of the basics --

https://digital-forensics.sans.org/blog/2012/09/18/protecting-privileged-domain-accounts-network-authentication-in-depth

The original partial fix is well-documented as MS08-068, which every
security professional should already know because SMB Relay is the
centerpoint of lateral movement. We have no idea why Microsoft lagged
behind on making this a bigger deal since that time. It is a big deal.
Nearly every position on nearly every Enterprise network provides this
attack as a pivot.

dre
_______________________________________________
Dailydave mailing list
Dailydave () lists immunityinc com
https://lists.immunityinc.com/mailman/listinfo/dailydave



_______________________________________________
Dailydave mailing list
Dailydave () lists immunityinc com
https://lists.immunityinc.com/mailman/listinfo/dailydave


_______________________________________________
Dailydave mailing list
Dailydave () lists immunityinc com
https://lists.immunityinc.com/mailman/listinfo/dailydave

Current thread: