Shared posts

21 Sep 14:45

Robotic Mouse Toy Built For Cats

by Lewin Day

Cats are nature’s born hunters. Whether its rodents, insects, or lasers, they’ll pounce and attack with ruthless efficiency. Built to challenge a cat, or perhaps merely to tease it, Sourino is a robotic mouse built with common off-the-shelf parts.

A test subject appears unamused.

So named for the combination of Souris (French for “mouse”) and Arduino, the project is driven by an Arduino Nano. Hooked up to three sets of ultrasonic transducers, this gives the robot mouse much improved obstacle avoidance abilities compared to using just a single transducer front-and-centre. The ‘bot can navigate basic mazes or household floors with ease. A pair of geared motors are used for drive, using simple skid-steering to turn corners. It’s all packed in a 3D printed enclosure, which mounts the various components and exposes the ultrasonic sensors. There’s even an IR remote enabling mode selection or full manual control.

While the ‘bot lacks the speed and agility of common house mice, it’s nevertheless a project that teaches plenty of valuable lessons. We’re sure [Electrocat01] picked up plenty of skills in robotic navigation, mechanical design and 3D printing along the way. Creating robot mice is actually a competitive field, as we’ve seen before. Video after the break.

 

03 Apr 11:33

Security Vulnerabilities in Smart Contracts

by Bruce Schneier

Interesting research: "Finding The Greedy, Prodigal, and Suicidal Contracts at Scale":

Abstract: Smart contracts -- stateful executable objects hosted on blockchains like Ethereum -- carry billions of dollars worth of coins and cannot be updated once deployed. We present a new systematic characterization of a class of trace vulnerabilities, which result from analyzing multiple invocations of a contract over its lifetime. We focus attention on three example properties of such trace vulnerabilities: finding contracts that either lock funds indefinitely, leak them carelessly to arbitrary users, or can be killed by anyone. We implemented MAIAN, the first tool for precisely specifying and reasoning about trace properties, which employs inter-procedural symbolic analysis and concrete validator for exhibiting real exploits. Our analysis of nearly one million contracts flags 34,200 (2,365 distinct) contracts vulnerable, in 10 seconds per contract. On a subset of 3,759 contracts which we sampled for concrete validation and manual analysis, we reproduce real exploits at a true positive rate of 89%, yielding exploits for 3,686 contracts. Our tool finds exploits for the infamous Parity bug that indirectly locked 200 million dollars worth in Ether, which previous analyses failed to capture.

20 Jun 14:02

Sysadmins required to follow various compliance standards - where do you get your guidelines?

by /u/TheCreamyGentleman

Looking for resources that specifically address the technology portion of the various compliancies, including:

PCI

HIPAA

SOX

GLBA

CJIS

submitted by /u/TheCreamyGentleman
[link] [comments]
07 Dec 11:45

vmPing - visual multi ping utility

by /u/RyanSmithLV

I have a sweet ping utility that I decided to put on GitHub. Get it here: https://github.com/R-Smith/vmPing. Screenshots are at the bottom. Grab and run the precompiled .exe. No installer needed!

Sometimes when doing network or server maintenance, I've found it very useful to monitor multiple devices at once. That's where vmPing comes in. Quickly add and remove multiple host monitors. With the color coding, you can instantly determine the status of each host. Green = good, red = down, orange = error. Each host monitor dynamically resizes with the application's window, so make it as large as you need.

Other features include a TCP 'port ping'. The app will continuously connect to a specified port and display whether the port is open or closed. This is nice when you reboot a server and the ping comes up, but you can't RDP into it right away. Just monitor both the host and port 3389, so you can instantly see when the host is available for remote access. You can also log the output, enable email alerts, there's a fast traceroute utility built-in, and a host flooding utility built-in as well. Check it out!

submitted by /u/RyanSmithLV
[link] [comments]
25 Oct 13:17

Customizing Directory Path in PowerShell Prompt()

by /u/Prateeksingh1590
22 Sep 14:41

How NOT to be a sysadmin.

Disclaimer: The following is from a post from HackForums. I am in no way claiming this to be my own, but it was funny and I thought you guys would enjoy it.

"""

Hey guys,

I recently did a security audit for a small business, and I thought some of you might get a kick out of this story.

I am an IT consultant that specializes in security applications and network security infrastructure, and on the side, I do a handful of penetration tests when they come up, and do a bit of writing here on the forums and elsewhere. A little over a month ago, I was asked by a friend to help him out with a security assessment for a small legal firm that suffered from an attack. I figured it would be a nice but of side-work, and not much else was going on, so I agreed and contacted the owner the same day.

I cannot release explicit details about the company because they still have some security issues to work out, but I'll try to be as detailed as I can. So, this company owns a couple of production servers, one of which maintains their website and a SQL database that contains a long list of case-files. They sell subscriptions to lawyers nationally to access these files for reference material and support for their cases and stuff like that. About 70% of their income, I would say, relies on this server's integrity and availability to their customers.

Essentially what happened was, they hired some outsourced development team from the Ukraine to build the back-end database and create the search-feature so their customers could easily reference those casefiles. The company was slow to pay their bills, and withheld the final payment from the developers until they finished the job. They refused and insisted on payment. The company decided to fire them after their refusal and did not send them their final payment. Instead of finishing their job, the developers decided to break into the production server and shut down the website. The next day, they started wiping files and kicked the server off after deleting the root-level passwords.

By the time I had come into the job, this had already happened three days prior. Basically, they wanted me to do a malware and rootkit removal to guarantee their server was clean and to search for any other threats that they would need to fix later.

Here is where it gets hilarious. Their administrator that they hired to host and secure their production server is a total egotist. What originally was a job to secure a web-production server became a mission to make this guy eat his words.

Here is the timeline of events:

  • The first day the hack occurred, at around 4am, it appeared to be a denial of service attack, according to the administrator by the time everyone woke up.

  • What had actually happened was the attackers logged into the Webserver and deleted the front page. They then shut the server down and knocked off a backup.

  • The administrator finally realized the actual nature of the attack, but did not report it. He claimed that they got into the server by brute forcing the owner's password which was supposedly weak. He claimed to have it under control. He was told to disconnect the server until it could be assessed.

  • The following day, the attackers returned, this time, deleting the entire database, the website, and root passwords. Again, the website was knocked off.

  • The administrator insisted this was not possible. Nevertheless, there it was, a 404 error across the entire site. It was at this point my friend was brought in to investigate.

  • The administrator claimed that the issue must have been caused by weak passwords and blamed the owner, and that there was no other way the attackers could have gotten in becaus hr was a "Security Genius"

  • He also claimed to have hacked into NASA, worked for the FBI to avoid jail time, which was his excuse for having NO certifications to his name other than compTIA A+, and later he claimed that he hosted TripAdvisor...

  • My friend, also a penetration tester, asked me to help him with the audit and to help me prove this guy was a fraud.

When I was told what this guy's "resumé" was, I nearly passed out from laughing so hard.

I asked for sudo-access to the server, which I had to wait two days for while he bitched about the owner hiring me and my friend to "insult his abilities and intelligence." He refused to give access to us, claiming that it would be a security risk. I told him that his server was already compromised and that there was no way he could guarantee it was secure, especially after restoring the last backup they had available (which was 30 days old).

Instead of waiting for him to quit dragging his feet, we took the initiative and did some initial assessments. Port scans, vulnerability scans, and so on. We found numerous vulnerabilities attached to the website, courtesy of Nikto, including numerous HTML injection and SQL injection vulnerabilities, and at least one instance of an XSS javascript vulnerability. That was not the worst part... the Webserver was running it's http services on Apache Coyote v1.0. We later discovered that the web service had never been updated. This still isn't the worst part...

After the admin reluctantly delivered the password, and I waited two hours for him to give me the fucking IP address so I could actually SSH into the damn thing, I found even more rediculousness.

The ROOT password was a permutation of the company's name... increadibly fucking easy to guess. If I had to compare it to a similar password, it would be like me making my password: "trueDEM0N" except it only had 8 characters...

The last password change for the root password matched the day of the server's OS installation. I was pretty pissed, but I went on silent until I did a full assessment of the server.

It gets worse than this...

I originally did what I was told. Run a virus scan, search for any rootkits or backdoors, and go from there. I was shocked to find that there was not one, single instance of a backdoor or malicious code anywhere on the system...especially considering what else I did not find...

There was no Antivirus software installed on the system. I also found no host-side firewall, which would explain why my Nmap scans were not bounced when I ran a full TCP connect scan...

For shit and giggles, I decided to brute force the password that was given to the developers along with the four other user-level accounts. I was hopeful because I noticed that he had hashed the shadow passwords in SHA-512, and even salted them.

I tried Hydra first, just to see if it was possible to crack the password remotely. It connected and had utterly no problem letting me hammer away at the server's passwords. The administrator never even knew I was attacking the passwords remotely, whicheck told me there was no network IDS.

I even downloaded the passwd and shadow file with scp without any complaint from the server. No file restriction whatsoever... it didnt even so much as demand I re-enter the password, throw a warning banner, or anything.

I used Hashcat to attack the passwords with a full keyspace bruteforce attack. I let it run on my shitty laptop overnight and into the afternoon the next day while I was at work. It resolved every single password by the end of those 16 hours. Bear in mind...thus was a Phenom II quad-core 1.8ghz processor running Intel graphics... and it only took 16 hours...

But it gets even worse...

The developers' password had not been changed since the day it was created...had sudoer access...and was an exact match of the root password...along with two of the other usernames. Essentially, he gave the developers their own username, using the same password as the root.

I called the owner immediately to tell her my findings, and came to find out that this administrator had charged their credit card for "overtime" that he spent responding to the hack that was his fault in the first place. He claimed that it was his job to host the server. Any time spent doing backup/recovery, malware removal, and security response was considered "extra work." He followed up by blaming them for not having an off-site backup solution in place and told them that it was not his job to recommend or provide backup solutions. He further insisted that they would never find anyone who could use node.js and manage a linux server, and proceeded to insinuate that neither of us knew what we were doing.

At this point, I lost my shit.

I took copies of every log on that system and phoned the owner and her staff and conference called them to deliver my initial report. The owner was furious, to say the least, and I was graciously given the satisfaction to call the administrator out in front of everyone over the phone. I even sent them the Whois report on trip advisor to prove he was completely full of shit. They are entirely self-hosted...not that we couldn't already guess that. Not only was he fired, but they are currently trying to find a way to file charges against him for fraud and negligence.

Unfortunately, they never signed an official contract with him, so the terms of their agreement were never determined. They have since migrated their server to another domain host and are still reeling from the damage done to their company and reputation. The administrator has been, essentially, publicly shamed, at the very least, and to my knowledge is going to be losing a lot of business. I doubt he will ever work as anything more than a Level 1 help desk peon for the rest of his life...if that.

I laugh because the guy was totally full of shit, but I feel just awful for the poor sicker he scammed. The best I could do for them was heavily discount their assessment since it literally took me less than a day of actove work-time to give a full assessment.

For the sake of the administrator and the company's anonymity, I will not be revealing either of their identities. To do so would be professional and I would like to thank the user "Donalen" for having the courage to call me out on my unprofessionalism for even entertaining that thought.What I can tell you is that, it came out that his servers were located in an outdoor barn, that he has no record of working for the government, has never worked for the FBI, and his only instance of being a "hacker" was when he was prosecuted for defacing a website.

If my partner, who I'd like to thank for bringing me in on this job, wishes to reveal himself, feel free, dude. Take a bow.

I hope you guys enjoyed the story as much as I enjoyed this job, despite everything that came out of it. It really reminded me of how important it is to verify certifications. This has definitely been my "worst case scenario" of the year.

To you server hosts and web developers out there, don't be that guy. And to you site/business owners, always perform solid background checks and certification verification. It results in far less heartache for everybody.

Thanks for reading everybody.

"""

submitted by cquick97
[link] [370 comments]
29 May 16:14

Bones and Barbed Wire.

by Nick Bullock

 [James McHaffie at Dorys in the days he took a bottle of beer to the crag.] 

Bobok. 2004

Walking with James McHaffie along the top of Craig Dorys having once again left behind the dark quarried slate piled high above Llanberis and the rain in the cloudy mountains, the arid atmosphere of The Lleyn feels like illusion. But look out, over the large water worn boulders that balance on the tessellated rock-shelf, look out to the sea and the natural beauty and immediately you appreciate this is no illusion, this is real, this is now and of this time, of ‘your’ time… and the waves lapping the dark mosaic rock-shelf mark that time until the next wave moves in and washes your thoughts to sea and the clock moves forward once more.

Like many crags in North Wales, Craig Dorys is tempered by the mark of humans. Caff and I walked to the end of the buttress and down the steep track which sliced the steep hill. Feet crunched on small pieces of rock littering the hillside. The winter wind had easily persuaded the rock to leave the crag. Splintered bracken stalks blocked the track like barriers. Shins broke through the dry thatch. Dust billowed. Tumbleweed bundles of barbed wire poked from the bracken. Fronds of newly sprouting fern unfurled between old wooden fence posts and plastic sheeting and rotting animal carcass. The detritus of farming was scattered on the approach but I didn’t find the rubbish offensive, it reminded me of the area I grew up. I liked the juxtaposition between the beauty of nature and the effect of humans. I flicked a bleached sheep rib with the toe of my shoe. The blood had long gone.                 

I had climbed with Caff on and off for a summer or two but I had not zoned in to his dark side. I think I would be safe in saying not many people do as his demeanour and look – small round glasses, dark unruly hair, pale skin, reasonably short in stature and reserved – give the impression of school boy innocence. But to become one of the worlds most successful traditional rock climbers, repeatedly placing yourself in a position of danger while climbing in very good style takes serious dedication, mental fortitude, drive, self-belief, commitment and sometimes a dark side, a side with voices – voices that continually question and taunt and only dim after personal challenge. Where rock climbing is concerned I do not put myself in the same category as James McHaffie, not even the same planet, but I know about the voices and I recognise a person who occasionally has internal dialogue.

Bobok is a short story by Fyodor Dostoevsky, ‘the chant of the dead people’ is how the story is described in the Climbers Club guidebook to the Lleyn Peninsular. Bobok would not be my recommendation for your first route on The Lleyn Peninsular. Bobok would not be a recommendation at all.

Caff pointed at what we were to climb. I looked up. The overhanging wall was a semi-circular scoop veined with orange and quartz.

 ”We are going to climb honeycombed chocolate?” I said followed by nervous laughter.

Caff dumped his bag in the dirt, pulled a packet of tobacco from his jacket pocket and rolled a small cigarette. Dabbing the cigarette with his tongue he looked up, “You’ll be fine Nick, it’s only E5, which pitch do you want?”   

The route consisted of two pitches, the first was seventy feet given a technical grade of 5c, the second was more difficult being 6a but slightly shorter at fifty feet. The guidebook description mentioned ‘chicken heads’ and ‘sneaking’ for the first pitch and ‘quartz snappies’ and biscuit footholds for the second pitch. I was tempted to say I wanted neither pitch but I knew this would not work, so eventually after much soul searching I opted for the technically easier first pitch, ‘sneaking’ after all was much more my style and sounded preferable to ‘snappies.’ Caff was by far a better rock climber than me anyway and this route had been his suggestion.

Stepping from ground took four attempts. The rock was like nothing I had ever climbed and the amount of gear clipped to my harness was holding me down. I eased once again from the ground pulling a vein of orange coloured munge, which I soon discovered was the rock type and the colour to aim. Caff, wearing long black shorts, wallowed in the dirt to my right smoking his second tab, sniggering like a schoolboy. He read from the guidebook,

“It says here, in the first ascents section by Ray Kay that the chocolate fudge colour works well for taking weight.”

What Caff chose not to read out loud was Ray Kay, master of all things lose, then went on to say he had had many ground up attempts to climb Bobok and had found the experience very very scary. He also chose not to read out the paragraph below this one which was written by Stevie Haston who had attempted to climb the line before Kay and Jones had made the first ascent. In this paragraph Haston described lowering off five equalised pieces of gear and on reaching the ground flicking them all out.

I climbed, wracked with paranoia. I had placed more gear than ever before in such a short distance. The rock – orange, white, brown, black – was laced with multi-coloured metal – nuts, cams, hooks – jewels of safety which offered no safety at all. And with so much gear I felt the pressure to continue. At around the two hour on the lead point I had climbed thirty feet, maybe less. I inched left and sat on top of a decomposing pillar afraid the whole pillar would tumble. I lowered a loop of rope and Caff clipped a second rack of gear onto the loop.

Sitting still on my pillar, eying a crumbling crack, I imagined filling it full of gear and wrapping the rope around me like some Victorian climber and saying to Caff twenty, or thirty feet below, ‘on belay.’

“I’m sure this is the belay. It would make a great belay. Shall I belay?”

Caff had a pee, sat down, looked up at me, and rolled another cigarette. “Just another forty feet or so to go Nick, you’re doing great, I reckon you have probably got higher than what Leo Houlding did before he fell off and hit the ground.”

I sat on the wobbly pillar clipping gear to my harness looking down at Caff with horror.

“What else are you not telling me about this climb Caff?”

“If we climb it today it will be the third ascent.”

“Quite telling that given it’s E5 and was first climbed in 1988. Who climbed the second ascent?”

“Will Perrin and Ben Bransby.”

Perrin and Bransby were great rock climbers and very good at ‘specialised’ territory. I looked up at the remaining ground and it looked a long way.

Box of Blood 2014.

Here I was, ten years later and here I was ten years older and here I was sat on the same decomposing pillar wondering why? Boboks quartz seams cutting through the mud and fudge were to my right. The years had changed my opinion a little, but the fear induced by this crumbling cliff was still there. This time instead of Caff, Will Sim, another very talented individual belayed and the same as before, thoughts of being sub-standard compared to the other person holding my ropes ran through me.

This would be my second attempt to successfully climb Box of Blood and plant a flag on Dorys summit and this time I would milk the rests. Will wallowed in the muck the same as Caff had wallowed. Bet he wished he rolled his own I thought…

*

Box of Blood summary and further info here

 

[Myself entering into the overhanging and run out on Box of Blood... Pic credit, Ray  Wood]

[Will Sim in a similar position to that of most of my friends who belay me. Note to self, must get better, quicker, bolder.]
[Will Sim combating the fear and launching onto the orange balsa wood on Box of Blood. to make a great flash ascent.]