Gig05 Pen Test War Stories Why my job is so easy and how you can make it harder Aaron Herndon

  Рет қаралды 106,945

Adrian Crenshaw

Adrian Crenshaw

Күн бұрын

Пікірлер: 84
@jacobebrock
@jacobebrock 5 жыл бұрын
Best security talk I've watched in a LOOOONNNGGG time.
@andremilanimartin3338
@andremilanimartin3338 4 жыл бұрын
"pls make my job harder its too easy im boooooored"
@pencir5737
@pencir5737 5 жыл бұрын
I watch all my videos at 1.5x Not this dude though.
@cybercat1531
@cybercat1531 5 жыл бұрын
He already speaks at 1.5X rate
@tag180rotax
@tag180rotax 4 жыл бұрын
I watched at 1.75 lol
@simplified_101
@simplified_101 4 жыл бұрын
i am watching it 0.75x. issues of non english 🙄
@ferret7508
@ferret7508 4 жыл бұрын
@@simplified_101 Iranian hacker moment
@aaronherndon5445
@aaronherndon5445 3 жыл бұрын
Yeah, was my first talk at an infosec conference.. was a little nervous, definitely talked way too fast. Though I also had a lot of content to cram into my given talk window.
@HouseJunk1e
@HouseJunk1e 5 жыл бұрын
I can listen to you talk all day! super well spoken and entertaining. thank you!!!
@morgulbrut
@morgulbrut 5 жыл бұрын
Holy fuck, that's probably the first video on youtube I had to set to 75%. that dude had way too much Club Mate in the morning.
@v4rial921
@v4rial921 5 жыл бұрын
you know what, ill be the first to admit i have no idea about hacking. i dont what the hell Metasploit is, i had to look up what a shell was, and by golly what the fuck is a hash. But ill also be the first to admit that i can enjoy as least slightly humorous defcon talks anyway. Its interesting, even if i dont get it, and this guy did this pretty well!
@hyronharrison8127
@hyronharrison8127 5 жыл бұрын
If you want to understand keep attending talks; keep looking things up - the key to gaining knowledge in this field is exposure!
@Jrez
@Jrez 5 жыл бұрын
So Hunter2 is not a good password?
@JustPlainRob
@JustPlainRob 5 жыл бұрын
You can't just use ******* as a password. Some don't let you use asterisks and it's just all the same character.
@Handlessuck1
@Handlessuck1 5 жыл бұрын
Hunter221
@ShawnRomines
@ShawnRomines 4 жыл бұрын
Very good presentation. Good advice.
@freman
@freman 5 жыл бұрын
AES is a symmetric algorithm, so it does not have public and private keys - only a shared secret
@AdolphusOfBlood
@AdolphusOfBlood 5 жыл бұрын
It's not a secret, it's a NSA backdoor key.
@morshlop
@morshlop 5 жыл бұрын
@@AdolphusOfBlood ok thanks for that valuable information
@AdolphusOfBlood
@AdolphusOfBlood 5 жыл бұрын
@@morshlop The NSA has asked them to keep security flaws unpatched before for their own use, only to have hackers use them before. The NSA's tools have been leaked before as well. It should not shock you or anyone else. The NSA also has a back door into HTTPS. So frankly, never be shocked the NSA does this. They do it as they can get away with it, that's why open source software is key, you can't internally make this an issue with open source software.
@montanawestphotography6671
@montanawestphotography6671 4 жыл бұрын
This is the best advertisement for Linux.
@PaulieShortcuts
@PaulieShortcuts 3 жыл бұрын
WOW! Good video. I had Summer2017 as a password for at least 2 years lol
@valehero3140
@valehero3140 4 жыл бұрын
Bro you are crazy. Its not possible to make a secure system when you are around.. LOL :D This is 1 of the best security talks I have seen! Keep on good work :)
@dafoex
@dafoex 5 жыл бұрын
KZbin: community guidelines update, you can't teach people hacking! Also KZbin: advert for ethical hacking courses before this video
@MrTywheezy
@MrTywheezy 4 жыл бұрын
🤣🤣🤣
@scrambledag6577
@scrambledag6577 5 жыл бұрын
is this ntlm vulnerability still a thing?
@revenevan11
@revenevan11 Жыл бұрын
25:11 Great point that the principle of least privilege should go both ways. I think thats less obvious to many people. The DA account shouldn't sign in on a bunch of workstations and risk compromising the keys to the kingdom.
@Anonymouspock
@Anonymouspock 5 жыл бұрын
Disabling PowerShell is not a security control! If anything it makes it hard to do legitimate administration and prevents advanced users from automating their own jobs. Restricted language mode (though terrible for many reasons) helps. Also try the new Microsoft thing that detects malicious looking PowerShell and blocks it, as well as logging every PowerShell command run.
@jasonfletcher1638
@jasonfletcher1638 5 жыл бұрын
If only more people would actually understand this, I setup a network not that long ago for a company where we started going down that path of disabling powershell and command prompt. The problem with disabling this stuff is that 1, it make your life harder as an administrator. 2, the general user doesnt even try to use it (they probably dont even know its there). 3, regardless if it is disabled or not an attacker is always going to find away around it. There are so many ways in windows to get access to a command prompt or power shell even if it is disabled.
@bene5431
@bene5431 5 жыл бұрын
@@jasonfletcher1638 can confirm, in school we had a 5 line bat file that did exactly the same as cmd except the Copyright Information
@bene5431
@bene5431 5 жыл бұрын
Today I learned that Google is still a homegrown Website
@kek_9
@kek_9 5 жыл бұрын
i still got email acc with 3 small letters in password... it's ~20y old account, and i have there collection of all ads since 2007 - 70k ads :) what can i do with that? 😂
@MrAntiKnowledge
@MrAntiKnowledge 5 жыл бұрын
Seriously. If you respond to wrong login credentials with anything that gives more information than just "invalid credentials" you're an idiot. Not responding in the same time for valid and invalid usernames is equally bad, but can be forgiven as it's a less obvious security hole (you should still try to fix it ofc).
@JustTechGuyThings
@JustTechGuyThings 5 жыл бұрын
My biggest peeve are signup forms that say the username is taken... fuck that noise... send them a 'We've created your account (if it was valid), check your email'
@JasperJanssen
@JasperJanssen 5 жыл бұрын
WriteCodeEveryday so your failure mode is not to tell the user trying to create an account anything about why, you just don’t send them an email? Lol. Try growing *that* online service.
@MrAntiKnowledge
@MrAntiKnowledge 5 жыл бұрын
[deleted] I shouldnt respond while still half asleep
@roguishpaladin
@roguishpaladin 5 жыл бұрын
I disagree to the "idiot" part. There is a user friendliness aspect to be taken into account here. Now, in the case of a company and access to its intranet, I would agree - they should know their format and if they don't they should abase themselves adequately to the IT admin to get the correct information. When dealing with an enterprise-level application, though, you have to distinguish between password failure and username failure. A person might not have logged into the service for a while, after all, so they might have a few different possible usernames they could have used. Opaque failures in this case is just going to generate frustration with your service as well as a lot of customer service traffic - basically, it will cost the company money. The real goal here should be to maximizing the user experience while minimizing the security risk.
@JasperJanssen
@JasperJanssen 5 жыл бұрын
roguishpaladin and for services that are general public facing on the internet - your gmails, dropboxes, etc... - not telling people that their preferred username is taken during account creation is pretty idiotic.
@HenryLoenwind
@HenryLoenwind 5 жыл бұрын
"local subnet"? When will companies finally notice that workstations don't need to talk to each other? Actually, nobody needs to initiate a connection to a workstation. Same in a server network---it is a bit time consuming but very easy to find out which server needs to connect to which server on which port. Why do people still put all that stuff in free-for-all subnets? And even worse, why are there still public-facing servers that can connect to the internet? All that stuff makes it so much easier for attackers...
@rolfs2165
@rolfs2165 5 жыл бұрын
>public-facing servers that can connect to the internet Uuh ... isn't that the whole point of them?
@HenryLoenwind
@HenryLoenwind 5 жыл бұрын
@@rolfs2165 Let me phrase that a bit simpler: A web server should answer requests, not surf on P*hub itself.
@VortechBand
@VortechBand 5 жыл бұрын
Replace passwords with a combination of facial feature scanner + fingerprint scanner. And all connection requests to production services require approval by a coworker.
@AdolphusOfBlood
@AdolphusOfBlood 5 жыл бұрын
Lol, it's not like those can be faked with ease or anything.
@rkane31174b
@rkane31174b 5 жыл бұрын
We've detected possible unauthorized access to your account. Please change your fingers as soon as possible. For security reasons, we recommend changing your biometrics every 120 days and not using the same physical body on multiple services.
@blankblank9042
@blankblank9042 5 жыл бұрын
On password spraying: Isn't this similar to a "flood attack". Couldn't the software sense it's being probed from a single IP, or a set of IPs, and simply refuse connection or response after "x" number of attempts? Seems like an easy way to prevent the hack. He's saying numbers like "10,000" (attempts). I'd think after the 5th attempt, the software could figure out this isn't some legitimate user that simply forgot their password and/or username.
@johncameron1935
@johncameron1935 5 жыл бұрын
Bear in mind when this video was released, when this talk happened. Security continues improving some two years after the fact.
@buzzkrieger3913
@buzzkrieger3913 5 жыл бұрын
Except I was locking out sprays a decade ago. This video is full of weak sauce "exploits" against VERY poorly setup security. There are multiple off-the-shelf solutions that shut him down with default settings.
@kanucks9
@kanucks9 5 жыл бұрын
@@buzzkrieger3913 he mentions this in the talk. Two things, 1. Botnets, 2. Testing for this on VPNs and attacking unsecured points preferentially.
@michaelrichter6911
@michaelrichter6911 5 жыл бұрын
@@buzzkrieger3913 The video is titled "why my job is so easy". It's about very simple exploits that he still constantly sees.
@ryansaadat9095
@ryansaadat9095 5 жыл бұрын
@@buzzkrieger3913 thats the entire point of this talk
@justingauche6475
@justingauche6475 5 жыл бұрын
Wtf was that ad I just saw.
@JasperJanssen
@JasperJanssen 5 жыл бұрын
Boxcarcifer you’re still using non-mobile devices? How out of touch you are.
@JasperJanssen
@JasperJanssen 5 жыл бұрын
Boxcarcifer sorry, no. Haven’t been outside Europe since 2002. But both my names are pretty common in NL, so I’m very much not the only one out there.
@TheLukemcdaniel
@TheLukemcdaniel 5 жыл бұрын
This is a case study on why not to use Windows...
@chaosmagican
@chaosmagican 5 жыл бұрын
Which is why quite a few companies ban the use of it unless it's required. Google for example.
@setnaffa
@setnaffa 5 жыл бұрын
If you think lazy security habits only affect M$, I've got a bridge I can let you have for cheap...
@TheLukemcdaniel
@TheLukemcdaniel 5 жыл бұрын
@@setnaffa No, but Microsoft encourages it.
@setnaffa
@setnaffa 5 жыл бұрын
@@TheLukemcdaniel Shockwave? Heartbleed? D-Link? There are too many CVEs to list...
@Frater1Perdurabo
@Frater1Perdurabo 5 жыл бұрын
17+76+30 != (n = 124)...
@MobCat_
@MobCat_ 5 жыл бұрын
6:25 That moment where with about 10 seconds of googling i just found the same doc... Still online.. Nothing has changed... i.imgur.com/26G8e45.png
@amyx231
@amyx231 4 жыл бұрын
FoxJumpLogWinter20192020
@LostArchivist
@LostArchivist 5 жыл бұрын
Admin
48 Dirty Little Secrets Cryptographers Don’t Want You To Know
50:58
Симбу закрыли дома?! 🔒 #симба #симбочка #арти
00:41
Симбочка Пимпочка
Рет қаралды 4,9 МЛН
快乐总是短暂的!😂 #搞笑夫妻 #爱美食爱生活 #搞笑达人
00:14
朱大帅and依美姐
Рет қаралды 13 МЛН
How To Choose Mac N Cheese Date Night.. 🧀
00:58
Jojo Sim
Рет қаралды 95 МЛН
DEF CON 32 - The Darkest Side of Bug Bounty - Jason Haddix
32:30
DEFCONConference
Рет қаралды 46 М.
Hacktivity 2012 - Joe McCray - Big Bang Theory - Pentesting high security environments
50:53
Hacktivity - IT Security Festival
Рет қаралды 194 М.
GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs
51:00
Black Hat
Рет қаралды 309 М.
How the Best Hackers Learn Their Craft
42:46
RSA Conference
Рет қаралды 2,6 МЛН
Introduction to Firmware Reversing
11:32
Tony Gambacorta
Рет қаралды 311 М.
Samy Kamkar's Crash Course in How to Be a Hardware Hacker
28:07
How to Bypass RFID Badge Readers (w/ Deviant Ollam and Babak Javadi)
16:45
The Modern Rogue
Рет қаралды 1,1 МЛН
My "Handle Most Things" Tool Bag
12:27
DeviantOllam
Рет қаралды 445 М.
CounterSurveil Podcast: WisQuas Founder
1:20:38
Adrian Crenshaw
Рет қаралды 270
Симбу закрыли дома?! 🔒 #симба #симбочка #арти
00:41
Симбочка Пимпочка
Рет қаралды 4,9 МЛН