ncc-erik's comments

ncc-erik | 4 years ago | on: Factorization of RSA-250 (2020)

My measurement was imprecise and that probably throws things off:

    python -m timeit '64135289477071580278790190170577389084825014742943447208116859632024532344630238623598752668347708737661925585694639798853367*33372027594978156556226010605355114227940760344767554666784520987023841729210037080257448673296881877565718986258036932062711 == 2140324650240744961264423072839333563008614715144755017797754920881418023447140136643345519095804679610992851872470914587687396261921557363047454770520805119056493106687691590019759405693457452230589325976697471681738069364894699871578494975937497937'
    500000 loops, best of 5: 496 nsec per loop
So roughly 2 verifications per core-millisecond, ~170 quadrillion ratio?

ncc-erik | 4 years ago | on: Factorization of RSA-250 (2020)

Found in 2700 core-years, verified in < 1 core-second

    >>> 64135289477071580278790190170577389084825014742943447208116859632024532344630238623598752668347708737661925585694639798853367*33372027594978156556226010605355114227940760344767554666784520987023841729210037080257448673296881877565718986258036932062711 == 2140324650240744961264423072839333563008614715144755017797754920881418023447140136643345519095804679610992851872470914587687396261921557363047454770520805119056493106687691590019759405693457452230589325976697471681738069364894699871578494975937497937
    True

ncc-erik | 4 years ago | on: Don’t try to sanitize input, escape output (2020)

I think what makes this hard for folks is tracking what the expected form of data is at each step of its lifecycle, especially considering people working with new and unfamiliar codebases or splitting focus on multiple projects.

There are some frameworks that try using types to solve the problem. Alternatively, the developers could throw in a comment that looks something like:

// client == submits raw data ==> web_server == inserts raw data (param. sql stmt) ==> db_server ==> returns query with raw data ==> our_function == returns html-escaped data ==> client

ncc-erik | 4 years ago | on: Security issue related to the NPM registry

I only imported 10 dependencies, but those 10 dependencies each had 10 dependencies which each had 10 dependencies which each had 10 dependencies and all of the sudden I'm at 10k dependencies again...

ncc-erik | 4 years ago | on: The decline of unfettered research (1995)

I took a networks class during college, and there was a homework question from the textbook about a scenario like this. It had you compare transferring a large amount of data over the Internet versus loading it onto a disk and driving a physical distance to load it onto the other computer. The answer depended on the available bandwidth against the distance to drive.

And for other practical applications related to this idea: https://aws.amazon.com/snowmobile/

ncc-erik | 4 years ago | on: How to win at CORS

Very comprehensive blog, nice work.

As a pentester, I always get excited when I see ACAO or an OPTIONS request in my proxy logs. It's still really hard to wrangle and get right.

ncc-erik | 5 years ago | on: Show HN: Principal Mapper v1.1.0 – AWS IAM Security Analysis

Hi HN!

Principal Mapper is a tool + library for analyzing and securing your AWS IAM configuration. It generates a model of your account and/or organization and uses it to give you a better idea of the effective permissions of your IAM Users and Roles. It has privilege escalation detection built-in and is hopefully written in a way that will let you extend it for your use-cases.

This v1.1.0 update covers more types of policies (resource policies, permission boundaries, session policies, SCPs), supports AWS Organizations, enables cross-account checks, and more!

https://github.com/nccgroup/PMapper

https://research.nccgroup.com/2021/03/29/tool-release-princi...

Happy to answer any questions you have here!

ncc-erik | 5 years ago | on: ScoutSuite: Multi-cloud security auditing tool

Note: I am a current NCC Group employee.

It does one thing very well: quickly grabbing a snapshot of the security posture of a public cloud account's resources with little fuss. It's an ideal solution as an outsider looking in at someone's account. But, I wouldn't use it as-is for other needs (say, those of in-house security folks) like continuous monitoring. That would be like using a Polaroid camera to create a movie.

page 1