ncc-erik | 4 years ago | on: Factorization of RSA-250 (2020)
ncc-erik's comments
ncc-erik | 4 years ago | on: Factorization of RSA-250 (2020)
>>> 64135289477071580278790190170577389084825014742943447208116859632024532344630238623598752668347708737661925585694639798853367*33372027594978156556226010605355114227940760344767554666784520987023841729210037080257448673296881877565718986258036932062711 == 2140324650240744961264423072839333563008614715144755017797754920881418023447140136643345519095804679610992851872470914587687396261921557363047454770520805119056493106687691590019759405693457452230589325976697471681738069364894699871578494975937497937
Truencc-erik | 4 years ago | on: Graphviz: Open-source graph visualization software
ncc-erik | 4 years ago | on: Don’t try to sanitize input, escape output (2020)
There are some frameworks that try using types to solve the problem. Alternatively, the developers could throw in a comment that looks something like:
// client == submits raw data ==> web_server == inserts raw data (param. sql stmt) ==> db_server ==> returns query with raw data ==> our_function == returns html-escaped data ==> client
ncc-erik | 4 years ago | on: Ask HN: Are Cybersecurity Workers Ok?
Reminder that this exists: https://paulbellamy.com/vulnerability-name-generator
ncc-erik | 4 years ago | on: Log4Shell Log4j vulnerability (CVE-2021-44228) – cheat-sheet reference guide
ncc-erik | 4 years ago | on: Security issue related to the NPM registry
ncc-erik | 4 years ago | on: The decline of unfettered research (1995)
And for other practical applications related to this idea: https://aws.amazon.com/snowmobile/
ncc-erik | 4 years ago | on: ‘Trojan Source’ Bug Threatens the Security of All Code
ncc-erik | 4 years ago | on: How to win at CORS
As a pentester, I always get excited when I see ACAO or an OPTIONS request in my proxy logs. It's still really hard to wrangle and get right.
ncc-erik | 4 years ago | on: Wonk is a tool for combining a set of AWS policy files into smaller sets
Do you currently, or plan to, handle Condition constraints? Also, how does wonk handle combinations with statements that have the Deny effect?
ncc-erik | 4 years ago | on: Functools – The Power of Higher-Order Functions in Python
ncc-erik | 4 years ago | on: Analytics suggest 96% of users leave app tracking disabled in iOS 14.5
ncc-erik | 5 years ago | on: Show HN: Principal Mapper v1.1.0 – AWS IAM Security Analysis
ncc-erik | 5 years ago | on: Show HN: Principal Mapper v1.1.0 – AWS IAM Security Analysis
Principal Mapper is a tool + library for analyzing and securing your AWS IAM configuration. It generates a model of your account and/or organization and uses it to give you a better idea of the effective permissions of your IAM Users and Roles. It has privilege escalation detection built-in and is hopefully written in a way that will let you extend it for your use-cases.
This v1.1.0 update covers more types of policies (resource policies, permission boundaries, session policies, SCPs), supports AWS Organizations, enables cross-account checks, and more!
https://github.com/nccgroup/PMapper
https://research.nccgroup.com/2021/03/29/tool-release-princi...
Happy to answer any questions you have here!
ncc-erik | 5 years ago | on: IAM whatever you say IAM
ncc-erik | 5 years ago | on: ScoutSuite: Multi-cloud security auditing tool
It does one thing very well: quickly grabbing a snapshot of the security posture of a public cloud account's resources with little fuss. It's an ideal solution as an outsider looking in at someone's account. But, I wouldn't use it as-is for other needs (say, those of in-house security folks) like continuous monitoring. That would be like using a Polaroid camera to create a movie.
ncc-erik | 6 years ago | on: We tested popular web hosting companies and all were easily hacked
It's usually a lot easier to write the PoC with fetch() though.