8 Followers
57 Following
38 Posts
Working in the cybersec industry, also enjoy making and breaking stuff in my spare time. Might post very random stuff, you've been warned.
Languages🇬🇧 🇩🇪

Dank des fantastischen @c3voc können wir nun (per Info via @c3voc_releases ) die Talks vom #38c3 auf media.ccc.de nachschauen.

Die Bandbreite ist etwas eingeschränkt, aber es gibt folgende #Mirrors zur Entlastung der #Infrastruktur:

https://ftp.fau.de/cdn.media.ccc.de/congress/2024/ (nicht wir :D, wir sind unter https://fau.org erreichbar)
https://ftp.uni-erlangen.de/cdn.media.ccc.de/congress/2024/h264-hd/
https://ftp.halifax.rwth-aachen.de/ccc/congress/2024/h264-hd/
https://dortmund.media.ccc.de/
http://ftp.ccc.de/congress/2024/

aus der (teilweise veralteten) Dokumentation: https://c3voc.de/wiki/media.ccc.de

Index of /cdn.media.ccc.de/congress/2024

NFS has not received much attention of the offensive security community in nearly a decade. This changes today, and we are happy to share our research on the topic: https://www.hvs-consulting.de/en/nfs-security-identifying-and-exploiting-misconfigurations/. I'll give you a short overview:
- For architectural reasons, the default configuration of the Linux NFS server allows you to access all data on a file system, even if only a subdirectory is exported. This means that you can for example read /etc/shadow on Debian and SUSE based systems if another directory on the same file system is exported via NFS
- It is not a big secret that, unless Kerberos is configured, you can simply fake UIDs and GIDs to access data belonging to other users on a NFS export. We bring this to the next level by releasing a fuse driver that does this automatically, alongside with capabilities to escape exports for full file system access.
- We developed another tool that allows you to identify vulnerable NFS servers easily

Check out the blog post for all the details. You can find our tooling on Github: https://github.com/hvs-consulting/nfs-security-tooling
We also publish all our internal research notes in the Github Wiki, so if you are interested to dig deeper into NFS, this is definitely the place to get started!

We want to thank @hxp for bringing this to broader attention by hosting a NFS challenge at #38c3 CTF. Also, big thanks to @skelsec for his awesome libraries and tools, in this case especially for anfs.
#pentest #redteam

NFS Security: Identifying and Exploiting Misconfigurations

Understand security features, misconfigurations and technical attacks on NFS shares. Explore tools to analyze NFS endpoints and abuse misconfigurations.

The severe lack of googly eyes is highly disturbing #38c3
Finally achieved my dream at #38c3 of becoming a full stack developer
Merch wait time < 300s #38c3
Air quality in certain areas seems significantly worse than last year #38c3
Forgetful and desperate parent here: Anyone coming to #38c3 who happens to be able to share (obviously not for free) a USB-C power delivery board capable of providing 9V and a barrel plug cable suitable for a Toniebox? Would like to botch together an emergency Toniebox-Charger.

Before we disappear into hibernation for the inter-congress period, we want to present a few numbers from #37C3:

There were a total of 4971 angels this time around. 3986 of them have been marked as arrived and 2753 have worked.

In total, 58.265 hours of work have been recorded in the Engelsystem, that's more than 6 years.

The angelshirt team has handed out 1693 shirts. 107 questions have been answered via "Ask the Heaven" and we have worked on 305 tickets and 110 Kanban tasks.

Finally found a use for the #37c3 chaostokens

Pretty cool #blackhat2023 talk about messing with log files using ANSI escape characters

https://youtu.be/opW_Q7jvSbc?si=qhRSNeoeIN1xPBWU

Weaponizing Plain Text: ANSI Escape Sequences as a Forensic Nightmare

YouTube