282 Followers
189 Following
61 Posts
Security conceptualist and friendly foe.

PyLadiesCon is in one week!!

We have almost 500 registered attendees 🥳 Not bad for a first time conference, eh? 🤩

Well, you can still join us! Register and be part of this important event for the global PyLadies community.

Follow these steps:
1. Check our website and schedule
2. Click the big register button (it's free)
3. (Optional) Support us by sponsoring or making donation during registration

https://conference.pyladies.com/schedule.html

#PyLadiesCon #PyLadies #Conference #Python #Community @pyladiescon

PyLadiesCon 2023 - Schedule

Schedule PyLadiesCon.

If someone recommends an account to follow and it looks blank to you, it probably isn't actually blank! It probably just looks that way when you view it from your server.

If you follow the account, future posts will start showing up on your server.

It is confusing, but there are really good reasons why it happens. You can read more about it (including how to check what a profile really looks like, and how to prevent your own profile looking blank) here:

➡️ https://fedi.tips/why-does-someones-account-page-look-completely-blank-is-it-really-blank/

#FediTips

Why does someone’s account page look completely blank? Is it really blank? | Fedi.Tips – An Unofficial Guide to Mastodon and the Fediverse

An unofficial guide to using Mastodon and the Fediverse

Renowned security researcher John Hammond of Huntress helped kick off our #DEFCON “Art of Hacking” livestream. Watch the recording of his interview with hosts Tom Eston and Lindsay Von Tish where he chats about various topics ranging from #malware analysis to coping with #burnout. #BFLive

https://bfx.social/49jssVs

Bishop Fox Interview with John Hammond - DEF CON 31

In this session, hear from John Hammond who is a cybersecurity researcher, educator and content creator.

Bishop Fox

New, by me and @jagmeets13: A new Android security feature now scans sideloaded apps in real-time for malware.

The feature first launched in India, with plans to expand internationally.

TechCrunch tried the feature out for ourselves by loading a phone with a variety of malicious and bad apps to see what would install.

Google Play Protect blocked nearly all of the malicious apps, but a handful of recently created predatory loan apps made it through.

More: https://techcrunch.com/2023/11/04/google-play-android-real-time-app-scanning-sideload-apps/

TechCrunch is part of the Yahoo family of brands

Asynchronous Programming - Rust for C#/.NET Developers

Randomly scheduled reminder: 1Password is free for journalists and open source projects.

Journalists: https://1password.com/for-journalism/
OSS Projects: https://github.com/1Password/1password-teams-open-source

1Password for Journalism | 1Password

We believe in a free press and an open Internet. For Journalists working hard towards this goal, we want to provide the tools needed to stay safe online.

1Password
The @VeilidNetwork code and website are live!! https://veilid.com/
Veilid

Veilid is an open-source, distributed application framework.

Veilid

"Surprisingly, by chaining four common side effects of shared libraries from official distribution packages, we were able to transform this very limited primitive (the dlopen() and dlclose() of shared libraries from
/usr/lib*) into a reliable, one-shot remote code execution in ssh-agent (despite ASLR, PIE, and NX)."

Qualys continues to deliver, wow! #CVE-2023-38408

https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt

Many of you have been asking for my thoughts on the #LastPass breach, and I apologize that I'm a couple days late delivering.

Apart from all of the other commentary out there, here's what you need to know from a #password cracker's perspective!

Your vault is encrypted with #AES256 using a key that is derived from your master password, which is hashed using a minimum of 100,100 rounds of PBKDF2-HMAC-SHA256 (can be configured to use more rounds, but most people don't). #PBKDF2 is the minimum acceptable standard in key derivation functions (KDFs); it is compute-hard only and fits entirely within registers, so it is highly amenable to acceleration. However, it is the only #KDF that is FIPS/NIST approved, so it's the best (or only) KDF available to many applications. So while there are LOTS of things wrong with LastPass, key derivation isn't necessarily one of them.

Using #Hashcat with the top-of-the-line RTX 4090, you can crack PBKDF2-HMAC-SHA256 with 100,100 rounds at about 88 KH/s. At this speed an attacker could test ~7.6 billion passwords per day, which may sound like a lot, but it really isn't. By comparison, the same GPU can test Windows NT hashes at a rate of 288.5 GH/s, or ~25 quadrillion passwords per day. So while LastPass's hashing is nearly two orders of magnitude faster than the < 10 KH/s that I recommend, it's still more than 3 million times slower than cracking Windows/Active Directory passwords. In practice, it would take you about 3.25 hours to run through rockyou.txt + best64.rule, and a little under two months to exhaust rockyou.txt + rockyou-30000.rule.

Keep in mind these are the speeds for cracking a single vault; for an attacker to achieve this speed, they would have to single out your vault and dedicate their resources to cracking only your vault. If they're trying 1,000 vaults simultaneously, the speed would drop to just 88 H/s. With 1 million vaults, the speed drops to an abysmal 0.088 H/s, or 11.4 seconds to test just one password. Practically speaking, what this means is the attackers will target four groups of users:

1. users for which they have previously-compromised passwords (password reuse, credential stuffing)
2. users with laughably weak master passwords (think top20k)
3. users they can phish
4. high value targets (celebs, .gov, .mil, fortune 100)

If you are not in this list / you don't get phished, then it is highly unlikely your vault will be targeted. And due to the fairly expensive KDF, even passwords of moderate complexity should be safe.

I've seen several people recommend changing your master password as a mitigation for this breach. While changing your master password will help mitigate future breaches should you continue to use LastPass (you shouldn't), it does literally nothing to mitigate this current breach. The attacker has your vault, which was encrypted using a key derived from your master password. That's done, that's in the past. Changing your password will re-encrypt your vault with the new password, but of course it won't re-encrypt the copy of the vault the attacker has with your new password. That would be impossible unless you somehow had access to the attacker's copy of the vault, which if you do, please let me know?

A proper mitigation would be to migrate to #Bitwarden or #1Password, change the passwords for each of your accounts as you migrate over, and also review the MFA status of each of your accounts as well. The perfect way to spend your holiday vacation! Start the new year fresh with proper password hygiene.

For more password insights like this, give me a follow!