handmade.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
handmade.social is for all handmade artisans to create accounts for their Etsy and other handmade business shops.

Server stats:

34
active users

#techtuesday

0 posts0 participants0 posts today
💡𝚂𝗆𝖺𝗋𝗍𝗆𝖺𝗇 𝙰𝗉𝗉𝗌📱<p><a href="https://dotnet.social/tags/TechTuesday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechTuesday</span></a> <br>This <a href="https://dotnet.social/tags/Lemmy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lemmy</span></a> post <a href="https://programming.dev/post/22672085" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">programming.dev/post/22672085</span><span class="invisible"></span></a> links to the recording of the talk I gave earlier in the year, about how <a href="https://dotnet.social/tags/dotNet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dotNet</span></a> <a href="https://dotnet.social/tags/dotNetMAUI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dotNetMAUI</span></a> and other <a href="https://dotnet.social/tags/programmers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programmers</span></a> <a href="https://dotnet.social/tags/developers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>developers</span></a> can get the most out of <a href="https://dotnet.social/tags/Mastodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mastodon</span></a> and the <a href="https://dotnet.social/tags/Fediverse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fediverse</span></a> in general. Show to people you want to come here, or watch yourself if you feel like you could learn more about it.</p><p>CC <span class="h-card" translate="no"><a href="https://macaw.social/@andypiper" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>andypiper</span></a></span> <span class="h-card" translate="no"><a href="https://evanp.me/author/evanprodromou/" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>evanprodromou@evanp.me</span></a></span> <span class="h-card" translate="no"><a href="https://socialwebfoundation.org/author/evanprodromou/" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>evanprodromou@socialwebfoundation.org</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@Gargron" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Gargron</span></a></span> <span class="h-card" translate="no"><a href="https://hachyderm.io/@mapache" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mapache</span></a></span> <span class="h-card" translate="no"><a href="https://hachyderm.io/@alvinashcraft" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>alvinashcraft</span></a></span> <span class="h-card" translate="no"><a href="https://bsky.brid.gy/r/https://bsky.app/profile/alvinashcraft.com" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>alvinashcraft.com</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@jamesmontemagno" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jamesmontemagno</span></a></span></p>
Lutra Security<p>The worst case has happened: Hackers have managed to breach your network and elevate their privileges to their ultimate goal: Domain Admin.</p><p>Today, we will take a look at one of the attacks that this absolute nightmare scenario makes possible for attackers: Golden Tickets (MITRE T1558.001)</p><p>But let’s start at the beginning: Kerberos authentication. When a user logs in, a Ticket Granting Ticket (TGT) is issued to the user. Put very simply, the ticket contains, among other things, the username to identify the user. To prevent users from simply modifying a ticket and impersonating other users, the ticket is encrypted.</p><p>The encryption key that secures the ticket is essentially the password hash of a user called krbtgt. This makes the krbtgt user one of the most sensitive, if not the most sensitive, user in an Active Directory domain. If this user's password is weak or the password (hash) is compromised, the entire domain is compromised.</p><p>This is because attackers can use this password hash to forge their own tickets and impersonate any user they want. They simply create a ticket with the username they want and encrypt it with the password hash. They now have an authentication ticket that, if done correctly, is virtually indistinguishable from a real ticket.</p><p>And that's what’s called a “Golden Ticket”. And there are many tools available to attackers, the most prominent of which are: Mimikatz, Rubeus and Impacket.</p><p>The fact that it abuses legitimate functionality, makes it difficult to detect a Golden Ticket attack. However, there are a few things that you can look out for:</p><p> * Are there TGS requests (Event 4769) without the original TGT being issued by the KDC (Event 4768)?<br> * Is RC4 encryption being used?<br> * Strange TGT parameters (e.g. very long lifetimes)?<br> * Are there logins from sensitive accounts that aren’t normally used (e.g. the default domain administrator account)?</p><p>Additionally, you can also look for signs of Pass the Ticket attacks (MITRE T1550.003).</p><p>To mitigate this attack, the krbtgt password should be changed whenever a highly privileged user leaves the organization and additionally on a fixed schedule (and, of course, if you suspect a compromise). Make sure that the password is very, very strong.</p><p>But changing the password once is not enough. It has to be changed twice because of the password history. However, be careful not to do this in quick succession. The change must be replicated to other domain controllers first. Otherwise, you risk severe authentication problems.</p><p><a href="https://infosec.exchange/tags/itsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsecurity</span></a> <a href="https://infosec.exchange/tags/GoldenTicket" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoldenTicket</span></a> <a href="https://infosec.exchange/tags/ttp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ttp</span></a> <a href="https://infosec.exchange/tags/mitre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mitre</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/redteaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteaming</span></a> <a href="https://infosec.exchange/tags/TechTuesday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechTuesday</span></a></p>
Lutra Security<p>In the recent years it has become increasingly difficult for attackers to get their malware on victim computers. But, it is far from impossible, which today's technique can easily demonstrate: "Obfuscated Files or Information: HTML Smuggling" (MITRE T1027.006).</p><p>Okay, first a bit of theory about HTML Smuggling.</p><p>Instead of directly sending a malicious or even suspicious file over the wire, an attacker can use an HTML file to smuggle the malicious file. Often, the smuggled file is placed compressed and encrypted somewhere in the HTML file. Upon opening, JavaScript is used to extract the malicious file and drop it to disk with browser API's like msSaveBlob.</p><p>Enough with the theory! You can test whether you are susceptible to this kind of attack in our newest article. There we provide two links to HTML pages that try to download harmless executable files via HTML Smuggling. So try it yourself:</p><p>English: <a href="https://lutrasecurity.com/en/articles/html-smuggling/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lutrasecurity.com/en/articles/</span><span class="invisible">html-smuggling/</span></a><br>German: <a href="https://lutrasecurity.com/articles/html-smuggling/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lutrasecurity.com/articles/htm</span><span class="invisible">l-smuggling/</span></a></p><p>It is very difficult to actually defend against this kind of attack, since the malicious file is only assembled in the victims browser and the data can be obfuscated with JavaScript. Therefore, a web gateway cannot really help here. Blocking JavaScript and the HTML5 features used by this attack is also not a viable solution, because it will probably break something like 99% of the internet.</p><p>However, you can block the download of potentially malicious files through JavaScript in browsers. But remember, such files can also be contained in other normally harmless files, such as ZIP archives. </p><p>So there is no 100%-working, painless solution to defend against HTML smuggling. Therefore, it is best to always assume that undetected malicious files could be on your employees' computers and build a defense in depth strategy.</p><p><a href="https://infosec.exchange/tags/itsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsecurity</span></a> <a href="https://infosec.exchange/tags/ttp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ttp</span></a> <a href="https://infosec.exchange/tags/mitre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mitre</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/redteaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteaming</span></a> <a href="https://infosec.exchange/tags/TechTuesday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechTuesday</span></a></p>