|
Saifuddin Amri
@
saifuddin_amri
Malaysia
|
|
Cyber Security Specialist. Consulting Manager at @EY_CyberSec. A geek who is really passionate about tech & cyber security. Tweets & RTs are my own.
|
|
|
10.806
Tweetovi
|
3.673
Pratim
|
1.208
Osobe koje vas prate
|
| Tweetovi |
| Saifuddin Amri proslijedio/la je tweet | ||
|
Jake James
@Jakeashacks
|
28. sij |
|
looks like this kext is accessible from sandbox, stay away from 13.3.1 pic.twitter.com/yTblbn4Ptx
|
||
|
|
||
| Saifuddin Amri proslijedio/la je tweet | ||
|
Hector Martin
@marcan42
|
16. sij |
|
So it's not that Windows uses the wrong curve parameters or anything like that, it's that at some point the key used to index into a validated cert cache is (serial, pub) when it should be (serial, pub, params).
As they say, one of the hardest problems in CS is caching.
|
||
|
|
||
| Saifuddin Amri proslijedio/la je tweet | ||
|
Hector Martin
@marcan42
|
16. sij |
|
To clarify the Windows crypto fail: The problem isn't in signature validation. The problem is the *root store/cache*. CryptoAPI considers an (attacker-supplied) root CA to be in the trust store if its public key and serial match a cert in the root store, Ignoring curve params.
|
||
|
|
||
| Saifuddin Amri proslijedio/la je tweet | ||
|
Hector Martin
@marcan42
|
17. sij |
|
What you're trying to find is the private key given the public key. You cannot find the original private key for the original params, but you can trivially craft parameters in such a way to make a private key of 1 "happen" to correspond to the original public key.
|
||
|
|
||
| Saifuddin Amri proslijedio/la je tweet | ||
|
🥝 Benjamin Delpy
@gentilkiwi
|
16. sij |
|
That epic Microsoft moment❤️#cve20200601 #curveball
Recently worked on #mimikatz and ECC, so yes, 10 and 2016/2019 only.
Previous versions like Windows 7 did not support personnal EC curves (only few NIST standard ones) pic.twitter.com/EayEuFVv1J
|
||
|
|
||
| Saifuddin Amri proslijedio/la je tweet | ||
|
🥝 Benjamin Delpy
@gentilkiwi
|
17. sij |
|
Ho, by the way, #curveball #cve20200601 is not only about TLS & Authenticode... it's also for S/MIME and other signatures.
Yes, it's also valid against #Outlook mail signature verification ❤️
I hope nobody rely on it for legal / workflow validation pic.twitter.com/xds8l2gSIL
|
||
|
|
||
| Saifuddin Amri proslijedio/la je tweet | ||
|
IT Freedom
@ITFreedom
|
16. sij |
|
Don't take any chances, make sure your data is secure. #smallbusiness #atx #cybersecurity #datasecurity hubs.ly/H0myxVB0
|
||
|
|
||
| Saifuddin Amri proslijedio/la je tweet | ||
|
Inc.
@Inc
|
17. sij |
|
4 customer service trends you need to know in 2020 @jthomasgriffin on.inc.com/kpcwQfk
|
||
|
|
||
| Saifuddin Amri proslijedio/la je tweet | ||
|
Cyber Advising
@cyber_advising
|
16. sij |
|
CryptoAPI PoC CVE-2020-0601 github.com/kudelskisecuri…
|
||
|
|
||
| Saifuddin Amri proslijedio/la je tweet | ||
|
Didier Stevens
@DidierStevens
|
14. sij |
|
New blog post "Analysis Of Unusual ZIP Files" blog.didierstevens.com/2020/01/06/ana…
|
||
|
|
||
|
Saifuddin Amri
@saifuddin_amri
|
17. sij |
|
Habis lah i kena pukul dengan BF you lepas ni. I lari dulu k. Hahaha
|
||
|
|
||
|
Saifuddin Amri
@saifuddin_amri
|
17. sij |
|
Faham ya ustazah 😆
|
||
|
|
||
|
Saifuddin Amri
@saifuddin_amri
|
17. sij |
|
Love you too, dumb ass 😂
|
||
|
|
||
| Saifuddin Amri proslijedio/la je tweet | ||
|
Elias Ladopoulos
@acidphreak
|
29. pro |
|
This attack did occur, but it wasn’t Mitnick that performed it. Also, Shimomura’s machine was already owned before Kevin finally was given access, and it was logged. I’ve seen the logs. twitter.com/todayininfosec…
|
||
|
|
||
| Saifuddin Amri proslijedio/la je tweet | ||
|
Cybergibbons! (Project Zero Hounslow)
@cybergibbons
|
27. pro |
|
In Infosec, we need to consider
Confidentiality
Integrity
Availability
We often forget Availability - keeping something available often runs contrary to security.
Interesting story about how handling the encoding of years on EMV cards led to downtime:
lightbluetouchpaper.org/2010/01/19/enc…
|
||
|
|
||
| Saifuddin Amri proslijedio/la je tweet | ||
|
Today In Infosec
@todayininfosec
|
25. pro |
|
1994: Kevin Mitnick allegedly performed a remote attack against Tsutomu Shimomura’s personal computer, gaining access by using source address spoofing and TCP sequence prediction. But there's no proof he did it and it's generally accepted he lacked the required technical skills. pic.twitter.com/u28HdFskln
|
||
|
|
||
| Saifuddin Amri proslijedio/la je tweet | ||
|
Saifuddin Amri
@saifuddin_amri
|
13. ožu |
|
For the next 6 months:
1. I will focus on myself
2. Myself is my 1st priority. Put aside unnecessary things & bullshit issue.
3. It's only me, myself & my career
4. Invest 10000% energy into myself
5. Don't lose focus & work harder !
Happy working peeps ! #Motivation #Success pic.twitter.com/NMkKDmOxRD
|
||
|
|
||
| Saifuddin Amri proslijedio/la je tweet | ||
|
Marco Rogers
@polotek
|
24. pro |
|
I keep telling y'all that "full stack" is a trap. Nobody wants to talk about it. I was honestly surprised when I learned that a lot of devs are taught to want that. As opposed to be able to build up competency incrementally. twitter.com/webber_tweets/…
|
||
|
|
||
| Saifuddin Amri proslijedio/la je tweet | ||
|
SwiftOnSecurity
@SwiftOnSecurity
|
24. pro |
|
TIP: You should go through all web results for all your usernames past and present, and change all the user details to junk, BEFORE you delete the account (if that's an option).
Often websites only HIDE deactivated accounts - if a hacker dumps the database all your stuff is there
|
||
|
|
||
| Saifuddin Amri proslijedio/la je tweet | ||
|
Andrea Di Fabio
@ETSU_CISO
|
23. pro |
|
When are we going to impose fines so hefty for poor cybersecurity that can seriously impact or shut down a company? Over 267M Facebook users had names, phone numbers leaked on dark web fxn.ws/2EB0t6w #FoxNews #ETSU #CyberSecurity #CyberAware
|
||
|
|
||