KALYPTO (IN)SECURITY

Research, demonstrations, and popcorn

The ‘RID’ vulnerability is not a vulnerability…

Recently a “researcher” has gone on a marketing blitz trying to convince the world he found a vulnerability that doesn’t exist.  This vulnerability has been dubbed ‘RID Exploitation.’  According to this researcher, the RID is the relative identifier at the end of a SID (security identifier) that generally denotes the level of access an account…

Continue Reading

Stephen Hawking, the future, and women

Stephen Hawking passed away today at the age of 76.  Many thought it would come much earlier in his life.  Many thought it would never happen because he was a super genius from another dimension (sarcasm).  Regardless, the world lost one of the most brilliant and beautiful minds ever known to the planet Earth. Stephen…

Continue Reading

How to get hacked with source code mismanagement

I have spent a great deal of time researching the best way to avoid security exposure via source control.  This has become a hot-button issue right now due to the Deloitte hack.  As it turns out, one of their developers checked in a file to GitHub that actually has VPN credentials in it.  Looking back…

Continue Reading

Classified Information

First, let me say that I am a self-contradicting person.  I am a collector of knowledge.  I seek information that is hard to find or I shouldn’t know.  The reason is simple, with knowledge comes power… the power to make informed decisions instead of blindly following whatever you are told.  Instead, I seek to get…

Continue Reading

Password managers and how you are using them wrong

Anyone that is even semi-competent online knows how difficult it can be to manage passwords.  Most people have 15 accounts at a bare minimum online.  Managing passwords for many accounts becomes difficult.  Generally, people take one of three options to solve this issue: Use the same password for most accounts with special ones only for…

Continue Reading

Vault 7: An attack on The United States of America

On Tuesday March 7th, 2016, WikiLeaks posted a trove of stolen files and data sourced from inside the Central Intelligence Agency.  This information was posted to the WikiLeaks website with a press release claiming the need for transparency to protect users.  This is just the first release in a long line they have setup for…

Continue Reading

Arris Modem Vulnerability – Updated 3/14

Arris is one of the single largest providers of cable internet modems in the United States and around the world.  I was playing around with this a bit tonight while bored and came up with a simple way to cause someone to reboot their modem just by visiting a page. The controls for configuration changes on Arris modems…

Continue Reading

How to enable Authentication on your MongoDB instance

This is a quick post on enabling authentication on your MongoDB instance, but the first thing you should do is bring the MongoDB inside your network if possible.  If it is not exposed externally, there is a far lower chance of intrusion. The second thing is to create an administrator account that will be used for…

Continue Reading

MRIT – MongoDB Ransom Investigation Tool released on GitHub

I have written a simple multithreaded application used to Shodan exports for open MongoDB instances and report on ransom demands.  This tool is on GitHub and is released for free use.  The only caveat is that you may not modify it to cause harm. I will keep the list of known ransom demand schemas updated as I…

Continue Reading

STOP AND GO SECURE YOUR DATA… NOW!

After doing some research into MongoDB for the company I currently work for, I started looking around at some servers online.  What I found was amazing.  Database servers almost never need to be exposed on the perimeter of a network, but there are thousands upon thousands out there exposed.  I have seen excuses ranging from “We have our…

Continue Reading

1 2 3