KALYPTO (IN)SECURITY

Research, demonstrations, and popcorn

How to enable Authentication on your MongoDB instance

This is a quick post on enabling authentication on your MongoDB instance, but the first thing you should do is bring the MongoDB inside your network if possible.  If it is not exposed externally, there is a far lower chance of intrusion. The second thing is to create an administrator account that will be used for…

Continue Reading

MRIT – MongoDB Ransom Investigation Tool released on GitHub

I have written a simple multithreaded application used to Shodan exports for open MongoDB instances and report on ransom demands.  This tool is on GitHub and is released for free use.  The only caveat is that you may not modify it to cause harm. I will keep the list of known ransom demand schemas updated as I…

Continue Reading

STOP AND GO SECURE YOUR DATA… NOW!

After doing some research into MongoDB for the company I currently work for, I started looking around at some servers online.  What I found was amazing.  Database servers almost never need to be exposed on the perimeter of a network, but there are thousands upon thousands out there exposed.  I have seen excuses ranging from “We have our…

Continue Reading

Do your MongoDB admins know what they are doing?

Note:  This was originally posted to LinkedIn, but I have moved it over here to go along with the update I posted about the explosion of malicious ransom demands. MongoDB by default does not have very good security configured out of the box. Unfortunately, the technology is new enough and different enough that people tend…

Continue Reading

MongoDB Ransomware Explosion

Recently I posted an article on LinkedIn about MongoDB security… well, it turns out that this has exploded into a big issue.  Over the last two weeks malicious hackers have been going crazy with extortion schemes.  Hackers are connecting to unsecured MongoDB instances, encrypting the data and then demanding payment before they will release the…

Continue Reading

Have a Happy New Year and Don’t Drive Drunk

I would like to wish everyone a happy and safe New Year’s Eve.  I hope you all get to go out and spend time with family and friends to ring in the new year with cheer.  After the year we have had, we can all only hope that 2017 turns out better than 2016.  I have…

Continue Reading

Bricking the Apple Message App

There are three reasons an exploit may exist in code:  poorly written code, logic failure on the part of the developer, or in the case of this exploit, using something in a way that was never intended or tested.  Arguably, this last one may be considered part of the logic failure area, but I tend to keep it…

Continue Reading

NetGear Vulnerability Expanded

A vulnerability was discovered in some NetGear routers that allows remote command execution by visiting a malicious site or a legitimate site that has malicious ads served to it via AdSense or any number of other ad services. The vulnerability allows execution of Linux commands by simply appending the command to a URL.  The commands execute with…

Continue Reading

Help Save a Veteran’s Life

This week we lost another brave soul who stood up for his country.  Justin was a man that served his country with honor and always had the backs of his friends and family.  Unfortunately, the demons won.  Justin left behind a wife and daughter and I am sick of this happening.  There is more we can do. …

Continue Reading

Security and Voting

The issues around voting are enormous.  I couldn’t even pretend to know them all or understand the full impact.  Especially without being able to examine the voting machines being utilized for this election.  That being said, there are some very minor changes that could be made in order to further secure the voting process and…

Continue Reading

1 2 3 4 6