Categories
Uncategorized

Weather talk

The weather is fairly cold locally for the season, but an extra layer is not a bother. So more apt a conversation is security. Without a ton of hyperbole and a flood of links, usage and personal information is why you are seeing most everyone using ‘free services’.  Social relationships are spiking because the technology boom is completely breaking social comprehension of the world they live in.

Why is something being stored relating to what can be found?  The sickness of it is how much marketing is everyday.  If you do not seek out various opinions about, really any matter you seriously have concern about… is frankly, ignorant.  Researching can be exhausting, but if you rely on bias you are facilitating that.  Secure things and work with people.  Share your reason for disagreeing.  Stop imprisoning some of the smartest people for being observant.  Allowing an individual to make a non-baited opinion about what is ‘allowed’.  Maybe stop fighting, especially over text words.

Thank you for reading.  Keep thinking about your well being to help others instead of flip a power leverage trope.

Categories
Uncategorized

Windows Group Policy & IE settings

I wanted to share some experiences I have been having on an existing AD topology I manage. Backstory: This site has been run by various contractors over a decade or so. Having been a contractor myself in the past, I got pretty familiar with poorly configured server deployments and gaining the task to cleaning them up.

Great. Back to the point, multiple group policies can get messy, but the slop comes into play when you are trying to set Internet Explorer settings to domain machines. IE 11 changes quite a bit of these options around and I actually had policies fail to apply, with IE 11 installed due to all the subsettings for the browser. This is the part where you review what settings were being modified and determine what ones are actually relevant. IMO, some of the settings are defined, for the sake of generating more service calls, than to actually implementing helpful security.

So about the faults. In this case, I had a few servers that did not report to the local WSUS patch server. Turns out bad policies were the cause of this. I removed the multi-policies that were not applying valid settings, and shortly after said servers started reporting to my WSUS list. Message here being, revisit your group policies, export them to XML and review them. If you have a bunch applying different settings, consider merging them. Policies can also be exported, so doing that before making changes, will give you a control of what the config was, before you made any changes.

Back to cleaning malware off a machine one of the helpdesk people ignored the other day. Living the dream. Lol not so much there.

Edit: Oh yes, let me add some helpful commands for tinkering with your group policy. It should be obvious, but keep notes of what you change, especially if changing the active policies. You do not want to break the parts that are working / critical to operations.

rsop.msc = Resultant Set of Policy.  This will show you what policies are applied and what the settings are.  Also errors will display here if the policy fails.
gpupdate = Group Policy update tool.  Run 'gpupdate /force' to apply all settings @ execution time.

Log into your WSUS server and confirm the machine in question is reporting to the patch server. You can run the following command to have it query the WSUS server for patches.

wuauclt /detectnow

This should shortly display a tooltip bubble with pending updates. Assuming you approved them on the WSUS server, the client machines should see them and you can install them. Pick your install method via Group Policy to determine if you want them to auto install or prompt the user to install them. Review your reports in WSUS to see how many are being installed and if any are having errors installing.

Categories
Uncategorized

Database Guide MSSQL

I made the attached guide from notes and documentation I was reading around 2009.  I meant to share it before and very well may have, but it had poor naming and was hard to find.  Hopefully this helps you explore ;)

Attached File
 MSSQLDatabaseNotes2009Guide.txt   19.19K
  45 downloads

Categories
Hardware Software

Tor browsing via Raspberry Pi

I recently explored setting up an OnionPi to be a dedicated device for browsing .onion sites and obfuscating the source IP address. Just to say it, you don’t have to be doing ‘criminal’ stuff to be using tor. I just wanted to get that out there and encourage more people to explore the ‘darknet’ / ‘deepweb’ / etc. I followed an Adafruit guide on setting up my OnionPi. I will describe more about the device, how it functions and some extra feedback, relating to the guide on installation.

Presuming you have a Raspberry Pi and supported Wireless adapter, you will be plugging in a wired internet cable to your Pi, that will share the onion-routed internet connection over wireless. Once you complete the configuration and install steps, your Pi will be ready to route your wireless traffic over TOR.
If you are more curious about tor and what it is about, checkout https://torproject.org/.

The guide I worked from is this link on AdaFruit. The kicker here, is that you really need your Wireless setup for the Tor install process to work and for the Tor service to work properly. So really, You want to start with installing WiFi and DHCP support.
Before you start, be sure to set a custom password for root and pi accounts on your Raspbian (or whatever you choose) OS.

I did not run the installation script, since I figured it would be easier to troubleshoot if I manually ran each step / configuration command. Besides I got to learn in the process of manually following along, so win bonus.

Once you setup your WiFi Access Point, go for the Tor install and configuration. Once done, fire up the service and check your internet-facing IP (WhatisMyIP or any similar site will do). You will also know you are on Tor, because CAPTCHA prompts will be more common in your browsing.
A fun little fact I noticed, is to browse .onion pages, you still want to have the Tor Browser installed. Any other browser will still benefit from an obfuscated IP Address, but you will get an error trying to browse to .onion sites.

One of the main benefits of setting up a hardware-based Tor device, is you can connect whatever wireless enabled device you wish to it. There have been many write-ups and conversations about the Tor Browser alone, being vulnerable to leaking data… especially if your connection is not fully-routed through an onion router. Not to say using an onion router is 100% untraceable, but every little bit helps.

Extra notes, that really apply to any web browsing, is to install add-blocking plugins. Advertising has been a known attack vector for years now and it only becomes more common. Visitors to this site may be aware of my lack of love for online advertising. Different strokes for different folks and all of that.

To conclude this post, I also want to mention Tails. This is a USB based operating system that is very handy in browsing tor, especially on the go. If you want to use your own OS and applications on the tor network, that is where the extra work of setting up an OnionPi (Raspberry Pi Device with Tor installed) is helpful to you.

Categories
Hardware Software

Encrypt stuff guide

This thread will be a collection of resources on how to use encryption, tool use suggestions and where possible, usage explanations.

I’m fine with reading technical documents, however I also value time and the ability to convey a point, without a huge time investment. The easier and more clearly encryption can be used, the better everyone will be.
Be it an individual or some sort of state agency / boogeyperson, more layers and protections are a good thing. Having protections does not make one a criminal, either.

CryptSetup LUKS guide. There are command syntax examples and console response dialogs.

Cryptsetup is nice, as it also handles mounting of drives and partitions. If you are unable to mount a drive, you will likely need to install cryptsetup. This should also work to mount any TAILS persistent volumes you have setup.
For more info on DM-Crypt (cryptsetup), the Arch wiki is a great resource.

Samples of flow (1st link)
01 step: install cryptsetup (dm-crypt)
02 step: confirm your drive target and valid partition (gparted or parted to get your /dev/(drive))
03 step: initialize your drive

# cryptsetup -y -v luksFormat /dev/xvdc

(This is setting up your passcode to access drive)
04 step:

# cryptsetup luksOpen /dev/xvdc backup2

(Mounts newly configured drive)
05 step: format the LUKS partiton (needless to say, you really want to have the correct drive or you have lost data on the drive you are using)

# dd if=/dev/zero of=/dev/mapper/backup2

(This will take quite some time. Let the cursor do it’s work, check your hdd led to confirm activity)

Categories
Uncategorized

Google Data Mining

I wanted to share the details listed in Google services with your history. https://history.google.com/history/ will let you check through search history, advertising settings and so on.

To clear them, you want to click the vertical … bar and select Delete options. Pick advanced and All Time.
You will need to do this for each record set / option of google services. If you use chrome and log in, you will surely see some data there. Personally, I think Google is playing a little Cover-Your-Ass by disclosing these tools to general users. Along those lines, I find it hard to pretend other major data players, do not do the same thing with user data.

Here is a guide on the privacy settings. Remember your GPS history is there and that some content will persist, even after a clear all history. You ‘Pause’ the tracking services. Interesting wording there.

Categories
Uncategorized

Fall 2015 security topics

October is a great month and one of my favorite seasons. As the consumer holiday shopping season comes up, the amount of disclosures seem to scale up as well. Granted the last year continues a steady stream of disclosures on bugs, exploits, and patches that may address them. Allow me to take a moment to point out that malware distribution through advertising networks, is not only a thing but has become pretty common. This has been one of those things I suspected, but have more recently seen to become a common attach vector.

Speaking of security, we certainly live in a world where more than windows platforms are targeted. Be it flash, java, or some other variant… issues arise. Social network sites like to do post-reactive security. However putting up a condition based lock for something originally designed to be accessible, tends to lead into the additive protection being side-stepped. For some odd reason, security in the design phase seems to remain under-looked or overlooked completely. Scale also is a factor, since getting the scope of all use is difficult to do, before implementation and feature requests come into play.

Rambling aside, let’s note the more common infection of linux machines being herded into botnets. A nice technical read at the link.
Mobile phones are not immune either. Android has it’s abandoned versions (4.3 and lower) and apple iOS has patches until a device is considered ‘end of life’. Keeping in mind the patches, only cover the disclosed and more publicly disclosed exploits. So yes, mobile phones are being used as attack vectors.

Cryptography wise, your key is great, but when the machine gets exploited, your credentials to that encrypted drive have (multiple) risks of being stolen. If a government can do it, you should bet individuals or 3rd party contracting groups have the same or potentially more means to do the same.

Finally, you can enjoy some art of the security nature.

Categories
Uncategorized

Deny Windows 10 Rollout info

If you wish to not install Windows 10, and also prevent the sharing of installers off your connection, you will want to make sure not to / remove the KB3035583 update.

I am considering a Windows 10 test install, but not to wipe over my main windows install. However the use of my connection, a la Xbox Live methods, is not so much in my interests.

Here are some extra GWX details.

Without making this a huge rant of observations in Windows 10 thread, I will say that the privacy controls need to actually not phone back to microsoft servers, when you set the options that are supposed to disable that feature. Also automatic forced updating is not my cup of tea. I believe in testing.
Call me crazy.

Categories
Uncategorized

Oh Hello

I find myself enjoying some late nights. Looks like I have a bite here on the Windows 8.1 PC. HTTP and HTTPS services running as RPC items.

Discovered open port 445/tcp on localPC
Discovered open port 135/tcp on localPC
Discovered open port 139/tcp on localPC
Discovered open port 5357/tcp on localPC
Discovered open port 49154/tcp on localPC
Discovered open port 49153/tcp on localPC
Discovered open port 49158/tcp on localPC
Discovered open port 49152/tcp on localPC
Discovered open port 49159/tcp on localPC
Discovered open port 49155/tcp on localPC
Completed SYN Stealth Scan at 22:59, 1.22s elapsed (1000 total ports)
Initiating Service scan at 22:59
Scanning 10 services on localPC

Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) is port 5357

 

I also hope you got to read my submission in 2600 32:2 issue. Always looking to explore something. It has been a blast so far. :ninjawub:
 

Categories
Hardware Software

UEFI Windows Installing

Howdy. My latest adventure is setting up a HP ProLiant ML150 Server with Windows Server 2012. I keep forgetting how I get workable USB install media, so I am making a guide to that effect.

Starting off, there used to be a MS ISO to USB Making Tool, however it fails to make the USB stick from the .iso with an nondescript message. So to make a working, UEFI compliant boot USB stick, we are going to format is as FAT32. This is very similar to setting up a Raspberry Pi SD card as well. However using a Windows Install CD and Win32DiskImager does not work, so to get it working:

  • Open Command Prompt in elevated mode (Run as Administrator)
  • Type diskpart and press Enter
  • Type list disk and press Enter. Note the list of existing disks.
  • Insert the USB Disk.
  • Type list disk and press enter again. Note the new disk showed up which is our USB disk. I assume the new disk is 2 for example purpose.
  • Type select disk X where X is your USB disk. E.g., select disk 2. Press Enter.
  • Type clean and press enter.
  • Type create partition primary and press enter to create primary partition 1.
  • Type select partition 1 and press enter.
  • Type active and press enter to make the partition 1 active
  • Type format fs=fat32 quick (Or use the Right-Click step to quick format).
  • Exit diskpart.
  • (or instead of format in diskpart) Right-Click the drive in (My) Computer and do a Quick Format to FAT32.(Otherwise it will not UEFI Boot, only legacy boot)
  • Extract the contents of the .iso and copy them to the root of the USB stick (Use 7zip or Winrar like archiver tools)

Re-written steps thanks to the following guide. I use quick format, as a full format on multiple GB drives, takes quite a long time for no real good reason.

Without over-complicating why you want UEFI for more recent device boot options, you will have a worse time trying to legacy boot an install on a UEFI BIOS enabled system. Thus installing from UEFI media works the best to avoid issues. Luckily Kali and Ubuntu work out the gate with UEFI, so long as you boot the CD Drive / USB as a UEFI target. This allowed me to remove Windows 8.1 from a 2 in 1 tablet and make a Kali / Ubuntu multi-boot instead.