User Controls

So at least 100 years ago on Redfern...

  1. #1
    Sophie Pedophile Tech Support
    I remember we had a thread in the tech section and i am not sure what it was about exactly but i think it was about configurations of some app or OS or whatever and someone pointed out that the way it was being done/suggested by Slartibarfast(The IT guy that also posts on Totseans) presented a security risk. And i remember this specifically because he is like an IT professional he does that shit for a living and he was all like: Yeah well, this is why i dislike infosec people because they see danger everywhere and hurr durr what is the worst that could happen.

    And then i thought, this is how you get pwnd nigga'. So i guess my question is, how often does it occur in the IT sector that people just ignore security flaws, or are misinformed about the seriousness of of the issue?

    This bread can be moved to T&T Lan Man Fam, i cba.
  2. #2
    kroz weak whyte, frothy cuck, and former twink
    they are coming to attack! look behind you ! eeerhrrh hhhduuurrr eeerrrrh!
  3. #3
    aldra JIDF Controlled Opposition
    A LOT. will elaborate when I'm not on my phone, but I'm in the IT department of a non-IT company, and even the 'senior devs' shortcut everything. I bring up issues all the time, 'but who's going to try that?'

    based on default credentials and public information my friend successfully guessed ~75% of currently active accounts in one of our CRM tools
  4. #4
    Sophie Pedophile Tech Support
    Originally posted by Bill Krozby they are coming to attack! look behind you ! eeerhrrh hhhduuurrr eeerrrrh!

    As per usual you misunderstand the situation. I was not conveying my upset with Slartibartfast for disliking infosec people. I was just pointing out that ignoring infosec people is a stupid security policy.
  5. #5
    Sophie Pedophile Tech Support
    Originally posted by aldra based on default credentials and public information my friend successfully guessed ~75% of currently active accounts in one of our CRM tools



    Top lol :)

    In anticipation of your elaboration,

    Love, Sophie.
  6. #6
    mmQ Lisa Turtle
    Originally posted by Sophie

    Top lol :)

    In anticipation of your elaboration,

    Love, Sophie.

    tee-hee that's the gif I used when WS posted kraykay's fingerpainting pics :)
    The following users say it would be alright if the author of this post didn't die in a fire!
  7. #7
    Lanny Bird of Courage
    Well so "infosec people" can describe at least two distinct classes of professional technologist. There are "security researchers" and there's "security contractors" and they may sound like the same thing but they're actually very different. Researchers are the guys who produce CVE tickets, they have their fair share of dumshits, cringe lords, and mediocre joes just trying to collect a paycheck but in general they serve a pretty important role and there's some real talent there. Then there's security contractors that are hired goons whose occupation consists of equal parts fear mongering and beating real programmers over the head with automated extremely primitive "security reports". The latter group is a parasite upon the former who are themselves kind of the jedis of the developmental world: we know they're smart and they need to exist, ultimately they're a good thing but they really are a pain in the ass sometimes.

    When you hear IT people or developers bitching about security folks they're generally of the contractor variety.

    But I mean security breaches are pretty common, so what is it that makes other people continuously dismissive of some elements in the security community? The answer, at least as I see it, is twofold. The simpler answer is development is hard and most programmers are fucking retarded. Like cargo cult sorry sons of bitches who, if they were carpenters instead of programmers, would be able to hammer nails sorta ok and nothing else who have been carried through their careers because people felt sorry for them. They have a hard time composing systems they haven't seen a hundred times before and any thought towards adversarial usage just isn't there, just a handful of dogmas (null checking in java-land is a great example of this, although not a security issue per se, it demonstrates the ability of people to cobble together software with no actual insight into the process, leaning instead on received wisdom). Sad but true.

    But of course that isn't everyone, legitimately smart people will ignore security issues too although usually at a much lower rate. Why does that happen? I mean it's easy to explain "I didn't see this" because systems are complex but when someone turns up at your desk with an issue and you're like "nahhh" isn't that just negligence? On a level yes, but when prod is fucked and an RCA lands at your feet that's a shitty place to be, no one would sign up for that out of laziness. The answer is that the rate of false positives in security analysis (usually automated security analysis, and a similar issue exists with automated analysis in general) is so high as to make it basically meaningless, or at least in most cases I've seen. Donald Norman has done a fair amount of research on this but it's really just lost on sec folks because "lol we're not designers", but it's kind of obvious, when the majority of "security issues" you're confronted with are nothing but fear mongering it's hard to take them seriously.

    An anecdote: a dude shows up at my desk the other day. "There's an XSS vulnerability in your project", we look at it, we take a number and render it into the markup without escaping it because of special circumstances. Ok, I understand, automated checker sees there's an unsanitized field getting sent to the user. But it's a number, the type system guarantees us in a formally provable way it's a number, it can render as a string of exactly 10 characters none of which can constitute an escape code or really do anything. "But what if your DB returns something that isn't a number?" Well ok, so let's say the DB randomly stops doing like the one thing it's supposed to do which is maintain relational integrity. Let's say it magically does that for some reason. Then the cast fails, we 500 out, and production support deals with the magical database. "What if it doesn't though?" Fucking what if in an act of divine intervention RNJesus decides every UUID we generate is going to be exactly the same for the next 3 years? Well we're fucked 12 ways to sunday, the world economy is going to collapse and we'll probably all die in a tidal wave but it's not my job to deal with impossible hypotheticals. This shit show went through like 5 levels of managers, all but one of whom couldn't write hello world and the decision comes back I'm wrong so we eat shit and stack another half second of load time onto requests because some dipshit's audit tool needs to be appeased.

    Meanwhile I pointed out a timing attack and some architect is all like "nahh, no way anyone's going to figure out that exists" so in a few months a major american financial institution is going to have a product with a known (to three grunt programmers and a lead) timing attack in it and we're all just hoping really hard no one sees that shit. Try escalating it you say? Yeah well that's hard to do when no one who can do anything knows what the fuck time to first byte means, much less what a timing attack is.

    IN SHORT technology is fucked and if we're lucky we'll all die from a natural disaster before AI comes about and decides to go all "I have no mouth and I must scream" on us because some dumbshit did something stupid and there's just enough stupidity around him to propagate his fuckup far enough to fuck us all.

    Post last edited by Lanny at 2016-11-21T02:20:55.813037+00:00
    The following users say it would be alright if the author of this post didn't die in a fire!
  8. #8
    Sophie Pedophile Tech Support
    Originally posted by Lanny Well so "infosec people" can describe at least two distinct classes of professional technologist. There are "security researchers" and there's "security contractors" and they may sound like the same thing but they're actually very different. Researchers are the guys who produce CVE tickets, they have their fair share of dumshits, cringe lords, and mediocre joes just trying to collect a paycheck but in general they serve a pretty important role and there's some real talent there. Then there's security contractors that are hired goons whose occupation consists of equal parts fear mongering and beating real programmers over the head with automated extremely primitive "security reports". The latter group is a parasite upon the former who are themselves kind of the jedis of the developmental world: we know they're smart and they need to exist, ultimately they're a good thing but they really are a pain in the ass sometimes.

    When you hear IT people or developers bitching about security folks they're generally of the contractor variety.

    But I mean security breaches are pretty common, so what is it that makes other people continuously dismissive of some elements in the security community? The answer, at least as I see it, is twofold. The simpler answer is development is hard and most programmers are fucking retarded. Like cargo cult sorry sons of bitches who, if they were carpenters instead of programmers, would be able to hammer nails sorta ok and nothing else who have been carried through their careers because people felt sorry for them. They have a hard time composing systems they haven't seen a hundred times before and any thought towards adversarial usage just isn't there, just a handful of dogmas (null checking in java-land is a great example of this, although not a security issue per se, it demonstrates the ability of people to cobble together software with no actual insight into the process, leaning instead on received wisdom). Sad but true.

    But of course that isn't everyone, legitimately smart people will ignore security issues too although usually at a much lower rate. Why does that happen? I mean it's easy to explain "I didn't see this" because systems are complex but when someone turns up at your desk with an issue and you're like "nahhh" isn't that just negligence? On a level yes, but when prod is fucked and an RCA lands at your feet that's a shitty place to be, no one would sign up for that out of laziness. The answer is that the rate of false positives in security analysis (usually automated security analysis, and a similar issue exists with automated analysis in general) is so high as to make it basically meaningless, or at least in most cases I've seen. Donald Norman has done a fair amount of research on this but it's really just lost on sec folks because "lol we're not designers", but it's kind of obvious, when the majority of "security issues" you're confronted with are nothing but fear mongering it's hard to take them seriously.

    An anecdote: a dude shows up at my desk the other day. "There's an XSS vulnerability in your project", we look at it, we take a number and render it into the markup without escaping it because of special circumstances. Ok, I understand, automated checker sees there's an unsanitized field getting sent to the user. But it's a number, the type system guarantees us in a formally provable way it's a number, it can render as a string of exactly 10 characters none of which can constitute an escape code or really do anything. "But what if your DB returns something that isn't a number?" Well ok, so let's say the DB randomly stops doing like the one thing it's supposed to do which is maintain relational integrity. Let's say it magically does that for some reason. Then the cast fails, we 500 out, and production support deals with the magical database. "What if it doesn't though?" Fucking what if in an act of divine intervention RNJesus decides every UUID we generate is going to be exactly the same for the next 3 years? Well we're fucked 12 ways to sunday, the world economy is going to collapse and we'll probably all die in a tidal wave but it's not my job to deal with impossible hypotheticals. This shit show went through like 5 levels of managers, all but one of whom couldn't write hello world and the decision comes back I'm wrong so we eat shit and stack another half second of load time onto requests because some dipshit's audit tool needs to be appeased.

    Meanwhile I pointed out a timing attack and some architect is all like "nahh, no way anyone's going to figure out that exists" so in a few months a major american financial institution is going to have a product with a known (to three grunt programmers and a lead) timing attack in it and we're all just hoping really hard no one sees that shit. Try escalating it you say? Yeah well that's hard to do when no one who can do anything knows what the fuck time to first byte means, much less what a timing attack is.

    IN SHORT technology is fucked and if we're lucky we'll all die from a natural disaster before AI comes about and decides to go all "I have no mouth and I must scream" on us because some dumbshit did something stupid and there's just enough stupidity around him to propagate his fuckup far enough to fuck us all.

    Post last edited by Lanny at 2016-11-21T02:20:55.813037+00:00

    This post was hilarious and thanks for the insight. And you know what you need to do? You need to sell 0days on the dankweb. Also, i think that the solution should be that security people need to be developers first and foremost who have specialized in security, and i also think that niggas need to employ some deep learning to teach fuzzers to intuit if a security vulnerability is an actual threat or just some nonesense like you mentioned the XSS turned out to be. That, and i think it's important for sec people to confirm vulns but i though that was standard practice lol.
  9. #9
    Malice Naturally Camouflaged
    *raises firsts in the air and roars*

    "With the power of meth!"
  10. #10
    The power comes from inside you. It's like one of those anime shows. Anyone can get the power crystals that make their hair glow and they can float and shit but only the truly skilled can use them to teleport and do KAMETHHAMAHAHHH!!!!!
Jump to Top