User Controls

  1. 1
  2. 2
  3. 3

Posts by oatking

  1. oatking Yung Blood
    - Learn to fix things like washers, fridges, etc. Collect "broken" stuff from curbs or buy on CL for like 20$, fix it up, sell it for 100-200$
    - Specialize in a market ie. old cameras. Go around CL, ebay, or IRL and buy old cameras for 50-100$, clean (except the lenses unless you know wtf youre doing) and sell for 500+. People sell valuable stuff thinking that it's trash.
    - Fix people's computers. I have no idea how this is still a thing in the year of our lord 2016, but apparently people are just getting worse and worse at this stuff.
  2. oatking Yung Blood
    Minecraft? Are you like 12 or something?
  3. oatking Yung Blood
    I'm glad you enjoyed it. What kind of development do you focus on?

    I'm afraid I can't say.

    I thought about keeping my PI footprint as small as possible, but you'd figure out this stuff by my replies so might as well have it out of the way: web development with python, but also a bit of infosec so: bits of C, bits of *nix, etc.
  4. oatking Yung Blood
    Lol, pleb still using bitcoin. Enjoy your bitcoins all disappearing due to mt. gox2 or the gubmint vans in front of your house. But srsly, with what's happening in the BTC community lately, I see that it's all politics all the time again. At first I thought "great, we can have impartial technology solve X and Y", but it's the same old shit again.
  5. oatking Yung Blood
    Thanks homie, hope it's something everyone here can add to their host of techniques, especially since it's so easy.
  6. oatking Yung Blood
    Hi y'all, today I want to talk to you about our lord and savior, joshua ha nocri. Or not. Or really about using subdomains to launch uber-realistic phishing campaigns not only at the users of a service, but its employees as well.

    A lot of services today have subdomains that point your browser to some special area of a site - stuff like blog.example.com, helpdesk.niggasin.space, sales.bigcorp.com etc. If this area of a site is provided by a 3rd party service (ie. tumblr, hubspot, zendesk, wordpress, etc.) then there's a danger that at some point in time the company will stop using that service. Not many developers usually have access to the DNS records of their company, so taking a record out requires the presence of an beta-geek in the company. That person is usually pretty busy taking part in meetings and watching Silicon Valley or something, so they put this. It's a super low priority item. Here's where you come in.

    If the 3rd party service expired, it's usually possible to register with that service and get the exact same CNAME record (web address) that was in use before. Let's say BigCorp had a blog hosted at bigcorp.wordpress.com (CNAME under wordpress.com's control) and they had a CNAME record (under their control) "blog.bigcorp.com". They let that wordpress.com account expire, so you jump in and register your own blog at "bigcorp.wordpress.com". When a user enters "blog.bigcorp.com" into their browser, their browser loads your blog under the *.bigcorp.com domain!

    This leads to two things:
    1. Phishing. If you play around with graphics and stuff, you have a fool-proof phishing vector. You have a super-legit looking URL for your phishing page, just send it out and collect credentials.
    2. I think you can also do XSS, but I'm not sure. The single-origin policy should step in here and block any attempt, but maybe you can at least bypass CORS? What do you guys think?

    This is really low hanging fruit and worth a shot, especially since checking for it requires minimal interaction with the target. You can use a subdomain enumeration tool like https://github.com/TheRook/subbrute to list most subdomains for a domain. Let it do it's thing for a few minutes while you search for other vulnerabilities. When you have a list of subdomains you can check them out either by browsing to each URL and seeing if you get to a 3rd party service page or you can try using dig (http://linux.die.net/man/1/dig) to see if a given subdomain points to another CNAME. Usually the CNAME will give away if it belongs to a 3rd party service ie. 1vsfd-123as.hubspot.com or something similar. Using the dig approach, you still have to visit that URL to see if the service expired and if you can register your a new account in its place.

    edit: Here's how "serious" this stuff is: https://vulners.com/hackerone/H1:38007 (look at the 1000$ bounty awarded, hella yeah).
  7. oatking Yung Blood
    While i was browsing the intertubes i found this little gem.

    http://www.stilldrinking.org/programming-sucks

    It's a day in the life of a professional programmer brought to you in a uniquely cynical and entertaining fashion. I enjoyed reading it, and if you're a programmer, especially in a professional capacity i think you will enjoy it as well.

    That's a great article. If you put in historical context, meaning, in the context of how stuff like the s/360 or windows nt or any big piece of computer software been built, it's all the same. 20 years ago you had some stupid manager yelling at you to finish those drivers in x86 assembly cause he wanted that sweet bonus, now you got some sjw feminazi screaming at you to tweak that swirly icon cause she wants mo money.
  1. 1
  2. 2
  3. 3
Jump to Top