ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Topics
    2. Tags
    3. hacking
    Log in to post
    • All categories
    • stusS

      Your Boss NEEDS To Read This WSJ Article About Our Power Grid And How The Russians Hacked It With Phishing

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion phishing hacking securityawarenesstraining
      2
      3 Votes
      2 Posts
      472 Views
      jmooreJ

      Thanks a lot I'll read that soon.

    • JaredBuschJ

      Duplicating IVR entries in FreePBX 13

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion freepbx freepbx 13 freepbx setup ivr hacking
      15
      5 Votes
      15 Posts
      3k Views
      JaredBuschJ

      @table said in Duplicating IVR entries in FreePBX 13:

      @jaredbusch

      Is there a better way to do this with whats included in freepbx or commercial modules? I was thinking just putting the script in cron and just have it run every so many hours. Then eventually making a form to add or modify the data.

      What I would do is update your ivr3 to include the id and name from ivr_details and think of those as the unique key. Or add them to a separate cross reference table, however you want to handle it.

      Then add logic to your system to fail and notify if there is a mismatch (aka someone changed it in FreePBX).

      There is no way to do this in FreePBX itself.

      Once you change the database, you will have to reload everything.

      You can issue the fwconsole reload command from your script. That is the same as clicking the red "Apply Config" button.

    • mlnewsM

      Database Ransom Attacks Now Include Hadoop and CouchDB

      Watching Ignoring Scheduled Pinned Locked Moved News security couchdb hadoop malware ransomware hacking windows it pro
      2
      2 Votes
      2 Posts
      1k Views
      scottalanmillerS

      0_1485431142097_fdyhfr-meme-generator-hide-yo-kids-hide-yo-wife-5dc51d.png

    • IRJI

      I am thinking about getting into Security

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion jobs it security certified ethical hacker hacking hacker penetration testing pen scanning
      21
      1 Votes
      21 Posts
      5k Views
      scottalanmillerS

      I think that this decision has to come down to... is this a career change that you want? If this is what you WANT to do, then it is a huge opportunity to build your resume and experience. If this is not something that you want, this could suck big time. it's more about you and your goals than about career options.

    • JaredBuschJ

      Hello Mr Chinese IP based hacker

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion ssh hacking erl edgemax edgerouter
      13
      0 Votes
      13 Posts
      4k Views
      wirestyle22W

      @tonyshowoff said in Hello Mr Chinese IP based hacker:

      That's why we set any WAN-fancing SSH port to something obscenely high like 41022, not for "security" but because of the logs. In fact, all of our sshd services run following that pattern, as does our internal HTTP(S) servers but the load balancers take in 80/443.

      This prevents as many services as possible from running as root, which anything running port < 1024 does. I don't think most people even know this. At the very least if there's a NAT in play, one can always set ssh and web services ports much higher and just translate the ports to avoid the same issue.

      (I know there are some work arounds like setcap on Linux, but in general this is the default behaviour on most machines)

      For some reason this made me think of The Venture Bros, Hunter Gather says:

      And we want your sad ass undercover agents to stop trying to infiltrate our group. Frankly we're tired of killing them and we can't afford the body bags!

      Useful piece of information. Thanks!

    • JaredBuschJ

      Big data breaches found at major email services

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion breach hacking email
      24
      3 Votes
      24 Posts
      6k Views
      MattSpellerM

      @nadnerB gaahhhhhhhh I was staring at it waiting for it to load

    • B

      Hacking tool swipes encrypted credentials from password manager

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion security keepass password hacking ars technica
      4
      2 Votes
      4 Posts
      2k Views
      B

      @JaredBusch said:

      Of course once an attacker is in your system, they will have access to all your stuff.

      Indeed. The moral of this story is simply that all bets are off if your systems are compromised.

    • gjacobseG

      Jailbroken iOS: Data hacked

      Watching Ignoring Scheduled Pinned Locked Moved News ios hacking apple security malware
      7
      1 Votes
      7 Posts
      2k Views
      DashrenderD

      @nadnerB said:

      App stores... pfffft who needs them
      stares at Lumia wondering what to do with it 😐

      😞 yeah All I want is a stupid StarBucks app... lol

    • handsofqwertyH

      Social Engineering and Your Company

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion hacking social engineering defcon
      1
      1 Votes
      1 Posts
      827 Views
      No one has replied
    • mlnewsM

      Is SELinux the Answer to Hacking Security Issues?

      Watching Ignoring Scheduled Pinned Locked Moved News linux selinux security enhanced linux security hacking
      1
      3 Votes
      1 Posts
      923 Views
      No one has replied
    • AmbarishrhA

      LastPass Hacked, Change Your Master Password Now

      Watching Ignoring Scheduled Pinned Locked Moved News hacking security
      24
      2 Votes
      24 Posts
      7k Views
      DashrenderD

      @Carnival-Boy said:

      @Dashrender said:

      I agree with Nick and Scott - while this is not good, it's definitely not as bad as it sounds... the bad thing - non technical people won't understand why and they'll just crucify LastPass instead.

      I'll include myself as non technical person here. It does further put me off hosted solutions. That's not the only reason I use on-premise (Keepass) as I didn't really like LastPass when I tried it anyway. I do store my Keepass databases in the cloud though, but that's a different risk.

      The sad fact of the matter is that unless you completely unplug yourself, you just can't avoid hosted solutions. I say sad, and others will say, what makes it sad? Life has so many advantages today because of the hosted/integrated solutions - this is a conundrum I haven't reconciled yet.

    • MattSpellerM

      Firewall Blocking Dodgy Garbage - but what is it?

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion firewall spam fortigate log management hacking tracking
      4
      0 Votes
      4 Posts
      3k Views
      nadnerBN

      If you are uncertain, http://urlquery.net can be helpful.

      It will report on what happens when you go to a particular URL.
      It can even give you a preview (sometimes) of the page.

    • 1 / 1