ML
    • Register
    • Login
    • Search
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    1. Home
    2. Tags
    3. hacking
    Log in to post
    • All categories
    • stus

      Your Boss NEEDS To Read This WSJ Article About Our Power Grid And How The Russians Hacked It With Phishing
      IT Discussion • phishing hacking securityawarenesstraining • • stus

      2
      3
      Votes
      2
      Posts
      172
      Views

      jmoore

      Thanks a lot I'll read that soon.

    • JaredBusch

      Duplicating IVR entries in FreePBX 13
      IT Discussion • freepbx freepbx 13 freepbx setup ivr hacking • • JaredBusch

      15
      5
      Votes
      15
      Posts
      2186
      Views

      JaredBusch

      @table said in Duplicating IVR entries in FreePBX 13:

      @jaredbusch

      Is there a better way to do this with whats included in freepbx or commercial modules? I was thinking just putting the script in cron and just have it run every so many hours. Then eventually making a form to add or modify the data.

      What I would do is update your ivr3 to include the id and name from ivr_details and think of those as the unique key. Or add them to a separate cross reference table, however you want to handle it.

      Then add logic to your system to fail and notify if there is a mismatch (aka someone changed it in FreePBX).

      There is no way to do this in FreePBX itself.

      Once you change the database, you will have to reload everything.

      You can issue the fwconsole reload command from your script. That is the same as clicking the red "Apply Config" button.

    • mlnews

      Database Ransom Attacks Now Include Hadoop and CouchDB
      News • security couchdb hadoop malware ransomware hacking windows it pro • • mlnews

      2
      2
      Votes
      2
      Posts
      834
      Views

      scottalanmiller

      0_1485431142097_fdyhfr-meme-generator-hide-yo-kids-hide-yo-wife-5dc51d.png

    • IRJ

      I am thinking about getting into Security
      IT Discussion • jobs it security certified ethical hacker hacking hacker penetration testing pen scanning • • IRJ

      21
      1
      Votes
      21
      Posts
      2714
      Views

      scottalanmiller

      I think that this decision has to come down to... is this a career change that you want? If this is what you WANT to do, then it is a huge opportunity to build your resume and experience. If this is not something that you want, this could suck big time. it's more about you and your goals than about career options.

    • JaredBusch

      Hello Mr Chinese IP based hacker
      IT Discussion • ssh hacking erl edgemax edgerouter • • JaredBusch

      13
      0
      Votes
      13
      Posts
      3431
      Views

      wirestyle22

      @tonyshowoff said in Hello Mr Chinese IP based hacker:

      That's why we set any WAN-fancing SSH port to something obscenely high like 41022, not for "security" but because of the logs. In fact, all of our sshd services run following that pattern, as does our internal HTTP(S) servers but the load balancers take in 80/443.

      This prevents as many services as possible from running as root, which anything running port < 1024 does. I don't think most people even know this. At the very least if there's a NAT in play, one can always set ssh and web services ports much higher and just translate the ports to avoid the same issue.

      (I know there are some work arounds like setcap on Linux, but in general this is the default behaviour on most machines)

      For some reason this made me think of The Venture Bros, Hunter Gather says:

      And we want your sad ass undercover agents to stop trying to infiltrate our group. Frankly we're tired of killing them and we can't afford the body bags!

      Useful piece of information. Thanks!

    • JaredBusch

      Big data breaches found at major email services
      IT Discussion • breach hacking email • • JaredBusch

      24
      3
      Votes
      24
      Posts
      4060
      Views

      MattSpeller

      @nadnerB gaahhhhhhhh I was staring at it waiting for it to load

    • B

      Hacking tool swipes encrypted credentials from password manager
      IT Discussion • security keepass password hacking ars technica • • Brett at ioSafe

      4
      2
      Votes
      4
      Posts
      1221
      Views

      B

      @JaredBusch said:

      Of course once an attacker is in your system, they will have access to all your stuff.

      Indeed. The moral of this story is simply that all bets are off if your systems are compromised.

    • gjacobse

      Jailbroken iOS: Data hacked
      News • ios hacking apple security malware • • gjacobse

      7
      1
      Votes
      7
      Posts
      1288
      Views

      Dashrender

      @nadnerB said:

      App stores... pfffft who needs them
      stares at Lumia wondering what to do with it 😐

      😞 yeah All I want is a stupid StarBucks app... lol

    • handsofqwerty

      Social Engineering and Your Company
      IT Discussion • hacking social engineering defcon • • handsofqwerty

      1
      1
      Votes
      1
      Posts
      630
      Views

      No one has replied

    • mlnews

      Is SELinux the Answer to Hacking Security Issues?
      News • linux selinux security enhanced linux security hacking • • mlnews

      1
      3
      Votes
      1
      Posts
      729
      Views

      No one has replied

    • Ambarishrh

      LastPass Hacked, Change Your Master Password Now
      News • hacking security • • Ambarishrh

      24
      2
      Votes
      24
      Posts
      6184
      Views

      Dashrender

      @Carnival-Boy said:

      @Dashrender said:

      I agree with Nick and Scott - while this is not good, it's definitely not as bad as it sounds... the bad thing - non technical people won't understand why and they'll just crucify LastPass instead.

      I'll include myself as non technical person here. It does further put me off hosted solutions. That's not the only reason I use on-premise (Keepass) as I didn't really like LastPass when I tried it anyway. I do store my Keepass databases in the cloud though, but that's a different risk.

      The sad fact of the matter is that unless you completely unplug yourself, you just can't avoid hosted solutions. I say sad, and others will say, what makes it sad? Life has so many advantages today because of the hosted/integrated solutions - this is a conundrum I haven't reconciled yet.

    • MattSpeller

      Firewall Blocking Dodgy Garbage - but what is it?
      IT Discussion • firewall spam fortigate log management hacking tracking • • MattSpeller

      4
      0
      Votes
      4
      Posts
      2791
      Views

      nadnerB

      If you are uncertain, http://urlquery.net can be helpful.

      It will report on what happens when you go to a particular URL.
      It can even give you a preview (sometimes) of the page.