How many known time/result combinations does it take to guess a HOTP/TOTP secret?

I thought about “recovering”, “determining”, “guessing”, “calculating” or “reproducing” the HOTP/TOTP secrets when only the outcome (6-digit code + time) is known.

In case we can view the live creation of HOTP/TOTP codes without knowing t… Continue reading How many known time/result combinations does it take to guess a HOTP/TOTP secret?

Where is the Bitlocker key stored without the Trusted-Platform Module (TPM)?

I’ve seen many Windows clients with Bitlocker installed without the Trusted-Platform Module (TPM) enabled. This requires manual changes in the Group Policy since by default it’s not possible to enable Bitlocker without a TPM…. Continue reading Where is the Bitlocker key stored without the Trusted-Platform Module (TPM)?

How likely is it that the Hot Potato vulnerability can be exploited on a up-to-date Windows 2012 machine?

I recently found an article about the Hot Potato vulnerability and it seemed quite interesting.

Using this technique, we can elevate our privilege on a Windows workstation from the lowest levels to “NT AUTHORITY\SYSTEM” – the highest level of privilege available on a Windows machine.

The exploit basically consists of three aspects:

  1. Local NBNS Spoofer
  2. Fake WPAD Proxy Server
  3. HTTP -> SMB NTLM Relay

I’m specifically interested in this vulnerability on Windows Server 2012 (R2). The exploit makes use of an automatic update mechanism that downloads certificate trust lists (CTLs) on a daily basis.

The researchers said that using SMB (Server Message Block) signing may theoretically block the attack. Other method to stop the NTNL relay attack is by enabling “Extended Protection for Authentication” in Windows.

My question, are one of the two mitigations as suggested by the researchers automatically used as a patch/fix through Windows Update, since the initial vulnerability was released? I think somewhere in the beginning of 2016.

Note: It’s ironic that the introduction of a daily update of CTLs that are meant to improve security, introduce a massive Privilege Escalation vulnerability.

Continue reading How likely is it that the Hot Potato vulnerability can be exploited on a up-to-date Windows 2012 machine?

Are disabling TLS 1.0, enabling RC4 or using TLS1.0 with AES only, the only ways to mitigate BEAST server-side?

I understand that BEAST is very hard to exploit and mostly fixed by modern browsers already.

Also, enabling RC4 will introduce other risks.
So, if you still want to mitigate the almost impossible exploitable BEAST attack, a… Continue reading Are disabling TLS 1.0, enabling RC4 or using TLS1.0 with AES only, the only ways to mitigate BEAST server-side?

Why is Sub resource integrity (SRI) only limited to JS/CSS files and is it only for external sources?

I’m quite enthusiastic about the Sub resource integrity (SRI) features. But, why is it only limited to JS and CSS files?

I tried to pin a LESS (CSS variant) file, of which the integrity tag was ignored by Firefox and Chrome…. Continue reading Why is Sub resource integrity (SRI) only limited to JS/CSS files and is it only for external sources?