1. Technology Consultancy and Advisory
    Sudonix

    Sudonix

    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Popular
    • Tags
    • Users
    • Groups
    • Solved
    • More
      • About
      • Contact
      • Donate
      • FAQ
      • Founder's Journey
      • Policies
    1. Home
    2. Tags
    3. security
    Log in to post
    • All categories
    • DownPW

      North Korean Hackers Exploit Unpatched Zimbra Devices in 'No Pineapple' Campaign
      Vulnerability • security healthcare cyber attack • • DownPW

      4
      2
      Votes
      4
      Posts
      26
      Views

      phenomlab

      @DownPW here. Hostrisk is automated and doesn’t accept registrations.

    • phenomlab

      Facebook fined for forcing users to agree to personalised ads
      Privacy • privacy security • • phenomlab

      3
      1
      Votes
      3
      Posts
      36
      Views

      phenomlab

      @crazycells exactly. Not so long ago, we had the Cambridge Analytica scandal in the UK. Meta (Facebook) seem to be the ultimate “Teflon” company in the sense nothing seems to stick.

    • Installing and Configuring CrowdSec in Cloudflare
      Security • crowdsec cloudflare security • • DownPW

      4
      1
      Votes
      4
      Posts
      54
      Views

      phenomlab

      @DownPW yeah, I seem to spend a large amount of my time trying to educate people that there’s no silver bullet when it comes to security.

    • phenomlab

      Secure SSH connectivty
      Security • ssh keys security • • phenomlab

      7
      3
      Votes
      7
      Posts
      104
      Views

      DownPW

      @phenomlab

      yep but I use it since several month and I haven’t see any bugs or crash
      In any case, I only use him anymore 🙂

      Tabby offers tabs and a panel system, but also themes, plugins and color palettes to allow you to push the experience to the limit. It can support different shells in the same window, offers completion, has an encrypted container for your passwords, SSH keys and other secrets, and can handle different connection profiles.

      Each tab is persistent (you can restore them if you close one by mistake) and has a notification system, which will let you know if, for example, a process is finished while you are tapping in another tab.

      It’s really a great terminal that will easily replace cmd.exe for Windowsians or your usual terminal. And it can even work in a portable version for those who like to carry their tools on a USB key.

      –> To test it, you can download it, but there is also a web version. Handy for getting an idea.

      Tabby - a terminal for a more modern age Tabby - a terminal for a more modern age

      Tabby is a free and open source SSH, local and Telnet terminal with everything you'll ever need.

    • WesleyMoura

      Solved How to restrict external access to Redis instance installed in a docker image
      Configure • database security digitalocean docker • • WesleyMoura

      8
      1
      Votes
      8
      Posts
      214
      Views

      WesleyMoura

      @phenomlab
      Sorry to delay in responding, yes as i mentioned above, i had to remove my redis from docker and reinstall a new image with this command

      docker run --name=redis -p 127.0.0.1:6379:6379 -d -t redis:alpine

      and now when i test my ip and port on

      Open Port Check Tool - Test Port Forwarding on Your Router

      the status of my redis port is closed. I think which to configure firewall in droplet digital ocean is a good idea too, and i will configure soon.
      Thanks for the help!

    • DownPW

      Windscribe VPN offered for free with a lifetime license
      General • security vpn • • DownPW

      6
      3
      Votes
      6
      Posts
      543
      Views

      phenomlab

      Missed out on this deal ? Windscribe offer a limited free version. More about that here
      https://sudonix.com/topic/13/which-product-is-the-best-for-vpn/164?_=1652206628456

    • DownPW

      Crowdsec: a replacement for Fail2ban
      Security • crowdsec security ips • • DownPW

      3
      3
      Votes
      3
      Posts
      348
      Views

      DownPW

      @phenomlab

      No they have a free and pro console instance.
      We can see alert with IP, Source AS, scenario attack etc…

      Installation on the NODEBB server without problems. Very good tools

      cf7e5a89-84f4-435b-82eb-434c0bfc895e-image.png
      cc82a10e-a1f1-4fd8-a433-7c9b2d31f254-image.png

      1b7147b0-37c6-4d87-b4f1-a0fe92e74afd-image.png

      7c21fc10-1825-48e1-a993-92b84455f074-image.png

      –
      We can also do research on IPs via the crowdsec analyzer

      I believe it’s 500 per month in the Free version

      43bc8265-a57c-4439-829c-0bb8602d99b4-image.png

    • Mike Jones

      Solved Securing javascript -> PHP mysql calls on Website
      Security • php mysql security • • Mike Jones

      2
      0
      Votes
      2
      Posts
      143
      Views

      phenomlab

      @mike-jones Hi Mike,

      There are multiple answers to this, so I’m going to provide some of the most important ones here

      JS is a client side library, so you shouldn’t rely on it solely for validation. Any values collected by JS will need to be passed back to the PHP backend for processing, and will need to be fully sanitised first to ensure that your database is not exposed to SQL injection. In order to pass back those values into PHP, you’ll need to use something like

      <script> var myvalue = $('#id').val(); $(document).ready(function() { $.ajax({ type: "POST", url: "https://myserver/myfile.php?id=" + myvalue, success: function() { $("#targetdiv").load('myfile.php?id=myvalue #targetdiv', function() {}); }, //error: ajaxError }); return false; }); </script>

      Then collect that with PHP via a POST / GET request such as

      <?php $myvalue= $_GET['id']; echo "The value is " . $myvalue; ?>

      Of course, the above is a basic example, but is fully functional. Here, the risk level is low in the sense that you are not attempting to manipulate data, but simply request it. However, this in itself would still be vulnerable to SQL injection attack if the request is not sent as OOP (Object Orientated Programming). Here’s an example of how to get the data safely

      <?php function getid($theid) { global $db; $stmt = $db->prepare("SELECT *FROM data where id = ?"); $stmt->execute([$theid]); while ($result= $stmt->fetch(PDO::FETCH_ASSOC)){ $name = $result['name']; $address = $result['address']; $zip = $result['zip']; } return array( 'name' => $name, 'address' => $address, 'zip' => $zip ); } ?>

      Essentially, using the OOP method, we send placeholders rather than actual values. The job of the function is to check the request and automatically sanitise it to ensure we only return what is being asked for, and nothing else. This prevents typical injections such as “AND 1=1” which of course would land up returning everything which isn’t what you want at all for security reasons.

      When calling the function, you’d simply use

      <?php echo getid($myvalue); ?>

      @mike-jones said in Securing javascript -> PHP mysql calls on Website:

      i am pretty sure the user could just use the path to the php file and just type a web address into the search bar

      This is correct, although with no parameters, no data would be returned. You can actually prevent the PHP script from being called directly using something like

      <?php if(!defined('MyConst')) { die('Direct access not permitted'); } ?>

      then on the pages that you need to include it

      <?php define('MyConst', TRUE); ?>

      Obviously, access requests coming directly are not going via your chosen route, therefore, the connection will die because MyConst does not equal TRUE

      @mike-jones said in Securing javascript -> PHP mysql calls on Website:

      Would it be enough to just check if the number are a number 1-100 and if the drop down is one of the 5 specific words and then just not run the rest of the code if it doesn’t fit one of those perameters?

      In my view, no, as this will expose the PHP file to SQL injection attack without any server side checking.

      Hope this is of some use to start with. Happy to elaborate if you’d like.

    • phenomlab

      Securing your webserver against common attacks
      Blog • security headers • • phenomlab

      1
      1
      Votes
      1
      Posts
      126
      Views

      No one has replied

    • phenomlab

      Hacked because you didn't listen ?
      Blog • hacked security vulnerability • • phenomlab

      1
      0
      Votes
      1
      Posts
      120
      Views

      No one has replied

    • phenomlab

      Addressing vulnerability management
      Blog • security vulnerability • • phenomlab

      1
      0
      Votes
      1
      Posts
      114
      Views

      No one has replied

    • phenomlab

      The Multi-Billion Pound Catfishing Industry
      Blog • catfishing security fraud • • phenomlab

      1
      0
      Votes
      1
      Posts
      118
      Views

      No one has replied

    • phenomlab

      Never underestimate the importance of security
      Blog • security complacency • • phenomlab

      1
      0
      Votes
      1
      Posts
      109
      Views

      No one has replied

    • phenomlab

      Hackers aren't evil - separating fact and FUD
      Blog • hackers security • • phenomlab

      1
      0
      Votes
      1
      Posts
      119
      Views

      No one has replied

    • phenomlab

      Why you should never neglect physical security
      Blog • infrastructure security blog • • phenomlab

      1
      0
      Votes
      1
      Posts
      110
      Views

      No one has replied

    • phenomlab

      Security, Or Just Obscurity?
      Blog • security blog • • phenomlab

      1
      0
      Votes
      1
      Posts
      104
      Views

      No one has replied

    • phenomlab

      Changing Passwords Regularly Actually Weakens Security
      Blog • security blog • • phenomlab

      1
      0
      Votes
      1
      Posts
      122
      Views

      No one has replied

    • phenomlab

      Surface Web, Deep Web, And Dark Web Explained
      Blog • security blog • • phenomlab

      3
      0
      Votes
      3
      Posts
      159
      Views

      phenomlab

      @justoverclock yes, completely understand that. It’s a haven for criminal gangs and literally everything is on the table. Drugs, weapons, money laundering, cyber attacks for rent, and even murder for hire.

      Nothing it seems is off limits. The dark web is truly a place where the only limitation is the amount you are prepared to spend.

    • phenomlab

      Wasting a scammer's time is hugely entertaining
      Blog • security blog • • phenomlab

      1
      1
      Votes
      1
      Posts
      202
      Views

      No one has replied

    • Hari

      Solved is my DMARC configured correctly?
      Configure • • Hari

      3
      0
      Votes
      3
      Posts
      168
      Views

      Hari

      @phenomlab said in is my DMARC configured correctly?:

      you’ll get one from every domain that receives email from yours.

      Today I have received another mail from outlook DMARC, i was referring to your reply again and found it very helpful/informative. thanks again.

      I wish sudonix 100 more great years ahead!