• 0 Posts
  • 50 Comments
Joined 1 year ago
cake
Cake day: June 13th, 2023

help-circle

  • a surprisingly disappointing article from ars, i expect better from them.

    the author appears to be confusing “relay attacks” with “cloning” and doesn’t really explain the flow of the attach that well.

    really this just sounds like a complicated MitM attack, using the victim’s phone as the “middle” component between the victim’s physical card and the attacker’s rooted phone.

    the whole “cloning the UID attack” at the end of the article is irrelevant, NFC payment cards don’t work like that.







  • start with basics:

    • install iperf on every device you can between an external device and your internal host(s) and use it to find any bottlenecks
    • use tools like tcpdump to analyze packets flowing over the network. you can often find surprising results this way
    • start with a simple test best (again, iperf) with the most simple config (no nginx etc) and add the complexity of your config bit by bit until the issue returns

  • if this is your first time doing a big trip together, honestly, forget about it being prefect. it won’t be, and that’s ok. trips don’t need to be perfect to be meaningful, in fact, i’ve found the opposite to be true. the more wild and unexpected the adventure is, the more memorable and important it becomes to me.

    so I’d say it’s best to keep an idea of things you’d like to see or do, but also be flexible and willing to adapt. traveling with someone that forces everyone to stick to a rigid itinerary is never fun and is a good way to ruin the trip. all it takes is one lost bag or one missed train to throw all your careful planning out the window. better to roll with the punches than self destruct when that happens.









  • even in your hypothetical of a file name passed in through the args, either the attacker has enough access to run said tool with whatever args they want, or, they have taken over that process and can inject whatever args they want.

    either attack vector requires a prior breach of the system. you’re owned either way.

    the only way this actually works as an exploit is if there are poorly written services out there that blindly call through to CreateProcess that take in user sourced input without any sanitization, which if you’re doing that then no duh you’re gonna have a bad time.

    cmd.exe is always going to be invoked if you’re executing a batch script, it’s literally the interpreter for .bat files. the issue is, as usual, code that might be blindly taking user input and not even bothering to sanitize it before using it.