We’ve frequently linked to DistroWatch for their coverage of Linux package and release announcements. Now an anonymous reader writes: The DistroWatch website introduced IPv6 support on Friday and the new protocol has been getting a lot of attention. “Over 8% of our traffic this weekend came from IPv6 addresses,” commented DistroWatch contributor Jesse Smith. “It was a pleasant surprise, we were not expecting that many people would be using IPv6 yet.” When asked why DistroWatch enabled IPv6 access to their server at this time, Smith answered: “Partly it was an experiment to see how much interest there was in IPv6. Partly it was because it is a little embarrassing (in 2016) to have a technology focused website that is not making use of IPv6.”
Read more of this story at Slashdot.
Original URL: http://rss.slashdot.org/~r/Slashdot/slashdot/~3/Nz3iEZ9L0Y0/distrowatch-finally-adds-support-for-ipv6
vvvv is a hybrid visual/textual live-programming environment for easy prototyping and development. It is designed to facilitate the handling of large media environments with physical interfaces, real-time motion graphics, audio and video that can interact with many users simultaneously. Responsible for its development is the vvvv group.
vvvv is free for non-commercial use,commercial use requires a license.
For a detailed overview of vvvvs features read the Propaganda or see some Screenshots of vvvv for a basic understanding of what you are dealing with here. People also seem to be interested in what the faq vvvv might mean.
Above you see a slideshow of screenshots posted by users of vvvv.
Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/rs_T0HPIjYY/
While I was busy at the Brain Bar Budapest conference over the weekend, my Amazon Fire tablet quietly updated itself to Fire OS 5.1.4. But does the new OS bring many changes? And has it upset anything?
Full details of the new update are available at the Fire (5th Generation) Software Updates page. There’s only two major changes listed, On Deck. which “downloads Amazon Videos to your Fire tablet so you have something to watch even when you are offline,” and the new feature that allows you to “Download Books and Periodicals to Your SD Card.” I haven’t had a chance to try either yet, but reports in The eBook Reader and elsewhere indicate that they work just fine.
As TeleRead readers should know by now, I hacked my Fire way back to install the Google Play Store and the usual run of Google apps on the tablet. The Google Play Store itself and all
Original URL: http://teleread.com/amazon-fire-updates-fire-os-5-1-4-many-changes/
To get a simple file, you need a Flickr API key. To get a Flickr API key, you need a Flickr account. A Flickr account is a Yahoo account. To get a Yahoo account, you need to give your full name, birth date & phone number.
This module allows your to download Flickr photos without API key by giving you the direct URL of the photo.
NoScript, Firebug, and other popular Firefox add-on extensions are opening millions of end users to a new type of attack that can surreptitiously execute malicious code and steal sensitive data, a team of researchers reported.
The attack is made possible by a lack of isolation in Firefox among various add-ons installed by an end user. The underlying weakness has been described as an extension reuse vulnerability because it allows an attacker-developed add-on to conceal its malicious behavior by invoking the capabilities of other add-ons. Instead of directly causing a computer to visit a booby-trapped website or download malicious files, the add-on exploits vulnerabilities in popular third-party add-ons that allow the same nefarious actions to be carried out. Nine of the top 10 most popular Firefox add-ons contain exploitable vulnerabilities. By piggybacking off the capabilities of trusted third-party add-ons, the malicious add-on faces much better odds of not being detected.
“These vulnerabilities allow a seemingly innocuous extension to reuse security-critical functionality provided by other legitimate, benign extensions to stealthily launch confused deputy-style attacks,” the researchers wrote in a paper that was presented last week at the Black Hat security conference in Singapore. “Malicious extensions that utilize this technique would be significantly more difficult to detect by current static or dynamic analysis techniques, or extension vetting procedures.”
Of the top 10 most popular add-ons vetted by Mozilla officials and made available on the Mozilla website, only Adblock Plus was found to contain no flaws that could be exploited by a malicious add-on that relied on reuse vulnerabilities. Besides NoScript, Video DownloadHelper, Firebug, Greasemonkey, and FlashGot Mass Down all contained bugs that made it possible for the malicious add-on to execute malicious code. Many of those apps, and many others analyzed in the study, also made it possible to steal browser cookies, control or access a computer’s file system, or to open webpages to sites of an attacker’s choosing.
The researchers noted that attackers must clear several hurdles for their malicious add-on to succeed. First, someone must go through the trouble of installing the trojanized extension. Second, the computer that downloads it must have enough vulnerable third-party add-ons installed to achieve the attackers’ objective. Still, the abundance of vulnerable add-ons makes the odds favor attackers, at least in many scenarios.
In many cases, a single add-on contains all the functionality an attacker add-on needs to cause a computer to open a malicious website. In other cases, the attacker add-on could exploit one third-party add-on to download a malicious file and exploit a second third-party add-on to execute it. In the event that a targeted computer isn’t running any third-party add-ons that can be exploited, the attacker-developed add-on can be programmed to provide what’s known as a “soft fail” so that the end user has no way of detected an attempted exploit. Here’s a diagram showing how the new class of attack works.
“We note that while it is possible to combine multiple extension-reuse vulnerabilities in this way to craft complex attacks, it is often sufficient to use a single vulnerability to successfully launch damaging attacks, making this attack practical even when a very small number of extensions are installed on a system,” the researchers wrote. “For example, an attacker can simply redirect a user that visits a certain URL to a phishing website or automatically load a web page containing a drive-by-download exploit.”
The researchers said they developed an add-on containing about 50 lines of code that passed both Mozilla’s automated analysis and its full review process. Ostensibly, ValidateThisWebsite—as the add-on was called—analyzed the HTML code of a given website to determine if it was compliant with current standards. Behind the scenes, the add-on made a cross-extension call to NoScript that caused Firefox to open a Web address of the researchers’ choosing.
In an e-mail, Firefox’s vice president of product issued the following statement:
The way add-ons are implemented in Firefox today allows for the scenario hypothesized and presented at Black Hat Asia. The method described relies on a popular add-on that is vulnerable to be installed, and then for the add-on that takes advantage of that vulnerability to also be installed.
Because risks such as this one exist, we are evolving both our core product and our extensions platform to build in greater security. The new set of browser extension APIs that make up WebExtensions, which are available in Firefox today, are inherently more secure than traditional add-ons, and are not vulnerable to the particular attack outlined in the presentation at Black Hat Asia. As part of our electrolysis initiative—our project to introduce multi-process architecture to Firefox later this year—we will start to sandbox Firefox extensions so that they cannot share code.
In the meantime, the researchers said Firefox users would benefit from improvements made to the screening process designed to detect malicious add-ons when they’re submitted. To that end, they have developed an application they called CrossFire that automates the process of finding cross-extension vulnerabilities. In their paper, they proposed that it or a similar app be incorporated into the screening process.
“Naturally, we do not intend our work to be interpreted as an attack on the efforts of Firefox’s cadre of extension vetters, who have an important and difficult job,” the researchers wrote. “However, since the vetting process is the fundamental defense against malicious extensions in the Firefox ecosystem, we believe it is imperative that (i) extension vetters be made aware of the dangers posed by extension-reuse vulnerabilities, and that (ii) tool support be made available to vetters to supplement the manual analyses and testing they perform.”
Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/ltuoUECFaAw/
How to achieve a full reflected XSS attack which includes the ability to run a complete script and not just an alert popup with the least amount of characters? Some people already tried to answer this question like in here and here.
As we may imagine it’s possible to have an URL parameter echoed in a source of a script:
which would make possible to launch a full XSS attack providing a source with a short domain like //14.rs (7 chars length). A variation decreases the injection to just 5 chars if double slashes are already in native code:
However, both scenarios are very unlikely.
It uses the 0.0.0.0 IP address as the href of the anchor for demo purposes, so we can try it locally. In a real vulnerable page it would need to be a valid yet expired domain (broken link) able to be acquired, spoofed or even compromised. Of course, this alone isn’t enough to exploit the page which would invalidate our next step.
Which just inserts a <base tag before the <a one to hijack its href attribute (the acquired/spoofed domain). This sets the base URL of the document to something we control and then we just need a script in the page being called from a relative URL, which is not that difficult to find into a given page.
Now setting a web server or just a listener on port 80 to deliver our script is enough to pop the alert (or anything we want):
An useful dead link with the right conditions is really hard to find, but to deal with the alignment involving the injection and the anchor, the trick used here and probably some browser quirks may help.
Anyway, in the cases where only the 2nd condition (script from relative URL) is met, we can still use the <base tag but this time providing the href:
Which is a full XSS vector with IP in decimal for a local PoC with just 15 chars.
Typora is a minimalist markdown editor for Windows and Mac. Markdown is a simple language which uses plain text formatting to create rich text documents, but you don’t need to understand any of that to get started. Typora opens much like any other editor. Start typing and you can style text, copy and paste, find and replace, undo, open, print, save and more, with all the keyboard shortcuts you know already. Right-clicking displays a context menu with options to insert links, quotes, unordered/ ordered/ task lists, paragraphs, headings, images and more. Use this for a while and you begin to… [Continue Reading]
Original URL: http://feeds.betanews.com/~r/bn/~3/Z8qii8wPQuM/
AWS Is currently having issues with a bunch of our instances and the console reports the following error
“An error occurred fetching instance data: The service is unavailable. Please try again shortly.
“Anyone else experiencing a problem?