I finally figured it out. For those who are having a hard time trying to figure out the network, first/last host, broadcast, next subnet, and number of addresses in a subnet, I recommend www.subnetipv4.com. There are 7 fairly short videos with examples to break it down and there’s a subnetting practice program as well.
The best part I like about this training is that the subnetting chart is very easy to remember and writing it down doesn’t take a lot of time (which is good when doing your certification exam). I watched several other videos on subnetting and I’ve found subnetipv4.com’s to be the easiest for me. Hope this someone as much as it’s helped me!
While hacking web apps, I’m sure most of you will check for common files like robots.txt, sitemap.xml, and web.config. But do you check for crossdomain.xml?
The file crossdomain.xml is used within Flash and Silverlight applications to determine what outside domains can view the content of server responses. Think of it like the Flash equivalent of #CORS (cross-origin resource sharing).
An overly permissive crossdomain.xml file can allow a threat actor to retrieve sensitive information from a website on behalf of an authenticated user. For example, let’s say we have the below policy:
<allow-access-from domain=”*” secure=”false”/>
<allow-http-request-headers-from domain=”*” headers=”*” secure=”false”/>
The policy allows outside requests from *, meaning any outside domain.
A threat actor can generate a malicious .swf file on their (attacker) domain, manipulate a logged in user into accessing the file, and automatically generate a request to steal the contents of the server response. Let’s say the server response contains a CSRF token. We could then use that to initiate another request and takeover the account!
If you want to test this out, bWAPP has a Cross-Domain Policy File module that can be used for practice. In their module, they have you steal the contents of /bWAPP/secret[.]php on behalf of a logged-in user.
Genesis Market Takedown
An unprecedented law enforcement operation involving 17 countries has resulted in the takedown of Genesis Market, one of the most dangerous marketplaces selling stolen account credentials to hackers worldwide. As a result of an action day on 4 April, this illegal service was shut down and its infrastructure seized.
Google plans to add a natural language artificial intelligence chatbot to its search engine to keep up with rivals such as ChatGPT, Google and Alphabet. The tech giant may also move its DeepMind and Google Brain divisions closer together to increase their processing power.
Get up and running with ChatGPT with this comprehensive cheat sheet. Learn everything from how to sign up for free to enterprise use cases, and start using ChatGPT quickly and effectively.
By Mark Maunder, CEO of Defiant (WordFence)
I’ve published a data-driven piece on how to adapt to the coming AI revolution if you’re a creator or a developer. It’s based on my own journey of adapting my capabilities and that of our team, along with many conversations I’ve had with technologists in several countries over the past months.
This thing is about to hit society like a freight train and this is my attempt to equip you with tools to deal with it, to adapt, and to thrive. It’s not a fluff piece. I’ve included my view on the pitfalls I’m seeing, what steps you should take, and several spectacular resources that can get you up to speed without a Ph.D. or strong math background. I hope you enjoy it. I’ll be in the comments in case there’s any discussion. You can find the full post here.