mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

16K
active users

#techtuesday

3 posts3 participants0 posts today

Web Monetization makes it easier than ever to offer new payment solutions, and getting started is simple:

1️⃣ Download the Web Monetization beta extension:
👉 Chrome | Firefox | Edge

2️⃣ Sign up for an Interledger Wallet to start supporting and engaging with content in a whole new way!

3️⃣ Connect your wallet and explore flexible payment options for your consumers.

Want to get started? Learn more at: webmonetization.org/

Announcement: Beta Launch of Web Monetization!

Web Monetization is here to offer more content support for owners and publishers, while consumers can access content on their own terms.

Today, we announce the beta release of the Web Monetization extension, allowing for seamless micropayments powered by Interledger Wallets.

Read all the details in our blog: interledger.org/news/announcin

#TechTuesday
This #Lemmy post programming.dev/post/22672085 links to the recording of the talk I gave earlier in the year, about how #dotNet #dotNetMAUI and other #programmers #developers can get the most out of #Mastodon and the #Fediverse in general. Show to people you want to come here, or watch yourself if you feel like you could learn more about it.

CC @andypiper @evanprodromou@evanp.me @evanprodromou@socialwebfoundation.org @Gargron @mapache @alvinashcraft @alvinashcraft.com @jamesmontemagno

programming.dev"Finding your way around the Fediverse" recording - programming.devEarlier this year I gave this talk which is about how programmers can get the most of the Fediverse, particularly for dotnet/MAUI developers - some of the killer features which are available and how to use them. The focus of the examples are with dotnet/MAUI, but these things would undoubtedly also be available for other languages/ecosystems, I was just using dotnet/MAUI to illustrate the underlying functionality available to us here. This recording would be good for anyone who isn’t familiar with these features (maybe anyone you want to convince to come here, or just if you feel you don’t know everything that is available). The first part of the recording is a different talk about MAUI, and the first link below will be where my talk starts, and then some more links for other key points, if you just want to see the parts you don’t already know about. Following these recording links will be links to resources that I talked about… 30:06 start/MAUI Lemmy community [https://youtu.be/hCzYawTqnT4?si=sDQXhygjxDBQPitL&t=1806] 31:31 overview of talk [https://youtu.be/hCzYawTqnT4?si=izcKF3v1mtdqu3FZ&t=1891] 33:20 what is the Fediverse? [https://youtu.be/hCzYawTqnT4?si=qkcwJq1LZ0IgdGbv&t=2000] 38:15 Lemmy [https://youtu.be/hCzYawTqnT4?si=cUdRxzt-zbtSZsCW&t=2295] 42:08 Mastodon [https://youtu.be/hCzYawTqnT4?si=02oTLWHQ9IsZSFAq&t=2528] 43:40 Mastodon dotnet.social [https://youtu.be/hCzYawTqnT4?si=alg3HYcUZNagjHac&t=2620] 46:33 Mastodon Local timeline [https://youtu.be/hCzYawTqnT4?si=WIpFq8h1Oh7ooYua&t=2793] 48:01 Mastodon Federated timeline [https://youtu.be/hCzYawTqnT4?si=9Gh1Dz8FYigBv3qR&t=2881] 60:11 Mastodon Lists [https://youtu.be/hCzYawTqnT4?si=zoIl6VtHiCEBZnDs&t=3011] 56:28 Mastodon hashtags [https://youtu.be/hCzYawTqnT4?si=njy2vmPxeTSm8YYC&t=3388] 56:25 Mastodon pinned posts [https://youtu.be/hCzYawTqnT4?si=3nAWOpnG95W8rQHZ&t=3566] 1:00:20 follow Twitter accounts from Mastodon [https://youtu.be/hCzYawTqnT4?si=23Dwa58JrSHNssm2&t=3620] 1:01:51 how to use Lemmy from Mastodon [https://youtu.be/hCzYawTqnT4?si=JxBjpdeoMasVhGpt&t=3711] 1:07:25 Mastodon’s killer feature for dev’s - github bots [https://youtu.be/hCzYawTqnT4?si=i3JsdK39Ffehx9ep&t=4045] 1:10:47 Guide to Mastodon for .NET and MAUI people [https://youtu.be/hCzYawTqnT4?si=VZps5Df6oljHcVBr&t=4247] 1:13:15 Pixelfed, UI comparison [https://youtu.be/hCzYawTqnT4?si=Q3_cba-A-cAdN_KM&t=4430] 1:15:41 Maho Pacheco’s repo (federate static website, etc.) [https://youtu.be/hCzYawTqnT4?si=lbmmpMTf7nESMjxo&t=4541] 1:17:52 Microsoft DevBlogs [https://youtu.be/hCzYawTqnT4?si=Y61LToQMQ_Utnas_&t=4672] Links to resources from this talk Creating MAUI UI’s in C# [https://dev.to/smartmanapps/creating-maui-uis-in-c-1adf] fediverse.party [https://fediverse.party/] .NET MAUI @ programming.dev [https://programming.dev/c/dotnetmaui] .NET MAUI Mastodon bot [https://dotnet.social/@dotnetmaui@programming.dev] .NET Mastodon bot [https://dotnet.social/@bot] @SmartmanApps@dotnet.social [https://dotnet.social/@SmartmanApps] Join dotnet.social [https://dotnet.social/invite/q8pzN9rL] Join dotnet.social and auto-follow @SmartmanApps@dotnet.social [https://dotnet.social/invite/JntHpwzG] How to follow multiple hashtags in a column [https://dotnet.social/@SmartmanApps/110858924945208556] @Microsoft@bird.makeup [https://bird.makeup/users/microsoft] Github bots by Carlos Sanchez of Microsoft [https://dotnet.social/@foo_fighter]… Dotnet github bot [https://dotnet.social/@dotnetbot] MAUI github bot [https://dotnet.social/@mauibot] MastodonGitHubBot repo [https://github.com/ChayoteJarocho/MastodonGitHubBot] Guide to Mastodon for dotNetMAUI and dotNet peeps [https://dotnet.social/@SmartmanApps/110648925352232498] Github repo [https://github.com/mahomedalid] of Maho Paheco of Microsoft [https://dotnet.social/@mapache@hachyderm.io] Maho’s guide to implement ActivityPub in a static site (or any website) [https://maho.dev/2024/02/a-guide-to-implement-activitypub-in-a-static-site-or-any-website/] Follow Maho’s blog [https://dotnet.social/@blog@maho.dev] from Mastodon (or almost any Fediverse service!) Follow Microsoft DevBlogs [https://dotnet.social/@msftdevblogs] (federated thanks to Maho)

#TechTuesday
ICYMI did you know that you can use your #mouse #ScrollWheel to #scroll horizontally? All you have to do is hold down the shift-key at the same time. I saw (and boosted) a post about this recently, and it's life-changing - so much easier than trying to grab the thin and almost invisible scroll-bar! (thanks Microsoft for making everything harder to use due to your never-ending commitment to giving us changes we didn't want)

The worst case has happened: Hackers have managed to breach your network and elevate their privileges to their ultimate goal: Domain Admin.

Today, we will take a look at one of the attacks that this absolute nightmare scenario makes possible for attackers: Golden Tickets (MITRE T1558.001)

But let’s start at the beginning: Kerberos authentication. When a user logs in, a Ticket Granting Ticket (TGT) is issued to the user. Put very simply, the ticket contains, among other things, the username to identify the user. To prevent users from simply modifying a ticket and impersonating other users, the ticket is encrypted.

The encryption key that secures the ticket is essentially the password hash of a user called krbtgt. This makes the krbtgt user one of the most sensitive, if not the most sensitive, user in an Active Directory domain. If this user's password is weak or the password (hash) is compromised, the entire domain is compromised.

This is because attackers can use this password hash to forge their own tickets and impersonate any user they want. They simply create a ticket with the username they want and encrypt it with the password hash. They now have an authentication ticket that, if done correctly, is virtually indistinguishable from a real ticket.

And that's what’s called a “Golden Ticket”. And there are many tools available to attackers, the most prominent of which are: Mimikatz, Rubeus and Impacket.

The fact that it abuses legitimate functionality, makes it difficult to detect a Golden Ticket attack. However, there are a few things that you can look out for:

* Are there TGS requests (Event 4769) without the original TGT being issued by the KDC (Event 4768)?
* Is RC4 encryption being used?
* Strange TGT parameters (e.g. very long lifetimes)?
* Are there logins from sensitive accounts that aren’t normally used (e.g. the default domain administrator account)?

Additionally, you can also look for signs of Pass the Ticket attacks (MITRE T1550.003).

To mitigate this attack, the krbtgt password should be changed whenever a highly privileged user leaves the organization and additionally on a fixed schedule (and, of course, if you suspect a compromise). Make sure that the password is very, very strong.

But changing the password once is not enough. It has to be changed twice because of the password history. However, be careful not to do this in quick succession. The change must be replicated to other domain controllers first. Otherwise, you risk severe authentication problems.

In the recent years it has become increasingly difficult for attackers to get their malware on victim computers. But, it is far from impossible, which today's technique can easily demonstrate: "Obfuscated Files or Information: HTML Smuggling" (MITRE T1027.006).

Okay, first a bit of theory about HTML Smuggling.

Instead of directly sending a malicious or even suspicious file over the wire, an attacker can use an HTML file to smuggle the malicious file. Often, the smuggled file is placed compressed and encrypted somewhere in the HTML file. Upon opening, JavaScript is used to extract the malicious file and drop it to disk with browser API's like msSaveBlob.

Enough with the theory! You can test whether you are susceptible to this kind of attack in our newest article. There we provide two links to HTML pages that try to download harmless executable files via HTML Smuggling. So try it yourself:

English: lutrasecurity.com/en/articles/
German: lutrasecurity.com/articles/htm

It is very difficult to actually defend against this kind of attack, since the malicious file is only assembled in the victims browser and the data can be obfuscated with JavaScript. Therefore, a web gateway cannot really help here. Blocking JavaScript and the HTML5 features used by this attack is also not a viable solution, because it will probably break something like 99% of the internet.

However, you can block the download of potentially malicious files through JavaScript in browsers. But remember, such files can also be contained in other normally harmless files, such as ZIP archives.

So there is no 100%-working, painless solution to defend against HTML smuggling. Therefore, it is best to always assume that undetected malicious files could be on your employees' computers and build a defense in depth strategy.

🚀 Progress Report - October 1, 2024 🌟

💻 Tuesday Tech Journey: • #365DaysofCode Day 275 🔥#100daysofcode Day 9 💪#freeCodeCamp #Round_3_100daysofcode#MySQL 🛠️

📚 Learning Highlights:
Daily Reading:
freeCodeCamp News: 1 article 📰
Daily.dev: 1 article 🌐
SoloLearn: Intro to SQL 📊
Stanford: Databases - Relational Databases and SQL ~ Day 6 📖
Onward to more coding and learning! Let’s keep the momentum going! ⚡