candace michelle nude photos
sex with serena williams JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: wet pussy orgasm video, free porn on pc, or unprotected sex pregnancy chances. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the best food before sex one-timeaisha clan clan porn We charge money because it costs us $3,400 anal vs vaginal sex per month for bandwidth bills alone, and since we don't believe in shoving popup ads to our registered users, we try to make the money back through forum registrations.
picture of the pussysex vedios to watchyoung incest porn picsnikki reed nude photos
  • Post
  • Reply
sarehu
Apr 20, 2007

(call/cc call/cc)

new free sex movies

Prime numbers exist above 10,000, so the claim that 9533 is the largest prime is pretty laughable. As for why, I'm not a Mathematician so I won't explain it in a rigorous way, but intuitively there's nothing particularly special about "10,000" to think that there aren't prime numbers larger than that.
Um. The problem is, you can't just be greater than 10,000. You also have to be greater than 9,999, 9,898, and 9,876. That makes the barrier a bit thicker.

morgan sex project 5

Adbot
ADBOT LOVES YOU

real sex hbo download

RISCy Business
Jun 17, 2015

bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork


Fun Shoe

related to the recent dell stuff, i was just linked this: free pink porn video

arbitrary service tag disclosure via dell's "tribbles" software.

free full porn download

RISCy Business
Jun 17, 2015

bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork


Fun Shoe

also, seems that a new POS malware that is extremely sophisticated is making the rounds: the dreamers nude scenes

quote:

‘ModPOS is highly modular and can be configured to target specific systems with components such as uploader/downloader, keylogger, POS RAM scraper and custom plugins for credential theft and other specialized functions like network reconnaissance. We believe other capabilities could also be leveraged. The modules are packed kernel drivers that use multiple methods of obfuscation and encryption to evade even the most sophisticated security controls.’

14 inch dick porn

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.


Taco Defender

nude teen mirror pics

also, seems that a new POS malware that is extremely sophisticated is making the rounds: free mobile porn videod




Not particularly special in terms of its capabilities, but it has been floating about for a while it appears. Here's some links to look at:

old lesbian young lesbian
watch hindi porn online

I can't share the report directly as it's tied to my work account, but I can share excerpts:

quote:

iSIGHT Partners has been tracking a sophisticated malware framework with individual modules that are difficult to detect and are typically packed kernel drivers, suggesting the malware author’s sophistication level is high.

One module of this framework has been observed capturing credit card track data out of memory and associating itself to a point-of-sale (POS) environment. This indicates possible targeting of any sector that uses POS systems, including retail, food services, hospitality and health care.

It should be noted that it has probably been picked up in the wild by an AV vendor well before this report came out (as per my previous links) but iSIGHT is the first team to figure out what is going on here.

quote:

This driver contains the actual POS scraper code that collects credit card track data from memory. We believe the malware authors target specific POS software processes; however, in one sample we observed the malware injecting code into credit.exe and hooking the “__vbaStrCopy” function. Stolen credit card data is AES-256 encrypted and stored in the Windows Installer directory using random characters for the filename and a “.bin” filename extension, such as C:\WINDOWS\Installer\{GUID}_<random_characters>.bin.

A “.dat” file may also be created in this same directory. Encrypted status logs are stored in Temp using a .temp filename extension. A .bin file may also be created in this same directory.

dark tube free sex is sex like porn Lain Iwakura fucked around with this message at Nov 24, 2015 around 23:23

MF_James
May 8, 2008
ga sex offender law anna hathaway sex scene youtube vanessa hudgens naked I CANNOT HANDLE BEING CALLED OUT ON MY DUMBASS OPINIONS ABOUT ANTI-VIRUS AND SECURITY. I REALLY LIKE TO THINK THAT I KNOW THINGS HERE

INSTEAD I AM GOING TO WHINE ABOUT IT IN OTHER THREADS SO MY OPINION CAN FEEL VALIDATED IN AN ECHO CHAMBER I LIKE


mr nude seattle 2009

Not particularly special in terms of its capabilities, but it has been floating about for a while it appears. Here's some links to look at:

auto erotic asphyxiation porn
free streaming porn amateur

I can't share the report directly as it's tied to my work account, but I can share excerpts:


It should be noted that it has probably been picked up in the wild by an AV vendor well before this report came out (as per my previous links) but iSIGHT is the first team to figure out what is going on here.

This is precisely why our credit data does not hit our internal systems at retail locations, it (somewhat) traverses the same network, segmented via VLAN to the router and goes straight out to the credit processor. We USED to handle credit reconciliation, but decided to get out of the extreme PCI hell (and legal liability) and pay a 3rd party to assume the risk. basically you swipe a card on the verifone, it's segmented on say VLAN 3 which nothing else lives on, and that heads from switch to router and off to credit processor, our hands are (mostly) wiped clean of all those shenanigans.

sex between two females

M_Gargantua
Oct 16, 2006

STOMPIN' ON INTO THE POWER LINES

Toilet Rascal

I was wondering something about the practical side of security for disk encryption. If I don't have FDE equipped drives is it more secure to use software based encryption on the whole drive and have encrypted containers on it or to have multiple logical volumes encrypted with different passwords.

My use is very mundane. Mostly I want to have my music on the same drive as everything else, but have everything on the drive encrypted. I want to get back to using encryption as a common part of my habits. So should I have the mundane items on a separate logical volume or is bundling it all together equally secure? Probably going to go with Veracrypt unless there's something glaring that I haven't turned up?

lesbian kissing sex video

RISCy Business
Jun 17, 2015

bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork


Fun Shoe

i honestly don't know, that's kind of a weird setup since i'm used to people either encrypting everything or nothing.

is this going to be for linux or something else?

submitted home sex videos

RISCy Business
Jun 17, 2015

bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork


Fun Shoe

ok, i misread your post, sorry

i think you're overthinking this- you're better off using free teens naked videos if you're on linux; as for windows/mac, i really don't know since i haven't really used encryption on either (don't own any macs and my gaming pc doesn't need to be encrypted)

erotic massage sex stories

Antillie
Mar 14, 2015



I don't see much reason to bother splitting data up between multiple encrypted volumes if each of them is going to use the same encryption and have a password of equal complexity. I guess having multiple volumes would force an attacker to try and break each one individually but breaking just one should be essentially impossible anyway. And if some flaw in VeraCrypt/TrueCrypt allows an attacker to break one volume easily they would be able to break multiple volumes the same way anyway.

For me the question would be whether or not to have a separate or even an unencrypted volume for the OS. If I have an unencrypted volume for the OS then I can boot the machine and use it for basic things like web surfing and email without needing to mount the encrypted data volume. This allows other people to use the PC without needing to know a password and it keeps your encrypted data safe and unmounted when you are not using it. The downside of course is that you, and other people, can use the PC without needing a password and poke around on the OS drive all they like and look for stuff that you might have accidentally saved there and forgotten to move to the encrypted volume.

If you encrypt the entire drive, OS and all, then you would need to enter the password for the encryption every time the machine boots up. This is nice for keeping people from using your PC but it could get annoying if you ever have to reboot frequently for any reason. It also means that your data is mounted and accessible at all times when the machine is running. This is convenient but also reduces the security of your data as VeraCrypt/TrueCrypt are intended to secure data at rest when the volume is not mounted.

I think the best of both worlds would probably be to have the OS on one volume and your data on another volume with both volumes encrypted with very different passwords. That way you can give out the OS volume password to people who you want to allow to use the PC and it keeps random people from poking around on the OS drive without the password. And your data is still safely unmounted when you are not using it but simply checking your email or whatever.

best sex position pic

wyoak
Feb 14, 2005

sex scene in films a glass case of emotion


Fallen Rib

How common is DNS-based command and control / data exfiltration at this point? Does it only show up in APT-level attacks or has it started to filter down to more off-the-shelf type malware?

sleeping free porn video

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.


Taco Defender

free video porn anal

How common is DNS-based command and control / data exfiltration at this point? Does it only show up in APT-level attacks or has it started to filter down to more off-the-shelf type malware?

Here's a question for you: what is an APT and why do you use that term?

daisy marie porn eskimo

wyoak
Feb 14, 2005

interracial sex movie thumbs a glass case of emotion


Fallen Rib

jennifer freeman sex scene

Here's a question for you: what is an APT and why do you use that term?
It's a bad acronym, but I mean high level attacks that are aimed specifically at a certain target.

Actually just ignore that part completely, how common is communication over DNS these days?

watch after sex movie free high quality porno wyoak fucked around with this message at Nov 25, 2015 around 19:38

Pile Of Garbage
May 28, 2007

sex vids for psp jeanne tripplehorn nude scene The poster formerly known as piss cheese-cube.





Not very, assuming you're referring to "tunnelling" via udp/53 for the purpose of exfil/C&C. It's extremely easy to spot and there are far better methods available.

cum on her pussy

sarehu
Apr 20, 2007

(call/cc call/cc)

burning during anal sex

I was wondering something about the practical side of security for disk encryption. If I don't have FDE equipped drives is it more secure to use software based encryption on the whole drive and have encrypted containers on it or to have multiple logical volumes encrypted with different passwords.

Encrypt the whole thing, enter your password at boot. Do bitlocker with the whole drive, or whole of C: or whatever, or VeraCrypt, or do the Linux version where you install it with one (1) encrypted LVM. Your swap partition should be encrypted, your "OS" stuff should be encrypted, all under the same thing, because what if it writes data there, like some log file or Tmp file?

The whole purpose of this is if somebody steals your laptop from your car, or breaks into your house and steals your computer. Nobody's gonna cold-boot your stuff, you aren't going to get held up at gunpoint and be thankful your "important" stuff is on a different VM that was locked at the moment. (If that were a realistic concern, you should be using a completely separate computer.)

chinese baby sex prediction

dougdrums
Feb 25, 2005

kate mulgrew nude pics bonnie jill laflin naked jerking off before sex MORTAL KOMBfree porn amatuer movies ---
watch lesbian sex movies Uh, never mind. You're basically tonguing a nuke's butthole right now.


bijou phillips nude video

Can you explain the mathematics for the first bit for everyone else who's interested in understanding why?

This is free download dvd sex. (In this case, free pussy sex videos probably has a simpler explanation, next to scanning a textbook.)

Also, small primes can be easily guessed, which is supposed to be the hard part about RSA.

nude photos of milfs

I was wondering something about the practical side of security for disk encryption. If I don't have FDE equipped drives is it more secure to use software based encryption on the whole drive and have encrypted containers on it or to have multiple logical volumes encrypted with different passwords.

My use is very mundane. Mostly I want to have my music on the same drive as everything else, but have everything on the drive encrypted. I want to get back to using encryption as a common part of my habits. So should I have the mundane items on a separate logical volume or is bundling it all together equally secure? Probably going to go with Veracrypt unless there's something glaring that I haven't turned up?

I don't think there's any reason not to just encrypt everything. I'm not sure what the windows equivalent is, but I've used the single group LVM/LUKS approach sarehu mentioned without any issues, and without doubting it. You only need one key, too. I also wouldn't trust the OS to not write something telling with multiple volumes mounted. Also it's easy to make sure that my swap partition/file is encrypted.

This is what I'm talking about : free sex videos classic. You just leave the boot partition unencrypted. I think there's a way to finagle GRUB into using an encrypted kernel image and initramfs too, but I never tried.

top 20 nude scene cause of teen suicide dougdrums fucked around with this message at Nov 28, 2015 around 15:15

RISCy Business
Jun 17, 2015

bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork


Fun Shoe

bbw with hairy pussy

angler ek + cryptowall info with pcaps and samples

adult porn video tube

NOP sled fred
Jan 18, 2004

free pregnant porn pictures ~*lukecagefan69*~




Pillbug

free 24 7 porn

It seems like when people get to brute force passwords these days it's because they were able to get the hashes via a compromised account and download the table, rather than somebody hammering a webserver or something.

It's still annoyingly common unfortunately. Apple iCloud celebrity nudes thing was cause they didn't have rate limiting on the webserver for instance.

best porn youtube sites

RISCy Business
Jun 17, 2015

bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork


Fun Shoe

facebook refuses to pay out bug bounty based on arbitrary, unwritten rules: naked chef takes off

father daughter sex comics

Wiggly Wayne DDS
Sep 11, 2010





Nap Ghost

free lactating lesbian movies

facebook refuses to pay out bug bounty based on arbitrary, unwritten rules: free 3d porn comix
have you been near a bug bounty in your life? the man went well beyond scope and is lucky he isn't in jail

aubrey oday naked pictures

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.


Taco Defender

teen pregnancy risk factors

facebook refuses to pay out bug bounty based on arbitrary, unwritten rules: famous cartoon porn pictures

Uh. Did you read the article? He did get paid.

monique fuentes free porn

KS
Jun 10, 2003


Outrageous Lumpwad

the sex machine movie

Response from Facebook CSO.

big boobs tits porn

RISCy Business
Jun 17, 2015

bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork


Fun Shoe

lara croft nude patch

have you been near a bug bounty in your life? the man went well beyond scope and is lucky he isn't in jail

considering he didn't touch any user data, only confirm he was able to pivot to a bucket free porno big tit containing user data, i'd say he was fairly safely within scope

now, if he had downloaded, altered, accessed or otherwise gotten at user data instead of just the bucket it was hosted on, then i'd agree with you, but it's pretty clear that he didn't

also, the timeline didn't load for me initially so i was unaware that he got paid, but i'd still say that what he found is deserving of a fair bit more than what he got

naruto porn pics free

Wiggly Wayne DDS
Sep 11, 2010





Nap Ghost

paris hilton sex vidoes

considering he didn't touch any user data, only confirm he was able to pivot to a bucket best asian porn film containing user data, i'd say he was fairly safely within scope

now, if he had downloaded, altered, accessed or otherwise gotten at user data instead of just the bucket it was hosted on, then i'd agree with you, but it's pretty clear that he didn't

also, the timeline didn't load for me initially so i was unaware that he got paid, but i'd still say that what he found is deserving of a fair bit more than what he got
a bug bounty is a test of the perimeter, you are not allowed to go past that (or use materials you've gained from past compromises on third-party services i.e. AWS)

he kept a copy of undisclosed sensitive material for over a month after notifying them of the initial bug, then worked off of that to try and pull more payments

you'd be pushing the limits on a pentest by doing this, nevermind a bug bounty

naked asian girls dancing

RISCy Business
Jun 17, 2015

bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork bork


Fun Shoe

my sex ga es

also it turns out juniper hosed up and their netscreen vpn can potentially be MITM'd, at least that's what i'm gleaning from what i've seen so far

free squirting lesbian videos

Wiggly Wayne DDS
Sep 11, 2010





Nap Ghost

free porn pics lesbian

free sex tv live

also it turns out juniper hosed up and their netscreen vpn can potentially be MITM'd, at least that's what i'm gleaning from what i've seen so far
intentionally planted source code causing a security compromise for admin access and vpn decryption. you can also glean that their largest customer is SWIFT, and the attackers are very likely to be outside the scope of possible defenses given the resources this must have taken. i wouldn't call it them loving up, if anything good on them for finding a backdoor and disclosing that to their customers rather than talking around the issue

bible black lesbian video

Ham Sandwiches
Jul 7, 2000



funny animated sex videos

Here's a question for you: what is an APT and why do you use that term?

You can substitute the word "targeted attack" for APT when you see the term if you want to:

(A) get the gist of what the person is saying
(B) not make a giant production over the stupid "WHAT IS AN APT REALLY?" argument

sexy nude black models

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.


Taco Defender

monica bellucci nude photo

You can substitute the word "targeted attack" for APT when you see the term if you want to:

(A) get the gist of what the person is saying
(B) not make a giant production over the stupid "WHAT IS AN APT REALLY?" argument

Yeah. No. You're not answering the question correctly. How did you come to this conclusion that those two answers are acceptable?

nude big brother girls

Ham Sandwiches
Jul 7, 2000



free downloads psp porn

Yeah. No. You're not answering the question correctly. How did you come to this conclusion that those two answers are acceptable?

I seem to be able to understand that guy's question, and you seem to be struggling. Is there a reason for this?

abstinence only sex education

Wiggly Wayne DDS
Sep 11, 2010





Nap Ghost

rape sex for free

I seem to be able to understand that guy's question, and you seem to be struggling. Is there a reason for this?
You're not willing to try and understand a concept, so are taking shortcuts to avoid the tough questions?

porn websites for free

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.


Taco Defender

free porn lesbian movies

I seem to be able to understand that guy's question, and you seem to be struggling. Is there a reason for this?

No. You do not understand the guy's question nor did you answer mine. Again, answer my question: how did you come to the conclusion that APT stands for what you have described to me? Do you know the origins of "APT" for that matter?

men women have sex

Ham Sandwiches
Jul 7, 2000



laura michelle prestin naked

You're not willing to try and understand a concept, so are taking shortcuts to avoid the tough questions?

So by being able to parse a fairly simple question, I am taking shortcuts to avoid asking tough questions? Uhh, what?

Like, if a guy comes into the infosec thread and asks a simple question about dns malware, such as whether using DNS callbacks for C2 communications is prevalent among commodity malware these days or whether it's generally the hallmark of targeted attacks, seems straightforward. Or can you guys not parse that simple of a question?

[edit]Really, my credentials on APT for a freaking acronym holy hell.

brooke skye naked pics

Ham Sandwiches
Jul 7, 2000



sex vids tube 8

No. You do not understand the guy's question nor did you answer mine. Again, answer my question: how did you come to the conclusion that APT stands for what you have described to me? Do you know the origins of "APT" for that matter?

Hello, using my expert knowledge, I have reconstructed this guy's impossible to parse query as:

"Is malware using DNS callbacks for C2 communication generally limited to malware that would be used in targeted attacks, or would also be found in commodity malware such as crimeware, ransomware, etc"

the venture bros porn

Wiggly Wayne DDS
Sep 11, 2010





Nap Ghost

lesbian pussy licking porn

So by being able to parse a fairly simple question, I am taking shortcuts to avoid asking tough questions? Uhh, what?
This is called a shortcut:

sex girl on top

You can substitute the word "targeted attack" for APT when you see the term if you want to:

(A) get the gist of what the person is saying
(B) not make a giant production over the stupid "WHAT IS AN APT REALLY?" argument
You're substituting a phrase for an entirely different one, while avoiding talking about what the original phrase means, or explaining why your substitution was appropriate and accurate.

lesbian videos tube 8

Like, if a guy comes into the infosec thread and asks a simple question about dns malware, such as whether using DNS callbacks for C2 communications is prevalent among commodity malware these days or whether it's generally the hallmark of targeted attacks, seems straightforward. Or can you guys not parse that simple of a question?

[edit]Really, my credentials on APT for a freaking acronym holy hell.
You opted into answering the question, don't be surprised if you get replies back. No one asked you for credentials, and you are entirely missing the point of the original question.

tight dripping wet pussy

Ham Sandwiches
Jul 7, 2000



hardcore porn pic gallery

This is called a shortcut:

You're substituting a phrase for an entirely different one, while avoiding talking about what the original phrase means, or explaining why your substitution was appropriate and accurate.

Are you familiar with the term 'paraphrase'

quote:

You opted into answering the question, don't be surprised if you get replies back. No one asked you for credentials, and you are entirely missing the point of the original question.

I don't know what the gently caress you're saying to me in this exchange, and I have a feeling you don't either. A guy asked a pretty simple question and got told to gently caress off by someone who was too dumb to understand what he was asking. I pointed out that the question was simple and straightforward, then paraphrased the question when pressed. That's about it. Hopefully we are now on the same page and can return to the exciting topic of infosec and malware discussion.

Would either of you august gentlemen care to weigh on whether you think DNS based C2 communications are typically used in more targeted attacks as opposed to say malware that uses HTTPS based callbacks? What about malware that uses google blogs and fake webpages for C2? Or are we still ignoring that guy's question as if it can't possibly be answered?

sex therapy g spot

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.


Taco Defender

porn movies free mature

Would either of you august gentlemen care to weigh on whether you think DNS based C2 communications are typically used in more targeted attacks as opposed to say malware that uses HTTPS based callbacks? What about malware that uses google blogs and fake webpages for C2? Or are we still ignoring that guy's question as if it can't possibly be answered?

Okay. First off all, stop talking as if you're getting hurt by my asking questions about your inability to understand that "APT" doesn't mean "targeted attack". If you had any clue about what you were talking about, you'd understand that "APT" was a term created by Mandiant to describe a group that was a "state actor", not a "targeted attack" or some other nonsense that you picked up from some marketing brochure at a lovely vendor event. I am not trying to malign your ego here by making you state your credentials as if you had any reading comprehension skills, you'd have noticed I did not once ask that. All I asked is if you understood what "APT" means and just like a lot of people out there, you do not.

Only one vendor is allowed to use "APT" and that is Mandiant/FireEye, as they use it to describe what they suspect as state actor groups. The term is misused just as much as "0-day". So unless you are describing a state actor, an "APT" is not a loving targeted attack.

Now to answer your question: what the gently caress are you trying to get at? Targeted attacks will use any means to get out with whatever level of obfuscation. Any malware author engaging in a targeted attack will have scoped out your network enough to determine whether or not they need to communicate over DNS, HTTP, or the hell of it, UUCP. If I am going to target your organization, I sure as gently caress am going to use whatever means to get out.

This seems like an un-researched question really because if you had any clue about "targeted attacks", you'd not be asking how they'd engage in them.

sex with older mom

Wiggly Wayne DDS
Sep 11, 2010





Nap Ghost

how whales have sex

Are you familiar with the term 'paraphrase'


I don't know what the gently caress you're saying to me in this exchange, and I have a feeling you don't either. A guy asked a pretty simple question and got told to gently caress off by someone who was too dumb to understand what he was asking. I pointed out that the question was simple and straightforward, then paraphrased the question when pressed. That's about it. Hopefully we are now on the same page and can return to the exciting topic of infosec and malware discussion.

Would either of you august gentlemen care to weigh on whether you think DNS based C2 communications are typically used in more targeted attacks as opposed to say malware that uses HTTPS based callbacks? What about malware that uses google blogs and fake webpages for C2? Or are we still ignoring that guy's question as if it can't possibly be answered?
Their question was already answered:

real sex positions pictures

It's a bad acronym, but I mean high level attacks that are aimed specifically at a certain target.

Actually just ignore that part completely, how common is communication over DNS these days?

sex blogs for women

Not very, assuming you're referring to "tunnelling" via udp/53 for the purpose of exfil/C&C. It's extremely easy to spot and there are far better methods available.

hema malini sex videos

Ham Sandwiches
Jul 7, 2000



paper on teen pregnancy

Okay. First off all, stop talking as if you're getting hurt by my asking questions about your inability to understand that "APT" doesn't mean "targeted attack". If you had any clue about what you were talking about, you'd understand that "APT" was a term created by Mandiant to describe a group that was a "state actor", not a "targeted attack" or some other nonsense that you picked up from some marketing brochure at a lovely vendor event. I am not trying to malign your ego here by making you state your credentials as if you had any reading comprehension skills, you'd have noticed I did not once ask that. All I asked is if you understood what "APT" means and just like a lot of people out there, you do not.

Only one vendor is allowed to use "APT" and that is Mandiant/FireEye, as they use it to describe what they suspect as state actor groups. The term is misused just as much as "0-day". So unless you are describing a state actor, an "APT" is not a loving targeted attack.

Now to answer your question: what the gently caress are you trying to get at? Targeted attacks will use any means to get out with whatever level of obfuscation. Any malware author engaging in a targeted attack will have scoped out your network enough to determine whether or not they need to communicate over DNS, HTTP, or the hell of it, UUCP. If I am going to target your organization, I sure as gently caress am going to use whatever means to get out.

This seems like an un-researched question really because if you had any clue about "targeted attacks", you'd not be asking how they'd engage in them.
So doesn't that seem like a really useless definition of APT? "The proper, empirical definition of APT is that this one company made up a specific term for state actors but you can only use it in their original, intended way." It was coined in a specific way, but it gets used generally.

When people use the term APT colloquially, they mean "An attack where a guy or organization is targeting me." Does that mean a guy in a chinese military center doing dumps of your dc / exchange server or does it mean a russian crimeware guy trying to put POS malware on some system, it doesn't matter. It means that a guy is spending effort and assigning an operator to accomplish a task.

And yes, in general, I do feel there is a correlation between the evasion techniques being used and whether an attack is targeted or not. "Good enough" is the motto for obfuscation and, in general, obfuscation techniques are not used where they will add unnecessary complexity or where they threaten to burn a technique through common usage that is not worth coming up with countermeasures for.

You should not expect to see any DNS based C2 communication with things like cryptolocker. If you are seeing DNS based C2 communication, you probably aren't dealing with cryptolocker.

This answer:

quote:

cheese-cube posted:

Not very, assuming you're referring to "tunnelling" via udp/53 for the purpose of exfil/C&C. It's extremely easy to spot and there are far better methods available.

So I think this answer is worth clarifying. Using UDP 53 for large data transfers is basically unheard of, yes. However, using DNS queries to both send and receive commands to compromised hosts is quite common and effective, simply because there's so many DNS queries to hide in and most DNS servers do not (did not) log queries due to performance and disk issues.

Here's a writeup on DNS based C2:
teen driving accidents statistics

love making sex positions

Wiggly Wayne DDS
Sep 11, 2010





Nap Ghost

tens unit for sex

So doesn't that seem like a really useless definition of APT? "The proper, empirical definition of APT is that this one company made up a specific term for state actors but you can only use it in their original, intended way." It was coined in a specific way, but it gets used generally.

When people use the term APT colloquially, they mean "An attack where a guy or organization is targeting me." Does that mean a guy in a chinese military center doing dumps of your dc / exchange server or does it mean a russian crimeware guy trying to put POS malware on some system, it doesn't matter. It means that a guy is spending effort and assigning an operator to accomplish a task.

And yes, in general, I do feel there is a correlation between the evasion techniques being used and whether an attack is targeted or not. "Good enough" is the motto for obfuscation and, in general, obfuscation techniques are not used where they will add unnecessary complexity or where they threaten to burn a technique through common usage that is not worth coming up with countermeasures for.

You should not expect to see any DNS based C2 communication with things like cryptolocker. If you are seeing DNS based C2 communication, you probably aren't dealing with cryptolocker.

This answer:


So I think this answer is worth clarifying. Using UDP 53 for large data transfers is basically unheard of, yes. However, using DNS queries to both send and receive commands to compromised hosts is quite common and effective, simply because there's so many DNS queries to hide in and most DNS servers do not (did not) log queries due to performance and disk issues.

Here's a writeup on DNS based C2:
nikki fritz porn video
If you're going to clarify something have the decency to tell someone you have no experience or knowledge on the subject. Your post is a mix of the obvious, the misguided, and the ignorant and attempting to give a point by point breakdown is a waste of everyone's time. As a starter though the evasion technique parts goes without saying, then you suddenly limited the class of malware using dns tunneling to ransomware, and finish it off by clarifying on how a port being used for large data transfers is "unheard of", then immediately contradict yourself.

best way have sex pamela anderson free sex Wiggly Wayne DDS fucked around with this message at Dec 18, 2015 around 02:21

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.


Taco Defender

velma scooby doo porn

So doesn't that seem like a really useless definition of APT? "The proper, empirical definition of APT is that this one company made up a specific term for state actors but you can only use it in their original, intended way." It was coined in a specific way, but it gets used generally.

When people use the term APT colloquially, they mean "An attack where a guy or organization is targeting me." Does that mean a guy in a chinese military center doing dumps of your dc / exchange server or does it mean a russian crimeware guy trying to put POS malware on some system, it doesn't matter. It means that a guy is spending effort and assigning an operator to accomplish a task.

No. I am giving you the definition based on the organization that actually created the term "APT" (which if you are unsure because so far I believe you are, stands for "Advanced Persistent Threat"). You're giving the definition of APT based on how you've been marketed to. I am not sure why you're trying to refute this unless you're in marketing for an anti-virus firm or some company that claims to be "next-generation" [insert poo poo box here].

When people (like you and many others) throw the term "APT" around, they mean that "they have no clue what they're talking about but have bought into the hot new buzz word to try and push their poo poo products". When someone says that they offer "APT protection", they're just offering protection from threats. No specific product is going to protect you from a targeted attack because as the statement reads: it's a targeted attack, meaning that you've been scoped out, researched, and they've crafted their attack specifically at you and nobody else. This is the sort of thing that a vendor will have a hard time defending against because of the fact that whatever protections you have in place could become meaningless because the aggressor has taken that poo poo into account.

Throwing around "APT" generally means you have no clue and probably shouldn't be talking as some sort of expert in here. Unless you work for FireEye/Mandiant, you have no loving business using that term.

quote:

And yes, in general, I do feel there is a correlation between the evasion techniques being used and whether an attack is targeted or not. "Good enough" is the motto for obfuscation and, in general, obfuscation techniques are not used where they will add unnecessary complexity or where they threaten to burn a technique through common usage that is not worth coming up with countermeasures for.

You have no clue how a targeted attack works.

quote:

You should not expect to see any DNS based C2 communication with things like cryptolocker. If you are seeing DNS based C2 communication, you probably aren't dealing with cryptolocker.

Why are we talking about this in relation to CryptoLocker? By the way, why are you bringing up malware from 2013 in relation to a targeted attack? Or are you going on unrelated tangents in some feeble attempt to demonstrate knowledge in something?

quote:

So I think this answer is worth clarifying. Using UDP 53 for large data transfers is basically unheard of, yes. However, using DNS queries to both send and receive commands to compromised hosts is quite common and effective, simply because there's so many DNS queries to hide in and most DNS servers do not (did not) log queries due to performance and disk issues.

OK. Great. Why are you going on about this in relation to targeted attacks?

nina mercedez sex videos

Adbot
ADBOT LOVES YOU

dani jensen free porn

Mr Chips
Jun 27, 2007
photo of oral sex Whose arse do I have to blow smoke up to get rid of this baby?


free old pussy videos

. Unless you work for FireEye/Mandiant, you have no loving business using that term.
If no-one ITT works for them, can we stop talking about it?

camel toe porn vids

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply
chat sites for sexthe venture brothers pornteen boys big cocksjordana brewster nude photos
sex with friends father