tmpmail

Monday 14 September 2020 by Laposa UK

$ git clone git@github.com:sdushantha/tmpmail.git

$ brew install w3m jq

$ ./tmpmail

[ Inbox for lbdfeenrzfh@1secmail.net ]

 

No new mail


Useful aliases

Tuesday 1 October 2019 by Laposa UK

alias prettyjson='python -m json.tool'

alias pwgen='openssl rand 8 -base64'


Meltdown and Spectre bugs

Tuesday 9 January 2018 by Norbert Laposa

We are receiving questions from our clients about the latest security issues found in CPUs.

Please be asured we are constantly monitoring all security announcements issued by our OS vendor (i.e. https://www.debian.org/security/) and we receive all updates to our email and we apply the changes within 24 hours as part our service.

We can confirm that all our servers are now safe from both the bugs.

Our PCI compliant server customers can are also protected by extra security measures which includes:

  1. It’s a dedicated host fully under our control. No one else can make changes to the operation system. The Meltdown and Spectre bugs are most dangerous in Cloud servers environment, where multiple OS are running on one physical hardware (host), which gives an opportunity to a client OS owner to read information from another OS. This is not possible on this server as there is only one OS, which is under our control.
  2. Hosted websites don’t have FTP/SFTP service available to our customers. No one else can upload a server side executable code (e.g. PHP file), exploring the discovered processor vulnerabilities. 

All other customers are running in a Cloud environment and the OS was fixed by our supplier, see https://forum.bytemark.co.uk/t/meltdown-specture-vulnerabilities-what-were-doing-about-them/2784


Build a raspberry pi webcam server using motion

Tuesday 25 July 2017 by Laposa UK

Install

$ apt install motion

$ vi /etc/motion/motion.conf

Find the following lines and make the following changes. 

  • daemon on 

$ vi /etc/default/motion

Make the following change:

  • start_motion_daemon=no -> start_motion_daemon=yes

Next we need to make sure the motion capture directory is writable

$ chmod 777 /var/lib/motion

Now make sure the camera is connected and start the service with the command:

$ service motion start

To stop the service, the command is:

$ service motion stop

Check locally

Now you can view the camera from a browser on the Pi (or other computer if stream_localhost was set to off) by connecting to your Pi’s IP address and Motion’s default port 8081

http://localhost:8081

Make available from public web server

On motion machine

$ crontab -e 

@reboot /usr/local/bin/open_tunel &

$ vi /usr/local/bin/open_tunel

#!/bin/sh -e
autossh -M 0 -f -T -N mywebserver.example.org -g -R 0.0.0.0:8081:localhost:8081

On public web server machine

vi /etc/apache2/sites-available/mywebserver.example.org-ssl.conf 

<IfModule mod_ssl.c>

<VirtualHost *:443>

    ServerName mywebserver.example.org

    VirtualDocumentRoot /srv/mywebserver.example.org/public_html

SSLCertificateFile /etc/letsencrypt/live/mywebserver.example.org/fullchain.pem

SSLCertificateKeyFile /etc/letsencrypt/live/mywebserver.example.org/privkey.pem

Include /etc/letsencrypt/options-ssl-apache.conf

 

    ProxyPass /motion http://localhost:8081

    ProxyPassReverse /motion http://localhost:8081

 

    ProxyPass /motion.jpeg http://localhost:8081

    ProxyPassReverse /motion.jpeg http://localhost:8081

</VirtualHost>

</IfModule>

 


Onxshop security design

Monday 3 July 2017 by Laposa UK

One great security feature Onxshop has is the way how user uploaded files are saved. Onxshop is saving all files outside of web folder, which means that it is not possible to execute any files uploaded by users. 

Here is an example how effective the Onxshop way is agains this type of security hole.

On our demo site, which is open to public CMS users, somebody tried to upload this .htaccess file, which allows to interpret PNGs as PHP script files. 

var/files/.htaccess
AddType application/x-httpd-php .png

The attacker then uploaded a script similar to this:

var/files/png.png
<?php # Web Shell by oRb
$auth_pass = "63a9f0ea7bb98050796b649e85481845";
$color = "#df5";
$default_action = 'FilesMan';
$default_use_ajax = true;
$default_charset = 'Windows-1251';
preg_replace("/.*/e","********");

Of course, it was rendered as completely useless and the attacker didn't gain any access to the website.

For example in Wordpress, backdoors can be hidden in scripts similar to this: /wp-content/upgrade/wp-mails.php

It looks like a genuine Wordpress script, but it's actually a file uploaded under a CMS user. This type of files are then used for sending spams, or executing DDoS attack.


Archive

Categories

58 Howard Street
Belfast BT1 6PJ

Send email

+44 (28) 9032 8988
+353 (48) 9032 8988