Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - mcc85

#1
https://github.com/secure-digits-plus-llc/Hybrid-DesiredStateController

https://www.youtube.com/watch?v=zVsviPCg4Vk

I'm rebuilding the Microsoft Deployment Toolkit in addition to other various Microsoft technologies and software, in order to provide a rapid and dynamically expandable and deployable software/firmware [network of any size] architecture that would include the distribution of OPNSense, Linux, OSX, Windows Server/10, Android, iOS, etc.

Basically, a concat of Intune and SCCM, but doesn't suck or is slow or costs a fortune.

I have too much on my plate at the moment, but I have done a bit of research into getting OPNsense working natively with Powershell so that it can be remotely controlled or configured using a Powershell template.

I have a root variable generator that I would like to use in order to 1) modify an existing OPNSense configuration file (xml), and 2) interact with the router out of the box/after a fresh installation. I already know how to do these things, as well as generate SSC's to deploy to a domain. The certificates you'll see in the video were generated with your firmware, and it will inject those certificates as needed to every customer or client I service.

There are many other avenues I would like to explore, but so far, everything in my network uses freely distributable tools and firmware that is based on a mixture of FreeBSD, Windows, and Linux in some form or another.

Simply put, there are expensive alternatives out there that do these things, and I'm... looking to develop a way to rub my nose at all of them. That doesn't mean I'm looking to violate or reverse engineer the firmware provided by companies that charge money for licensing or usage, it just means that I have an axe to grind against Microsoft for making this contradiction of a project called 'Windows'... you're supposed to be able to see through Windows but Microsoft isn't very transparent after all. I could use any assistance whatsoever in order to provide an end result that you can see in either the script I've posted above, or in the video.

I've been constantly changing/amending/upgrading and replacing my script process, but ultimately, the goal is to establish a heightened sense of security that revolves around dynamically changeable root variables such as passwords, templates, applications, plugins, drivers, etc - and the total end result I am looking to achieve, is to establish a way to combat cybercriminal activities that have become so advanced, that even security software such as Norton, McAfee, Malwarebytes, Kaspersky... All of this software is missing threats. Some of the newest and most advanced scripts and programs hide in legitimate paths, or names, or even clone GUID's of running programs or drivers on a machine... Then they change firewall entries in order to remain in plain sight...

Sometimes these malicious codes remain on a system for a number of days, weeks, or months before a trigger condition is met and as such, the victims are then scammed out of their money or account information... which ultimately leads them into the business I run which services all end users.

https://www.securedigitsplus.com

I am looking to create dynamically executable instructions which would seek to mitigate even the most intelligently written scripts and methods which use any combination of the cyber-criminal countermeasures that I list on my site. I make no reservation about what I know. I could indeed perform black hat activities and cause anarchy? But I am a white hat with a firm understanding of the gray. When people come to me looking for help and the police can't help them, or the NSA can't even get back to them, or when identity theft or everything else continues to happen on a daily basis, I realized one thing.

No one is going to help these people, because few people understand HOW to help these people. As far as I'm concerned, if a customer of mine pays for security software and then gets hacked, then in my opinion, the security software that they paid for should 1) be reimbursed in entirety, and 2) that business should probably stop pretending to know how to do their jobs, and maybe go retire in the Bahamas or something dumb, IDFK.

I realize that's a strong statement, but you know what? I'm starting to see way too many people brush it off and not care about the fact that their grandmother got swindled out of 20,000 and nobody could stop it from happening a 2nd time even after she went to the proper authorities who were supposed to handle it. Basically what I'm suggesting here, is that people you're paying a lot of money to service you 1) suck at their jobs, and 2) aren't being held liable for it continuing to happen on a daily basis.

Does it fall onto the responsibility of the end user when they're of the age that they barely have the capability of even using the internet to begin with? Easy victims to black hats, I'm sure they don't care about who they hurt. I don't think that it's the end user's responsibility when all they do is play 'Pogo' or 'check out facebook posts' or 'check their email'. There will be a day where some of you who read this will be too old to understand how the internet works in the future, and it may happen to you. I aim to do better than everyone else cares to, because it's just not f'ing acceptable to me anymore.

I do. And I aim to put a stop to it from the ground up, and not one person has helped me sculpt this process, I've corresponded with Michael Neihaus from Microsoft and basically called him an idiot and/or shill for starting a project he obviously didn't know how to finish, and this script is a large part of that intention... to finish that project. While I don't intend to pay a dime for the necessary software to ensure that it is built to the standards I'm looking to provide, I do often have to make compromises where I either think about just doing things an easier and faster way, or, let a company or individual who thinks they're good at programming decide to give me advice. I could give you a list of people I've called out... it won't help. At this point, I am actively engaged in getting people's f'ing attention because frankly, no one cares about what I'm after until I insult their intelligence, capabilities, or revenue stream.

I started programming this script in November, it was a batch file script, it became clear to me that Powershell was the way to go, and since this past Christmas, I have learned everything in this script. I had little prior programming experience and that's not to say I couldn't learn more? It's just saying that I was relentless about it and put the entire world on hold to catch up to the most advanced programmers out there. Probably because when you sample enough testing methodology, you learn how to use tools that nobody else even thought of.

Sort of the same sentiment these black hats are after.

At some point, I will get the necessary business licenses to offload some of the responsibilities and modules, but so far, my research has told me that what I am to do is not only possible? It's inevitable.

Should anyone wish to participate either to beta test what I'm building or to help me sculpt the process even more? I'm more than happy to take on people that actually know what they're doing. I'm not an expert in your software. I'm not a millionaire and I have spent the last 3 months barely surviving and being basically flat broke studying and researching ways to make the video and scripts that I've posted above. Why? I don't know, probably because most people want to see results before they believe it's not a complete waste of time.

- Michael Cook
#2
***GOT REQUEST TO AUDIT SECURITY***
Fetching vuln.xml.bz2: .......... done
py27-yaml-3.13 is vulnerable:
py-yaml -- arbitrary code execution
CVE: CVE-2017-18342
WWW: https://vuxml.freebsd.org/freebsd/f6ea18bb-65b9-11e9-8b31-002590045d9c.html

hostapd-2.7_1 is vulnerable:
FreeBSD -- EAP-pwd side-channel attack
CVE: CVE-2019-9495
WWW: https://vuxml.freebsd.org/freebsd/60129efe-656d-11e9-8e67-206a8a720317.html

hostapd-2.7_1 is vulnerable:
FreeBSD -- SAE confirm missing state validation
CVE: CVE-2019-9496
WWW: https://vuxml.freebsd.org/freebsd/98b71436-656d-11e9-8e67-206a8a720317.html

hostapd-2.7_1 is vulnerable:
FreeBSD -- EAP-pwd message reassembly issue with unexpected fragment
WWW: https://vuxml.freebsd.org/freebsd/a207bbd8-6572-11e9-8e67-206a8a720317.html

hostapd-2.7_1 is vulnerable:
FreeBSD -- SAE side-channel attacks
CVE: CVE-2019-9494
WWW: https://vuxml.freebsd.org/freebsd/7e53f9cc-656d-11e9-8e67-206a8a720317.html

hostapd-2.7_1 is vulnerable:
FreeBSD -- EAP-pwd missing commit validation
CVE: CVE-2019-9499
CVE: CVE-2019-9498
CVE: CVE-2019-9497
WWW: https://vuxml.freebsd.org/freebsd/2da3cb25-6571-11e9-8e67-206a8a720317.html

wpa_supplicant-2.7 is vulnerable:
FreeBSD -- SAE confirm missing state validation
CVE: CVE-2019-9496
WWW: https://vuxml.freebsd.org/freebsd/98b71436-656d-11e9-8e67-206a8a720317.html

wpa_supplicant-2.7 is vulnerable:
FreeBSD -- SAE side-channel attacks
CVE: CVE-2019-9494
WWW: https://vuxml.freebsd.org/freebsd/7e53f9cc-656d-11e9-8e67-206a8a720317.html

wpa_supplicant-2.7 is vulnerable:
FreeBSD -- EAP-pwd side-channel attack
CVE: CVE-2019-9495
WWW: https://vuxml.freebsd.org/freebsd/60129efe-656d-11e9-8e67-206a8a720317.html

wpa_supplicant-2.7 is vulnerable:
FreeBSD -- EAP-pwd missing commit validation
CVE: CVE-2019-9499
CVE: CVE-2019-9498
CVE: CVE-2019-9497
WWW: https://vuxml.freebsd.org/freebsd/2da3cb25-6571-11e9-8e67-206a8a720317.html

wpa_supplicant-2.7 is vulnerable:
#3
This does talk about opnsense a ways down
-----
I just wanted to provide an update to what I've managed to do.

So, I've found out the hard way that Nexus Repository does NOT include the actual files from the vendors. So, if you have a package you'd like to use, it only ensures that the program is approved it is then given a certification and automatic installation script. That's all Nexus appears to do unless you dig a little deeper and are willing to pay money for C4B. Since I've been in active development mode, I haven't been able to validate whether a C4B license would be useful to me. I've actually engineered a way around having to use chocolatey at all, and it all came down to the deployment scripts that I've built.

I'll give anyone who's willing to read a little bit of an explanation as to what I've been up to.

I have worked with a few companies that used SCCM, it's Microsoft's way of providing the most up to date executables for domain environments. There is also MDT which you can use and it is free. However, there is an incredibly steep learning curve if you want to encapsulate it and make it more malleable, otherwise you'll have to constantly reload the boot images and pipe them over to WDS for deployment.

I built a solution that encapsulates all of what MDT/SCCM, WDS, Image and Configuration Designer, System Image Manager, Chocolatey, Ninite, PCMover, and many other programs... into one program that I've developed that runs on 15 root variables. It's ubiquitous. It works every time, for every machine, and has the latest versions of each program you want installed, it bypasses a need to use sysprep and oobe preparations, as it actually dynamically builds the version of the image you want to use with all of your drivers, applications, settings, oem stamping, all of that jazz, it also incorporates a way to automatically inject your SSC's from Acme or otherwise, and I'm looking to integrate what the server side does with opnsense directly through powershell.

I'm not quite ready to pioneer this side of the fence, I'm still working on auto-spawning server and child items, setting up role templates and things like that where if you're using a computer with a specific printer or device, or a specific set of tools for any given subset, then it'll install what it needs, including file sharing, security roles, certificates, etc.

The reason I was asking about this double proxy approach was simply because I think that it would've been a great way to avoid having to statically write in the application templates I was looking to deploy, however, it appears that there's about 6 dozen ways it can be done and a lot can go wrong. I would very much like to integrate what I've built more closely with opnsense, but I do not have the experience necessary beyond the more simple tasks I've gone over a bunch of times.

I think a reason why I've been so hesitant to do much with opnsense is simply because I don't have a whole lot of experience with BSD. Yes, I have played with all types of routers and switches, the basic functions of the software is all well known on my end... but the more advanced functions? That's where I think the documentation in the front end in addition to the material on the site could use a refresh. A lot of the manuals are outdated, the images and processes altogether really need to be updated, but not only that, I think that the 'additional information' for many advanced features leaves a lot to be desired. For instance, if I want to know what a particular option does, it sure would be nice to have an example of what each setting is supposed to do. Case in point, I wanted to set up an HAProxy frontend and backend, and a lot of the terminology was known to me, but as I looked through the manual, I realized that the pictures and descriptions were leaving a lot of the options out and not even explaining why. That's what I'm referring to, things like that.

As it is, I have DHCP and DNS turned completely off on my opnsense router, and I want to use it for proxying updates like applications that are less than 300mb. I also want to use it for OpenVPN static tunnels and more IPv6 NAT related stuff, but there appears to be a lot of holes with IPv6 in general and I don't think that this software has really done a lot to explain how to engineer around them like you can with IPv4.

That being said, I just wanted to give everybody an update because it seems obvious that some people might've been interested in the idea. However, I think that the reason Unify seems to be really popular is because of the active community support. Not my cup of tea honestly. I like learning how to use projects like this and I'm glad that I stumbled across it. I'm a port over from pfsense and I think opnsense is definitely superior to it in every way. Why? Well, for one thing, I've never had opnsense crash during an update. That's something that has happened virtually every other time I try to update a pfsense box. There's also the default out of the box security, like you can't just tap on the friggen keyboard and get into the opnsense box. I realize that's probably a default setting and such, but still, the fact that you guys are that determined to make it that hardened, deserves some special recognition.

At some point when everything I've been building gains some traction, I do intend on getting an enterprise account with Deciso, but there's still a lot left to learn before I do.

Anyway, enough ranting. Thanks for building a kick ass firmware.

-MC
#4
www.securedigitsplus.com

This is what I'm after.
#5
By the way, I had process hacker after I posted this information on my Facebook page, and you know what came up on my screen a couple times showing up as red? SDX Helper.

https://www.google.com/search?q=sdx+helper&rlz=1C1GCEU_enUS839US839&oq=sdx+helper&aqs=chrome..69i57j0l5.2751j0j7&sourceid=chrome&ie=UTF-8
#6
Intrusion Detection and Prevention / CVE-2019-8936
March 08, 2019, 12:35:38 AM
CVE-2019-8936
https://vuxml.FreeBSD.org/freebsd/c2576e14-36e2-11e9-9eda-206a8a720317.html

This vulnerability was reported on 01-15-2019, I'm the one who reported it. Why? Because someone didn't like the project I was working on, and someone encrypted all of the data on the two systems that I had connected to. They used port 3389 and then jacked into my network by tagging along the session I had opened, even after I had closed the port back off after I was able to turn on my internal remote access program.

I don't see a forum thread here that deals with specific network vulnerabilities such as this, but I can tell you that someone at Microsoft does not like what I've been up to. Here's my proof....

-------------------

I made this video on January 25th, on that very network I mentioned above, that is, after I had to restore all of my content and scripts and image files and everything else. It was a hard lesson learned, but hey, I managed to get it all back up and running within 10 days alongside another large project I had on my hands, then shared the video once I felt it was capable of being a proof of concept.

https://www.youtube.com/watch?v=5Cyp3pqIMRs  [Look at the date I uploaded this project]

The very next day, January 26th, Michael Neihaus, posted an update referencing the Microsoft Deployment Toolkit.

https://blogs.technet.microsoft.com/mniehaus/      [Look at the date of the MDT update/Comments locked]

Coincidence? I think not. Some nefarious party has been relentlessly attacking my networks and I have been checking my security audits several times a day to make sure that I can find out who's doing this.

---------------

I've deduced it to a few culprits, like the authors of the book "Deployment Essentials"... Why?

I'm looking to make WaaS/SaaS for free, without malicious Microsoft Store applications which track everything you do with your system at all times. The reason I went with a FreeBSD port is because I know that even with it's fair share of problems, the developers of this project know what they're doing and made the most reliable enterprise grade firmware I have ever seen... why? Because they didn't ask for a dime to provide it.

If my project sounds a little too good to be true until I actually have a product to distribute, well I can tell you that my conviction will inevitably override the doubt of many... because I do what I'm doing for the same reason this project is also freely available. Because it's a sign of spiritual strength and integrity. AND, because I believe in what Gary Kildall originally built, not what Bill Gates coerced Paul Allen to reverse engineer.
#7
Here is the video you probably want to see...

https://www.youtube.com/watch?v=GBRcBGL3SwI


And, here is an explanation as to why I am doing things in this manner.

https://youtu.be/HmvA0h60rm8