- Oh? You guys also want to do this? -Yu!- -Mon-
--Donchan--
- I wonder what are they doing...?
-------------------------------------------
PERREO NAVIDEÑO - NANOMIX [REMIX] 2017 ʜᴅ - Duration: 2:29.
For more infomation >> PERREO NAVIDEÑO - NANOMIX [REMIX] 2017 ʜᴅ - Duration: 2:29. -------------------------------------------
Voici comment faire face aux gens toxiques de votre entourage|LSF TV - Duration: 6:42.
For more infomation >> Voici comment faire face aux gens toxiques de votre entourage|LSF TV - Duration: 6:42. -------------------------------------------
SCARY FREAKSHOW BABY WOKE UP -- Five Nights at Freddy's 6 (FNAF 6) Gameplay - Part 2 - Duration: 14:12.
oh look at that $2,000 oh my gosh Wow okay this is so exciting chica oh gosh
okay wait I'm new in andand a lot is this like fangirling or something what
is this
today's shout out is derpy turtle gaming one please visit their channel and
subscribe the link is in the description if you want to get your own shout out
just leave a comment on my newest video hi everybody
I'm Paula and I am in Freddy fazbear's pizza simulator which is five nights at
Freddy's 6 and this is so cool the game is free make sure you get it and I'm
actually having fun with it so far I haven't died okay but then I also have
been afraid to salvage an animatronic I know I have to salvage why because I
have to have an animatronic so I don't know but anyway we're back here with
$713 and we're going to go shopping and I guess out of the dumpster diver
technically I don't think I need anything else let's go in the back area
I've been looking at that fruity maze and get that okay cuz that is so cool
well that looks good too do you want to get that - I don't know what gumball
okay I already got that can we because we could get that yay I can get the mid
sized animatronic which one do we want oh my gosh
they got open to me okay do we want Freddy oh why am I excited I don't know
this is like exciting and look at funtime Freddy down there at the
bottom he is so adorable I can't even seriously
there's a pig pig patch what is this oh my gosh this is amazing why am I excited
I don't know I could get any of these would you be excited yeah and tell me
which one you got and maybe you have all of them because so far I just don't have
much money in here oh gosh a pig we have to get back oh we opened up something
else now oh my gosh this is so fun I can't okay well we're done so let's go
to blue prayer and sponsorship yes Flo's glossy flops
the first step to true romance what 1000 my gosh yes and I can upgrade and we
have what about our animatronic we bought it wow we are really upgrading do
we have anything for here yet yes
awesome nothing else I still need to buy more games and stuff okay we're not
doing so good with in that area but where's our animatronic where does he go
and is that our up upgraded why can't I see my animatronic Oh got it
okay oh my gosh he's that big it's so cute okay and we're just advertising
everywhere okay looking good guys okay finish definitely yeah designing is so
much fun why is it you know maybe it's a girl thing I don't know you guys tell me
do you like designing your pizzeria oh gosh so we got to do this again I am in
trouble
like that once let's see if I can
it's not even a bad nevermind okay what are cops
I thought hurry day what what's going on why can't I get anything ordered oh no
this is gonna be my last night do you think it well
or okay how many animatronics do you have to come and attack you I know they
keep asking if I want to salvage them but what happens if you never salvage
but then they there has to be animatronics
and I just bought an animatronic
Pizza cats
okay hurry hurry it's looking all it's got a print our flyers yeah let's put
them at advertise we're gonna get all kinds of people here and make all kinds
of money definitely wait what was that I
don't like looking at it oh gosh
I have $198
wait
I should we go to unclog the toilet again oh those toilets okay just never
know
okay that's taking forever stop but it okay closing time
what okay we're going to have to salvage one and what's going to happen when we
do
before you is an animatronic found in the backyard again we are unsure of its
origins we're gonna have to stop job to complete the final checklist before
claiming it as Salvage or if you choose oh it's they throw it back into the
alley where you found it and forfeit payment please make your choice now okay
what should I do if I throw baby back
she can't jump scare me
I'll Salvage you have chosen to proceed with the maintenance checklist remember
use your company as you taser to return the animatronic to a neutral state if
you feel that it's becoming unstable or aggressive now you can only use it three
times before it begins to damage the animatronic and decrease its value begin
audio prompt in three two one document results okay
she looks terrifying this is gonna be my last night definitely okay or he does
begin audio prompt to document results ah begin audio prompt in three two one
did I catch you off what now you didn't I'd lost the salvage what oh my god
watch are we still alive we have a lawsuit yes all zero thank you okay we
are still here apparently but she is in my pizzeria now
and that is terrifying okay let's go to the smiles to fail
stage all picked our work down terrible living let's look at the terrible went
away we can't afford any good ones old that's cool
seriously that's cool part down let's not bark down enough security doors
wait a minute what oh look at that $2,000 oh my gosh
Wow okay this is so exciting chica oh gosh okay wait I'm doing and
howl and a lot is this like fangirling or something what is this and there's
foxy oh my gosh I want all of those
okay I guess we're done so let's go to blueprint our little pig
is still there of course sponsorship we need that every
time Oh 2500 that means we could get one of
those bigger animatronics that's yes and let's go back to the catalog is this a
good thing or a bad thing Oh unavailable what do you mean
unavailable let's save our money I'm gonna save my money okay I don't want to
date don't ever question it seriously look at this I'm advertising so many
things but my little pig guys so cute and the balloons are going well the
balloons are cooler thing what we did it put things away but like a big ball pit
although did we get a stage or not okay finished
yay okay well we can afford the animatronic we just can't get it yet
I'm scared because baby is in here oh oh
that jump-scare though the baby jump-scare scared me to death so many
commercials maybe there's a reason you're not supposed to take commercials
like it makes it harder for you to finish doing these I'll kind of thinking
that because I noticed that it comes up all the time
okay take it off take it off that's
ordering pizza cats how do you know if somebody's coming in
that I don't understand that's one thing I don't understand how that works okay
baby why why what it what did I do
oh gosh yeah warning now they warned you contains loud noises flashing lights and
maybe a few jump scares I am going to continue with this next time that's that
was scary okay that was seriously scary but I want to see how it goes and I got
to figure out how to not get jumpscared by baby cuz I let her out it might be
too real but you gotta have something out right otherwise you just go clear
through the game I I don't know so I'm having a whole trouble understanding
that part but anyway guys this is so fun and it's free so you have to get it a
plan seriously okay and I'll talk to you later bye
-------------------------------------------
[Free] 6ix9ine x 21 Savage Ty...
For more infomation >> [Free] 6ix9ine x 21 Savage Ty...-------------------------------------------
Girl's Generation Yoona Won An Award At The Marianas International Film Festival - Duration: 1:32.
The first annual Marianas International Film Festival in Saipan took place on December 8.
350 Movies were entered to win a total of 27 awards.
These movies were submitted by 15 countries, but mainly
United States, Korea, China, Japan, Hong Kong, and Taiwan.
Girl's Generation's member Yoona took home the award for 'Best Performing Arts Contribution'
The other award winners includeded Korean director Na Hyeon who won the Best New Director
Award for his movie "The Prison," and Lim Dae Hyung who won Best Music Director
for "Merry Christmas Mr. Mo."
Congratualtions to all the award winners and Yoona chuka hamnida
Do you send your congratulations to Yoona?
Comment down below and don't forget to like and subscribe
-------------------------------------------
U23 VIETNAM WINNER M150 THAILAND - Duration: 21:40.
The service is in Vietnam 23
-------------------------------------------
BREAKING: Black Thug Who President Trump Got Out Of Chinese PRISON… Look What He's Doing Now. - Duration: 4:04.
BREAKING: Black Thug Who President Trump Got Out Of Chinese PRISON…
Look What He's Doing Now.
In a bid to remain relevant LaVar Ball attempts to reignite his feud with President Donald
Trump.
This guy just will not give up.
Ball has been desperately seeking to gain President Trump's attention.
Ball rose to national attention as the father of former UCLA basketball player LiAngelo
Ball was jailed for shoplifting while in China.
LiAngelo along with Jalen Hill and Cody Riley were caught shoplifting sunglasses from a
Louis Vuitton store in China.
LaVar famously….or rather infamously….refused to thank President Trump for intervening what
could have become an international incident potentially sparking a diplomatic crisis to
free his son.
According to LaVar?
It was no big deal!
LaVar said of the incident – "Everybody is making it a big deal.
It ain't that big of a deal.''
LaVar's ungrateful response prompted President Trump to take to Twitter to publicly scold
LaVar calling him an "ungrateful fool" in a tweet.
Now LaVar is attempting to revive the incident and gain relevance by attacking President
Trump on social media.
He tells the President #stayinyolane and posts a GIF of a basketball player slam dunking
President Trump.
It is becoming all too clear that LaVar is merely attempting to use his son as a PR stunt
to promote his Big Baller line of sneakers.
LaVar appeared on CNN on Tuesday demanding a "thank you" from President Trump claiming
it as his due because he sent the President three pairs of sneakers.
Now, Lavar is posting a GIF of himself dunking on Trump.
While LaVar's eldest son Lonzo is a rookie with the LA Lakers and was a college basketball
star with UCLA, it seems LaVar's ego has insured his younger two sons will never have
that opportunity.
After LiAngelo disgraced himself and his family requiring President Trump's intervention,
UCLA suspended him indefinitely from the basketball team.
Rather than wait to find out the length of the indefinite suspension, LaVar instead opted
to withdraw his son from school proclaiming to one and all that LiAngelo would be entering
the 2018 NBA draft, therefore making a transfer to another school impossible.
Now LaVar has signed both LiAngelo and his younger brother LaMelo with an agent with
the intention of finding a team to play overseas.
Lonzo's agent Harrison Gaines, has opted to take on his two younger brothers as well.
However, signing with an agent this soon makes a high school player ineligible to play college
basketball except in rare instances.
LaMelo is 16 and was formerly a junior at Chino Hills High School.
However, his father had an ongoing feud with the school's basketball coach causing LaVar
to yank LaMelo out of school.
The original plan was to homeschool LaMelo.
Instead, LiAngelo's situation has significantly changed things.
Gaines has now put the word out the Ball brothers are looking for a team to play professionally,
but most credible European general managers are rolling their eyes while yelling "RUN
AWAY!"
It seems most European club executives want little to nothing to do with the Balls partially
because of the stage dad from hell routine that LaVar plays and partially because the
two younger boys come with no known track record.
According to the Bleacher Report, Francesc Solana, general manager of Spanish club MoraBanc
Andorra, and a regular at the annual NBA Summer League in Las Vegas was approached by the
Ball family this week.
He remains very leery of their intentions and and of their credentials.
He states of the situation –
"LiAngelo and LaMelo were offered to our team, both kids, looking for a deal in Europe.
Money isn't an issue to them, but they have zero experience, so it's difficult to take
them seriously.
I don't know what to do with the dad, LaVar Ball (laughs).
This isn't a good or normal situation; I don't like it, we are not going to sign
them."
what do you think about this?
Please Share this news and Scroll down to comment below and don't forget to subscribe
Top Stories Today.
-------------------------------------------
Meet the best rescue team in ...
For more infomation >> Meet the best rescue team in ...-------------------------------------------
"Hawaii 2017 - Da Last Day" | Jo Koy - Duration: 1:00.
Singing 'Aloha ʻOe'
We're coming back!
We're coming back
Cheers
Yes!
Singing 'Until... We meet... Again'
Yes, Auntie!
One, two, three... JO KOY!!!
-------------------------------------------
"Hawaii 2017 - Day 7 - Potato Chip Purse" | Jo Koy - Duration: 0:58.
What's up Honolulu? How you guys doing tonight?!?!
Well it's about that time we get this show going!
Honolulu! Give it up for Jo Koy!!!!
Look at this... They snuck potato chips
This was in a purse
Eating potato chips at a show...
Most obnoxious thing you could eat
Especially the Maui onion Hawaii chips...
Those things are loud!
And smelly
Man that was fun... One more to go you guys
We did it... 13 shows
How many days?
13 shows in how many days?
9
Well, if you count Thanksgiving
Say I didn't work hard...
-------------------------------------------
Some thoughts on Mobile App Security - is it FUD? - Duration: 26:54.
This video could be a little bit controversial, so I wouldn't mind a civil discussion about
this afterwards in the comments or on reddit.
And if you you watch this video far in the future, please don't blindly assume that
I still hold the same believes, because I will obviously adjust my world view based
on new information.
Scientific method and stuff.
But in this moment I believe this is generally an issue that we have to deal with, and figure
out where we as hackers, security researchers, the infosec community at large, stand.
So let me make my argument.
Before I go into a very specific example that motivated me to make this video, I would like
to approach this topic from a fundamental level.
This is about mobile security or mobile app security in particular.
So what makes a mobile app secure or insecure?
Generally the apps that concern us are more than just applications on our phone.
Facebook, whatsapp, wire, snapchat, instagram, various banking apps, paypal, bitcoin wallets
and so forth all interact via some API with some kind of online service.
some private user data is cached and stored on the phone, but probably most of it lays
on the servers.
Which means generally a security audit of a mobile application should includes an audit
of the server component or the API as well.
I have done a lot of mobile app security audits and I personally find them pretty boring.
Don't misunderstand me, I love technical challenges.
Debugging apps with frida and maybe defeating some obfuscation or reversing a weird obscure
layer of crypto.
Super fun.
But with "boring" I mean more the impact, the severity, of vulnerabilities that you
can find.
Because our mobile phones are probably the most secure computers that you can get.
if they would get security patches *cough* android *cough*.
So let's consider an up-to-date iOS or Android device.
Both platforms were designed with attack surface reduction in mind.
It starts with the the permission model where each app can define which APIs they want to
use.
That's very different from a regular PC where basically every program can access anything.
Though to be fair that also gets better.
We get sandboxes, namespaces, on mac you have SIP (system integrity protection) and so forth.
Anyway.
So these mobile apps run in this very restricted permission model and have limited access to
those APIs, and only if permissions was granted.
Now obviously a big issue why mobile phones might not feel very secure is, that the general
public doesn't pay attention to permissions and might install trojanized apps from the
google play store that request access to every api and maybe even higher privileges through
device admin and so forth, or a user has a rooted phone and runs a trojan as root.
And that's obviously very bad for the user's naked pictures but that's not really application
security, is it?
So if we audit a mobile app we have to look at how this particular app protects the user's
data.
And like I said the app sandboxes are generally great - if the developers follow the development
security guidelines.
For example when a developer uses the internal storage the developer even doesn't have
to think about protecting that data, because you get that for free from the system.
You can save files directly on the device's internal storage.
By default, files saved to the internal storage are private to your application and other
applications cannot access them (nor can the user).
When the user uninstalls your application, these files are removed.
So the user's data is secure.
Of course some developer save data on the external storage, then for example sb.
Could take out the SD card and get the data through that.
And sure, that's an issue that then should be fixed.
Another example is the update mechanic, which you don't have to care about.
The playstore or appstore is perfectly safe to push your updates.
You don't even have a chance to fuck that up with downloading unsigned updates via http
and execute it.
Then generally android apps are written in Java, so you don't have to care about memory
corruption vulnerabilities, of course an app can place some stuff in native code, which
some do, often for obfuscation or anti reversing reasons, which might actually introduce memory
corruptions.
And sure, that's then an issue too.
But even then you wonder, what's even the attack vector for that.
How does an attacker even reach these code paths.
So let's explore one example in a bit more detail.
android applications can define so called intents.
They are basically entry points to your app that could be called externally.
For example you can register a broadcastreceiver for ACTION_BATTERY_LOW, which will then be
called when the battery gets low.
And these intents, or basically external interfaces can also pass data around.
It's kind of like a more complex function call.
And some developers use it to pass data between some trusted apps.
For example the android facebook app will most likely use that to interact with the
facebook messenger app.
And sometimes developers forget to properly restrict access to only trusted apps, or didn't
realize that what they expose is bad.
And so you can have very interesting vulnerabilities where for example application A implements
a vulnerable intent that reads a user's SMS and returns the text, exposes this intent
publicly, and then app B, which DOESN'T have the sms reading permission, can then
piggyback on app As intent to get access to the SMS.
And I have seen terrible intents, and yes they should be fixed.
But let's be honest.
How realistic are those attacks.
Some intents might be reachable from a URI in the browser, but then that also isn't
really interactive, it's not like a page can invoke an intent and steal SMS text.
And so generally we are talking here about other malicious apps that abuse these intents.
And I mean how likely is that?
I'm not saying that it's not an issue, it should be fixed.
But how realistic is it that a user installs a malicious application from the appstore
that particularly targets this one other application.
Now here we might get into things like banking trojans because we know those exist.
So yeah, a banking app with an exposed intent that allows money transfer without user interaction,
that's bad.
A banking trojans might target that.
But beyond that.
Who really cares?
To me the impact is fairly low, rare, very targeted, nothing people really have to worry
about, mostly because it's something that can be very easily found and fixed because
these intents are defined in a simple .xml file and so apps that get audits are generally
safe.
You can kind of compare it to CSRF on the web.
But on the web you just have to hide a hidden iframe that performs the attack in an ad or
just send them a link.
That's bad and google even pays quite a bit for that on their plattform.
But exposed intens, you have to get a user to install another malicious app.
And at that point they have much bigger issues than the exposed intents of an app.
But this is probably as bad as it gets for android app vulnerabilities.
Like I said the sandboxing and permission model is great, it's not much you can do
on a phone.
You can kind of compare most mobile apps to the browser.
The browser renders and runs a javascript/html client application on your computer which
interacts with a server in the background.
And so does your mobile app.
It's just a piece of UI written in java and interacting with the server api.
And browser client security has a lot more impact because web applications in the browser
share the same browser, while apps are very isolated from each other and have to be installed
first.
Now the much more serious issues, like with web security, obviously lie with the server
component.
For example the API could have access control issues where one user is allowed to request
messages from other users.
Because a developer forgot the authorization check.
And you know a whole bunch more issues… but at this points it's basically web security.
And so if you find an issue with the web api, would you classify that as a mobile app issue?
I think the issue here is not the mobile app.
And the server is in direct control of the vendor and can immediately be patched, while
mobile apps have to get a new update via the store and many users might not update for
a long time.
Calling these kind of issues mobile app issues, is I think misleading.
But there is also a big part in between the app and the server - and that is the network.
Which I think is probably the biggest risk and threat for mobile apps.
Because over the network you will send all the user's private data, session tokens
and so forth.
And mobile phones are very mobile, a lot of people connect them to open wifis.
And we generally have accepted that the network is untrustworthy, that's why we use SSL.
And so of course if an app communicates with server over http, then that is bad.
Somebody just has to sniff the air.
And I would consider that an issue with the mobile app.
Now even if HTTPS is used, it has to be implemented securely.
That means you have to have a valid trusted certificate and you don't ignore SSL errors.
If you do ignore those errors in your app, then it can be very bad if you have an attacker
in a man in the middle position.
But if you use SSL correctly, with a valid certificate, then the connection is secure.
Ok.
So up to this point I hope I was able to kind of show you with a few examples that android
apps are pretty secure.
You can screw up some stuff but it's generally also easy to fix and if there are issues they
generally are very targeted and are not as scalable as for example an authentication
bypass on the web api, which could be automated to taking over every facebook account there
is and download the private messages.
Now let's move to one particular example that motivated me to make this video.
And let's start with how a particular research was described in the abstracts and short summaries
about the work.
It's from 2016 and is about the banking mobile app from Number26.
N26.
Here is Reuters, a very reputable news agency:
Vincent Haupert, a research fellow and PhD student ..., told the Chaos Communications
Congress in Hamburg how he and two colleagues found N26 security defenses riddled with holes
that could have been used to defraud thousands of users.
For example, Haupert said he compared data from a leak of 68 million account credentials
from online file sharing company Dropbox with information on N26 users … to identify 33,000
N26 user credentials - without being thwarted by N26 anti-fraud systems.
From there, he said it would have been simple to send a phishing email to these N26 customers
that could potentially have allowed him to break into their accounts.
Wait, I thought Haupert got 33.000 user credentials?
Why does he need to send out phishing emails?
Well Reuters kind of misunderstood what the guy did.
N26, like almost every website I know will tell you in some way if an email is registered
with the system or not.
So he just took a list with millions of emails and found 33.000 of them had a N26 account.
And he could use that to target them with phishing.
But it sounds so much worse... he was able to identify 33,000 N26 user credentials - without
being thwarted by N26 anti-fraud systems.
I understand.
Not his fault in this case.
Reporters have also mixed up stuff that I have said.
It sounds terrible to the reader, those are nuances they probably don't understand.
But let's move on.
In response, N26 said in a statement it had made customer accounts more secure by reducing
and encrypting data transfers.
Wait.
They now encrypted data transfer?
Did they not use SSL?
Holy shit for a banking app that would be bad.
Let's look at Hauperts official abstract of his research that he had presented on 33c3.
Here he writes:
we succeeded independently from the used device to leak customer data, manipulate transactions,
and to entirely take over accounts to ultimately issue arbitrary transactions—even without
credit.
Entirely independent of the used device, we were not only able to reveal N26 customers
and to manipulate transactions in real-time but also to completely take over a victim's
bank account.
This sounds insane.
If that were true, this is massive.
And I can only explain this kind of impact if you somehow can either mitm everything,
for example when they use HTTP.
Or the API completely fucked up authentication.
And that's why this makes me so mad.
Because this is not the case.
And I better insert here now a disclaimer.
I'm going to rant now a little bit, and I don't want to attack this researcher,but
I will criticise his scientific work.
And he just happened to be the scapegoat now, because he was very public about this research,
with a lot of media attention.
But this is not a single isolated example.
I know he didn't deliberately mislead or manipulate.
Infact I know more people that agree with his assessment of the vulnerabilities here,
than I know people that agree with me.
And that's why I said in the beginning that this video could be controversial and I would
like to see a discussion because it's not quite black and white and there is a fine
line here.
So let's see what the vulnerability actually was.
I'm going to play the crucial part of his talk "Shut Up and Take My Money!
The Red Pill of N26 Security"
Just to talk about like the infrastructure of N26.
Basically they have two apps, one for iOS and one for Android and they communicate over
a JSON based protocol, TLS encrypted.
Their backend is at api.tech26.de
How do I know actually that this is a JSON based protocol?
Because I used a TLS mitm attack, a man-in-the-middle attack to log the protocol.
I actually suspect that I only needed to install a certificate, a mitm certificate on the client
, but actually I was suprised I didn't need to touch the client, because they didn't
implement any certificate pinning.
<audience laughs and claps>.
WHY IS THE AUDIENCE LAUGHING AND CLAPPING HERE?
What is the surprise here.
SSL performs verification of the certificate with the local CA store.
Of course if you install your own certificate on the device the device will trust it.
And the application did nothing wrong here.
It checked the certificate via the local trust store and found that the user trusts it.
This is how SSL is supposed to work.
And yes, there is criticism about the CA system.
We have issues with it.
Certain CAs are not trustworthy.
We had incidents of compromised root certs and we have a rampant problem of middleboxes
and anti virus software that install their own certificate into the local CA store.
But there is not much evidence or data on actual attacks of SSL mitm.
But take a step back from mobile app security and lets look at the web.
There is HPKP, which will actually be deprecated now because it has it's own issues.
We have the chrome public key pinning preload list and some of the big sites are listed
there.
But as far as I can see for example paypal doesn't do it for their website.
Why is nobody screaming how insecure paypal is because they don't use pinning on the
web?
SSL has it's issues.
No question.
But it's also holding up surprisingly well.
Realistically, how many real world attacks on SSL connections do we actually see?
Public key pinning can be a defense in depth strategy, but claiming that an app that doesn't
do it is insecure?
That I don't agree with.
Or most of the web can be considered broken.
Let's continue with the talk.
Because now he makes an exam ple how that could be turned into an attack.
The first thing that comes to mind is.
Lets do real-time transaction manipulation.
That means we manipulate a transaction that the user does, but we will change the recipient
and the user won't see nothing about this.
Remember in his abstract he claimed that he will show how to "manipulate transactions
in real-time but also to completely take over a victim's bank account."
So if you look at this graphic again, what if an attacker could get the DNS record of
api.tech26.de under control?
That would mean that all traffic is routed over the man in the middle attacker server,
and as there is no certificate pinning we could just issue a let's encrypt TLS certificate
and the app is going to trust the certificate.
AGHJdafadasrfhsekf wat?
I mean we have seen DNS hijacks in bank heist before, but if you can hijack the DNS record
of a domain to redirect it to your own server and now MITM everything, of course you are
screwed.
What is the surprise there?
But does that count as vulnerability for N26?
No the issue, the vulnerability or attack would be the weak DNS system or account they
used.
Maybe through social engineering or bruteforced credentials.
Everything that happens after the DNS hijack is pretty much just creative ways how you
can cause damage.
And yes again, pinning might have helped here to protect the transaction, but we don't
know what other systems and data could have been compromised through a DNS hijack like
that.
So at best, it would be a defense in depth mechanism, and sure a nice to have improvement.
But I don't agree that this is a vulnerability of the app that leads to complete take over
of accounts.
And in the paper he describes this as:
If an attacker can launch a man-in-the-middle (MitM) attack, the transaction can be tampered
with transparently.
Yeah, if it were HTTP, but you can't.
Because SSL is used.
But he argues:
This becomes possible because, even though the N26 apps make
strict use of HTTPS, they do not make use of certificate pinning—a best practice that
prevents unauthorized third parties from breaking the confidentiality and integrity of the transmitted
data.
Strict use of HTTPS does ensure confidentiality and integrity.
Without pinning you don't loose that.
And he lists three claims how this could be done..
– A trusted certificate authority (CA) issues the certificate.
Vulnerabilities in CA validation processes sometimes allow an attacker to take hold of
a certificate for domains they do not own.
Ok yeah.
Could happen.
Theoretically.
But you know, how realistic is that this would be used in an attack against N26?
Is that a real risk or just a theoretical risk?
And also isn't that then a vulnerability in the CA and not really a vulnerability in
the app?
– Both Android and iOS are frequently the prey of privileged malware—that is, malware
that performs a privilege escalation exploit before executing their payload.
It is a trivial task for privileged malware to place a certificate.
That doesn't make even sense?
Why would a malware that used a privilege escalation exploit even bother to install
a certificate so somebody can perform a MITM attack?
Why not just extract the credentials from the app, hook the functions to change recipient
or do whatever?
But there is malware that does in fact install certificates sometime, because they run a
local proxy to inject ads into everything.
That's a common thing.
But not for MITM attacks like that.
And if you have a malware on your phone, a privileged malware that is.
You have other problems.
This is where obfuscation comes into play as a possible defense in depth strategy, but
come on.
If we talk about theoretical attacks like that, then theoretically you can always reverse
engineer and steal stuff with a privileged malware.
Nothing helps.
– A user can be tricked into installing the certificate through phishing or other
means of social engineering.
The user is the weakest point in the system.
So, the app should pin its certificates.
In general, attacks using phishing or social engineering are particularly dangerous and
have a high success rate.
A user can also be tricked to install a malware?
Or a N26 developer could be phished for DNS account credentials or to install a malware
and grab the SSL root certificate that they are pinning.
It's not a good argument.
And so, no!
N26 does not have massive security issues.
Once you have the MITM setup you can hijack all the stuff obviously.
Now N26 had some API design issues that the researcher also goes into that were quite
interesting, some logic issues with some card number and two factor issues.
I think these were valid API design concerns because N26 clearly wanted to implement something
a certain way and he showed that it was a bit flawed.
But nothing that would warrant this large negative response.
Now I want to summarize.
The media will obviously exaggerate certain security issues.
Or just make genuine mistakes not understanding the impact.
But in this case, "manipulate transactions in real-time but also to completely take over
a victim's bank account.".
I find this to be a very misleading wording coming directly from the researcher.
And seeing through that is particularly difficult, because his research is not bullshit.
There is a lot of good information and research in there, but it feels like the impact of
them were a bit artificially inflated and so you have this kind of half true, half theoretical
mix that for somebody who is not very experienced with, will lead to a wrong impression.
And I think that's dangerous and maybe even a little bit unethical.
And very early in the video I mentioned that I don't think he did that intentionally.
Because I know that many people hold this believe that "no cert pinning" on mobile
is a valid issue.
I already explored earlier why I don't really think it's an issue.
My thesis is, and the main point of this video should be, that I think mobile apps are sooo
boring because issues are generally very low impact, that somehow the security industry,
researchers our community agreed that missing certificate pinning and "only" implementing
SSL correctly is apparently not enough.
And I think what I say is true, because nobody really complains about that on the web.
Nobody says using only SSL for your website is an issue that can lead to traffic manipulation
and full account take over.
Because SSL is actually the technical solution to exactly those issues.
And like I said there are certain weaknesses in the whole CA system, but that is something
else.
That is a different research field.
Now the researcher also announced a talk for the 34c3.
Most of the information including the abstract only seems to be available in german for now.
It's again about banking apps.
Banking apps are often target of banking malware.
And there is a lot of android malware.
So what banking malware usually does, for example on your desktop pc, it will hook into
the browser and steal your credentials or use your session to wire money.
And basically they would do similar stuff on android as well.
As long as the malware somehow gets root, either through old unpatched android exploits
or because sb runs a rooted device and gave the malware root permissions.
And so banks obviously don't want that their customers get "hacked" because of malware.
So banks invest money into solutions attempting to mitigate that.
But obviously the banking app can't prevent that.
It can try to implement root detection and refuse to run.
Or obfuscate itself so hard, that it's not easy to hook into the app and steal credentials.
But it's always going to be a cat and mouse game.
The bank just tries to make reversing expensive enough, that it's not economically feasible
anymore for the malware author.
It's just a best-effort in order to protect users from themselves.
Now if a malware is able to bypass any anti-debugging anti reversing or anti root detection mechanisms,
Is that a security issue of the banking app, an issue of the obfuscation solution?
Is it fair to blame the bank for it?
And that seems to be the gist of his new talk.
At least from what I can understand from the abstract and few interviews, he seemed to
have implemented some kind of hooking, dynamic or static analysis of the promon obfuscation.
And is able to basically do what promon tries to prevent in this best effort approach.
Which is neat, it's probably some really cool stuff and I'm looking forward to the
technical details.
I'm obviously just speculating here, and the talk and paper could be actually much
more.
But if I'm right, why is this talk not just called "Defeating Promon" and going then
into details of how promon works and how you can get around it?
That would be a cool technical talk.
Why does this talk have to focus on banking apps and fear mongering.
Leading to countless of media titles claiming how 31 banking apps are insecure and hackers
can hack them.
That's only half-true.
We are talking here about already compromised devices and a best effort approach of banking
apps trying to protect users from their infected devices, why shame the banking apps?
What is the purpose of this, if not just for self-promotional reasons, making the research
sound more scary and impactful.
And at the same time ignoring the damage it does in the public perception of what are
actual threats and what are hackers capable of.
This to me is FUD.
-------------------------------------------
"Maui's '808 All Day' Exclusive Drop" | Jo Koy - Duration: 0:55.
That's that new hat right there. New era
Josep
808 all day collabo
When are we gonna drop it?
Tomorrow, 4pm
Let's drop it... Where?
At 180 Maui
180 Maui... Let's do this
I'm gonna tweet it out right now
Let's see how many people come to get it
There's only a few there... We only have a few so
Let's do this
What's the mall address?
Kaahumanu
Of course Kaahumanu
Boo boo?
Boo boo, please approve it boo boo.
Come on boo boo
Approved
Approved!
We're about to tweet this out
I'll see everybody there
Maui, let's go!
808 all day
Did everyone enjoy their meals?
Oh my God, it's so good
So good
More importantly uh, did boo boo get what she wanted?
I did...
Boo boo got what she wanted! Yes!
Boo boo got what she wanted!
-------------------------------------------
"Hawaii 2017 Show #9 Onsale" | Jo Koy - Duration: 0:29.
Aloha!
Are you kidding me right now?
I put up 8 shows...
And 8 shows sold out
And now I'm getting DM after DM after DM after DM after DM after DM...
Please brudda, add 1 more show
Add 1 more show... 1 more show... 1 more show!
That's 9 shows!
Just... I called Blaisdell
I said give me one more date
DONE!
Show 9
I'm adding it
This is for you guys
I love you
Show number 9 goes on sale right... now...
-------------------------------------------
Akcesoria do manicure i pedicure: jak ich używać? - Duration: 14:30.
For more infomation >> Akcesoria do manicure i pedicure: jak ich używać? - Duration: 14:30. -------------------------------------------
Lakiery hybrydowe: czym się wyróżniają? Jak nakładać i zdejmować lakier hybrydowy? - Duration: 9:00.
For more infomation >> Lakiery hybrydowe: czym się wyróżniają? Jak nakładać i zdejmować lakier hybrydowy? - Duration: 9:00. -------------------------------------------
Utwardzacz do paznokci: jak stosować i jak wybrać właściwy? - Duration: 10:53.
For more infomation >> Utwardzacz do paznokci: jak stosować i jak wybrać właściwy? - Duration: 10:53. -------------------------------------------
Kia Picanto 1.0i-12V ISG 5-Deurs Airco Radio-CD CPV ABS Airbags 7jr.Garantie - Duration: 0:58.
For more infomation >> Kia Picanto 1.0i-12V ISG 5-Deurs Airco Radio-CD CPV ABS Airbags 7jr.Garantie - Duration: 0:58. -------------------------------------------
Hyundai Atos 1.1I ACTIVE SKY - Duration: 1:00.
For more infomation >> Hyundai Atos 1.1I ACTIVE SKY - Duration: 1:00. -------------------------------------------
Toyota Verso 1.8 VVT-i Luna (AUTOM.!!/Climate/Cruise/Trekhaak/PDC/LMV) - Duration: 0:54.
For more infomation >> Toyota Verso 1.8 VVT-i Luna (AUTOM.!!/Climate/Cruise/Trekhaak/PDC/LMV) - Duration: 0:54. -------------------------------------------
Citroën C2 1.4I VTR, CRUISE CONTROL, STUURBEKRACHTIGING, ELEK-RAMEN, CENT-VERGRENDELING, RADIO-CD, - Duration: 0:54.
For more infomation >> Citroën C2 1.4I VTR, CRUISE CONTROL, STUURBEKRACHTIGING, ELEK-RAMEN, CENT-VERGRENDELING, RADIO-CD, - Duration: 0:54. -------------------------------------------
IM FIGHTING WITH DANIELLE BREGOLI (BHAD BHABIE) - Duration: 2:03.
Hey bitches welcome back to my channel, and I thought to record a video that a lot of people are gonna
Take seriously
But it's actually a joke because I just wanted to bring attention to something that happens on my journal all the time
And I find it fucking hilarious, and my lips are dry today
Come on dry lips, but every week
I get a hoard of like
Teenyboppers preteen kids that come to my channel and tell me that I'm copying the cache meows
I curl Daniel brocoli burka Lee
Doesn't think it's where the last name is because I guess that she says hey bitches at the beginning of her video
But I wasn't though some simple logic out there than one
I'm not the first person that ever said hey bitches
I'm pretty sure there's that makeup guy that says hey bitch, and then I mean hey bitches
It's a common fucking phrase so one who gives a fuck, but two
I've been on YouTube a lot longer than her and I've always said hey bitches in my videos
So thank you very much teeny bopper children. She's copying
me out do not try to do the fuckin Beyonce hair flip with a
Fucking Santa Claus out because they're actually really fucking her fluff in my eye
but how fucking stupid is it that people will try to cause drama and
Controversy on people's channels over stupid things like openings to videos
It's not like I'm doing like a James Charles video montage thing where he's like
At the beginning of the fucking video because that's just dumb, but doesn't she say hey hos as well
So you know it's just so fucking stupid the things that people find to nitpick on YouTube I could do a fucking list of them
and really just read people - fuck you both, but I'm not going to so Danielle cache me outside bitch because you took my
opening I just fucking joking you guys so that is this little anybody video that I'm gonna upload for you because
Honestly, I find it hilarious and ridiculous that people take the time out of their day. I don't know if they're looking
for
like people who say bitches
I don't know if they're just trying to be an asshole or they're trying to think that they're
Shading me in some way by telling me that I'm copying Danielle. Whatever first of all another problems her
I think it's great that she has rose to such success all for something goes stupid as catch me outside
I especially would do something better with it and try to be like you know
You know what it's not gonna get into back as Oh uproar
There'll be a fucking uproar you guys, so that's it for this video
I love you all please subscribe to my vlog Channel, and I will see you guys in my next video. Bye
-------------------------------------------
"Hawaii 2017 - Day 6 - Fighting the Flu" | Jo Koy - Duration: 1:01.
Thank God for Filipinos
Cause there wouldn't be nurses, if there weren't Filipinos
You want it in the butt?
Ok, I've gotta get...
A longer needle
Getting a B12 shot
And my son...
I had the option to put it in my arm...
And my son told me to put it in my butt...
Dear Lord...
We've gathered here today...
I have the ass of a baboon!
Sorry, I just gotta feel...
In my hip bone?
No, I'm just feeling cause I need to put it in the right place
Oh my God...
One, two, three...
What did I ever do to you Joanne?
Honolulu!!
Give it up!
For Jo Koy!!!!
Wanna see how hard I perfomed?
That's the steroid shot...
I should have died on stage
I won't do that for you, fukka...
Guaranteed
Thanks Joanne!
You're the best nurse ever, and your mom needs to know that
-------------------------------------------
"Hawaii's KITV News at 5 Covers Toyota Tacoma Video" | Jo Koy - Duration: 1:09.
Well if you're from Maui
You know it's true...
Just check out this video
Welcome to Maui, the world's largest Toyota Tacoma dealership!
Take a look at that!
And now take a look at that!!
Look at this guy!
Look how many Toyota Tacoma's!
Another one!
It's funny because it's true
Oh man
That's comedian Jo Koy
On a recent visit to Maui
He says pretty much every local there owns a Toyota Tacoma
Say's he found lots of them in Kahului
All in one parking lot, too
That's no lie though
We were talking off air
There's only so many...
Dealerships you can actually go to
Tacoma's
That's what they're all about
Jo Koy exposing us...
He is pretty funny
Yeah, it is pretty funny though
Hey, thanks so much for joining us for Island News at 5 don't forget you can weigh in on our stories
By liking us on Facebook
And join us back here in 30 minutes for all the latest with Island News at 6
So if you jump in your Tacoma you can make it home right now
Aloha
-------------------------------------------
"Hawaii 2017 Show #10 Onsale" | Jo Koy - Duration: 1:46.
So last night, I decided to add that 9th show in Hawaii
At the Blaisdell Center
Then I wake up
Then I go online, and I check out KHON channel 2 news
They do this big...
Like, report on me about adding the 9th show
In Hawaii
So check this out...
A comedian has done something unprecedented in Hawaii
Jo Koy is performing at the Blaisdell Concert Hall in November
He sold out 8 shows
And he just added a 9th performance
There has only been a few in the history of concerts
As I know it... Uh... Journey
Which, of course, sold out, back in the... I believe
Late 80's, early 90's, they did 7 sell out shows at the arena
Wayne Newton was here at the Hilton uh, Hawaiian Village for Tom Moffit
And sold out 7 shows over there
But... For a comedian...
This is unheard of... This is...
Mind blowing to tell you the truth
Jo Koy's 9th show at the Blaisdell is Monday, November 27th at 8PM
Tickets are on sale now
News alert! Guess what?!
Show 9 just sold out!
SOLD OUT!
Not a seat left!
That's right! It's already sold out
So guess what I'm gonna do...
I'm gonna add
A 10th show added!!
I love you Hawaii...
So do we try and go to show 11...?
Hmmmmm...?
-------------------------------------------
"Hawaii 2017 - Landed for 13 Sold Out Shows" | Jo Koy - Duration: 0:32.
Just landed in Hawaii, because you know why?
I have 13 shows to do...
2 in Maui
And 11 in Oahu
Aloha
Hey you guys! I'm gonna be at the Blaisdell tonight!
Tickets are completely sold out
Sorry!
You guys just stay here
Aloha
-------------------------------------------
"Hawaii 2017 Show #6 Onsale" | Jo Koy - Duration: 0:35.
People keep asking me when I'm coming back to Hawaii...
Perform in Maui
Honolulu
Guess what you guys...
-------------------------------------------
"Hawaii 2017 Show #11 Onsale" | Jo Koy - Duration: 0:44.
Aloha!
Are you kidding me right now?
We added show number 10 yesterday morning
And it's already SOLD OUT!
Not a seat left
This is all I can do
We got 1 more show
And we're gonna add it
That's it thought... I can't do any more
There's no more dates
Nothin!
Not even a venue
The venues not even available anymore
This is for you
Show number 11
This is the final 1
I can't add anymore
But my God...
The whole island is comin'
And I'm gonna make you guys laugh...
Mahalo!!!!
Hey Hawaii...
I think we just made history together...
-------------------------------------------
WHY does YAWNING spread? _하품은 왜 전염될까? (한글자막) - Duration: 6:38.
The reason why we yawn is probably because either we're sleepy, or bored, when we
don't have enough oxygen in our brain having not enough oxygen cannot explain
why Lions yawn in the middle of Africa and I'm sure there is plenty of air
Africa open space. So what is the mystery behind yawning? In the US State
University of New York psychology department professor Andrew Gallup did
an experiment where he asserted a thermometer in a lab rat, measure its
temperature change brain during yawning. This work was published in evolutionary
neuroscience magazine in 2010 September. In the result, when the temperature in the
brain went up by 0.1 degrees Celsius the rat yawned. After yawning, temperature dropped
back down. Based on this, he concluded that yawning provided a cool air to the
brain cools it which the rat could then was able to focus better. Then, he summarized
his findings in a journal to further strengthen his theory that yawning cools
down the brain. This is the similar mechanism as when we use computers for a
long time it warms the hard drive, and the fan automatically works to cool it back down.
Professor Gallup also investigated and compared yawning patterns for 24 other
animals. As a result, it turns out that primates
seem to yawn for long the time compared to non primate. On average, humans yawn for 6sec
whereas camel and chimps yawn for 5sec and rats only for 1.5 seconds.
The pattern was, as the size of the brain got smaller, the number of brain cells in the
cerebral cortex(the brain) were less which reflected on this shorter yawning time.
Results showed that the bigger and the more complex the brain the greater the
yawning time. He explained that the more brain activities there are, the hotter
the brain will get, takes longer time to bring more air to cool a larger brain.
This explains the longer duration of our yawning compared to other animals.
Why is yawning contagious? This can be seen in monkey tribes,too. Even amongst different species.
In 2008, from University of London a bunch of scientists and psychologists
and did an experiment this was called "dogs catch - human yawns". The 1st group,
person yawned with loud noise in front of 29 dogs while watching them directly
into their eyes. In the 2nd group, the person pretended to yawn but without any sound.
The result? When the person made the sounds in the 1st group, 21 out of 29 dogs
followed yawning. But in the the 2nd group, when we only yawned without any sound no dogs yawned.
So why does yawning spread? Answer is within our brain. When they observed
the brain of a person who watches someone else yawning. a part of the brain
called, a very fancy name called, dorsolateral prefrontal cortex activate. This part of
the brain is believed to be responsible for controlling emotions, empathy which
is the ability to put yourself in another person's shoes. So following the
yawning is not simply copying someone else's act but actually a form of
emotional delivery of putting yourself in another person's position. In 2011, Yerkes
National Primate Research Center in Emory University, 2 people, Matthew
Campbell and Fran's de Waal showed this contagious yawn amongst
chimps. They recorded chimpanzees yawning and edited into a 9 sec video and
showed it to other chimps an iPod touch. As a control, they also showed videos of
chimps doing other things as comparison.
The result? Chimps yawned more when they showed videos of others yawning compared
to other activities. This further strengthened that empathy was the cause
of contagious yawning. This probably explains why, in general, the more
empathetic females experience more yawning delivery amongst themselves than
generally less empathetic males.
how many times did you yawn?
-------------------------------------------
YouTube TV - Coming Soon
For more infomation >> YouTube TV - Coming Soon-------------------------------------------
SCARY FREAKSHOW BABY WOKE UP -- Five Nights at Freddy's 6 (FNAF 6) Gameplay - Part 2 - Duration: 14:12.
oh look at that $2,000 oh my gosh Wow okay this is so exciting chica oh gosh
okay wait I'm new in andand a lot is this like fangirling or something what
is this
today's shout out is derpy turtle gaming one please visit their channel and
subscribe the link is in the description if you want to get your own shout out
just leave a comment on my newest video hi everybody
I'm Paula and I am in Freddy fazbear's pizza simulator which is five nights at
Freddy's 6 and this is so cool the game is free make sure you get it and I'm
actually having fun with it so far I haven't died okay but then I also have
been afraid to salvage an animatronic I know I have to salvage why because I
have to have an animatronic so I don't know but anyway we're back here with
$713 and we're going to go shopping and I guess out of the dumpster diver
technically I don't think I need anything else let's go in the back area
I've been looking at that fruity maze and get that okay cuz that is so cool
well that looks good too do you want to get that - I don't know what gumball
okay I already got that can we because we could get that yay I can get the mid
sized animatronic which one do we want oh my gosh
they got open to me okay do we want Freddy oh why am I excited I don't know
this is like exciting and look at funtime Freddy down there at the
bottom he is so adorable I can't even seriously
there's a pig pig patch what is this oh my gosh this is amazing why am I excited
I don't know I could get any of these would you be excited yeah and tell me
which one you got and maybe you have all of them because so far I just don't have
much money in here oh gosh a pig we have to get back oh we opened up something
else now oh my gosh this is so fun I can't okay well we're done so let's go
to blue prayer and sponsorship yes Flo's glossy flops
the first step to true romance what 1000 my gosh yes and I can upgrade and we
have what about our animatronic we bought it wow we are really upgrading do
we have anything for here yet yes
awesome nothing else I still need to buy more games and stuff okay we're not
doing so good with in that area but where's our animatronic where does he go
and is that our up upgraded why can't I see my animatronic Oh got it
okay oh my gosh he's that big it's so cute okay and we're just advertising
everywhere okay looking good guys okay finish definitely yeah designing is so
much fun why is it you know maybe it's a girl thing I don't know you guys tell me
do you like designing your pizzeria oh gosh so we got to do this again I am in
trouble
like that once let's see if I can
it's not even a bad nevermind okay what are cops
I thought hurry day what what's going on why can't I get anything ordered oh no
this is gonna be my last night do you think it well
or okay how many animatronics do you have to come and attack you I know they
keep asking if I want to salvage them but what happens if you never salvage
but then they there has to be animatronics
and I just bought an animatronic
Pizza cats
okay hurry hurry it's looking all it's got a print our flyers yeah let's put
them at advertise we're gonna get all kinds of people here and make all kinds
of money definitely wait what was that I
don't like looking at it oh gosh
I have $198
wait
I should we go to unclog the toilet again oh those toilets okay just never
know
okay that's taking forever stop but it okay closing time
what okay we're going to have to salvage one and what's going to happen when we
do
before you is an animatronic found in the backyard again we are unsure of its
origins we're gonna have to stop job to complete the final checklist before
claiming it as Salvage or if you choose oh it's they throw it back into the
alley where you found it and forfeit payment please make your choice now okay
what should I do if I throw baby back
she can't jump scare me
I'll Salvage you have chosen to proceed with the maintenance checklist remember
use your company as you taser to return the animatronic to a neutral state if
you feel that it's becoming unstable or aggressive now you can only use it three
times before it begins to damage the animatronic and decrease its value begin
audio prompt in three two one document results okay
she looks terrifying this is gonna be my last night definitely okay or he does
begin audio prompt to document results ah begin audio prompt in three two one
did I catch you off what now you didn't I'd lost the salvage what oh my god
watch are we still alive we have a lawsuit yes all zero thank you okay we
are still here apparently but she is in my pizzeria now
and that is terrifying okay let's go to the smiles to fail
stage all picked our work down terrible living let's look at the terrible went
away we can't afford any good ones old that's cool
seriously that's cool part down let's not bark down enough security doors
wait a minute what oh look at that $2,000 oh my gosh
Wow okay this is so exciting chica oh gosh okay wait I'm doing and
howl and a lot is this like fangirling or something what is this and there's
foxy oh my gosh I want all of those
okay I guess we're done so let's go to blueprint our little pig
is still there of course sponsorship we need that every
time Oh 2500 that means we could get one of
those bigger animatronics that's yes and let's go back to the catalog is this a
good thing or a bad thing Oh unavailable what do you mean
unavailable let's save our money I'm gonna save my money okay I don't want to
date don't ever question it seriously look at this I'm advertising so many
things but my little pig guys so cute and the balloons are going well the
balloons are cooler thing what we did it put things away but like a big ball pit
although did we get a stage or not okay finished
yay okay well we can afford the animatronic we just can't get it yet
I'm scared because baby is in here oh oh
that jump-scare though the baby jump-scare scared me to death so many
commercials maybe there's a reason you're not supposed to take commercials
like it makes it harder for you to finish doing these I'll kind of thinking
that because I noticed that it comes up all the time
okay take it off take it off that's
ordering pizza cats how do you know if somebody's coming in
that I don't understand that's one thing I don't understand how that works okay
baby why why what it what did I do
oh gosh yeah warning now they warned you contains loud noises flashing lights and
maybe a few jump scares I am going to continue with this next time that's that
was scary okay that was seriously scary but I want to see how it goes and I got
to figure out how to not get jumpscared by baby cuz I let her out it might be
too real but you gotta have something out right otherwise you just go clear
through the game I I don't know so I'm having a whole trouble understanding
that part but anyway guys this is so fun and it's free so you have to get it a
plan seriously okay and I'll talk to you later bye
No comments:
Post a Comment