this post was submitted on 29 Jun 2023
207 points (100.0% liked)

Technology

37746 readers
47 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
 

Found the error Not allowed to load local resource: file:///etc/passwd while looking at infosec.pub's communities page. There's a community called "ignore me" that adds a few image tags trying to steal your passwd file.

You have to be extremely poorly configured for this to work, but the red flags you see should keep you on your toes for the red flags you don't.

you are viewing a single comment's thread
view the rest of the comments
[–] farthom@lemmy.ca 29 points 1 year ago (19 children)

Holy shit this is kind of unsettling. Though I would expect ALL major browsers to reject reading any local files like this..... would this kind of thing actually succeed somewhere/somehow?

[–] Rooster@infosec.pub 30 points 1 year ago (17 children)

If you ran your browser as root and configured your browser to load local resources on non-local domains maybe. I think you can do that in chrome://flags but you have to explicitly list the domains allowed to do it.

I'm hoping this is just a bad joke.

[–] farthom@lemmy.ca 4 points 1 year ago (2 children)

Yeah, seems highly unlikely to ever yield any results. Even if you did manage to read a file, you have to get lucky finding a password hash in a rainbow table or the password being shit enough to crack.

[–] nzodd 8 points 1 year ago (2 children)

Also generally the actual password (or rather its hash) is stored in /etc/shadow on most systems from the past 20 odd years.

[–] farthom@lemmy.ca 3 points 1 year ago

Yeah this is a TIL for me. I didn't realize they were separated out. It makes sense, though I grant I've never taken a close look at these files.

[–] lemmyvore@feddit.nl 2 points 1 year ago

And if anybody has publicly accessible ssh on their desktop machine, that allows password login, they're kinda asking for it.

[–] orthagonal@lemm.ee 1 points 1 year ago

I cracked the BMC on my workstation motherboard by binwalking the publicly available firmware and finding, to my delight and dread, that the built in root user password was laughably weak. If a top5 motherboard manufacturer is still doing shit like that, users are too.

I also work in support and have seen first hand the bananas things people do, even smart people that should know better

load more comments (14 replies)
load more comments (15 replies)