Do all the things like ++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatarSign Up
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple APILearn More
Search - "think before you hit enter"
* Sets up some software
"Alright, and now to start the database"
* types "sudo systemctl start po-"
* hits tab -> poweroff.target
little did I know, the database was already started...4
So I have seen this quite a few times now and posted the text below already, but I'd like to shed some light on this:
If you hit up your dev tools and check the network tab, you might see some repeated API calls. Those calls include a GET parameter named "token". The request looks something like this: "https://domain.tld/api/somecall/..."
You can think of this token as a temporary password, or a key that holds information about your user and other information in the backend. If one would steal a token that belongs to another user, you would have control over his account. Now many complained that this key is visible in the URL and not "encrypted". I'll try to explain why this is, well "wrong" or doesn't impose a bigger security risk than normal:
There is no such thing as an "unencrypted query", well besides really transmitting encrypted data. This fields are being protected by the transport layer (HTTPS) or not (HTTP) and while it might not be common to transmit these fields in a GET query parameter, it's standard to send those tokens as cookies, which are as exposed as query parameters. Hit up some random site. The chance that you'll see a PHP session id being transmitted as a cookie is high. Cookies are as exposed as any HTTP GET or POST Form data and can be viewed as easily. Look for a "details" or "http header" section in your dev tools.
Stolen tokens can be used to "log in" into the website, although it might be made harder by only allowing one IP per token or similar. However the use of such a that token is absolut standard and nothing special devRant does. Every site that offers you a "keep me logged in" or "remember me" option uses something like this, one way or the other. Because a token could have been stolen you sometimes need to additionally enter your current password when doings something security risky, like changing your password. In that case your password is being used as a second factor. The idea is, that an attacker could have stolen your token, but still doesn't know your password. It's not enough to grab a token, you need that second (or maybe thrid) factor. As an example - that's how githubs "sudo" mode works. You have got your token, that grants you more permissions than a non-logged in user has, but to do the critical stuff you need an additional token that's only valid for that session, because asking for your password before every action would be inconvenient when setting up a repo
I hope this helps understanding a bit more of this topic :)
Keep safe and keep asking questions if you fell that your data is in danger
I'm gonna break this laptop in half if I will not get a break from Windows!
I'm running it in a VM and STILL this fucker gets on my nerves SO FUCKING HARD!!!
1. CPU% 100%. Laptop fans are spinning so hard it's ready to take off
2. My hands are on the laptop. THey are HOT from the heat from inside. Hell that's uncomfortable!
3. ctrl+shift+esc to see why is cpu% 100%. It's something called WMI Host something. Kill that mthrfckr!
4. Process respawns immediately and goes up to 100% again. I have already increased handles limitation for that service a few weeks ago. Like 20x more than it was before!
5. website in IE
6. does not seem to be responding
7. hit f5. Nothing happens
8. Hit refrech buttong on the toolbar. Nothing happens
9. Place cursor at the address bar and hit ENTER. Nothing happens.
Meanwhile my hands are burning.
WHAT THE FUCK!!!
What kind of idiotic system is that!! My asshole is a better OS than this piece of SHIT!
I'm super pissed. Better keep a 30-40 meters distance from me so the things I throw at you would not hit your ballz!
Now that I come to think of it, the only times I am THAT pissed is the times I am using windows. Srsly.8