this post was submitted on 24 Aug 2024
29 points (100.0% liked)

Cybersecurity

5639 readers
178 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS
 

The proliferation of new top-level domains (TLDs) has exacerbated a well-known security weakness: Many organizations set up their internal Microsoft authentication systems years ago using domain names in TLDs that didn’t exist at the time. Meaning, they are continuously sending their Windows usernames and passwords to domain names they do not control and which are freely available for anyone to register. Here’s a look at one security researcher’s efforts to map and shrink the size of this insidious problem.

you are viewing a single comment's thread
view the rest of the comments
[–] magic_smoke@links.hackliberty.org 19 points 2 months ago* (last edited 2 months ago) (10 children)

Unrelated but this pissed me off.

using a Microsoft innovation called Active Directory

The only Microsoft innovation there was Embracing, Extending, and Extinguishing LDAP and Kerberos.

I will NEVER forgive boomer admins for allowing that. I don't mean to be presumptive, maybe its just where I work, but old guard windows admins seem to be fucking lazy dipshits as a rule.

I've never met sysadmins/engies who give so little a shit about what they're setting up and why. If you only care that it works, and not how, why the fuck are you in this industry? Go get an MBA like the unskilled, uncaring sap you are and fuck off from my special interest.

Man that got derailed quickly lol, though I guess it explains why they're all using domains they don't own...

[–] B1naryB0t@lemmy.dbzer0.com 2 points 2 months ago (2 children)

Is there any hope of return for Kerberos and LDAP?

[–] Findmysec@infosec.pub 3 points 2 months ago (1 children)
[–] magic_smoke@links.hackliberty.org 3 points 2 months ago* (last edited 2 months ago)

Been using this in my homelab. Pretty great for Linux machines.

If you need to host for a windows network, samba can provide a Windows Server 2008 level AD DC, as well as print and file servers.

You could always install bare LDAP and Kerberos, but then again you could also try eating a cinderblock.

There are alternatives, but they all have their usecases and compromises in comparison. Most businesses want a cookiecutter one size fits all solution. AD is the closest thing.

[–] taladar@sh.itjust.works 1 points 2 months ago

From what I recall Kerberos didn't work all that well in environments with NAT so it is unlikely to replace modern single sign on systems like OpenID Connect.

load more comments (7 replies)