/os/ - Online Security

News, techniques and methods for computer network security.

Boards | Catalog | Bottom

Drawing x size canvas

Remember to follow the rules

Max file size: 350.00 MB

Max files: 5

Max message length: 4096

Welcome to Online Security the place for internet and computer security, privacy and anonymity.
If you have some helpful tips please feel free to share your ideas. Start a new thread, or contribute to an existing thread.

Meta Thread Endwall 07/12/2016 (Tue) 12:03:36 [Preview] No. 171 [Reply]
Post any comments, concerns, or requests for the board in this thread.
Edited last time by Endwall on 07/12/2016 (Tue) 12:15:00.
7 posts omitted.

Anonymous 08/22/2016 (Mon) 08:50:08 [Preview] No. 355 del


Endwall 08/23/2016 (Tue) 00:49:16 [Preview] No. 356 del
I got the email. It does that because it rejects you if you try to rendevous in a country that I've banned in my exlude nodes in my torrc-defaults file. I have to comment that out, but it seems that the message got through. I'll decrypt this and see if it's the same message I read earlier.
Edited last time by Endwall on 08/23/2016 (Tue) 01:09:43.

Endwall 08/23/2016 (Tue) 01:14:18 [Preview] No. 359 del
Nope... this message was slightly shorter, but had a similar ending.
Edited last time by Endwall on 08/23/2016 (Tue) 01:17:20.

Endwall 09/04/2016 (Sun) 17:27:56 [Preview] No. 544 del
I'm back at school, so activity from me will be slower than usual until I get settled in. I won't have time to post as many news articles, but my main sources of information are as follows:

Tor News
Deep Dot Web
Soylent News
Security NewsFeeds

Feel free to post any relevent news articles you find into the news section. I'll post things here and there as I run across them. Thanks.
Edited last time by Endwall on 12/17/2016 (Sat) 00:27:04.

Anonymous 03/21/2017 (Tue) 02:50:26 [Preview] No. 859 del
Useful to use before proxycheck.sh because it is much faster like seconds for a thousand proxies. But proxycheck.sh is still useful because it weeds out the proxies that give certificate errors in the google or youtube check.

Welcome to Online Security: Sticky Thread Endwall 07/13/2016 (Wed) 03:11:01 [Preview] No. 181 [Reply]
Hello and Welcome to /os/, Online Security.

This is a board for the discussion of online security / privacy / news in the privacy world.

>I don't have anything to hide

>GPG GNU Privacy Guard

>Privacy Guides

Message too long. Click here to view full text.

Edited last time by Endwall on 01/02/2017 (Mon) 11:02:15.

Sticky Bump Endwall 10/23/2016 (Sun) 18:54:40 [Preview] No. 624 del
TENS , https://spi.dod.mil/lipose.htm , US Air Force Live CD <-- online banking for mom and dad.
LibertyBSD http://libertybsd.net/ , https://libreboot.org/docs/bsd/openbsd.html
Edited last time by Endwall on 01/02/2017 (Mon) 11:03:40.

Secure OSes Anonymous 05/09/2016 (Mon) 18:21:17 [Preview] No. 37 [Reply]
What is the best OS option for a secure setup?
How do OpenBSD and Linux with patches compare in terms of the security they offer?
52 posts and 1 image omitted.

Anonymous 02/22/2017 (Wed) 05:27:00 [Preview] No. 834 del
(2.77 MB 287x191 feels.gif)
I use a Librebooted laptop with Debian that has FDE enabled. I also have a GRUB password set up. Works well enough.

If you're going full tinfoil, then use a Librebooted machine with an OS you've made yourself and remove the networking hardware. Encrypt with Twofish to make brute forcing harder for the attacker.

Anonymous 02/22/2017 (Wed) 05:59:54 [Preview] No. 836 del
Epic thread doods, thanks for bouncing.

https://youtube.com/watch?v=EjbQ-BDh4PU [Embed]

Anonymous 02/22/2017 (Wed) 06:08:36 [Preview] No. 837 del
I didn't use GRUB because of the claims behind being easily accessible through hitting backspace a specific number of times to being the password. I don't have 100% FDE also because of that claim. I'm also worried that if I update to a newer version of GRUB some time in the future that it won't be compatible with Libreboot. To ease my paranoia, I made myself use syslinux instead, but of course, it's no real solution either.

Anonymous 03/24/2017 (Fri) 07:32:18 [Preview] No. 860 del
http://spi.dod.mil/ This doesn't work for me.

Anonymous 03/24/2017 (Fri) 07:38:06 [Preview] No. 861 del
nvm, I had to use a normal firefox profile then accept the unknown certificate manually.

Endware Endwall 05/03/2016 (Tue) 08:54:28 [Preview] No. 32 [Reply]
Endware is a suite of programs geared towards internet privacy, security, and anonymity.

Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.

Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.

Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.

Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.

iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.

spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.

alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.

mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.

Message too long. Click here to view full text.

162 posts and 3 images omitted.

Anonymous 03/07/2017 (Tue) 06:48:41 [Preview] No. 848 del
Thank you very much I now understand the code a little bit more now hat you explained it.

Anonymous 03/07/2017 (Tue) 06:50:22 [Preview] No. 849 del

Endwall 03/12/2017 (Sun) 01:49:27 [Preview] No. 852 del

Sandbox variable is stopping tor from running, comment this out or set it to 0.

Sandbox 1 , change to
## Sandbox 0

Not sure what this is about, linux will not allow the system call that it is making with this set to 1, stopping tor from starting. I've updated the file on github and on the hidden service.

Endwall 03/19/2017 (Sun) 07:05:25 [Preview] No. 857 del
endstream.sh version 0.17

Added more channels, now I use a curl method to update dead streams from the channel directly rather than hard coding the link, I'll update the remaining transient streams as they die off.

endtv.sh version 0.01

Simillar to endstream.sh but with channels taken from filmOnTV.com . Some of these channels have a strange tendancy to drop out after around 5 mins. Not sure what's going on with that, if you have any clues on how to fix this post below.

I have tests,midterms and assignments due next week, so I'm offline. I've added some of the requests to the git file https://github.com/endwall2/endware/raw/master/TODO.txt
I'll get around to the request eventually.

Anonymous 03/19/2017 (Sun) 17:25:05 [Preview] No. 858 del
Here is a pf configuration that only allows tor.
set skip on lo

block log
pass out inet proto tcp user _tor

Online Security News Endwall 07/07/2016 (Thu) 06:09:23 [Preview] No. 149 [Reply]
See a news article or CVE bug report on an emerging computer security issue and want to share it? Post below.

I will also post links to Hak5 Threatwire videos.
Edited last time by Endwall on 07/07/2016 (Thu) 16:22:47.
389 posts omitted.

Endwall 03/09/2017 (Thu) 23:45:21 [Preview] No. 850 del
Jupiter Broadcasting
Bad Boy Backups | TechSNAP 309
We’ve got the sad story of cloud-enabled toys leading to, you guessed it, leaking customer’s personal information! Plus a case of backups gone bad, but this time, it’s a good thing!

Tokyo Dreaming | BSD Now 184
This week on BSDNow, Allan & Kris are in Tokyo for AsiaBSDCon, but not to worry, we have a full episode lined up and ready to go.

Vault 7 Unlocked | Unfilter 228
Wikileaks drops Vault 7 filled with CIA secrets. We analyze it & the establishment’s response. Plus are Trump’s claims he was wiretapped crazy or rooted in reality?

Message too long. Click here to view full text.

Endwall 03/09/2017 (Thu) 23:50:10 [Preview] No. 851 del
Hak 5
FCC Stays Privacy Regulations, CloudPets Ignores Hack, & 32 Million Yahoo Accts Hacked - Threat Wire - Duration: 7 minutes, 53 seconds.
https://youtube.com/watch?v=3Sch7loo1mk [Embed]
How to Write Bash Bunny Payloads & Contribute on GitHub - Hak5 2126 - Duration: 29 minutes.
https://youtube.com/watch?v=H6z9BXevsZg [Embed]

Endwall 03/16/2017 (Thu) 22:10:46 [Preview] No. 853 del
Jupiter Broadcasting

Don’t Panic & P your S | TechSNAP 310
March 14, 2017

We crack open Vault 7 & are a little let down by what’s inside, give you one more reason you should already be using ZFS & just when you thought you could trust your phone again, we’ve got the story of preinstalled Android malware. Then it’s your feedback, a huge roundup & so much more!


Exit Interview | BSD Now 185
March 16, 2017

This is a very special BSD Now! New exciting changes are coming to the show and we’re gonna cover them, so stick around or you’ll miss it!

Message too long. Click here to view full text.

Endwall 03/16/2017 (Thu) 22:12:53 [Preview] No. 854 del
Hak 5

'Linux Terminal 201: Customize The Shell Prompt - HakTip 148 - Duration: 7 minutes.'
https://youtube.com/watch?v=_kSCpNqKJbM [Embed]
CIA Hacking Tools Released in Wikileaks Vault 7 - Threat Wire - Duration: 11 minutes.
https://youtube.com/watch?v=5LYSjLwkAo4 [Embed]
Hack Across the Planet 2017 Day 1 - Hak5 2201 - Duration: 6 minutes, 27 seconds.
https://youtube.com/watch?v=8CU2IwvMJzw [Embed]

Endwall 03/17/2017 (Fri) 00:01:18 [Preview] No. 855 del
Jupiter Broadcasting

Trump Taxes and Tappin | Unfilter 229

The big Trump tax reveal is a bust, but not for the reasons you might think. Trump’s wiretapping claims are looking more and more farfetched & who else could have been behind the DNC leaks.



Hardware Endwall 09/18/2016 (Sun) 18:31:31 [Preview] No. 580 [Reply]
Discuss hardware and alternative hardware concepts to increase computer and online privacy and security.
Edited last time by Endwall on 09/18/2016 (Sun) 18:50:04.

Anonymous 12/24/2016 (Sat) 17:47:43 [Preview] No. 740 del
Lynxchan installation tutorial

Anonymous 02/22/2017 (Wed) 05:31:33 [Preview] No. 835 del
(23.44 KB 500x327 dunno.jpg)
RISC-V looks pretty cool.

Compile Thread Anonymous 11/27/2016 (Sun) 20:44:39 [Preview] No. 692 [Reply]
Endwall guy should keep irrelevant compile instructions in this thread by editing the OP or edit the Sticky thread before purging said irrelevant posts in various threads. Just remind them to compile from source and redirect them to this thread.
5 posts omitted.

Tor mods Endwall 12/04/2016 (Sun) 06:01:18 [Preview] No. 709 del
change this to

digest_algorithm_t alg = DIGEST_SHA1;
digest_algorithm_t alg = DIGEST_SHA256;
Leave this alone it will break tor if you change it.


change to

Message too long. Click here to view full text.

Edited last time by Endwall on 12/22/2016 (Thu) 05:15:38.

Install torsocks from source Endwall 12/04/2016 (Sun) 06:01:50 [Preview] No. 710 del
Install Torsocks from source

$ su
# pacman -S git
# apt-get install git
$ mkdir -p ~/git
$ cd ~/git
$ git clone https://git.torproject.org/torsocks.git

or if tor is already running with previous version of torsocks
$ torsocks git clone https://git.torproject.org/torsocks.git

$ mkdir -p ~/tor
$ mv torsocks ~/tor
$ cd ~/tor
$ cd torsocks
$ ./autogen.sh

Message too long. Click here to view full text.

youtube-dl from git Endwall 12/04/2016 (Sun) 06:02:28 [Preview] No. 711 del
Install Youtube-dl from source git

$ cd ~/
$ mkdir -p git
$ cd git
$ torsocks git clone https://github.com/rg3/youtube-dl.git
$ cd youtube-dl
$ su
# torsocks pacman -S zip pandoc
# pacman -Rc youtube-dl
# exit
$ make
$ ls
$ cd ~/bin
$ ln -s ~/git/youtube-dl/youtube-dl youtube-dl
$ cd ~
$ export PATH=$HOME/bin:$PATH

Message too long. Click here to view full text.

Tor from git repo Endwall 12/04/2016 (Sun) 06:03:18 [Preview] No. 712 del
Clone tor from git repo


$ mkdir ~/git
$ cd ~/git
$ torsocks -i git clone http://dccbbv6cooddgcrq.onion/tor.git
$ cd tor
$ cd src
$ cd or
$ nano or.h
$ nano routerparse.c
$ nano circuituse.c
$ cd ..
$ sudo su

Message too long. Click here to view full text.

Anonymous 01/15/2017 (Sun) 22:04:32 [Preview] No. 797 del
is there reason to use torsocks over git's builtin socks5 proxy?

wouldn't it be better if you just register as http.proxy and https.proxy variable by git config?

Not sure what revision of git your distro ships with but using torsocks should be considered depreciated hack for applications with builtin socks5 proxy support.

SSH privacy Anonymous 05/11/2016 (Wed) 18:16:01 [Preview] No. 42 [Reply]
How can I anonymously ssh into something? Going through Tor and using a freshly generated key for identification is obvious, but how can I make sure that there is no data leakage above all that? I haven't been able to find any guides on that, even though it seems like something a lot of people might be interested in doing.
2 posts omitted.

Anonymous 05/11/2016 (Wed) 21:01:41 [Preview] No. 45 del
>posting in the little retard's pet board
>captcha required

post this somewhere else if you are interested

Anonymous 10/21/2016 (Fri) 05:56:34 [Preview] No. 620 del
you gotta make suer your ssh deosn't show your key files to the server too

Anonymous 10/21/2016 (Fri) 12:05:39 [Preview] No. 621 del
Commenting out
SendEnv LANG LC_*
can help too.

Disabling pubkey auth is important. If you have passwordless key or have key loaded in ssh-agent, option
disables pubkey auth completely.

Also, there's this thing to demonstrate deanon by ssh key:

Anonymous 12/28/2016 (Wed) 01:52:02 [Preview] No. 748 del
Finally, my almonds have been activated.

Anonymous 01/08/2017 (Sun) 19:31:59 [Preview] No. 782 del
In ~/.ssh/config so you don't leak your username if you forget to specify one.
host *

user root

(25.07 KB 274x237 1480165941744.jpg)
Non ICAAN controlled domains Anonymous 01/02/2017 (Mon) 18:30:10 [Preview] No. 760 [Reply]
I have a website but I'm afraid that it won't stay up within the first year that Trump gets in. I would eventually pay for my own static IP but before then, I need to really decide on what website domains I should use that isn't too expensive. Some territorial domains have specifications as to what can and can't be done while other domains are controlled by FVEY. .is BTW, is super expensive, I was told that the price is around $500.

Anonymous 01/02/2017 (Mon) 18:33:10 [Preview] No. 761 del
mispelt ICANN

Anonymous 01/06/2017 (Fri) 22:33:59 [Preview] No. 770 del
.is Is great, archive.is people are smart people.

Anonymous 01/07/2017 (Sat) 04:06:07 [Preview] No. 772 del
Come to think of it, I think that pricing was an error on their part, should be 89 to 99 USD per year.

I wish I was Norwegian so that I can get a .no instead. Besides .no, I was thinking of .fi but then I realized that EU nations are potentially bad. .tv is under Australia but I might have to settle for that if I really don't want to pay up for .is

Anonymous 01/07/2017 (Sat) 18:42:17 [Preview] No. 774 del

Real answer is "onion".

Anonymous 01/08/2017 (Sun) 19:22:37 [Preview] No. 781 del
or .i2p

Internet Security General Anonymous 04/16/2016 (Sat) 07:56:30 [Preview] No. 4 [Reply]
Continuing from >>>/tech/597
This is for non specific, general tips for anonymous web browsing and downloads, tips on browsers and browser configurations for the security concious that you don't want to make a new thread for.
33 posts and 1 image omitted.

Endwall 08/20/2016 (Sat) 19:48:35 [Preview] No. 345 del
Regenerate intermediate term signing key:

$ tor --keygen

This will ask you to create a passphrase and then generates the key, make up a strong passphrase before hand and store it somewhere
$ passgen

Endwall 09/04/2016 (Sun) 23:37:16 [Preview] No. 550 del
If you're forced to use Windows, and you want to browse the internet behind tor you can use the links2 windows binary,


and chain it to the tor expert bundle binary. I just tried this out and it worked fine.


endtorrc works with this setup but you have to comment out the Sandbox variable.
and place the torrc, torrc-defaults, geoip, and geoip6 files in the directory C:\Users\user\AppData\Roaming\tor\

Anonymous 09/07/2016 (Wed) 18:29:36 [Preview] No. 558 del
Are you enabling do not track? I wouldn't suggest that.

Endwall 09/07/2016 (Wed) 23:21:30 [Preview] No. 559 del

I didn't post >>321, but I'm glad someone did. I incorporated the extra header bit into my setup and into the Endware scripts. I personally don't enable the do not track button. That seems to be the recomendation from JonDonym to not send that request. Thanks for pointing this out. Perhaps I should write up new instructions for setting up links2. I'll do that on the weekend.

a@a 11/07/2016 (Mon) 03:47:53 [Preview] No. 665 del
Random trivial info: the tor browser uses 1000x600, so if you're using a hardened iceweasel or something pretending to be tor, change your window resolution to 1000x600 and doublecheck via ip-check.info