The Password Reset MitM Attack

An interesting approach to a Man-in-the-Middle Attack against a Password Reset System

The PRMitM attack exploits the similarity of the registration and password reset processes to launch a man in the middle (MitM) attack at the application level. The attacker initiates a password reset process with a website and forwards every challenge to the victim who either wishes to register in the attacking site or to access a particular resource on it.

Source: The Password Reset MitM Attack

FeeX – Retirement Fees Analyzer

Nearly all investments — including those in IRA, 401(k), 403(b), 457 and brokerage accounts — have fees. FeeX is a free service that finds these fees and helps you reduce them. FeeX’s mission is to make sure you keep as much of your own money as possible, instead of losing it to excessive fees. FeeX does not evaluate your investment choices or strategy. Instead, FeeX finds ways for you to invest according to your choices while paying the lowest fees available. In order to help you switch to similar low-fee alternatives, FeeX presents alternative investments with better past returns (when possible) than your original investments.

Source: FeeX

The processing of Group Policy failed because of lack of network connectivity to a domain controller

After some recent infrastructure changes, I noticed that certain group policies were not being applied due to network connectivity lag as a result of how our systems were setup. To resolve this, I stumbled on a post that describes a Group Policy setting that can force the computer to wait for full network connectivity before logon.

To enable this setting:

  1. Open the Local Group Policy Editor
  2. Expand Computer Configuration
  3. Expand Administrative Templates
  4. Expand System
  5. Expand Logon
  6. Enable the Always wait for the network at computer startup and logon setting
  7. Restart your computer

O.C.E.A.N

Ed Sutton on the dangers of big data and how everything we do, online or offline, leaves a digital footprint behind. He describes how every purchase with a card, every search, every movement with a smart device and every social media interaction (Likes, Retweets etc.) get stored. When used in aggregate, this data reflect a social and identity fingerprint that uniquely identifies you and furthermore can predict your behaviors and responses.

The Big Five: Openness (how open are you to new experiences?), Conscientiousness (how much of a perfectionist are you?), Extroversion (how sociable are you?), Agreeableness (how considerate and cooperative are you?), and Neuroticism (how sensitive/vulnerable are you?). With these five dimensions (O.C.E.A.N.), you can determine fairy precisely what kind of person you are dealing with—their needs and fears as well as how they are likely to behave.

Source: Trump Knows You Better Than You Know Yourself