<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security | KC's Blog</title>
	<atom:link href="https://www.kjctech.net/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.kjctech.net</link>
	<description></description>
	<lastBuildDate>Tue, 24 Jan 2023 18:20:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://i0.wp.com/www.kjctech.net/wp-content/uploads/2016/12/cropped-KC-Logo.png?fit=32%2C32&#038;ssl=1</url>
	<title>Security | KC's Blog</title>
	<link>https://www.kjctech.net</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">24634607</site>	<item>
		<title>How To Limit Cached Domain Credentials on Windows 10</title>
		<link>https://www.kjctech.net/how-to-limit-cached-domain-credentials-on-windows-10/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-limit-cached-domain-credentials-on-windows-10</link>
					<comments>https://www.kjctech.net/how-to-limit-cached-domain-credentials-on-windows-10/#comments</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Tue, 15 Jun 2021 05:49:54 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Cached Credentials]]></category>
		<category><![CDATA[group policy]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.kjctech.net/?p=4642</guid>

					<description><![CDATA[<p>Cached credentials are extremely useful for laptops that don&#8217;t always connect to their domain controls. When you log into one that is outside of your network, Windows checks if the entered username and password match the local cached copy and will let you in if it does. But it&#8217;s not necessary on a desktop computer that is always wire-connected to [&#8230;]</p>
The post <a href="https://www.kjctech.net/how-to-limit-cached-domain-credentials-on-windows-10/">How To Limit Cached Domain Credentials on Windows 10</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p>Cached credentials are extremely useful for laptops that don&#8217;t always connect to their domain controls. When you log into one that is outside of your network, Windows checks if the entered username and password match the local cached copy and will let you in if it does. But it&#8217;s not necessary on a desktop computer that is always wire-connected to  the network.</p>



<p>By default, Windows caches up to 10 credentials on local computer and these cached credentials never expire. They are stored in the registry under <strong>HKLM\Security\Cache</strong> key.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="600" height="324" src="//i0.wp.com/kjctech.net/wp-content/uploads/2021/06/image-1-600x324.png" alt="" class="wp-image-4643" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2021/06/image-1.png?resize=600%2C324&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2021/06/image-1.png?resize=450%2C243&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2021/06/image-1.png?resize=250%2C135&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2021/06/image-1.png?resize=520%2C281&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2021/06/image-1.png?resize=360%2C195&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2021/06/image-1.png?resize=100%2C54&amp;ssl=1 100w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2021/06/image-1.png?w=688&amp;ssl=1 688w" sizes="(max-width: 600px) 100vw, 600px" /></figure>



<p>Note that you will need to give yourself Read permission </p>



<p>All credentials are hashed in the NL$x value format and cannot be viewed plainly and easily decrypted, fortunately. However, it could still potentially be risky because once the hackers get their hands on these data they can use a brute-force attack against these hashes to decrypt the password.</p>



<p>So, here are a few approaches to limit the cache credentials on Windows computers.</p>



<p>First of all, add all accounts in Domain Admin group to the <strong>Protected Users</strong> group so the credentials for these accounts won&#8217;t be cached locally. However, if you have some apps that integrates with AD you may find difficulty signing in using your own password.</p>



<p>Then, turn on BitLocker disk encryption if possible. Once encrypted, hackers won&#8217;t be able to do anything with it.</p>



<p>If BitLocker is not possible, disable cached credentials on all desktops and limit to only 1 for all laptops.</p>



<p>It&#8217;s easier to do so through GPO. Head over to the following location,</p>



<pre class="wp-block-preformatted">Computer Configuration &gt; Windows Settings &gt; Security Settings &gt; Local Policies &gt; Security Options</pre>



<p>And set the <strong>Interactive Logon: Number of previous logons to cache</strong> to 1 for laptops and 0 for desktops.</p>



<p>Additionally, you can display a notification of using cached credentials by enabling the policy <strong>Report when logon server was not available during user logon </strong>under the following location:</p>



<pre class="wp-block-preformatted">Computer Configuration &gt; Policies &gt; Administrative Templates &gt; Windows Components &gt; Windows Logon Options</pre>The post <a href="https://www.kjctech.net/how-to-limit-cached-domain-credentials-on-windows-10/">How To Limit Cached Domain Credentials on Windows 10</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/how-to-limit-cached-domain-credentials-on-windows-10/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4642</post-id>	</item>
		<item>
		<title>How To Check if My Email is Encrypted during Transition</title>
		<link>https://www.kjctech.net/how-to-check-if-my-email-is-encrypted-during-transition/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-check-if-my-email-is-encrypted-during-transition</link>
					<comments>https://www.kjctech.net/how-to-check-if-my-email-is-encrypted-during-transition/#comments</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Sun, 09 Jun 2019 05:04:43 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[gmail]]></category>
		<category><![CDATA[outlook]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.kjctech.net/?p=4344</guid>

					<description><![CDATA[<p>Back to the old days when everything goes through the classic SMTP, nothing gets protected. Those were the good days for any man in the middle, picking up confidential information like free gift. Not anymore with the use of TLS, StartTLS, or even better S/MIME which is suitable for your most sensitive information. Every email sent through TLS is encrypted [&#8230;]</p>
The post <a href="https://www.kjctech.net/how-to-check-if-my-email-is-encrypted-during-transition/">How To Check if My Email is Encrypted during Transition</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p>Back to the old days when everything goes through the classic SMTP, nothing gets protected. Those were the good days for any man in the middle, picking up confidential information like free gift.</p>



<p>Not anymore with the use of TLS, StartTLS, or even better S/MIME which is suitable for your most sensitive information.</p>



<p>Every email sent through TLS is encrypted to protect the message in transit from one server to another. It requires both mail servers to follow along in order for the encryption to work. But not all mail servers are equally made. If an email is sent via TLS but the other end doesn&#8217;t accept TLS, the email will be degraded from TLS. Like back to the old days, email gets decrypted and delivered in plain text. Bad news for you but good news for the man in the middle.</p>



<p>According to <a rel="noreferrer noopener" aria-label="Google (opens in a new tab)" href="https://transparencyreport.google.com/safer-email/overview?encrypt_region_table=region:001;encryption_level:RED&amp;lu=encrypt_region_table" target="_blank">Google</a>, during a 3-month period between March 11, 2019, and June 9, 2019, 89% of emails going out from Gmail and 94% of email received by Gmail are encrypted. And who are the top bad guys?</p>



<figure class="wp-block-image"><a href="//i0.wp.com/kjctech.net/wp-content/uploads/2019/06/image-6.png" data-rel="lightbox-image-0" data-rl_title="" data-rl_caption="" title=""><img decoding="async" width="1152" height="569" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-6.png?fit=600%2C296&amp;ssl=1" alt="" class="wp-image-4349" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-6.png?w=1152&amp;ssl=1 1152w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-6.png?resize=250%2C123&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-6.png?resize=450%2C222&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-6.png?resize=768%2C379&amp;ssl=1 768w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-6.png?resize=600%2C296&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-6.png?resize=700%2C346&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-6.png?resize=520%2C257&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-6.png?resize=360%2C178&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-6.png?resize=100%2C49&amp;ssl=1 100w" sizes="(max-width: 640px) 100vw, 640px" /></a></figure>



<h2 class="wp-block-heading">So how to tell if my incoming emails are encrypted</h2>



<h3 class="wp-block-heading">Gmail</h3>



<p>Google is on top of a lot of things. This is no different. If you are using Gmail as your main mail app, you can easily tell whether the email you received has never been intercepted by the man in the middle.</p>



<p>When you get an email, click the little down arrow to reveal the header and you will find if the message was received through TLS or other encryption method.</p>



<figure class="wp-block-image"><img decoding="async" width="749" height="402" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-5.png?fit=600%2C322&amp;ssl=1" alt="" class="wp-image-4348" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-5.png?w=749&amp;ssl=1 749w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-5.png?resize=250%2C134&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-5.png?resize=450%2C242&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-5.png?resize=600%2C322&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-5.png?resize=700%2C376&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-5.png?resize=520%2C279&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-5.png?resize=360%2C193&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-5.png?resize=100%2C54&amp;ssl=1 100w" sizes="(max-width: 640px) 100vw, 640px" /></figure>



<h3 class="wp-block-heading">Outlook</h3>



<p>Not as easy as Gmail but still can be done. Open the email you received from outside, click File > Properties.</p>



<figure class="wp-block-image"><a href="//i0.wp.com/kjctech.net/wp-content/uploads/2019/06/image-7.png" data-rel="lightbox-image-1" data-rl_title="" data-rl_caption="" title=""><img data-recalc-dims="1" loading="lazy" decoding="async" width="600" height="519" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-7.png?resize=600%2C519&#038;ssl=1" alt="" class="wp-image-4350" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-7.png?resize=600%2C519&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-7.png?resize=250%2C216&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-7.png?resize=450%2C389&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-7.png?resize=768%2C664&amp;ssl=1 768w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-7.png?resize=700%2C605&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-7.png?resize=520%2C450&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-7.png?resize=360%2C311&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-7.png?resize=100%2C86&amp;ssl=1 100w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-7.png?w=769&amp;ssl=1 769w" sizes="auto, (max-width: 600px) 100vw, 600px" /></a></figure>



<p>And look through the Internet headers section. If you see the word TLS in there somewhere you can safely tell your email is safe during the transition.</p>



<h2 class="wp-block-heading">How to tell if email I am sending is encrypted</h2>



<p>For Gmail, if you have S/MIME enabled on your account, you will see a lock icon that shows the level of encryption supported by your message&#8217;s recipients. Otherwise, there is no direct way to tell whether your email will be safe all the way to the other end.</p>



<p>But there are a few workarounds that we can still take.</p>



<p>First, we can start with an introduction email and only start sending confidential content after receiving one email from other party and verified that it&#8217;s safe.</p>



<p>Or, we can use a <a rel="noreferrer noopener" aria-label="TLS checker (opens in a new tab)" href="https://www.checktls.com" target="_blank">TLS checker</a> to scan and verify that the mail server used by the domain you are communicating with supports at least TLS. It&#8217;s safe to email me confidential stuff because it&#8217;s OK in the TLS column like below.</p>



<figure class="wp-block-image"><a href="//i0.wp.com/kjctech.net/wp-content/uploads/2019/06/image-8.png" data-rel="lightbox-image-2" data-rl_title="" data-rl_caption="" title=""><img loading="lazy" decoding="async" width="677" height="402" src="https://i2.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-8.png?fit=600%2C356&amp;ssl=1" alt="" class="wp-image-4351" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-8.png?w=677&amp;ssl=1 677w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-8.png?resize=250%2C148&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-8.png?resize=450%2C267&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-8.png?resize=600%2C356&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-8.png?resize=520%2C309&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-8.png?resize=360%2C214&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-8.png?resize=100%2C59&amp;ssl=1 100w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></figure>



<p>But never send confidential emails to the mail server that&#8217;s not safe like below.</p>



<figure class="wp-block-image"><img loading="lazy" decoding="async" width="639" height="398" src="https://i2.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-10.png?fit=600%2C374&amp;ssl=1" alt="" class="wp-image-4353" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-10.png?w=639&amp;ssl=1 639w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-10.png?resize=250%2C156&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-10.png?resize=450%2C280&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-10.png?resize=600%2C374&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-10.png?resize=520%2C324&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-10.png?resize=360%2C224&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-10.png?resize=500%2C310&amp;ssl=1 500w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-10.png?resize=100%2C62&amp;ssl=1 100w" sizes="auto, (max-width: 639px) 100vw, 639px" /></figure>



<p>Last, if you are using Gmail and need the highest security for sending confidential via email, you can turn on the <strong>Confidential Mode</strong> so entire email communication will be secured.</p>



<figure class="wp-block-image"><a href="//i0.wp.com/kjctech.net/wp-content/uploads/2019/06/image-11.png" data-rel="lightbox-image-3" data-rl_title="" data-rl_caption="" title=""><img loading="lazy" decoding="async" width="651" height="190" src="https://i2.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-11.png?fit=600%2C175&amp;ssl=1" alt="" class="wp-image-4354" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-11.png?w=651&amp;ssl=1 651w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-11.png?resize=250%2C73&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-11.png?resize=450%2C131&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-11.png?resize=600%2C175&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-11.png?resize=520%2C152&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-11.png?resize=360%2C105&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-11.png?resize=100%2C29&amp;ssl=1 100w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></figure>The post <a href="https://www.kjctech.net/how-to-check-if-my-email-is-encrypted-during-transition/">How To Check if My Email is Encrypted during Transition</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/how-to-check-if-my-email-is-encrypted-during-transition/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4344</post-id>	</item>
		<item>
		<title>An InfoSec Security Training Slideshow</title>
		<link>https://www.kjctech.net/an-infosec-security-training-slideshow/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=an-infosec-security-training-slideshow</link>
					<comments>https://www.kjctech.net/an-infosec-security-training-slideshow/#respond</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Tue, 04 Jun 2019 18:52:06 +0000</pubDate>
				<category><![CDATA[Stuff in General]]></category>
		<category><![CDATA[Resources]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.kjctech.net/?p=4341</guid>

					<description><![CDATA[<p>A fellow IT Redditor, /u/shalafi71, created quite a security training slideshow and generously shared his PowerPoint on /r/sysadmin, who also adds: Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it&#160;relevant&#160;to your people. Include corporate stories, [&#8230;]</p>
The post <a href="https://www.kjctech.net/an-infosec-security-training-slideshow/">An InfoSec Security Training Slideshow</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p>A fellow IT Redditor, <a rel="noreferrer noopener" aria-label="/u/shalafi71 (opens in a new tab)" href="https://www.reddit.com/user/shalafi71" target="_blank">/u/shalafi71</a>, created quite a security training slideshow and generously shared his PowerPoint on <a rel="noreferrer noopener" aria-label="/r/sysadmin (opens in a new tab)" href="https://www.reddit.com/r/sysadmin/comments/brx4ca/security_training_done_right_heres_my_slideshow/" target="_blank">/r/sysadmin</a>, who also adds:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it&nbsp;<em>relevant</em>&nbsp;to your people. Include corporate stories, include your audience,&nbsp;<em>exclude yourself</em>.</p><p>This ain&#8217;t about how smart you are at infosec, and I can&#8217;t stress this enough, talk about how people can&nbsp;<em>defend</em>themselves. Give them things to&nbsp;<em>look</em>&nbsp;for and&nbsp;<em>action</em>&nbsp;they can take. No one gives a shit about your firewall rules. </p></blockquote>



<p>You can also check the slideshow directly <a href="https://docs.google.com/presentation/d/1oPlPUmDagHowFFQxmNTf_vNU0Hh_G6klbH_UpTCUWtQ/edit#slide=id.p1" target="_blank" rel="noreferrer noopener" aria-label="here (opens in a new tab)">here</a>.</p>The post <a href="https://www.kjctech.net/an-infosec-security-training-slideshow/">An InfoSec Security Training Slideshow</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/an-infosec-security-training-slideshow/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4341</post-id>	</item>
		<item>
		<title>Do You Need to Update KRBTGT Account Password?</title>
		<link>https://www.kjctech.net/do-you-need-to-update-krbtgt-account-password/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=do-you-need-to-update-krbtgt-account-password</link>
					<comments>https://www.kjctech.net/do-you-need-to-update-krbtgt-account-password/#comments</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Fri, 22 Mar 2019 23:37:52 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.kjctech.net/?p=4266</guid>

					<description><![CDATA[<p>A Reddit user raised this great question today that I am not aware of. So I did a little research and here is the breakdown of what it is. What is KRBTGT? The KRBTGT is a local default account that acts as a service account for the Key Distribution Center (KDC) service. It&#8217;s created automatically when a new domain is [&#8230;]</p>
The post <a href="https://www.kjctech.net/do-you-need-to-update-krbtgt-account-password/">Do You Need to Update KRBTGT Account Password?</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p>A Reddit user raised <a href="https://www.reddit.com/r/sysadmin/comments/b456i1/how_many_of_you_guys_change_the_krbtgt_password/" target="_blank" rel="noreferrer noopener" aria-label="this great  (opens in a new tab)">this great </a>question today that I am not aware of. So I did a little research and here is the breakdown of what it is.</p>



<h2 class="wp-block-heading">What is KRBTGT?</h2>



<p>The <strong>KRBTGT</strong> is a local default account that acts as a service account for the <strong>Key Distribution Center (KDC)</strong> service. It&#8217;s created automatically when a new domain is created.</p>



<ul class="wp-block-list"><li>It cannot be deleted</li><li>its name cannot be changed</li><li>it cannot be enabled</li><li>it only belongs to the following two groups<ul><li>Domain Users</li><li>Denied RODC Password Replication Group</li></ul></li></ul>



<p>KDC service handles all Kerberos ticket requests so KRBTGT account in AD plays a key role that encrypts and sign all Kerberos tickets for the domain.</p>



<figure class="wp-block-image"><img data-recalc-dims="1" loading="lazy" decoding="async" width="425" height="317" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/03/image-10.png?resize=425%2C317&#038;ssl=1" alt="" class="wp-image-4268" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/03/image-10.png?w=425&amp;ssl=1 425w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/03/image-10.png?resize=250%2C186&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/03/image-10.png?resize=360%2C269&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/03/image-10.png?resize=100%2C75&amp;ssl=1 100w" sizes="auto, (max-width: 425px) 100vw, 425px" /></figure>



<p>You can also use the PowerShell code to get the account&#8217;s detail as well:</p>



<pre class="wp-block-preformatted">Get-AdUser krbtgt -property created, passwordlastset, enabled, sid, distinguishedname<br></pre>



<figure class="wp-block-image"><a href="//i0.wp.com/kjctech.net/wp-content/uploads/2019/03/image-9.png" data-rel="lightbox-image-0" data-rl_title="" data-rl_caption="" title=""><img loading="lazy" decoding="async" width="705" height="304" src="https://i1.wp.com/www.kjctech.net/wp-content/uploads/2019/03/image-9.png?fit=600%2C259&amp;ssl=1" alt="" class="wp-image-4267" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/03/image-9.png?w=705&amp;ssl=1 705w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/03/image-9.png?resize=250%2C108&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/03/image-9.png?resize=450%2C194&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/03/image-9.png?resize=600%2C259&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/03/image-9.png?resize=700%2C302&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/03/image-9.png?resize=520%2C224&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/03/image-9.png?resize=360%2C155&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/03/image-9.png?resize=100%2C43&amp;ssl=1 100w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></figure>



<h2 class="wp-block-heading">How it works:</h2>



<ol class="wp-block-list"><li>User logs on with AD user name and password to a domain-joined computer (usually a workstation).</li><li>The user requests authentication by sending a timestamp (Pre-auth data) encrypted with the users password-based encryption key (password hash).</li><li>User account (user@adsecurity.org) requests a Kerberos service ticket (TGT) with PREAUTH data (Kerberos AS-REQ).</li><li>The Kerberos server (KDC) receives the authentication request, validates the data, and replies with a TGT (Kerberos AS-REP).</li></ol>



<h2 class="wp-block-heading">Why do you need to update its password?</h2>



<p>99.99% of the time, the KRBTGT account&#8217;s password has not changed since the AD Domain was set up. But since it&#8217;s a domain account, all writable DCs know the account password in order to decrypt Kerberos tickets for validation.</p>



<p>Because of that, the attackers may use the KRBTGT account to persist on the network even if every other account has its password changed. During an <a href="http://www.slideshare.net/gentilkiwi/abusing-microsoft-kerberos-sorry-you-guys-dont-get-it">incredibly awesome talk</a> (<a href="https://t.co/z9RUr0Hfl9">Video</a>) at the Black Hat 2014 security conference in Las Vegas, NV in early August, Skip Duckwall &amp; Benjamin Delpy spoke about a method (using <a href="https://adsecurity.org/?p=556">Mimikatz</a>) to generate your own Kerberos tickets (aka the <strong>Golden Ticket</strong>). </p>



<p>And that&#8217;s why Microsoft now <a href="https://technet.microsoft.com/en-us/library/dn745899.aspx#Anchor_5">recommends that the KRBTGT password change on a regular basis</a>. </p>



<h2 class="wp-block-heading">How to change the password?</h2>



<p>Microsoft posted a&nbsp;<a href="https://gallery.technet.microsoft.com/Reset-the-krbtgt-account-581a9e51">KRBTGT account password PowerShell script on TechNet</a>&nbsp;that will change the KRBTGT account password once for a domain, force replication, and monitor change status.</p>



<p>Note that changing the KRBTGT account password in a 2008 (or higher) DFL will not cause replication issues.</p>



<p>There are two KRBTGT Password Change Scenarios:</p>



<ul class="wp-block-list"><li>Maintenance: Changing the KRBTGT account password once, waiting for replication to complete (and the forest converge), and then changing the password a second time, provides a solid process for ensuring the KRBTGT account is protected and reduces risk (Kerberos and application issues).</li><li>Breach Recovery: Changing the KRBTGT account password twice in rapid succession (before AD replication completes) will invalidate all existing TGTs forcing clients to re-authenticate since the KDC service will be unable to decrypt the existing TGTs. Choosing this path will likely require rebooting application servers (or at least re-starting application services to get them talking Kerberos correctly again).</li></ul>



<h2 class="wp-block-heading">Resources:</h2>



<ul class="wp-block-list"><li><a href="https://adsecurity.org/?p=483">Kerberos &amp; KRBTGT: Active Directory&#8217;s Domain Kerberos Service Account</a></li><li><a href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn745899(v=ws.11)#Anchor_5">Active Directory Accounts</a></li><li><a href="https://gallery.technet.microsoft.com/Reset-the-krbtgt-account-581a9e51">Reset the krbtgt account password/keys</a></li><li></li></ul>The post <a href="https://www.kjctech.net/do-you-need-to-update-krbtgt-account-password/">Do You Need to Update KRBTGT Account Password?</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/do-you-need-to-update-krbtgt-account-password/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4266</post-id>	</item>
		<item>
		<title>Checking Pwned Passwords against Active Directory&#8217;s NTLM Hashes</title>
		<link>https://www.kjctech.net/checking-pwned-passwords-against-active-directorys-ntlm-hashes/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=checking-pwned-passwords-against-active-directorys-ntlm-hashes</link>
					<comments>https://www.kjctech.net/checking-pwned-passwords-against-active-directorys-ntlm-hashes/#comments</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Wed, 29 Aug 2018 19:00:34 +0000</pubDate>
				<category><![CDATA[Stuff in General]]></category>
		<category><![CDATA[NTLM]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.kjctech.net/?p=4192</guid>

					<description><![CDATA[<p>Pwned Passwords is a great web service that lets you check your own password against millions of compromised and leaked password. It&#8217;s not only getting constantly updated by the owner, Troy Hunt but offers text-based downloadable files and API for anyone interested in building a 3rd party app. Newly added to the list is the password hashes in NTLM format, [&#8230;]</p>
The post <a href="https://www.kjctech.net/checking-pwned-passwords-against-active-directorys-ntlm-hashes/">Checking Pwned Passwords against Active Directory’s NTLM Hashes</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p><a href="https://haveibeenpwned.com/Passwords" target="_blank" rel="noopener">Pwned Passwords</a> is a great web service that lets you check your own password against millions of compromised and leaked password. It&#8217;s not only getting constantly updated by the owner, <a href="https://www.troyhunt.com" target="_blank" rel="noopener">Troy Hunt</a> but offers text-based downloadable files and API for anyone interested in building a 3rd party app.</p>



<figure class="wp-block-image"><img data-recalc-dims="1" loading="lazy" decoding="async" width="640" height="173" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/08/Downloads-1.png?resize=640%2C173&#038;ssl=1" alt="" class="wp-image-4193" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/08/Downloads-1.png?w=1395&amp;ssl=1 1395w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/08/Downloads-1.png?resize=250%2C67&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/08/Downloads-1.png?resize=450%2C121&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/08/Downloads-1.png?resize=768%2C207&amp;ssl=1 768w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/08/Downloads-1.png?resize=600%2C162&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/08/Downloads-1.png?resize=700%2C189&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/08/Downloads-1.png?resize=520%2C140&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/08/Downloads-1.png?resize=360%2C97&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/08/Downloads-1.png?resize=100%2C27&amp;ssl=1 100w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/08/Downloads-1.png?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<p>Newly added to the list is <a href="https://www.troyhunt.com/pwned-passwords-now-as-ntlm-hashes/" target="_blank" rel="noopener">the password hashes in NTLM format</a>, which can be used to compare to the hashes in any AD environment. That&#8217;s a wonderful news to those mostly working in a Windows environment, myself included.</p>



<p>Here are the steps how this can be done. I personally haven&#8217;t got chance to test it myself but sure will in the near future.</p>



<ol class="wp-block-list"><li>Download the entire 517M NTLM passwords either <a href="https://downloads.pwnedpasswords.com/passwords/pwned-passwords-ntlm-ordered-by-count.7z.torrent">as a torrent</a> or <a href="https://downloads.pwnedpasswords.com/passwords/pwned-passwords-ntlm-ordered-by-count.7z">courtesy of Cloudflare aggressively caching them</a>.</li><li>Export AD hashes either using <a href="https://www.dsinternals.com/en/dumping-ntds-dit-files-using-powershell/" target="_blank" rel="noopener">PowerShell</a> or the built-in <a href="https://www.cyberis.co.uk/2014/02/obtaining-ntdsdit-using-in-built.html" target="_blank" rel="noopener"><g class="gr_ gr_5 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling" id="5" data-gr-id="5">ntdsutil</g></a> command line.</li><li>Check out the <a href="https://github.com/DGG-IT/Match-ADHashes/blob/master/Match-ADHashes.ps1" target="_blank" rel="noopener">Match-ADHashes PowerShell script</a> on GitHub or the <a href="https://semsec.net/2018/08/28/introducing-compromise-checker/" target="_blank" rel="noopener">Compromise Checker</a> by Semrau Security.</li></ol>The post <a href="https://www.kjctech.net/checking-pwned-passwords-against-active-directorys-ntlm-hashes/">Checking Pwned Passwords against Active Directory’s NTLM Hashes</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/checking-pwned-passwords-against-active-directorys-ntlm-hashes/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4192</post-id>	</item>
		<item>
		<title>The Dots Do Matter &#8211; How To Scam a Gmail User</title>
		<link>https://www.kjctech.net/the-dots-do-matter-how-to-scam-a-gmail-user/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-dots-do-matter-how-to-scam-a-gmail-user</link>
					<comments>https://www.kjctech.net/the-dots-do-matter-how-to-scam-a-gmail-user/#respond</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Tue, 17 Apr 2018 05:01:35 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[gmail]]></category>
		<category><![CDATA[Netflix]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.kjctech.net/?p=3870</guid>

					<description><![CDATA[<p>Dots don&#8217;t matter is a feature Google has put on Gmail, meaning If someone accidentally adds dots to your address when emailing you, you&#8217;ll still get that email. For example, if your email is johnsmith@gmail.com, you own all dotted versions of your address: john.smith@gmail.com jo.hn.sm.ith@gmail.com j.o.h.n.s.m.i.t.h@gmail.com The intention of this is good but it also opens a door for a phishing [&#8230;]</p>
The post <a href="https://www.kjctech.net/the-dots-do-matter-how-to-scam-a-gmail-user/">The Dots Do Matter – How To Scam a Gmail User</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p><a href="https://support.google.com/mail/answer/7436150?hl=en" target="_blank" rel="noopener">Dots don&#8217;t matter</a> is a feature Google has put on Gmail, meaning</p>
<blockquote><p>If someone accidentally adds dots to your address when emailing you, you&#8217;ll still get that email. For example, if your email is <strong>johnsmith@gmail.com</strong>, you own all dotted versions of your address:</p>
<ul>
<li><strong>john.smith@gmail.com</strong></li>
<li><strong>jo.hn.sm.ith@gmail.com</strong></li>
<li><strong>j.o.h.n.s.m.i.t.h@gmail.com</strong></li>
</ul>
</blockquote>
<p>The intention of this is good but it also opens a door for a phishing scam. Here is an example.</p>
<p>James Hfisher received an email from Netflix asking him to update his payment details.</p>
<p><a href="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?ssl=1" data-rel="lightbox-image-0" data-rl_title="" data-rl_caption="" title=""><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-3872" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email-600x552.png?resize=600%2C552&#038;ssl=1" alt="" width="600" height="552" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?resize=600%2C552&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?resize=250%2C230&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?resize=450%2C414&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?resize=768%2C707&amp;ssl=1 768w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?resize=700%2C644&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?resize=520%2C479&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?resize=360%2C331&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?resize=100%2C92&amp;ssl=1 100w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?w=1332&amp;ssl=1 1332w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 600px) 100vw, 600px" /></a></p>
<p>Since the email is genuinely from Netflix, he clicked the link. It logged him in and directed him to an &#8220;<a href="https://www.netflix.com/simplemember/editcredit?locale=en-GB">Update your credit or debit card</a>&#8221; page, which again is genuinely hosted on Netflix. No phishing spotted so far.</p>
<p>But then, he found that he doesn&#8217;t recognize the credit card number shown on the Update page, never seen that number and certainly never used one. What&#8217;s going on?</p>
<p>James finally realized that the email was sent to james.hfisher@gmail.com with a dot in it while the one he uses doesn&#8217;t. The email was supposed to be bounced but instead, it ended up in James&#8217; inbox, thanks to Gmail&#8217;s <strong>dots don&#8217;t matter</strong> feature.</p>
<p>Here is how this runs down, concluded by James eventually.</p>
<ol>
<li>Hammer the Netflix signup form until you find an<code class="highlighter-rouge">gmail.com</code> address which is “already registered”. Let’s say you find the victim,<code class="highlighter-rouge">jameshfisher</code></li>
<li>Create a Netflix account with address,<code class="highlighter-rouge">james.hfisher</code>.</li>
<li>Sign up for a free trial with <a href="https://getfinal.com/">a throwaway card number</a>.</li>
<li>After Netflix applies the “active card check”, cancel the card.</li>
<li>Wait for Netflix to bill the canceled card. Then Netflix emails<code class="highlighter-rouge">james.hfisher</code> for a valid card.</li>
<li>Hope Jim reads the email to <code class="highlighter-rouge">james.hfisher</code>, assumes it’s for his Netflix account backed by <code class="highlighter-rouge">jameshfisher</code>, then enters his card,<code class="highlighter-rouge">**** 1234</code>.</li>
<li>Change the email for the Netflix account to <code class="highlighter-rouge">eve@gmail.com</code>, kicking Jim’s access to this account.</li>
<li>Use Netflix free forever with Jim’s card <code class="highlighter-rouge">**** 1234</code>!</li>
</ol>
<p>So, dots do matter in some cases.</p>
<p>/via <a href="https://jameshfisher.com/2018/04/07/the-dots-do-matter-how-to-scam-a-gmail-user">James Hfisher</a>/</p>The post <a href="https://www.kjctech.net/the-dots-do-matter-how-to-scam-a-gmail-user/">The Dots Do Matter – How To Scam a Gmail User</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/the-dots-do-matter-how-to-scam-a-gmail-user/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3870</post-id>	</item>
		<item>
		<title>Web Application Penetration Testing Cheat Sheet</title>
		<link>https://www.kjctech.net/web-application-penetration-testing-cheat-sheet/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=web-application-penetration-testing-cheat-sheet</link>
					<comments>https://www.kjctech.net/web-application-penetration-testing-cheat-sheet/#respond</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Wed, 11 Apr 2018 05:51:38 +0000</pubDate>
				<category><![CDATA[Network]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[WPT]]></category>
		<guid isPermaLink="false">https://www.kjctech.net/?p=3864</guid>

					<description><![CDATA[<p>This is a very nicely written cheat sheet by JDow.io for web application penetration testing. This cheat sheet is intended to run down the typical steps performed when conducting a web application penetration test. I will break these steps down into sub-tasks and describe the tools I recommend using at each level. Many of the ideas presented in this sheet [&#8230;]</p>
The post <a href="https://www.kjctech.net/web-application-penetration-testing-cheat-sheet/">Web Application Penetration Testing Cheat Sheet</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p>This is a very nicely written cheat sheet by JDow.io for web application penetration testing.</p>
<blockquote><p>This cheat sheet is intended to run down the typical steps performed when conducting a web application penetration test. I will break these steps down into sub-tasks and describe the tools I recommend using at each level.</p>
<p>Many of the ideas presented in this sheet come from the <strong>fantastic</strong> teachings of <a href="https://lanmaster53.com/">Tim “lanmaster53” Tomes</a>, who has kindly allowed me to share them with you here. If you or anyone you know is interested in web application penetration testing <a href="https://lanmaster53.com/training">Training</a> I <strong>highly</strong> recommend that you or your company consider Tim.</p>
<p>Please bear in mind that these steps are <strong>iterative</strong> so in a typical engagement you can expect to do them multiple times. This is particularly true if you manage to traverse different levels of access in an application (e.g. elevate from a regular user to an admin).</p>
<p>Finally, throughout this sheet, I will heavily discuss tools included in PortSwigger’s <a href="https://portswigger.net/burp">Burp Suite Professional</a> which is a paid product intended for professional use. I apologize if this dissuades you, but at the price they offer the tool for I consider it a bargain.</p></blockquote>
<p>/via <a href="https://jdow.io/blog/2018/03/18/web-application-penetration-testing-methodology/">JDow.io</a>/</p>The post <a href="https://www.kjctech.net/web-application-penetration-testing-cheat-sheet/">Web Application Penetration Testing Cheat Sheet</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/web-application-penetration-testing-cheat-sheet/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3864</post-id>	</item>
		<item>
		<title>What&#8217;s in a Boarding Pass Barcode?</title>
		<link>https://www.kjctech.net/whats-in-a-boarding-pass-barcode/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=whats-in-a-boarding-pass-barcode</link>
					<comments>https://www.kjctech.net/whats-in-a-boarding-pass-barcode/#respond</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Tue, 03 Oct 2017 23:37:20 +0000</pubDate>
				<category><![CDATA[Stuff in General]]></category>
		<category><![CDATA[Boarding Pass]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.kjctech.net/?p=3692</guid>

					<description><![CDATA[<p>Next time when you are throwing away a used boarding pass with a barcode on it, please consider tossing it into a shredder instead. Why? Two-dimensional barcodes and QR codes can hold a great deal of information, and the codes printed on airline boarding passes may allow someone to discover more about you, your future travel plans, and your frequent [&#8230;]</p>
The post <a href="https://www.kjctech.net/whats-in-a-boarding-pass-barcode/">What’s in a Boarding Pass Barcode?</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p>Next time when you are throwing away a used boarding pass with a barcode on it, please consider tossing it into a shredder instead. Why?</p>
<blockquote><p>Two-dimensional barcodes and QR codes can hold a great deal of information, and the codes printed on airline boarding passes may allow someone to discover more about you, your future travel plans, and your frequent flyer account.</p></blockquote>
<p>Thanks to <a href="https://krebsonsecurity.com/2015/10/whats-in-a-boarding-pass-barcode-a-lot/" target="_blank" rel="noopener">KrebsOnSecurity</a> for this valuable info.</p>
<p>The standards for the boarding pass barcodes are widely available and have been for years. Check out <a href="http://www.iata.org/whatwedo/stb/documents/bcbp_implementation_guidev4_jun2009.pdf" target="_blank" rel="noopener">this document</a> (PDF) from the <strong>International Air Transport Association</strong> (IATA) for more on how the barcode standards work and have been implemented in various forms.</p>
<p>For the same reason, It&#8217;s also not a good idea posting your boarding pass on social networks like Facebook without blurring out the critical information such as barcodes. In some worst cases, it can <a href="https://www.michalspacek.com/post-a-boarding-pass-on-facebook-get-your-account-stolen?utm_source=hackernewsletter&amp;utm_medium=email&amp;utm_term=fav" target="_blank" rel="noopener">get your account stolen</a>.</p>
<p><a href="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/10/deltabp-580x250.png?ssl=1" data-rel="lightbox-image-0" data-rl_title="" data-rl_caption="" title=""><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-full wp-image-3693" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/10/deltabp-580x250.png?resize=580%2C250&#038;ssl=1" alt="" width="580" height="250" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/10/deltabp-580x250.png?resize=580%2C250&amp;ssl=1 580w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/10/deltabp-580x250.png?resize=250%2C108&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/10/deltabp-580x250.png?resize=450%2C194&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/10/deltabp-580x250.png?resize=520%2C224&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/10/deltabp-580x250.png?resize=360%2C155&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/10/deltabp-580x250.png?resize=100%2C43&amp;ssl=1 100w" sizes="auto, (max-width: 580px) 100vw, 580px" /></a></p>
<p>Interested in learning what’s in your boarding pass barcode? Take a picture of the barcode with your phone, and upload it to <a href="http://online-barcode-reader.inliteresearch.com/" target="_blank" rel="noopener">this site</a>. <a href="https://shaun.net/posts/whats-contained-in-a-boarding-pass-barcode" target="_blank" rel="noopener">This blog</a> on the same topic from several years back includes some helpful hints on how to decode the various information fields that get dumped by the barcode reader.</p>The post <a href="https://www.kjctech.net/whats-in-a-boarding-pass-barcode/">What’s in a Boarding Pass Barcode?</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/whats-in-a-boarding-pass-barcode/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3692</post-id>	</item>
	</channel>
</rss>
