bot,
@bot@seal.cafe avatar

You guys better turn on 2FA if you don't want to get hacked.

kroner,
@kroner@seal.cafe avatar

I already have 2FA enabled Stalker Child :marseystalkerchild:

bot,
@bot@seal.cafe avatar

I actually read something about how cryptards got hacked even with 2FA so I don't really trust it.

RustyCrab,
@RustyCrab@clubcyberia.co avatar

@bot @kroner yes its called session hijacking and it totally bypasses 2FA. The fedi server and KF hacks we have had used this.

bot,
@bot@seal.cafe avatar

Please elaborate.

RustyCrab,
@RustyCrab@clubcyberia.co avatar

@bot @kroner when you enter your password on a site, the server gives you a temporary key called a session token that your computer stores. Every thing you do: posting, reading, changing settings, etc is authorized by that key. There are various ways that key can be copied off your computer and send somewhere else. Whoever has that key can do anything you can do.

Go into your settings and look at security and there should be a list of session tokens. Usually one or two per device you have logged in on.

bot,
@bot@seal.cafe avatar

That's what happened to the PPN right? What does it have to do with kfcc and kf?

RustyCrab,
@RustyCrab@clubcyberia.co avatar

@bot @kroner KF (the forum) was hit by the exact same thing. The exploit is called xss or "cross site scripting" where unauthorized code is somehow injected into the JavaScript of the site (how this is done is complicated but it basically relies on a misconfigured server, many times in ways that are not obvious). That injected JavaScript has access to your memory, can read your key and just send it off to someone else.

RustyCrab,
@RustyCrab@clubcyberia.co avatar

@bot @kroner twitter has also been hacked like this a few times I believe

Zergling_man,

@RustyCrab @bot @kroner AFAIK the twitter crypto one was an internal thing.

RustyCrab,
@RustyCrab@clubcyberia.co avatar

@Zergling_man @bot @kroner yes but there have been separate occasions. Jack's account got hit by it iirc

bot,
@bot@seal.cafe avatar

I know, I'm not stupid. I remember the PPN one was because someone sent graf a svg so how did the kf ones work?

RustyCrab,
@RustyCrab@clubcyberia.co avatar

@bot @kroner
>I know, I'm not stupid.
bro that is not common knowledge I would expect someone to know.

KF got exploited through a vulnerability in the sites chatbox. I dont know much beyond that.

bot,
@bot@seal.cafe avatar

Ok well I'm just trying to learn. How did it affect kfcc?

RustyCrab,
@RustyCrab@clubcyberia.co avatar

@bot @kroner kfcc wasn't up when it happened I think. It was the event that made sterence shut down sleepy cafe and I dont remember kfcc being up around then.

RustyCrab,
@RustyCrab@clubcyberia.co avatar

@kroner @bot for anybody else reading this, the vast majority of major site hacks (fedi included) I've seen lately entirely bypass 2FA by stealing session tokens via xss or some other exploit. In other words, passwords aren't the problem.

2 lessons from this:

  1. a strong password makes 2FA hardly relevant
  2. you should regularly revoke all your tokens just in case
PurpCat,
@PurpCat@clubcyberia.co avatar

@RustyCrab @kroner @bot especially with shitcord

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • Hentai
  • doujinshi
  • announcements
  • general
  • All magazines