Matt Mathur

cybersecurity researcher & bionicle enthusiast

I also like #baking, #cooking, #bionicles, #OSRS, #biking, and the #astros

Matt Mathur boosted:
2025-05-28

Ah, the classic millennial dilemma: Will I need these the second I dispose of them?

A tangled mess of black and white cables and chargers slung haphazardly over gray couch fabric
2024-06-13

@tinker looking forward to the follow up 🙌 I’ve been using long sleeve UPF shirts for a while in summer but still need the hat so a similar sweatshirt would be nice!

2024-06-12

@tinker have any links of ones you like? 🥹

Matt Mathur boosted:
Zack Whittakerzackwhittaker
2024-04-30

To put this into context, one of the world's wealthiest companies storing some of America's most sensitive data was hacked with relative ease because the company couldn't be bothered to switch on a basic security feature for its employees' logging in.

techcrunch.com/2024/04/30/uhg-

Matt Mathur boosted:
2024-03-06

If you read between the lines on the JetBrains and Rapid7 story, you'll see that JetBrains decided to cut Rapid7 out of the loop on Feb 23, but told Rapid7 that they're "still investigating" on Mar 1.

However you feel about PoCs, technical details, disclosure, etc., it's super inappropriate to lie to researchers who disclosed this to you responsibly about what your plans are.

Refs:

Matt Mathur boosted:
2024-02-16

someone sub-blogged infosec exchange so I’ll sub-post right back at them: no, I don’t come home from my job of auditing software 8 hours a day and then sit down and start auditing the software underlying every website I happen to personally use, I write novels, draw art and compose music

I’m happy someone DID audit it and DID find a bug to fix!, I think their technical work on this is good!, but I wouldn’t want to have to work with someone who feels I’m personally responsible for there being a bug in a website I’m an end user on just because I’m a professional firmware security reviewer

Matt Mathur boosted:
2024-01-26

I was being facetious with this image, but also making a point - I've seen lots of angles to ransomware, from tracking groups to being a victim to working with victims and everything in between.

Almost all of the ransomware operators are just doing the same things, with the same tools, usually copy and pasted.

AI isn't the problem.

Civil society is suffering, in part due to Western government's refusal to take meaningful action on ransomware. It needs a serious response.

2023-08-10

Happy #810NICLEDay to all those who celebrate🫡

2023-07-26

@haubles @renchap @Mastodon @devs And drink water y’all it’s hot out there 🧊

Matt Mathur boosted:
Very Hairy Jerryjerry@infosec.exchange
2023-07-05

It's probably obvious to most of you, but a big difference between the commercial social media platforms and the fediverse is that as those commercial platform grow, they get additional revenue from ads, from selling personal information, and otherwise monetizing their users. While that is turning out to not actually pay the bills for them, in the fediverse, just about every instance is run by volunteers and funded by donations or out of the volunteers' pockets. It's a labor of love and a hope for a better future. When traffic grows, we need to expand our capacity.

That is why I am asking, if you are able, please consider donating to the instance you on to help keep the fediverse ecosystem going. Typically the /about web page will have details on how to donate.

Note: I am well aware that many of you are not in a financial position to donate - and that is OK. We are here to serve you as well. Donations are completely optional.

Matt Mathur boosted:
Lesley Carhart :unverified:hacks4pancakes@infosec.exchange
2023-06-29

Ad blockers are also cybersecurity. Say it with me.

They reduce malvertising, watering hole attacks, and general malicious script execution. It’s not all about you, ad firms.

Matt Mathur boosted:
Jeremi M Gosney :verified:epixoip@infosec.exchange
2023-06-15

.@blacktraffic Great question!

Here are some reasons why #RainbowTables are obsolete for #password #cracking:

In any given password database, 92-98% of the passwords are going to be created by highly predictable humans (as opposed to being randomly generated.) Because of this, modern password cracking is heavily optimized for exploiting the human element of password creation, concentrating on probabilistc methods that achieve the largest plaintext yield in the least amount of time. As such, modern password cracking tools and techniques have evolved to become highly dynamic, requiring agility, flexibility, and scalability.

This is evident when looking at how #Hashcat has evolved over the last decade. Hashcat used to be heavily optimized for raw speed, but today it is optimized for maximum flexibilty (plus, lite, and cpu merged into a single code base, dropped the 15-character limit, introduced pure kernels, brain, and slow candidate mode, etc.) This need for dynamicity is also why we largely still use GPUs today, rather than having moved on to devices with potentially higher throughput, such as FPGAs or even ASICs.

With this in mind, it's rather easy to see that rainbow tables are the antithesis of modern password cracking. Rainbow tables are static, rigid, and not at all scalable. They directly compete with unordered incremental brute force, which in the context of modern password cracking, is largely viewed a last resort and generally only useful for finding randonly-generated passwords (although, can also be useful in identifying new patterns that rules and hybrid attacks failed to crack.) They also do not scale. If you have a handful of hashes, rainbow tables will likely be faster than brute forcing on GPU. But if you are working with even a modestly large hash set, rainbow tables will be slower than just performing brute force on GPU, even if you are using GPU rainbow tables.

Overall, rainbow tables are an optimization for an edge case: cracking a small amount of hashes of an algorithm for which we have tables, within the length and character sets for which we have tables, that fall within that 2-8% of hashes that we cannot crack with probabilistic methods. And even then, most people who are #security conscious enough to use use random passwords aren't going to make them only 8 or 9 characters long, so the percentage of those passwords that will actually be found in your tables will be much lower.

The questions you have to ask yourself: is that worth the disk space and the bandwidth to download and store rainbow tables, and do you really care about that 2-8%, keeping in mind that only a small percentage of that is going to fall within the tables you have? If the answer is "yes", then continue to use rainbow tables. However, the for the vast majority of us, the answer for the past 11 years has been a resounding "no." And that's why rainbow tables are, by and large, a relic of a bygone era.

With that said, rainbow tables do still have some utility outside of #passwords. For instance, cracking DES or A5/1 #encryption. There's also the cousin of rainbow tables, lossy hash tables (LHTs), which have some utility as well for things like old Microsoft Office and Adobe Acrobat encryption keys.

#infosec #hacking

Matt Mathur boosted:
Lesley Carhart :unverified:hacks4pancakes@infosec.exchange
2023-06-14

I’ve said it before, but I need to say again that I take it personally when community conferences choose a fun or familiar location over one that is safe for their LGBTQIA+ and even women attendees at a time of historic, concerted legislative and criminal attacks against us. It tells me absolutely all I need to know about your leadership and care for the diverse cybersecurity community. There are plenty of affordable venues in places that aren’t banning emergency healthcare and harassing people for using the bathroom.

Matt Mathur boosted:
Davey :sugar_approved:sugar@goblin.camp
2023-04-29

i hope one day computers can feel pain, because they deserve it

2023-04-05

@tychotithonus medical records software and all the associated issues is such an underrated pain point for patients

Matt Mathur boosted:
2023-03-29

I'm #hiring a #vulnerability #research leader who's able to work U.S. ET time zones. Zero-day research, n-day analysis, exploit dev, plus media and internal leadership. You get to work with @iagox86 and @stephenfewer, and you'll collaborate with folks like @zeroSteiner and @ChristiaanB careers.rapid7.com/jobs/princi

Matt Mathur boosted:
2023-03-29

Just published a big pile of #research I did this past winter! Protocol #reverseengineering, #heapoverflow, #stackoverflow, #authbypass - lots of cool stuff. If you think this sounds cool, be sure to check out my #NorthSec talk in May :)

Here are some links:

If you're running #RocketSoftware's UniData or UniVerse suites, which are usually a back-end thing, you need to patch ASAP!

Matt Mathur boosted:
Gwen Snyder is uncivilgwensnyder@mstdn.party
2023-03-22

We won.

It's the biggest settlement of its kind in the history of Philadelphia, and we made them give back their military equipment to the feds.

But, it's not enough.

Time to organize and ban the use of these weapons against civilians, permanently.

inquirer.com/news/philadelphia

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst