Daniel Hückmann

Staff Security Engineer & community organizer living in the Pacific Northwest; my work is currently focused on cloud & enterprise security.

Interests include psychology, psychedelics, hiking, & photography. ∞ 42 ∞

Daniel Hückmann boosted:
RainSec - PDX Information Security Meetuprainsec@infosec.exchange
2025-03-20

RainSec is happening Tuesday March 25th, 6:30-10:00 PM @ the Lucky Lab Brew Pub (915 SE Hawthorne).

Details are available here:

smokesignal.events/did:plc:nzj

meetup.com/rainsec/events/3042

groups.google.com/g/rainsec/c/

Daniel Hückmann boosted:
RainSec - PDX Information Security Meetuprainsec@infosec.exchange
2024-06-30

Hey all, don't forget that the Hackboat 2024 unconference is taking place on July 10th!

See hackboat.org for details.

Daniel Hückmann boosted:
RainSec - PDX Information Security Meetuprainsec@infosec.exchange
2024-06-20

RainSec is happening Tuesday June 25th, 6:30-10:00 PM @ the Lucky Lab Brew Pub (915 SE Hawthorne).

Details are available here:

meetup.com/rainsec/events/3000

groups.google.com/g/rainsec/c/

calagator.org/events/125048100

Daniel Hückmann boosted:
2023-01-15

I wanted to take a few moments and apologize to many of my former students.

In the past I said the industry needs people who look at security as a vocation and an avocation.

I was wrong.

Have a life outside of this industry.

Have hobbies that have nothing to do with your computer.

Get outside.

The problems of the industry are not problems of people not working hard enough.

They are not problems of people not being "hard core" enough.

They are problems of education and resource prioritization.

I was wrong.

I am sorry.

Stop breaking yourself on rocks for people who don't really care if you break yourself on rocks.

2023-01-05

@christophetd Initial observation was for "GetAuthorizationToken" API calls to the "ecr.amazonaws.com" service endpoint. I believe this was interactive, because I also saw some attempts to assume other roles when the first attempt failed due to not having needed IAM privileges. Since all attempts resulted in Access Denied, I don't have any further indicators available.

This was the same pattern observed across canary tokens and legitimate tokens.

2023-01-05

@georgewherbert Yes, both our support specialist, and the abuse team.

Daniel Hückmann boosted:
Dan Fernandez :verified: :mastodon:danielfernandez@infosec.exchange
2023-01-03

According to a recently published paper by Chinese researchers, it is possible to break 2048-bit RSA encryption using a combination of classical lattice reduction techniques and a quantum approximate optimization algorithm. While this has not yet been demonstrated, the researchers were able to successfully factor 48-bit numbers using a 10-qbit quantum computer, suggesting that it may be achievable with a larger quantum computer, such as the IBM Osprey, which has 433 qbits. It should be noted that this claim should be taken seriously, as it is not clearly incorrect and Shor's algorithm has previously demonstrated that factoring with a quantum computer is relatively straightforward.

#quantum #quantumcomputing #encryption #algorithm #algorithms #cryptography

Summary from Bruce Schneier: schneier.com/blog/archives/202

Paper: arxiv.org/pdf/2212.12372.pdf

2022-11-28

@mikemcdnet There is a major difference between "I found a foothold and breached a company that I have zero prior access to" and "I have legitimate access to all of these credentials at a company I work at and I used them to steal information".

justice.gov/usao-sdny/pr/forme

That said, I'm not simping for Ubiquiti, just pointing out that what initially came out in the media was not the real story.

2022-11-28

@mikemcdnet I don't disagree entirely, but my point was that an external party didn't get into their systems.

An employee with authorization abused that access to steal customer information from their cloud management offering, while he worked there, and pretended to be an external party while extorting Ubiquiti and giving false information to the press.

This is patently different from "an external party breached their systems" unless I am missing something?

2022-11-28

@mikemcdnet

Did you read any of the followup to the alleged "breach"? It was an insider that tried to extort the company and fed false information to @briankrebs, who later issued a retraction.

krebsonsecurity.com/2022/08/fi

bitdefender.com/blog/hotforsec

Now, I'm not saying that their security posture is perfect, an insider threat is still a threat that you need to control for, but this missing context really changes the narrative (at least in my threat model).

It's also possible to run Unifi without any kind of cloud management connectivity.

2022-11-28

@mikemcdnet Yeah, another aftermarket firmware, a fork of the old tomato firmware from the WRT54G(L) days. It seems pretty well supported for the r8000 and is still getting updated builds.

I used to run Kong's DD-WRT builds, but he stopped releasing a few years back. I ran into too many issues on the r8000 with mainline DD-WRT.

These days I'm on a PFSense and Ubiquiti stack; been eyeing an AX jump via the Unifi AP-U6-E.

2022-11-28

@mikemcdnet Have you looked into the FreshTomato firmware? It's what I used to extend the life of the r8000 when I was still using it. Even if you're done with it, it's a fun project that will make the router more usable to whoever you give it to.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst