Jump to content
News Ticker
  • Welcome to 2021, let's hope it is better than 2020.
  • CotP Discord Channel

    Covenant of the Phoenix has a new official Discord Channel!!!
    JOIN COTP IN DISCORD TODAY
    By Damis

    Valheim is hottest new survival and exploration game.

    Valheim is a game about exploring a huge fantasy world inspired by Norse mythology and Viking culture. You start your adventure at the relatively peaceful center of Valheim. The further from the center you travel, the more challenging the world becomes. But you will also find more valuable materials that you can use to craft deadlier weapons and sturdier armor. You will also build your own Viking strongholds and outposts all over the world. Eventually, you will build a mighty longship and sail the great oceans in search of exotic lands … but be wary of sailing too far...
    Key features:
    Huge procedurally-generated world - explore and inhabit mystical lands, from mysteriousforests to imposing snow-topped mountain ranges and stunning meadows, complete with their own creatures of legend to battle and wildlife to hunt. Co-op PvE (2-10 players) - - Whether you want to brave the lands alone or venture with trusted allies, Valheim supports independent, player-hosted servers and unlimited world creation. We recommend playing co-op with 3-5 players. Punishing dodge & block based combat system with a wide range of weapons Build & sail ships - from flimsy rafts to imposing warships, build legendary vessels to conquer the seas and discover new lands. Summon and defeat vengeful primordial bosses of myth and legend, and collect trophies to progress and craft new powerful items Flexible house and base building system - raise mead halls, farms, settlements outposts, castles and more. Intuitive item crafting - forge the finest weapons and armour, and craft food and mead. Dedicated server- for players who want to run a persistent server. https://store.steampowered.com/app/892970/Valheim/
    Read more...
    By Damis

    Crypt Space Commander(CSC) A Space Sandbox MMO

    CSC is an open-universe, sandbox-style space MMO with a player-owned economy. Command starships and earn digital items to buy, sell, or trade without limits both inside and outside of the game universe. Experience a free-market Play-to-Own Economy that provides true ownership & freedom.
    Starships
    In CSC you, our Commander, can own and operate your very own starships. Starships come in all shapes and sizes and are specialized in either mining, combat, trade, or exploration. Starships in CSC can be endlessly customized with modules. Modules can add or upgrade existing ship functionality from shields and weapons to FTL drives.
    Economy
    Almost everything in the CSC universe can be crafted from resources openly available in the universe. The smallest shield module up to a universe-wide jump gate network can all be made with the right materials. Create new technology and share it freely for the good of the federation or sell it for the right price.
    Crafting
    The crafting system is uncapped, allowing players to continually improve on the quality of their crafted items. Specialization is encouraged by the CSC crafting mechanic, rewarding players for focusing on specific items & allowing them to create truly unique and valuable starship weapons or other components.
    Exploration
    Rules are merely suggestions in some parts of space. Areas under GFI protection do exist, and are open to explore and mine to your heart’s content, but the best loot is out there in Fringes of Space. Beware, dangers of all kinds are in the fringe: creatures, pirates, rogue Commanders, and faction governments. Those brave enough to venture deep into Fringe Space however will find an abundance of rare resources, larger bounties, and more lucrative quests.
    The Current Game State
    CSC is a game in development while in Beta with core game features implemented. As a starship Commander you can command your ship, explore 40+ star systems, mine for resources that can be used in manufacturing/workshop, combat NPCs for loot and resources, and play along with other Commanders on our LIVE MMO server.
    LInks:
    https://www.csc-game.com/
    https://store.steampowered.com/app/895040/CSC__Space_MMO/
     
    Read more...
    By Damis

    TROVE: REFER-A-FRIEND

    Love Trove? Invite your friends to adventure by your side. You’ll earn fire-breathing rewards when they hit Mastery Rank 20 in-game!
    Each time one of your cubic recruits hits Mastery Rank 20, your Companion Level increases by one. Your very first Mastery 20 recruit grants an Elder Dragonling Ally, and the rewards grow in stature from there!

     
    Clink the link below for more information.
    https://trovelive.trionworlds.com/account/referral/get-account-referral-dashboard-flow.action?_gmg=gmg.2685578402.1621262511
    Read more...
    By Damis

    Crowfall - Hunger Dome Mode

    An upcoming mode in Crowfall that allows 60 players to fight each others in a "Hunger Dome" style match. Todd describes it as a super condensed version of Crowfall on steroids and says it's really fun. It's a mix between a MMO, a MOBA and a Battle Royale (MMOBA).

    Characteristics:
    12 teams of 5 players teams start at the edge of the map ring that shrinks over time players can capture keeps, forts or castles players can die from the Hunger, monsters or players players can respawn if they own a structure team is eliminated when the last player dies players gain "ELO" players arrive on the map "naked", have to gear up up to 30 minutes per match restrictions on archetypes (not more than 2 tanks or supports per team) characters are clone version of players' characters, or available archetypes  
     
    Read more...
    By Damis

    Blackwood Prologue now available for all ESO players.

    Begin a journey that will take you to the upcoming Chapter and beyond with the Blackwood Prologue, now available for all ESO players!
    The Blackwood Prologue questline is now live for all platforms and is free for anybody with access to the ESO base game (note, this includes Free Play Event players). To get underway, simply pick up the quest starter from the in-game Crown Store (located under the Quest Starters category).

    Join Lyranth in her investigations
    Once the starter is activated, you receive the quest titled “A Mortal’s Touch” and begin your adventure. In the two unique quests, you’re joined by the Dremora Lyranth and Wood Elf Eveli Sharp-Arrow to investigate the operations of a sinister Daedric cult. What you discover during the two Blackwood Prologue quests sets up the adventures to come in the Blackwood Chapter and larger Gates of Oblivion year-long saga.
    Finally, complete the Blackwood Prologue and you receive the Daedric Unwarding Amulet memento as a keepsake. Keep it close—you never know when you might encounter some Daedric wards!
    Read more...
    • entries
      15
    • comments
      38
    • views
      49,165

    VPN Log Review Case Study


    Throne

    2,708 views

     Share

    As an eDiscovery professional, I found the below article quite interesting.....especially considering the below linked video from the Onion from a couple years ago.

     

    http://www.theonion....-oversea,14329/

     

     

    Case Study: Pro-active Log Review Might Be A Good Idea

     

    Andrew Valentine

    January 14th, 2013

     

    With the New Year having arrived, it’s difficult not to reflect back on last year’s caseload. While the large-scale data breaches make the headlines and are widely discussed among security professionals, often the small and unknown cases are the ones that are remembered as being the most interesting from the investigators point of view. Every now and again a case comes along that, albeit small, still involves some unique attack vector – some clever and creative way that an attacker victimized an organization. It’s the unique one-offs, the ones that are different that often become the most memorable and most talked about amongst the investigators.

    Such a case came about in 2012. The scenario was as follows. We received a request from a US-based company asking for our help in understanding some anomalous activity that they were witnessing in their VPN logs. This organization had been slowly moving toward a more telecommuting oriented workforce, and they had therefore started to allow their developers to work from home on certain days. In order to accomplish this, they’d set up a fairly standard VPN concentrator approximately two years prior to our receiving their call. In early May 2012, after reading the 2012 DBIR, their IT security department decided that they should start actively monitoring logs being generated at the VPN concentrator. (As illustrated within our DBIR statistics, continual and pro-active log review happens basically never – only about 8% of breaches in 2011 were discovered by internal log review). So, they began scrutinizing daily VPN connections into their environment. What they found startled and surprised them: an open and active VPN connection from Shenyang, China! As in, this connection was LIVE when they discovered it.

    Besides the obvious, this discovery greatly unnerved security personnel for three main reasons:

    • They’re a U.S. critical infrastructure company, and it was an unauthorized VPN connection from CHINA. The implications were severe and could not be overstated.
    • The company implemented two-factor authentication for these VPN connection. The second factor being a rotating token RSA key fob. If this security mechanism had been negotiated by an attacker, again, the implications were alarming.
    • The developer whose credentials were being used was sitting at his desk in the office.

    Plainly stated, the VPN logs showed him logged in from China, yet the employee is right there, sitting at his desk, staring into his monitor. Shortly after making this discovery, they contacted our group for assistance. Based on what information they had obtained, the company initially suspected some kind of unknown malware that was able route traffic from a trusted internal connection to China, and then back. This was the only way they could intellectually resolve the authentication issue. What other explanation could there be?

    Our investigators spent the initial hours with the victim working to facilitate a thorough understanding of their network topology, segmentation, authentication, log collection and correlation and so on. One red flag that was immediately apparent to investigators was that this odd VPN connection from Shenyang was not new by any means. Unfortunately, available VPN logs only went back 6 months, but they showed almost daily connections from Shenyang, and occasionally these connections spanned the entire workday. In other words, not only were the intruders in the company’s environment on a frequent basis, but such had been the case for some time.

    Central to the investigation was the employee himself, the person whose credentials had been used to initiate and maintain a VPN connection from China.

    Employee profile –mid-40’s software developer versed in C, C++, perl, java, Ruby, php, python, etc. Relatively long tenure with the company, family man, inoffensive and quiet. Someone you wouldn’t look at twice in an elevator. For the sake of case study, let’s call him “Bob.”

    The company’s IT personnel were sure that the issue had to do with some kind of zero day malware that was able to initiate VPN connections from Bob’s desktop workstation via external proxy and then route that VPN traffic to China, only to be routed back to their concentrator. Yes, it is a bit of a convoluted theory, and like most convoluted theories, an incorrect one.

    As just a very basic investigative measure, once investigators acquired a forensic image of Bob’s desktop workstation, we worked to carve as many recoverable files out of unallocated disk space as possible. This would help to identify whether there had been malicious software on the system that may have been deleted. It would also serve to illustrate Bob’s work habits and potentially reveal anything he inadvertently downloaded onto his system. What we found surprised us – hundreds of .pdf invoices from a third party contractor/developer in (you guessed it) Shenyang, China.

    As it turns out, Bob had simply outsourced his own job to a Chinese consulting firm. Bob spent less that one fifth of his six-figure salary for a Chinese firm to do his job for him. Authentication was no problem, he physically FedExed his RSA token to China so that the third-party contractor could log-in under his credentials during the workday. It would appear that he was working an average 9 to 5 work day. Investigators checked his web browsing history, and that told the whole story.

    A typical ‘work day’ for Bob looked like this:

    9:00 a.m. – Arrive and surf Reddit for a couple of hours. Watch cat videos

    11:30 a.m. – Take lunch

    1:00 p.m. – Ebay time.

    2:00 – ish p.m Facebook updates – LinkedIn

    4:30 p.m. – End of day update e-mail to management.

    5:00 p.m. – Go home

    Evidence even suggested he had the same scam going across multiple companies in the area. All told, it looked like he earned several hundred thousand dollars a year, and only had to pay the Chinese consulting firm about fifty grand annually. The best part? Investigators had the opportunity to read through his performance reviews while working alongside HR. For the last several years in a row he received excellent remarks. His code was clean, well written, and submitted in a timely fashion. Quarter after quarter, his performance review noted him as the best developer in the building.

     

     

    http://securityblog....be-a-good-idea/

    • Upvote 1
     Share

    3 Comments


    Recommended Comments

    ×
    ×
    • Create New...