frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Amazon's Zoox to Launch Robotaxi Rides to Public in Las Vegas

https://www.bloomberg.com/news/articles/2025-09-10/amazon-s-zoox-to-launch-robotaxi-rides-to-publ...
1•el_duderino•52s ago•0 comments

What Bear's social media refugees have in common

https://grizzlygazette.bearblog.dev/what-bears-social-media-refugees-have-in-common/
1•speckx•2m ago•0 comments

Show HN: Internet Plays Chess – one global game, moves by consensus

https://internetplayschess.com/
1•wessie•2m ago•0 comments

Nvidia Rubin CPX Is an AI GPU for Next-Gen Nvidia AI GPUs – ServeTheHome

https://www.servethehome.com/nvidia-rubin-cpx-is-an-ai-gpu-for-next-gen-nvidia-ai-gpus/
1•rbanffy•2m ago•0 comments

Show HN: Ark v0.5.0 – A Minimal, High-Performance Entity Component System for Go

https://github.com/mlange-42/ark
3•mlange-42•3m ago•0 comments

Macrowave – Turn Your Mac into a Private Radio Station

https://macrowave.co/
2•eustoria•3m ago•0 comments

Conway's Law and Data Modeling

https://practicaldatamodeling.substack.com/p/conways-law-and-data-modeling
1•thunderbong•4m ago•0 comments

Meta employees say they saw child abuse in VR before company blocked research

https://www.nbcnews.com/tech/tech-news/meta-whistleblower-research-kids-vr-former-employees-stock...
1•mdhb•4m ago•0 comments

SpaceX's lesson from last Starship flight? "We need to seal the tiles."

https://arstechnica.com/space/2025/09/spacexs-lesson-from-last-starship-flight-we-need-to-seal-th...
1•rbanffy•5m ago•0 comments

ChatGPT traffic quality is no longer better than Google's

https://www.siegemedia.com/research/ga4-engagement-rates
1•InfinityX0•5m ago•0 comments

Karate – Test Automation Made Simple

https://karatelabs.github.io/karate/
1•eustoria•6m ago•0 comments

The Superyacht, the Billionaire, and an Improbable Disaster at Sea

https://www.wired.com/story/mike-lynch-sinking-disaster/
1•pseudolus•7m ago•1 comments

Show HN: Oboe, a generalized AI-powered learning platform

5•nir-zicherman•7m ago•0 comments

Fenwick Layout for Interval Trees

https://purplesyringa.moe/blog/fenwick-layout-for-interval-trees/
2•Bogdanp•9m ago•0 comments

AI code assistants make developers more efficient at creating security problems

https://www.theregister.com/2025/09/05/ai_code_assistants_security_problems/
2•softwaredoug•9m ago•0 comments

MCP for Cursor Background Agents API

https://www.npmjs.com/package/cursor-background-agent-mcp-server
1•samuelbalogh•9m ago•1 comments

Silicon nanowires self-assemble into macroscopic networks for advanced materials

https://phys.org/news/2025-09-silicon-nanowires-macroscopic-networks-advanced.html
1•westurner•12m ago•0 comments

Marvel Studios is moving from Georgia to the UK to avoid paying health insurance

https://www.usatoday.com/story/money/business/2025/08/26/is-marvel-leaving-georgia/85829404007/
5•speckx•15m ago•2 comments

Women in Love with AI Companions

https://www.theguardian.com/technology/2025/sep/09/ai-chatbot-love-relationships
1•kordlessagain•15m ago•0 comments

Show HN: Implementation and ablation of the Hierarchical Reasoning Model (HRM)

https://github.com/krychu/hrm
2•krychu•15m ago•0 comments

How to Sell to the Dept of War – The 2025 PEO Directory

https://steveblank.com/2025/09/10/how-to-sell-to-the-dept-of-defense-the-2025-peo-directory/
1•sblank•16m ago•0 comments

The Supply Chain Is the New Watering Hole

https://material.security/resources/the-supply-chain-is-the-new-watering-hole
1•manveerc•17m ago•0 comments

Dirty Pirate Metrics, a new version of Pirate Metrics for open-source builders

https://www.literally.dev/resources/dirty-pirate-metrics-guide-for-tech-founders-and-open-source-...
2•Liriel•17m ago•0 comments

Gato AI Translations – Accessing the Latest AI Models via OpenRouter

https://gatoplugins.com/docs/ai-translations-for-polylang/configuration/accessing-the-latest-ai-m...
2•jun-e•18m ago•0 comments

LAUNCHING Promptify: Intelligent Automatic Prompt Engineering

https://chromewebstore.google.com/detail/promptify/gbdneaodlcoplkbpiemljcafpghcelld
1•Krish-mal15•18m ago•1 comments

Determinants of Decision Making in Novice and Elite Soccer Goalkeepers

https://www.mdpi.com/2076-3417/15/17/9443
1•PaulHoule•18m ago•0 comments

iPhone 17 Introduces 'Groundbreaking' New Memory Security Feature

https://www.macrumors.com/2025/09/10/iphone-17-new-memory-security-feature/
2•tosh•18m ago•1 comments

Age Verification a Windfall for Big Tech– Death Sentence for Smaller Platforms

https://www.eff.org/deeplinks/2025/09/age-verification-windfall-big-tech-and-death-sentence-small...
2•pseudolus•19m ago•0 comments

The anatomy of a machine-readable page

https://ingestible.ai/blog/the-anatomy-of-a-machine-readable-page/
1•adchsm•19m ago•1 comments

China's National Computing+Energy Strategy

https://twitter.com/pretentiouswhat/status/1965264398622302478
1•andsoitis•20m ago•0 comments
Open in hackernews

Kerberoasting

https://blog.cryptographyengineering.com/2025/09/10/kerberoasting/
43•feross•2h ago

Comments

lotharcable•58m ago
Microsoft is guilty of giving incompetent administrators enough rope to hang themselves.
EvanAnderson•53m ago
Microsoft is also guilty of reading the market and keeping up compatibility to make their products remain relevant. Prof. Green makes sweeping statements about how Microsoft should break compatibility to remove these vulnerabilities, but he doesn't have the market pressures that Microsoft does.

Could Microsoft work harder on this? Sure. Do they have to worry about keeping their Customers happy? Absolutely.

The corporate IT market moves at a glacial pace. Hopefully the rise of IT security issues having actual business consequences will change that, but that's not Microsoft's problem. That's the ecosystem they live in.

Were bad protocol / design decisions made in the past? For sure. Microsoft has been working on this (see Managed Service Accounts and Group Managed Service Accounts). It takes time for corporate customers to adopt these new versions.

Corporate IT won't forklift out old systems without business justification. Maybe the pressure from the insurance industry will help. Pressure from the ransomware industry is a certainly helping, too.

harmon•53m ago
This article is somewhat incorrect. Kerberoasting abuses Ticket Granting Service tickets (TGSs, which are used to request access to a registered service in Active Directory), not Ticket Granting Tickets (TGTs, which are used to prove identity to a Domain Controller and request TGSs). However, the general attack described is still correct.

TGS are (AES or RC4) encrypted with the NT password hash of the service account they are associated with. If you have a weak service account password, then TGS can be cracked to obtain the service account's password. A lot of times admins will create service accounts that have way more permissions than required (e.g. they make them a DA) which can lead to an immediate privilege escalation. To make it worse, any low privilege Active Directory account can request a TGS for any service, even if they are not allowed to access that service.

Even if the service account is lower privilege, this can enable a silver ticket attack. https://www.crowdstrike.com/en-us/cybersecurity-101/cyberatt...

There are multiple mitigations for this:

1. Use managed or group managed service accounts instead of manually managed ones where possible. This ensures that account passwords are long, strong, and rotated regularly. If you are going to provision service accounts manually, give them very strong passwords.

2. Apply the principle of least privilege and only assign service accounts the privileges they need. Avoid placing them in high privilege groups.

3. Disable RC4 in your environment if possible via Group Policy.

4. Monitor for RC4 ticket requests. AES-encrypted tickets are the default these days. https://adsecurity.org/?p=3458

5. Create a honeypot service account: https://adsecurity.org/?p=3513

There is a somewhat similar attack against TGTs called ASREPRoasting: https://book.hacktricks.wiki/en/windows-hardening/active-dir...

EvanAnderson•44m ago
I was a little irritated that Prof. Green didn't really discuss that Microsoft has made recommendations to mitigate. Thank you for summarizing.

The mitigations are there but it takes time for Microsoft's Customers to move to the new versions. I don't think that's Microsoft's problem. That's just their market. I don't think Prof. Green has an understanding of that side of it.

I guess one could argue that Microsoft should backport the new code to older products and give it to Customers who aren't actively paying for maintenance or subscription licensing. They made the business decision not to.

gnfargbl•33m ago
> rotated regularly

Is this really a useful mitigation here? If someone has suitable presence to make requests to the TGS, then the time window for cracking and exploiting those tickets (if they are exploitable) is surely always going to be small compared to the rotation window. Hackers don't typically have the patience to sit running hashcat on an old GPU for weeks, they just find some way to get ephemeral access to a bunch of faster GPUs.

harmon•30m ago
Managed and group managed service account passwords are typically 240 characters long and rotate every 30 days. It is highly unlikely that an attacker can crack these.
gnfargbl•26m ago
Fair enough, I guess for some threat actors there is a difference between "uncrackable" and "crackable with more than 30 days effort". But that's a pretty select group of actors.
dec1m0s•51m ago
See also https://blog.compass-security.com/2025/09/taming-the-three-h... for an in-depth video series on Kerberos.
MrBuddyCasino•51m ago
A well written, easy to understand article on cryptography that isn’t using unnecessary jargon.

Did he not get the memo that this is not allowed?

cybergreg•43m ago
Good overview of Kerberoasting, still a common attack chain. A couple things though: To obtain access to a service, you actually need to get a service ticket (TGS) from the KDC (Domain Controller) to authenticate to the service, not a TGT. The TGT is the first ticket acquired during authentication to the domain. In addition, the "salt" is not a true salt but a concatenation of the domain and principal name, so even worse. Active Directory (invented at MIT) supports RC4, AES128, and AES256 encryption types, however you can effectively disable RC4 via Group Policy. The reason RC4 is still supported is to support legacy systems. Many organizations use old software that only supports RC4. For example, I've run into many manufacturing and small businesses that have no choice but to use it and can't upgrade the software due to $$$. Anyway, good stuff! Shout out to Tim Medin, who published this back in 2014.
cybergreg•41m ago
I realize I might have been late to the party. As other comments have said, its not as easy as blaming Microsoft, though this is a popular take.
throw0101d•4m ago
See perhaps "Active Directory Hardening Series - Part 4 – Enforcing AES for Kerberos":

> Identifying devices limited to RC4 is a critical step but has historically been a tricky problem to solve. However, a recently discovered "feature" in 4768 events can help you identity such devices. […] As a result, 4768 events can be used to identify devices that only support RC4.

* https://techcommunity.microsoft.com/blog/coreinfrastructurea...

Also:

> While DES has long been considered insecure, CVE-2022-37966 accelerates the departure of RC4 for the encryption of Kerberos tickets. If you have not explicitly assigned an algorithm to accounts, then AES will be used in the future. You can use PowerShell to determine which accounts are vulnerable to weak encryption.

* https://blog.sonnes.cloud/find-active-directory-accounts-con...

There are certainly disadvantages to legacy support being 'too good'.