top of page
Search
aletheapkfre

Nulled Io Auth Key 18: How to Generate and Use Valid Keys for Nulled.io



I dont know what to say. About 3 days ago I released a script to the public. Today I realised, after searching on google that someone had already nulled (removed my protection) and pirated the script.


In addition to word of mouth via its existing users, Caffeine is also advertised on underground forums dedicated to cybercrime. Figure 7 shows a post on nulled[.]to, advertising an email management component for Caffeine, as well as other seemingly malicious utilities that appear to be associated with the same malware author.




Nulled Io Auth Key 18



Given the prevalence of compromised web infrastructure observed by Mandiant across its customer base, the authors will focus on this particular avenue of attack for further scenario-based analysis within this blog post.


The authors would like to thank Jeremy Kennelly for his threat expertise and investigative guidance, Evan Reese for his assistance in detection review, and The Managed Defense Security Operations Center for their continued vigilance.


The concept of authentication has a very important place in application development processes. Different programming languages contain different solutions and approaches in themselves. In this article, while developing Rest API with Laravel Framework, we will authenticate with Laravel Passport, the official package of Laravel.


In this article, I will walk you through the deployment of Keycloak, a user authentication and authorization tool and how to integrate this to any Kubernetes Web application without touching a single line of code from your app.


First, we will run Keycloak and configure it to have some users and groups then deploy a simple web application to your Kubernetes cluster (we will deploy a small Kubernetes cluster too). Finally we will add the authentication layer to the app looking at the differences between both authenticated and unauthenticated resources.


I recommend reading the Keycloak site and documentation for best practices and configuration options. Here I give you a simple way to add authentication to applications but no security scans or validations have been made for possible holes or vulnerabilities. Talk to your Information Security team about any solution you plan to use in your environment.


Log in to the Keycloak web server at or by using the nip.io service, your URL becomes for example [host-IP].nip.io:8443 for example :8443. This is easy to remember and applications can use it to parse the headers. Use the administrator account created during the deployment environment variables (admin/admin).


Instead of managing user creation inside Keycloak, you can integrate it with many authentication providers like Google, GitHub, Facebook and many more. There is a section at the end of this article on how to integrate with GitHub.


On the first request, it will redirect the browser to Keycloak for authentication. If the authentication succeeds, Keycloak will redirect back to Gatekeeper where any resource rule can be applied like only allowing access to certain URL paths or certain user groups(remember we added group to the Token). Then all traffic will flow thru the proxy to your app until the token expires where a new authentication is required.


There you go, Keycloak redirected back to the application and NGINX shows the page. If you look at the logs, you can see Gatekeeper redirecting the request for authentication and then NGINX showing it's logs.


It's just a matter of deploying the sidecar container by adjusting your Deployment, changing the port in the Service (if needed) and creating the configMaps and you instantly have authentication. Then create your users, assign them to groups and adjust as required.


Plan ahead on how you will manage your application authentication strategy, the amount of realms and clients, if you will share the same realm/client for multiple applications and group permissions per app.


As mentioned and you probably saw in my login screen, I integrated Keycloak to GitHub as an external identity provider. This way, when users choose this in Keycloak screen they are redirected to GitHub (or another provider) and when successfully authenticated Keycloak creates a new user internally. You can then assign this user to groups. You can also merge this identity to an already existing user in Keycloak.


Name it (Keycloak for example), add your local Keycloak URL (GitHub doesn't need access to it nor it needs to be exposed to the internet) with /auth at the end, and the Authorization callback URL. It's the same Keycloak address with /auth/realms/[your_realm]/broker/github/endpoint. 2ff7e9595c


0 views0 comments

Recent Posts

See All

Comments


bottom of page