Week 28 in Review – 2010

Events Related:

Resources:

Tools:

  • Belch v1.0 – Burp external channel manipulator – invalid-packet.blogspot.com
    Belch is a plug-in for burp suite designed to aid protocol analysis and manipulation, it is fairly simple.
  • ScanPW – pke.nu/scan
    ScanPW it’s a free web application that let’s you, in a fast and secure way, analize a webpage source code.
  • Metasploit Framework 3.4.1 Released! – metasploit.com
    This release sees the first official non-Windows Meterpreter payload, in PHP as discussed last month.
  • Facetime on Iphone 4: Vanilla unencrypted STUN and SIP – roychowdhury.org
    No hacking needed – just an on the wire black box inspection – its just plain SIP and STUN for firewall discovery.
  • Kismet – kismetwireless.net
    Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and infering the presence of nonbeaconing networks via data traffic.
  • Crypto tool predicts password cracking time – h-online.com
    Instead of indicating password quality via coloured bars, the Windows crypto tool Thor’s Godly Privacy (TGP) informs users about the estimated time required for a successful brute-force attack on the chosen password.
  • PEScrambler – code.google.com/p/pescrambler/
    PEScrambler is a tool to obfuscate win32 binaries automatically. It can relocate portions of code and protect them with anti-disassembly code.
  • SIFT Workstation out now
    A new version of SIFT Workstation is out, here the new features: VMware Appliance, ready to tackle forensics, and cross compatibility between Linux and Windows among others.

  • skipfish v 1.51 – code.google.com/p/skipfish
    A fully automated, active web application security reconnaissance tool.
  • NMAP 5.35DC1 released – nmap.org
    Nmap and Zenmap (the graphical front end) are available in several versions and formats.
  • Binary Auditor – binary-auditing.com
    Educate yourself in the field of Binary Auditing and Reverse Code Engineering for FREE!

Techniques:

Vulnerabilities:

Vendor/Software Patches:

Other News:

  • FBI Raids ‘Electronik Tribulation Army’ Over Witness Intimidation – wired.com
    Jesse William McGraw, aka “GhostExodus,” pleaded guilty in May to computer-tampering charges for putting malware on a dozen machines at the Texas hospital where he worked as a security guard.
  • GFI Software acquires Sunbelt Software – sunbeltblog.blogspot.com
    Today, it was announced that Sunbelt Software has been acquired by GFI Software.
  • Developers just don’t go to security conferences – swreflections.blogspot.com
    Developers and managers need to choose carefully where to spend their company’s money and time – or their own.
  • Secunia Half Year Report for 2010 shows interesting trends – sans.edu
    Since 2005, no significant up-, or downward trend in the total number of vulnerabilities in the more than 29,000 products covered by Secunia Vulnerability Intelligence was observed.
  • Talk on Chinese Cyber Army Pulled From Black Hat – threatpost.com
    A talk on China’s state-sponsored offensive security efforts scheduled for the Black Hat conference later this month has been pulled from the conference after concerns were raised by some people within the Chinese and Taiwanese government about the talk’s content.
  • “Millions” Of Home Routers Vulnerable To Web Hack – forbes.com
    The upcoming Black Hat security conference in Las Vegas offers an annual parade of security researchers revealing new ways to break various elements of the Internet.
  • Mozilla Bumps Bug Bounty to $3,000 – threatpost.com
    In an effort to enlist more help finding bugs in its most popular software, such as Firefox, Thunderbird and Firefox Mobile, Mozilla is jacking up the bounty it pays to researchers who report security flaws to $3,000
  • MS Windows Token Kidnapping Problems Resurface – threatpost.com
    Cesar Cerrudo, founder and CEO of Argeniss, a security consultancy firm based in Argentina, first reported the token kidnapping hiccup to Microsoft in 2008 and after waiting in vain for a patch, he released the details during the Month of Kernel Bugs project.
  • DNS root zone finally signed, but security battle not over – arstechnica.com
    This is an important step in the deployment of DNSSEC, the mechanism that will finally secure the DNS against manipulation by malicious third parties.

    One Comment

    1. […] Week 28 in Review – 2010 | Infosec Events […]

    Leave A Comment