- ShmooCon CTF 2011 Ghost In the Shellcode – ghostintheshellcode.com
Congratulations to ppp for winning the second GitS CTF! The game board as it was when the contest ended is now live, though answers are not accepted, nor are any of the exploitable services running.
- Just like the real thing - blog.uncommonsensesecurity.com
The goal is to build a truly “enterprise class” network, and they pull it off every year.
- RSA 2011
Last year we produced a pretty detailed Guide to the Conference and it was well received, so – gluttons for punishment that we are – we’re doing it again
- RSA Guide 2011: Key Themes – securosis.com
- Researchers To Hit Major Website In Drive-By At RSA – darkreading.com
- USB Attacks On Linux
Many people think that Linux is immune to the type of Autorun attacks that have plagued Windows systems with malware over the years.
- Some common infosec job roles and related certifications – resources.infosecinstitute.com
Most people hear the term Infosec, and they automatically associate that with network and telecom security, but in reality it’s much broader than that.
- Project Ubertooth: Building A Better Bluetooth Adapter – ossman.blogspot.com
Video of my presentation,Project Ubertooth: Building a Better Bluetooth Adapter, at ShmooCon 2011 is now online.
- Apple iOS Push Notifications: Security Implications, Abuse Scenarios, and Countermeasures – blogs.sans.org
In this article, I will briefly introduce details of how APN works and present scenarios of how insecure implementations can be abused by malicious parties.
- Cisco 4Q10 Global Threat Report - blogs.cisco.com
The Cisco 4Q10 Global Threat Report is now available for download. The report showcases data from the 4th calendar quarter (October 1, 2010 – December 31, 2010).
- ShmooCon 2011 Debriefing - blog.fortinet.com
First, just like in BlackHat DC 2011, this year’s conference had several talks on smart phones. Good news! I was however slightly surprised they all concerned Android.
- Five Key Design Decisions That Affect Security In Web Applications - blogs.sans.org
Senior developers and architects often make decisions related to application performance or other areas that have significant ramifications on the security of the application for years to come.
- What netsec-like podcasts do you listen to? - risky.biz
I’m having a hard time getting my fill of security related news and discussion. I’m down to two podcasts that I listen to weekly.
- Exploit Kits – A Different View – securelist.com
Exploit kits are packs containing malicious programs that are mainly used to carry out automated ‘drive-by’ attacks in order to spread malware.
- Password/Word Lists – room362.com
Brute force, even though it’s gotten so fast, is still a long way away from cracking long complex passwords.
I stumbled upon this and was kind of impressed.
- PDF Exploit Disguised As A Xerox Scanned Document - labs.m86security.com
Most office network printers and scanners have a feature that sends scanned documents over email. Cyber crooks however, have imitated email templates used by these devices for malicious purposes
- The Honeynet Project Releases New Tool: PhoneyC - chuvakin.blogspot.com
As promised, I will be reposting some of the cool new announcements from The Honeynet Project here on my blogsince I now serve as Project’s Chief PR Officer.
- MetaSploit Framework 3.5.2 Released – blog.metasploit.com
On February 1st, Eduardo Prado of Secumania notified us of a privilege escalation vulnerability on multi-user Windows installations of the Metasploit Framework.
- Open SCAP v0.6.8 released – open-scap.org
The OpenSCAP Project was created to provide an open-source frameworkto the community which enables integration with the Security Content Automation Protocol (SCAP) suite of standards and capabilities.
- SSL Diagnosis v0.8.1a released – sourceforge.net
SSL Diagnos is used to get information about SSL usage (protocols ssl2, ssl3, tls, dtls, and ciphers). It can also be used for testing and rating ciphers on SSL clients.
- Passwords shared between rootkit.com and gawker – terminal23.net
This is a classic journo case of an editor-sensationalized title for an article that doesn’t really get reasonable until the last two paragraphs where it kinda puts the brakes on calling password reuse “endemic.”
- UPDATE: Nmap 5.51! – nmap.org
Wow! In about two weeks time, another Nmap release! We now have Nmap version 5.51! The last release was Nmap 5.50, which we wrote about here.
- eEye to Release Free Vulnerability Scanner with Zero -Day Identification and Configuration Auditing – eeye.com
eEye Digital Security, a provider of IT security and unified vulnerability management solutions, today announced the pre-release of Retina Community.
- UPDATE: Fiddler v188.8.131.52! - fiddler2.com
Our first post regarding Fiddler, the web debugger can be found here. On the 13th of February, an update was released.
- A Python Domains Extractor From IPs – blog.kaffenews.com
I developed it in 5 mins just because I had to do a PT on a list of IP Addresses and it was needed to get the Domains from IPs.
After I read the documentation and some reviews I realize that it is a very secure piece of software that implements many high level features so I knew I will not be easy, at least in theory.
- What is Mausezahn? – peripheral.at
Mausezahn is a free fast traffic generator written in C which allows you to send nearly every possible and impossible packet.
- Move over tsgrinder/tscrack hello ncrack – carnalOwnage.attackresearch.com
So thanks to mubix for telling me that ncrack now supports RDP. very cool stuff.
- Left or right handed passwords - justanotherhacker.com
Are you left or right handed? How about your password? English based passwords seem to be predominantly left handed.
- Hidden bandit Inside NeoSploit - symantec.com
Over the last few years, Symantec has observed a substantial rise in the use of exploit kits.
- Breaking web security – it’s all about RCS – net-ninja.net
I will be discusing ways in which we can include error handling, anonymimity and how we can build the exploit so that the auditor has a reliable and flexible weapon.
- Decoding HTML Style tag based malicious frames - research.zscaler.com
Injecting clear text or obfuscated malicious Iframes has become a common attack vector.
- Universe’s best and legal Mac OS X reversing tutorial for newbies – reverse.put.as
I have decided to re-release my beginners tutorial, this time based on a crackme, so it deserves the upgrade to Universe instead of World.
- Android Gmail App: Stealing Emails via XSS - spareclockcycles.org
This post documents an XSS vulnerability that I discovered in the default Gmail app (v1.3) provided by Google in Android 2.1 and prior.
- Android Reverse Engineering – thomascannon.net
This project all started when I was asked tot ake a look at a software product that was under evaluation.
- Forensic Examination of Pointsec Encrypted Drives - dfsforensics.blogspot.com
Many organizations use Pointsec (Check Point) full disk encryption in order to keep their data secure, especially in the case of laptops.
- Blackhole exploits kit attack growing - research.zscaler.com
Recently, we have seen an increase in Blackhole exploit kit attacks. Blackhole is yet another web exploit kit developed by Russian hackers.
- Better Passwords In Under 200 Characters - blog.wearpants.org
Good password security is a pain in the neck. Done properly, it requires a different password for every site.
- February 2011 Microsoft Black Tuesday Summary – isc.sans.edu
Here are the February 2011 Black Tuesday patches. Enjoy!
Adobe released updates for Reader for 9.4.2 and 10.0.1. While this page on Adobe’s site doesn’t actually list them correctly, if you drill down into the actual product and OS, you’ll see the updates listed for 2/8/2011.
- Adobe Reader 9.4.2 and 10.0.1 Updates are out - isc.sans.edu
- Adobe patches for Shockwave, Flash, Reader, and Cold Fusion – isc.sans.edu
- Adobe, Microscoft, WordPress Issue Security Fixes – krebsonsecurity.com
Talk about Patch Tuesday on steroids! Adobe, Microsoft and WordPress all issued security updates for their products yesterday. In addition, security vendorTipping Point released advisories detailing 21 unpatched vulnerabilities in products made by CA, EMC, HP, Novell and SCO.
- VMWare Security Advisory - vmware.com
Updated versions of the Cisco Nexus 1000V virtual switch address a denial of service in VMware ESX/ESXi.
- Last August, TippingPoint said they will enforce a six-month disclosure on bought bugs that haven’t been patched. Today, TippingPoint rolled out 22 - dvlabs.tippingpoint.com
These vulnerabilities are being published as per the ZDI disclosure changes announced in August of 2010.
- Comcast DOCSIS 3.0 Business gateways Multiple Vulnerabilities – exploit-db.com
With these default credentials, internal attackers can modify deviceconfigurations to leverage more significant attacks, including redirection of DNS requests.
- Anonymous vs. Aaron Barr/HBGary
A security researcher claims to have infiltrated the higher echelons of the Anonymous organisation and identified key leaders’ names and addresses.
- Anonymous infiltrates the HBGary security company, which was tasked with infiltrating Anonymous by the FBI – reddit.com
- Researcher claims to have infiltrated Anonymous high command - v3.co.uk
- HBGary Federal Hacked by Anonymous – krebsonsecurity.com
- Anonymous hacks security company HBGary, Dumps 50,000 emails online - readwriteweb.com
- Measuring password re-use empirically - lightbluetouchpaper.org
- Anonymous Attacks US Security Company – guardian.co.uk
- rootkit.com cleartext passwords – dazzlepod.com
- How One Man Tracked Down Anonymous – And Paid A Heavy Price – wired.com
- HBGary’s conversations with Feds – uiu.me
- HBGary’s conversations with the Feds pt. 2 - uiu.me
- blow by blow of how Anonymous gained root access on rootkit.com – dazzlepod.com
- The Report on Anonymous by Aaron Barr - cryptome.org
- Rootkit.com’s MySQL database leaked – stfu.cc
Come on, I know it’s /r/netsec, so we should be familiar with checking URLs before clicking, but I’d expect at least a warning before clicking a direct download of a company’s database.
- Hatfields and McCoys 2011 Style – 1raindrop.typepad.com
By itself its an derisive, throw away comment that security people make about developers all the time, and of course developers are not averse to throwing haymakers back at security people.
- Sony Marketing Man Tweets PS3 Master Key - twitpic.com
My life is complete. Sue yourself, Sony.
- iPhone Password Hack
Researchers in Germany say they’ve been able to reveal passwords stored in a locked iPhone in just six minutes and they did it without cracking the phone’s passcode.
- iPhone Attack Reveals Password In 6 Minutes - techworld.com.au
- iPhone Hacked and Passwords Stolen In Just 6 Minutes - cyberarms.wordpress.com
- How to steal passwords from a locked iPhone - nakedsecurity.sophos.com
- Researches steal iPhone password in 6 minutes – engadget.com
- Secret Plan To Kill WikiLeaks With FUD Leaked – wikileaks.ch
Three information security consultancies with links to US spy agencies cooked up a dirty tricks campaign late last year to destroy Wikileaks by exploiting its perceived weaknesses.
- Hackers hit ‘at least five oil and gas firms’ – bbc.co.uk
Hackers have run rampant through the networks of at least five oil and gas firms for years, reveals a report.
- Night Dragon attacks: myth or reality – nakedsecurity.sophos.com
Many readers will have seen the press around a series of hacking attacks that have been labelled the ‘Operation Night Dragon’ attacks by McAfee.