Events Related

Resources

  • Hack In The Box Amsterdam 2011 – professionalsecuritytesters.org
    Hack In The Box resource portal with download links for materials and photos.
  • Most Common iPhone Passcodes – amitay.us
    In essence, this post is an homage to the well known Most Common Passwords on the Internet articles. Different articles pull from different sources, so naturally aren’t the same, but still demonstrate certain trends. Similar trends are evident in the data I present below.
  • OWASP NYC Slides Posted – gdssecurity.com
    The discussion focused on identifying and exploiting Padding Oracles in custom web applications, and walked through specifics on how to use PadBuster in a variety of common scenarios. Hopefully those using PadBuster will find the second half of the deck a useful reference.
  • OWASP AppSec EU 2011 – owasp.org
    Catalogue of AppSec presentations.
  • Mona 1.0 Released! – corelan.be
    For anyone who missed my talks (either at AthCon or Hack In Paris), mona is the long awaited successor to pvefindaddr.  Named after my daughter (I’m sure she’s too young to hackinparis_IMG_8830realize or even care at this point), this Immunity Debugger PyCommands introduces a lot of improvements and new features compared to pvefindaddr.
  • Welcome to WS-Attacks.org – clawslab.nds.rub.de
    WS-Attacks.org is not a new web service standard by the OASIS Group or W3C; instead it presents the flaws of today’s web service standards and implementations in regard to web service security! WS-Attacks.org aims at delivering the most comprehensive enumeration of all known web service attacks.

Tools

  • UPDATE:The Sleuth Kit v3.2.2! – sourceforge.net/project/sleuthkit/files
    The Sleuth Kit (TSK) is a library and collection of command line tools that allow you to investigate volume and file system data. It is a collection of open source file system forensics tools that allow one to view allocated and deleted data from NTFS, FAT, FFS, and EXT2FS images.  The Autopsy Forensic Browser provides a graphical interface to The Sleuth Kit.
  • UDPATE: THC Hydra v6.4! – thc.org/releases/hydra-6.4-src.tar.gz
    THC-HYDRA is a very fast network logon cracker which support many different services. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, FreeBSD and OSX.
  • Introducing WPScan the WordPress Security Scanner – ethicalhack3r.co.uk
    WPScan is a black box WordPress Security Scanner written in Ruby which attempts to find known security weaknesses within WordPress installations. Its intended use it to be for security professionals or WordPress administrators to asses the security posture of their WordPress installations. The code base is Open Source and licensed under the GPLv3.
  • OWASP iGoat 1.o – owasp.blogspot.com
    The iGoat tool is a learning tool, primarily meant for iOS developers (but also useful to IT security practitioners, security architects, and others who simply want to learn about iOS security). It takes its name and inspiration from the venerable OWASP WebGoat tool. Like WebGoat, iGoat users explore a number of security weaknesses in iOS by exploiting  them first.
  • BodgeIt Vulnerable Web Application Platform – sectechno.com
    Legal hacking is possible as you can create a vulnerable platform to test any new vulnerability without breaking Lows. Person that is looking to test his skills without thinking about proxies or hide his activities and test new web exploits can consider BodgeIt. BodgeIt Store is a vulnerable web application which is currently aimed at people who are new to pen testing.

Techniques

  • OWASP Top 10 for .NET developers part 7: Insecure Cryptographic Storage –  troyhunt.com
    Cryptography is a fascinating component of computer systems. It’s one of those things which appears frequently (or at least should appear frequently), yet is often poorly understood and as a result, implemented badly.
  • Analyzing the LulzSec Password Leak – rafekettler.com
    Maybe there’s something wrong with me, but when I first heard about LulzSec releasing 62,000 passwords, I was actually pretty excited. I’ve always wanted to a little analysis on a big leak like this, and now I finally get to do one.
  • Sniffing using iptables – r00tsec.blogspot.com

Vulnerabilities

Vendor/Software Patches

  • June 2011 Patch Tuesday
    Adobe has released its latest batch of quarterly security updates covering Flash, Shockwave, Reader, Acrobat, ColdFusion, LifeCycle and Blaze. Flash logoAfter only 9 days, another zero-day exploit has been fixed in Adobe Flash player.

  • Microsoft Patch Tuesday
    This security update resolves eight privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Other News

  • Barr Unbowed (Interview with Aaron Barr) – threatpost.com
    Aaron Barr, the former CEO of security firm HBGary Federal, is one of those unlucky few. No fountain-flopper, Barr is a respected authority on computer security whose mistake was to openly speculate on the identities of members of the online hacking group Anonymous, then watch as events spun gruesomely out of his control.
  • Foreign Government Allegedly Behind Cyberattack On IMF –  arstechnica.com
    The International Monetary Fund suffered a “major breach” earlier this year that allowed hackers to access a “large quantity” of data, staff and board members were told by e-mail last week.
  • EU Ministers Seek To Ban Creation of ‘Hacking Tools’ – networkworld.com
    Ministers from all 27 countries of the European Union met on June 9 to discuss European Commission proposals for a directive on attacks against information systems. But in addition to approving the Commission’s text, the ministers extended the draft to include “the production and making available of tools for committing offenses”.
  • Spear phishers sharpen skills, craft ‘incredible’ attacks, says experts – computerworld.com
    Recent break-ins at high-profile targets like the International Monetary Fund (IMF) demonstrate just how proficient hackers have become at “spear phishing,” researchers said today.
  • Replacing RSA SecurID Security Tokens Not So Simple – darkreading.com
    Should all RSA SecurID customers take the company up on its new offer to swap out their authentication tokens as a precaution? Not so fast, security experts warn. While RSA says it will provide replacements for SecurID tokens to allay security concerns in the wake of its breach and the subsequent related breach at Defense contractor Lockheed Martin, the move might be only a temporary fix if the attackers who compromised RSA’s SecurID servers indeed got the seed files.
  • The LulzSec manifesto – arstechnica.com
    LulzSec certainly has enemies. Gamers in particular have been agitated by the group’s attack on login servers for games like EVE Online. Angrier, perhaps, have been those whose e-mail, Facebook, and PayPal account passwords were leaked—and who then had to watch as Twittizens celebrated the sometimes-criminal misuse of those accounts.
  • The Cloud-time for serious consideration-web services – shortinfosec.net
    In 2008 we published an article on cloud computing, which basically said, don’t turn off your local datacenter. To be very sincere, Shortinfosec was a little hypocritical in that article – since Shortinfosec was and is hosted in the cloud.