Week 52 in Review – 2012

Event Related

  • Bootcamp – pentesterlab.com/bootcamp
    Bootcamp provides a learning path to get into security and especially web penetration testing.

Resources

  • Automated Open Source Intelligence (OSINT) Using APIs – raidersec.blogspot.com
    The first step to performing any successful security engagement is reconnaissance. How much information one is able to enumerate about given personnel (for social engineering engagements) or systems can often impact the effectiveness of the engagement.

Tools

  • THC-IPV6 – attacking the IPV6 protocol suite – thc.org
    A complete tool set to attack the inherent protocol weaknesses of IPV6 and ICMP6, and includes an easy to use packet factory library.
  • Topera – code.google.com
    Topera is a brand new TCP port scanner under IPv6, with the particularity that these scans are not detected by Snort.

Techniques

  • Hacking the Wiegand Serial Protocol – blog.opensecurityresearch.com
    “Wiegand” is used to describe a number of different things used within access control systems such as the format in which data is stored on a card, the protocol which is used to transmit the data, and different types of access cards that leverage it.
  • Scraping LinkedIn Public Profiles for Fun and Profit – blog.ikotler.orgReconnaissance and Information Gathering is a part of almost every penetration testing engagement. Often, the tester will only perform network reconnaissance in an attempt to disclose and learn the company’s network infrastructure (i.e. IP addresses, domain names, and etc), but there are other types of reconnaissance to conduct, and no, I’m not talking about dumpster diving.
  • Exploiting and mitigating Java exploits in Internet Explorer – greyhathacker.net
    This year we’ve seen a number of 0 day Java exploits surfacing and various mitigating steps mentioned in various sites that could be taken to prevent us from being compromised.

Vendor/Software Patches

  • Internet Explorer
  • Microsoft Security Bulletin MS12-078 – Critical – technet.microsoft.com
    This security update resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType or OpenType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker’s website.

Vulnerabilities

2017-03-12T17:39:43-07:00 December 31st, 2012|Security Tools, Security Vulnerabilities, Week in Review|0 Comments

Leave A Comment