Week 10 In Review – 2017

Techniques Hacking Unicorns with Web Bluetooth - www.contextis.com Researchers discovered an unsecured MongoDB server that exposed sensitive CloudPets customer data. My research focused on the toy itself, in particular some issues we found with its Bluetooth LE connectivity and features. Still Passing the Hash 15 Years Later - passing-the-hash.blogspot.com So I first thought about it [...]

Week 1 In Review – 2017

Resources 33C3: Chris Gerlinsky Cracks Pay TV - hackaday.com People who have incredible competence in a wide range of fields are rare, and it can appear deceptively simple when they present their work. [Chris Gerlinksy]’s talk on breaking the encryption used on satellite and cable pay TV set-top boxes was like that. Tools mitmproxy: release v1.0.0 - [...]

Week 50 In Review – 2016

Events Related PhreakNIC20-2016 - www.youtube.com Tools GRASSMARLIN - github.com GRASSMARLIN provides IP network situational awareness of industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks to support network security. Techniques Secure Rom extraction on iPhone 6s - ramtin-amin.fr Secure ROM, also knows as bootrom, is the very first piece of software that [...]

Week 8 In Review – 2016

Events Related BSidesCapeTown 2015 - www.youtube.com Resources Ray Sharp CCTV DVR Password Retrieval & Remote Root - community.rapid7.com On January 22, 2013, a researcher going by the name someLuser detailed a number of security flaws in the Ray Sharp DVR platform. These DVRs are often used for closed-circuit TV (CCTV) systems and security cameras. Comodo: Comodo [...]

Week 37 In Review – 2013

Resources Video Tutorial: Introduction to XML External Entity Injection – community.rapid7.com This video introduces XML injection to achieve XML external entity injection (XXE) and XML based cross site scripting (XSS). Errata Security's blog We scanned the Internet for port 22 – blog.erratasec.com Errata Security scanned the entire Internet for port 22 -- the port reserved for "SSH", [...]

DNSSEC for All Top Level .GOV Domains

Last week the Office of Management and Budget released memoranda M-08-23, titled Securing the Federal Government’s Domain Name System Infrastructure. The document states that all US government top level .gov domains will use DNSSEC starting in January 2009. This is in response to the DNS cache poisoning attack that Dan Kaminsky made public a few [...]

2017-03-12T17:40:22-07:00 August 29th, 2008|Security Vulnerabilities|1 Comment

Dan Kaminsky’s DNS Presentation Carnival

Dan Kaminsky's Black Hat USA presentation was a bit different than what I was expecting, but it was still very interesting. Instead of going into details on the vulnerability, he spent the majority of time identifying the systems that would break if someone were able to manipulate the DNS system. He basically said that once [...]

2017-03-12T17:40:23-07:00 August 7th, 2008|Security Conferences|0 Comments

USENIX Workshop on Offensive Technologies

This is the week of USENIX, as they have several security related workshops, and their annual  Security Symposium. On Monday, there was the Workshop on Offensive Technologies, and I was lucky enough to get invited to the workshop. Paul Vixie started the event by talking about the DNS cache poisoning vulnerability. He didn't talk about [...]

2017-03-12T17:40:25-07:00 July 30th, 2008|Security Workshops|0 Comments

More DNS Cache Poisoning Testing Tools

Now that public exploits are available for the DNS cache poisoning attack, now is good time to patch your DNS servers if you haven't already. Some new tools also came out to test if your DNS server is vulnerable to DNS cache poisoning. The web-based DNS randomness test by DNS-OARC is very good, and it [...]

2017-03-12T17:40:25-07:00 July 24th, 2008|Security Tools|0 Comments

Is Your DNS Server Vulnerable To Cache Poisoning?

By now, I think everyone has heard about the cache poisoning vulnerability in many DNS servers. Many are using Dan Kaminsky's online testing tool at doxpara.com to test their own servers, but Dan's server leaves the results exposed to the public. For those that want to test their DNS servers and not have the results [...]

2017-03-12T17:40:26-07:00 July 13th, 2008|Security Tools|0 Comments