NetSec
  corner   



HOME

LINUX

CYBERLAW

VIRTUALIZATION

Bugtraq

Packetstorm

FD

GrokLaw


RSS Feed


Netsec, comsec, infosec and IA news, research and trends

 

8.16.2003

 
P0f v2 Beta from Michael Zalewski

P0f is a passive OS fingerprinting tool that gathers useful information
about visitors / attackers without triggering any suspicious traffic. In
addition to accurately and precisely fingerprinting a remote OS based on a
large number of metrics, p0f can also determine link types, distances and
uptimes of those hosts - all without sending a single packet. As such, p0f
is a useful addition to a firewall / IDS / server setup.



8.14.2003

 
IST 248 Textbooks:
Required: Network Perimeter Security 0-7357-1232-8

Optional: Linux Firewalls 0-7357-1099-6 and Cisco Secure PIX Firewalls 1-58705-035-8

If your boss is paying, consider them all required. ; - ) We will focus first upon PIX (I have 6) and Linux iptables. I am thinking of scenario based labs, CTF style with teams. 4 - 6 teams of 3. Each team must protect "insecure" servers without touching the OS. This should make it both fun and realistic. Feedback welcome.

 
Federal Information Systems Security Educators’ Association (FISSEA)
National Security Agency Centers of Academic Excellence in Information Assurance Education (CAEs)
Infraguard

 
Snip from Cisco Advisory:


Using IOS with NetFlow Enabled to Detect Infected Hosts

NetFlow can be a powerful tool to help identify infected hosts. Netflow must be
enabled on an interface with the command ip route-cache flow.

Router>show ip cache flow | i 0087

SrcIf SrcIPaddress DstIf DstIPaddress Pr SrcP DstP Pkts

Fa2/0 XX.XX.XX.242 Fa1/0 XX.XX.XX.119 06 0B88 0087 1
Fa2/0 XX.XX.XX.242 Fa1/0 XX.XX.XX.169 06 0BF8 0087 1
Fa2/0 XX.XX.XX.204 Fa1/0 XX.XX.XX.63 06 0E80 0087 1
Fa2/0 XX.XX.XX.204 Fa1/0 XX.XX.XX.111 06 0CB0 0087 1
Fa2/0 XX.XX.XX.204 Fa1/0 XX.XX.XX.95 06 0CA0 0087 1
Fa2/0 XX.XX.XX.204 Fa1/0 XX.XX.XX.79 06 0C90 0087 1

 
Internet Mail Consortium: S/MIME

 
WAP: Wireless Application Protocol Security Paper

 
Steve Bellovin has worked for AT&T / Bell Labs for a long time. Here is his paper on why firewalls are critical. From the BSDsnob.



8.13.2003

 
"What would be the use of immortality to a person who cannot use well a half hour?"
--Ralph Waldo Emerson

 
New Blaster / RPC worm variant on the loose This one starts an IRC backdoor, probably for a DoS attack.

 
Phrack 61 is Out.
Worst Fears II: A Paper from SensePost



8.12.2003

 
RPC Worm Snip from NANOG
"This worm is amazing. I have only had filters in place for about 4.5 hours and I am already approaching 100 million matches for the deny tcp/135 across my network. Of that, only one customer has said that they needed 135 open for legimate use (probably more, but I have only heard from the one)."

Sean P. Crandall
VP Engineering Operations
MegaPath Networks Inc.



8.11.2003

 
ISC reports that the Blaster DCOM/RPC worm is propagating
Counterpane has snort signatures

 
WifiBSD is a FreeBSD based AP. Link from BSDsnob.

 
Richard Stephens' "TCP/IP Illustrated" is THE reference for TCP/IP. Here is Volume 1, online and FREE! Alexandre Dulaunoy, the site's host, seems to have written some interesting papers on privacy, communications and freedom.



8.10.2003

 
OpenBSD: Firewall On A Floppy (FOAF)
Transparent Bridging Firewall. Link from BSDsnob, of course.





This page is powered by Blogger.


Site Meter Locations of visitors to this page