Netsec, comsec, infosec and IA news, research and trends
12.30.2004
Trojan horse exploits a vulnerability found in October in how Internet Explorer and Windows XP Service Pack 2 handle help files called from web pages
Symantec link: Trojan.phel.A
The Open Source Security Testing Methodology Manual (OSSTMM) is a peer-reviewed methodology for performing security tests and metrics. The OSSTMM test cases are divided into five channels (sections) which collectively test: information and data controls, personnel security awareness levels, fraud and social engineering control levels, computer and telecommunications networks, wireless devices, mobile devices, physical security access controls, security processes, and physical locations such as buildings, perimeters, and military bases. posted by GeeWhiz
Friday, December 24, 2004
Biometric Data Collected on Fallujah Residents - US forces in Iraq are attempting to tame Fallujah with biometric ID. The returning population of up to 250,000, reporter is to be allowed back in gradually, a few thousand at a time. They'll be finger printed, given a retina scan and then an ID card, which will only allow them to travel around their homes or to nearby aid centers, which are now being built. The Marines will be authorized to use deadly force against those breaking the rules. posted by GeeWhiz
Friday, December 10, 2004
The Windows Script Encoder Allows for Trivial Scrambling of Scripts to "Prevent" Clients from Reverse Engineering The Contents While Allowing for the Script to Run. The Big Suprise? This is Apparently Being (Ab)Used for Malware AV Evasion. Here is a Script Decoder from Grey Magic posted by GeeWhiz
Wednesday, December 08, 2004
Warning - Pseudohumorous Technorant: LiveShot is Aiming to Offer the Ability to Go Hunting Without Leaving Your Chair. That's right... forget the limits and go online hunting! Americanus Obesaurus can hunt exotic game from the comfort of their Hummer using little more than a PDA and cellmodem. My question is... Can hunters shoot other virtual hunters? Hunting just wouldn't be the same without hunting accidents. Have the owners thought about what might happen if someone "owns" the armed webcam? I have nothing against maintaining one's skills with various applications of weaponry but... sheese... sooner or later we should put down our various and sundry communications devices and Get Off the Couch! posted by GeeWhiz
Thursday, December 02, 2004
Found an extremely worrisome article by ZDNet UK regarding a request by the FBI to collect web server logs from insecure.org.
Luckily, our friend Fyodor has denied their requests due to a lack of proper search warrant. Good for him!
The incompetence at ZDNet is shown at the beginning of the article. "The creator of the famous hacking tool Nmap is being hounded by the FBI for copies of Web server log data from his Web site Insecure.org."
I am deeply saddened to inform you of the sale of Illmob.org to an undisclosed party for the amount of $5,000US. Pingywon and morning_wood will continue to update the site for the next three months, until control of the domain is transferred. It is always a pity to lose an active member of the scene, and I wish nothing but the best for my friend xIllwillx, and I'm sure the rest of the community joins in my sentiments. Thanks for all you contributed, guys! posted by Anonymous
Saturday, November 27, 2004
BlueMonger is a demo application for advanced smart phones running Java with support for the Bluetooth API. It will poll for Bluetooth devices in the near vicinity, list those devices and post their discovery to your weblog via XML-RPC. These posts will link back to BlueMonger.com so that you can see by the referrers if other people with weblogs have passed by the same device. If you don't know what that meant, you probably don't want to try this application. posted by GeeWhiz
Monday, November 22, 2004
11.21.2004
Port Reporter is a M$ Windows service that logs all port activity including PID to port mappings and a dump of all DLL's bound to a port. While this may eat up a bit of disk and CPU, this data could help track down backdoors, trojans, rootkits, etc. Here's a snippet from telnet-ing to a netcat listener on port 3333:
date,time,protocol,local port,local IP address,remote port,remote IP address,PID,module,user context
04/11/21,13:36:3,TCP,1372,127.0.0.1,3333,127.0.0.1,2648,telnet.exe, 04/11/21,13:36:3,TCP,3333,127.0.0.1,1372,127.0.0.1,4020,nc.exe,
SecurityForest.com is a collaboratively edited Forest consisting of Trees which anyone can contribute to. SecurityForest's trees are specific security repositories that are categorized for practical reasons. The technologies currently in use in these repositories are based on Wiki and CVS technology. Current trees are Exploits, Tools, Tutorials and Links. posted by GeeWhiz
Saturday, November 20, 2004
tcpick is a textmode sniffer libpcap-based that can track, reassemble and reorder tcp streams. Tcpick is able to save the captured flows in different files or displays them in the terminal, and so it is useful to sniff files that are transmitted via ftp or http. It can display all the stream on the terminal, when the connection is closed in different display modes like hexdump, hexdump + ascii, only printable charachters, raw mode and so on. Available a color mode too, helpful to read and understand better the output of the program. Actually it can handle several interfaces, including ethernet cards and ppp. It is useful to keep track of what users of a network are doing, and is usable with textmode tools like grep, sed, awk. posted by GeeWhiz
Saturday, November 20, 2004
Cisco Security Agent (CSA) provides threat protection for server and desktop computing systems, also known as endpoints. It identifies and prevents malicious behavior, thereby eliminating known and unknown security risks.
A vulnerability exists in which a properly timed buffer overflow attack may evade the protections offered by CSA. The system under attack must contain an unpatched
underlying vulnerability in system software that CSA is configured to protect. Another prerequisite for the attack is that a user must be interactively logged in during the attack.
Cisco IOS devices running branches of Cisco IOS version 12.2S that have Dynamic Host Configuration Protocol (DHCP) server or relay agent enabled, even if not configured, are vulnerable to a denial of service where the input queue becomes blocked when receiving specifically crafted DHCP packets.
This vulnerability was introduced by the fix for CSCdx46180, and was integrated in Cisco IOS 12.2(14)SZ and 12.2(18)S. This issue affects only Cisco devices running affected Cisco IOS versions 12.2(18)EW, 12.2(18)EWA, 12.2(14)SZ, 12.2(18)S, 12.2(18)SE, 12.2(18)SV, 12.2(18)SW and higher that do not have the configuration command no service dhcp.
Analysis of the Impact of Open Source Software - "There are about 60,000 viruses known for Windows, 40 or so for the Macintosh, about 5 for commercial Unix versions, and perhaps 40 for Linux. Most of the Windows viruses are not important, but many hundreds have caused widespread damage. Two or three of the Macintosh viruses were widespread enough to be of importance. None of the Unix or Linux viruses became widespread - most were confined to the laboratory." posted by GeeWhiz
Monday, November 08, 2004
A Cisco Secure Access Control Server (ACS) that is configured to use Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) to authenticate users to the network will allow access to any user that uses a cryptographically correct certificate as long as the user name is valid. Cryptographically correct means that the certificate is in the appropriate format and contains valid fields. The certificate can be expired, or come from an untrusted Certificate Authority (CA) and still be cryptographically correct.
User authentication is not impacted if EAP-TLS is configured in the Cisco Secure ACS with binary comparison of user certificates as the only comparison method and if the user entry in Lightweight Directory Access Protocol/Active Directory (LDAP/AD) contains only valid certificates.
Cisco Secure ACS for Unix and versions of Cisco Secure ACS for Windows and Cisco Secure ACS Solution Engine prior to, and later than, 3.3.1 are not affected by this vulnerability. posted by Brenda
Tuesday, November 02, 2004
Tomahawk is a command line tool for testing network-based intrusion prevention systems. Here is a white paper on the techniques used by tomahawk. posted by GeeWhiz
Monday, November 01, 2004
Hardened-PHP adds security hardening features to PHP to protect your servers on the one hand against a number of well known problems in hastily written PHP scripts and on the other hand against potential unknown vulnerabilities within the engine itself. posted by GeeWhiz
Monday, November 01, 2004
ATM card: Free
PIN number: Free
Deducting money from your account for that weekend gettaway (which you have already started): 5 seconds
BSOD without getting your cash: Priceless
Windows ATMs raise security concerns
PuTTY 0.56, released today, fixes a serious security hole which can
allow a server to execute code of its choice on a PuTTY client
connecting to it. In SSH2, the attack can be performed before host key
verification, meaning that even if you trust the server you think you
are connecting to, a different machine could be impersonating it and
could launch the attack before you could tell the difference. We
recommend everybody upgrade to 0.56 as soon as possible.
That's two really bad holes in three months. I'd like to apologise to
all our users for the inconvenience.
Entry Level Internship Opportunity: Tasks Include creation of a database of hardware / software, help desk assistance and some PC / laptop support. Contact me if interested. posted by GeeWhiz
Monday, October 25, 2004
Internet About to Collapse Says Finnish Scientist - I think we'll just break the Internet in our efforts to rectify the problems he mentions. Email is starting to break due to mail/spam/virus filtering. How many of us have experienced a silent mail failure thus far? How many of us even know it? posted by GeeWhiz
Wednesday, October 20, 2004
Coalition for Networked Information - CNI is an organization dedicated to supporting the transformative promise of networked information technology for the advancement of scholarly communication and the enrichment of intellectual productivity. posted by GeeWhiz
Monday, October 18, 2004
Webcast Tomorrow Afternoon: "Are You the Weakest Link?" from the Multistate Information Sharing and Analysis Center featuring Allan Paller (SANS) and Patrick Gray (ISS X-Force). posted by GeeWhiz
Monday, October 18, 2004
"Copyright Does Not Exist" a Hacker Culture Book by Linus Walleij. Irony being lost on Linus, he states in the preface that "At the moment it is not permissible to mass-distribute the book in printed form without my prior permission." It is incredible that he wants to retain intellectual property rights even though he views them as "armed robbery". posted by GeeWhiz
Thursday, October 14, 2004
More Info on the Windows XP Winzip Stack Overflow Vulnerability (MS04-034) A zip archive containing a file with an 8000 character filename allows for a malicious zip to overwrite the exception handler and take control of EIP. Like the jpeg issue, this will likely be used for backdooring systems as opposed to creating the next big worm. The media gets excited about big noisy bugs. We should be more intimidated by bugs that tiptoe in the night. posted by GeeWhiz
Wednesday, October 13, 2004
Reported Vulnerability in Microsoft ASP.NET Microsoft is currently investigating a reported vulnerability in Microsoft ASP.NET. An attacker can send specially crafted requests to the server and view secured content without providing the proper credentials.
This issue affects Web content owners who are running any version of ASP.NET on
Microsoft Windows 2000
Windows 2000 Server
Windows XP Professional
Windows Server 2003
UnicornScan was released at ToorCon last weekend. It is a distributed TCP/IP stack aimed at protocol level security research. Features include:
# Asynchronous stateless TCP scanning with all variations of TCP Flags.
# Asynchronous stateless TCP banner grabbing
# Asynchronous protocol specific UDP Scanning (sending enough of a signature to elicit a response).
# Active and Passive remote OS, application, and component identification by analyzing responses posted by GeeWhiz
Thursday, September 30, 2004
Who has Mid Level M$ Windows/Exchange Admin Skills and needs a job with a local firm? Let me know if you are interested. posted by GeeWhiz
Wednesday, September 29, 2004
In 1984 the Supreme Court ruled in Sony V Universal that we have a “Fair Use” right to own home recording equipment like VCR’s, Cassette Recorders and CD-R’s. The INDUCE Act would, if passed, act to overturn the Supreme Court and discourage innovation in the development of multimedia hardware and software.
INDUCE undermines innovation, market economics and consumer rights.
Please Call Your Senators in Opposition Wednesday, September 29th between the hours of 9am and 5 pm EDT. In Virginia this is Senator George Allen (202-224-4024) and Senator John Warner (202-224-2023).
The GDIscan Tool from SANS Will Scan a system for DLL's (gdiplus.dll, sxs.dll, wsxs.dll, mso.dll) Vulnerable to the JPEG Overflow. Many applications may install their own instance so it is highly recommended systems be scanned. posted by GeeWhiz
Monday, September 27, 2004
Talk about legal extortion..... I can see it now: "So what if Win2k has a hole in it? We're not going to fix it, you need to upgrade XP". Yup, it's the big kid demanding your lunch money for 'protection'. Hmm, 'upgrade' the wife's PC with Mr. Gates latest version of the beast of bugs, or buy that 250GB SATA drive I saw today? Let me put my Win2k CD back under my drink so my wife doesn't kill me for staining the table, and get back to 'upgrading' her machine from Win2k to kernel 2.6.5.......
'The box said 'Requires Windows 98 or better' so I installed Linux'
ChoicePoint AutotrackXP Allows You to "Search Billions of Records from Your Computer." "Whether you're investigating fraud, conducting criminal and civil investigations, locating witnesses, finding missing children or locating and verifying assets, AutoTrackXP can deliver comprehensive information right to your desktop." posted by GeeWhiz
Wednesday, September 22, 2004
The Complete History of the Internet. Maybe not the complete history but a valid attempt. A complete Internet & hacker history will never be obtainable since so much of the history is fragmented, unfounded and unreported.
Symantec to Acquire @Stake: Dave Aitel of ImmunitySec comments: "...Symantec bought @stake. NAI bought Foundstone, INS bought Global Integrity. Microsoft bought LSD. The era of consolodation is upon us." posted by GeeWhiz
Friday, September 17, 2004
Here is an article on NFC (Near Field Communications), soon to be included in cell phones. It touts low power and high security. I'm thinking we will see another blue rifle....
Information on the JPEG Vulnerability in Windows A JPEG file comment is indicated by a 0xFFFE Value followed by two bytes specifying the length of the comment (max comment size is therefore 65535-2). A Minimum Length of Two is specified in this position. When a value of 0 or 1 is specified a signedness error occurs. The comment length is interpreted as 4GB(-1 or -2) and heap corruption results since all memory (on an IA32 system) is technically allocated. Ouch. posted by GeeWhiz
Tuesday, September 14, 2004
Microsoft Security Bulletin MS04-028 Buffer Overrun in JPEG Processing (GDI+) Allows for Arbitrary Remote Code Execution. All that this requires is that you get a remote user to load a JPG. This is Classified as "Critical".
I heard recently that two major WIndows flaws will be announced tomorrow. posted by GeeWhiz
Monday, September 13, 2004
Samba smbd ASN.1 Parsing DoS and nmbd DoS. Most ASN.1 Interpreters have severe exploitable flaws due to the complexity of the protocol. Any protocol that allows data to define it's own structure must be constructed (program specifications, error handling) and tested with misuse in mind (fuzzing). posted by GeeWhiz
Monday, September 13, 2004
For MS Networks, this software allows companies to incorporate the latest hardware into Active Directory to create a Multifactor Authentication environment.
Watch the Commercials! They're going to be the subject of a contest at ToorCon on September 23rd. The event is February 4th-6th at the Wardman Park Marriot in Washington, DC. Registration will open very soon and registering ASAP is highly advised.
Call for papers. Preliminary papers will be reviewed on Septembet 15th but the CFP is open until late fall. Somebody really should try. 757.org is already listed!
Topics for the “Break It!” track may include, but are not limited to, EXPLOITATION of:
· Consumer electronic devices
· Application, host, and network security
· Telephony
· Physical security
Topics for the “Build It!” track may include, but are not limited to, inventive software & hardware
SOLUTIONS in:
· Robotics
· Distributed computing
· Community wireless networking
· Mobile personal computing
Topics for the “BoF It!” track may include, but are not limited to, open DISCUSSION of the following:
· Privacy and anonymity
· Exploit and vulnerability disclosure / databases
· DRM (Digital Rights Management), fair use, copyright infringement
· Open source software world domination strategies
This month challenge purpose is to reverse engineer a malware specimen, called "RaDa", and its main goal is learning from the community the methods, tools and procedures used to do it. Submissions should be sent no later than Friday, 1 October, 2004. The three best answers will win an author-signed copy of the book, "Malware: Fighting Malicious Code" by Ed Skoudis. This months challenge image and questions are managed by Jorge Ortiz, David Perez, and Raul Siles, all from HP Spain. posted by GeeWhiz
Thursday, September 02, 2004
Multiple Vulnerabilities in Oracle Products Several vulnerabilities exist in the Oracle Database Server, Application Server, and Enterprise Manager software. Oracle's Collaboration Suite and E-Business Suite 11i contain the vulnerable software and are affected as well. posted by Brenda
Wednesday, September 01, 2004
The Secret Service is investigating the publication of personal information about GOP convention delegates on a Web site, prompting complaints from the American Civil Liberties Union that the government is infringing upon the free-speech rights of political dissidents.
Federal authorities have subpoenaed Calyx Internet Access seeking to learn the Internet address of the person who posted a spreadsheet on Aug. 18 containing the names of about 1,600 delegates, along with their home addresses, phone numbers and e-mail addresses and the hotels at which they are staying in New York City.
Millions of Americans who are already trying to fight off unwanted electronic mail from direct marketers are about to get deluged by another source: politicians and lobbying groups.
For the first time, a nationwide list of registered voters has been cross-referenced with multiple lists of e-mail addresses collected from magazine subscribers, catalogue shoppers, online poll participants and the like. The result is that legislators, candidates for office and interest groups can buy more than 25 million e-mail addresses of registered voters and contact them at will.
WinZip 9.0 SR-1 is a maintenance release of WinZip 9.0 containing important security-related fixes (including a privately reported buffer overflow) and improvements to WinZip. posted by Brenda
Wednesday, September 01, 2004
Hash Collision Q&A: Cryptography Research has received many inquiries about the hash collision attacks that were recently announced at the CRYPTO 2004 conference. This document attempts to address these questions. posted by GeeWhiz
Wednesday, September 01, 2004
Microsoft Corp. announced yesterday it will target broad availability of the Windows® client operating system code-named "Longhorn" in 2006, and make key elements of the Windows WinFXTM developer platform in "Longhorn" available for Windows XP and Windows ServerTM 2003.
"Longhorn" will deliver major improvements in user productivity, important new capabilities for software developers, and significant advancements in security, deployment and reliability.
M$ will deliver a Windows storage subsystem, code-named "WinFS," after the "Longhorn" release. The new storage system provides advanced data organization and management capabilities and will be in beta testing when the "Longhorn" client becomes available.
Yesterday’s announcements relate only to the "Longhorn" client operating system. Anticipated availability for the Windows "Longhorn" Server operating system continues to be 2007.
Oh goodie, another unfinished operating system rushed to market. I can't wait. posted by Brenda
Saturday, August 28, 2004
A specifically crafted Transmission Control Protocol (TCP) connection to a telnet or reverse telnet port of a Cisco device running Internetwork Operating System (IOS) may block further telnet, reverse telnet, Remote Shell (RSH), Secure Shell (SSH), and in some cases Hypertext Transport Protocol (HTTP) access to the Cisco device. Telnet, reverse telnet, RSH and SSH sessions established prior to exploitation are not affected. posted by Brenda
Friday, August 27, 2004
Astaro Linux is a Feature Rich Firewall Product Based on Linux. It now has support for FreeS/WAN VPN's and Snort in an IPS Configuration. It is free for personal use and starts at $400 for commercial applications. Link from Nick posted by GeeWhiz
Tuesday, August 24, 2004
The Computer History Simulation Project is a loose Internet-based collective of people interested in restoring historically significant computer hardware and software systems by simulation. The goal of the project is to create highly portable system simulators and to publish them as freeware on the Internet, with freely available copies of significant or representative software.
SIMH implements simulators for:
* Data General Nova, Eclipse
* Digital Equipment Corporation PDP-1, PDP-4, PDP-7, PDP-8, PDP-9, PDP-10, PDP-11, PDP-15, VAX
* GRI Corporation GRI-909
* IBM 1401, 1620, 1130, System 3
* Interdata (Perkin-Elmer) 16b and 32b systems
* Hewlett-Packard 2116, 2100, 21MX
* Honeywell H316/H516
* MITS Altair 8800, with both 8080 and Z80
* Royal-Mcbee LGP-30, LGP-21
* Scientific Data Systems SDS 940 posted by GeeWhiz
Saturday, August 21, 2004