Month: July 2007

Suggested Blog Reading – Tuesday/Wednesday July 24th/25th, 2007

ReadAck! I completely forgot to release a SBR yesterday!

Here’s the list:

Offensive Security Wireless Attacks – Backtrack WiFu – A new training offering presented by Offensive Security.

“Offensive Security Wireless Attacks”, also known as “BackTrack WiFu” is a course designed for penetration testers and security enthusiasts who need to learn to implement various active and passive Wireless (802.11 2.4 GHz) attacks. The course is based on the Wireless Attack suite – Aircrack-ng
The course was designed by Thomas d’Otreppe and Mati Aharoni in an attempt to organise and summarise today’s relevant WiFi attacks. This course will kick-start your WiFu abilities, and get you cracking WEP and WPA using the latest tools and attacks in no time!

Cisco & VMWare – The Revolution will be…Virtualized? – I like the idea but I wonder if this might be too far ahead of its time.

This is interesting for sure and if you look at the way in which the demand for flexibility of software combined with generally-available COTS compute stacks and specific network processing where required, the notion that Cisco might partner wThis is interesting for sure and if you look at the way in which the demand for flexibility of software combined with generally-available COTS compute stacks and specific network processing where required, the notion that Cisco might partner with VMWare or a similar vendor such as SWSoft looks compelling. Of course with functionality like KVM in the Linux kernel, there’s no reason they have to buy or ally…

Certainly there are already elements of virtualization within Cisco’s routing, switching and security infrastructure, but many might argue that it requires a refresh in order to meet the requirements of their customers. It seems that their CEO does.

Attribute-Based Cross-Site Scripting – Interesting topic to check out.

A couple of weeks ago I posted sections from one of our WhiteHat customer newsletters that focused HTTP Response Splitting. Newsletters are one way we keep customers informed of important industry trends and improvements to the Sentinel Service. Judging from the blog traffic and comments it was well received. So this time I’ll highlight Attribute-Based Cross-Site Scripting, which Arian Evans (WhiteHat’s Director of Operations) has been spending a lot of R&D time to get working properly. Enjoy.

Really Simple Reversing (RSR) – This is quite cool.

This is an example of Really Simple Reversing of a piece of malware. It’s written in the AutoIt scripting language and compiled to an EXE.

It’s not intentional, I’m sure about this, but this AutoIt tool offers some interesting features for (inexperienced) malware authors. You can compile your script to a stand-alone executable that is automatically packed with UPX. And even after unpacking it, the strings are still obfuscated.

Decompiling the script is really easy, because the AutoIt authors include a decompilation utility with the AutoIt installation package (Exe2Aut). You can find a video of the decompilation here hosted on YouTube, and you can find a hires version (XviD) here. The icon of the bin.exe file you see in the video is the default AutoIt icon.

BIND cache poisoning vulnerability details released – You should probably check this out if you have any BIND servers in your realm of responsibility.

Amit Klein wrote about a paper he just released with details about a BIND 9 cache poisoning issue. This is one of the problems addressed by the latest version of BIND 9.

The very brief summary: BIND prior to version 9.4.1-P1 did not use a strong algorithm to create DNS transaction IDs. As a result, one can derive the next transaction ID BIND will use by knowning the last few transaction IDs. In this case, up to 15 queries are used.

Once the attacker knows the “state” of the targets BIND install, it is possible to forge a response. DNS uses UDP by default. Each query sent by the DNS server includes a random transaction ID. The server responding to the query will include this transaction ID so the querying DNS server knows what query is answered by this particular response. BIND always uses the same source port for its queries.

Enterprise Visibility Architect – I like the concept but I”m not sure that an organization is going to create a new role that sits between the resources listed in the article and the CISO/CTO/CSO. Only time will tell.

I suggest that enterprises consider hiring or assigning a new role — Enterprise Visibility Architect. The role of the EVA is to identify visibility deficiencies in existing and future POAD and design solutions to instrument these resources.

How to Create a Security Team for $4.95, Plus Tax – Great article!

In addition to getting to break things in order to help our customers prevent assorted miscreants from doing so, one of the many hats I wear at QuietMove is the amorphous responsibility of ‘business development.’ In English, that means I identify organizations that could benefit from our services, sometimes travel to visit them, often buy them lunch, and explore ways we can help them. Though my background is technical, it’s something I’ve really grown to enjoy because I find it interesting to learn about different industries and business models and their unique security challenges.

That said, I’m often surprised by some of the organizations I visit – it’s shocking that some of the largest organizations in critical economic sectors don’t have security organizations, don’t have security programs, and don’t even have a single person for whom ‘security’ is part of their job description. In other cases, there’s a single ‘security’ person with no budget, staff, or authority. I’ve been that guy, so if that’s you, I feel your pain. I’d like to share an anecdote with you about a large company I visited last week who is in the former category – no security organization at all. If your organization has no security-focused staff, or if you’re the one guy or gal whose shoulders it all falls on, I’m also going to share a strategy for moving your organization in the right direction.

(IN)SECURE Magazine Issue 12 – The new issue of (IN)Secure Magazine is out.

Dr. Morena – Firewall Configuration Testing Tool – Another tool to add to your belt.

Dr.Morena is a tool to confirm the rule configuration of a Firewall.

The configuration of a Firewall is done by combining more than one rule. Sometimes a rule configuration may reside in a place other than the basic rule configuration place. In such a case, it is difficult to confirm whether it is an intended configuration by the system administrators. (Is an unnecessary hole open, or is a necessary hole open?).

We prepare a computer which has two network interface for this tool. Then, each network interface is connected to each of the network interfaces on both sides of the Firewall. The packet the source IP address and the destination IP address is forged and sent to the Firewall from one network interface. The packet which passed through the Firewall is confirmed in the other network interface. The rule of the Firewall is confirmed from the packets which passed through the Firewall, and the packets which didn’t pass.

Suggested Blog Reading – Monday July 23rd, 2007

ReadWhat a nice, relaxing weekend. Back to the grind!

Here’s the list:

Get your second degree in “ethical hacking” – Not sure how many people will give this love as the term “ethical hacking” still doesn’t impress a lot of people.

If you’re looking to groom a new CSO for your company or looking to boost your career into an executive position, there’s a new master’s degree that might work for you. Just don’t expect a football home team, warns Information Week, since all the curriculum is online.

The new program, launched by the EC-Council University, currently has 6 students and 9 faculty, and students are expected to study only half-time, while working in the security industry in some capacity.

Four Solaris Virtual Machines – Need a Solaris test-bed? Why not use these pre-configured VMWare images?

There are now four Solaris VMs available from Sun, including S10U3 and Solaris Express (aka Nevada) build 55. VMware tools are pre-installed (at least in the two I downloaded), but the VMs are still using IDE disks so they won’t work for ESX/VI users.

Newsmaker: DCT, MPack developer – Interview with the MPack guys.

In June 2006, three Russian programmers started testing a collection of PHP scripts and exploit code to automate the compromise of computers that visit malicious Web sites.
Click here for Core!!

“ The project is not so profitable compared to other activities on the Internet. It’s just a business. While it makes income, we will work on it, and while we are interested in it, it will live. ”

“DCT”, one of three developers of the MPack infection kit

A year later, the MPack kit has become an increasingly popular tool, allowing data thieves and bot masters to take control of victims’ systems and steal personal information. The MPack infection kit has been blamed for hundreds of thousands of compromised computers. And, it’s malicious software with a difference: The creators have offered a year of support to those clients from the Internet underground who purchase the software for anywhere from $700 to $1,000.

You just got 0wned. Now what? – What would you do? What is the right answer for your type of incident? 🙂

Imagine that you are arriving at your office and you look through the window. Inside the building you can see someone burglarizing the building. What would you do?

You have a few options, you could (1) call the police; (2) you could ignore the burglary and go get a cafe’ latte double mocha espresso and hope that the burglar leaves before anyone sees him; (3) or you could open the door to the office, and shout, “Hey! Get out!”, wait for the burglar to leave.

Oracle refutes ‘SSH hacking’ slur – I think it’s great that Oracle blamed a paper by Daniel Cid, who works for me at Q1 Labs, as the root cause of their public perception as a “top attacker”. Well Daniel, I guess any press is good press 😉

An investigation by Oracle has revealed the none of its systems were involved in launching a recent brute force attack on secure servers around the net.

From the beginning of May until earlier this week, “compromised computers” at Oracle UK were listed among the ten worst offenders on the net for launching attacks on servers which run SSH (secure shell) server software, according to statistics from servers running DenyHosts software to block SSH brute-force password attacks. DenyHosts is a script for Linux system administrators designed to help thwart SSH server attacks. Around 6,800 users contribute to the data it collects.

The greatest virus of all time – This is fantastic work!

There is a virus on the net from a long time, the damage inflicted by it is unstoppable, or at least that was though, check it out yourself

Insider Threat Example: Payroll Employee Threatens To Illegally Use Other Employees’ PII If Not Given a Good Review – Good case study.

On June 27, 2007, the St. Louis Metropolitan Sewer District (MSD) fired an employee who had worked in the payroll department there for 10 years.

Why? He downloaded Social Security numbers and other personally identifiable information (PII) about 1,600 current and former MSD employees to his own personal computer, and then some of his coworkers reported to their management that he had threatened on June 20 to maliciously use the PII if his manager gave him a bad performance appraisal.

MSD contacted the FBI and the St. Louis police department right after learning of the threat, they obtained the now-ex-employee’s computer from his home and “said they are very confident that the document had not been copied or sent to another source.” The name of the ex-employee has not been released pending investigation.

piggy – Download MS-SQL Password Brute Forcing Tool – Another tool for you to play with.

Piggy is yet another tool for performing online password guessing against Microsoft SQL servers.

It supports scanning multiple servers using a dictionary file or a file with predefined accounts (username and password combinations).

CyberSpeak interview – Check out Didier’s interview.

My interview on the CyberSpeak podcast about my UserAssist tool is up. I discovered I speak English with a French accent 😉 But I’m not French, I’m Flemish!

To a new kind of sleuth, phones leave a rich trail – Good article with some solid examples of how law enforcement leverages the forensic process for cell phones.

Because of the wealth of information they hold, cell phones are now part of almost every large forensic examination or criminal or civil case. Even so, Hanson estimated that Minnesota has less than a dozen full-time computer and cell phone forensic experts.

Law enforcement officials and forensics experts said cell phones are simply the latest in a long line of new technologies to which they have adapted, from land-line phones to camcorders to pagers to computers.

But they also agree that the cell phone’s ubiquity is unrivaled.

New Trend in Attacking the Java Runtime Environment? – I thought you just let it run long enough and it would eat up so much memory that it’s bloated corpse would block any malware 🙂

Attacks targeting vulnerabilities in the Java Runtime Environment are anything but new. Several researchers have previously visited this topic and the results have been some fantastic research. However, in recent weeks the DeepSight Threat Analyst Team has been investigating several Java issues resulting from a notable increase in vulnerabilities reported affecting the Java Runtime Environment and its associated components.

The threat landscape has seen a dramatic increase in attacks targeting client-side vulnerabilities in recent years. Vulnerabilities have been exposed in a variety of applications including media players, Web browsers, ActiveX controls and mail clients, to name just a few. The ubiquitous nature of the Java Runtime Environment makes it a prime candidate for attackers. With this in mind, it is not surprising to see much of the preliminary research into exploitation of environments like the Java Virtual Machine manifest itself both in recently disclosed vulnerabilities and the consequent exploitation of these issues “in the wild.” This research has likely been (or will be) exacerbated by the fact that portions of Java are now open-source.

OSVDB Search Tips & Tricks – Good article on how to efficiently search the OSVDB database.

I should have started a series of these posts long ago. One of the more frustrating parts of most VDBs is the lack of a helpful search function. Searching for some products (SharePoint) is easy enough, as the name is distinct and not likely to find many matches. If you happen to know the script affected (logout.php), that too can make the search fast and painless. However, what if you want to list all vulnerabilities in PHP?

New hacking technique exploits common programming error – This is where code reviews come in handy as well as knowledge of security concepts.

Researchers at Watchfire Inc. say they have discovered a reliable method for exploiting a common programming error, which until now had been considered simply a quality problem and not a security vulnerability.

Jonathan Afek and Adi Sharabani of Watchfire stumbled upon the method for remotely exploiting dangling pointers by chance while they were running the company’s AppScan software against a Web server. The server crashed in the middle of the scan and after some investigation, the pair found that a dangling pointer had been the culprit. This wasn’t a surprising result, given that these coding errors are well-known for causing crashes at odd times. But after some further experimentation, Afek and Sharabani found that they could cause the crash intentionally by sending a specially crafted URL to the server and began looking for a way to run their own code on the target machine.

Dual Database Breach Exposes 5,500 UM Records – Today’s eye bleeder.

The University of Michigan is alerting current and former students about the exposure of personal information after an unknown individual(s) gained access to two School of Education databases. These databases contained the names, addresses, and some Social Security numbers of 5,500 individuals. At this point there is no evidence that the individual(s) that gained access were after personal information, but the university’s public safety department is investigating the incident. The breach was first discovered on July 3 and the university began sending out notifications on July 16. According to Kelly Cunningham, a university spokesperson, the notifications were sent out as a precaution.

Fox News, Directory Indexing, and FTP Passwords – Wow. I wonder how long it will take Bill O’Reilly to blame terrorists…or illegal aliens…or the Democrats?

A 19 year old photography student (Gordon Lowrey) found that the Fox News website had Directory Indexing enabled (now disabled). Sure it’s not a good practice (against PCI-DSS), but typically not a big deal security wise and it happens occasionally on other major websites. What made this one interesting in the person navigated up the directory tree their way to the /admin/ folder, no password required, where inside was a curious bash shell script thats still available.

ISP Seen Breaking Internet Protocol to Fight Zombie Computers — Updated – Can’t say that I agree with this approach.

Internet service provider Cox Communications is reportedly diverting attempts to reach certain online chat channels and redirecting them to a server that attempts to remove spyware from the computer. By doing so the company seems to be attempting to cleanse computers of malware that hijacks the computers resources to send spam and participate in online service attacks as part of a large network of compromised computers known as a botnet.

Specifically, Cox’s DNS server is responding to a domain name request for an Internet Relay Chat server. Instead of responding with the correct IP address for the server, Cox sends the IP address of its own IRC server (70.168.70.4). That server then sends commands to the computer that attempt to remove malware.

Suggested Blog Reading – Thursday/Friday July 19th/20th, 2007

ReadI was so swamped at work yesterday that by the time I got home I was exhausted. Needless to say I didn’t get a chance to post a Suggested Blog Reading (SBR) post so I’ll combine them today. Enjoy your weekends!

Here’s the list:

Secure browsing with Squid and SSH – Not anything new but a good refresher for those looking to browser securely and for those looking to detect such activities 😉

Public areas that offer access to the Internet (airports, open wireless networks etc.) have no security in place. If you’re at a public WiFi spot, your personal information can be sniffed by other malicious users. This hack will show you a way to secure your web browser when using public networks.

In a nutshell, we’re going to setup a proxy server (Squid) on a trusted SSH server and create a secure connection from our laptop, over a public network to a secure remote server. We’ll tell the browser to use the secure SSH tunnel as a HTTP proxy.

Musings on 100% Log Collection – I’ve always agreed with Anton on collecting as much log data as you can in order to get a full view of what is happening. You wouldn’t pay a security guard to close his eyes and take 20 minute naps during his shift would you?

One of the most exciting, complicated and at the same time very common questions from the field of log management is the “what logs to collect?” question (this, BTW, implies that logs not collected will be left to rot wherever they were generated and thus might or might not be available at the time of dire need. You are collecting logs, aren’t you?). This comes up during compliance-driven log management projects (in the form of “what to collect for PCI DSS compliance?”) as well as operationally-driven (in the form of “what logs from this application do I need to detect faults and errors?”) or security-driven log management projects (in the form of “which logs will help me during the incident response?”)

FTester – Firewall Tester and IDS Testing tool – Another tool to check out.

The Firewall Tester (FTester) is a tool designed for testing firewalls filtering policies and Intrusion Detection System (IDS) capabilities.

The tool consists of two perl scripts, a packet injector (ftest) and the listening sniffer (ftestd). The first script injects custom packets, defined in ftest.conf, with a signature in the data part while the sniffer listens for such marked packets. The scripts both write a log file which is in the same form for both scripts. A diff of the two produced files (ftest.log and ftestd.log) shows the packets that were unable to reach the sniffer due to filtering rules if these two scripts are ran on hosts placed on two different sides of a firewall. Stateful inspection firewalls are handled with the ‘connection spoofing’ option. A script called freport is also available for automatically parse the log files.

Web Page Exposes Purdue Student Information – Here’s an “eye bleeder” for you.

Purdue University is apologizing to students after it discovered a web page containing student information was available on the Internet. This page, containing the names and Social Security numbers of 50 students, was discovered during a routine review of the Purdue web space. The individuals affected by this incident involve those students enrolled in the university’s industrial engineering 500-level course between spring 2002 and fall 2004. Purdue has already mailed out letters to those affected students, but has setup a hotline – 866-605-0013 – and a web site – www.purdue.edu/news/coe0706.html – to help answer any questions students have about the incident.

Nearly Ten Percent of Companies Have Fired Bloggers, Survey Claims – Uh oh!

Nearly ten percent of companies have fired an employee for violating corporate blogging or message board policies, and 19 percent have disciplined an employee for the same infractions, according to a new survey from Proofpoint, a messaging security company.

Almost a third of companies “employ staff to read or otherwise analyze outbound email,” while more than fifteen percent have hired people whose primary function is to spy on outgoing corporate email. A quarter have fired an employee for violating corporate email policies. Twenty percent of the companies and almost thirty percent of companies with more than 20,000 employees had been ordered by a court or a regulator to turn over employee emails.

Learn to use Metasploit – Tutorials, Docs & Videos – Good link to check out.

Metasploit is a great tool, but it’s not the easiest to use and some people get completely lost when trying to get the most out of it.

To help you guys out here is a bunch of links, videos, tutorials and documents to get you up to speed.

You can start with this, a good flash tutorial that shows you step by step how to use it

Nessus 3.2 BETA — Example ‘nessuscmd’ usage – I may have to give this a shot this weekend. I haven’t had a chance to test the beta yet.

The BETA of Nessus 3.2 includes support for a new command line method to invoke quick Nessus scans. This blog entry details some interesting examples for port scanning, operating system identification, testing of a certain bug and testing Windows and UNIX credentials using the nessuscmd tool.

Scroll to top