Thursday, November 25, 2010

BackTrack 4 R2 available

I am a few days behind...but BackTrack 4 R2 is available.

Changes:
  • Kernel 2.6.35.8 – *Much* improved mac80211 stack.
  • USB 3.0 support.
  • New wireless cards supported.
  • All wireless Injection patches applied, maximum support for wireless attacks.
  • Even *faster* desktop environment.
  • Revamped Fluxbox environment for the KDE challenged.
  • Metasploit rebuilt from scratch, MySQL db_drivers working out of the box.
  • Updated old packages, added new ones, and removed obsolete ones.
  • New BackTrack Wiki with better documentation and support.
  • Our most professional, tested and streamlined release ever.
http://www.backtrack-linux.org/backtrack/backtrack-4-r2-download/

Monday, November 15, 2010

Phish using TechNet as the lure?

Nope....it is just a really Phishtastic looking e-mail....

Wednesday, November 3, 2010

Firesheep author Guilty/Evil? (Skills-Gap dependence)

I've talked to a few security people and regular IT folks about the FireSheep tool, and I've also read a few discussions about it. Some have called him irresponsible, some guilty, etc...

In a narrow minded, but broad categorization we could call Wireshark, TCPdump, or [insert sniffing tool here] authors into "guilty" parties. These tools can do the same thing. To keep the conversation...uh...focused we won't mention tools like Metasploit or even NMap.

I know this makes it more "accessible" to the common wanna-be attacker, but when are we going to stop using the "skills" gap argument? Do other physical security professionals rely on "skills" gap to protect them, or do they address the issues?

I dunno, innocent or guilty, a light has been pointed into a dark corner and now people are taking notice. If a constant drone of security professionals encouraging the companies to fix the issue isn't enough, then the attention from this will (or should).

Monday, October 25, 2010

Metasploit BETA

Since the "gag order" has been lifted since the official launch of Metasploit Pro, I thought I might share some screen shots and some quick thoughts about Metasploit Pro (Beta).  It is a web interface that

The install/setup of Metasploit Pro (Beta) is really self explanatory.  Just some quick initial configurations settings to get started.


That's it, that's all there is to it. Of course if you want to leverage NeXpose vulnerability scanning, further configuration will be needed.

To start off, you have to create a Project where you will define the subnet(s) and Metasploit users you want to access the project/results.



Once you've got the Project created, you can create separate tasks underneath that Project. Below is a "Host and Service Discovery" task.





Then once you run the task you can view the task status. Below is the "Host and Service Discovery" task running that we created above.


Once that scan is complete you can view the Hosts that were discovered:


Metasploit Pro also has a "Campaign" capability allowing you to setup and manage a Social Engineering/Phishing Campaign to allow you to attack the human factor. Definitely useful!!




So as you can see, the Metasploit Pro product is aesthetically pleasing, intuitive, and will no undoubtedly compete with the the other competitors in the penetration testing software category.  Couple it with the NeXpose vulnerability scanner, it is a complete vulnerability, exploiting, and social engineering package.  The reporting was pretty decent as well for providing the information to your company or clients.



Thursday, September 30, 2010

In a Computer Worm, a Possible Biblical Clue

Interesting look at the Stuxnet worm that has been in the headlines. Beyond some of the technical indicators, they believe another biblical clue is in the code for the worm....

In a Computer Worm, a Possible Biblical Clue (CNBC)
http://www.cnbc.com/id/39435594/

Saturday, May 15, 2010

Modern cars vulnerable to malicious hacks - tech - 14 May 2010 - New Scientist

This is related to a previous post about how cars will be a new hack hobby. They say you have to be physically present...think a Netbook and with a wireless carrier card tucked under the seat.

Modern cars vulnerable to malicious hacks - tech - 14 May 2010 - New Scientist

Wednesday, May 12, 2010

Adobe Shockwave Player Multiple Memory Vulnerabilities

You didn't think that Acrobat and Flash would keep all the attention did you?


Adobe Shockwave Player 11.5.6.606 (DIR) Multiple Memory Vulnerabilities

Tuesday, May 11, 2010

May 2010 Microsoft Patches

It's that time of the month again...no not that one.  It's Microsoft Patch Tuesday.  Get patching kids!!

Microsoft Security Bulletin Summary for May 2010

Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution (978542) Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote Code Execution (978213)

Microsoft Exploitability Index for May 2010 Bulletin Release


Saturday, May 8, 2010

Security firm reveals Microsoft's 'silent' patches

Nice Microsoft, nice.  This would be been disastrous if it broke things.

Security firm reveals Microsoft's 'silent' patches

Friday, May 7, 2010

India bans Chinese telecommunications equipment - SiliconValley.com

 Hmmm....interesting.  How much of our electronic world is run on chips/equipment from China?

India bans Chinese telecommunications equipment - SiliconValley.com

Monday, March 8, 2010

Hmm...interesting....this is probably the next big story in Hacking...

Ford Motor Rolls Out New Security Features To Prevent Car-Hacking

Wednesday, March 3, 2010

Infosec Pros Get Raises Despite Recession

Infosec Pros Get Raises Despite Recession - CIO.com

Posted using ShareThis

Details of “Einstein” Cyber Shield Disclosed by White House

I wonder if folks will be just as outraged over the Obama Cyber spy plan as they were for Bush's Cyber spy plan......
Details of “Einstein” Cyber Shield Disclosed by White House

Monday, March 1, 2010

HelpNet Security Q&A: Malware analysis

Q&A: Malware analysis

Good Q&A article from the founder of HBGary - Greg Hoglund

"Traditional signature-based, anti-virus techniques are not well suited for combating the ever-exploding list of daily new malware variants. The A/V industry needs to abandon signatures and move towards behavioral- and capability-based detection"

Amen...

Saturday, January 16, 2010

Network flaw causes scary web error

Stupid title, but scary none-the-less......  Wonder how many people this happened to with G-Mail or perhaps bank accounts?

AP Exclusive: Network flaw causes scary Web error

Thursday, January 14, 2010

Microsoft Internet Exploder 0-day Advisory

Here is the advisory for the Internet Exploder 0-day that was supposedly an vector of attack in the Google/Adobe/etc.. hack.

Microsoft Advisory 979352 - Remote Code Execution

Google Hacked

So there is a lot going on....

As of last week, Google is threatening to pull out of China after they determined the Chinese Government was behind hacks on them. This isn't a light move considering China is a huge market and accusing a nations government isn't done unless you are serious.

Original Google Blog post:
http://googleblog.blogspot.com/2010/01/new-approach-to-china.html


Some links on the Google hack:

Google Attack Part of Widespread Spying Effort

Hack of Google, Adobe Conducted Through Zero-Day IE Flaw

Google's internal spy system was Chinese hacker target

 Google on the defensive, vulnerable; China risks international and U.S. response