2009-12-16
COFEE vs DECAF
Two developers have created "Detect and Eliminate Computer Assisted Forensics" (DECAF). The tool tries to stop Microsoft's Computer Online Forensic Evidence Extractor (COFEE), which helps law enforcement officials grab data from password protected or encrypted sources.
Orignal Source: arstechnica
2009-11-09
Which Antivirus To Use?
Here is one simple, to the point, straight forward report that I think answers this question bang on: Battle of the anti-virus
2009-10-06
Hotmail Compromised
ISC's Post
2009-09-25
Cracking Encryption Keys
But where does the buck stop? How much security is too much security, for something with absolutely no financial value - like for example a calculator’s Operating System?
Texas Instruments Signing Keys Broken
2009-09-22
2009-08-14
Using Twitter as a Botnet Command Channel
Just when you thought you knew everything there is to know about Twitter, here comes another surprise..!!
Brazilian ID thieves are using Twitter streams to send commands to their botnets. The bots are programmed to monitor RSS feeds from these Twitter accounts.
Sounds pretty innovative, right?
2009-08-11
Analyzing Tr.im's Sad Demise
So, this makes me wonder:
- What is going to happen in case more and more of these types of services go out of business? Ever wondered how that could adversely affect our "World Wide Web"? How frustrating it would be to not be able click and navigate to the useful links we find, in gazillions of blogs, whitepapers, news articles, etc. over the net?
- What if a spammer or a hacker buys the domain name after tr.im (or another similar service) ends its ownership? Instead of killing all the tr.im URLs on the internet, he may decide to point them to any malicious website of his choice!
2009-08-06
2009-07-24
The Economics of Botnets & 0-Day Market
All this and more answered by Yury Namestnikov in his blog.
Another very good paper to read, is by the famous Dr. Charlie Millar
The Legitimate Vulnerability Market: Inside the Secretive World of 0-day Exploit Sales
Update 03-Apr-2012:
Some current figures around how much a 0-day can be worth.
Update 01-Jun-2012:
Mr. Schneier finally speaks on this topic
Update 13-May-2013:
Very interesting, the US government is a big buyer of 0-day exploits!!
2009-07-21
Web App Security Portfolio
This article from Nick Coblentz will definitely be of help.
Biometrics: Identity & Authentication
Almost everywhere today, you would come across a two-factor authentication, where a user is required to enter a User ID and a Password to access a system.
However, now biometrics is gaining popularity pretty quickly, which combines both the Identity and Authentication into one. This definitely helps the user because now s/he does not need to memorize the username or the password, but is this really the best way forward?
Take a look at this article written by Steve Riley.
2009-07-10
How a Denial-of-Service Attack Works
http://www.cio-today.com/story.xhtml?story_id=67628
2009-03-13
PDF Vulnerability
Here is one of the most comprehensive articles I have come across. The author demos three methods to trigger the vulnerability:
- When the user just selects the infected pdf doc with a single click
- If the user changes his Windows Explorer's view to Thumbnails View
- If the victim hovers his mouse's cursor over the document
2009-03-03
Is Open Source More Secure?
Today I came across a blog from Jack Danahy, and he talks about this same topic is some serious depth. He also goes on to explain how companies use and misuse these misconceptions to make their own sales pitch.
Net conclusion: All software has some amount of vulnerability within them. Users should always remember to trust reputed software vendors and should always keep up with the latest security patches.
2009-02-07
Recover Windows Passwords
Ophcrack is a open source live CD, that you would need to download and burn, and then use it to boot up the PC, that requires its password reset/recovered.
Works with XP and Vista and can crack both LM, as well as NTLM passwords.
Retrieving Microsoft Product Keys
Magical Jelly Bean KeyFinder is a very handy tool to extract the Windows XP, Vista and MS Office product key from any PC. May come in useful to dig out a forgotten or lost key. Could also be misused to steal someone else's key, if you can manage to get access to a victim's machine.
2009-02-04
Defect vs Vulnerability
What do you think should be more critical to the business? Should we be spending more resources on managing Quality Defects or should we give Security Vulnerabilities a higher priority?
As Info Security professionals, we blindly tend to think that a vulnerability is more serious than a defect and hence must be tackled asap. However, HP has a very interesting article that talks about this philosophy, that just shattered my misconception..!!
2009-01-29
TwitterFox Easy To Hack
Unfortunately, TwitterFox is not too secure. Every time a user wishes to refresh his/her messages, the plugin sends the User ID and Password unencrypted to the server. The plugin only uses Basic Access Authentication Method, which as detailed below, is as good as communicating in plaintext.
Hence, if a hacker manages to capture the data-packet that is sent over by your browser to the Twitter's server, your credentials can easily be compromised. All the attacker needs to do is setup a sniffer on your network, which isn't too hard if you are on your office or college network, or do a simple MITM attack.
Now most of the users (like myself) use common passwords over multiple accounts. Hence, an attacker could even manage to gain access to much more than the user's Twitter account.
My advise - Stop using TwitterFox, at least till the time we have a more secure version of this plugin.
Here is the Proof of Concept for this vulnerability:
(1) At regular intervals (or when explicitly requested by the user), TwitterFox sends a request to the server for any new messages that this user may have received after the last sync
(2) This request contains the user's login credentials that are sent over using Basic Access Authentication Method. This protocol is NOT a security protocol and does not provide any security whatsoever. (For further reading check Wikipedia entry on Basic Access Authentication)
(3) There are a number of desktop and even web based tools available to convert this captured string, which is Base64 encoding, to plaintext. One of the web based tools is available here.
2009-01-24
Recommended Software: Regshot
Regshot is a light-weight, open-source utility that can take snapshots of the registry and compare it with another clean snapshot taken at an earlier stage, when the system was known to have been working properly.
This could come in handy while investigating issues that come up after the installation of a new software, or just to know what happens behind the scenes. From a security perspective, it is a handy tool to keep an eye on your registry and be forewarned in case a virus or a trojan messes up your machine.
Grab your free, portable copy at: http://sourceforge.net/projects/regshot/
2009-01-22
Is Someone Reading Your Emails?
Here is a very interesting article that tells you not only a way to know if somebody has been snooping over your emails, but can also capture the intruder's IP Address.
Are you Sure your Email isn’t being Hacked?
2009-01-15
Phishing Attacks Targeting Experienced Users
2009-01-14
TOP 25 Most Dangerous Programming Errors
Update: Now Gary McGraw has released an article, giving 11 reasons why these type of lists do not work in real life. Hmmm, I guess this is like the usual cat-and-mouse game..!!
2009-01-13
Top 10 Myths
The Top 10 Information Security Myths
Password Sniffing
Take a look at the IronGeek's video. For some background details, take a look at Wikipedia's entry on Arp Spoofing.
2009-01-09
Twitter Under Attack
Twitter accounts of a number of celebrities, including Britney Spears and Barack Obama, also got hacked. Earlier the rumors were that this hack was accomplished with the help of the fake (phished) website. However, later twitter officials confirmed that a hacker managed to get into one of their admin-tools and hence was able to get access to these accounts.
SSL Certificates - Who To Trust?
Untrusted Certificates
Well, Comodo isn't the only CA who is in trouble. The certificates issued with a MD5 hash may not be too reliable as well.
MD5 collision creates rogue Certificate Authority
Update 16-Aug-2013:
Microsoft finally takes a decision to block MD5 certs
Bypassing Anti-Virus Softwares
Bypassing Anti-Virus with Metasploit
Biometrics - A Dependable Authentication System?
Tigers use scent, birds use calls – biometrics are just animal instinct