Difference between revisions of "Episode61"

From Security Weekly Wiki
Jump to navigationJump to search
Line 41: Line 41:
[http://www.youtube.com/watch?v=sexUus0igWs Youtube: "The Real Hustle" Shows us how Credit Card Cloning is Done] - [Joe]
[http://www.youtube.com/watch?v=sexUus0igWs Youtube: "The Real Hustle" Shows us how Credit Card Cloning is Done] - [Joe]
[http://dailytech.com/Lockheeds+F22+Raptor+Gets+Zapped+by+International+Date+Line/article6225.htm Lockheed's F-22 Raptor Gets Zapped by International Date Line] - [Joe] - The jet crosses the IDL and the onboard computers crash. xmoke!

Revision as of 21:42, 1 March 2007

Password Cracking With THC-Hydra

Password Cracking With THC-Hydra

Stories for Discussion

Chris Paget of IOActive doing an RFID Hacking Presentation at Blackhat - [Joe] - "Secure card maker HID Corp. is objecting to a demonstration of a hacking tool at this week's Black Hat Federal security conference in Washington, D.C. that could make it easy to clone a wide range of so-called "proximity" door access cards." - [Larry] Talk was canceled due to legal threats by HID. moar info

Reverse hacker wins $4.3M in suit against Sandia Labs - [Joe] - "Shawn Carpenter was awarded a $4.3 million award — more than twice the amount he sought and money he thinks he'll never see. Carpenter worked for Sandia National Labs as an intrusion detection analyst. He anayzed. He detected. He reported. He was fired — in Janurary 2005 after sharing his results with the FBI and the U.S. Army. Computerworld asked him what he hoped to achieve in that investigation. Answer: 'In late May of 2004, one of my investigations turned up a large cache of stolen sensitive documents hidden on a server in South Korea. In addition to U.S. military information, there were hundreds of pages of detailed schematics and project information marked 'Lockheed Martin Proprietary Information — Export Controlled' that were associated with the Mars Reconnaissance Orbiter. ... It was a case of putting the interests of the corporation over those of the country.' Ira Winkler, author of Spies Among Us , said the verdict was 'incredibly justified. Frankly, I think people [at Sandia] should go to jail' for ignoring some of the security issues that Carpenter was trying to highlight with his investigation."

IGiGle - [Larry] Irongeek's Wigle to Google earth conversion. Lets you view wigls data on google earth. The resulting maps are very detailed...

Old Mac WiFi hacks revealed! - [Larry] Remember all the hubbub about the Mac wireless driver vulnerabilities? Well, David Maynor demped them live, and cleared up the misconceptions.

Madwifi Kernel buffer overflow - [Larry] by crafting some specialized packets involving WPA/RSN, upon reciving the packet, the madwifi driver can cough up a connect back.

SELinux vs Solaris trusted Extensions - [Larry] A comparison article between SELinux and the Solaris Trusted Extensions. An excellent comparison, basically stating that the Solaris product is better - of course, the article was written by someone at Sun.

Oracle, Again? - [Larry] David Litchfield illustrated a new attack method for Oracle databases, that does not require the aboility to create procedures or functions - it only requires Create Session. this blows a lot of the donwnplay that Oracle has given about many attacks. not to mention, it affects all Oracle versions.

Drive by pharming - [Larry] I only wantd to give this one few minutes. User browsws to a site, whcih lats a java app. said java app connects to thier home router, with a default password and modified dns servers. User surfs to commerce or banking site, and is redirected to a phony site as determined by the compromised DNS setting. Paul, I know you have comments on this one. Something similar to the CoWF "evil bastard" firmware.

Solaris Telnet Worm - [Larry] Yep, it exists, as confirmed by arbor networks. Hopefully it only got a handfull of machines...right?

Firmware new place for rootkit? - [Larry] I think we called this one a while back. Also see the CoWF evil bastard firmware. So, how do you check for malware/ootkist on your embedded device?

Stop and Plop Data thefts - [Larry] looks like they modded the pin terninals. Don't forget about physical security!

5 Mistakes of Data Encryption - [Joe] -

1.) Not using encryption when it is easy and accepted
2.) Inventing your own cryptographic algorithm
3.) "Hard-coding" secrets
4.) Storing keys with data
5.) Not handling data recovery

Low-Resource Routing Attacks Against Anonymous Systems - [Joe] - Paper on how to statistically xmoke Tor using low resource machines which report having higher resources, allowing them to permeate a Tor network for privacy-crippling results (warning: math)

Stories of Interest

How-to: Encrypt web browsing with SSH proxy - [Joe] - so simple even a caveman can do it. @Paul & Larry: is a WRT54G a viable avenue for this?

Youtube: "The Real Hustle" Shows us how Credit Card Cloning is Done - [Joe]

Lockheed's F-22 Raptor Gets Zapped by International Date Line - [Joe] - The jet crosses the IDL and the onboard computers crash. xmoke!