Thursday, December 10, 2009
Internet Explorer and Adobe Flash player update
The bug fixed in Internet Explorer was also a critical security issue, and should be addressed right away. This issue affects just about all versions of Internet Explorer. You can find more details about the issue on the Microsoft Security Bulletin page.
Humbly yours,
Sensei Metajunkie
Google Launches A Public DNS Service
You can get introductory information about their Public DNS here.
When you are ready to set your DNS server configuration to point to the Google Public DNS Servers, you will want to check out this page on Using Google Public DNS.
For those of us who are particularly interested in the security aspects of these google DNS servers, we will want to read the information posted about the Security Benefits.
You all will no doubt want to read about the Privacy Issues , and how Google is addressing them. In short they are promising to only keep personally identifiable information for no more than 48 hours.
May all your holiday DNS queries be fast and secure!
Sensei Metajunkie
Wednesday, November 25, 2009
Survey Says 2/3 of Websites Have a Serious Security Flaw
The number of known vulnerabilities increases with time. Every day we learn of new flaws in software. For the average business owner today, in this troubled economy, the flawed cyber-jutsu tactic is the old "head in the sand" trick. Unfortunately, unless you are sticking the attacker's head in the sand, this generally doesn't help.
Organizations without dedicated internal security teams must partner with Information Security Service Providers such as CyberCede Corporation. A company like CyberCede can assist a CIO or business owner in improving their situational awareness. Without knowing what is going on, you can't make informed decisions. Your chosen Information Security provider should employ individuals with well known and useful certifications such as the CISSP.
An Information Security professional should help you to know yourself and know the enemy. Many of the website vulnerabilities come from improper configuration. These issues can usually be remedied quickly. For organizations with large amounts of custom code, including web applications, and dynamic sites based upon database back-ends, the work can take longer; but, is even more important to accomplish.
How often should a vulnerability assessment be performed? Only you can decide; but, your Information Security Professional should help you assess the risks to your organization so you can make an informed decision.
Don't forget to breathe!
Sensei Metajunkie
Zero-Day exploit for Internet Explorer
If you are running MS Internet Explorer, you should keep an eye out for when they actually patch this zero-day vulnerability. In the mean time, practice safe cyber-jutsu.
This was originally posted to the Bugtraq mailing list last Friday. At the time, the exploit code was said to be "unreliable". It is getting more reliable, and the threat is growing.
The attack will probably come in the form of malicious websites being set up with the exploit code, as well as hacked websites being made use of as un-knowing agents of the malicious hackers. The style of attack is sometimes referred to as a "drive-by". If you visit the site with the vulnerable Internet Explorer browser, you will be compromised.
So, the safe cyber-jutsu move here would be to use an alternative browser, at least for the time being. Both Firefox and Safari are availble for the Windows platform. Knowing how to use more than one browser shouldn't stress your cyber-jutsu too much.
If you love Internet Explorer, it will still be there after Microsoft finds, implements, and rolls out a fix. It is said that the latest version of IE is not impacted by this. So, you could update to IE 8 as well. I still recommend having more than one brand of web-browser.
If you had two cars, and one of them had a recall for the breaks - you would drive the other car until the flawed one was fixed. This is really no different. Except the alternative browsers aren't going to cost you a dime.
Sensei Metajunkie
Tuesday, November 24, 2009
Shaolin Temple Hacks beg age-old question
I try to read the taosecurity blog, by Richard Bejtlich, when I can. For all of you fans of The Hitchhiker's Guide to the Galaxy, we could say he is a hoopy frood who really knows where his towel is.
In a recent post, Richard pointed out some information about recent hacker attacks against the Shaolin Temple in China. The temple was hacked "three times in a row", according to abbot Shi Yongxin.
This of course begs the age-old question. Which is better: Chinese Martial Arts, or Japanese Martial Arts.
So here is the answer:
It depends upon the practitioner.
That may sound like a cop-out answer, but I assure you it isn't. One must know their limitations and their strengths if one is to excel at anything in life. A short and stout person with short arms and legs, in most cases, should not be surprised if they have a hard time mastering a martial art that requires high jumping kicks through the air. Even if they learn it all, when it comes to a real combat scenario they will find that they are on the losing end against similarly trained enemies with long legs and arms. One should seek to maximize their strengths and minimize their short-comings. In the end, it is more about the practitioner than the art they choose to devote themselves to. Given any genuine system of martial arts, it is all the same at the top. They are all paths that could be called "the art of winning".
How can we apply this to our cyber-jutsu?
You must start by knowing yourself, or in the case of cyber-jutsu, knowing your information infrastructure. We have talked about this in other posts - it is the basis of all good cyber-jutsu and must be accomplished before you seek to "know the enemy".
If you are running a web server farm, and have decided that your cyber-fu or cyber-jutsu will center around your packet-filter firewall, you are making a mistake. Certainly you will want to limit the traffic through the border router or firewall; but, your attacker will certainly look for weaknesses in your web implementation.
In such a case, we might be better served by taking a more "zen-like" approach to control. The Zen Master says that you cannot control another's actions. So, you should not try to control them. Instead, just watch them. In this way, you are in control in a wider sense of the word. In your cyber-infrastructure, this translates to out-of-band IDS systems that are tuned by those who "know" your applications. It might also translate to having a robust and fast restoration process. Surely the tao of true event correlation that leads to specific knowledge rather than piles of useless data could become a part of such a cyber-jutsu strategy. How else can we better know our selves? Perhaps adding a visualization strategy to effectively and quickly communicate threats would go far in improving our cyber-jutsu.
As in hand-to-hand combat with one or more attackers, the key to success is being aware and "in the moment", and "riding the martial wind". Yes, you need techniques. But you can learn techniques anywhere. In the Bujinkan, Sensei Masaaki Hatsumi stresses learning the "feeling" of an attack. It should be no different for cyber-jutsu.
If you are struggling to decide which new "wiz-bang" security software or security appliance to purchase, I advise you to put your purchase request down. Hire another cyber-jutsu practitioner. Hire another Systems Administrator. Hire another Information Security Professional. Invest in the talent you already have in-house. Set up attack labs that mirror your environment, and learn the "feeling" of the attack. Most of you are not even reviewing your log files with any regularity.
The path to expert cyber-jutsu is different for each of us at times. But, in common, we have a long journey toward our goal.
"Step by step, we walk the thousand mile road."
- Miyamoto Musashi
The Book of Five Rings
You can check out Richard's post at: taosecurity
You can read the original news article at: PCWorld
-- Sensei Metajunkie
Tuesday, November 17, 2009
Password Security: White Belt Education
"We battled for hours with water-pistols. We painted the walls like two children."
- wbfhwwpwptwltc
- Wb4hwW-P.
- wB4hw/w-p.
- Wbfhw/w-p!
- wPtwl2c.
- Wb4hw/w-p. Wptwl2children.
- painted this is a dictionary word
- Painted this is still a dictionary word
- p41nt3d even though the last one doesn't look like it on the surface, there are dictionaries for cracking passwords that replace the common numbers for letters - don't use this type of obfuscation for a dictionary word-based password.
Friday, November 6, 2009
What is the CISSP security certification about?
- What is it?
- Is it useful?
- Was it hard to obtain?
- Once you get it, are you done?
- Access Control Systems and Methodology
- Application and Systems Development Security
- Business Continuity Planning and Disaster Recovery Planning
- Cryptography
- Law, Investigation, and Ethics
- Operations Security
- Physical Security
- Security Architecture and Models
- Security Management Practices
- Telecommunications and Networking Security
Monday, November 2, 2009
What is best in life? ... "Crush your enemies..."
Changing Passwords - Yes, you must
Thursday, October 29, 2009
Ubuntu 9.10 Released: Why do I care?
Tuesday, October 27, 2009
Security Warning: Facebook Fishing Attempt
All students of cyber-jutsu should be on guard against a recent fishing attack received by CyberCede Corporation.
The email looks official at first glance; but, we know Facebook would never send out such a message that was not at least first requested by the end user (you). The fishers are hoping that we open the attachment they have sent us, which is pretending to be a new password for us.
A closer examination of this email, in fact shows us that it is bogus. Here we are using Apple's Mail program. Within that application we can view the "long headers" as an option off of the "View" menu, by following the "Message" delta which opens a sub-menu. Users of other email programs should have some similar way to view more details regarding the transmission and receipt of the message.
We've blacked out some of the address particulars so as not to add to the amount of spam we are already processing, and I've circled the "Reply to" and "Return Path" fields in red. (see below)
We can see that the "Reply to" and "Return Path" fields are not consistent with the facade that this email is from Facebook.
We call this a "fishing attack", because the malicious agents are sending this email to potentially hundreds of thousands or more people in hopes that someone will "bite". Just like fishing, many fish may pass by the bait. All it takes is one big one on the hook to make the day pay off.
Exactly what the payload is, has not yet been determined. The payload is the file that they have sent. Since it is in "zip file" format, it could be a buffer overflow attack against a popular "unzip" program. Or the zipped file could be a less creative trojan horse or other malicious executable.
Regardless of what the payload is - we know this is not from Facebook. We all know to just delete the mail without replying to it or opening the attachment.
Stay safe,
Sensei Metajunkie
Thursday, October 22, 2009
Reports of Chinese Cyberspying against U.S. Corporations
Google AdSense Account Disabled
"Because we have a need to protect our proprietary detection system, we're unable to provide our publishers with any information about their account activity, including any web pages, users, or third-party services that may have been involved.
As you may know, Google treats invalid click activity very seriously, analyzing all clicks and impressions to determine whether they fit a pattern of use that may artificially drive up an advertiser's costs or a publisher's earnings. If we determine that an AdSense account may pose a risk to our AdWords advertisers, we may disable that account to protect our advertisers' interests.
Lastly, please note that as outlined in our Terms and Conditions, Google will use its sole discretion when determining instances of invalid click activity."
So, we really have no idea why our account was disabled. If any of our readers have been randomly or blindly clicking on advertisements, you have not helped us. In fact, you may have shut down what might have been a great source of passive income for our blogs.
We have petitioned google to reinstate our account. If that happens, I encourage you all to only click on advertisements which are of interest to you. Don't be afraid to click on advertisements, that is why they are there - but please refrain from just clicking because you know it is generating revenue for us.
I don't usually cross-post between these blogs - but I will put this message on all of the blogs.
Thank you for your understanding and cooperation.
Sensei Metajunkie
Wednesday, October 21, 2009
Metasploit acquired by Rapid7
Friday, October 16, 2009
Utility: Google Translate for International Communications
I am happy to say, we don't need to wait for Google Wave to be released to translate in-between various languages.
You can check out Google Translate at:
http://translate.google.com
Thursday, October 15, 2009
Green Belt Exercise: Install Metasploit
Metasploit is an amazingly powerful and free security tool that must be on the weapons rack of the penetration tester. For the casual cyber-jutsu practitioner, who is not seeking to engage in hard core hacking, contract penetration testing, or cyber-warfare, Metasploit is not a required tool. However, we'll be looking at this tool in detail. Green belts interested in becoming CyberCede Samurai should understand what Metasploit is, and learn to execute reconnaissance and attacks to deliver payloads from within the framework.
Wednesday, October 14, 2009
Black Belt Topic: New Technology - Google Wave
Tuesday, October 13, 2009
White Belt Exercise: Patching for Microsoft's Black Tuesday
A Healthy Body - A Healthy System
Monday, October 12, 2009
Welcome to the cyber-dojo
- Cybersecurity
- Information Security
- Cyber-Warfare
- Bot Nets
- Malware
- Strategies for victory in cyberspace
- Tactics for victory in cyberspace
- Offensive and Defensive Techniques for use in cyberspace
- Compliance with regulations such as HIPAA, HITECH, GLBA, and SOX
- Balance, Awareness, Reaction
- Intrusion Detection Systems
- Network Security Monitoring
- The way of the warrior