security

Go read Microsoft Security Advisory 954462 now

by File in: security

If you are responsible for the web server or web application security, go read Microsoft Security Advisory 954462, Rise in SQL Injection Attacks Exploiting Unverified User Data Input immediately.  It contains important information on detecting and mitigating SQL injection vulnerabilities. This advisory is not specific to only Microsoft products like the IIS web server and […]

BackTrack 3 is now available

by File in: security

The BackTrack 3 live distribution is now available for download. You can download the Live CD image, USB version, or VMware image. BackTrack is the most Top rated linux live distribution focused on penetration testing. With no installation whatsoever, the analysis platform is started directly from the CD-Rom and is fully accessible within minutes. Currently […]

Internet Explorer 7 Extended Verification Certificates and the Phishing Filter

by File in: security

IE7’s Phishing filter, which is supposed to be a layer of defense against Internet bad guys, drives me crazy.  The performance impact is noticeable, since every DNS request made by the browser has to be redirected to Microsoft to be checked against a database of known malicious sites.  I typically disable the Phishing filter the […]

Recommendations for securing Internet Explorer, Firefox and Safari web browsers

by File in: security

Cert has a document that show some specific steps you can take to secure your Internet web browser.  Detailed instructions, including screen shots are provided, along with explanations of what you are configuring and what the potential ramifications are. The document focuses on IE, Firefox, and Safari and includes supplemental reference links to additional content.  They […]

Resources for Securing Mac OS X Panther, Tiger and Leopard

by File in: security

I will  be the first to admit that I am primarily a Windows and Linux user.  Not that I don’t like Macs, but the majority of my client base is single platform on the desktop (Windows) and either Windows or Linux servers.  My lack of exposure to Macs, and subsequent lack of OS X-specific security […]

Gone in 47.11 Seconds

by File in: security

I was performing a little security audit today, and used PWdump to dump the contents of the SAM file from a Windows 2000 Domain Controller. I took the results from PWdump and imported them into LMcrack.  It took 47.11 seconds to enumerate 617 of the 2272 account passwords. Next I ran Richard Mueller’s DocumentGroups.vbs script which dumped the group […]

Windows Server 2008 Firewall Ports

by File in: security, Windows

Mark Empson has published a nice list of firewall ports used by Windows Server 2008. Possible Rule name Description Port Path Active Directory Domain Controller – LDAP (TCP-In) Inbound rule for the Active Directory Domain Controller service to allow remote LDAP traffic. (TCP 389) 389 %systemroot%\System32\lsass.exe Active Directory Domain Controller – LDAP (UDP-In) Inbound rule […]

VMware Running on Windows Host Security Hole

by File in: security, Windows

If you are running VMware on a Windows host configured with host-to-guest shared folders, it is possible for a program running in the guest to gain access to the host’s complete file system and create or modify executable files in sensitive locations. A vulnerability exists in VMware’s shared folders mechanism that grants users of a […]

Out of the Box, the ASUS Eee PC is Incredibly Insecure

by File in: security

HDM pointed out on the Metasploit blog that the guys from RISE Security rooted an ASUS Eee PC quite easily. They used Metasploit to exploit a Samba vulnerability that was published in July 2007 – almost seven months ago. Why is ASUS shipping new products with vulnerabilities that are serious enough to allow attackers to […]

Indictment of two System Administrators

by File in: security

I found this via the Plausible Deniability Toolkit – A 2006 US District Court indictment of two system administrators for what the prosecutors labeled obstruction of justice for destroying electronic evidence. Starting on page 4, labeled “The Conspiracy”, is summarized as: THE CONSPIRACY From in or about November 2003 through in or about October 2005, […]