Null / OWASP / SecurityXploded / Garage4hackers Meetup About me: Ashwin Patil	GCIH, RHCE, CCNA	2+ in Infosec
AnnouncementsMalcon 2011 : Call for Paper http://malcon.org/cfp/Venue: Mumbai ,  Nov -2011CFP for nullcon 2012 (Tritiya) is open!!!http://nullcon.net/cfp-nullcon/Venue : Goa, Feb -2012ClubHACK 2011 : CFP closes 2nd week of Octhttp://clubhack.com/2011/Venue: Pune, first weekend of December.
Security Conferences happenedBrucon 2011Slides (Some) posted : http://2011.brucon.org/index.php/ScheduleDerbycon 2011 Videos Posted : http://www.irongeek.com/i.php?page=videos/derbycon1/mainlistHITB SecConf 2011 Slides being Posted on Fly : http://conference.hitb.org/hitbsecconf2011kul/materials/
Arrest of Lulzsec MembersFBI arrested  lulzsec member Recursion : Cody Kretsinger,23
Accused of using SQL injection attacks against Sony.
Earlier in UK : 2 more arrests happened claimed to be Kayla and Topiarry.
Ringleader Sabu tweeted only 2 left.
Group chatlog revealed use of HideMyAss`s Proxy service to disguise his IP in SONY attack.
The site followed court order asking for information for above case.UK based Company explained –VPN services are not designed to commit illegal activity.
We only log time you connect and disconnect.
We comply with UK Law. If request for information came from overseas ,it should come from UK channels only-- arstechnica, hidemyass blogs
SSL Broken … Again2 Researchers :  Juliano Rizzo and Thai Duong at Ekoparty Security Conference.
Presented New Fast block-wise chosen plaintext attack against  AES algorithm in SSL/TLS.
TLS version 1.0– vulnerable . TLS v1.1 and 1.2  : not vulnerable   but major websites uses TLS v1.0 as later are unsupported in browsersOld vulnerability & ignored for years due to crypto people thought its unexploitable.
P.O.C. Application : BEAST : Browser Exploit Against SSL/TLS -- theregister, threatpost
How it works ? And Patches ? a.k.a Cryptographic Trojan Horse

News bytes Oct-2011

  • 1.
    Null / OWASP/ SecurityXploded / Garage4hackers Meetup About me: Ashwin Patil GCIH, RHCE, CCNA 2+ in Infosec
  • 2.
    AnnouncementsMalcon 2011 :Call for Paper http://malcon.org/cfp/Venue: Mumbai , Nov -2011CFP for nullcon 2012 (Tritiya) is open!!!http://nullcon.net/cfp-nullcon/Venue : Goa, Feb -2012ClubHACK 2011 : CFP closes 2nd week of Octhttp://clubhack.com/2011/Venue: Pune, first weekend of December.
  • 3.
    Security Conferences happenedBrucon2011Slides (Some) posted : http://2011.brucon.org/index.php/ScheduleDerbycon 2011 Videos Posted : http://www.irongeek.com/i.php?page=videos/derbycon1/mainlistHITB SecConf 2011 Slides being Posted on Fly : http://conference.hitb.org/hitbsecconf2011kul/materials/
  • 4.
    Arrest of LulzsecMembersFBI arrested lulzsec member Recursion : Cody Kretsinger,23
  • 5.
    Accused of usingSQL injection attacks against Sony.
  • 6.
    Earlier in UK: 2 more arrests happened claimed to be Kayla and Topiarry.
  • 7.
  • 8.
    Group chatlog revealeduse of HideMyAss`s Proxy service to disguise his IP in SONY attack.
  • 9.
    The site followedcourt order asking for information for above case.UK based Company explained –VPN services are not designed to commit illegal activity.
  • 10.
    We only logtime you connect and disconnect.
  • 11.
    We comply withUK Law. If request for information came from overseas ,it should come from UK channels only-- arstechnica, hidemyass blogs
  • 12.
    SSL Broken …Again2 Researchers : Juliano Rizzo and Thai Duong at Ekoparty Security Conference.
  • 13.
    Presented New Fastblock-wise chosen plaintext attack against AES algorithm in SSL/TLS.
  • 14.
    TLS version 1.0–vulnerable . TLS v1.1 and 1.2 : not vulnerable but major websites uses TLS v1.0 as later are unsupported in browsersOld vulnerability & ignored for years due to crypto people thought its unexploitable.
  • 15.
    P.O.C. Application :BEAST : Browser Exploit Against SSL/TLS -- theregister, threatpost
  • 16.
    How it works? And Patches ? a.k.a Cryptographic Trojan Horse
  • 17.
    Injects clientside BEAST code in victims browser. (iframe/JavaScript)
  • 18.
    Then workswith network sniffer to look for active TLS connections. Grabs and decrypt HTTPS authentication cookie.Workarounds are possible but real solution is switch to newer protocol.Workarounds by browser vendors:Chrome developer version 15.0 making attack more complex.
  • 19.
    Firefox considering todisable java but it will break many websites and functionalities
  • 20.
    Microsoft working onWindows Update to fix the issue. Advisory: 2588513-- technet , chrome, mozilla blogs
  • 21.
    Mysql.com compromised spreadingmalware to visitors Last Time (March-2011) it was SQL injection.
  • 22.
    Simply visiting websiteserves malware through JavaScript and redirects to malicious domains hosting Blackhole exploit kit.Discovered by first armorize
  • 23.
    TrendMicro foundin Russian underground forum hacker sourcec0de selling rootaccess of mysql.com clustersPrice starts from 3000$-- armorize, SANS ISC, TrendMicro
  • 24.
    The Good, theBad and the Ugly of MicrosoftThe Good Microsoft:Microsoft does it again , Takes down Kelihos Botnet.
  • 25.
    Estimated 41000 compromisedhosts, capable of sending 3.8 billion spam messages
  • 26.
    Previously Rustock botnettaken down.The Bad Microsoft:Microsoft Security Essential detected chrome.exe as piece of malware ( PWS: Win32)Microsoft released emergency update to the signature to fix the issue.
  • 27.
    Chrome also releasedupdate to fix the issue
  • 28.
    Microsoft isjoining anti-flash crowd.
  • 29.
    Metro version ofIE 10 in windows 8 will not accommodate plugins.-- arstechnica, threatpost , chrome, cnet blogs
  • 30.
    Continued …The UglyMicrosoftUEFI : Unified Extensible Firmware Interface
  • 31.
    New Type ofboot environment : replaces standard BIOS process. UEFI is a part of windows 8 securedBoot architecture.To ensure that pre-OS environment is secure
  • 32.
    System with UEFIenabled & Microsoft signing keys will only boot secure Windows OS. Major Concern: Dual booting non windows OS such as Linux
  • 33.
    installing new hardwarewith unsigned keys drivers-- msdn blogs, cnet ,
  • 34.
    Reverse Proxy bypassof ApacheApache webservers affected with this issue when running in reverse proxy mode.Could let attackers access DB, firewalls, routers and other internal network resources.
  • 35.
    Misconfiguration in rewriterule in Apache config file.RewriteRule ^(.*) http://internalserver:80$1 RewriteRule ^(.*) http://internalserver:80/$1 Apache issued patch to stop these type of attacks. CVE-2011-3368.patch
  • 36.
    IIS could alsobe vulnerable if it is importing apache mod_rewrite rules.-- contextis.com blog, seclists.org full disclosure
  • 37.
    German Federal Trojan:R2D2“Lawful interception” malware program to spy on citizens
  • 38.
    Reverse engineered andanalyzed by European Chaos Computer Club (CCC). Submitted to ccc anonymously
  • 39.
    Used by Germanpolice forces.
  • 40.
    Not only sendsdata but also offers remote control or backdoor functionalities to upload and execute arbitrary programsSony : Game is not overCISO informs breach of 93000 accounts (PSN and SOE)
  • 41.
    Attackers used largeamount of data obtained from compromised lists of other companies
  • 42.
    Claims credit cardinformation is not at risk-- ccc.de , PlayStation blogs
  • 43.
    XSS in Skypefor iOSXSS bug in iPhone and iPad version of Skype client
  • 44.
    Incorrect webkit settingsallows an attacker to directly access files on device including address books.More details:https://superevr.com/blog/2011/skype-xss-explained/Backdoor in HTC Android SmartphonesVulnerability in app called HtcLogger.apk found by androidpolice.com
  • 45.
    App collects allkinds of data and provides to anyone who asks by opening a local port
  • 46.
    Any app withINTERNET permission can access the information and can send data to remote server.
  • 47.
    Patch Promised byHTC ..will be firmware OTA update.
  • 48.
    Till then ifyou are rooted, remove HtcLogger.apk -- h-online, androidpolice, allthingsd.com
  • 49.
    News OverviewNewer andmore complicated android malware variants are expected to emerge.
  • 50.
    ANDROIDOS_ANSERVER.A : arrives as a eBook reader app and Uses encrypted blog posts as C & C.
  • 51.
    New Zeus Crimewaretoolkit comes with peer-to-peer design.
  • 52.
    Harderto takedown such botnets as No centralized C & C server which they can infiltrate or shut down.
  • 53.
    AmEx Debug Modeleft site wide open, providing access to vulnerable debug tools
  • 54.
    Security Issue wasnoticed by developer Niklas Fermerstand.
  • 55.
    Difficulties in findingsecurity contact when contacted via twitter.
  • 56.
    AmEx responded andshut down debug mode
  • 57.
    Facebook is partneringwith Websense to protect its members from malware and malicious web sites.
  • 58.
    When Facebook userclicks on a link, it will be checked against Websense database.
  • 59.
    if links ismalicious, user will be presented a choice to continue or not on his risk.--theregister, qnrq.se, TrendMicro, bbc. networkworld,fnno.com
  • 60.
    Security Tools Releasessshtrix-0.0.2.tar.gz:Very fast Multithreaded SSH Login cracker
  • 61.
    Malware Analyzer 3.5:MalwareAnalyzer is freeware tool to perform static and dynamic analysis on malwares
  • 62.
    ExeScan : PEFile Anomaly Detector Tool by SecurityXploded
  • 63.
    Another File IntegrityChecker 2.18: another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms
  • 64.
    WebCookiesSniffer: Packet sniffertool displays all cookies in a simple Table form.
  • 65.
    fbpwn: A cross-platformJava based Facebook social engineering framework
  • 66.
    Zscaler Like JackingPrevention:Plugin for browser to keep users safe from Facebook scams.
  • 67.
    PuttyHijackV1.0.rar: POC Toolto hijack putty sessions by injecting dll in process.
  • 68.
    Websecurify :Powerful, cross-platformweb security testing technology
  • 69.
    owasp-wte: OWASP WebTesting Environment.
  • 70.
    wpscan: Wordpress securityscannerSecurity Reading Microsoft Security Intelligence Report (SIR) Volume 11
  • 71.
    Best Practicesfor reporting Badware URLs
  • 72.
    Post Exploitation CommandLists for Win, Unix, OS X: Excellent Reference for post exploitations
  • 73.
    This Pythonhas Venom: Symantec blog covering python Trojan
  • 74.
  • 75.
    Busting Windows inBacktrack 5 : Armitage demo in Backtrack 5
  • 76.
    Evading Antimalware Enginesvia Assembly Ghostwriting
  • 77.
  • 78.
    Clubhack Magazine :Oct 2011Thank YouR.I.P. Steve jobs and Dennis RitchieComments ,Feedbacks, SuggestionsTwitter : @ashwinpatilLinkedIn : http://in.linkedin.com/in/ashwinrpSlideshare : ashwin_patilhttp://www.slideshare.net/ashwin_patilPhoto Credits: Wikipedia