Room362.com

Blatherings of a security addict.

Chrome All Polished Up

| Comments

  Just like it’s LOVELY auto download feature, Google Chrome slipped in a new version. I was testing out some of the latest and greatest posts of exploits for .27 and they were failing to work. Checked my version and low and behold a new version number was displayed. I didn’t upgrade, all done automagically. (Evilgrade anyone?)

  I wonder what will pop on this new version.

LinkedIn Unavailable

| Comments

For some reason LinkedIn has become unavailable:

 

Earlier when going to LinkedIn, I was greeted by a wizard saying that they will performing upgrades tonight. I guess they didn’t go as wel as planned. As a security addict though, I always have that sinking feeling when a server is down. Especially one that has personal information about so many people.

Hope it’s nothing

Fear it’s bad

It’s nothing WINS! (We’re doing some front-end network maintenance, on the loadbalancer which hosts the Wizard page. We should be back soon.) — via commenter

Crazed Bovine Traversal in RL

| Comments

As you may have heard me rant and rave about a special USB stick that downloads contact, messaging, and other information from phones just by plugging them in on Episode 5 of Securabit or read about it via an earlier posting on my blog (Crazed Bovine Traversal). A company called Paraben Corporation went out and made it (Motorola and Samsung support only so far)

I first learned about it via CNet’s report “CSI Stick grabs data from cell phones” and you can find it directly on http://csistick.com/ for $199.00 plus you have to buy the accessory “DS Lite” just to read the data on it. (another 99.00). I think they should at least send me one for free for stealing my idea ;–)

Brass Tax on Chrome

| Comments

So there is already an exploit: http://blogs.zdnet.com/security/?p=1843

There are naysayers: http://www.tgdaily.com/content/view/39154/108/

And then there is the truth: http://www.stillsecureafteralltheseyears.com/ashimmy/2008/09/sucking-the-chr.html

I like the design of the tabs and address bar, but I can do that with a theme in firefox. I want my add-ons, even with the memory problems. Chrome is great for Mom and Pap, but for “Internet Power Users” it falls lightyears short on features. So where is the brass tax?

IMHO:

Firefox > (INSERT CHROME HERE) > Opera > Safari > IE7 > IE8 > IE6

In other news: Yousif Yalda has made it to the coveted “Stupid People” link category, where until now was solely held by Ashley Park.

And the hits just keep rolling in:

AUTOMATIC DOWNLOADS? What?! http://www.milw0rm.com/exploits/6355

Multi-Boot Security LiveCD DVD

| Comments

EDIT: I got to talk about this DVD on the latest episode of Securabit (Episode 9)

Edit 2: There is a cool new Live DVD by the guys at Sun Tzu Data. (Click here for post)

NERV-LABS subsidiary Badfoo.net has released quite the awesome DVD. Now, the lucky few of you who have suffered through my constant microsoft-bashing linux evangelism alright have heard about all the Multiboot LiveDVDs out there. Until now, they have all been booting various generic Linux distro. With the release of Badfoo’s LiveDVD, that has all changed:

 

MultiISO LiveDVD is an integrated Live DVD technology which combines some of the very popular Live CD ISOs already available on the internet. It can be used for security reconnaissance, vulnerability identification, penetration testing, system rescue, media center and multimedia, system recovery, etc. It’s a all-in-one multipurpose LiveDVD put together. There’s something in it for everyone. I hope you enjoy it.

OS Choices:

Backtrack 3

Damn Small Linux 4.2.5

GeeXBoX 1.1 (not geekbox :P )

Damn Vulnerable Linux (Strychnine) 1.4

Knoppix 5.1.1

MPentoo 2006.1

Ophcrack 1.2.2 (with 720 mb tables)

Puppy Linux 3.01

Byzantine OS i586-20040404

Now add the awesome power of UNetBootin (Boot ISO via USB) and now you have a USB stick that boots multiple security related Linux operating systems. What do you have on your keychain?

DEFCON 16: The Tools Not the Toools

| Comments

Originally posted to the Zero Day blog on Ziff Davis: http://blogs.zdnet.com/security/?p=1735

This article was also referenced in a Dark Reading blog post by John Sawyer: http://www.darkreading.com/blog.asp?blog_sectionid=447&doc_id=162049

All updates will reside here as I have no control over the article on Ziff Davis.

    DEFCON, the 9000+ attendee hacker conference in Vegas has become a sort of hydra conference. It has become more like a global fair than what most people think of conferences; even the badge is highly unique. I say this because there are so many things to do at DEFCON, other than going to talks, that you could spend your whole weekend looking at the “World’s Largest Boar!”, so to speak. One of the CTF (Capture the Flag) contest winners this year actually exclaimed that he only made it to 2 talks in 12 years! I am also one of those individuals who barely get a chance to go to talks and now that the speaker pool is so diverse it’s hard to find all of the “stuff” they release. Before anyone has a chance to post “It’s all on the DEFCON CD dummy” I want to challenge them to try. After a weekend of googling (which came back with few results) and making contact with some of the speakers, I provide you with a mostly accurate list of “stuff” that was released at DEFCON this year. If any of the information is inaccurate, or a tool is missing, please contact me and I will update this post.

The DEFCON CD can be found here: http://edge.i-hacked.com/defcon16-cd-iso-posted

Think you are good enough? The binaries from Capture the Flag have been posted here: http://nopsr.us/ctf2008/

 PE-Scambler by Nick Harbour

Packet-O-Matic by Guy Martin

  • Description: “A real time packet processor” – It extracts and can reinject packets. This includes VoIP calls in real time, Cable Modem (DOCSIS) traffic, and a whole host of others.

  • Homepage Link: http://www.packet-o-matic.org/

  • Email Address: gmsoft@tuxicoman.be

SA Exploiter by Securestate

Fast-Track by Securestate

Beholder – by Nelson Murilo and Luis Eduardo

The Middler – by Jay Beale

ClientIPS – by Jay Beale

Marathon Tool – by Daniel Kachakill

The Phantom Protocol – by Magnus Brading

ModScan – by Mark Bristow

Grendel Scan – by David Byrne

  • Description: Web Application scanner that searches for logic and design flaws as well as the standard flaw seen in the wild today (SQL Injection, XSS, CSRF)

  • Homepage Link: http://grendel-scan.com/

iKat – interactive Kiosk Attack Tool  (This site has an image as a banner that is definitely not safe for work! – You have been warned) by Paul Craig

DAVIX – by Jan P. Monsch and Raffael Marty

CollabREate – by Chris Eagle and Tim Vidas

VMware Pen-Testing Framework – by John Fitzpatrick

Dradis – by John Fitzpatrick

Squirtle – by Kurt Grutzmacher

WhiteSpace – by Kolisar

  • Description: A script that can hide other scripts such as CSRF and iframes in spaces and tabs

  • Download Link: DEFCON 16 CD

VoIPer – by nnp

  • Description: VoIP automated fuzzing tool with support for a large number of VoIP applications and protocols

  • Homepage Link: http://voiper.sourceforge.net/

Barrier – by Errata Security

Psyche – by Ponte Technologies

 

Other blogs that have linked this or my ZD Net post:

Where Do People Find the Time?

| Comments

I recently was Stumbling and happened across the following video. Now, when people use StumbleUpon they are usually bored and aren’t really contributing to the world as we know it. It strikes me as ironic that I found and watched a video like this, via StumbleUpon. I promise, it is well worth the fraction of a wikipedia project cycle you will utilize on it.

My favorite quote out of the whole deal: “Media that is made for you, but does not include you, is not worth sitting still for”

Original Link: http://www.clusterflock.org/2008/04/where-do-people-find-the-time.html

Part 1:

[youtube=http://www.youtube.com/watch?v=AyoNHIl-QLQ&w;=425&h;=344]

Part 2:

[youtube=http://www.youtube.com/watch?v=jNCblGv0zjU&w;=425&h;=344]

@MissRFTC Makes Twitter History

| Comments

 This may not be safe for work, but it’s your call as everyone in my office got quite the kick out of it. Definitely not security related, and loosely  tech related (twitter’s use from a mobile).  Proceed with caution.

ATT Partially Patched. Yay!

| Comments

So, according to my iPhone, the DNS servers that it uses is patched. (209.183.33.23 – schinetdns.mycingular.net) However, when I tried to send an image of the doxpara page through email it gave me an SSL error and asked me to accept the certificate…. Um, no thank you. So, for the time being I will not be checking my email for a while, or for that matter anything I need to authenticate with. Too much? probably, but just erring on the side of caution. I will post the screen caps when I don’t have SSL errors.

H.D. Moore actually contacted ATT about the issue. Check out his post to twitter for the response they gave him:H.D. Moore vs. ATT

“reads a response from AT&T: ”We will investigate your complaint and take appropriate action.“ DNS server is now offline…”

Now I wonder how many iPhones out there have already clicked “Continue”

 

EDIT: Here is a weird thing, as soon as I dropped to the “EDGE” network, the email sent with no errors. So here is the image: (Remember, this was taken while on 3G)