tssci security

(IN)SECURE 1.9 Released

A new release of the (IN)Secure magazine is out. Version 1.9 - December 2006 [pdf]. Some highlights from this month's issue:

This free online magazine has some great articles, I'm looking forward to reading it!

Leaking Secrets to China

China's at it again, this time having obtained information on secret technology used on the B-2 stealth bomber's engines. The data will now allow China to copy or counter weapons using the technology.

Details of the classified defense technology related to the B-2's engine exhaust system and its ability to avoid detection by infrared sensors were sold to Chinese officials by former defense contractor Noshir S. Gowadia, an Indian-born citizen charged with spying in a federal indictment released by prosecutors in Hawaii.

The stealth technology isn't the only thing Noshir gave the Chinese, having assisted in developing a missile exhaust system that is hard to detect by radar and helped modify a cruise missile to intercept U.S. air-to-air missiles. In 2002 and 2004, Noshir sent emails containing SECRET and TOP SECRET data to Israel, Germany and Switzerland. It is suspected he's given classified information to as many as eight foreign nations, and has been paid as much as $2 million.

Capturing I's before O's

You're on the go, at the airport, at a coffee shop, whatever. You need to check your email or login to your bank account to make sure you have sufficient funds(I'd recommend against it, but people do it anyways). You sit down at a public internet terminal or internet café and proceed to go about your business. Well, you have no idea now what is running on that computer; you trust the administrator keeps it free of viruses and any spyware that could be lurking underneath. What you don't know, is someone could have installed a software or hardware keylogger to record all your keystrokes and use it to find your passwords and see where you've gone.

Well, couple boys from Microsoft Research came up with an interesting study, you can download here [pdf]. To sum it up, they suggest switching focus between applications and text fields and inputting "random" characters so the keylogger cannot easily see what's the password. A good keylogger will record the following at a minimum:

  1. Keystrokes
  2. Mouse clicks
  3. Active browser window

Let's assume your password is snoopy2, as in the paper. Employing the methods suggested, a keylogger would record the following:

(lclick)s(lclick)quioe(lclick)n(lclick).,jmz(lclick)o (lclick)queis(lclick)o(lclick)lkjd(lclick)p(lclick)hguhjcxf (lclick)y(lclick)mc,m(lclick)2(lclick)(enter)

You can easily derive what the password is here by looking at the character typed inbetween (lclick)'s. So, to make it nearly impossible for the keylogger to see what password you typed, just randomly left click and right click between typing "random characters" and actual password characters. To the keylogger, it could then look like this:

(lclick)s(lclick)qui(rclick)o(lclick)e(lclick)(lclick)n (lclick).,(lclick)jmz(lclick)o(lclick)que(lclick)is(lclick)o (lclick)lk(lclick)jd(lclick)p(lclick)hguh(rclick)jc(lclick)xf (lclick)y(lclick)mc,m(lclick)2(lclick)(enter)

I'd still recommend against logging into public terminals to check financial information or important email, as there's other things to worry about as well.

The Good and Bad of Outsourcing IT Services

If investing into an IT services company is something you are interested in, Morningstar published their Picks Among U.S. IT Service Providers. Great for the personal investor looking to make a couple bucks in their trading account, but if you're a business-decision-maker-type-of-person at any company, just hold it right there. Whatever you do, do not sell off your IT infrastructure to an outsourcing firm! You will never get those resources back when you finally realize you would have been better off without them. Add to the series, the outsource firm's processes and office politics on top of your own company's policies and processes. Then try and tell me how tough it is to get something done...

If your company has outsourced IT services, let me know how it's been going so far. In addition, include the firm and where they are located if you'd like.

Exploit kit dissected

Alex Rice of Websense Security Labs, dissected "Web-Attacker", one of the most popular exploit kits on the web. He recently got a hold of the source code and takes us step by step through it all. For those who do not know how Web-Attacker works, here's a brief scenario:

  1. User visits a compromised webpage containing a hidden iframe that loads go.php.
  2. go.php redirects to ie0609.cgi?homepage, which redirects to demo.php.
  3. Obfuscated JavaScript from demo.php determines which exploit should be attempted and redirects to ie0609.cgi?type=<EXPLOIT_TYPE>.
  4. Based on the value of the type parameter, ie0609.cgi returns the requested exploit. Each exploit differs but attempts the same action: execute the data downloaded from ie0609.cgi?exploit=<EXPLOIT_TYPE>.
  5. With the exploit parameter, ie0609.cgi returns the malicious binary to be executed. The attack is complete.

Be sure to check out the blog post and see how this simple, yet nasty little Perl script works.

« Newer entries — 55 — Older entries »

blog comments powered by Disqus