Monday, June 22, 2009

Around The Horn vol.1,125

Apache HTTP DoS tool mitigation, (Sun, Jun 21st)

If you've been following our diaries or any other IT Security related news, you probably know about ...(more)...

Situational Awareness: Spam Crisis and China, (Sat, Jun 20th)

Gary Warner, Director of Research at the UAB Computer Forensics, posted a very interesting analysis ...(more)...

G'day from Sansfire2009, (Sat, Jun 20th)

Well SANSFIRE 2009 is drawing to a close. As you may know SANSFIRE is the SANS conference host ...(more)...

Webmedia Explorer Cross Site Scripting Vulnerability

phpMyAdmin Code Injection

Pantha transLucid Cross Site Scripting and HTML Injection Vulnerabilities

Kaspersky PDF Evasion All Products

libpurple MSN Protocol SLP Message Heap Overflow Vulnerability

User interaction is not required to exploit this vulnerability.
Related Searches
on Ask.com

Overflow Vulnerability

Ikarus Multiple Generic Evasions Using CAB ZIP or RAR Files


Related Searches
on Ask.com

RAR Files

The Centrality of Red Teaming

By Richard Bejtlich

In my last post I described how a Red Team can improve defense. I wanted to expand on the idea briefly.
First, I believe the modern enterprise is too complex for any individual or group to thoroughly understand how it can be compromised. There are so many links in the chain that even knowing they exist, let alone how they connect, can be impossible.
To flip that on its end, in a complementary way, the modern enterprise is too complex for any individual or group to thoroughly understand how its defenses can fail. The fact that vendors exist to reduce firewall rule sets down to something intelligible by mere mortals is a testament to the apocalyptic fail exhibited by digital defenses.
Furthermore, it is highly likely that hardly anyone cares about attack models until they have been demonstrated. We seen this repeatedly with respect to software vulnerabilities. It can be difficult for someone to take a flaw seriously until a proof of concept is shown to exploit a victim. L0pht's motto "Making the theoretical practical since 1992" is a perfect summarization of this phenomenon.
So why mention Red Teams? They are central to digital defense because Red Teams transform theoretical intrusion scenarios into reality in a controlled and responsible manner. It is much more realistic to use your incident detection and response teams to know what adversaries are actually doing. However, if you want to be more proactive, you should deploy your Red Team to find and connect those links in the chain that result in a digital disaster.



Richard Bejtlich is teaching new classes in Las Vegas in 2009. Regular Las Vegas registration ends 1 July.

Copyright 2003-2009 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)

Offense and Defense Inform Each Other

By Richard Bejtlich

If you've listened to anyone talking about the Top 20 list called the Consensus Audit Guidelines recently, you've probably heard the phrase "offense informing defense." In other words, talk to your Red Team / penetration testers to learn how they can compromise your enterprise in order to better defend yourself from real adversaries.
I think this is a great idea, but there isn't anything revolutionary about it. It's really just one step above the previous pervasive mindset for digital security, namely identifying vulnerabilities. In fact, this neatly maps into my Digital Situational Awareness ranking. However, if you spend most of your time writing policy and legal documents, and not really having to deal with intrusions, this idea probably looks like a bolt of lightning!
And speaking of the Consensus Audit Guidelines: hey CAG! It's the year 2000 and the SANS Top 20 List wants to talk to you!
The SANS/FBI Top Twenty list is valuable because the majority of successful attacks on computer systems via the Internet can be traced to exploitation of security flaws on this list...
In the past, system administrators reported that they had not corrected many of these flaws because they simply did not know which vulnerabilities were most dangerous, and they were too busy to correct them all...
The Top Twenty list is designed to help alleviate that problem by combining the knowledge of dozens of leading security experts from the most security-conscious federal agencies, the leading security software vendors and consulting firms, the top university-based security programs, and CERT/CC and the SANS Institute.

Expect at some point to hear Beltway Bandits talking about how we need to move beyond talking to the Red Team and how we need to see who is actively exploiting us. Guess what -- that's where the detection and response team lives. Perhaps at some point these "thought leaders" will figure out the best way to defend the enterprise is through counterintelligence operations, like the police use against organized crime?
For now, I wanted to depict that while it is indeed important for offense to inform defense, the opposite is just as critical. After all, how is the Red Team supposed to simulate the adversary if it doesn't know how the adversary operates? A good Red Team can exploit a target using methods known to the Red Team. A great Red Team can exploit a target using methods known to the adversary. Therefore, I created an image describing how offense and defense inform each other. This assumes a sufficiently mature, resourced, and capable set of security teams.

This post may sound sarcastic but I'm not really bitter about the situation. If we keep making progress like this, in 3-5 years the mindset of the information security community will have evolved to where it needed to be ten years ago. I'll keep my eye on the Beltway Bandits to let you know how things proceed.



Richard Bejtlich is teaching new classes in Las Vegas in 2009. Regular Las Vegas registration ends 1 July.

Copyright 2003-2009 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)

Response to the Möbius Defense

By Richard Bejtlich

One of you asked me to comment on Pete Herzog's "Möbius Defense". I like Lego blocks, but I don't find the presentation to be especially compelling.

  1. Pete seems to believe that NSA developed "defense in depth" (DiD) as a strategy to defend DoD networks after some sort of catastrophic compromise in the 1970s. DiD as a strategy has existed for thousands of years. DiD was applied to military information well before computers existed, and to the computers of the time before the 1970s as well.
  2. Pete says DiD is
    "all about delaying rather than preventing the advance of an attacker... buying time and causing additional casualties by yielding space... DiD relies on an attacker to lose momentum over time or spread out and thin its massive numbers as it needs to traverse a large area... All the while, various units are positioned to harm the attacker and either cause enough losses in resources to force a retreat or capture individual soldiers as a means of thinning their numbers."
    That's certainly one way to look at DiD, but it certainly isn't the only way. Unfortunately, Pete stands up this straw man only to knock it down later.
  3. Pete next says
    "Multiple lines of defense are situated to prevent various threats from penetrating by defeating one line of defense. 'Successive layers of defense will cause an adversary who penetrates or breaks down one barrier to promptly encounter another Defense-In-Depth barrier, and then another, until the attack ends.'"
    It would be nice to know who he is quoting, but I determined it is some NSA document because I found other people quoting it. I don't necessarily agree with this statement, because plenty of attacks succeed. This means I agree with Pete's criticism here.
  4. So what's the deal with Möbius? Pete says:
    "The modern network looks like a Moebius strip. Interactions with the outside happen at the desktop, the server, the laptop, the disks, the applications, and somewhere out there in the CLOUD. So where is the depth? There is none. A modern network throws all its fight out at once."
    I believe the first section is party correct. The modern enterprise does have many interactions that occur outside of the attack model (if any) imagined by the defenders. The second section is wrong. Although there may be little to no depth in some sections (say my Blackberry) there is plenty of depth elsewhere (at the desktop, if properly defended). The third section is partly correct in the sense that any defense that happens generally occurs at Internet speed, at least as far as exploitation goes. Later phases (detection and response) do not happen all at once. That means time is a huge component of enterprise defense; comprehensive defense doesn't happen all at once.
  5. Pete then cites "Guerrilla Warfare and Special Forces Operations" as a new defensive alternative to DiD, but then really doesn't say anything you haven't heard before. He mentions counterintelligence but that isn't new either.

I've talked about DiD in posts like Mesh vs Chain, Lessons from the Military, and Data Leakage Protection Thoughts.
I think it is good for people to consider different approaches to digital security, but I don't find this approach to be all that clever.

Richard Bejtlich is teaching new classes in Las Vegas in 2009. Regular Las Vegas registration ends 1 July.

Copyright 2003-2009 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)

Could Opera Unite Be a Botmaster's Best Friend? (PC World)

In technology

PC World - Opera has added a lot of cool new features to its upcoming Opera 10 browser, and one of them is almost sure to catch the eye of cyber criminals.

Fraudsters Try to Scam Security Expert on EBay

Security expert Bruce Schneier tried to twice sell a used laptop on eBay and each sale was aborted over fraud concerns.

Tech Managers Often Underestimate Impact of Data Loss

Only 7percent of respondents to a survey on data management believed data loss has a "high" impact on a business.

Microsoft's Free Anti-Malware Debuts Next Week

Microsoft Security Essentials, formerly "Morro," is scheduled for release next Tuesday for Windows systems.

Women More Security Savvy, Vendor Finds

PC Tools finds men are more often aware of security risks, but few of either gender take the precautions advised.

Twitter Spam Spreads Worm

The malicious zip file contains malware that infects Windows systems but is easily thwarted by antivirus programs.

Could Opera Unite Be a Botmaster's Best Friend?

Security researchers worry that Opera's new Unite server feature will be misused by criminals.

Identity Thieves Target Medical Records

Whether stolen data is held for ransom or traded on online black markets, medical identity theft is a growing threat.

Google News Alert for: "cyber security" | cybersecurity | information security | computer security

 

Smart Grid Security Frenzy: Cyber War Games, Worms and Spies, Oh My!
Reuters - USA
According to executives at computer security firm IOActive: Studies show that overall project costs are 60 times higher when gaps in information security ...
See all stories on this topic

 

Designated immigration agents authorized to participate in drug ...
Los Angeles Times - CA,USA
By Josh Meyer Reporting from Washington -- In an effort to plug a hole in US-Mexico drug enforcement, the US departments of Justice and Homeland Security ...
See all stories on this topic

 

Somali security minister killed in explosion
The Associated Press
Information Minister Farhan Ali Mohamud announced the death of National Security Minister Omar Hashi Aden but declined to give any other details. ...
See all stories on this topic

 

Cybersecurity To Push For Standard For Info Security Products
Bernama - Kuala Lumpur,Malaysia
KUALA LUMPUR, June 19 (Bernama) -- CyberSecurity Malaysia, the country's vanguard of cyber security, is pushing for the Common Criteria for information ...
See all stories on this topic

 

EU Progressing on Information Infrastructure Policy
PC World - USA
The European Union is refining a set of guidelines that would strengthen its ability to respond to computer security crises as well as ensure Internet ...
See all stories on this topic

 

China Disables Some Google Functions
New York Times - United States
But on Friday, J. Alex Halderman, a computer science professor at the University of Michigan, said that a patched version of Green Dam had a security ...
See all stories on this topic

 

Will PCI Ever Make the Grade?
TechNewsWorld - Sherman Oaks,CA,USA
Even the companies that had the payment industry's top rating for computer security, a seal of approval known as "PCI compliance," have fallen victim to ...
See all stories on this topic

 

Apple: iphone OS 3.0 plugs 46 security bugs
CNET News - San Francisco,CA,USA
by David Martin Apple has issued an advisory regarding security enhancements included in the iphone OS 3.0 release Wednesday. Here is a synopsis of the 46 ...
See all stories on this topic

Google Blogs Alert for: "cyber security" | cybersecurity | information security | computer security

 

Smart Grid Security Frenzy: Cyber War Games, Worms and Spies, Oh My!
By Katie Fehrenbacher
(NERC) said it has made progress on some “milestones” (more like incremental steps) for smart grid security. NERC says its Board of Trustees has approved the first revisions of its eight cyber security standards, and is working on a second ... According to executives at computer security firm IOActive: Studies show that overall project costs are 60 times higher when gaps in information security controls are addressed late in the development cycle, as opposed to projects ...
Earth2Tech - http://earth2tech.com/

 

Sonos 130 Music System: Review
By home security
It is beautiful, loud and completely wireless! Is this bundle from Sonos the ultimate system for streaming music throughout the home? Megawhat investigates.
Home Security Systems | Home... - http://www.homesecuritysystemstips.com/

 

Social Security Reform - Government Improvement Series
By MoneyNing
Without factual information, how can we plan for retirement? And if we have to assume we won't get any Social Security benefits in our planning, what's the point of having that extra check? Forget the bailouts. Work on Social Security. ...
Personal Finance Blog by Money Ning - http://moneyning.com/

 

Norway's government caught spying on itself | IceNews - Daily News
By A. Rienstra
The Security Service's role is to monitor all data security within the Defence Forces, as well as the information that comes out of the Prime Minister's office to ensure that no sensitive information gets into the wrong hands. ...
IceNews - Daily News - http://www.icenews.is/

 

Microsoft Security Essentials Premiering June 23rd ~ Revelations ...
By the oracle
Noted in ComputerWorld today, the beta of Microsoft Security Essentials will be made available on June 23. The details are being fleshed out now that the wraps are off the project. Security Essentials will completely replace the ... calls “ Dynamic Signature Service,” a back-and-forth communications link between a Security Essentials-equipped PC and Microsoft's servers. Mary-Jo Foley, long time Microsoft watcher on ZDNet, has some more information to add to the story - ...
Revelations From An Unwashed Brain - http://www.lockergnome.com/theoracle/

Google News Alert for: "cyber security" | cybersecurity | information security | computer security

 

Public, Private Experts Create Security Guidelines (Opinion)
Government Technology - Folsom,CA,USA
Hey, CIOs and chief information security officers (CISOs). Are you looking for an edge to give you more confidence in your cyber-security program? ...
See all stories on this topic

 

The next big thing is cybersecurity but what does it mean for us?
Examiner.com - USA
When President Obama said, “And finally, we will begin a national campaign to promote cyber security awareness and digital literacy from our boardrooms to ...
See all stories on this topic

 

A Plan to Secure the Federal Cyberspace
Computerworld - Framingham,MA,USA
Silverstone also lists his vision for the first (of 23) tasks that he sees as essential for information security in the United States. ...
See all stories on this topic

 

US-Indian security ties boosted after Mumbai: official
AFP
The US official, when asked to elaborate on the statement, said State Department's diplomatic security has given India training courses in the past and ...
See all stories on this topic

 

Typing In an E-Mail Address, and Giving Up Your Friends' as Well
New York Times - United States
This wasn't along the lines of someone stealing my bank account information or Social Security number, but I was annoyed and embarrassed. ...
See all stories on this topic

Google Blogs Alert for: "cyber security" | cybersecurity | information security | computer security

 

All Our Might » Blog Archive » PPI panel on cyber security
By Jim Arkedis
PPI panel on cyber security. June 19th, 2009 by Jim Arkedis. Y'all are invited - next Thursday, 930AM in the Members Room of the Library of Congress. I just went to check out the room, and it's ridiculously cool. ...
All Our Might - http://www.allourmight.com/

 

Computing Research Policy Blog: HOUSE S&T COMMITTEE DISCUSSES ...
By NathanGandomi
In response to the review, Dr. Fonash described the role of the DHS in updating national security strategy, strengthening international partnerships, educating the public, and working with the U.S. Computer Emergency Response Team (CERT) to ... Smith, while acknowledging the need for public and private partnership in cyber security, asked Dr. Fonash how the private sector can be compelled to follow standards. Fonash responded by stressing the importance of information ...
Computing Research Policy Blog - http://www.cra.org/govaffairs/blog/

 

Free Download Trend Micro Internet Security 3 Months Licence ...
By GenniCe
Essential protection for your home PCs. Trend Micro Internet Security safeguards your computer and personal information against latest threats: Detects and removes viruses, spyware, and other malicious threats from your computer, email, ...
Gnoted.com - http://gnoted.com/

 

Microsoft Security Essentials (MSE or Morro) Rapidshare and Direct ...
By Bapun
Download Microsoft Security Essentials or Morro Antivirus aka Microsoft Antivirus 2009 using rapidshare links and direct download links. Download MSE, Download Morro.
Solid Blogger - http://www.solidblogger.com/

 

Spyware: Protect Your Privacy | Nathan's Plain Tech Talk
By Nathan Hull
Advertising Spyware logs information about the user, possibly including passwords, email addresses, web browsing history, online buying habits, the computer's hardware and software configuration, the name, age, sex, etc of the user. ... But worse, consider the security and privacy issues that are highlighted by this type monitoring. How secure are your passwords that you use locally or online? Is this information being sent back to a server along with other personal or ...
Nathan's Plain Tech Talk - http://plaintechtalk.com/blog/

No comments:

Post a Comment

My Blog List