- Inside global: The address of the inside host as seen from the outside
- Inside local: The address of the inside host as seen from the inside
- Outside local: The address of the outside host as seen from the inside
- Outside global: The address of the outside host as seen from the outside
Dec 30, 2010
Cisco NAT Address Types
MySEQ Web App
Screenshot of Chrome New Tab |
Dec 29, 2010
Dec 28, 2010
Google Hacking Database, GHDB, Google Dorks
At exploit-DB, it is called 'googledorks': inept or foolish people as revealed by Google. Here are the 2 sites that host the Google Dorks:
- Google Hacking Universe (Exploit-DB) - organized into categories and searchable.
- Google Dorks (by PenTestIT)
Dec 27, 2010
147-year-old Civil War Message Cracked
The piece of paper was rolled up, tied with string and sealed along with a bullet in a glass vial. |
The full text of the message reads:
'Gen'l Pemberton: You can expect no help from this side of the river. Let Gen'l Johnston know, if possible, when you can attack the same point on the enemy's lines. Inform me also and I will endeavor to make a diversion. I have sent some caps (explosive devices). I subjoin a despatch from General Johnston.'The code is called the 'Vigenere cipher,' a centuries-old encryption in which letters of the alphabet are shifted a set number of places so an 'a' would become a 'd' — essentially, creating words with different letter combinations.
Read more: http://www.dailymail.co.uk/news/article-1341666/CIA-codebreaker-reveals-147-year-old-Civil-War-message-Confederate-desperation.html#ixzz19H4zdu8Q
Dec 26, 2010
Exploit-DB Owned and Exposed
Dec 23, 2010
0day Exploit for WMI Administrative Tools
The vulnerabilities are caused due to the "AddContextRef()" and "ReleaseContext()" methods in the WMI Object Viewer Control (WBEM.SingleViewCtrl.1) using a value passed in the "lCtxHandle" parameter as an object pointer.
An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage. Successful exploits will allow the attacker to execute arbitrary code within the context of the application (typically Internet Explorer) that uses the ActiveX control.
The vulnerabilities are confirmed in version 1.1 (WBEMSingleView.ocx 1.50.1131.0).
Workaround:
Set the kill-bit for the affected ActiveX control.
PoC Exploit is available at:
- Original credit goes to "牛奶坦克" via WooYun.
- http://www.securityfocus.com/data/vulnerabilities/exploits/45546.txt
- http://www.exploit-db.com/exploits/15809/
Reference:
GnackTrack
Dec 22, 2010
Google Chrome is Ready for Enterprise now
- MSI Installer Package for Google Chrome.
Enterprises can start centrally roll out and update the browser using Group Policy using the standalone installer at a system-level across the organization.
- Group Policy for Google Chrome.
Google released ADM policy templates to allow admins to enforce the organization's requirements, such as default search provider, default homepage, manage security and privacy including the ability to disable auto-updates.
- Google’s Chrome Frame plug-in for Internet Explorer.
This allows enterprises to begin adopting Chrome even while continuing to use Internet Explorer. Moreover, Chrome Frame settings are also configurable through Group Policy.
Dec 20, 2010
Anti-Thief v3.0
Some extra reading for those interested on this technology:
- http://www.intel.com/en_US/Assets/PDF/general/br_IT_AntiTheft_vPro.pdf?wapkw=(vpro+antitheft)
- http://antitheft.intel.com/Libraries/Documents/Intel_R_Anti-Theft_Technology_-_Technology_Brief.sflb.ashx
- http://download.intel.com/technology/vpro/Whitepaper_AllNew2010IntelCorevProProcessors.pdf
Dec 18, 2010
Microsoft Security Essential 2.0
- Network Traffic Inspection integrates into the network system and monitors the traffic at a low level without slowing down your PC, so it can actually detect threats before they get to your PC.
- Internet Explorer Integration blocks malicious scripts before IE even starts running them—clearly a big security advantage.
- Heuristic Scanning Engine finds malware that hasn’t been previously detected by scanning for certain types of attacks. This provides even more protection than just through virus definitions.
These new features make MSE on par with other anti-malware applications, especially the heuristic scanning. Download it today at http://www.microsoft.com/security_essentials/default.aspx
Dec 17, 2010
Make Simple Things Difficult
If you prefer the simple way, go to Change Color for your BSOD and Manual BSOD to get your Red Screen of Death. :-)
Dec 16, 2010
Dec 15, 2010
Change Display Resolution settings with xrandr
First, to show the current setting and all the supported settings:
$ xrandrThis will display the allowed resolutions:
Screen 0: minimum 320 x 200, current 1024 x 768, maximum 4096 x 4096
VGA1 connected 800×600+0+0 (normal left inverted right x axis y axis) 267mm x 200mm
800×600 85.1* +
640×480 75.0 60.0
720×400 70.1
If you want to add a mode with resolution 1024X768, you can enter the following command:
$ cvt 1024 768
# 1024×768 59.92 Hz (CVT 0.79M3) hsync: 47.82 kHz; pclk: 63.50 MHz
Modeline “1024x768_60.00″ 63.50 1024 1072 1176 1328 768 771 775 798 -hsync +vsync
Now you need to create a modeline:
$ xrandr --newmode
Copy the modeline of the previous output to the place mode line:
$ xrandr --newmode “1024x768_60.00″ 63.50 1024 1072 1176 1328 768 771 775 798 -hsync +vsyncNow you need to add the above mode using the following command:
$ xrandr --addmode VGA1 1024x768_60.00here for VGA1 you have to use what ever that was there for $ xrandr output:
$ xrandr --output VGA1 --mode 1024x768_60.00Running these would change your resolution but this is temporary. Tthese steps were done to make sure that these commands work. Now we need to make these changes permanent.
Now you need to edit the default file:
$gksudo gedit /etc/gdm/Init/DefaultLook for the following lines:
PATH=/usr/bin:$PATH
OLD_IFS=$IFS
And add the the following lines below them:
xrandr --newmode “1024×768″ 70.00 1024 1072 1176 1328 768 771 775 798 -hsync +vsync
xrandr --addmode VGA1 1024x768_60.00
xrandr --output VGA1 --mode 1024×768
Save and exit the file.
Dec 14, 2010
Make PDF in Google Reader
At your Google Reader settings page, at the "Send To" tab, click "custom link".
- Name: Joliprint
- URL: http://api.joliprint.com/api/rest/url/print/s/googlereader?url=${url}
- Icon URL: http://api.joliprint.com/buttons/joliprint-icon.png
Or you may prefer to add a bookmarklet at here.
Note in Reader Bookmarklet
Steps:
- Goto Google Reader, Notes section (upper left corner).
- Drag the bookmarklet to your bookmark bar.
- Add the link to Google Chrome Search Engine (create shortcut).
- Browse to any interesting article, and highlight the sentence you like.
- Either click on the bookmarklet;
- Or type the shortcut at the address bar.
- You may tag what you store in the note too.
Advantages:
- You can easily search your bookmark items with Google Reader.
- The bookmark service cache the post even the website is down.
- Can keep items unread.
- Easily share them (as they are treated as feeds).
Dec 13, 2010
WebSockets disabled in Firefox 4
Due to a desgin vulnerability in WebSocket protocol, Mozilla Foundation has disabled it in the forthcoming Firefox 4 Beta 8 release. The vulnerability, in the code for transparent proxies, can potentially be exploited to poison the proxy cache and inject manipulated pages.
A group of researchers described the problem on the IETF mailing list in November. In their POC, it could allow attackers to inject a specially crafted JavaScript for Google Analytics into the proxy's cache that will be returned to clients and executed in their browsers after every subsequent request.
In conventional connections, a client prompts a server to send data via GET or POST. WebSockets allow permanent connections between clients and servers and enable servers to independently send data to a client.
Currently, WebSocket (ver. 76) is already supported by Chrome and Safari.
What is HTML5 WebSocket
WebSockets is a technique for two-way communication over one (TCP) socket, a type of PUSH technology. At the moment, it’s still being standardized by the W3C; however, the latest versions of Chrome and Safari have support for WebSockets.Websockets can replace long-polling. This is an interesting concept; the client sends a request to the server – now, rather than the server responding with data it may not have, it essentially keeps the connection open until the fresh, up-to-date data is ready to be sent – the client next receives this, and sends another request. This has its benefits: decreased latency being one of them, as a connection which has already been opened does not require a new connection to be established. However, long-polling isn’t really a piece of fancy technology: it’s also possible for a request to time-out, and thus a new connection will be needed anyway.
Many Ajax applications makes use of the above – this can often be attributed to poor resource utilization.
Wouldn’t it be great if the server could wake up one morning and send its data to clients who are willing to listen without some sort of pre established connection? Welcome to the world of PUSH technology!
Here's a short tutorial, that review the process of running a WebSocket server in PHP, and then building a client to send and receive messages to it over the WebSocket protocol.
Other reference:
Speed Up Firefox Page Loading Time
Here are the steps:
- Type about:config into the address bar
- Type browser.cache into the Filter field
- Set browser.cache.disk.enable to false (double click it)
- Set browser.cache.memory.enable to true (double click it)
- Right click > New > Integer; type browser.cache.memory.capacity; press OK
- Type in 100000 (this is equivalent to 100 megabytes); press OK
- Close all Firefox tabs and windows, and then restart the browser
Dec 11, 2010
Top 5 Security Threats in HTML5
HTML4 was introduced in 1997. Recently, with the introduction of new features, HTML5 also brings with it potential security vulnerabilities. This isn't to say that HTML5 is "flawed," but that there will be new attack vectors for hackers to exploit. Some originate from elements of the standard itself, some from implementations of the standard in each browser, and some from the care that developers do (or do not) take in building their HTML5 code.
- Below is the summary of the potential security threats in HTML5. You may read the full article at the original source at http://www.esecurityplanet.com/features/article.php/3916381/Top-5-Security-Threats-in-HTML5.htm (By Aaron Weiss on December 9, 2010)
1. Cross-Document Messaging
2. Local Storage
3. Attribute Abuse
4. Inline Multimedia and SVG
5. Input Validation
- https://developer.mozilla.org/en/DOM/window.postMessage
- http://diveintohtml5.org/offline.html
- http://code.google.com/p/html5security/wiki/WebSQLDatabaseSecurity
- http://code.google.com/p/chromium/issues/detail?id=21338
- https://developer.mozilla.org/en/HTML/HTML5/Forms_in_HTML5#Constraint_Validation
Dec 10, 2010
Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Just completed the GIAC Reverse Engineering Malware (GREM) exam today.
This popular course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security engineers, and IT administrators acquire the practical skills to examine malicious programs that target and infect Windows systems.
I took this self-study course in Aug 6, 2010. The course begins by establishing the foundation for analyzing malware in a way that dramatically expands upon the findings of automated analysis tools. I've learn how to set up a flexible laboratory to examine the inner workings of malicious software, and how to use the lab to uncover characteristics of real-world malware samples, and then edirect and intercept network traffic in the lab to explore the specimen's capabilities by interacting with the malicious program.
Syllabus:
- FOR610.1: Malware Analysis Fundamentals
- FOR610.2: Reversing Malicious Code
- FOR610.3: Malicious Web and Document Files
- FOR610.4: In-Depth Malware Analysis
- FOR610.5: Examining Self-Defending Malware
- FOR610.6: Malware Analysis Tournament
Link: Reverse Engineering Malware Training | Malware Tools & Techniques | SANS FOR610
Dec 9, 2010
Hacked by B0ogle
http://merdekareview.com/news/n/16062.html |
Dec 3, 2010
Howto disable the Avahi daemon
It's primary roles are:
- Assign an IP address automatically even without the presence of a DHCP server.
- Act as DNS (each machine is accessible by the name nameMachine.local).
- Publish services and facilitates access (the local network machines are warned of the opening and closing up a service, facilitating the sharing of files, printers, etc.. )
It is an implementation of Zeroconf protocol compatible with Apple services. Possible drawbacks of Avahi :
- It use some memory (about 248 kb).
- It opens 2 network ports (UDP 32768 and 5353).
- It has been reported in some cases to decrease network performance.
The name of daemon may be different but the method remain the same for Debian-based systems
sudo update-rc.d -f avahi-daemon removeTo recreate the used links
sudo update-rc.d avahi-daemon defaults