Friday, February 12, 2010

Directory Traversal Fun

I came across a few interesting posts today on this topic today and I thought I would share. The first one I landed on was an interesting read about a poorly secured malicious server from Russ McRee at HolisticInfoSec.com.

http://holisticinfosec.blogspot.com/2010/02/directory-traversal-as-reconnaisance.html

Next, I ended up on the OWASP page on testing for these kinds of vulnerabilities:

http://www.owasp.org/index.php/Testing_for_Path_Traversal

Then finally, a nice NMAP script for the VMware directory traversal vulnerability (CVE-2009-3733) recently discussed at Shmoocon:

http://www.skullsecurity.org/blog/?p=436

good times.

Friday, February 5, 2010

TrueCrypt Ubuntu 9.10

http://www.truecrypt.org/downloads

get deb package

untar file

sudo sh ./truecrypt-6.3a-setup-ubuntu-x64

Tuesday, December 29, 2009

two calls to comcast

one of our accounts got shut off. I called comcast business support to make a payment.

800-391-3000

1st prompt: new or existing crusty

2nd prompt: Zip Code

3rd prompt: tech support, billing....

4th prompt: account details menu

so comcast takes your phone number and zip code, then authenticates you into an account.

In this particular case it happed to not be my account. I before I realized what was happening, I heard info on last payment date/amount, total balance due. hung up.

call #2

existing crust
zip
tech support --> Human

name, address, phone number

three accounts pop (account from 1st call was not one of them).

tech support explanation was that phone number links accounts across all comcast boards (biz/residential).

busted.

Sunday, December 27, 2009

new gmail privacy feature

Hey, this is important: We don't have a password recovery email address or phone number for your account. If you lose access, we may not be able to help you.

Wednesday, December 23, 2009

ubuntu security

this is not a guide.

1. automated sniffing: Snort

2. View Log Files:

sudo gedit /var/log/XXX

3. manual sniffing: TCPDump & WireShark

sudo tcpdump -vvi eth1

installing wireShark ubuntu:

sudo apt-get install wireshark

4.

vulnerability scanner:Nessus

http://ubuntuforums.org/showthread.php?t=27674

sudo apt-get install nessusd nessus nessus-plugins

sudo /etc/init.d/nessusd restart

register nessus.

use this path if you used apt-get:

sudo /bin/nessus-fetch XXXXXXX

sudo update-nessus-plugins

not sure of your path?

dpkg -L nessus

scan result break down




checks for rootKits.

http://www.chkrootkit.org/

./chkrootkit -x | more

examine suspicious strings in the
binary programs that may indicate a trojan



RooTkit Hunter:

sudo apt-get install rkhunter

sudo rkhunter --propupd

then:

sudo rkhunter --check


5. AV

http://www.itsecurity.com/features/ubuntu-secure-install-resource/

Antivirus

  • Clam AntiVirus - One of the most popular UNIX based antivirus solutions. Works well with email gateways.
  • AVG Anti-Virus - Free version of a popular commercial virus scanner.
  • BitDefender - On demand command line/shell script scanner.
  • Panda Antivirus - Uses sophisticated software to remove viruses from workstations connected to a Linux server.
6. fine tune the os

turn off bonjour -->

sudo /etc/init.d/avahi-daemon stop

sudo nano /etc/default/avahi-daemon

AVAHI_DAEMON_START=0

sudo /etc/init.d/cups stop


http://www.zolved.com/synapse/view_content/27995/Top_Ten_basic_things_to_know_about_securing_Ubuntu
1. http://ubuntuforums.org/showthread.php?t=7353

Tuesday, December 22, 2009

youtube's Privacy Options

I noticed today that there is flag for "privacy mode" in the "customize" options menu for embedding a youTube video. According to google this feature is designed to give user's more control:

We've been working to give our users more options and control over these cookies. One such option is the privacy-enhanced mode for our embed player. This mode restricts YouTube's ability to set cookies for a user who views a web page that contains a privacy-enhanced YouTube embed video player, but does not click on the video to begin playback. YouTube may still set cookies on the user's computer once the visitor clicks on the YouTube video player, but YouTube will not store personally-identifiable cookie information for playbacks of embedded videos using the privacy-enhanced mode.

Awesome, thanks for the option. But hey, wait. If privacy mode "on" means that you don't set cookies when a "user" views the page (instead when they actually click play), the past, and often current method, privacy mode "off", is that you set cookies on a "user" machine every time someone views a web page with a youtube video embedded (regardless of whether or not they actually click play).

Ok, so tracking cookies, no big deal right. Old news. Just wanted to point that out.


Monday, December 7, 2009

chess.com + meebo

noticed today that chess.com (who I recently paid for a membership too) slipped a meebo on me when I saw a small but crafty ad on the bottom left hand corner of my browser. some of those lowKey pop up toolbars work great, like on the hype machine, but in this case because I was not expecting it, it put me off.

I told her many stories about how the world could be, and she listened calmly. she knew right when I was going to finish my sentences, and saw my words in a clear and distant vision. we stood on the deck looking out into the valley. the cold mountain air was no match for our combined warmth. i held her close to me and felt the future from many years away. before I could see it up close, my attention snapped and I was tugged back to the evening. Maybe I wasnt supposed to get that close? We stepped back in side, having seen something beautiful, strange and frightening.