<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-8909999644830169157</atom:id><lastBuildDate>Fri, 01 Nov 2024 10:32:15 +0000</lastBuildDate><category>EthicalHacker</category><category>Windows</category><category>tools</category><category>vulnerabilities</category><category>Penetration Test</category><category>dragonjar</category><category>micrsoft</category><category>SAP</category><category>XSS</category><category>application</category><category>application security</category><category>backtrack</category><category>bibliography</category><category>cryptex</category><category>ftp</category><category>iis</category><category>malware</category><category>pentestit</category><category>software</category><category>sql</category><category>27799</category><category>Aurora</category><category>ISO</category><category>IT</category><category>NASA</category><category>RogerGrimes</category><category>SecurityByDefault</category><category>SeguridadSAP</category><category>about</category><category>antivirus</category><category>análisis forense</category><category>attack</category><category>attacker</category><category>auditoría</category><category>autorun</category><category>cisco</category><category>cloud</category><category>cloud computing</category><category>cnet</category><category>code</category><category>computerweekly</category><category>contraseñas</category><category>damn vulnerable</category><category>defcon</category><category>distros</category><category>eWeek</category><category>event</category><category>exploit</category><category>failure</category><category>firefox</category><category>firewall</category><category>forensics</category><category>gmail</category><category>google</category><category>graudit</category><category>grep</category><category>grub</category><category>hardening</category><category>health</category><category>herramientas</category><category>incident</category><category>input</category><category>insider</category><category>linux</category><category>misc</category><category>nycgraphix</category><category>passwords</category><category>pendrive</category><category>phishing</category><category>php</category><category>printing</category><category>risks</category><category>ruby</category><category>security solutions</category><category>securityfocus</category><category>social engineering</category><category>steps</category><category>suguinfo</category><category>techniques</category><category>twitter</category><category>usb</category><category>validation</category><category>vtroger</category><category>web</category><category>wireless</category><title>Javier Echaiz Security</title><description>Computer/Information Security blog. Sometimes I will blog about IT too.</description><link>http://je-security.blogspot.com/</link><managingEditor>noreply@blogger.com (JaviZ)</managingEditor><generator>Blogger</generator><openSearch:totalResults>37</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-4328909237636753169</guid><pubDate>Mon, 30 May 2011 02:09:00 +0000</pubDate><atom:updated>2011-05-29T23:09:03.344-03:00</atom:updated><title>Technology News: Exploits &amp; Vulnerabilities: Internet Explorer Flaw Lets Hackers Into the Cookie Jar</title><description>&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana, arial, helvetica; font-size: 11px; &quot;&gt;By Richard Adhikari&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana, arial, helvetica; font-size: 13px; &quot;&gt;&lt;p class=&quot;story-byline&quot; style=&quot;margin-top: 0px; font-size: 11px; &quot;&gt;TechNewsWorld&lt;br /&gt;05/27/11 5:00 AM PT&lt;/p&gt;&lt;p class=&quot;story-summary&quot; style=&quot;margin-top: -2px; font-weight: bold; font-size: 14px; line-height: 18px; color: rgb(84, 85, 90); &quot;&gt;Security researcher Rosario Valotta has apparently discovered a vulnerability in Microsoft&#39;s Internet Explorer that could be used to install malware and forge clicks. The so-called cookiejacking attack involves figuring out the victim&#39;s Windows username, knowing which version of Windows the victim is running and tricking the user into selecting the entire content of the stolen cookie.&lt;/p&gt;&lt;p class=&quot;story-summary&quot; style=&quot;margin-top: -2px; font-weight: bold; font-size: 14px; line-height: 18px; color: rgb(84, 85, 90); &quot;&gt;&lt;a href=&quot;http://www.technewsworld.com/story/Internet-Explorer-Flaw-Lets-Hackers-Into-the-Cookie-Jar-72539.html&quot;&gt;Read more.&lt;/a&gt;&lt;/p&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://je-security.blogspot.com/2011/05/technology-news-exploits.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-4168810084132677897</guid><pubDate>Mon, 30 May 2011 02:06:00 +0000</pubDate><atom:updated>2011-05-29T23:06:04.134-03:00</atom:updated><title>Use your mobile phone for secure Web sign-ins | Workers&#39; Edge - CNET News</title><description>&lt;a href=&quot;http://news.cnet.com/8301-13880_3-20066990-68.html&quot;&gt;Use your mobile phone for secure Web sign-ins | Workers&#39; Edge - CNET News&lt;/a&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(96, 96, 96); font-family: helvetica; font-size: 11px; &quot;&gt;by &lt;a rel=&quot;author&quot; href=&quot;http://www.cnet.com/profile/doreilly/&quot; style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; outline-width: initial; outline-style: none; outline-color: initial; font-size: 11px; font-weight: inherit; font-style: inherit; font-family: Helvetica, Arial, sans-serif; text-align: left; vertical-align: baseline; color: rgb(0, 102, 160); text-decoration: none; cursor: pointer; &quot;&gt;Dennis O&#39;Reilly&lt;/a&gt; (May 29th)&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(96, 96, 96); font-family: helvetica; font-size: 11px; &quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(0, 0, 0); font-family: Helvetica, Arial, sans-serif; font-size: 16px; &quot;&gt;In the battle to protect our data, passwords are the first line of defense. Unfortunately, passwords are a pain to manage.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(0, 0, 0); font-family: Helvetica, Arial, sans-serif; font-size: 16px; &quot;&gt;&lt;span style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; outline-width: 0px; outline-style: initial; outline-color: initial; font-size: 16px; font-weight: inherit; font-style: inherit; font-family: Helvetica, Arial, sans-serif; text-align: left; vertical-align: baseline; &quot;&gt;&lt;br /&gt;&lt;br /&gt;Read more: &lt;a href=&quot;http://news.cnet.com/8301-13880_3-20066990-68.html#ixzz1NnUqsOuL&quot; style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; outline-width: initial; outline-style: none; outline-color: initial; font-size: 16px; font-weight: inherit; font-style: inherit; font-family: Helvetica, Arial, sans-serif; text-align: left; vertical-align: baseline; color: rgb(0, 51, 153); text-decoration: none; cursor: pointer; &quot;&gt;http://news.cnet.com/8301-13880_3-20066990-68.html#ixzz1NnUqsOuL&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://je-security.blogspot.com/2011/05/use-your-mobile-phone-for-secure-web.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-6485918311795551638</guid><pubDate>Mon, 30 May 2011 01:57:00 +0000</pubDate><atom:updated>2011-05-29T22:59:02.526-03:00</atom:updated><title>The Best Web Apps and Online Services: Get the Most Out of the Cloud | PCWorld</title><description>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, helvetica, sans-serif; font-size: medium; &quot;&gt;&lt;h2 style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 6px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; list-style-type: none; font-weight: bold; font-size: 16px; line-height: 20px; &quot;&gt;By using Web-based applications and storing your files online, you can work from anywhere, on any device, for next to nothing.&lt;/h2&gt;&lt;p class=&quot;byline&quot; style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 15px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; list-style-type: none; font-weight: normal; font-size: 12px; line-height: 20px; color: rgb(102, 102, 102); &quot;&gt;By &lt;a href=&quot;http://www.pcworld.com/author/Robert-Strohmeyer&quot; style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; list-style-type: none; font-weight: normal; color: rgb(28, 96, 159); text-decoration: none; &quot;&gt;Robert Strohmeyer&lt;/a&gt;, &lt;a href=&quot;http://www.pcworld.com/&quot; target=&quot;_blank&quot; style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; list-style-type: none; font-weight: normal; color: rgb(28, 96, 159); text-decoration: none; &quot;&gt;PCWorld&lt;/a&gt;    May 29, 2011 10:00 pm&lt;/p&gt;&lt;/span&gt;</description><link>http://je-security.blogspot.com/2011/05/best-web-apps-and-online-services-get.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-1649270092192315619</guid><pubDate>Tue, 02 Mar 2010 22:49:00 +0000</pubDate><atom:updated>2010-03-02T20:53:09.389-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">NASA</category><category domain="http://www.blogger.com/atom/ns#">vulnerabilities</category><category domain="http://www.blogger.com/atom/ns#">XSS</category><title>XSS and the NASA (NA_XSS_A?)</title><description>I was on &lt;a href=&quot;http://winds.jpl.nasa.gov/imagesAnim/quikscat.cfm&quot;&gt;http://winds.jpl.nasa.gov/imagesAnim/quikscat.cfm&lt;/a&gt; when I found this:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://winds.jpl.nasa.gov/imagesAnim/images.cfm?pageName=ImagesAnim&amp;amp;subPageName=QuikSCAT&amp;amp;Image=QS_S1B28865%22%3E%3Cscript%3Ealert%28/XSS/%29%3C/script%3E&quot;&gt;http://winds.jpl.nasa.gov/imagesAnim/images.cfm?pageName=ImagesAnim&amp;amp;subPageName=QuikSCAT&amp;amp;Image=QS_S1B28865%22%3E%3Cscript%3Ealert%28/XSS/%29%3C/script%3E&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;OMG! NASA? Yep... Even when you assume security is a must @ sites like NASA, there are (some) insecurities! As you can see Image was not sanitized (as it should have been! :)&lt;br /&gt;&lt;br /&gt;I did some more tests on another NASA site (&lt;a href=&quot;http://sbir.gsfc.nasa.gov&quot;&gt;http://sbir.gsfc.nasa.gov&lt;/a&gt;):&lt;br /&gt;&lt;br /&gt;We can list some directories:&lt;br /&gt;&lt;a href=&quot;http://sbir.gsfc.nasa.gov/sbirweb/search/&quot;&gt;http://sbir.gsfc.nasa.gov/sbirweb/search/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;And we can see another XSS vulnerability:&lt;br /&gt;&lt;a href=&quot;http://sbir.gsfc.nasa.gov/sbirweb/search/searchResults.jsp?st=%22%3E%3Cscript%3Ealert%28/XSS/%29%3C/script%3E&quot;&gt;http://sbir.gsfc.nasa.gov/sbirweb/search/searchResults.jsp?st=%22%3E%3Cscript%3Ealert(/XSS/)%3C/script%3E&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;ok, there is no more fun with NASA.&lt;br /&gt;&lt;br /&gt;Why I&#39;m posting this? I&#39;m sure people at NASA already know it... Now I will googe a bit b4 posting. Yep! I&#39;ve found &lt;a href=&quot;http://hackingethics.wordpress.com/2010/02/15/xss-in-nasa-and-sql-injection-in-pentagon/&quot;&gt;http://hackingethics.wordpress.com/2010/02/15/xss-in-nasa-and-sql-injection-in-pentagon/&lt;/a&gt;  (and other links)&lt;br /&gt;&lt;br /&gt;well, It seems I can post this... Someone wants to look for vulnerabilities at Pentagon? Spare time? Where are You when I need You?</description><link>http://je-security.blogspot.com/2010/03/xss-and-nasa-naxssa.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-8840105828839133347</guid><pubDate>Sat, 30 Jan 2010 04:18:00 +0000</pubDate><atom:updated>2010-02-01T16:09:07.431-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Aurora</category><category domain="http://www.blogger.com/atom/ns#">micrsoft</category><category domain="http://www.blogger.com/atom/ns#">vulnerabilities</category><title>Microsoft, Aurora and something about forest and trees?</title><description>Perhaps it is the fine tequila this evening, but I really don&#39;t get how our industry can latch on to the recent &#39;Aurora&#39; incident and try to take Microsoft to task about it. The amount of news on this has been overwhelming, and I will try to very roughly summarize:&lt;br /&gt;&lt;br /&gt;News surfaces Google, Adobe and 30+ companies hit by &quot;0-day&quot; attack&lt;br /&gt;&lt;br /&gt;Google uses this for political overtones&lt;br /&gt;&lt;br /&gt;Originally thought to be Adobe 0-day, revealed it was MSIE 0-day&lt;br /&gt;&lt;br /&gt;Jan 14, confirmed it is MSIE vuln, shortly after dubbed &quot;aurora&quot;&lt;br /&gt;&lt;br /&gt;Jan 21, uproar over MS knowing about the vuln since Sept&lt;br /&gt;&lt;br /&gt;Now, here is where we get to the whole forest, trees and some analogy about eyesight. Oh, I&#39;ll warn (and surprise) you in advance, I am giving Microsoft the benefit of the doubt here (well, for half the blog post) and throwing this back at journalists and the security community instead. Let&#39;s look at this from a different angle.&lt;br /&gt;&lt;br /&gt;The big issue that is newsworthy is that Microsoft knew of this vulnerability in September, and didn&#39;t issue a patch until late January. What is not clear, is if Microsoft knew it was being exploited. The wording of the Wired article doesn&#39;t make it clear: &quot;aware months ago of a critical security vulnerability well before hackers exploited it to breach Google, Adobe and other large U.S. companies&quot; and &quot;Microsoft confirmed it learned of the so-called &#39;zero-day&#39; flaw months ago&quot;. Errr, nice wording. Microsoft was aware of the vulnerability (technically), before hackers exploited it, but doesn&#39;t specifically say if they KNEW hackers were exploiting it. Microsoft learned of the &quot;0-day&quot; months ago? No, bad bad bad. This is taking an over-abused term and making it even worse. If a vulnerability is found and reported to the vendor before it is exploited, is it still 0-day (tree, forest, no one there to hear it falling)?&lt;br /&gt;&lt;br /&gt;Short of Microsoft admitting they knew it was being exploited, we can only speculate. So, for fun, let&#39;s give them a pass on that one and assume it was like any other privately disclosed bug. They were working it like any other issue, fixing, patching, regression testing, etc. Good Microsoft!&lt;br /&gt;&lt;br /&gt;Bad Microsoft! But, before you jump on the bandwagon, bad journalists! Bad security community!&lt;br /&gt;&lt;br /&gt;Why do you care they sat on this one vulnerability for six months? Why is that such a big deal? Am I the only one who missed the articles pointing out that they actually sat on five code execution bugs for longer? Where was the outpour of blogs or news articles mentioning that &quot;aurora&quot; was one of six vulnerabilities reported to them during or before September, all in MSIE, all that allowed remote code execution (tree, forest, not seeing one for the other)? &lt;br /&gt; CVE  Reported to MS  Disclosed  Time to Patch&lt;br /&gt; CVE-2010-0244  2009-07-14  2010-01-21  6 Months, 7 Days (191 days)&lt;br /&gt; CVE-2010-0245  2009-07-14  2010-01-21  6 Months, 7 Days (191 days)&lt;br /&gt; CVE-2010-0246  2009-07-16  2010-01-21  6 Months, 5 Days (189 days)&lt;br /&gt; CVE-2010-0248  2009-08-14  2010-01-21  5 Months, 7 days (160 days)&lt;br /&gt; CVE-2010-0247  2009-09-03  2010-01-21  4 Months, 18 days (140 days)&lt;br /&gt; CVE-2010-0249  2009-09-??  2010-01-14  4 Months, 11 days (133 days) - approx&lt;br /&gt; CVE-2010-0027  2009-11-15  2010-01-21  2 Months, 6 days (67 days)&lt;br /&gt; CVE-2009-4074  2009-11-20  2009-11-21  2 Months, 1 day (62 days) &lt;br /&gt;&lt;br /&gt;Remind me again, why the &quot;Aurora&quot; conspiracy is noteworthy? If Microsoft knew of six remote code execution bugs, all from the September time-frame, why is one any more severe than the other? Is it because one was used to compromise hosts, detected and published in an extremely abnormal fashion? Are we actually trying to hold Microsoft accountable on that single vulnerability when the five others just happened not to be used to compromise Google, Adobe and others?&lt;br /&gt;&lt;br /&gt;Going back to the Wired article, they say on the second to last paragraph: &quot;On Thursday, meanwhile, Microsoft released a cumulative security update for Internet Explorer that fixes the flaw, as well as seven other security vulnerabilities that would allow an attacker to remotely execute code on a victim&#39;s computer.&quot; Really, Wired? That late in the article, you gloss over &quot;seven other vulnerabilities&quot; that would allow remote code execution? And worse, you don&#39;t point out that Microsoft was informed of five of them BEFORE AURORA?&lt;br /&gt;&lt;br /&gt;Seriously, I am the first one to hold Microsoft over the flames for bad practices, but that goes beyond my boundaries. If you are going to take them to task over all this, at least do it right. SIX CODE EXECUTION VULNERABILITIES that they KNEW ABOUT FOR SIX MONTHS. Beating them up over just one is amateur hour in this curmudgeonly world.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Source:&lt;/span&gt; &lt;a href=&quot;http://blog.osvdb.org/2010/01/24/microsoft-aurora-and-something-about-forest-and-trees&quot;&gt;OSVDB.org&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;&lt;p&gt;&lt;a href=&quot;http://blog.osvdb.org/2010/01/24/microsoft-aurora-and-something-about-forest-and-trees&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;</description><link>http://je-security.blogspot.com/2010/01/microsoft-aurora-and-something-about.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-240984420990585055</guid><pubDate>Sat, 30 Jan 2010 03:58:00 +0000</pubDate><atom:updated>2010-02-01T16:04:30.402-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">backtrack</category><category domain="http://www.blogger.com/atom/ns#">Penetration Test</category><title>BackTrack 4 Final Release</title><description>Taken  from the new BackTrack Site : BackTrack 4 Final is out and along with this release come some exciting news, updates, and developments. BackTrack 4 has been a long and steady road, with the release of abeta last year, we decided to hold off on releasing BackTrack 4 Final until it was perfected in every [...]&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.offensive-security.com/blog/backtrack/backtrack-4-final-release/&quot;&gt;http://www.offensive-security.com/blog/backtrack/backtrack-4-final-release/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;You can download BT4 from &lt;a href=&quot;http://www.backtrack-linux.org/downloads/&quot;&gt;here&lt;/a&gt;.</description><link>http://je-security.blogspot.com/2010/01/backtrack-4-final-release.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-891294047238755586</guid><pubDate>Sun, 13 Dec 2009 15:20:00 +0000</pubDate><atom:updated>2009-12-13T12:21:40.400-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">sql</category><title>132,000+ sites Compromised Via SQL Injection</title><description>Net-Security has posted an article on the discovery of 132k+ sites that have been SQL Injected. From the article &lt;div class=&quot;entry-content&quot;&gt;&lt;div class=&quot;entry-body&quot;&gt;&lt;p&gt;&quot;A large scale &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://projects.webappsec.org/SQL-Injection&quot; target=&quot;_blank&quot;&gt;SQL injection&lt;/a&gt; attack has injected a malicious iframe on tens of thousands of susceptible websites. ScanSafe reports that the injected iframe loads malicious content from 318x.com, which eventually leads to the installation of a rootkit-enabled variant of the Buzus backdoor trojan. A Google search on the iframe resulted in over 132,000 hits as of December 10, 2009.&quot;&lt;/p&gt;&lt;p&gt;The google search query &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.google.com/search?hl=en&amp;amp;q=%3Cscript+src%3Dhttp%3A%2F%2F318x.com%3E&amp;amp;aq=f&amp;amp;oq=&amp;amp;aqi=&quot; target=&quot;_blank&quot;&gt;string is here&lt;/a&gt;. &lt;/p&gt;&lt;p&gt;Read more here: &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.net-security.org/secworld.php?id=8604&quot; target=&quot;_blank&quot;&gt;http://www.net-security.org/secworld.php?id=8604&lt;/a&gt;&lt;/p&gt;    &lt;/div&gt;           &lt;/div&gt;</description><link>http://je-security.blogspot.com/2009/12/132000-sites-compromised-via-sql.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-7826776442613259411</guid><pubDate>Thu, 26 Nov 2009 10:02:00 +0000</pubDate><atom:updated>2009-12-13T10:32:57.840-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">attack</category><category domain="http://www.blogger.com/atom/ns#">attacker</category><category domain="http://www.blogger.com/atom/ns#">cisco</category><category domain="http://www.blogger.com/atom/ns#">insider</category><title>Unintentional Insider Attacks</title><description>&lt;p&gt;In this week’s &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.cisco.com/web/about/security/intelligence/CRR_nov2-8.html#6&quot; target=&quot;_blank&quot;&gt;Cyber Risk Report&lt;/a&gt;, we noted a recent article on CSO Online that mentions a &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.csoonline.com/article/print/506309&quot; target=&quot;_blank&quot;&gt;rise in internal security incidents that are caused unintentionally or non-maliciously by employees&lt;/a&gt;. Employees, especially younger ones that have a lifelong connection to computers and the Internet, are becoming more involved with technologies and Internet resources in the workplace. As a result, companies are finding that their security policies, and in some cases their perimeters, are being breached by workers who are determined to access files, media, websites, or communities that are considered off-limits. Organizations and their security teams are challenged by the rise in disobedience and disdain for established policy. How can they be stopped?&lt;/p&gt;                                           &lt;span name=&quot;more&quot; id=&quot;more&quot;&gt;&lt;/span&gt;     &lt;p&gt;&lt;strong&gt;They can’t.&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;User access control is a grand paradox for computer security. Data is useless without access, and access is impossible without some user to control a system or at least to maintain it. Wherever there is human interaction with a computer, there is a potential for the user to bend, stretch, or break their permissions to do things that they are not supposed to do. Technical controls can certainly be established, but even the most stringent controls like DRM can be broken. Portable electronics are growing smaller every day, and cell phones are some of the most versatile pieces of equipment for a determined attacker. Cameras, Internet access, and even custom applications make today’s phones a nightmare for a controlled environment. And even low-tech attacks like remembering information and writing it down on paper can cause information to leak out of an organization. There is simply no way to stop a user from abusing their rights.&lt;/p&gt; &lt;p&gt;Controls for human factors, therefore, are not rigid like technical controls. Organizations must set boundaries and guidelines that are not seen as overly restrictive. Any time a user feels as if their purpose (whether their personal goals or their occupational ones) is hindered, there is risk that they will put themselves above the corporation. If an employee in Sales needs to access a video of a competitor’s presentation from a public site that is banned by corporate policy, she might circumvent controls to ensure she can meet her quota. If a network administrator needs to troubleshoot a problem across a range of devices in an area, he might install a rogue wireless access point to connect his laptop to the network in order to make the job go faster and save the company money from his lost productivity.&lt;/p&gt; &lt;p&gt;The best way to ensure that controls are not seen as overly restrictive is to generate awareness and training around them. Whenver possible, not setting arbitrary controls is also effective. Users must understand why they are being denied something that they could see as important to their work, and they must buy into the idea presented by the company. Alternative options will also help employees feel like they have a way to get the required work done without compromising things that the corporation feels need to be strongly protected.&lt;/p&gt; &lt;p&gt;Discipline is also important. Not only must the punishment for infringement fit the infraction, but it must be consistently applied. Nothing irks a subordinate more than to see their superiors able to use political clout to thwart the same controls that they must abide by. Pervasive unfair treatment of security policies can quickly lead to someone breaking the rules just to feel that balance has been restored.&lt;/p&gt; &lt;p&gt;And finally, monitoring and management of information brings a technical control to bear on human problems. Instead of actually limiting use, monitoring just ensures that the right kind of information is flowing, that excessive quantities of data aren’t being shipped to a competitor, or that resources aren’t being hoarded by the videos that are watched by just a few employees. Network situational awareness will lead to an organization that is able to permit actions and monitor them, rather than forbid actions and drive them into dark recesses or side channels that cannot be monitored. Combined with a fair and accessible acceptable use policy, organizations can succeed by cooperating with users instead of working against them.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;http://blogs.cisco.com/security/comments/unintentional_insider_attacks/&quot;&gt;Original article&lt;/a&gt;.&lt;br /&gt;&lt;/p&gt;</description><link>http://je-security.blogspot.com/2009/11/unintentional-insider-attacks.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-2235014067655477687</guid><pubDate>Thu, 22 Oct 2009 19:03:00 +0000</pubDate><atom:updated>2009-12-13T10:40:34.558-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">input</category><category domain="http://www.blogger.com/atom/ns#">validation</category><title>Improper Input Handling</title><description>Improper input handling is one of the most common weaknesses identified across applications today. Poorly handled input is a leading cause behind critical vulnerabilities that exist in systems and applications.&lt;br /&gt;Generally, the term input handing is used to describe functions like validation, sanitization, filtering, encoding and/or decoding of input data. Applications receive input from various sources including human users, software agents (browsers), and network/peripheral devices to name a few. In the case of web applications, input can be transferred in various formats (name value pairs, JSON, SOAP, etc...) and obtained via URL query strings, POST data, HTTP headers, Cookies, etc... Non-web application input can be obtained via application variables, environment variables, the registry, configuration files, etc... Regardless of the data format or source/location of the input, all input should be considered untrusted and potentially malicious. Applications which process untrusted input may become vulnerable to attacks such as &lt;a bitly=&quot;BITLY_PROCESSED&quot; target=&quot;&quot; href=&quot;http://projects.webappsec.org/Buffer-Overflow&quot;&gt;Buffer Overflows&lt;/a&gt;, &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://projects.webappsec.org/SQL-Injection&quot;&gt;SQL Injection&lt;/a&gt;, &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://projects.webappsec.org/OS-Commanding&quot;&gt;OS Commanding&lt;/a&gt;, &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://projects.webappsec.org/Denial-of-Service&quot;&gt;Denial of Service&lt;/a&gt; just to name a few. &lt;p&gt; &lt;/p&gt; &lt;h3&gt;Improper Input Validation&lt;/h3&gt;  &lt;p&gt;One of the key aspects of input handling is validating that the input satisfies a certain criteria. For proper validation, it is important to identify the form and type of data that is acceptable and expected by the application. Defining an expected format and usage of each instance of untrusted input is required to accurately define restrictions.&lt;br /&gt;&lt;/p&gt; &lt;p&gt;Validation can include checks for type safety and correct syntax. String input can be checked for length (min &amp;amp; max number of characters) and character set validation while numeric input types like integers and decimals can be validated against acceptable upper and lower bound of values. When combining input from multiple sources, validation should be performed during concatenation and not just against the individual data elements. This practice helps avoid situations where input validation may succeed when performed on individual data items but fails when done on a combined set from all the sources [11].&lt;/p&gt;  &lt;h4&gt;Client-side vs Server-side validation &lt;/h4&gt; &lt;p&gt;A common mistake most developers make is to include validation routines in the client-side of an application using JavaScript functions as a sole means to perform bound checking. Validation routines are beneficial on the client side but are not intended to provide a security feature as all data accessible on the client side is modifiable by a malicious user or attacker. This is true of any client-side validation checks in JavaScript and VBScript or external browser plug-ins such as Flash, Java, or ActiveX.  The HTML5 specification has added a new attribute &quot;pattern&quot; to the INPUT tag that enables developers to write regular expressions as part of the markup for performing validations [29]. This makes it even more convenient for developers to perform input validation on the client side without having to write any extra code. The risk from such a feature becomes significant when developers start using it as the only means of performing input validation for their applications. Relying on client-side validation alone in not a safe practice. It gives a false sense of security to many developers since client-side validations can easily be evaded by malicious entities. It is important to note that while client-side validation is great for UI and functional validation, it isn&#39;t a substitute for server-side validation. Performing validation on the server side ensures integrity of your validation controls. In addition, the server-side validation routine will always be effective irrespective of the state of JavaScript execution on the browser. As a best practice input validation should be performed both on the client side as well as on the server side.&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;h3&gt;Improper Input Sanitization and Filtering&lt;/h3&gt;  &lt;p&gt;Sanitization of input deals with transforming input to an acceptable form where as filtering deals with blocking/allowing all or part of input that is deemed unacceptable/acceptable respectively. Sanitization and filtering typically is implemented in addition to input validation.&lt;br /&gt;&lt;/p&gt; &lt;p&gt;Weak sanitization and/or filtering can lead an attacker to evade such mechanisms and supply malformed and/or malicious input to the application. The &quot;attacks&quot; section of this document describes &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://projects.webappsec.org/SQL-Injection&quot;&gt;SQL Injection&lt;/a&gt; and &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://projects.webappsec.org/Buffer-Overflow&quot;&gt;Buffer Overflow&lt;/a&gt; attacks which are a direct effect of missing or weak filtering/sanitization.&lt;/p&gt;  &lt;h4&gt;Input Sanitization&lt;/h4&gt;  &lt;p&gt;Input sanitization can be performed by transforming input from its original form to an acceptable form via encoding or decoding. Common encoding methods used in web applications include the HTML entity encoding and URL Encoding schemes. HTML entity encoding serves the need for encoding literal representations of certain meta-characters to their corresponding character entity references. Character references for HTML entities are pre-defined and have the format &lt;em&gt;&amp;name;&lt;/em&gt;  where &quot;name&quot; is a case-sensitive alphanumeric string. A common example of HTML entity encoding is where &quot;&lt;&quot; is encoded as &amp;lt; and &quot;&gt;&quot; encoded as &amp;gt; . Refer to [1] for more information on character encodings. URL encoding applies to parameters and their associated values that are transmitted as part of HTTP query strings. Likewise, characters that are not permitted in URLs are represented using their Unicode Character Set code point value, where each byte is encoded in hexadecimal as &quot;%HH&quot;.  For example, &quot;&lt;&quot; is URL-encoded as &quot;%3C&quot; and &quot;ÿ&quot; is URL-encoded as &quot;%C3%BF&quot;. &lt;/p&gt; &lt;p&gt;There are many ways in which input can be presented to an application. With web applications and browsers supporting more than one character encoding types, it has become a common place for attackers to try and exploit inherent weaknesses in encoding and decoding routines. Applications requiring internationalization are a good candidate for input sanitization. One of the common forms of representing international characters is &lt;em&gt;Unicode&lt;/em&gt; [18]. Unicode transformations use the UCS (Universal Character Set) which consist of a large set of characters to cover symbols of almost all the languages in the world. The table below, taken from [21], shows a set of samples with different characters from UCS that are visually similar in representation to ASCII characters &quot;s&quot;, &quot;o&quot;, &quot;u&quot; and &quot;p&quot;. From the most novice personal computer user to the most seasoned security expert, rarely does an individual inspect every character within a Unicode string to confirm its validity. Such misrepresentation of characters enables attackers to spoof expected values by replacing them with visually or semantically similar characters from the UCS.&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;table border=&quot;1&quot;&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td&gt;s&lt;/td&gt; &lt;td&gt;ｓ&lt;/td&gt; &lt;td&gt;ѕ&lt;/td&gt; &lt;td&gt;Ⴝ&lt;/td&gt; &lt;td&gt;Ｓ&lt;/td&gt; &lt;td&gt;Ѕ&lt;/td&gt; &lt;td&gt;Ϩ&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;0073&lt;/td&gt; &lt;td&gt;FF53&lt;/td&gt; &lt;td&gt;0455&lt;/td&gt; &lt;td&gt;10BD&lt;/td&gt; &lt;td&gt;FF33&lt;/td&gt; &lt;td&gt;0405&lt;/td&gt; &lt;td&gt;03E8&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;o&lt;/td&gt; &lt;td&gt;ο&lt;/td&gt; &lt;td&gt;о&lt;/td&gt; &lt;td&gt;ｏ&lt;/td&gt; &lt;td&gt;º&lt;/td&gt; &lt;td&gt;ﾷ&lt;/td&gt; &lt;td&gt;ѻ&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;006F&lt;/td&gt; &lt;td&gt;03BF&lt;/td&gt; &lt;td&gt;043E&lt;/td&gt; &lt;td&gt;FF4F&lt;/td&gt; &lt;td&gt;00BA&lt;/td&gt; &lt;td&gt;FFB7&lt;/td&gt; &lt;td&gt;047B&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;u&lt;/td&gt; &lt;td&gt;⊔&lt;/td&gt; &lt;td&gt;υ&lt;/td&gt; &lt;td&gt;⋃&lt;/td&gt; &lt;td&gt;∪&lt;/td&gt; &lt;td&gt;Ĳ&lt;/td&gt; &lt;td&gt;ṵ&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;0075&lt;/td&gt; &lt;td&gt;2294&lt;/td&gt; &lt;td&gt;03C5&lt;/td&gt; &lt;td&gt;22C3&lt;/td&gt; &lt;td&gt;222A&lt;/td&gt; &lt;td&gt;0132&lt;/td&gt; &lt;td&gt;1E75&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;p&lt;/td&gt; &lt;td&gt;р&lt;/td&gt; &lt;td&gt;ｐ&lt;/td&gt; &lt;td&gt;ƿ&lt;/td&gt; &lt;td&gt;ρ&lt;/td&gt; &lt;td&gt;ק&lt;/td&gt; &lt;td&gt;Р&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;0070&lt;/td&gt; &lt;td&gt;0440&lt;/td&gt; &lt;td&gt;FF50&lt;/td&gt; &lt;td&gt;01BF&lt;/td&gt; &lt;td&gt;03C1&lt;/td&gt; &lt;td&gt;05E7&lt;/td&gt; &lt;td&gt;0420&lt;/td&gt; &lt;/tr&gt; &lt;/tbody&gt; &lt;/table&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Note that although the characters have a similar visual representation, they all carry a different hexadecimal code that uniquely maps to UCS. Additional information on character encoding types and output handling can be found at [22].&lt;/p&gt; &lt;h4&gt; &lt;/h4&gt; &lt;h4&gt;Canonicalization&lt;/h4&gt; &lt;p&gt;Canonicalization is another important aspect of input sanitization [20]. Canonicalization deals with converting data with various possible representations into a standard &quot;canonical&quot; representation deemed acceptable by the application. One of the most commonly known application of canonicalization is &quot;Path Canonicalization&quot; where file and directory paths on computer file systems or web servers (URL) are canonicalized to enforce access restrictions. Failure of such canonicalization mechanism can lead to directory traversal or path traversal attacks [24]. The concept of canonicalization is widely applicable and applies equally well to Unicode and XML processing routines.&lt;/p&gt;   &lt;p&gt;The first major Unicode vulnerability was documented against Microsoft Internet Information Server (IIS) in October 2000 [12]. This vulnerability allowed attackers to encode &quot;/&quot;, &quot;\&quot; and &quot;.&quot; characters to appear as their Unicode counterparts and bypass the security mechanisms within IIS that block directory traversal. In another example, a vulnerability discovered in Google perfectly illustrates the significance of character encoding [13]. The vulnerability stated in this example exploits lack of consistency in character encoding schemes across the application. While expecting UTF-8 [14] encoded characters, the application fails to sanitize and transform input supplied in the form on UTF-7 [15] leading to a &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://projects.webappsec.org/Cross-Site-Scripting&quot;&gt;Cross-site scripting&lt;/a&gt; attack. Additional examples can be found at [16] and [17].  As mentioned earlier, applications that are internationalized have a need to support multiple languages that cannot be represented using common ISO-8859-1 (Latin-1) character encoding. Languages like Chinese, Japanese use thousands of characters and are therefore represented using variable-width encoding schemes [18]. Improperly handled mapping and encoding of such international characters can also lead to canonicalization attacks [19].&lt;br /&gt;&lt;/p&gt; &lt;p&gt;Based on input and output handling requirements, applications should identify acceptable character sets and implement custom sanitization routines to process and transform data specific to their needs. Additional information on outputting data in international applications can be found at [22].&lt;/p&gt;  &lt;h4&gt;Input Filtering&lt;/h4&gt;  &lt;p&gt;Input Filtering is a decision making process that leads either to the acceptance or the rejection of input based on predefined criteria. In its most basic form, input filtering deals with matching or comparing an input data stream with a predefined set of characters to determine acceptability. Acceptable input is passed forward for processing and unwanted characters are blocked thus preventing the application from processing unrecognized and potentially malicious input. There are two major approaches to input filtering [2]:&lt;br /&gt;&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Whitelist - Allowing &lt;i&gt;only&lt;/i&gt; the &lt;i&gt;known good characters&lt;/i&gt;. E.g. a-z,A-Z,0-9 are known good characters in the whitelist and are hence accepted by the filter&lt;/li&gt;&lt;li&gt;Blacklist - Allowing &lt;i&gt;anything except&lt;/i&gt; the &lt;i&gt;known bad characters&lt;/i&gt;. E.g. &lt;,/,&gt; are known bad characters in the blacklist and are hence blocked by the filter&lt;/li&gt;&lt;/ul&gt;  &lt;p&gt;There are advantages and disadvantages to both approaches. Blacklist based filtering is widely used as it is fairly easy to implement, but offers protection only from known threats. Characters in a blacklist can be modeled to evade filtering as the filter only blocks known bad characters; an attacker can specially craft an attack to avoid those specific characters. Researchers have demonstrated several ways of evading blacklist based filtering approaches. The XSS cheat sheet [7] and SQL cheat sheet [8] are classic examples of how filter evasion techniques can be used against blacklist based approaches. Both Mitre [9] and NVD [10] host several advisories describing vulnerabilities due to poor blacklist filtering implementations.&lt;/p&gt;  &lt;p&gt;Whitelist based filtering is often more difficult to implement properly. Although proven efficient with virus and malware protection techniques, it can be difficult to compile a list of all good input that a system can accept.&lt;/p&gt;  &lt;p&gt;Input validation, sanitization and filtering requirements apply equally to elements beyond web application code. Web application infrastructure components like web servers and proxies that handle web application requests and responses have been shown to be vulnerable to attacks caused due to weak input validation of HTTP request/response headers. Some examples include HTTP Response Splitting [25], HTTP Request Smuggling [26], etc...&lt;/p&gt;  &lt;p&gt; &lt;/p&gt;&lt;p&gt;A common approach to perform input filtering, validation and sanitization is through the use of a regex (Regular Expressions) [23]. Regular Expressions provide a concise and flexible means of identifying patterns in a given data set. Many ready-made regular expressions that deal with common input/output related attacks such as &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://projects.webappsec.org/SQL-Injection&quot;&gt;SQL Injection&lt;/a&gt; [4], &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://projects.webappsec.org/OS-Commanding&quot;&gt;OS Commanding&lt;/a&gt; [5] and &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://projects.webappsec.org/Cross-Site+Scripting&quot;&gt;Cross-Site Scripting&lt;/a&gt; [27] are available on the Internet. While these regular expressions may be simple to copy into an application, it is important for developers using them to ensure they are evaluating the requirements for their expected input streams.&lt;/p&gt;  &lt;p&gt; &lt;/p&gt;&lt;p&gt;Commercial companies like Microsoft and open source communities like OWASP have ongoing efforts to provide protection tools against some of the common attacks mentioned above. Microsoft&#39;s Anti Cross-Site Scripting Library [28] not only guides its users and developers with putting measures in place to thwart cross-site scripting attacks, but also provides insight into alternatives for proper input and output encoding where its library routines may not apply. OWASP&#39;s ESAPI project [6] provides guidelines and primary defenses against SQL Injection attacks. It also provides details on database specific SQL escaping requirements to help escape/encode user input before concatenating it with a SQL query. SQL escaping, as advocated in EASPI, uses DBMS character escaping schemes to convert input that can be characterized by the SQL engine as data instead of code.   &lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;h3&gt;Common examples of attacks due to Improper Input Handling&lt;/h3&gt; &lt;p&gt; &lt;/p&gt; &lt;h4&gt;Buffer Overflow&lt;/h4&gt; &lt;p&gt;The length of the source variable &lt;code&gt;input&lt;/code&gt; is not validated before being copied to the destination &lt;code&gt;dest_buffer&lt;/code&gt;. The weakness is exploited when the size of &lt;code&gt;input&lt;/code&gt; (source) exceeds the size of the &lt;code&gt;dest_buffer&lt;/code&gt;(destination) causing an overflow of the destination variable&#39;s address in memory.&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;pre style=&quot;margin-left: 80px;&quot;&gt;void bad_function(char *input)&lt;br /&gt;&lt;/pre&gt; &lt;pre style=&quot;margin-left: 80px;&quot;&gt;{&lt;br /&gt;&lt;/pre&gt; &lt;pre style=&quot;margin-left: 120px;&quot;&gt;char dest_buffer[32];&lt;br /&gt;&lt;/pre&gt;  &lt;pre style=&quot;margin-left: 120px;&quot;&gt;strcpy(dest_buffer, input);&lt;br /&gt;&lt;/pre&gt; &lt;pre style=&quot;margin-left: 120px;&quot;&gt;printf(&quot;The first command line argument is %s.\n&quot;, dest_buffer);&lt;br /&gt;&lt;/pre&gt; &lt;pre style=&quot;margin-left: 80px;&quot;&gt;}&lt;br /&gt;&lt;/pre&gt;  &lt;pre style=&quot;margin-left: 80px;&quot;&gt;int main(int argc, char *argv[])&lt;br /&gt;&lt;/pre&gt; &lt;pre style=&quot;margin-left: 80px;&quot;&gt;{&lt;br /&gt;&lt;/pre&gt;  &lt;pre style=&quot;margin-left: 120px;&quot;&gt;if (argc &gt; 1)&lt;br /&gt;&lt;/pre&gt; &lt;pre style=&quot;margin-left: 120px;&quot;&gt;{&lt;br /&gt;&lt;/pre&gt; &lt;pre style=&quot;margin-left: 120px;&quot;&gt;bad_function(argv[1]);&lt;br /&gt;&lt;/pre&gt; &lt;pre style=&quot;margin-left: 120px;&quot;&gt;}&lt;br /&gt;&lt;/pre&gt; &lt;pre style=&quot;margin-left: 120px;&quot;&gt;else&lt;br /&gt;&lt;/pre&gt; &lt;pre style=&quot;margin-left: 120px;&quot;&gt;{&lt;br /&gt;&lt;/pre&gt; &lt;pre style=&quot;margin-left: 120px;&quot;&gt;printf(&quot;No command line argument was given.\n&quot;);&lt;br /&gt;&lt;/pre&gt; &lt;pre style=&quot;margin-left: 120px;&quot;&gt;}&lt;br /&gt;&lt;/pre&gt;  &lt;pre style=&quot;margin-left: 120px;&quot;&gt;return 0;&lt;br /&gt;&lt;/pre&gt; &lt;pre style=&quot;margin-left: 80px;&quot;&gt;}&lt;br /&gt;&lt;/pre&gt; &lt;p&gt;See [3] for more on this and similar attacks.&lt;/p&gt; &lt;div class=&quot;editsection&quot; style=&quot;float: right; margin-left: 5px;&quot;&gt; &lt;/div&gt; &lt;h4&gt; &lt;/h4&gt; &lt;h4&gt;SQL Injection&lt;/h4&gt; &lt;p&gt;The sample code below shows a SQL query used by a web application authentication form.&lt;/p&gt; &lt;p&gt; &lt;/p&gt;  &lt;pre style=&quot;margin-left: 40px;&quot;&gt;SQLCommand = &quot;SELECT Username FROM Users WHERE Username = &#39;&quot;&lt;br /&gt;&lt;/pre&gt; &lt;pre style=&quot;margin-left: 40px;&quot;&gt;SQLCommand = SQLComand &amp;amp; strUsername&lt;br /&gt;&lt;/pre&gt; &lt;pre style=&quot;margin-left: 40px;&quot;&gt;SQLCommand = SQLComand &amp;amp; &quot;&#39; AND Password = &#39;&quot;&lt;br /&gt;&lt;/pre&gt; &lt;pre style=&quot;margin-left: 40px;&quot;&gt;SQLCommand = SQLComand &amp;amp; strPassword&lt;br /&gt;SQLCommand = SQLComand &amp;amp; &quot;&#39;&quot;&lt;br /&gt;strAuthCheck = GetQueryResult(SQLQuery)&lt;br /&gt;&lt;/pre&gt; &lt;pre&gt;&lt;br /&gt;&lt;/pre&gt; &lt;p&gt;In this code, the developer combines the input from the user, &lt;code&gt;strUserName&lt;/code&gt; and &lt;code&gt;strPassword&lt;/code&gt;, with the existing SQL statement&#39;s structure. Suppose an attacker submits a login and password that looks like the following:&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;pre style=&quot;margin-left: 40px;&quot;&gt;Username: foo&lt;br /&gt;&lt;/pre&gt; &lt;pre style=&quot;margin-left: 40px;&quot;&gt;Password: bar&#39; OR &#39;&#39;=&#39;&lt;br /&gt;&lt;/pre&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;The SQL command string built from this input would be as follows:&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;pre style=&quot;margin-left: 40px;&quot;&gt;SELECT Username FROM Users WHERE Username = &#39;foo&#39;&lt;br /&gt;&lt;/pre&gt; &lt;pre style=&quot;margin-left: 40px;&quot;&gt;AND Password = &#39;bar&#39; OR &#39;&#39;=&#39;&#39;&lt;br /&gt;&lt;/pre&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;This query will return all rows from the user&#39;s database, regardless of whether &quot;foo&quot; is a real user name or &quot;bar&quot; is a legitimate password. This is due to the OR statement appended to the WHERE clause. The comparison &lt;code&gt;&#39;&#39;=&#39;&#39;&lt;/code&gt; will always return a &quot;true&quot; result, making the overall WHERE clause evaluate to true for all rows in the table. If this is used for authentication purposes, the attacker will often be logged in as the first or last user in the Users table.&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;See [4] for more information on this and other variants of SQL Injection attack&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;div class=&quot;editsection&quot; style=&quot;float: right; margin-left: 5px;&quot;&gt; &lt;/div&gt; &lt;h4&gt;OS Commanding&lt;/h4&gt; &lt;p&gt;OS Commanding (command injection) is an attack technique used for unauthorized execution of operating system commands. Improperly handled input from the user is one of the common weaknesses that can be exploited to run unauthorized commands. Consider a web application exposing a function showInfo() that accepts parameters &lt;code&gt;name&lt;/code&gt; and &lt;code&gt;template&lt;/code&gt; from the user and opens a file based on this input&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Example: &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://example/cgi-bin/showInfo.pl?name=John&amp;amp;template=tmp1.txt&quot; rel=&quot;nofollow&quot; href=&quot;http://example/cgi-bin/showInfo.pl?name=John&amp;amp;template=tmp1.txt&quot;&gt;http://example/cgi-bin/showInfo.pl?name=John&amp;amp;template=tmp1.txt&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Due to improper or non-existent input handling, by changing the template parameter value an attacker can trick the web application into executing the command /bin/ls or open arbitrary files.&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Attack Example:&lt;/p&gt; &lt;pre&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://example/cgi-bin/showInfo.pl?name=John&amp;amp;template=/bin/ls|&quot; rel=&quot;nofollow&quot; href=&quot;http://example/cgi-bin/showInfo.pl?name=John&amp;amp;template=/bin/ls%7C&quot;&gt;http://example/cgi-bin/showInfo.pl?name=John&amp;amp;template=/bin/ls|&lt;/a&gt;&lt;br /&gt;&lt;/pre&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;See [5] for more on this and other variants of OS commanding or Command Injection attack&lt;/p&gt; &lt;h2&gt; &lt;/h2&gt; &lt;h2&gt;References&lt;/h2&gt; &lt;p&gt;Character encodings in HTML&lt;/p&gt; &lt;p&gt;[1] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://en.wikipedia.org/wiki/Character_encodings_in_HTML&quot; rel=&quot;nofollow&quot; href=&quot;http://en.wikipedia.org/wiki/Character_encodings_in_HTML&quot;&gt;http://en.wikipedia.org/wiki/Character_encodings_in_HTML&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Secure input and output handling&lt;/p&gt; &lt;p&gt;[2] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://en.wikipedia.org/wiki/Secure_input_and_output_handling&quot; rel=&quot;nofollow&quot; href=&quot;http://en.wikipedia.org/wiki/Secure_input_and_output_handling&quot;&gt;http://en.wikipedia.org/wiki/Secure_input_and_output_handling&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Buffer Overflow&lt;/p&gt; &lt;p&gt;[3] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://projects.webappsec.org/Buffer-Overflow&quot; rel=&quot;nofollow&quot; href=&quot;http://projects.webappsec.org/Buffer-Overflow&quot;&gt;http://projects.webappsec.org/Buffer-Overflow&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;SQL Injection&lt;/p&gt; &lt;p&gt;[4] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://projects.webappsec.org/SQL-Injection&quot; rel=&quot;nofollow&quot; href=&quot;http://projects.webappsec.org/SQL-Injection&quot;&gt;http://projects.webappsec.org/SQL-Injection&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;OS Commanding&lt;/p&gt; &lt;p&gt;[5] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://projects.webappsec.org/OS-Commanding&quot; rel=&quot;nofollow&quot; href=&quot;http://projects.webappsec.org/OS-Commanding&quot;&gt;http://projects.webappsec.org/OS-Commanding&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;OWASP ESAPI&lt;/p&gt; &lt;p&gt;[6] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://www.owasp.org/index.php/ESAPI&quot; rel=&quot;nofollow&quot; href=&quot;http://www.owasp.org/index.php/ESAPI&quot;&gt;http://www.owasp.org/index.php/ESAPI&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;XSS Cheat Sheet&lt;/p&gt; &lt;p&gt;[7] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://ha.ckers.org/xss.html&quot; rel=&quot;nofollow&quot; href=&quot;http://ha.ckers.org/xss.html&quot;&gt;http://ha.ckers.org/xss.html&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;SQL Cheat Sheet&lt;/p&gt; &lt;p&gt;[8] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://ha.ckers.org/sqlinjection/&quot; rel=&quot;nofollow&quot; href=&quot;http://ha.ckers.org/sqlinjection/&quot;&gt;http://ha.ckers.org/sqlinjection/&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;CVE at Mitre&lt;/p&gt; &lt;p&gt;[9] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=blacklist&quot; rel=&quot;nofollow&quot; href=&quot;http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=blacklist&quot;&gt;http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=blacklist&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;National Vulnerability Database&lt;/p&gt; &lt;p&gt;[10] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://nvd.nist.gov/&quot; rel=&quot;nofollow&quot; href=&quot;http://nvd.nist.gov/&quot;&gt;http://nvd.nist.gov/&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;CWE-20: Improper Input Validation&lt;/p&gt; &lt;p&gt;[11] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://cwe.mitre.org/data/definitions/20.html&quot; rel=&quot;nofollow&quot; href=&quot;http://cwe.mitre.org/data/definitions/20.html&quot;&gt;http://cwe.mitre.org/data/definitions/20.html&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Microsoft IIS Extended Unicode Directory Traversal Vulnerability&lt;/p&gt; &lt;p&gt;[12] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884&quot; rel=&quot;nofollow&quot; href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884&quot;&gt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Google XSS Vulnerability&lt;/p&gt; &lt;p&gt;[13] &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://shiflett.org/blog/2005/dec/googles-xss-vulnerability&quot;&gt;http://shiflett.org/blog/2005/dec/googles-xss-vulnerability&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Unicode/UTF-8&lt;/p&gt; &lt;p&gt;[14] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://en.wikipedia.org/wiki/UTF-8&quot; rel=&quot;nofollow&quot; href=&quot;http://en.wikipedia.org/wiki/UTF-8&quot;&gt;http://en.wikipedia.org/wiki/UTF-8&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Unicode/UTF-7&lt;/p&gt; &lt;p&gt;[15] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://en.wikipedia.org/wiki/UTF-7&quot; rel=&quot;nofollow&quot; href=&quot;http://en.wikipedia.org/wiki/UTF-7&quot;&gt;http://en.wikipedia.org/wiki/UTF-7&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Widescale Unicode Encoding Implementation Flaw Discovered&lt;/p&gt; &lt;p&gt;[16] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://www.cgisecurity.com/2007/05/widescale-unico.html&quot; rel=&quot;nofollow&quot; href=&quot;http://www.cgisecurity.com/2007/05/widescale-unico.html&quot;&gt;http://www.cgisecurity.com/2007/05/widescale-unico.html&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Unicode Left/Right Pointing Double Angel Quotation Mark&lt;/p&gt; &lt;p&gt;[17] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://jeremiahgrossman.blogspot.com/2009/06/results-unicode-leftright-pointing.html&quot; rel=&quot;nofollow&quot; href=&quot;http://jeremiahgrossman.blogspot.com/2009/06/results-unicode-leftright-pointing.html&quot;&gt;http://jeremiahgrossman.blogspot.com/2009/06/results-unicode-leftright-pointing.html&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Variable width encoding schemes&lt;/p&gt; &lt;p&gt;[18] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://en.wikipedia.org/wiki/Variable-width_encoding&quot; rel=&quot;nofollow&quot; href=&quot;http://en.wikipedia.org/wiki/Variable-width_encoding&quot;&gt;http://en.wikipedia.org/wiki/Variable-width_encoding&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Canonicalization, locale and Unicode&lt;/p&gt; &lt;p&gt;[19] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://www.owasp.org/index.php/Canoncalization,_locale_and_Unicode&quot; rel=&quot;nofollow&quot; href=&quot;http://www.owasp.org/index.php/Canoncalization,_locale_and_Unicode&quot;&gt;http://www.owasp.org/index.php/Canoncalization,_locale_and_Unicode&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Canonicalization&lt;/p&gt; &lt;p&gt;[20] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://en.wikipedia.org/wiki/Canonicalization&quot; rel=&quot;nofollow&quot; href=&quot;http://en.wikipedia.org/wiki/Canonicalization&quot;&gt;http://en.wikipedia.org/wiki/Canonicalization&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;The Methodology and an application to fight against Unicode attacks&lt;/p&gt; &lt;p&gt;[21] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://cups.cs.cmu.edu/soups/2006/proceedings/p91_fu.pdf&quot; rel=&quot;nofollow&quot; href=&quot;http://cups.cs.cmu.edu/soups/2006/proceedings/p91_fu.pdf&quot;&gt;http://cups.cs.cmu.edu/soups/2006/proceedings/p91_fu.pdf&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Improper Output Handling&lt;/p&gt; &lt;p&gt;[22] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://projects.webappsec.org/Improper-Output-Handling&quot; rel=&quot;nofollow&quot; href=&quot;http://projects.webappsec.org/Improper-Output-Handling&quot;&gt;http://projects.webappsec.org/Improper-Output-Handling&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Regular Expressions&lt;/p&gt; &lt;p&gt;[23] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://en.wikipedia.org/wiki/Regular_expression&quot; rel=&quot;nofollow&quot; href=&quot;http://en.wikipedia.org/wiki/Regular_expression&quot;&gt;http://en.wikipedia.org/wiki/Regular_expression&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Path Traversal&lt;/p&gt; &lt;p&gt;[24] &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;external free&quot; title=&quot;http://projects.webappsec.org/Path-Traversal&quot; rel=&quot;nofollow&quot; href=&quot;http://projects.webappsec.org/Path-Traversal&quot;&gt;http://projects.webappsec.org/Path-Traversal&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;HTTP Response Splitting&lt;/p&gt; &lt;p&gt;[25] &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://projects.webappsec.org/HTTP-Response-Splitting&quot;&gt;http://projects.webappsec.org/HTTP-Response-Splitting&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;HTTP Request Smuggling&lt;/p&gt; &lt;p&gt;[26] &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://projects.webappsec.org/HTTP-Request-Smuggling&quot;&gt;http://projects.webappsec.org/HTTP-Request-Smuggling&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Cross Site Scripting&lt;/p&gt; &lt;p&gt;[27] &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://projects.webappsec.org/Cross-Site-Scripting&quot;&gt;http://projects.webappsec.org/Cross-Site-Scripting&lt;/a&gt;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Microsoft Anti-Cross Site Scripting Library V3.0&lt;/p&gt; &lt;p&gt;[28] &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.microsoft.com/downloads/details.aspx?FamilyId=051ee83c-5ccf-48ed-8463-02f56a6bfc09&amp;amp;displaylang=en&quot;&gt;http://www.microsoft.com/downloads/details.aspx?FamilyId=051ee83c-5ccf-48ed-8463-02f56a6bfc09&amp;amp;displaylang=en&lt;/a&gt; &lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;HTML 5 &quot;pattern&quot; attribute&lt;/p&gt; &lt;p&gt;[29] &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.w3.org/TR/html5/forms.html#the-pattern-attribute&quot;&gt;http://www.w3.org/TR/html5/forms.html#the-pattern-attribute&lt;/a&gt;&lt;/p&gt;&lt;br /&gt;&lt;a href=&quot;http://projects.webappsec.org/Improper-Input-Handling&quot;&gt;Original here&lt;/a&gt;.</description><link>http://je-security.blogspot.com/2009/10/improper-input-handling.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-8468747725906526613</guid><pubDate>Sat, 03 Oct 2009 18:52:00 +0000</pubDate><atom:updated>2009-10-08T20:06:18.221-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">firefox</category><category domain="http://www.blogger.com/atom/ns#">securityfocus</category><category domain="http://www.blogger.com/atom/ns#">XSS</category><title>Brief: Firefox feature looks to foil XSS attacks</title><description>&lt;span class=&quot;body&quot;&gt;&lt;p&gt; The Mozilla Foundation released on Wednesday a preview version of the Firefox browser that implements a technology to protect against scripting attacks.&lt;/p&gt; &lt;p&gt; The technology, known as Content Security Policy, allows Web sites to specify restrictions on how they handle scripts. Using CSP, a Web site can create a white list of sites from which the browser should accept scripts as well as mandate that the scripts are labeled as applications and are not obfuscated. A &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;https://wiki.mozilla.org/Security/CSP/Spec&quot; target=&quot;_blank&quot;&gt;number of other features&lt;/a&gt; are also available, all aiming to prevent malicious scripts from executing in the context of the current site.&lt;/p&gt; &lt;p&gt; The preview does not implement the entire specification, and Mozilla is looking for testers and feedback, Brandon Sterne, security program manager for Mozilla &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://blog.mozilla.com/security/2009/09/30/a-glimpse-into-the-future-of-browser-security/&quot;&gt;stated in Wednesday&#39;s blog post&lt;/a&gt;.&lt;/p&gt; &lt;p&gt; &quot;Please be aware that there are still a few rough spots,&quot; Sterne said. &quot;The implementation is not quite complete so you may notice some small gaps between the preview builds and the spec.&quot;&lt;/p&gt; &lt;p&gt; Content Security Policy is &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.technologyreview.com/web/22940/&quot; target=&quot;_blank&quot;&gt;based on recommendations&lt;/a&gt; made by Robert &quot;rsnake&quot; Hansen back in 2005. Most browsers treat all scripts the same, executing in the context of the current site, no matter where they originated. The defacto policy is what allowed untrusted ads on &lt;cite&gt;The New York Times&lt;/cite&gt; site to &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://bits.blogs.nytimes.com/2009/09/14/times-site-was-victim-of-a-malicious-ad-swap/&quot; target=&quot;_blank&quot;&gt;recently serve up malicious software&lt;/a&gt; to visitors and allowed the &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.securityfocus.com/news/11405&quot;&gt;Samy and other Web worms&lt;/a&gt; to spread. Content Security Policy allows sites to tell browsers which scripts should be allowed as well as additional restrictions on scripting.&lt;/p&gt; &lt;p&gt; Mozilla has created a &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://people.mozilla.org/%7Ebsterne/content-security-policy/demo.cgi&quot; target=&quot;_blank&quot;&gt;demo page&lt;/a&gt; for security researchers who want to see content security policy in action.&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-weight: bold;font-size:85%;&quot; &gt;Source: &lt;a href=&quot;http://www.securityfocus.com/brief/1019?ref=rss&quot;&gt;securityfocus&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;/span&gt;</description><link>http://je-security.blogspot.com/2009/10/brief-firefox-feature-looks-to-foil-xss.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-5375484095148973108</guid><pubDate>Sat, 03 Oct 2009 17:49:00 +0000</pubDate><atom:updated>2009-10-08T20:04:10.353-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">risks</category><category domain="http://www.blogger.com/atom/ns#">security solutions</category><title>More solutions please</title><description>&lt;div class=&quot;entry-body&quot;&gt;                               &lt;p&gt;Over the last week, I&#39;ve attended a security awareness forum and spoken at a cloud computing conference. The major learning point highlighted by both events, was both predictable and significant: our current approach to security is failing to deliver and requires a major re-think. &lt;/p&gt; &lt;p&gt;I touched on this issue in my latest &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.infosecurityadviser.com/view_message/the_real_security_lesson_from_cloud_computing/142&quot;&gt;Infosecurity&lt;/a&gt; blog posting. The new world of cloud computing, for example, introduces a new set of problems that we have yet to experience. For many years, we&#39;ve assumed that we can manage emerging problems through risk management or best practice controls. Both approaches fail because we simply don&#39;t know what&#39;s lurking in those clouds. &lt;/p&gt; &lt;p&gt;The obvious answer is to switch to a more pragmatic approach of addressing the underlying, root causes of incidents, rather than trying to predict the future. Human failings, for example, are the most important factor in the vast majority of incidents, and this people-oriented trend will grow with increasing user power and connectivity. &lt;/p&gt; &lt;p&gt;Is this too simple? It probably is. Otherwise we would have adopted it decades ago. Just think, for example, how much better the world might be if we&#39;d fixed the password problem two decades ago. Simple is not easy but it often works best.&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Source: &lt;a href=&quot;http://www.computerweekly.com/blogs/david_lacey/2009/10/a_new_kind_of_security.html&quot;&gt;ComputerWeekly&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;/div&gt;</description><link>http://je-security.blogspot.com/2009/10/more-solutions-please.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-1508789891683902116</guid><pubDate>Fri, 02 Oct 2009 10:39:00 +0000</pubDate><atom:updated>2009-10-08T20:01:30.782-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">social engineering</category><title>Social Engineering at its best</title><description>In conjunction with a team of &lt;a bitly=&quot;BITLY_PROCESSED&quot; title=&quot;Social Engineering&quot; href=&quot;http://www.social-engineer.org/&quot; onclick=&quot;javascript:pageTracker._trackPageview(&#39;/outbound/article/www.social-engineer.org&#39;);&quot;&gt;social engineers&lt;/a&gt;, penetration testers and &lt;a bitly=&quot;BITLY_PROCESSED&quot; title=&quot;Information Security Training&quot; href=&quot;http://www.offensive-security.com/&quot; target=&quot;_blank&quot;&gt;information security experts&lt;/a&gt;, &lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;linkification-ext&quot; href=&quot;http://www.social-engineer.org/&quot; title=&quot;Linkification: http://www.social-engineer.org&quot;&gt;www.social-engineer.org&lt;/a&gt; is opening its “virtual” doors today. &lt;p&gt;The team at Offensive Security has been working with many contributors and specialists to put together the Webs Official Framework for Social Engineering.&lt;/p&gt; &lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; title=&quot;Social Engineering&quot; href=&quot;http://www.social-engineer.org/&quot; onclick=&quot;javascript:pageTracker._trackPageview(&#39;/outbound/article/www.social-engineer.org&#39;);&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;www.social-engineer.org&lt;/strong&gt;&lt;/a&gt; will house an ever growing framework for social engineering as well tools, how-to’s,  informational reviews and podcasts all geared at helping security minded professionals enhance their awareness and knowledge in the field of social engineering.  Join us at &lt;strong&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;linkification-ext&quot; href=&quot;http://www.social-engineer.org/&quot; title=&quot;Linkification: http://www.social-engineer.org&quot;&gt;http://www.social-engineer.org&lt;/a&gt;&lt;/strong&gt; for more info.&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;source: &lt;a href=&quot;http://www.offensive-security.com/blog/offsec/social-engineering-at-its-best/&quot;&gt;OffensiveSecurity&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;</description><link>http://je-security.blogspot.com/2009/10/social-engineering-at-its-best.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-937451437338911847</guid><pubDate>Sat, 26 Sep 2009 18:05:00 +0000</pubDate><atom:updated>2009-09-29T16:58:02.547-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">google</category><category domain="http://www.blogger.com/atom/ns#">IT</category><category domain="http://www.blogger.com/atom/ns#">pentestit</category><title>Tricks with Google!</title><description>&lt;p&gt;This write up is nothing related to &lt;a bitly=&quot;BITLY_PROCESSED&quot; title=&quot;Information Security&quot; href=&quot;http://pentestit.com/tag/information-security/&quot;&gt;Information Security&lt;/a&gt;. But, it is good to know information for. There are three tricks in all:&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;1. FastFlip through articles&lt;/span&gt;: Google recently launched a new service: &lt;span style=&quot;font-weight: bold;&quot;&gt;FastFlip,&lt;/span&gt; which can help you read online pages just as you flip through a magazine. These pages are indexed by the Google bot from many Google partner websites and presented to you for a quick read. You also have an option to choose the stuff you read by logging in to your account and customizing the application.&lt;/p&gt; &lt;p&gt;FastFlip can be found &lt;a bitly=&quot;BITLY_PROCESSED&quot; title=&quot;Google FastFlip&quot; href=&quot;http://663ff5a3.zxxo.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;here&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;2. Play Monopoly with Google Maps&lt;/span&gt;: This can be a leisure activity on those days when you do not have anything that’s fun to do. So, Google has teamed up with the worlds largest Monopoly board game manufacturer (!), so that you can use Google Maps as a board for Monopoly. The rules are similar to what we normally play. You initially get paid out 3 million Monopoly dollars (!) to play.&lt;/p&gt; &lt;p&gt;You can play this game &lt;a bitly=&quot;BITLY_PROCESSED&quot; title=&quot;Online Google Monopoly!&quot; href=&quot;http://b74d7c1c.zxxo.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;here&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;3. Search real time indexed pages on Google&lt;/span&gt;: So, you wish to keep up with your favorite web site as soon as Google has indexed its recently updated/added page? You can now do so using a parameter that we observed recently. This parameter is- &lt;strong style=&quot;font-weight: normal; font-style: italic;&quot;&gt;tbs=qdr:&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;You can get results with a seconds delay, i.e., after it being indexed! According to us, ‘tbs’ stands for ‘to be scanned’ and ‘qdr’ stands for ‘query data range’! This might not be the true meaning. &lt;img src=&quot;http://pentestit.com/wp-includes/images/smilies/icon_razz.gif&quot; alt=&quot;:P&quot; class=&quot;wp-smiley&quot; title=&quot;Tricks with Google!&quot; /&gt;  It can take the following units – &lt;span style=&quot;text-decoration: underline;&quot;&gt;s&lt;/span&gt; (second), &lt;span style=&quot;text-decoration: underline;&quot;&gt;n &lt;/span&gt;(minute. We don’t know why they do not have a &lt;span style=&quot;font-style: italic;&quot;&gt;m&lt;/span&gt; instead), &lt;span style=&quot;text-decoration: underline;&quot;&gt;h&lt;/span&gt; (hour), &lt;span style=&quot;text-decoration: underline;&quot;&gt;d&lt;/span&gt; (day), &lt;span style=&quot;text-decoration: underline;&quot;&gt;w&lt;/span&gt; (week) , &lt;span style=&quot;text-decoration: underline;&quot;&gt;m&lt;/span&gt; (month) and &lt;span style=&quot;text-decoration: underline;&quot;&gt;y&lt;/span&gt; (year). For example,&lt;/p&gt; &lt;p&gt;tbs=qdr:s1 [1 second delay]&lt;br /&gt;tbs=qdr:n1 [1 minute delay]&lt;br /&gt;tbs=qdr:h1 [1 hour delay]&lt;br /&gt;tbs=qdr:d1 [1 day delay]&lt;br /&gt;tbs=qdr:w1 [1 week delay]&lt;br /&gt;tbs=qdr:m1 [1 month delay]&lt;br /&gt;tbs=qdr:y1 [1 year delay]&lt;/p&gt; &lt;p&gt;For example, &lt;a href=&quot;http://www.google.com/search?q=Javier%20Echaiz&amp;amp;tbs=qdr:d1&quot;&gt;http://www.google.com/search?q=Javier%20Echaiz&amp;amp;tbs=qdr:d1&lt;strong&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Source: &lt;a href=&quot;http://pentestit.com/2009/09/24/tricks-google/&quot;&gt;pentestit&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;</description><link>http://je-security.blogspot.com/2009/09/tricks-with-google.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-8007297532757197708</guid><pubDate>Sat, 26 Sep 2009 14:15:00 +0000</pubDate><atom:updated>2009-09-29T16:53:26.586-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">antivirus</category><category domain="http://www.blogger.com/atom/ns#">firewall</category><category domain="http://www.blogger.com/atom/ns#">pentestit</category><category domain="http://www.blogger.com/atom/ns#">software</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Comodo Internet Security – Free All-in-one Firewall &amp; Antivirus</title><description>&lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; title=&quot;Comodo Internet Security&quot; href=&quot;http://pentestit.com/tag/comodo-internet-security/&quot;&gt;Comodo Internet Security&lt;/a&gt; is the free, multi-layered security application that keeps hackers out and personal information in.&lt;/p&gt; &lt;p&gt;Built from the ground upwards with your security in mind, CIS offers 360° protection by combining powerful Antivirus protection, an enterprise class packet filtering firewall, and an advanced host intrusion prevention system called Defense+.&lt;/p&gt; &lt;p&gt;&lt;img src=&quot;http://pentestit.com/wp-content/uploads/HLIC/b841a20b74588c28b5cb6bf32020b126.jpg&quot; alt=&quot;b841a20b74588c28b5cb6bf32020b126 Comodo Internet Security   Free All in one Firewall &amp;amp; Antivirus &quot; title=&quot;Comodo Internet Security   Free All in one Firewall &amp;amp; Antivirus &quot; /&gt;&lt;/p&gt; &lt;p&gt;Features of Comodo &lt;a bitly=&quot;BITLY_PROCESSED&quot; title=&quot;Internet Security&quot; href=&quot;http://pentestit.com/tag/internet-security/&quot;&gt;Internet Security&lt;/a&gt;&lt;/p&gt; &lt;p&gt;- All-in-one &lt;a bitly=&quot;BITLY_PROCESSED&quot; title=&quot;Firewall &amp;amp; Antivirus&quot; href=&quot;http://pentestit.com/tag/firewall-antivirus/&quot;&gt;Firewall &amp;amp; Antivirus&lt;/a&gt;&lt;br /&gt;- Defends your PC from Internet attacks&lt;br /&gt;- Detects and eliminates viruses&lt;br /&gt;- Prevents malware from being installed&lt;br /&gt;- Easy to install, configure and use&lt;br /&gt;- Free to both business and home users&lt;br /&gt;- Default Deny Protection (DDP)&lt;br /&gt;- Prevention-based protection&lt;br /&gt;- Personalized protection alerts&lt;br /&gt;- Real-time access to updated virus definitions&lt;br /&gt;- One-click virus scanning&lt;br /&gt;- Uncluttered, user-friendly interface&lt;br /&gt;- Thorough security “wizards”&lt;br /&gt;- Unique “slider” to easily change your current security level&lt;br /&gt;- Exclusive access to Comodo’s “safe-list”&lt;/p&gt; &lt;p&gt;Comodo Internet Security Includes:&lt;/p&gt; &lt;p&gt;Firewall: Slam the door shut on hackers and identity thieves.&lt;br /&gt;Antivirus: Track down and destroy any existing malware hiding in a PC.&lt;br /&gt;Defense+: Protects critical system files and blocks malware before it installs.&lt;br /&gt;Memory Firewall: Cutting-edge protection against sophisticated buffer overflow attacks.&lt;br /&gt;Anti-Malware Kills malicious processes before they can do harm.&lt;/p&gt; &lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; title=&quot;Operating system&quot; href=&quot;http://pentestit.com/tag/operating-system/&quot;&gt;Operating system&lt;/a&gt;:&lt;/p&gt; &lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; title=&quot;Windows&quot; href=&quot;http://pentestit.com/category/windows/&quot;&gt;Windows&lt;/a&gt; XP (SP2) or Vista 32 bit&lt;br /&gt;64 MB RAM / 70 MB hard disk space&lt;br /&gt;Windows XP (SP2) or Vista 64 bit&lt;br /&gt;64 MB RAM / 105 MB hard disk space&lt;/p&gt; &lt;p&gt;We have published and revied anti virus and firewalls, this one is effective and proctects you from bad guys and their malwares. Tested on windows XP full of internet virus it manged to clean 98 %  of known virus and 70 % modified malwares.  As it also has firewall so browser hijack was also detected but was not cleaned. overall we were protected and its also Free !!!. So we had some soft corner.&lt;/p&gt; &lt;p&gt;Download Comodo Internet Security &lt;a bitly=&quot;BITLY_PROCESSED&quot; target=&quot;_blank&quot; href=&quot;http://120f9954.linkbucks.com/&quot;&gt;Here&lt;/a&gt;&lt;/p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Source: &lt;/span&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://pentestit.com/2009/09/26/comodo-internet-security-free-allinone-firewall-antivirus/&quot;&gt;pentestit.com&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;.&lt;/span&gt;</description><link>http://je-security.blogspot.com/2009/09/comodo-internet-security-free-all-in.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-5652263525860228577</guid><pubDate>Fri, 25 Sep 2009 23:42:00 +0000</pubDate><atom:updated>2009-09-29T16:50:11.193-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">eWeek</category><category domain="http://www.blogger.com/atom/ns#">phishing</category><category domain="http://www.blogger.com/atom/ns#">twitter</category><title>Twitter DM Phishing Scam</title><description>&lt;p&gt;As &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.darknet.org.uk/tag/twitter/&quot;&gt;Twitter&lt;/a&gt; gains momentum there are more and more attacks on it, it’s users and the most recent is a phishing scam via DM (Direct Message).&lt;/p&gt; &lt;p&gt;It was uncovered recently that it was being used as a &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.darknet.org.uk/2009/08/twitter-being-used-as-botnet-command-channel/&quot;&gt;Botnet Control Channel&lt;/a&gt;, shortly before that it was &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.darknet.org.uk/2009/08/twitter-facebook-taken-offline-by-ddos-attacks/&quot;&gt;subjected to a DoS attack&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;This isn’t the first time &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.darknet.org.uk/2009/01/phishing-attacks-hits-twitter-users-utilising-direct-messages/&quot;&gt;DMs have been used in a Phishing attack &lt;/a&gt;too.&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;Phishers are targeting Twitter users in a new attack involving direct messages sent to Twitter users containing a link to a site requesting user log-ins.&lt;/p&gt; &lt;p&gt;There are reports of a new phishing scam making the rounds on Twitter. The attack seeks to steal user credentials by sending tweets out with links to a phishing site. The attack site requests the user’s log-in information; once the attackers have that, they can take over the account of the victim and use it to send out more messages.&lt;/p&gt; &lt;p&gt;According to messages from Twitter users, the tweets with the link to the phishing site have to do with the sender supposedly making a certain amount of money. Such periodic phishing attacks on users of the popular microblogging service have become a fact of life.&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;I’m not exactly sure why anyone would want to steal a bunch of Twitter accounts? Perhaps to monetize them somehow with spam/affiliate schemes.&lt;/p&gt; &lt;p&gt;But the current threat on Twitter is a phishing scam executed via DM with a link to various things including ways to make money, a video of you or some other juicy gossip.&lt;/p&gt; &lt;p&gt;The cornerstones of social engineering in phishing attacks.&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;In May, researchers at Sophos reported that a number of Twitter users were lured to a phishing site via a tweet with the message: “check this guy out [tinyurl address leading to the attack site].” As was the case in that instance, URL shortening services are increasingly being abused by attackers to mask the Websites they are sending their victims to.&lt;/p&gt; &lt;p&gt;Besides drawing attackers as it has grown, Twitter has also gotten the interest of security researchers, as shown by the “Month of the Twitter Bugs.”&lt;/p&gt; &lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://twitter.com/spam/status/4322713588&quot;&gt;Twitter warned users about the attack&lt;/a&gt;, stating in a message: “A bit o’ phishing going on—if you get a weird direct message, don’t click on it and certainly don’t give your log-in creds!” &lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;If you are using Twitter you should follow &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://twitter.com/spam&quot;&gt;@spam&lt;/a&gt; and keep up to date with what is happening on the network.&lt;/p&gt; &lt;p&gt;Source: &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.eweek.com/c/a/Security/Twitter-Hit-by-New-Phishing-Attack-453387/?kc=rss&quot;&gt;eWeek&lt;/a&gt;&lt;/p&gt;</description><link>http://je-security.blogspot.com/2009/09/twitter-dm-phishing-scam.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-1541596236443361212</guid><pubDate>Tue, 22 Sep 2009 03:22:00 +0000</pubDate><atom:updated>2009-09-29T16:47:49.748-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">misc</category><category domain="http://www.blogger.com/atom/ns#">nycgraphix</category><category domain="http://www.blogger.com/atom/ns#">software</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Windows Software</title><description>&lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.avast.com/eng/down_home.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Avast&lt;/span&gt;&lt;/a&gt;: Another free Anti-Virus software. Just as good as AVG. However this one is more system intensive than AVG or NOD.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.bitdefender.com/bd/site/products.php?p_id=24&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Bitdefender&lt;/span&gt;&lt;/a&gt;:                                    Popular anti-virus software- Free of charge. &lt;span style=&quot;color: rgb(255, 255, 204);&quot;&gt;Free- NOT real time scanning                                    -only manual scanning)&lt;/span&gt;&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.clamwin.com/index.php?option=content&amp;amp;task=view&amp;amp;id=40&amp;amp;Itemid=25&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;ClamWin&lt;/span&gt;&lt;/a&gt;:                                    Small and non-intrusive anti-virus. Like Bitdefender                                    &lt;span style=&quot;color: rgb(255, 255, 204);&quot;&gt;(Free- NOT real time scanning                                    -only manual scanning)&lt;/span&gt;&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.free-av.com/index.htm&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;AntiVir&lt;/span&gt;&lt;/a&gt;: An anti-virus that has been around for a long time – still free for home use.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.eeye.com/html/products/blink/personal/index.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Blink&lt;/span&gt;&lt;/a&gt;: First security solution to build all of the necessary protection layers into a very lightweight package. &lt;span style=&quot;color: rgb(255, 255, 204);&quot;&gt;(Contains a software                                    Firewall)&lt;/span&gt;&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.nexgold.com/aff/AFFILIATE_ID&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;NOD32&lt;/span&gt;&lt;/a&gt;: The absolute BEST anti-virus protection. (I know, I clean scumware for a living). &lt;span style=&quot;color: rgb(153, 0, 0);&quot;&gt;30day                                    trial.&lt;/span&gt; Or purchase.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.kaspersky.com/downloads&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Kaspersky&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;style1&quot;&gt;: &lt;/span&gt;A very sweet anti-virus software with                                    a &lt;span style=&quot;color: rgb(153, 0, 0);&quot;&gt;30day trial.&lt;/span&gt; Be sure to JUST get the AV, not the full suite                                    of bloatness.&lt;/p&gt; &lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.moosoft.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;TheCleaner&lt;/span&gt;&lt;/a&gt;:   This finds/prevents trojan horses. This is on a &lt;span style=&quot;color: rgb(153, 0, 0);&quot;&gt;30day   trial&lt;/span&gt;, however very recommended – try it.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.diamondcs.com.au/index.php?page=products&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;DiamondCS&lt;/span&gt;&lt;/a&gt;:   Many high-end programs for worm/Trojan detection, &lt;span style=&quot;color: rgb(153, 0, 0);&quot;&gt;30day   trial&lt;/span&gt;. &lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.windowsecurity.com/trojanscan/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Windowsecurity&lt;/span&gt;&lt;/a&gt;:   Free online Trojan scanner.&lt;/p&gt; &lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://download.com.com/3000-2094-10045910.html?legacy=cnet&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Ad-Aware                                    SE&lt;/span&gt;&lt;/a&gt;: Great for getting rid of spyware and malware – the items that can cause annoying pop-ups.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://fileforum.betanews.com/download/Spybot_Search_and_Destroy/1043809773/1&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;SpyBot&lt;/span&gt;&lt;/a&gt;: Similar to Ad-Aware, however more aggressive. Clean up spyware and hijack attempts.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.tenebril.com/downloads/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;SpyCatcher&lt;/span&gt;&lt;/a&gt;&lt;strong&gt;: &lt;/strong&gt;Active Protection. One of the most advanced antispyware solution available as a free service.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.ewido.net/en/download/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;AVG                                    AntiSpyware &lt;/span&gt;&lt;/a&gt;&lt;strong&gt;: &lt;/strong&gt;Clean annoying malware such as spyware, Trojans and hijackers. Great compliment to an anti-virus.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.malwarebytes.org/index.php&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;style1&quot;&gt;MalwareBytes&lt;/span&gt;:&lt;/a&gt; Since programs like Ad-Aware have become.. crap, this is a GREAT replacement for cleaning.                                   &lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.sunbelt-software.com/sap/c/?aff_id=15307&amp;amp;p=410&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;CounterSpy&lt;/span&gt;&lt;/a&gt;:&lt;strong&gt; &lt;/strong&gt;Probably the best shield against spyware. The best database cleaner there is. Period. &lt;span class=&quot;PageText12&quot;&gt; &lt;span style=&quot;color: rgb(153, 0, 0);&quot;&gt;30day                                    trial&lt;/span&gt;.&lt;/span&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.comodo.com/boclean/boclean.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Comodo                                    BOClean&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;style1&quot;&gt;:&lt;/span&gt;&lt;strong&gt; &lt;/strong&gt;This is more of a “real time” (run the the background) anti-spyware. Not a fan of TSR’s, but this works.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.intermute.com/spysubtract/cwshredder_download.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;CWShredder&lt;/span&gt;&lt;/a&gt;: Takes care of many hijacking software – run if you get many pop-ups/redirecting pages.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.spywareinfo.com/%7Emerijn/downloads.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;HijackThis&lt;/span&gt;&lt;/a&gt;: Tool to find out if there is “hijack” software on your system. Use the &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.hijackthis.de/index.php?langselect=english&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;logfile                                    analyzer&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;style1&quot;&gt; &lt;/span&gt;if                                    your not sure.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.ramsinks.com/get/Kill2Me.exe&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Kill2me&lt;/span&gt;&lt;/a&gt;:                                    Another stomper of spyware – bring it on.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.ramsinks.com/get/KillBox.zip&quot;&gt;&lt;span style=&quot;style1&quot;&gt;KillBox&lt;/span&gt;&lt;/a&gt;: Very nice for taking care of “Abetterinternet” and other n00bish software.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://esd.element5.com/affiliate.html?affiliateid=62338&amp;amp;publisherid=34449&amp;amp;target=http%3A%2F%2Fwww.emsisoft.com%2Fen%2Fsoftware%2Ffree%2F%3F&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;a²                                    free&lt;/span&gt;&lt;/a&gt;: This bridges the gap with anti-virus and malware. This free scanner cleans Trojans, worms, spyware (all malware).&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.javacoolsoftware.com/spywareblaster.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;SpywareBlaster&lt;/span&gt;&lt;/a&gt;:                                    Active &lt;strong&gt;prevention&lt;/strong&gt; against spyware,                                    adware, browser hijackers and dialers.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.hitmanpro.nl/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;HitmanPro2&lt;/span&gt;&lt;/a&gt;: Incorporates all major Anti-Spyware software and updates/runs them all for you. Too cool.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://windowsupdate.62nds.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;WinDiz&lt;/span&gt;&lt;/a&gt;: Windows updates with FireFox. Great if ActiveX is damaged by spyware.&lt;/p&gt; &lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://popfile.sourceforge.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;POPfile&lt;/span&gt;&lt;/a&gt;:   Perfect/Free ani-Spam tool. Involved installation, but   once it’s set – it’s good.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.myaffiliateprogram.com/u/hatespam/e.asp?e=5&amp;amp;id=4078&amp;amp;p=iHateSpam&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;IHateSpam&lt;/span&gt;&lt;/a&gt;:   For Exchange (V5.5, 2000 and 2003) was uniquely developed   to be both user and admin-friendly. &lt;span style=&quot;color: rgb(153, 0, 0);&quot;&gt;30day   trial&lt;/span&gt;.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.spamihilator.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Spamihilator&lt;/span&gt;&lt;/a&gt; works between your E-Mail client and the net. Useless   spam mails (Junk) will be filtered out.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://spambayes.sourceforge.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;SpamBayes&lt;/span&gt;&lt;/a&gt;:   is a tool used to segregate unwanted mail (spam) from   the mail you want (ham).&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.spampal.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;SpamPal&lt;/span&gt;&lt;/a&gt;:   Mail classification program that separates your spam   from the mail you really want to read.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.0spam.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;OSpam&lt;/span&gt;&lt;/a&gt;:   A great and simple spam solution for any POP account.&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.docsdownloads.com/download/spf.exe&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Sygate&lt;/span&gt;&lt;/a&gt;.&lt;/span&gt; Just bought by Symantec – now it’s going to                                    be crap. Hurry and get this before it happens.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.webmasterfree.com/tpfw.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Tiny&lt;/span&gt;:&lt;/a&gt; Tiny is a free firewall. It is designed for the more advanced due to the heavy features included.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;style1&quot; href=&quot;http://www.personalfirewall.comodo.com/&quot; target=&quot;_blank&quot;&gt;Comodo&lt;/a&gt;: Great little personal firewall. This is pretty new and robust.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.agnitum.com/products/outpostfree/index.php&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;OutPost&lt;/span&gt;&lt;/a&gt;: An Opensource based firewall. Works very well protecting against worms, trojans and hackers.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.myaffiliateprogram.com/u/hatespam/b.asp?id=4078&amp;amp;img=kerio_sunbelt.gif&amp;amp;p=Kerio&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Kerio&lt;/span&gt;&lt;/a&gt;: Smart, easy-to-use personal security technology that fully protects PC’s against hackers and internal misuse.&lt;span style=&quot;color: rgb(0, 255, 255);&quot;&gt; &lt;em&gt;The                                    best.&lt;/em&gt;&lt;/span&gt;&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.bluetack.co.uk/modules.php?name=Content&amp;amp;pa=showpage&amp;amp;pid=2&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Protowall&lt;/span&gt;&lt;/a&gt;: Very small application that blocks IP address. Very cool.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://free.prevx.com/&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Prevx&lt;/span&gt;&lt;/a&gt;: Stops the attacks that bypass anti-virus and firewall products.&lt;/p&gt; &lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.ovsoft.com/powercry_eng.htm&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;PowerCrypt                                    2000&lt;/span&gt;:&lt;/a&gt; Encrypted files, folders and E-mails. This free file lets you hide all your data.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.pgp.com/products/freeware.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;PGP&lt;/span&gt;&lt;/a&gt;: “Pretty Good Privacy”. Actually it’s probably the best encryption software out there. Free – PC/MAC&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.cypherix.co.uk/cryptainerle/index.htm&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Cryptainer                                    LE&lt;/span&gt;&lt;/a&gt;: Secure your data and ensure absolute                                    privacy with Cypherix’s powerful 128bit encryption.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.geocities.com/moshe_szweizer&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;BitCrypt&lt;/span&gt;&lt;/a&gt;: A sophisticated tool allowing for encryption of plain text within a bitmap image.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.handybits.com/easycrypto.htm&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;EasyCrypto&lt;/span&gt;&lt;/a&gt;: Encrypt both standalone files and entire folders. Many cool options here.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.truecrypt.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Truecrypt&lt;/span&gt;&lt;/a&gt;: Free open-source disk encryption software for Windows XP/2000/2003.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.ramsinks.com/get/md5hash%20password%20generator.zip&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;MD5HashGen&lt;/span&gt;&lt;/a&gt;: Simple application that can generate one-way MD5 hashes – Great for password generations.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;https://www.grc.com/pass&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;PerfectPasswords&lt;/span&gt;&lt;/a&gt;:                                    GRC’s Ultra High Security Password Generator&lt;span style=&quot;font-size: xx-small; font-family: Trebuchet MS;&quot;&gt;.&lt;br /&gt;&lt;/span&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.roboform.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;RoboForm&lt;/span&gt;&lt;/a&gt;: A free password manager and one-click web form filler. Just be carefull who uses your PC.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://passwordsafe.sourceforge.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Password                                    Safe&lt;/span&gt;&lt;/a&gt;: Allows you to have a different password for all the different items that you deal with – remembers for you.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;style1&quot; href=&quot;http://www.cutepasswordmanager.com/&quot; target=&quot;_blank&quot;&gt;CutePasswordManager:&lt;/a&gt; Form filling software that auto fill user/password. Stores info with 256-bit AES encryption – 1click login. &lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;*&lt;/span&gt;&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.mirekw.com/winfreeware/pins.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;PIN’s&lt;/span&gt;&lt;/a&gt;: Storing of any secure information like passwords, accounts, PINs etc&lt;span style=&quot;font-size: xx-small; font-family: Trebuchet MS;&quot;&gt;. &lt;/span&gt; 448 bit Blowfish. Does not install.&lt;/p&gt; &lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.heidi.ie/eraser/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Eraser&lt;/span&gt;:&lt;/a&gt; FBI just kick in the door? This little program will   erase data to a level that the Dept. Of. Defense uses.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.killdisk.com/downloadfree.htm&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;KillDisk&lt;/span&gt;&lt;/a&gt;:   KillDisk conforms to US Department of Defense clearing   and sanitizing standard DoD 5220.22-M.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://staff.washington.edu/jdlarios/autoclave&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;AutoClave&lt;/span&gt;&lt;/a&gt;:   Hard drive sterilization on a bootable floppy.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.analogx.com/contents/download/system/shred.htm&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;SuperShredder&lt;/span&gt;&lt;/a&gt;:   Shred’s individual files. It’s stronger than DOD specs.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://dban.sourceforge.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;DBAN&lt;/span&gt;&lt;/a&gt; (”Darik’s Boot and Nuke”) is a self-contained   boot floppy that makes it an appropriate utility data   destruction.&lt;/p&gt; &lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.anonymizer.com/download.shtml&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Anonymizer&lt;/span&gt;&lt;/a&gt;:   Installs a small toolbar into your browser. Moves your   connection to proxies around the word. Slows connection.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.shareasale.com/r.cfm?b=14213&amp;amp;u=112046&amp;amp;m=4160&amp;amp;urllink=&amp;amp;afftrack=&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Proxify.com&lt;/span&gt;&lt;/a&gt; Spoof your IP address without installing software. The   paid version is much faster.&lt;/p&gt; &lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.almico.com/sfdownload.php&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;SpeedFan&lt;/span&gt;:&lt;/a&gt; Allows you to see your CPU temperature. Good for overclockers   and modders.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://mbm.livewiredev.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Motherboard   Monitor&lt;/span&gt;&lt;/a&gt;: Like speedfan, reads temperature   and fan RPM data – alerts you when there’s trouble.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.ramsinks.com/get/sisetup.exe&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Si   Meter&lt;/span&gt;:&lt;/a&gt; Great/free/small application that   does live monitoring on system resources.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.sysinternals.com/ntw2k/freeware/tdimon.shtml&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;TDIMon&lt;/span&gt;&lt;/a&gt;:   Lets you monitor TCP and UDP activity on your local   system.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.intermapper.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;InterMapper&lt;/span&gt;&lt;/a&gt;:   Gives a visual in real-time view of traffic flows through   and between critical network devices and links.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.winbar.nl/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;WinBar&lt;/span&gt;&lt;/a&gt;:   A compact program that lets you monitor your system   and provides easy access to frequently used controls.&lt;/p&gt; &lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.macecraft.com/downloads/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;RegSupreme&lt;/span&gt;:&lt;/a&gt; Clean up the registry from old entries, speed up your   system. &lt;span style=&quot;color: rgb(153, 0, 0);&quot;&gt;30day trial&lt;/span&gt;.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.hoverdesk.net/freeware.htm&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;RegSeeker&lt;/span&gt;&lt;/a&gt;:   Very tiny – does not install. I have tested this and   trust it. Many tweak options with it. &lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://downloads.planetmirror.com/pub/majorgeeks/registry/regscrubxpsetup_3.2.exe&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;RegscrubXP&lt;/span&gt;&lt;/a&gt;:   A great free registry cleaner for XP. Fix those “weird   issues” with Windows.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://boozet.xepher.net/beclean/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Beclean&lt;/span&gt;&lt;/a&gt;:   is the complete suite of system cleaner. Registry to   history – cleans many things.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.ccleaner.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;CCleaner&lt;/span&gt;&lt;/a&gt;:   Removes unused and temporary files from your PC – allowing   it to run faster, more efficiently and saving space.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.nirsoft.net/utils/myuninst.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;MyUninstaller   1.0&lt;/span&gt;&lt;/a&gt;: Uninstall anything,clean out old video   drivers, uninstall programs that are not in “add/remove”.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.ramsinks.com/get/DriverCleaner.zip&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;DriverCleaner&lt;/span&gt;&lt;/a&gt;:   Made to &lt;strong&gt;fully&lt;/strong&gt; clean out the drivers   of ATI and NVIDIA.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.ramsinks.com/get/msconfig.exe&quot;&gt;&lt;span style=&quot;style1&quot;&gt;MSconfig&lt;/span&gt;&lt;/a&gt;:   Get rid of startup programs that slow your PC down.   This would be for Windows 2000.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.webattack.com/get/starter.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Starter&lt;/span&gt;:&lt;/a&gt; It’s better than Msconfig. Also works with Windows 2000,   which is nice due to the fact that 2k doesn’t have msconfig.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.ramsinks.com/get/windowsxp%20prefetch-clean.exe&quot;&gt;&lt;span style=&quot;style1&quot;&gt;PreFetch   cleaner&lt;/span&gt;&lt;/a&gt;: A pre-fetch scrubber to clean out   files that are used commonly – can be corruption or   spyware hiding.&lt;/p&gt; &lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.belarc.com/free_download.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Belarc&lt;/span&gt;&lt;/a&gt;: Takes a snap-shot about a PC (hardware-software) with a full profile report. This is very handy.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.gtopala.com/index.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;SIW&lt;/span&gt;&lt;/a&gt;: A small .exe that when ran – gives you all kinds of info about your PC and software. Need this on your tools disk.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.ramsinks.com/get/pcpbios.zip&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;PcpBios&lt;/span&gt;&lt;/a&gt;: Very tiny script that looks at all BIOS related information. RAM, CPU and motherboard instant info.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.lavalys.com/products/download.php?pid=1&amp;amp;lang=en&amp;amp;pageid=3&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;EVEREST&lt;/span&gt;&lt;/a&gt;: (recently AIDA32). Like Belarc, gives full system summary of hardware and software/keys.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.werkema.com/software/spacemonger.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;SpaceMonger&lt;/span&gt;&lt;/a&gt;: A tool for keeping track of the free space on your computer. It shows a graph of files and sizes.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.wildpackets.com/products/ipsubnetcalculator&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;IP                                    subnet calculator&lt;/span&gt;&lt;/a&gt;: A diagnostics tool to calculate your network latency and subnet information.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.cpuid.com/cpuz.php&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;CPUid&lt;/span&gt;&lt;/a&gt;: A very small application that tells you about your specific specs. (FSB, core clock, dual channel etc.).&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://pcpitstop.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;PC                                    Pitstop&lt;/span&gt;:&lt;/a&gt; A good site to check how your doing on fine tuning your computer. It will also help you fix your issues.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.maxtor.com/en/support/downloads/powermax.htm&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;PowerMax&lt;/span&gt;:&lt;/a&gt; Diagnostics for hard drives made by Maxtor. Download, put on a floppy or CD and test your HDD.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.memtest86.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;MemTest86&lt;/span&gt;:&lt;/a&gt; Diagnostics for your RAM. Download, put on a                                    floppy or Cd and test your RAM.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.entechtaiwan.net/util/moninfo.shtm&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Monitor                                    Asset Manager&lt;/span&gt;&lt;/a&gt;: A Plug and Play monitor information utility. Provide detailed technical information about the target display.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;https://www.grc.com/x/ne.dll?bh0bkyd2&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;ShieldsUP&lt;/span&gt;&lt;/a&gt;: Port scanning of all ports or custom scans. See how good your firewall is doing.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.dslreports.com/stest&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;BandwidthTest&lt;/span&gt;&lt;/a&gt;:                                    Test your internet connection speed.&lt;/p&gt; &lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.microsoft.com/windowsxp/pro/downloads/powertoys.asp&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;TweakUI&lt;/span&gt;:&lt;/a&gt; Perfect for somebody who really wants to customize   there XP. Made my Microsoft&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.x-setup.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;X-Setup&lt;/span&gt;&lt;/a&gt;:   Like TweakUI but with more functionality and options.   Very slick.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.users.on.net/johnson/resourcehacker/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;ResourceHacker&lt;/span&gt;&lt;/a&gt;:   Get in and really tweak or fix Windows. Great registry   GUI hacking.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.ramsinks.com/get/regkey.zip&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;RenameRecycleBin&lt;/span&gt;&lt;/a&gt;:   I made this registry value in notepad, download/double-click/”yes”/throw   away, rename your recycle bin.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.kellysoftware.com/ssaver/Matrix_ks.asp&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Matrix   Screensaver&lt;/span&gt;&lt;/a&gt;: Best (only) Matrix screensaver   out on the web. Great options. &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.ramsinks.com/get/matrix.txt&quot; target=&quot;_blank&quot;&gt;Here&lt;/a&gt; is actual text (change name for you)&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.foood.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;FOOOD’s   Icons&lt;/span&gt;: &lt;/a&gt; Great free icons for XP. Default   is boring.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.tcbmi.com/strokeit/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Strokit&lt;/span&gt;&lt;/a&gt;:   Advanced mouse gesture recognition engine and command   processor.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;ftp://files.3dnews.ru/pub/tweakers/video_tools/reforce.zip&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;ReForce&lt;/span&gt;:&lt;/a&gt; Windows 2k and XP have an issue with Hz in games.   This will allow you to set all games at a specific   Hz setting.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.dev-labs.com/kr/keyboard.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Keyboard   Remapper&lt;/span&gt;&lt;/a&gt;: Remap your keyboard keys. Easy   enough.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.clocx.tk/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;ClocX&lt;/span&gt;&lt;/a&gt;:   Analog clock for the desktop.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;style1&quot; href=&quot;http://xpadder.com/index.html&quot; target=&quot;_blank&quot;&gt;Xpadder:&lt;/a&gt; Map your game pad or RC TX to keyboard keys. Wokrs great for customized controllers.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://bluefive.pair.com/alarm.htm&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Alarm&lt;/span&gt;&lt;/a&gt;: A digital clock that you can set to display a message and play a sound at a time of your choice. AlarmClock&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.tropicdesigns.net/modules.php?name=Content&amp;amp;pa=showpage&amp;amp;pid=1&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;WeatherPlus&lt;/span&gt;&lt;/a&gt;: Display satellite images and video around the globe, stay updated on current and expected weather conditions.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.nliteos.com/download.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Nlite&lt;/span&gt;&lt;/a&gt;: Remove or add Windows components to your Windows CD – for next time you re-install Windows.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.autopatcher.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;AutoStreamer&lt;/span&gt;&lt;/a&gt;: Just like Nlite, this is specifically for adding Service Packs to your Windows install CD’s.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.digitalblasphemy.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Digital                              Blasphemy&lt;/span&gt;&lt;/a&gt;: Probably the best wallpapers                            and images on the net.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.konfabulator.com/download&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Konfabulator&lt;/span&gt;&lt;/a&gt;: Engine that lets you run little files called Widgets that can do pretty much whatever you want them to.&lt;/p&gt; &lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.pcinspector.de/file_recovery/uk/welcome.htm&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;File   Recovery&lt;/span&gt;:&lt;/a&gt; This is free software made by PC   Inspector. Really, Really nice if you lost or trashed   a file and need it back.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.pcinspector.de/smart_media_recovery/uk/welcome.htm&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Smart   Recovery&lt;/span&gt;&lt;/a&gt;: Recover data from flash drives:   CF, SM, Thumbdrives, micro drives – etc.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.theabsolute.net/sware/dskinv.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Disk   Investigator&lt;/span&gt;&lt;/a&gt;: Discover all that is hidden   on your computer hard disk, recover lost data.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.snapfiles.com/get/filescavenger.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;File   Scavenger&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;style1&quot;&gt;:&lt;/span&gt; Undelete   and data recovery utility for NTFS volumes. 64KB or   smaller files can be recovered with free trial.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.elpros.si/CDCheck/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;CDCheck&lt;/span&gt;&lt;/a&gt;:   Utility for the prevention, detection and recovery of   damaged files on CD-ROMs and error detection.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.kellys-korner-xp.com/regs_edits/REST2514.EXE&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Restoration&lt;/span&gt;&lt;/a&gt;:   Tiny program that doesn’t install. Perfect if you trashed   a file (even emptied the recycle bin) and you need it   back.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.ramsinks.com/get/recover%20Outlook%20E-mail.zip&quot;&gt;&lt;span style=&quot;style1&quot;&gt;RecoverOutlookMail&lt;/span&gt;&lt;/a&gt;:   A little trick for recovering those corrupted .PST files.&lt;/p&gt; &lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.spreadfirefox.com/?q=affiliates&amp;amp;id=45114&amp;amp;t=55&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;FireFox&lt;/span&gt;&lt;/a&gt;: Drop Internet Explorer and get a superior browser. Check out the &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;https://addons.mozilla.org/en-US/firefox/&quot; target=&quot;_blank&quot;&gt;add-ons&lt;/a&gt;.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;style1&quot; href=&quot;http://www.google.com/chrome&quot; target=&quot;_blank&quot;&gt;Google Chrome&lt;/a&gt;: A great webkit based browser by Google. Very fast. &lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;*&lt;/span&gt;&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.opera.com/download/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Opera&lt;/span&gt;&lt;/a&gt;: If you don’t use FireFox, use Opera. Now that it is free and Ad-free – it is now recommended.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.apple.com/safari/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Safari&lt;/span&gt;&lt;/a&gt;: Apples web browser now for Windows. Great web browser next to Firefox.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://reloadevery.mozdev.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Reload                                    Every&lt;/span&gt;&lt;/a&gt;: Extension for FireFox. Allows you to set reload times on your browser windows so you won’t be logged out.&lt;/p&gt; &lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://filezilla.sourceforge.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;FileZilla&lt;/span&gt;:&lt;/a&gt; An FTP program that is superior to “Cute”, and                                    is Free.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://winscp.net/eng/docs/introduction&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;WinSCP&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;style1&quot;&gt;: &lt;/span&gt; Open source SFTP client for Windows                                    using SSH and SCP protocol’s. Secure FTP.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://fireftp.mozdev.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;FireFTP&lt;/span&gt;&lt;/a&gt;: If you use FireFox browser (like you should be) – use this plug-in for FTP functionality in your browser.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.hamachi.cc/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Hamachi&lt;/span&gt;&lt;/a&gt;: Setup two or more computers with an Internet connection into their own virtual network for direct secure communication. &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://forums.hamachi.cc/viewforum.php?f=7&quot; target=&quot;_blank&quot;&gt;How-to’s&lt;/a&gt;&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;https://www.foldershare.com/info/aboutFoldershare.php?&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;FolderShare&lt;/span&gt;&lt;/a&gt;: Securely keep files synchronized between your devices and remotely download your files from any browser.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;https://secure.logmein.com/go.asp?page=products_free&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;LogMeIn&lt;/span&gt;&lt;/a&gt;: Easy to log into a PC from a PC, MAC or linux machine. No port forwarding involved! Just like terminal services but easier.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.avvenu.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;Avvenu&lt;/span&gt;&lt;/a&gt;: Remote connect to your PC from another PC or any web-enabled handheld. Perfect for getting those files you forgot.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;style1&quot; href=&quot;http://www.crossloop.com/&quot; target=&quot;_blank&quot;&gt;Crossloop&lt;/a&gt;: Secure screen sharing utility designed for people of all technical skill levels. Basically, TightVNC but no port forwarding needed.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.tightvnc.com/docs.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;TightVNC&lt;/span&gt;: &lt;/a&gt; Remote control software- see the desktop of a remote machine and control it with your local mouse and keyboard.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.microsoft.com/windowsxp/downloads/tools/rdclientdl.mspx&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;RemoteDesktop&lt;/span&gt;&lt;/a&gt;: Microsoft remote desktop client side installer for older Windows versions.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.ramsinks.com/get/RDportX.zip&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;RDPortX&lt;/span&gt;&lt;/a&gt;: A small app I made to change the defualt 3389 port that Remote Desktop ueses. Great for multiple RD servers on the same network.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.emando.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;eMando&lt;/span&gt;&lt;/a&gt;: Client/server package which you can use to control and manage a computer over a LAN or the Internet.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.directupdate.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;DirectUpdate&lt;/span&gt;&lt;/a&gt;: Get an Email of your WAN IP address changes even behind a router (for dynamic ISP’s). &lt;span style=&quot;color: rgb(153, 0, 0);&quot;&gt;60day                                    trial&lt;/span&gt; &lt;span&gt;($15.00 – buy)&lt;/span&gt;.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.dyndns.com/getstarted/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;DynDNS&lt;/span&gt;&lt;/a&gt;:                                    A full list of dynamic IP administration software                                    tools.&lt;/p&gt; &lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.cdburnerxp.se/download.htm&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;CDBurner-XP                                    Pro&lt;/span&gt;:&lt;/a&gt; Just like it sounds, burning                                    program for Windows. Free.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;style1&quot; href=&quot;http://www.imgburn.com/&quot; target=&quot;_blank&quot;&gt;ImageBurn&lt;/a&gt;:  A lightweight CD / DVD / HD DVD / Blu-ray burning application.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://isorecorder.alexfeinman.com/isorecorder.htm&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;ISORecorder&lt;/span&gt;&lt;/a&gt;: Small program to burn images of CD’s. Once installed, right click an .ISO’s or a ROM drive and “create CD image”.&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.deepburner.com/?r=download&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;style1&quot;&gt;DeepBurner&lt;/span&gt;&lt;/a&gt;: A full featured Burning app for CD’s, DVD’s and ISO’s. Much like Nero only totally ~~Free&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Source: &lt;/span&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://nycgraphix.com/blogphoto/2008/10/windows-software/&quot;&gt;nycgraphix.com&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;</description><link>http://je-security.blogspot.com/2009/09/windows-software.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-6548213074562543178</guid><pubDate>Tue, 15 Sep 2009 18:56:00 +0000</pubDate><atom:updated>2009-09-29T16:40:23.901-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">EthicalHacker</category><category domain="http://www.blogger.com/atom/ns#">malware</category><category domain="http://www.blogger.com/atom/ns#">techniques</category><category domain="http://www.blogger.com/atom/ns#">tools</category><title>Malware Analysis Tools and Techniques</title><description>&lt;h3 class=&quot;post-title entry-title&quot;&gt; &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://ethicalhackernet.blogspot.com/2008/04/malware-analysis-tools-and-techniques.html&quot;&gt;Malware Analysis Tools and Techniques&lt;/a&gt; &lt;/h3&gt;   &lt;a bitly=&quot;BITLY_PROCESSED&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVjb8cJhR7vhlVpOtClriJ0v7hwNY2FeqeM6vtJjXcqZ7SZ8zp-GkDVZw5WdfS-UNP-DHMAoFTVbigV1yys8UqFUKM5j819uTm2Pgtg9LRMVmVzKtLdxUDJC-Tkf7okUuUCA4d-Ejqn8g/s1600-h/april-7-pic1.JPG&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVjb8cJhR7vhlVpOtClriJ0v7hwNY2FeqeM6vtJjXcqZ7SZ8zp-GkDVZw5WdfS-UNP-DHMAoFTVbigV1yys8UqFUKM5j819uTm2Pgtg9LRMVmVzKtLdxUDJC-Tkf7okUuUCA4d-Ejqn8g/s200/april-7-pic1.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5193155575482974786&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Apart from what guidelines have been published in various books and articles. My this post will summarize the overall manual and automated techniques to simulate and test the samples of malwares collected and their behavioral activities. To be noted that a &quot;Malware&quot; could be delivered in the form of trojan, virus or worm.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Manual Toolset&lt;/span&gt;&lt;br /&gt;These tools require the collaboration of other toolset used in conjunction, to support depth analysis of a malware.&lt;br /&gt;&lt;br /&gt;Foundstone BINTEXT&lt;br /&gt;Malzilla (Analyzing Web-Based Malwares - JavaScript/iFrame)&lt;br /&gt;HTTP Proxy Debuggers (Paros, WebScarab)&lt;br /&gt;Nepenthes&lt;br /&gt;iDefense SysAnalyzer, HookExplorer and MAP (Malcode Analyst Pack)&lt;br /&gt;RegShot&lt;br /&gt;SysInternals Tools&lt;br /&gt;PEiD Tool (Very important to detect packers/compilers/cryptors)&lt;br /&gt;UPX&lt;br /&gt;FireBug&lt;br /&gt;OllyDbg&lt;br /&gt;WinDbg&lt;br /&gt;GDB GNU (Linux)&lt;br /&gt;OllyDump&lt;br /&gt;OllyScript&lt;br /&gt;SoftICE (Reversing)&lt;br /&gt;IDA Pro (Reversing)&lt;br /&gt;Salamander Decompiler (.NET Applications)&lt;br /&gt;Reflector.Net Tool&lt;br /&gt;DaFixer&#39;s DeDe (Delphi)&lt;br /&gt;Backerstreet.com REC&lt;br /&gt;HeavenTools PE Explorer&lt;br /&gt;HijackThis&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Automated Online Tools&lt;/span&gt;&lt;br /&gt;These online submission services automatically analyze the malware in a very restricted environment(simulate) and record their activites and produce results on the basis of various Anti-Virus/Malware detection.&lt;br /&gt;&lt;br /&gt;CWSandbox.org&lt;br /&gt;ThreatExpert.com&lt;br /&gt;VirusScan.jotti.org&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; class=&quot;linkification-ext&quot; href=&quot;http://norman.com/microsites/nsic/&quot; title=&quot;Linkification: http://Norman.com/microsites/nsic/&quot;&gt;Norman.com/microsites/nsic/&lt;/a&gt;&lt;br /&gt;Malwareinfo.org&lt;br /&gt;VirusTotal.com&lt;br /&gt;VirScan.org&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Source: &lt;/span&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://ethicalhackernet.blogspot.com/2008/04/malware-analysis-tools-and-techniques.html&quot;&gt;EthicalHacker&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;</description><link>http://je-security.blogspot.com/2009/09/malware-analysis-tools-and-techniques.html</link><author>noreply@blogger.com (JaviZ)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVjb8cJhR7vhlVpOtClriJ0v7hwNY2FeqeM6vtJjXcqZ7SZ8zp-GkDVZw5WdfS-UNP-DHMAoFTVbigV1yys8UqFUKM5j819uTm2Pgtg9LRMVmVzKtLdxUDJC-Tkf7okUuUCA4d-Ejqn8g/s72-c/april-7-pic1.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-6972710806290398896</guid><pubDate>Mon, 14 Sep 2009 03:38:00 +0000</pubDate><atom:updated>2009-09-29T16:36:08.691-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">autorun</category><category domain="http://www.blogger.com/atom/ns#">malware</category><category domain="http://www.blogger.com/atom/ns#">RogerGrimes</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Windows autorun may autoinfect</title><description>Nothing beats a USB port for convenience, whether you want to quickly transport a couple gigabytes of files for work, refresh the lineup on your MP3 player, or view the pictures from your recent trip to Boise. Unfortunately, USB ports also provide an overly convenient bridge for malware to creep from a portable media device onto an unsuspecting user&#39;s system. In fact, it seems nearly every client I visit these days has numerous computers carrying USB-infecting malware -- even trusted clients with otherwise stellar security histories. It&#39;s getting so bad that I&#39;m scared to share USB keys with my clients.&lt;br /&gt;&lt;br /&gt;The primary culprits here: Microsoft Windows&#39; autorun and autoplay features for portable media devices (USB keys, USB hard drives, camera memory flash cards, and so on). To make users&#39; lives easier, Microsoft coded Windows to seek and deploy autorun and autoplay files on removal media. A user connects his or her device, and the program it contains launches automatically, if so designed by the software developer. It&#39;s what allows a CD or DVD to start playing the moment it&#39;s inserted or a new software program&#39;s install routine to automatically commence.&lt;br /&gt;&lt;br /&gt;[ Already infected by malware? Starting from scratch is the best course of action [1]. | Are you up to snuff in your security regimen? Get your defenses in tip-top shape with InfoWorld&#39;s Security Boot Camp [2], a 20-lesson course via e-mail that begins Sept. 21. ]&lt;br /&gt;&lt;br /&gt;Unfortunately, malware writers have co-opted autorun and autoplay to spread rogue code. An unsuspecting user inserts a portable media device containing the code, which is often invisible to the casual user. The malware then uses autorun and autoplay -- and maybe the desktop.ini file -- along with the hidden core malware program to pull off the overall exploit. The malware can then go on to infect the computer and network using other vectors, such as network shares, password guessing, and normal infection vectors, or it can stick to infecting removal media devices. Either way, it&#39;s not a good thing.&lt;br /&gt;[3]&lt;br /&gt;&lt;br /&gt;My recommendation: Protect your systems and your network by disabling the autorun and autoplay functionalities and by educating users on how to manually launch any needed program. Disabling this functionality has become easier and easier with each new version of Windows. It can be done using Group Policy or registry edits. In many cases, you might have to install an additional software hotfix to get all the needed disabling functionality.&lt;br /&gt;&lt;br /&gt;Specifically, to disable the autorun functionality in Vista or in Windows Server 2008, you must have security update 950582 installed (security bulletin MS08-038). To disable the autorun functionality in Windows XP, Windows Server 2003, or Windows 2000, you must have security update 950582, 967715, or 953252 installed. (See Microsoft&#39;s Web site [4] for more details. It covers what software fixes to install, if needed, and the related registry keys and group policies that can be configured.)&lt;br /&gt;&lt;br /&gt;My friend Jesper Johannson has an excellent description [5] -- and solution discussion -- of the problem, which I highly recommend.&lt;br /&gt;&lt;br /&gt;Even if you fix your computers, you have to be careful as to where you stick your USB device. It&#39;s truly similar to sex advice: You are sharing your USB device with every USB device that has shared the same port.&lt;br /&gt;&lt;br /&gt;Of course, it doesn&#39;t hurt to run antimalware software, even if it isn&#39;t 100 percent accurate, configured to autoscan all autolaunching code or inserted media devices.&lt;br /&gt;&lt;br /&gt;Also, if I share my USB key, I always look for any added autorun.inf, desktop.ini, or newly appearing executable files. I configure Windows Explorer to show all files (hidden, system, and registered extensions) so that any hidden files are shown. You can disable USB ports (or any devices or ports) physically or by using Group Policy, registry edits, or third-party software. Last, check all your removal media to make sure they haven&#39;t been silently infected and you aren&#39;t spreading the disease.&lt;br /&gt;&lt;br /&gt;Practice safe computing and disable autorun and autoplay -- so we can go back to fighting Internet-based malware.&lt;br /&gt;&lt;br /&gt;Are your network defenses feeling a little flabby? InfoWorld&#39;s Security Boot Camp will whip your IT operation into shape in next to no time. Get Roger Grimes’ advice delivered to your in-box in a special, four-week e-mail-only course. Sign up now [6].&lt;br /&gt;&lt;br /&gt;   * Security Central&lt;br /&gt;   * Malware&lt;br /&gt;   * Windows&lt;br /&gt;&lt;br /&gt;Source URL (retrieved on 2009-09-29 12:18PM): http://www.infoworld.com/d/security-central/windows-autorun-may-autoinfect-266&lt;br /&gt;&lt;br /&gt;Links:&lt;br /&gt;[1] http://www.infoworld.com/d/security-central/starting-scratch-only-malware-cure-451?source=fssr&lt;br /&gt;[2] http://www.infoworld.com/security-boot-camp?source=fssr&lt;br /&gt;[3] http://www.infoworld.com/security-boot-camp?source=editinline&lt;br /&gt;[4] http://support.microsoft.com/kb/967715&lt;br /&gt;[5] http://technet.microsoft.com/en-us/magazine/2008.01.securitywatch.aspx&lt;br /&gt;[6] http://www.infoworld.com/security-boot-camp&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Source: Roger A. Grimes.&lt;/span&gt;&lt;/span&gt;</description><link>http://je-security.blogspot.com/2009/09/windows-autorun-may-autoinfect.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-1481505036459845700</guid><pubDate>Fri, 11 Sep 2009 00:02:00 +0000</pubDate><atom:updated>2009-09-15T19:23:23.579-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">análisis forense</category><category domain="http://www.blogger.com/atom/ns#">forensics</category><category domain="http://www.blogger.com/atom/ns#">printing</category><category domain="http://www.blogger.com/atom/ns#">vtroger</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Análisis forense de cola de impresión de Windows</title><description>Es posible recuperar el último archivo impreso en Windows y visualizarlo. Para realizar esta técnica es necesario saber el funcionamiento de la cola de impresión en Windows.&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;En el momento que se envía un archivo a imprimir, se crea un archivo de almacenamiento intermedio en formato EMF, donde se almacena lo que se envía a la impresora y las opciones de impresión, su extensiones son: *.SPL y *.SHD. Cuando la impresión finaliza, Windows borra estos archivos que se almacenan en:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;c:\windows\system32\spool\printers&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Para hacer un análisis forense del último documento impreso, hay que usar un software de recuperación para obtener los archivos *.SPL y *.SHD.&lt;br /&gt;&lt;br /&gt;Una vez recuperado estos archivos con la herramienta EMF Spool Viewer es posible: descifrar estos archivos, visualizar el último archivo impreso y obtener las propiedades de impresión utilizadas&lt;br /&gt;&lt;br /&gt;Para la cronología de la escena podemos usar los metadatos del archivo o la fecha de eliminación ya que corresponde con la fecha de impresión. Esta técnica funciona para Windows NT/2000/XP/VISTA.&lt;br /&gt;&lt;br /&gt;Más información y descarga de EMF Spool Viewer:&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.codeproject.com/KB/printing/EMFSpoolViewer.aspx&quot;&gt;http://www.codeproject.com/KB/printing/EMFSpoolViewer.aspx&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Más información sobre la cola de impresión y archivos EMF:&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.microsoft.com/india/msdn/articles/130.aspx&quot;&gt;http://www.microsoft.com/india/msdn/articles/130.aspx&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;Autor: Alvaro Paz&lt;br /&gt;Fuente: &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://vtroger.blogspot.com/2009/09/analisis-forense-de-cola-de-impresion.html&quot;&gt;Guru de la informática&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;</description><link>http://je-security.blogspot.com/2009/09/analisis-forense-de-cola-de-impresion.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-8597528742857778076</guid><pubDate>Mon, 07 Sep 2009 03:35:00 +0000</pubDate><atom:updated>2009-09-08T15:35:29.879-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">backtrack</category><category domain="http://www.blogger.com/atom/ns#">exploit</category><category domain="http://www.blogger.com/atom/ns#">ftp</category><category domain="http://www.blogger.com/atom/ns#">iis</category><category domain="http://www.blogger.com/atom/ns#">vulnerabilities</category><title>Microsoft IIS FTP  5.0 Remote SYSTEM Exploit</title><description>&lt;!-- End Header Div --&gt;                                        &lt;!-- Begin Content Div --&gt;                                                                                                                             &lt;!-- Begin Post Div --&gt;&lt;!-- Begin Entry Div --&gt;                                                                                      &lt;p style=&quot;text-align: center;&quot;&gt; &lt;/p&gt;&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.offensive-security.com/images/microsoft-iis-ftp-remote-exploit.png&quot;&gt;&lt;img class=&quot;alignnone&quot; title=&quot;Microsoft IIS FTP remote exploit&quot; src=&quot;http://www.offensive-security.com/images/microsoft-iis-ftp-remote-exploit.png&quot; alt=&quot;&quot; height=&quot;459&quot; width=&quot;617&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p&gt;A remote Microsoft FTP server exploit was released today by Kingcope, and can be found at &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://milw0rm.com/exploits/9541&quot; onclick=&quot;javascript:pageTracker._trackPageview(&#39;/outbound/article/milw0rm.com&#39;);&quot; target=&quot;_blank&quot;&gt;http://milw0rm.com/exploits/9541, &lt;/a&gt;&lt;/p&gt; &lt;p&gt;A quick examination of the exploit showed some fancy manipulations in a highly restrictive environment that lead to a ”useradd” type payload. The main issue was the relatively small payload size allowed by the SITE command, which was limited to around 500 bytes.&lt;/p&gt; &lt;p&gt;After a bit of tinkering around, we saw that the PASSWORD field would be most suitable to shove a larger payload (bindshell). A quick replacement of the original “user add” shellcode with a secondary encoded egghunter – and a bind shell was presented to us!  I wonder how long this 0day has been around…As Rel1k would say to logan_WHD…”it’s OK, it’s OK…”.&lt;/p&gt; &lt;p&gt;The exploit can be downloaded from BackTrack&#39;s &lt;a bitly=&quot;BITLY_PROCESSED&quot; title=&quot;Offensive Security Microsoft Remote Exploit&quot; href=&quot;http://www.offensive-security.com/0day/msftp.pl.txt&quot; target=&quot;_blank&quot;&gt;exploit archive&lt;/a&gt;. To entertain the masses, they also made “&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.offensive-security.com/videos/microsoft-ftp-server-remote-exploit/msftp.html&quot; target=&quot;_blank&quot;&gt;Microsoft IIS 5.0 FTP 0 Day – The movie&lt;/a&gt;“&lt;/p&gt;</description><link>http://je-security.blogspot.com/2009/09/microsoft-iis-ftp-50-remote-system.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-7684952582001159516</guid><pubDate>Sun, 06 Sep 2009 12:45:00 +0000</pubDate><atom:updated>2009-09-08T15:28:49.085-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">distros</category><category domain="http://www.blogger.com/atom/ns#">dragonjar</category><category domain="http://www.blogger.com/atom/ns#">grub</category><category domain="http://www.blogger.com/atom/ns#">herramientas</category><category domain="http://www.blogger.com/atom/ns#">linux</category><category domain="http://www.blogger.com/atom/ns#">pendrive</category><category domain="http://www.blogger.com/atom/ns#">tools</category><category domain="http://www.blogger.com/atom/ns#">usb</category><title>Memoria USB Booteable con Varias Distribuciones de Seguridad Informática</title><description>A continuación va la receta de cómo llevar nuestras distribuciones de seguridad  preferidas en una sola memoria USB/pendrive, todas funcionando correctamente.&lt;br /&gt;&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img class=&quot;aligncenter&quot; src=&quot;http://img35.imageshack.us/img35/8921/307668780bec332e7ba.jpg&quot; alt=&quot;307668780bec332e7ba Memoria USB Booteable con Varias Distribuciones de Seguridad Informática&quot; title=&quot;Memoria USB Booteable con Varias Distribuciones de Seguridad Informática&quot; height=&quot;376&quot; width=&quot;425&quot; /&gt;&lt;/p&gt; &lt;p&gt;Primero de todo nos descargamos las &lt;a bitly=&quot;BITLY_PROCESSED&quot; title=&quot;herramientas&quot; href=&quot;http://www.dragonjar.org/tag/herramientas&quot;&gt;herramientas&lt;/a&gt; que necesitamos.&lt;span id=&quot;more-3052&quot;&gt;&lt;/span&gt;&lt;/p&gt; &lt;ul&gt;&lt;li&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://gocoding.com/page.php?al=petousb&quot; target=&quot;_blank&quot;&gt;PeToUsb&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://sourceforge.net/projects/grub4dos/files/WINGRUB/WINGRUB%200.02%20Build%206/WINGRB0206.EXE/download&quot; target=&quot;_blank&quot;&gt;WinGrub&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Una llave USB.&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Una vez nos hayamos descargado PeToUsb iniciamos y procedemos a formatear la llave USB.&lt;/p&gt; &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img class=&quot;aligncenter&quot; title=&quot;formateando&quot; src=&quot;http://seifreed.files.wordpress.com/2009/09/formateando.png?w=405&amp;amp;h=426&quot; alt=&quot; Memoria USB Booteable con Varias Distribuciones de Seguridad Informática&quot; height=&quot;426&quot; width=&quot;405&quot; /&gt;&lt;/p&gt; &lt;p&gt;Ahora nos pedirá confirmación:&lt;/p&gt; &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img class=&quot;aligncenter&quot; title=&quot;empezando..&quot; src=&quot;http://seifreed.files.wordpress.com/2009/09/empezando.png?w=403&amp;amp;h=424&quot; alt=&quot;empezando..&quot; height=&quot;424&quot; width=&quot;403&quot; /&gt;&lt;/p&gt; &lt;p&gt;Y aqui entonces nos avisa de que se eliminarán todos nuestros datos.&lt;/p&gt; &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img class=&quot;aligncenter&quot; title=&quot;empezando..2&quot; src=&quot;http://seifreed.files.wordpress.com/2009/09/empezando-2.png?w=399&amp;amp;h=420&quot; alt=&quot;empezando..2&quot; height=&quot;420&quot; width=&quot;399&quot; /&gt;&lt;/p&gt; &lt;p&gt;Entonces empezará el formateo:&lt;/p&gt; &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img class=&quot;aligncenter&quot; title=&quot;formateado_entero&quot; src=&quot;http://seifreed.files.wordpress.com/2009/09/formateado_entero.png?w=402&amp;amp;h=423&quot; alt=&quot; Memoria USB Booteable con Varias Distribuciones de Seguridad Informática&quot; height=&quot;423&quot; width=&quot;402&quot; /&gt;&lt;/p&gt; &lt;p&gt;Cuando acabe el formateo nos saldrá un mensajito:&lt;/p&gt; &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img class=&quot;aligncenter&quot; title=&quot;afirmacion&quot; src=&quot;http://seifreed.files.wordpress.com/2009/09/afirmacion.png?w=279&amp;amp;h=149&quot; alt=&quot; Memoria USB Booteable con Varias Distribuciones de Seguridad Informática&quot; height=&quot;149&quot; width=&quot;279&quot; /&gt;&lt;/p&gt; &lt;p&gt;Una vez tenemos preparado nuestro dispositivo vamos a instalar GRUB en él.&lt;/p&gt; &lt;p&gt;Abrimos la aplicación WinGrub que ya hemos instalado antes. Nada mas iniciarlo nos pedirá sobre que dispositovo USB instalaremos GRUB&lt;/p&gt; &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img class=&quot;aligncenter&quot; title=&quot;poniendo_grub&quot; src=&quot;http://seifreed.files.wordpress.com/2009/09/poniendo_grub.png?w=277&amp;amp;h=210&quot; alt=&quot; Memoria USB Booteable con Varias Distribuciones de Seguridad Informática&quot; height=&quot;210&quot; width=&quot;277&quot; /&gt;&lt;/p&gt; &lt;p&gt;Ahora instalaremos GRUB en el USB.&lt;/p&gt; &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img class=&quot;aligncenter&quot; title=&quot;instalando_grub&quot; src=&quot;http://seifreed.files.wordpress.com/2009/09/instalando_grub1.png?w=404&amp;amp;h=368&quot; alt=&quot; Memoria USB Booteable con Varias Distribuciones de Seguridad Informática&quot; height=&quot;368&quot; width=&quot;404&quot; /&gt;&lt;/p&gt; &lt;p&gt;Ahora ya tendremos GRUB instalado.&lt;/p&gt; &lt;p&gt;Ahora cojeremos cualquier LIVE-CD y copiaremos su contenido en la raíz del USB.&lt;/p&gt; &lt;p&gt;Yo lo he echo con Backtrack.&lt;/p&gt; &lt;p&gt;Una vez hayamos copiado el contenido del CD dentro de la llave USB. Creamos un archivo en blanco que sea menu.lst&lt;/p&gt; &lt;p&gt;Dentro del archivo de configuración del Menú le ponemos como ha de arrancar la distribución en sí.&lt;/p&gt; &lt;p&gt;Ejemplo para backtrack:&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;title BackTrack 4&lt;br /&gt;root (hd0,2)&lt;br /&gt;kernel /boot/vmlinuz vga=0×317 ramdisk_size=6666 root=/dev/ram0 rw quiet&lt;br /&gt;initrd=/boot/initrd.gz&lt;br /&gt;boot&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;Con esto ya tendríamos el GRUB configurado.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Nota:&lt;/strong&gt; Cada LIVE -CD se estructura normalmente con dos carpetas, una carpeta boot, y otra con el nombre de la distribución.&lt;/p&gt; &lt;p&gt;Si queremos poner mas de un LIVE-CD podemos renombrar la carpeta boot con otro nombre.&lt;/p&gt; &lt;p&gt;Ejemplo, backtrack4 le ponemos el nombre de bootbt4, kon-boot a bootkon y asi sucesivamente.&lt;/p&gt; &lt;p&gt;Si se cambia el nombre de boot, recordad de cambiarlo en el menu.lst también.&lt;/p&gt; &lt;p&gt;Yo por ejemplo ya he configurado mi grub y las distrubuciones que quería.&lt;/p&gt; &lt;p&gt;Me ha quedado algo así.&lt;/p&gt; &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img class=&quot;aligncenter&quot; title=&quot;P9010037&quot; src=&quot;http://seifreed.files.wordpress.com/2009/09/p9010037.jpg?w=500&amp;amp;h=375&quot; alt=&quot;P9010037&quot; height=&quot;375&quot; width=&quot;500&quot; /&gt;&lt;/p&gt; &lt;p&gt;Y si lo ponemos desde mas cerca…&lt;/p&gt; &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img class=&quot;aligncenter&quot; title=&quot;P9010036&quot; src=&quot;http://seifreed.files.wordpress.com/2009/09/p9010036.jpg?w=500&amp;amp;h=375&quot; alt=&quot;P9010036&quot; height=&quot;375&quot; width=&quot;500&quot; /&gt;&lt;/p&gt; &lt;p&gt;Y como veis podremos poner las distribuciones que queramos en nuestro USB.&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Fuente:&lt;/span&gt; &lt;a href=&quot;http://www.dragonjar.org/memoria-usb-booteable-con-varias-distribuciones-de-seguridad-informatica.xhtml&quot;&gt;DragonJar&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;</description><link>http://je-security.blogspot.com/2009/09/memoria-usb-booteable-con-varias.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-491179349957231223</guid><pubDate>Sun, 06 Sep 2009 12:43:00 +0000</pubDate><atom:updated>2009-09-08T15:23:36.640-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">application</category><category domain="http://www.blogger.com/atom/ns#">application security</category><category domain="http://www.blogger.com/atom/ns#">damn vulnerable</category><category domain="http://www.blogger.com/atom/ns#">dragonjar</category><category domain="http://www.blogger.com/atom/ns#">web</category><title>Damn Vulnerable Web App</title><description>&lt;p&gt;Ryan Dewhurst desarrollador del DVWA (&lt;a bitly=&quot;BITLY_PROCESSED&quot; title=&quot;Damn Vulnerable Web App&quot; href=&quot;http://www.dragonjar.org/damn-vulnerable-web-app.xhtml&quot;&gt;Damn Vulnerable Web App&lt;/a&gt;) ha liberado hoy una nueva versión (1.0.5), de esta excelente herramienta para testear diferentes &lt;a bitly=&quot;BITLY_PROCESSED&quot; title=&quot;vulnerabilidades&quot; href=&quot;http://www.dragonjar.org/tag/vulnerabilidades&quot;&gt;vulnerabilidades&lt;/a&gt; web.&lt;/p&gt; &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img class=&quot;aligncenter&quot; title=&quot;Damn Vulnerable Web App&quot; src=&quot;http://img186.imageshack.us/img186/3353/logo1q.png&quot; alt=&quot;logo1q Damn Vulnerable Web App&quot; height=&quot;56&quot; width=&quot;151&quot; /&gt;&lt;/p&gt; &lt;p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.dragonjar.org/dvwa-damn-vulnerable-web-app.xhtml&quot;&gt;4v4t4r ya nos había comentado sobre esta aplicación&lt;/a&gt; que tiene como finalidad ofrecer a los profesionales, estudiantes e investigadores en &lt;a bitly=&quot;BITLY_PROCESSED&quot; title=&quot;seguridad&quot; href=&quot;http://www.dragonjar.org/&quot;&gt;seguridad&lt;/a&gt; informática un conjunto de utilidades con las cuales podemos exploter y entender un amplio grupo de vulnerabilidades web.&lt;span id=&quot;more-3058&quot;&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Algunos cambios en esta nueva versión:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Se re escribió completamente el codigo.&lt;/li&gt;&lt;li&gt;Se rediseño completamente el aspecto de la aplicación.&lt;/li&gt;&lt;li&gt;Se agrego la vulnerabilidad CSRF.&lt;/li&gt;&lt;li&gt;Ahora las vulnerabilidades XSS se almacenan.&lt;/li&gt;&lt;li&gt;Se agrego la vulnerabilidad Full Path Disclosure.&lt;/li&gt;&lt;li&gt;Cuenta con un nuevo sistema de logueo.&lt;/li&gt;&lt;li&gt;Ahora tiene manejo de secciones.&lt;/li&gt;&lt;li&gt;Algunos bugs arreglados.&lt;/li&gt;&lt;li&gt;Se implemento el PHPIDS.&lt;/li&gt;&lt;li&gt;y muchas cosas mas…&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Si te intereso la pasada versión del Damn Vulnerable Web App, no dudes en descargar esta nueva versión los dejo en compañía de este vídeo tutorial de instalación de Damn Vulnerable Web App.&lt;/p&gt;  &lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.dvwa.co.uk/download.php&quot;&gt;Descargar Damn Vulnerable Web App&lt;/a&gt;&lt;/h2&gt; &lt;p&gt;&lt;strong&gt;Mas Información:&lt;/strong&gt;&lt;br /&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.dvwa.co.uk/&quot;&gt;Sitio Oficial de Damn Vulnerable Web App&lt;/a&gt;&lt;/p&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.dragonjar.org/recomendar/importer.php?keepThis=true&amp;amp;imgpath=http://www.dragonjar.org/recomendar/images/ajax-loader1.gif&amp;amp;TB_iframe=true&amp;amp;height=500&amp;amp;width=690&quot; title=&quot;Recomendar Articulo a Tus Amigos&quot; class=&quot;thickbox&quot;&gt;&lt;img src=&quot;http://img41.imageshack.us/img41/7130/enviar.jpg&quot; alt=&quot;Envíale este Articulo a Tus Amigos&quot; title=&quot;Damn Vulnerable Web App&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Fuente:&lt;/span&gt; &lt;a href=&quot;http://www.dragonjar.org/damn-vulnerable-web-app.xhtml&quot;&gt;DragonJar&lt;/a&gt;.&lt;/span&gt;</description><link>http://je-security.blogspot.com/2009/09/damn-vulnerable-web-app.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-2091005185290442508</guid><pubDate>Sat, 05 Sep 2009 04:12:00 +0000</pubDate><atom:updated>2009-09-05T16:15:46.465-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">micrsoft</category><category domain="http://www.blogger.com/atom/ns#">sql</category><category domain="http://www.blogger.com/atom/ns#">suguinfo</category><title>Microsoft minimiza la vulnerabilidad de SQL Server</title><description>Microsoft &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.eweek.com/prestitial.php?type=rest&amp;amp;url=http%3A%2F%2Fwww.eweek.com%2Fc%2Fa%2FSecurity%2FMicrosoft-Downplays-SQL-Server-Database-Vulnerability-893487%2F&quot;&gt;pone en duda la gravedad de una vulnerabilidad en su servidor SQL&lt;/a&gt; de base de datos que los investigadores de seguridad dicen expone contraseñas administrativas. La vulnerabilidad, descubierta por Sentrigo, puede ser explotada remotamente en SQL Server 2000 y 2005.&lt;br /&gt;&lt;br /&gt;Microsoft minimiza el defecto de seguridad en SQL Server que podría ser explotado por alguien con privilegios administrativos para ver las contraseñas de los usuarios que están sin cifrar.&lt;br /&gt;&lt;br /&gt;La vulnerabilidad &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.sentrigo.com/news/2009/09/02/sentrigo-uncovers-significant-password-exposure-vulnerability-in-microsoft-sql-serve&quot;&gt;se descubrió el año pasado por el fabricante de seguridad de base de datos Sentrigo&lt;/a&gt;; cuando uno de sus investigadores notó que la cadena única de su contraseña personal era visible en la memoria. Desde entonces, se contacto a Microsoft y se desencadeno una de idas y vuelta entre Sentrigo y Microsoft, que sostiene que la vulnerabilidad no es un problema porque se requiere acceso administrativo.&lt;br /&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br /&gt;Mientras funcionarios de Sentrigo admiten que acceso administrativo es necesario para un explotar al trabajo, también sostienen que muchas aplicaciones están desplegadas con privilegios administrativos, lo que significa que hackers podrían utilizar una inyección de SQL y con esta vulnerabilidad para acceder a contraseñas administrativas.&lt;br /&gt;&lt;br /&gt;&quot;Las contraseñas utilizadas para conectarse al servidor del MS SQL se almacenan en memoria con texto claro&quot; explicado por el CTO de Sentrigo, Slavik Markovich. &quot;Estas no se borran hasta que se reinicia el servidor del SQL, así que puede en quedar en memoria durante semanas o meses en ambientes de producción. Es algo fácil descargar la memoria y ver su contenido en busca de nombres de usuario y contraseñas&quot;.&lt;br /&gt;&lt;br /&gt;En el caso de SQL Server 2000 y 2005, los atacantes puede explotar la situación remotamente. Hay algunos procesos de mitigación para los usuarios de SQL Server 2008 porque Microsoft eliminó la utilidad DBCC. Sin embargo, con conexiones locales todavía se puede explotar.&lt;br /&gt;&lt;br /&gt;Pese a ello, Microsoft sostiene que la vulnerabilidad es mucho ruido y pocas nueces.&lt;br /&gt;&lt;br /&gt;Microsoft ha investigado a fondo reclamaciones de vulnerabilidades en SQL Server y encontraron que estos no son vulnerabilidades que requieren de Microsoft emita una actualización de seguridad. Como se ha mencionado por los investigadores de seguridad, en el escenario en cuestión, un atacante necesitaría derechos administrativos en el sistema atacado.&lt;br /&gt;&lt;br /&gt;&quot;Un atacante que tiene derechos administrativos ya tiene completo control del sistema y puede instalar programas; ver, cambiar o borrar datos; o crear nuevas cuentas con plenos derechos de usuario&quot;, agregaron desde Microsoft.&lt;br /&gt;&lt;br /&gt;Si bien los administradores pueden normalmente restablecer una contraseña de usuario si es necesario, mejores prácticas de seguridad no permiten incluso a los administradores ver la verdadera contraseñas de otros usuarios, oficiales de Sentrigo dicen: este es un problema aún mayor ya que muchas empresas necesitan cumplir con diversas normas y reglamentos que exigen estricta separación de funciones, algo que es claramente violado por compartir todos las contraseñas de los usuarios con los administradores.&lt;br /&gt;&lt;br /&gt;En respuesta a la situación, el fabricante de seguridad ha publicado un utilitario gratuito para borrar estas contraseñas. La utilidad &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.sentrigo.com/passwords/&quot;&gt;puede ser descargada&lt;/a&gt; a partir de hoy de la pagina Web de Sentrigo.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Fuente:&lt;/span&gt; &lt;a href=&quot;http://blog.segu-info.com.ar/2009/09/microsoft-minimiza-la-vulnerabilidad-de.html&quot;&gt;SeguInfo&lt;/a&gt;.&lt;br /&gt;&lt;/span&gt;</description><link>http://je-security.blogspot.com/2009/09/microsoft-minimiza-la-vulnerabilidad-de.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-7870465763741840</guid><pubDate>Fri, 04 Sep 2009 23:24:00 +0000</pubDate><atom:updated>2009-09-05T16:39:42.681-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">auditoría</category><category domain="http://www.blogger.com/atom/ns#">SAP</category><category domain="http://www.blogger.com/atom/ns#">SeguridadSAP</category><category domain="http://www.blogger.com/atom/ns#">steps</category><title>Auditar SAP – Introducción</title><description>A lo largo de varios post en este blog vimos desde artículos introductorios, hasta algunas pequeñas herramientas que &lt;strong&gt;SAP&lt;/strong&gt; nos brinda para ayudarnos a configurar su seguridad. &lt;p&gt;En este post, y los subsiguientes sobre “&lt;strong&gt;Auditar SAP&lt;/strong&gt;“, trataremos de abarcar paso a paso, las tareas a realizar para evaluar la seguridad de un sistema. En algunos casos repitiéndo conceptos ya definidos en anteriores artículos del blog, e incorporando otros nuevos.&lt;/p&gt; &lt;p&gt;Lo principal a fines de empezar, es entender el alcance de la auditoría que vamos a realizar. Metodológicamente, una auditoría del sistema se concentra en revisar la configuración del mismo, con el fin de exponer las falencias que puedan poner en jaque la seguridad de la información que en el reside.&lt;/p&gt; &lt;p&gt;Tenemos que comenzar entendiendo que el sistema &lt;strong&gt;SAP &lt;/strong&gt;como &lt;strong&gt;ERP&lt;/strong&gt;, es un sistema que puede aportar un alto grado de seguridad en las operaciones, y posee un buen número de controles embebidos en el mismo, tanto configurables como inherentes. Pero esta seguridad tiene que ser configurada, para que sea efectiva.&lt;/p&gt; &lt;p&gt;Y también es importante destacar una característica particular de SAP a la hora de auditarlo, y es que en el mismo no solo se configuran y por consiguiente, se revisan, los controles de aplicación (controles internos del negocio, validaciones de datos, etc) si no que también un gran número de controles de base o generales deben efectuarse en el mismo, ya que desde dentro de un sistema &lt;strong&gt;SAP &lt;/strong&gt;es posible acceder directamente a las tablas de base de datos, ejecutar programas, ver código fuente, ejecutar comandos de sistema operativo, apagar el servicio, realizar debugging, y un largo etc de actividades que en otros sistemas deben controlarse “por fuera de la aplicación” y en el caso de &lt;strong&gt;SAP &lt;/strong&gt;deben controlarse en &lt;strong&gt;“ambos lugares”&lt;/strong&gt;. Y resaltamos &lt;strong&gt;“ambos lugares”&lt;/strong&gt; porque incluso en muchas revisiones de seguridad se pierde el foco y se controlan los permisos dentro del sistema con el fin de verificar controles generales y de aplicación, abandonando un poco el control sobre los servidores de base de datos, de aplicación, etc.&lt;/p&gt; &lt;p&gt;Igualmente como corresponde a este &lt;em&gt;blog, &lt;/em&gt;nos ocuparemos, al menos en principio, a la revisión de la seguridad específica en la plataforma &lt;strong&gt;SAP &lt;/strong&gt;y posteriormente incorporaremos tips a verificar en las plataformas subyacentes (pero es tan variado este control, como plataformas y bases de datos sobre las que puede instalarse &lt;strong&gt;SAP&lt;/strong&gt;).&lt;/p&gt; &lt;p&gt;Antes de empezar efectivamente con la auditoría sobre el sistema, hay cierta información que uno debería recopilar, y vamos a explicar porque:&lt;/p&gt; &lt;p&gt;&lt;strong&gt;- Versión, o versiones de SAP sobre la que se va a trabajar &lt;/strong&gt;- Distintos parámetros y configuraciones son posibles dependiendo de la versión del sistema, como así también nuestras recomendaciones varí an según la versión de SAP, salvo que nuestra recomendación se actualizar la versión &lt;img src=&quot;http://www.seguridadsap.com/wp-includes/images/smilies/icon_wink.gif&quot; alt=&quot;;-)&quot; class=&quot;wp-smiley&quot; /&gt; &lt;/p&gt; &lt;p&gt;&lt;strong&gt;- Cualquier informa de auditoría previo&lt;/strong&gt; – Nos puede dar una idea general del sistema, aunque la revisión deba hacerse de cero.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;- Landscape, número y nombre de instancias &lt;/strong&gt;- Por motivos obvios es necesario conocer el landscape sobre el que se trabaja, servidores involucrados, application servers lógicos, físicos, ambientes de desarrollo, pruebas, producción etc. Es importante que los ambientes se encuentren correctamente aislados el uno del otro.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;- Sistema operativo y Base de Datos (Nombre, versiones, etc) – &lt;/strong&gt;Averiguar el sistema operativo sobre el que está instalado el application server y la base de datos sobre la que corre es importante tanto para  la revisión de software de base, como para algunas transacciones específicas del sistema según donde se instale.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;- Mandantes &lt;/strong&gt;- Conocer los mandantes existentes y el objetivo de los mismos es necesario por las mismas razones que las instancias, y para conocer las necesidades de auditoría.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;- Cantidad de usuarios -&lt;/strong&gt; Complejidad y extensión de la revisión.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;- Módulos utilizados/implementados -&lt;/strong&gt; Para conocer el alcance de la revisión, una aproximación del número de roles involucrados y complejidad, la cual puede depender de los módulos &lt;em&gt;(sobre todo si son incluidos módulos de industria específicos que si bien pueden no agregar muchos controles de seguridad, pueden ser desconocidos para nosotros)&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;- Esquema general de Sociedades, Centros, Sociedades CO, y otros datos funcionales -&lt;/strong&gt; Resultan útiles a la hora de evaluar un esquema de roles acorde a las necesidades de la organización.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;- Número de desarrollos ABAP o Z -&lt;/strong&gt; Nos servirá como dato sobre la complejidad del sistema y de su diferencia con el sistema estándar. Este dato es de suma importancia a la hora de saber lo complejo del análisis de roles y en un posible caso de reingeniería de los mismos.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;- Toda la documentación del área de sistema definiendo procedimientos, misiones y funciones, organigrama, nómina de empleados del área de sistemas con funciones, monitoreo, etc -&lt;/strong&gt; Es útil con el fin de confirmar que estos procedimientos y puestos se vean reflejados en la estructura del sistema, y que los permisos de usuarios en el sistema no excedan o limiten sus responsabilidades. &lt;em&gt;Es importante conocer el procedo de gestión de usuarios y accesos, para ver que el mismo se refleje de manera adecuada en el sistema.&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;- Procedimiento de cambios, y cambios de emergencia&lt;/strong&gt;&lt;em&gt;&lt;strong&gt; – &lt;/strong&gt; &lt;/em&gt;Es importante contar con este procedimiento escrito y de no ser así relevar el proceso que debería ser, para comprobar que el sistema de transporte y los permisos estén configurados de manera acorde.&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;- Usuarios de Interfaz o no nomenclados&lt;/strong&gt;&lt;em&gt; -&lt;/em&gt; Es importante conocer de antemano cuales son estos usuarios para verificar su correcta parametrización o recomendar su eliminación.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;- Esquema de Nomenclatura de roles &lt;/strong&gt;- Como son nomenclados los roles es vital para entender la estructura de los mismos.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;- Nomenclatura de usuarios -&lt;/strong&gt; Para verificar que se cumpla y comprender la misma.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;- Metodología de Acceso al sistema -&lt;/strong&gt; A través del SAP GUI, Web, interfaz desde otras aplicaciones, usuarios de internet, externos, SAP Router, Citrix. Es importante determinarlo con el fin de verificar el alcance y saber con que estamos tratando.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;- Implementación de Seguridad a través de la estructura organizativa, o la utilización de perfiles estructurales &lt;/strong&gt;- Cambio nuestro punto de vista sobre como revisar la seguridad del sistema.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;- Topología de Red del sistema SAP -&lt;/strong&gt; Realizar un análisis preliminar de la instalación y su seguridad&lt;/p&gt; &lt;p&gt;&lt;strong&gt;&lt;em&gt;- &lt;/em&gt;Planes de continuidad del sistema -&lt;/strong&gt; Además de lo obvio, para conocer la redundancia, el riesgo y otros sistema que debamos verificar.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;- Existencia de permisos de visualización para auditar el sistema -&lt;/strong&gt; Lo dejamos para el final, pero es de suma importancia poseer permisos a todo lo que necesitemos, pero sin modificación, para poder trabajar con tranquilidad sobre el sistema. Ya que de ser negado el acceso interactivo al sistema tendremos que encarar una auditoría &lt;strong&gt;COMPLETAMENTE DISTINTA&lt;/strong&gt;.&lt;/p&gt; &lt;p&gt;Evidentemente todavía no abordamos nada técnico, pero es un paso esencial el de recopilar toda la información que sea posible. Si a ustedes se les ocurre alguna otra información específica a recopilar no duden en hacer comentarios en este artículo.&lt;/p&gt; &lt;p&gt;En el próximo abordaremos ya más en detalle los temas técnicos y cómo proseguimos con una auditoría del sistema.&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-5635452751042777&quot;; /* 468x60, creado 22/01/09 */ google_ad_slot = &quot;7654635154&quot;; google_ad_width = 468; google_ad_height = 60; //--&gt; &lt;/script&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;div id=&quot;crp_related&quot;&gt;&lt;h3&gt;Artículos relacionados:&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.seguridadsap.com/sap/acceso-a-tablas-s_tabu_dis-y-otros/&quot; rel=&quot;bookmark&quot;&gt;Acceso a Tablas (S_TABU_DIS y otros)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.seguridadsap.com/sap/ais-sistema-de-informacion-de-auditoria/&quot; rel=&quot;bookmark&quot;&gt;AIS - Sistema de Información de Auditoría&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.seguridadsap.com/sap/auditoria-de-tablas-en-sap/&quot; rel=&quot;bookmark&quot;&gt;Auditoría de Tablas en SAP&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.seguridadsap.com/sap/tips-auditoria-sin-activar-la-auditoria/&quot; rel=&quot;bookmark&quot;&gt;Tips: Auditoría sin activar la auditoría&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://www.seguridadsap.com/sap/sap-y-las-tres-capas/&quot; rel=&quot;bookmark&quot;&gt;SAP y las tres capas&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;Fuente: &lt;a href=&quot;http://www.seguridadsap.com/sap/auditar-sap-introduccion/&quot;&gt;SeguridadSap&lt;/a&gt;.</description><link>http://je-security.blogspot.com/2009/09/auditar-sap-introduccion.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8909999644830169157.post-5370504434323623628</guid><pubDate>Fri, 04 Sep 2009 21:53:00 +0000</pubDate><atom:updated>2009-09-05T16:36:56.680-03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">application</category><category domain="http://www.blogger.com/atom/ns#">application security</category><category domain="http://www.blogger.com/atom/ns#">code</category><category domain="http://www.blogger.com/atom/ns#">EthicalHacker</category><title>Securing Application Infrastructure: The analysis of Application Security Methodologies</title><description>The trend of security threats has recently gained a prominent attention in media and industry reports. This article will briefly examine the methodologies and approaches that most organizations follow to address security issues by giving examples, test cases, strengths and weaknesses. Today&#39;s widely known solutions involve vulnerability scanning, static code analysis, penetration testing, binary analysis, fuzzing etc. Which of them are more or less reliable and which of them can address specific type of application problems, is mainly discussed here.&lt;br /&gt;&lt;br /&gt;As many software vendors think that &#39;security issues&#39; may never laid them out of business but in reality it does affect the sales as well as market reputation. Deploying proper application security not only rest assure the clients but also lead to increase the productivity. Let us take an example of interesting equation:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;&lt;/span&gt;&lt;blockquote&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;X=Applications developed&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Y=Vulnerabilities exist in those applications&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Z=Cost of repair (patch and fixes)&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;Now; X.Y.Z=A (answer)&lt;/span&gt;&lt;/blockquote&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;&lt;/span&gt;&lt;br /&gt;If &#39;A&#39; is less than the cost of third-party QA auditor, cost of training the developers and conducting additional security audits then it make more sense to write an insecure code.&lt;br /&gt;&lt;br /&gt;Application vulnerabilities (in broad sense) can be divided into following sections but not limited to:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Operation/Platform Vulnerabilities&lt;/span&gt;&lt;br /&gt;-Asset information disclosure&lt;br /&gt;-Buffer Overflows&lt;br /&gt;-Misconfigurations&lt;br /&gt;-Error Handling&lt;br /&gt;-Resource specific threats&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Design Vulnerabilities&lt;/span&gt;&lt;br /&gt;-Logic Flaws&lt;br /&gt;-Access Control (Authentication/Authorization&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Implementation Vulnerabilities&lt;/span&gt;&lt;br /&gt;-Code Injection&lt;br /&gt;-Information Disclosure&lt;br /&gt;-Command Execution&lt;br /&gt;-Functionality Abuse&lt;br /&gt;-Input Validation&lt;br /&gt;-Time and State&lt;br /&gt;&lt;br /&gt;Now to test the security of the application, one may apply either of these methodologies:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;Automated&lt;/span&gt;&lt;br /&gt;-Automated Dynamic Tests (Fuzz Testing, Vulnerability Scanning)&lt;br /&gt;-Automated Static Tests (Source or Binary Code Scanning)&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;Manual&lt;/span&gt;&lt;br /&gt;-Manual Dynamic Tests (Parameter Tampering and Social Engineering)&lt;br /&gt;-Manual Static Tests (Source or Binary Code Auditing)&lt;br /&gt;&lt;br /&gt;Although each of these methods have their own strengths and weaknesses. Thus, we assume not the best, but atleast more efficient and reliable method can be judged by looking into their specific testing process.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;Automated Dynamic Testing&lt;/span&gt;&lt;br /&gt;While approaching to disclose application vulnerabilities under this method, the complexity ratio increases when moving from vulnerability scanning to the fuzz testing.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Strengths&lt;/span&gt;&lt;br /&gt;-Less false positives (inherent benefits of run-time analysis)&lt;br /&gt;-Programmatic approach to ensure reliable and consistent tests output&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Weaknesses&lt;/span&gt;&lt;br /&gt;-Threat assurance, No Fault != No Flaw&lt;br /&gt;-Only the part of code audit may provide baseline for measurement.&lt;br /&gt;-Unexpected conditions cannot be tested without additional programming.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Use Cases&lt;/span&gt;&lt;br /&gt;-Fuzz Testing (complex input, informal SDLC, observable indicators)&lt;br /&gt;-Application Scanning (strongly typed flaw classes, deterministic and observable behavior, known inputs only)&lt;br /&gt;-Vulnerability Scanning (known transaction sequences, one to one mapping of triggers to specific conditions)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;Automated Static Testing&lt;/span&gt;&lt;br /&gt;This method can disclose the set of vulnerabilities present in the application by examining the code (source/binary) without user interaction. Several commercial and open source tools are available to perform automated static analysis. The complexity of such tools increases from normal flaw identification to the formal verification process.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Strengths&lt;/span&gt;&lt;br /&gt;-Assessment of low-context flaws (parameters, DB query statements, etc)&lt;br /&gt;-Automated scans required little or no human interaction&lt;br /&gt;-Can get good placement during development lifecycle&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Weaknesses&lt;/span&gt;&lt;br /&gt;-Applications without presence of their source code.&lt;br /&gt;-High ratio in false postives or negatives, tuning is harder.&lt;br /&gt;-Critical issues with formal verification&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Developing and correctly expressing a set of security invariants.&lt;/li&gt;&lt;li&gt;Developing an interpretation of the application that lends itself to proving/disproving invariants.&lt;/li&gt;&lt;/ol&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Use Cases&lt;/span&gt;&lt;br /&gt;-Timely and resource-specific detection of simple flaws&lt;br /&gt;-Detection of regression as a part of development lifecycle&lt;br /&gt;-False assumption on strong assurance of the critical application&lt;br /&gt;-In the hands of a developer who cannot interpret or filter the results correctly&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;Manual Dynamic Testing&lt;/span&gt;&lt;br /&gt;The manual dynamic assessment apporach can be achieved by human-navigated application usage followed by assurance validation process and fuzz testing. A critical background information on application design can be provided by the developers. The complexity of manual dynamic testing process increases with its level of common criteria, assurance validation to parameter tampering.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Strengths&lt;/span&gt;&lt;br /&gt;-Parallel capacity in execution of tests&lt;br /&gt;-Pattern recognition&lt;br /&gt;-Testing the live implementation may reduce false positives&lt;br /&gt;-Capable of emulating the malicious attack process&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Weaknesses&lt;/span&gt;&lt;br /&gt;-Time consuming for large and complex applications&lt;br /&gt;-May require the tester to hold a steep learning curve&lt;br /&gt;-Test envrionment may not mirror production&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Use Cases&lt;/span&gt;&lt;br /&gt;-High risk applications require highly experienced security auditor to understand and scope the attack surface&lt;br /&gt;-Wrong application type or the wrong tester background&lt;br /&gt;-A case where the requirements of assessment does not match the expected risk profile of an application&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;&quot; &gt;Manual Static Testing&lt;/span&gt;&lt;br /&gt;This process involves the interaction of human reviews, understanding application design and architecture documentation, use of offline toolset (such as, disassemblers, code browsers, etc).&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Strengths&lt;/span&gt;&lt;br /&gt;-Known data and code points&lt;br /&gt;-Without any resource specific considerations&lt;br /&gt;-Adaptability with skills and toolset&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Weaknesses&lt;/span&gt;&lt;br /&gt;-Accuracy issues (falst positives, human mistakes)&lt;br /&gt;-High resource requirements&lt;br /&gt;-Inconsistency in interpretation of same flaw in different ways&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Use Cases&lt;/span&gt;&lt;br /&gt;-Manual code audit (skilled resources, minor findings before automated tests, custom-coded scripts)&lt;br /&gt;-Configuration review (low risk in changing values at runtime, known data sources and formatings)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Thus, from the application security assessment methods mentioned above and the statistics from &quot;WASC Statistics Project&quot; prove that the probability in detection of high risk vulnerabilities can be higher if combined set of methodologies are used. And this combined approach is almost 12.5% higher than automated scanning (specific to web applications).&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Source:&lt;/span&gt; &lt;a bitly=&quot;BITLY_PROCESSED&quot; href=&quot;http://ethicalhackernet.blogspot.com/2009/07/securing-application-infrastructure.html&quot;&gt;EthicalHacker&lt;/a&gt;.&lt;/span&gt;</description><link>http://je-security.blogspot.com/2009/09/securing-application-infrastructure.html</link><author>noreply@blogger.com (JaviZ)</author><thr:total>1</thr:total></item></channel></rss>