So true, the security chhallenge always inspires us
Lava Kafle
Ms by Research in Computer Science
Kathmandu University
cell:
9841224387
9801034557




On Wed, Mar 6, 2013 at 6:17 AM, Bryan E. Wooten <bryan.woo...@utah.edu>wrote:

>  All,
>
>  Last week we had an internal State security audit.
>
>  One of their tests was to copy our CAS login page and host it on their
> own server. They then sent an email to many on campus with a link asking
> them to verify some information, which started with a CAS login page. Even
> though Outlook marked the email a potential phishing some people clicked
> the link and had their password captured. Sigh.
>
>  We all noticed that the address bar url was suspect. I was thinking I
> could put some obfusticated  java script in the login page and have it
> email my group in the event someone else tried this. The javascript would
> detect the incorrect address in the address bar. Is this feasible? Or is it
> too easily disabled?
>
>  One of my co-workers also caught the bogus CAS page, fired up jmeter and
> hit the bogus login page with 20,000 login attempts. That brought the bogus
> login web server down. Got to love DDOS. The auditors said that was
> unethical. Hehe.
>
> Also, not CAS related, they also soaked some paper in hot water and slide
> it under a door. This triggered the inside infrared detector and unlocked
> the door from the inside, allowing access a computer room. There they found
> a laptop that was not locked and used the information on the laptop to
> social engineer password resets with help desk. Evil.
>
>  Know the enemy.
>
>  Cheers,
>
>  Bryan
>
> --
> You are currently subscribed to cas-dev@lists.jasig.org as: lka...@gmail.com
> To unsubscribe, change settings or access archives, see 
> http://www.ja-sig.org/wiki/display/JSG/cas-dev
>
>

-- 
You are currently subscribed to cas-dev@lists.jasig.org as: 
arch...@mail-archive.com
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-dev

Reply via email to