Send Dailydave mailing list submissions to
        dailydave@lists.immunitysec.com

To subscribe or unsubscribe via the World Wide Web, visit
        http://lists.immunitysec.com/mailman/listinfo/dailydave
or, via email, send a message with subject or body 'help' to
        [EMAIL PROTECTED]

You can reach the person managing the list at
        [EMAIL PROTECTED]

When replying, please edit your Subject line so it is more specific
than "Re: Contents of Dailydave digest..."


Today's Topics:

   1. Re: DNS Speculation ([EMAIL PROTECTED])
   2. Re: Blog spam, obfuscated javascript and more! (val smith)
   3. Re: Tool release: [evilgrade] - A question about Mac      Updates
      (Francisco Amato)
   4. SecTor 2008 Call for Speakers - Second Round (Brian Bourne)
   5. DNS and other fun. (Dave Aitel)
   6. Re: DNS and other fun. (H D Moore)


----------------------------------------------------------------------

Message: 1
Date: Mon, 28 Jul 2008 09:45:33 -0700
From: [EMAIL PROTECTED]
Subject: Re: [Dailydave] DNS Speculation
To: Philippe Biondi <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED]
Message-ID:
        <[EMAIL PROTECTED]>
Content-Type: text/plain; charset="US-ASCII"

Philippe Biondi <[EMAIL PROTECTED]> wrote on 07/26/2008 01:00:57 PM:
> 
> Did you do something like:
> 
> for i in range(500):
>      send(pkt)
> or
> while True:
>      send(pkt)
> 
> In this case the "optimised" way to do it would be (resp.) :
> 
> send(pkt*500)

Passing a list of packets to send() was the first optimization I tried.
But it was still too slow.

> At last resort, you have the sendpfast() function which Bryan
> spoke about.

I didn't try sendpfast(), but, yes, according to Bryan this seems to
be the solution.

> Or did the problem was that the time between creating the packet and 
> having it hit the wire is too big because most of the initialisation 
> done by send() could have been done before ?
> 
> In this case, the way to do it would be to avoid send()'
> high-levelness and directly use scapy layer 3 socket:
> 
> s = conf.L3socket()
> while True:
>    ** do stuff, create pkt **
>    s.send(pkt)

This is the 2nd optimization I tried, and the fastest scapy exploit I
could come up with. But even when stracing it, I could see extra system
calls being called between the sendto(). IIRC this 2nd optimization
allowed me to send packets at a rate about 2 or 3 times faster than my
first Python version, but it was still about twice as slow as my C
implementation.

> In any cases, I'm interested by feedback on improvements this could 
> provide.

I think sendpfast() is a good solution for this case.

-marc


------------------------------

Message: 2
Date: Mon, 28 Jul 2008 11:44:37 -0600
From: "val smith" <[EMAIL PROTECTED]>
Subject: Re: [Dailydave] Blog spam, obfuscated javascript and more!
To: dailydave <dailydave@lists.immunitysec.com>
Message-ID:
        <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=ISO-8859-1

The thing that I would say is that everyone should know when you go to
my site you will be encountering live malware. I'm sort of a "full
disclosure for malware" type of person. I don't censor anything,
unlike many other analysis organizations. I respect their position on
censoring things like links, etc. but I believe in a different way.

I have a big warning on my site, but just to re-iterate: Offensive
Computing has live, malicious samples of evil software. We will also
post direct links to bad guys and sites hosting malware. This is so
competent analysts can find the samples, know what they are dealing
with and so we are all on equal footing. I don't want to be the only
one holding the information and everyone else has to guess about it.

The malware disclosure debate is decades old and won't ever be
resolved, (definitely not by me)  but I will keep on doing what I
think is right.

Therefore you should always use best safety practices at all times,
such as sandboxes, virtual machines, safe browsers, safe document
viewers, etc. I don't even surf the web from a non-virtualized host
anymore.

V.

On Mon, Jul 28, 2008 at 9:22 AM, Petja van der Lek <[EMAIL PROTECTED]> wrote:
> A word of warning might be in order: the PDF is filled with hyperlinks to
> (presumably) live malware sites. Navigating the document is therefore not
> unlike playing Minesweeper. Red flags are not powerups but mean "danger".
> Mis-click to get pwned. Stuff like that. You might want to use a reader that
> at least asks for confirmation before it serves up the site in your browser
> (a quick test shows that Adobe Reader 7 as a Firefox plugin happily opens a
> link without asking anything, for instance).
>
> That said, it's an excellent read!
>
> Cheers,
> Lek.
>
> val smith wrote:
>>
>> Don't know how many of you care about malware stuff but just in case,
>> we released a paper on OC:
>>
>> http://www.offensivecomputing.net/papers/valsmith_colin_blog_spam.pdf
>>
>> Its pretty rough and disorganized but covers some reversing, analyzing
>> obfuscated javascript, and the potential home IP of one of the
>> "attackers".
>>
>> V.
>>
>>
>



-- 
******************************************
* Val Smith
* CTO Offensive Computing, LLC
* http://www.offensivecomputing.net
*******************************************


------------------------------

Message: 3
Date: Tue, 29 Jul 2008 10:31:22 -0300
From: "Francisco Amato" <[EMAIL PROTECTED]>
Subject: Re: [Dailydave] Tool release: [evilgrade] - A question about
        Mac     Updates
To: "Joanna Rutkowska" <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED]
Message-ID:
        <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=ISO-8859-1

Hello Joanna,
The module osx.pm exploit the vulnerability CVE 2007-5863, discoverer
by Moritz Jodeit.
This module allows for arbitrary command execution through "cmd" variable.
Regards,

-- 
Francisco Amato

[ISR] - Infobyte Security Research
Chile 1441 - Segundo Cuerpo - Primer Piso
[C1098ABC] Buenos Aires - Argentina
Tel: 43837000
http://www.infobyte.com.ar

On Tue, Jul 29, 2008 at 5:05 AM, Joanna Rutkowska
<[EMAIL PROTECTED]> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> [ISR] - Infobyte Security Research wrote:
> |
> | Implemented modules:
> | ---------------------------------
> | - Java plugin
> | - Winzip
> | - Winamp
> | - MacOS
> | - OpenOffices
> | - iTunes
> | - Linkedin Toolbar
> | - DAP [Download Accelerator]
> | - notepad++
> | - speedbit
> |
>
> So, Mac OSX's Software Update doesn't verify signatures of the update
> packages it downloads? Given then Leopard's so much advertised code
> signing feature, I would expect that all the updates are signed. Can you
> please comment on this?
>
> For example most of the Apple-provided App packages are indeed signed --
> you can verify this using e.g. this command:
>
> find /Applications -name "*.app" -exec codesign -v {} \;
>
> Some interesting exceptions though:
>
> /Applications/iWork '08/Keynote.app: code object is not signed
> /Applications/iWork '08/Numbers.app: code object is not signed
> /Applications/iWork '08/Pages.app: code object is not signed
>
> :)
>
> Unfortunately verifying e.g. /System/Library/Extensions is even worse,
> i.e. even more unsigned packages.
>
> But still, I would expect that maybe Apple doesn't sign every single
> executable (BTW, MS is doing that since Windows 2000), but at least signs
> the update packages? No?!
>
> Thanks,
> joanna.
>
> -----BEGIN PGP SIGNATURE-----
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
>
> iEYEARECAAYFAkiOzz4ACgkQORdkotfEW87J8wCeK5GUh5OlsWdoDEGPRaAOHt27
> joEAoL+XFo1xCBCkSaUmPVinKLNwO++P
> =ZShx
> -----END PGP SIGNATURE-----
>


------------------------------

Message: 4
Date: Tue, 29 Jul 2008 10:49:45 -0400
From: Brian Bourne <[EMAIL PROTECTED]>
Subject: [Dailydave] SecTor 2008 Call for Speakers - Second Round
To: "dailydave@lists.immunitysec.com"
        <dailydave@lists.immunitysec.com>
Message-ID:
        <[EMAIL PROTECTED]>
Content-Type: text/plain; charset="us-ascii"

SecTor 2008 is currently open to speaking proposals.  Visit 
http://www.sector.ca/ to learn more about the event.

SecTor is all about the meat -- The content that matters to Canadian IT 
Security Professionals today.  Of course we'll have fun and celebrate having 
the world's best in Toronto, but the key to SecTor's success, and thus the 
primary objective of the Management Committee and Advisory Committee, is 
quality content and presentation for attendees.

This is a call for speakers/papers. If we haven't approached you, but you 
believe you have a significant discovery or new research that the security 
community would value, or enjoy hearing about, we invite you to submit your 
presentation topic for serious consideration.  Selected speakers will have 
travel costs covered.

This is now the second and final round of speaker selection, please make your 
proposal submissions before August 31st, 2008.  Selections will be announced 
early in September.  You will not be contacted until that time.  To allow for 
late breaking research to be presented, submissions after the deadline will be 
accepted on an exception basis only.

SecTor attendees are a mix of security professionals and vendors, programmers, 
students, network administrators and IT executives. Preference will be given to 
speakers who can present new and innovative technical content to a broad 
audience. Of course, all presentations are expected to challenge the brightest 
and quickest of attendees - we wouldn't have it any other way.

SecTor is not a vendor fair. Consequently, there will be very little tolerance 
for commercial content within presentations. Attendees will be encouraged to 
quell any shameless marketing that is not immediately backed up with rationale 
for its inclusion.

Proposals should consist of the following information:
1. Presenter and contact info (country of origin and residence-mail, postal 
address, phone, fax).
2. Employer and/or affiliations.
3. Brief biography, list of publications and papers.
4. Any significant presentation and educational experience/background.
5. Topic synopsis, Proposed paper title, and a one paragraph description.
6. Reason why this material is innovative or significant or an important 
tutorial.
7. Optionally, any samples of prepared material or outlines ready.
8. Will you have full text available or only slides?
9. Please list any other publications or conferences where this material has 
been or will be published/submitted.

Please include the plain text version of this information in your email as well 
as any file, pdf, sxw, ppt, or html attachments.

Please forward the above information to [EMAIL PROTECTED]
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
http://lists.immunitysec.com/pipermail/dailydave/attachments/20080729/5159b6fd/attachment-0001.htm
 

------------------------------

Message: 5
Date: Tue, 29 Jul 2008 16:59:51 -0400
From: Dave Aitel <[EMAIL PROTECTED]>
Subject: [Dailydave] DNS and other fun.
To: [EMAIL PROTECTED]
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


If you're mucking with Marc Bevand's exploit in order to do some speed 
comparisons you may want to fix this line:
(sizeof(buf) is 4 since buf is a pointer, of course).

~   dns_response(buf + IP_HDR_LEN + UDP_HDR_LEN,
~         (unsigned)(IP_LEN_MAX - (IP_HDR_LEN + UDP_HDR_LEN)), <--fixed.

We're not using Scapy here, but in Python (and Ruby, I assume?) you 
don't want to do your creation of packets along-side your sending of 
packets. You probably want to do something like this:

buffers=create_all_data_buffers()
for buffer in buffers:
~   raw_sock_send(buffer)

I'm not sure how having tcpreplay helps since all your packets are 
different (via TXID incrementing, which of course means you have to do 
your UDP checksum over). Is packet-loss the big problem you're seeing? 
Importing psyco should make your Python code faster as well, although 
still REALLY slow compared to C (so far in my testing). People say that 
the public exploits don't work with Bind9 (even unpatched). Go Vixie and 
Co! :>

And in Vegas news:
It is true, hackers do get the girls. Just like in the movies. Even more
so really, now that the economy is crappier so being able to afford your
house payment is uber-sexy...

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Immunity is bringing the test, Edgeos <http://www.edgeos.com/> is
bringing the Sexy Hacking girls <http://sexyhacking.com>. Rumor has it
that certified NOP's might receive invitations to the exclusive and
still-secret Sexy Hacking party at Defcon. More details soon!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

- -dave
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIj4TFtehAhL0gheoRAoi/AJ42lTry1I1XVmnVp29EQkPf7mHtTwCffOrE
Azq4oLsFxjRMJjJqV7kGgXM=
=D6uJ
-----END PGP SIGNATURE-----



------------------------------

Message: 6
Date: Tue, 29 Jul 2008 16:58:39 -0500
From: H D Moore <[EMAIL PROTECTED]>
Subject: Re: [Dailydave] DNS and other fun.
To: [EMAIL PROTECTED]
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain;  charset="utf-8"

I still don't understand why speed *matters* -- the existing metasploit 
modules nail every BIND 9 server I have tested within a minute or two (as 
long as they have a static source port). I imagine speed would be more of 
a concern for more-random source ports, but this craze over 10 seconds vs 
two minutes seems ridiculous. I don't mind waiting a couple minutes to 
poison an entire TLD.

The one major optimization we added to the metasploit modules was the 
ability to determine the race window for a particular cache server and 
target domain. This prevents us from sending packets after the real one 
has already arrived and resulted in a 3-4 x speedup. Even still, 
poisoning a TLD with 13 nameservers just isn't that long of a wait.

My 0.02,

-HD

On Tuesday 29 July 2008, Dave Aitel wrote:
> We're not using Scapy here, but in Python (and Ruby, I assume?) you
> don't want to do your creation of packets along-side your sending of
> packets. You probably want to do something like this:




------------------------------

_______________________________________________
Dailydave mailing list
Dailydave@lists.immunitysec.com
http://lists.immunitysec.com/mailman/listinfo/dailydave


End of Dailydave Digest, Vol 36, Issue 19
*****************************************

Reply via email to