Send Dailydave mailing list submissions to
        dailydave@lists.immunitysec.com

To subscribe or unsubscribe via the World Wide Web, visit
        http://lists.immunitysec.com/mailman/listinfo/dailydave
or, via email, send a message with subject or body 'help' to
        [EMAIL PROTECTED]

You can reach the person managing the list at
        [EMAIL PROTECTED]

When replying, please edit your Subject line so it is more specific
than "Re: Contents of Dailydave digest..."


Today's Topics:

   1. Announce: Peach 2.2 Released (Michael Eddington)
   2. Owning Lotus Notes Server & Client (DSquare Security)
   3. CapSec DC / October /  10/29/2008 ([EMAIL PROTECTED])
   4. Deadline extension: ICNS 2009 + 1st Workshop LMPCNAP |    April
      21-25, 2009 - Valencia, Spain (Jaime Lloret Mauri)
   5. Reflective DLL Injection (Stephen Fewer)
   6. TechTarget Information Security Decisions Conference (Dave Aitel)
   7. All Ur WiFi(WPA) R Belong 2 PacSec (Dragos Ruiu)
   8. Re: TechTarget Information Security Decisions Conference
      (J Wilder)
   9. Re: All Ur WiFi(WPA) R Belong 2 PacSec (Dave Aitel)


----------------------------------------------------------------------

Message: 1
Date: Sat, 25 Oct 2008 13:45:28 -0700
From: "Michael Eddington" <[EMAIL PROTECTED]>
Subject: [Dailydave] Announce: Peach 2.2 Released
To: dailydave@lists.immunitysec.com
Message-ID:
        <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=ISO-8859-1

I'm pleased to announce the release of Peach 2.2 the most widely used
open source fuzzer.  Peach is an easily extended fuzzing platform
that can fuzz just about anything from file parsers and network
protocols to COM objects and SQL stored procedures.

Whats new:

 * Win32: Binary distribution with no dependencies
 * State model paths
 * Enable/disable mutations by node
 * Offset support via:
   - Offset-of relation
   - Seek element
   - Placement element
 * Peach Validation hex view
 * Updated and new mutators
 * Improved App Verifier support
   - Exclude specific stop codes
   - Custom check model list
 * Major speed improvements
 * New/updated supporting tools:
   - minset - Find the minimum set of files
   - missing - Gap analysis between files and pit
   - struct2peach - Convert 010 Templates to Peach
 * Numerous bug fixes

Peach Documentation:

 http://peachfuzzer.com
 http://peachfuzzer.com/PeachQuickstart

Peach downloads:

 * Win32 installer: http://downloads.sourceforge.net/peachfuzz/Peach-2.2.exe
 * Python source: http://downloads.sourceforge.net/peachfuzz/Peach-2.2-src.zip
 * Python dependencies:
http://downloads.sourceforge.net/peachfuzz/Peach-2.2-dependencies-src.zip

Peach Training @ PacSec 2008 in Tokyo, JP

A two day Peach training class is being offered at PacSec 2008 in
Tokyo, JP. This will be the first time Peach training has been offered
in Asia. For additional information please see the course description.

http://pacsec.jp/dojopeachfuzz.html


------------------------------

Message: 2
Date: Mon, 27 Oct 2008 17:48:04 -0500
From: DSquare Security <[EMAIL PROTECTED]>
Subject: [Dailydave] Owning Lotus Notes Server & Client
To: dailydave@lists.immunitysec.com
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=us-ascii

There are several ways to get a Lotus Notes ID during a pentest
(access to a share with all the IDs, client side exploitation, ...)
After that, if needed, you can crack the password ID with commercial 
or free tools (ID Password Recovery for example)

So what can you do with an admin ID? Potentially two things:
1) Compromise the Lotus Notes server
2) Compromise the computer of the Lotus Notes clients

D2Lotus is designed to help you in this kind of work. Here are two
demonstrations of this tool:

1) Remote code execution on a Lotus Notes server:
   http://www.d2sec.com/d2lotus_1.htm

2) Remote code execution on computer user via Lotus Notes Client:
   http://www.d2sec.com/d2lotus_2.htm 


This tool will be released in the next update of D2 Exploitation Pack.


-- 
DSquare Security, LLC
http://www.d2sec.com



------------------------------

Message: 3
Date: Tue, 28 Oct 2008 21:32:42 -0400
From: [EMAIL PROTECTED]
Subject: [Dailydave] CapSec DC / October /  10/29/2008
To: dailydave@lists.immunitysec.com
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset="UTF-8"


Greetings Dave / DailyDavers!

CapSec DC is a monthly social event for security industry types, 
located in the Washington DC / Beltway area.

We're a spin off, of the growingly popular bay-sec event out in SF, 
and have thus-far managed to attract a good
mix of local security folk, some of whom are household industry 
names.

If you're looking for an audience for your latest sales pitch then 
this probably isn't the place for you, however
if you're interested in coming along to socialize, have a drink and 
talk a little shop, we look forward to seeing
you!

Generally, occurring on the last Wednesday of each month, we meet 
around 7PM at Stetsons Bar at 16th and U (NW).

Details for this months gathering (tomorrow, Wednesday 29th) are as 
follows:

-----
CapSecDC
Wednesday October 29th, 7:00 PM

Stetson?s
1610 U St NW
Washington DC 20009

If we are not in the back yard, we?ll probably be at the big tables 
near the jukeboxes.

We reserve the right to change venues as the evening wears on ? 
previously we have walked down U Street, other venues might include 
The Saloon or DC9. 
-----

If you would like to attend and have any questions, please just 
reply to [EMAIL PROTECTED], or leave a message/comment at our 
blog at:

http://capsecdc.org/blog/

--
Click here to find the perfect picture with our powerful photo search features.
http://tagline.hushmail.com/fc/Ioyw6h4dI2fnInkHE2TA2nyabq0B7LZ6OWBYFaAg0UsqUGe7V3lhNk/



------------------------------

Message: 4
Date: Fri, 31 Oct 2008 15:02:29 +0100
From: Jaime Lloret Mauri<[EMAIL PROTECTED]>
Subject: [Dailydave] Deadline extension: ICNS 2009 + 1st Workshop
        LMPCNAP |       April 21-25, 2009 - Valencia, Spain
To: dailydave@lists.immunitysec.com
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=us-ascii


Note that the deadline for ICNS 2009 + 1st Workshop LMPCNAP has been extended 
to November 10.

We would like to make ICNS 2009 a primary reference event. 

Please consider to contribute to and/or forward to the appropriate groups the 
following opportunity to submit and 
publish original scientific results.

Please note that extended versions of highly ranked papers will be invited for 
journals submission.

Full contributions are expected by the submission deadline.


=========== ICNS 2009 + 1st Workshop LMPCNAP | Call for Papers ===========
 
CALL FOR PAPERS, TUTORIALS, PANELS 

- ICNS 2009, The Fifth International Conference on Networking and Services 
April 21-25, 2009 - Valencia, Spain 
 
General page: http://www.iaria.org/conferences2009/ICNS09.html
Call for Papers: http://www.iaria.org/conferences2009/CfPICNS09.html

- The first International Workshop on Learning Methodologies and Platforms used 
in the Cisco Networking Academy 
Program (CNAP), LMPCNAP 2009 will be held during ICNS 2009 in April 21-25, 2009 
- Valencia, Spain 
 
General page: http://www.iaria.org/conferences2009/LMPCNAP.html

Important deadlines:
 
Submission (full paper)  November 10, 2008  
Authors notification December 5, 2008  
Registration December 20, 2008  
Camera ready  December 25, 2008  

Submissions will be peer-reviewed, published by IEEE CS Press, posted in IEEE 
Digital Library, and indexed with 
the major indexes. 
 
Extended versions of selected papers will be published in IARIA Journals: 
http://www.iariajournals.org 

Please note the Poster Forum special submission with on progress and 
challenging ideas.

ICNS 2009 Area Tracks are the following (details in the CfP on site):
 
ENCOT: Emerging Network Communications and Technologies
COMAN: Network Control and Management
SERVI: Multi-technology service deployment and assurance
NGNUS:  Next Generation Networks and Ubiquitous Services
MPQSI: Multi Provider QoS/SLA Internetworking
GRIDNS: Grid Networks and Services
EDNA: Emergency Services and Disaster Recovery of Networks and Applications
IPv6DFI: Deploying the Future Infrastructure
IPDy: Internet Packet Dynamics
GOBS: GRID over Optical Burst Switching Networks

 
=================================

- ICNS General Chair

Jaime Lloret Mauri, Polytechnic University of Valencia, Spain

- ICNS 2009 Industry Chairs

Kevin Y Ung, Boeing, USA 
Leo Lehmann, OFCOM, Switzerland
Francisco Javier Sánchez, Administrador de Infraestructuras Ferroviarias 
(ADIF), Spain

- ICNS 2009 Technical Program Committee Chair

Giancarlo Fortino, Università della Calabria, Italy
Salvador Sales, Polytechnic University of Valencia, Spain
Feng Xia, Queensland University of Technology, Australia / Zhejiang University, 
China  
 
- ICNS Advisory Chairs

Wojciech Burakowski, Warsaw University of Technology, Poland
Vicente Casares, Polytechnic University of Valencia, Spain
Petre Dini, Cisco Systems, Inc., USA / Concordia University, Canada
Xiaohua Jia, City University of Hong Kong - Kowloon, Hong Kong 
Manuel Sierra-Pérez, Universidad Politécnica de Madrid, Spain

- LMPCNAP 2009 General Chair

Rafael Tomas, Mediterranean Cisco Academy Training Center (CATC), Spain

- LMPCNAP 2009 Technical Program Commitee chair

Prof. Tomeu Serra, Universitat de les Illes Balears, Spain 

================================


------------------------------

Message: 5
Date: Fri, 31 Oct 2008 17:58:02 +0000
From: Stephen Fewer <[EMAIL PROTECTED]>
Subject: [Dailydave] Reflective DLL Injection
To: dailydave@lists.immunitysec.com
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=ISO-8859-1

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello, Just released a short paper on Reflective DLL Injection.

Abstract: Reflective DLL injection is a library injection technique in
which the concept of reflective programming is employed to perform the
loading of a library from memory into a host process. As such the
library is responsible for loading itself by implementing a minimal
Portable Executable (PE) loader.

You can download the paper here:
http://www.harmonysecurity.com/files/HS-P005_ReflectiveDllInjection.pdf

And the PoC code here:
http://www.harmonysecurity.com/files/ReflectiveDllInjection_v1.0.zip

Support for Reflective DLL Injection has been added to Metasploit in the
form of a payload stage and a modified VNC DLL (both are currently in
the development tree).

Cheers

Stephen Fewer
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (MingW32)

iEYEARECAAYFAkkLRyoACgkQQIrmi1YdFr4jOgCfRcZn+XKIS36fzTOPhIcAfiQj
e0IAoLmUxJqKZaUiticQ5nSCVFABeNjc
=yQXH
-----END PGP SIGNATURE-----


------------------------------

Message: 6
Date: Thu, 06 Nov 2008 09:09:41 -0500
From: Dave Aitel <[EMAIL PROTECTED]>
Subject: [Dailydave] TechTarget Information Security Decisions
        Conference
To: [EMAIL PROTECTED]
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=ISO-8859-1

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm here in Chicago at the TechTarget Information Security Decisions
conference [1]. It seems like every second person in Chicago worked
for the Obama campaign, although my cabbie on the way to the airport
was convinced Obama was a Muslim and "The Antichrist".

One interesting thing they did was have 5 ten minute sessions for new
technology companies in information security. Probably my favorite was
NetWitness. Like every new company, NetWitness focuses on data
correlation almost as much as they focus on data collection, if not
more. One of the more striking things about it was the speaker they
sent up - very non-marketing. He sounded like he'd written some of the
code behind it.

His talk was simple: Here's what you do today, and it just doesn't
work against 0day. Here's some graphs we have that help you analyze
0day attacks on your network, which we generate by collecting every
packet you send. That way you can do your own anomaly detection
instead of relying on some sort of algorithm to give you fuzzy results.

*I* don't believe any sort of sniffer is the answer, but he was still
the best-in-show in my opinion. In any case, I'll be talking on the
panel today at 1:55pm if you want to come by and grade MY performance. :>


[1] http://infosecurityconference.techtarget.com/conference/index.html

- -dave
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFJEvqktehAhL0gheoRAjwbAJ0fs91Cjur09yiBRaeTJNZuaWD9NACfVyhv
Jmn6+itZHUVEgzIlAIutSNE=
=eCZU
-----END PGP SIGNATURE-----



------------------------------

Message: 7
Date: Thu, 6 Nov 2008 22:54:50 -0800
From: Dragos Ruiu <[EMAIL PROTECTED]>
Subject: [Dailydave] All Ur WiFi(WPA) R Belong 2 PacSec
To: dailydave@lists.immunitysec.com
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain;  charset="iso-8859-1"

Just as a heads up, one of the author(s) of the first practical crypto
attack against WPA secured wireless networks, besides
launching a dictionary attack when a weak pre-shared keys(PSK)
are used, Erik Tews, will be speaking at PacSec in Tokyo, on
Thursday next week. More specifically, his attack uses a
combination of protocol weaknesses and cryptographic
weaknesses to compromise TKIP encryption. The attack
lets the attacker inject seven packets into the network,
per decrypt window. It's an interesting attack, because it 
also hints at other attack forms, so it is rather open 
ended research.

You should discontinue use of TKIP is my recommendation.

The problem with this is that most AP implementations that
I have seen will automatically drop back to TKIP from CCMP(AES)
to support older clients. You should disable this if you are
given the option on your AP or WiFi router configuration.
Unfortunately how to do this varies on each router's
configuration systems, and some routers do not
provide facilities to do this.

If you aren't given the option to disable this, you might want
to think about getting a different Access Point or WiFi Router. :-)

You should seriously consider using some higher level
encryption facilities such as a VPN, IPsec, or SSH
to secure your communications over wireless.
Look at ssh -D <port> (or equivalent putty options)
to a wired host and the socks proxy options on
your browser to use that port on localhost, when
surfing over wireless.

On some equipment CCMP is called WPA2 and TKIP is WPA.
The WPA spec leaves support of CCMP(AES) optional
while the WPA2 spec mandates both TKIP and AES
capability.

Important WPA/WPA2 Recommendations:

-Use only CCMP(AES).
-Disable Negotiations to TKIP from CCMP(AES).
-If you must use TKIP, rekey every 120 seconds.

Quote:
To prevent this attack, we suggest using a very short rekeying time,
for example 120 seconds or less. ... The best solution would be
disabling TKIP and using a CCMP only network.

Oh, P.S. AFAIK some of the code to do this attack is out :).

If you want to find out more, you have to come to PacSec. :-)
The details are fairly intricate but the bottom line is above.
Consider yourselves duly warned.

cheers,
--dr

-- 
World Security Pros. Cutting Edge Training, Tools, and Techniques
Buenos Aires, Argentina ? Sept. 30 / Oct. 1 - 2008 ? ?http://ba-con.com.ar
Tokyo, Japan ?November 12/13 2008 ?http://pacsec.jp
Vancouver, Canada ?March 16-20 2009 ?http://cansecwest.com
pgpkey http://dragos.com/ kyxpgp


------------------------------

Message: 8
Date: Thu, 6 Nov 2008 10:06:25 -0500
From: "J Wilder" <[EMAIL PROTECTED]>
Subject: Re: [Dailydave] TechTarget Information Security Decisions
        Conference
To: <[EMAIL PROTECTED]>
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain;       charset="us-ascii"

Yet not entirely new...
http://findarticles.com/p/articles/mi_m0EIN/is_/ai_n6089017

2004:
ManTech International Corporation (Nasdaq:MANT), a leading provider of
innovative technologies and solutions focused on mission-critical national
security programs for the Department of Defense, Intelligence Community, the
Department of State, the Department of Justice, Department of Homeland
Security and other federal government customers announced today the
introduction of NetWitness version 5.0, an enhanced version of the popular
network wiretap tool that offers improved analytics features and increased
capabilities to monitor Voice over Internet Protocol (VoIP) traffic.
...

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Dave Aitel
Sent: Thursday, November 06, 2008 09:10
To: [EMAIL PROTECTED]
Subject: [Dailydave] TechTarget Information Security Decisions Conference

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm here in Chicago at the TechTarget Information Security Decisions
conference [1]. It seems like every second person in Chicago worked
for the Obama campaign, although my cabbie on the way to the airport
was convinced Obama was a Muslim and "The Antichrist".

One interesting thing they did was have 5 ten minute sessions for new
technology companies in information security. Probably my favorite was
NetWitness. Like every new company, NetWitness focuses on data
correlation almost as much as they focus on data collection, if not
more. One of the more striking things about it was the speaker they
sent up - very non-marketing. He sounded like he'd written some of the
code behind it.

His talk was simple: Here's what you do today, and it just doesn't
work against 0day. Here's some graphs we have that help you analyze
0day attacks on your network, which we generate by collecting every
packet you send. That way you can do your own anomaly detection
instead of relying on some sort of algorithm to give you fuzzy results.

*I* don't believe any sort of sniffer is the answer, but he was still
the best-in-show in my opinion. In any case, I'll be talking on the
panel today at 1:55pm if you want to come by and grade MY performance. :>


[1] http://infosecurityconference.techtarget.com/conference/index.html

- -dave
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFJEvqktehAhL0gheoRAjwbAJ0fs91Cjur09yiBRaeTJNZuaWD9NACfVyhv
Jmn6+itZHUVEgzIlAIutSNE=
=eCZU
-----END PGP SIGNATURE-----

_______________________________________________
Dailydave mailing list
Dailydave@lists.immunitysec.com
http://lists.immunitysec.com/mailman/listinfo/dailydave



------------------------------

Message: 9
Date: Fri, 07 Nov 2008 10:27:21 -0500
From: Dave Aitel <[EMAIL PROTECTED]>
Subject: Re: [Dailydave] All Ur WiFi(WPA) R Belong 2 PacSec
To: Dragos Ruiu <[EMAIL PROTECTED]>
Cc: dailydave@lists.immunitysec.com
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=ISO-8859-1

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

This article has a good summary of the technique, for those not going
to Japan. While good work, it's not going to worry me if I have a WPA
network set up at home or as part of my business. At least, not yet
(and maybe not ever - we'll see :> ).

The other mitigating factors according to the article are:
 o It works like chopchop on small packets only
 o Busy networks might make it impractical
 o You can only send packets from the AP to the endpoints

http://arstechnica.com/articles/paedia/wpa-cracked.ars

- -dave




Dragos Ruiu wrote:
> Just as a heads up, one of the author(s) of the first practical
> crypto attack against WPA secured wireless networks, besides
> launching a dictionary attack when a weak pre-shared keys(PSK) are
> used, Erik Tews, will be speaking at PacSec in Tokyo, on Thursday
> next week. More specifically, his attack uses a combination of
> protocol weaknesses and cryptographic weaknesses to compromise TKIP
> encryption. The attack lets the attacker inject seven packets into
> the network, per decrypt window. It's an interesting attack,
> because it also hints at other attack forms, so it is rather open
> ended research.
>
> You should discontinue use of TKIP is my recommendation.
>
> The problem with this is that most AP implementations that I have
> seen will automatically drop back to TKIP from CCMP(AES) to support
> older clients. You should disable this if you are given the option
> on your AP or WiFi router configuration. Unfortunately how to do
> this varies on each router's configuration systems, and some
> routers do not provide facilities to do this.
>
> If you aren't given the option to disable this, you might want to
> think about getting a different Access Point or WiFi Router. :-)
>
> You should seriously consider using some higher level encryption
> facilities such as a VPN, IPsec, or SSH to secure your
> communications over wireless. Look at ssh -D <port> (or equivalent
> putty options) to a wired host and the socks proxy options on your
> browser to use that port on localhost, when surfing over wireless.
>
> On some equipment CCMP is called WPA2 and TKIP is WPA. The WPA spec
> leaves support of CCMP(AES) optional while the WPA2 spec mandates
> both TKIP and AES capability.
>
> Important WPA/WPA2 Recommendations:
>
> -Use only CCMP(AES). -Disable Negotiations to TKIP from CCMP(AES).
> -If you must use TKIP, rekey every 120 seconds.
>
> Quote: To prevent this attack, we suggest using a very short
> rekeying time, for example 120 seconds or less. ... The best
> solution would be disabling TKIP and using a CCMP only network.
>
> Oh, P.S. AFAIK some of the code to do this attack is out :).
>
> If you want to find out more, you have to come to PacSec. :-) The
> details are fairly intricate but the bottom line is above. Consider
> yourselves duly warned.
>
> cheers, --dr
>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFJFF5ZtehAhL0gheoRAreXAJ0XEpxnbWIAkCb2uYMNEdVMeB2KHwCeM6Fk
qva3gj7/uznxX9pmHha3sEY=
=fvvr
-----END PGP SIGNATURE-----



------------------------------

_______________________________________________
Dailydave mailing list
Dailydave@lists.immunitysec.com
http://lists.immunitysec.com/mailman/listinfo/dailydave


End of Dailydave Digest, Vol 40, Issue 1
****************************************

Reply via email to