Send Dailydave mailing list submissions to dailydave@lists.immunitysec.com
To subscribe or unsubscribe via the World Wide Web, visit http://lists.immunitysec.com/mailman/listinfo/dailydave or, via email, send a message with subject or body 'help' to dailydave-requ...@lists.immunitysec.com You can reach the person managing the list at dailydave-ow...@lists.immunitysec.com When replying, please edit your Subject line so it is more specific than "Re: Contents of Dailydave digest..." Today's Topics: 1. Re: Clever DEP Trick (Ian Melven) 2. 0day, it may not be (dave) 3. Re: 0day, it may not be (Nate Lawson) 4. Re: 0day, it may not be (I)ruid) 5. Re: 0day, it may not be (Rob Fuller) 6. Apple patent lawyers fail to close ddtek, Defcon CTF goes on (v...@n) 7. Re: 0day, it may not be (cocoruder.) 8. Re: 0day, it may not be (Nicolas RUFF) 9. Re: 0day, it may not be (Thierry Zoller) 10. Count Zero (Dave Aitel) ---------------------------------------------------------------------- Message: 1 Date: Wed, 31 Mar 2010 09:06:14 -0700 From: Ian Melven <ian.mel...@gmail.com> Subject: Re: [Dailydave] Clever DEP Trick To: dailydave@lists.immunitysec.com, full-disclos...@lists.grok.org.uk Message-ID: <j2z595932141003310906p75aa4900z3ff2842dda594...@mail.gmail.com> Content-Type: text/plain; charset=ISO-8859-1 dude i love that clip of you the soup uses where you say THAT'S THE PROBLEM http://www.youtube.com/watch?v=1zsZ__BMr_Q congrats on joining the whitehat community and fighting cybercrime. On Tue, Mar 30, 2010 at 2:44 PM, Spencer Pratt <spencer.w.pr...@gmail.com> wrote: > Enjoy. > > _______________________________________________ > Dailydave mailing list > Dailydave@lists.immunitysec.com > http://lists.immunitysec.com/mailman/listinfo/dailydave > > ------------------------------ Message: 2 Date: Thu, 01 Apr 2010 10:52:13 -0400 From: dave <d...@immunityinc.com> Subject: [Dailydave] 0day, it may not be To: dailydave@lists.immunitysec.com Message-ID: <4bb4b31d.1030...@immunityinc.com> Content-Type: text/plain; charset=ISO-8859-1 https://forum.immunityinc.com/board/thread/1199/exploiting-pdf-files-without-vulnerabili/?page=1#post-1199 D2 points out rightfully that everyone with the D2 CANVAS Exploit Pack (email ad...@immunityinc.com now for pricing! :>) has known about this particular feature of PDF's for over two years. D2 comes with an NDA, so it's not surprising it's not "General Knowledge" but the well-funded among you should at least stop acting so surprised. :> Speaking of funding, Immunity is hiring. https://www.immunityinc.com/downloads/OpeningsApril2010.pdf We should play a game of "functions you can use to bypass DEP" - first person to reach 100 wins? -dave ------------------------------ Message: 3 Date: Thu, 01 Apr 2010 09:55:23 -0700 From: Nate Lawson <n...@root.org> Subject: Re: [Dailydave] 0day, it may not be To: dave <d...@immunityinc.com> Cc: dailydave@lists.immunitysec.com Message-ID: <4bb4cffb.1030...@root.org> Content-Type: text/plain; charset=ISO-8859-1 dave wrote: > https://forum.immunityinc.com/board/thread/1199/exploiting-pdf-files-without-vulnerabili/?page=1#post-1199 > > D2 points out rightfully that everyone with the D2 CANVAS Exploit Pack > (email ad...@immunityinc.com now for pricing! :>) has known about this > particular feature of PDF's for over two years. D2 comes with an NDA, so > it's not surprising it's not "General Knowledge" but the well-funded > among you should at least stop acting so surprised. :> > > Speaking of funding, Immunity is hiring. > https://www.immunityinc.com/downloads/OpeningsApril2010.pdf At least the copy I downloaded didn't have any exploit code. Can't say that for any other copy (targeted attack?) Kudos for sending your job announcement via the same vector as your exploit. -- Nate ------------------------------ Message: 4 Date: Thu, 01 Apr 2010 11:35:20 -0500 From: "I)ruid" <dr...@caughq.org> Subject: Re: [Dailydave] 0day, it may not be To: dave <d...@immunityinc.com> Cc: "dailydave@lists.immunitysec.com" <dailydave@lists.immunitysec.com> Message-ID: <1270139720.14026.36.ca...@localhost> Content-Type: text/plain; charset="ISO-8859-1" On Thu, 2010-04-01 at 07:52 -0700, dave wrote: > https://forum.immunityinc.com/board/thread/1199/exploiting-pdf-files-without-vulnerabili/?page=1#post-1199 > > D2 points out rightfully that everyone with the D2 CANVAS Exploit Pack > (email ad...@immunityinc.com now for pricing! :>) has known about this > particular feature of PDF's for over two years. D2 comes with an NDA, so > it's not surprising it's not "General Knowledge" but the well-funded > among you should at least stop acting so surprised. :> Honestly, I thought pretty much anyone that has spent any amount of time looking at PDFs was probably aware of the Launch action. I wrote a light PDF generator a couple years ago and discovered the ability to Launch commands in relatively short order, but didn't think it anything interesting as it required user interaction via prompting the user with a dialog. The interesting bits of the recent report is that the Foxit reader specifically does *not* require user interaction[1], and the ability to partially control the dialog message that is displayed to the user in Adobe Reader[2]. The under-lying mechanism of being able to execute commands from within a PDF however is fairly well-known and nothing new, as your post also illustrates. [1] http://blog.didierstevens.com/2010/03/29/escape-from-pdf/ [2] http://blog.didierstevens.com/2010/03/31/escape-from-foxit-reader/ -- I)ruid, C?ISSP dr...@caughq.org http://druid.caughq.org ------------------------------ Message: 5 Date: Thu, 1 Apr 2010 12:56:57 -0400 From: Rob Fuller <jd.mu...@gmail.com> Subject: Re: [Dailydave] 0day, it may not be To: dave <d...@immunityinc.com> Cc: dailydave@lists.immunitysec.com Message-ID: <k2he63164661004010956p139a4a0eic746925aed6e3...@mail.gmail.com> Content-Type: text/plain; charset="iso-8859-1" Linking to a PDF on April Fools Day after just pointing out a PDF binder in the D2 pack... nice Also, Didier isn't pointing out the /launch function as it has been included in Metasploit for quite a while as well. He is (as I understand it) pointing out that his semi-control of the error box lends itself to be much less suspicious than the "C:\WINDOWS\System32\cmd.exe /C @CD..." etc that the current PDF binders display. -- Rob Fuller | Mubix Room362.com | Hak5.org | TheAcademyPro.com Ignore this: x5o...@ap[4\pzx54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* On Thu, Apr 1, 2010 at 10:52 AM, dave <d...@immunityinc.com> wrote: > > https://forum.immunityinc.com/board/thread/1199/exploiting-pdf-files-without-vulnerabili/?page=1#post-1199 > > D2 points out rightfully that everyone with the D2 CANVAS Exploit Pack > (email ad...@immunityinc.com now for pricing! :>) has known about this > particular feature of PDF's for over two years. D2 comes with an NDA, so > it's not surprising it's not "General Knowledge" but the well-funded > among you should at least stop acting so surprised. :> > > Speaking of funding, Immunity is hiring. > https://www.immunityinc.com/downloads/OpeningsApril2010.pdf > > We should play a game of "functions you can use to bypass DEP" - first > person to reach 100 wins? > > -dave > _______________________________________________ > Dailydave mailing list > Dailydave@lists.immunitysec.com > http://lists.immunitysec.com/mailman/listinfo/dailydave > -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.immunitysec.com/pipermail/dailydave/attachments/20100401/9a8a4218/attachment-0001.htm ------------------------------ Message: 6 Date: Thu, 1 Apr 2010 14:15:02 -0400 From: "v...@n" <vulcan.dd...@gmail.com> Subject: [Dailydave] Apple patent lawyers fail to close ddtek, Defcon CTF goes on To: dailydave@lists.immunitysec.com Message-ID: <h2nf6a463401004011115n90ce0873k6b7c06dd87e7d...@mail.gmail.com> Content-Type: text/plain; charset=UTF-8 FOR IMMEDIATE RELEASE 1 APRIL 2010 DEFCON CTF QUALIFIER ANNOUNCED Defense Diutinus Technologies Corp (ddtek) is pleased to announce the round of qualification for DEFON 18 CTF. Stock up on Red Bull, put the pizza delivery on speed dial, polish up your fancy shellcodes, and replenish the duct tape supply. ?The competition for these coveted spots will be held over 55 non-stop hours 21-24 May. ?When the dust clears only the 10 best will be invited to join us this summer in sin city for the annual DEFCON deathmatch. In historical fashion VedaGodz will be automatically be permitted contest entry. However, we wish to point out that real ninjas would still attempt to qualify. The qualification round will again be in the style of game board, but answers need not be in the form of a question. Categories will require teams to demonstrate the superiority of hacking across a vast realm of security. ?This isn't CTF like your mama used to make. Level 1 questions make CISSPs turn red, Level 2 make SANS Fellows cry in frustration, Level 3 are typically only answerable by sheep of above average barnyard intelligence, you get the idea. Pause your atari emulator and hop over the ddtek.biz to register. Only those that pre-register are permitted to play. Registration site: ?http://ddtek.biz/register.html Registration opens: 01 Apr 2010 00:00:00 UTC Registration ends: ?20 May 2010 00:00:00 UTC Qualifications open: 21 May 2010 19:00:00 UTC Qualifications ends: 24 May 2010 02:00:00 UTC More information that will follow via your registered email address. Those with SANS certs need not apply. CISSPs are right out.* v...@n Difensiva Senior Engineer Diuntinus Defense Technologies, Inc. *CEH holders...well, we sorta feel a little bit sorry for those that admit to holding this cert and abstain from mocking. ce1dfbae996c4fb2b7bf3d4c509febc53333cce3d25d0357de2373a29cbd47fe8111b00340dc3534d8e08133a04ddf732ccd78d2732d5cbe473502f0568a10a633fc0f1d7878b009f72a88e99ff6c189 cc7e87abd0d195d7ede113847af19ea6902cd2b71d2d9073b0b21fbd0a415379902cd2b71d2d9073b0b21fbd0a4153792ccd78d2732d5cbe473502f0568a10a6e0affb1b003da569c280f735b8b53fcc e0affb1b003da569c280f735b8b53fcce0affb1b003da569c280f735b8b53fccf6d5e38138c7d88dd1daf820bb1aec58e0affb1b003da569c280f735b8b53fccffc8ea0709f66c26d0769ca6dd1cc791 f6d5e38138c7d88dd1daf820bb1aec58f6d5e38138c7d88dd1daf820bb1aec585dfd8edd8104a2adc3bd75f5512bd423b0b21fbd0a415379902cd2b71d2d9073b0b21fbd0a4153792cc732d5cbeca6dd ------------------------------ Message: 7 Date: Fri, 2 Apr 2010 00:41:11 +0000 From: cocoruder. <frankru...@hotmail.com> Subject: Re: [Dailydave] 0day, it may not be To: <d...@immunityinc.com>, <dailydave@lists.immunitysec.com> Message-ID: <snt109-w26ae9c6c9bc7a8d269308dcb...@phx.gbl> Content-Type: text/plain; charset="gb2312" Hey, You may find a real one at http://blog.fortinet.com/the-upcoming-blackhat-europe-2010-presentation/ Not a fool's day joke:) > Date: Thu, 1 Apr 2010 10:52:13 -0400 > From: d...@immunityinc.com > To: dailydave@lists.immunitysec.com > Subject: [Dailydave] 0day, it may not be > > https://forum.immunityinc.com/board/thread/1199/exploiting-pdf-files-without-vulnerabili/?page=1#post-1199 > > D2 points out rightfully that everyone with the D2 CANVAS Exploit Pack > (email ad...@immunityinc.com now for pricing! :>) has known about this > particular feature of PDF's for over two years. D2 comes with an NDA, so > it's not surprising it's not "General Knowledge" but the well-funded > among you should at least stop acting so surprised. :> > > Speaking of funding, Immunity is hiring. > https://www.immunityinc.com/downloads/OpeningsApril2010.pdf > > We should play a game of "functions you can use to bypass DEP" - first > person to reach 100 wins? > > -dave > _______________________________________________ > Dailydave mailing list > Dailydave@lists.immunitysec.com > http://lists.immunitysec.com/mailman/listinfo/dailydave _________________________________________________________________ Hotmail: ???????????????? https://signup.live.com/signup.aspx?id=60969 -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.immunitysec.com/pipermail/dailydave/attachments/20100402/ec08b0f1/attachment-0001.htm ------------------------------ Message: 8 Date: Fri, 02 Apr 2010 10:17:48 +0200 From: Nicolas RUFF <nr...@security-labs.org> Subject: Re: [Dailydave] 0day, it may not be To: dailydave@lists.immunitysec.com Message-ID: <4bb5a82c.2000...@security-labs.org> Content-Type: text/plain; charset=ISO-8859-1 As far as I remember, this has been publicly demonstrated during PacSec'08. Slides, tools and sample PDFs are available on the following page: http://security-labs.org/origami/ Regards, - Nicolas RUFF ------------------------------ Message: 9 Date: Fri, 2 Apr 2010 10:47:04 +0200 From: Thierry Zoller <thie...@zoller.lu> Subject: Re: [Dailydave] 0day, it may not be To: "I)ruid" <dr...@caughq.org> Cc: dailydave@lists.immunitysec.com Message-ID: <1706281686.20100402104...@zoller.lu> Content-Type: text/plain; charset=iso-8859-1 Hi List, >The interesting bits of the recent report is that the Foxit reader >specifically does *not* require user interaction[1], and the ability to >partially control the dialog message that is displayed to the user in >Adobe Reader[2]. Besides the fact that this is a few years old - This was reported by C0RE on Bugtraq last year, independently did a blog post here[2]. Heads Up to CORE for crediting my blog entry in their advisory by the way. Quote: "2009-03-05: Core informs the vendor that the authorization bypass bug has been independently discovered by another security researcher and published on the Internet." <- That was the same bug. [1] http://seclists.org/bugtraq/2009/Mar/92 | http://www.coresecurity.com/content/foxit-reader-vulnerabilities [2] http://blog.zoller.lu/2009/03/remote-code-execution-in-pdf-still.html -- http://blog.zoller.lu Thierry Zoller ------------------------------ Message: 10 Date: Sun, 4 Apr 2010 14:49:19 -0400 From: Dave Aitel <dave.ai...@gmail.com> Subject: [Dailydave] Count Zero To: dailydave <dailydave@lists.immunitysec.com> Message-ID: <x2jb581b3221004041149q839d4dadx9a436d2e8d347...@mail.gmail.com> Content-Type: text/plain; charset=windows-1252 "The kind of software someone like you would rent from Two-a-Day, that's nothin'. I mean, it'll work, but it's nothing anybody heavy would ever bother with. You've seen a lot of cowboy kinos, right? Well, the stuff they make up for those things isn't much, compared with the kind of shit a real heavy operator can front. Particularly when it comes to icebreakers. Heavy icebreakers are funny to deal in, even for the big boys. You know why? Because ice, all the really hard stuff, the walls around every major store of data in the matrix, is always the produce of an AI, an artificial intelligence. Nothing else is fast enough to weave good ice and constantly alter and upgrade it. So when a really powerful icebreaker shows up on the black market, there are already a couple of very dicey factors in play. Like, for starts, where did the product come from? Nine times out of ten, it came from an AI, and the AIs are constantly screened, mainly by the Turing people, to make sure they don't get too smart. So maybe you'll get the Turing machine after your ass, because maybe an AI somewhere wants to augment its private cash flow. Some AIs have citizenship, right? Another thing you have to watch out for, maybe it's a military icebreaker, and that's bad heat, too, or maybe it's taken a walk out of some zaibatsu's industrial espionage arm, and you don't want that either. You takin' this shit in, Bobby?" Bobby nodded. He felt like he'd been waiting all his life to hear Beauvoir explain the workings of a world whose existence he'd only guessed at before. ? Count Zero by William Gibson. Here's something you may have learned about exploits recently: They usually take a long time to run. Lots of web applications can be owned via a known-plaintext attack + hash collision to recover the host key, but it's going to take a lot more time than a basic SQL injection and so most teams aren't even going to bother looking. I went downstairs for a demo from Sean the other day, and he's like "This is going to take a while to run - like six minutes or something" and the only answer is of course, "If it gets me in reliably , I don't care if it takes all day. Enhancing time on target is the operator team's problem. They can go re-read MidnightSun.pdf[1] while it runs in the background. " As Halvar would put it "server side attacks are a myth now, publicly". And here's where the hilarity starts. Because a 24 hour runtime attack does not "scale" well. It's not something you can "automate" against a class B network. William Gibson is on Twitter BTW. How cool is that? Pattern Recognition and Spook Country are great books. -dave [1] http://www.stepheniemeyer.com/midnightsun.html ------------------------------ _______________________________________________ Dailydave mailing list Dailydave@lists.immunitysec.com http://lists.immunitysec.com/mailman/listinfo/dailydave End of Dailydave Digest, Vol 57, Issue 1 ****************************************