http://neworder.box.sk/

A Discussion of Virtual Machines Related to Forensics Analysis
@ Articles -> Link     Dec 22 2008, 07:10 (UTC+0)
For the scope of this paper, the focus will be on the uses of virtual machines as it relates to forensic analysis, with both a virtual machine as your evidence and as an asset to your forensic tool box. Although only one virtual application is noted in this paper, the concepts and theories of their focus can be applied to other applications that are not described. The operating systems referenced are of Microsoft Windows (all versions) as this is the most prevalent operating system used worldwide. Some of this information may apply to other operating system in varying degrees, but again, it is the concept and theory of the examinations concerning virtual machines that will remain consistent across various platforms.

Continued...

read comments (1) / write comment

views: 26   printer-friendly version

Top 10 Ways to Lock Down Your Data
@ Articles -> Link     Dec 21 2008, 16:08 (UTC+0)
By Kevin Purdy

This past week proved that you can't rely on something as simple as a web browser to keep your personal data and identity safe from harm. Critical flaws were found in the Internet Explorer and even Firefox web browsers, leaving users potentially vulnerable to spyware, viruses, and password-sniffing. But don't throw up your hands in defeat―with the right software tools and a little Advanced Common Sense, you can secure your data so that even if someone did get onto your computer or into your email, they'd find nothing but headaches and woe. Read on for our list of ten software apps and strategies for locking down your online life continued...

read comments (0) / write comment

views: 65   printer-friendly version

Installing a PPPoE server under Linux Debian
@ Articles -> Networking     Dec 21 2008, 11:26 (UTC+0)
dagost writes: PPP is mainly used by Internet Access Providers in order to set up an access network. The documentation about how to establish a PPP over Ethernet (PPPoE) server lacks on the net because it does not concern the traditional user. Thus, this document attempts to fill this hole.

[PDF]Continued...


It has originally been written in French, here is the french version : Original (offsite PDF)

read comments (0) / write comment

views: 84   printer-friendly version

Changes, mergers and forums
@ Site News     Dec 20 2008, 07:01 (UTC+0)

Hello people of NewOrder,

as you may have noticed there have been quite a few changes around in the recent months. We have now reached a stable point and thus feel obliged to let you know what we've done and for what reasons.

continued...

read comments (1) / write comment

views: 226   printer-friendly version

Implementing a Better DNS Dead Drop
@ Articles -> Link     Dec 20 2008, 06:59 (UTC+0)
Editors Note: A little old but interesting article.


dead drop (n): A dead drop or dead letter box, is a location used to secretly pass items between two people, without requiring them to meet.


"Two years ago, I implemented a DNS-based dead-drop, based on an idea presented by Dan Kaminisky in Attacking Distributed Systems: The DNS Case Study."

Continued...

read comments (0) / write comment

views: 69   printer-friendly version

Money, a Short Con and Crime = Short Change
@ Articles -> Link     Dec 19 2008, 12:56 (UTC+0)
Everyone's heard the term "short change," but very few people know about the actual street con for which it's named. This scam is performed thousands of times each year, and con men score millions of dollars just by using a few simple verbal tricks...

THE GOAL: To get more money out of the register than you're entitled to, without the attendant even realizing it.

THE METHOD: In this episode, we're presenting one of the simplest versions of the short change. Advanced versions of this scam can take people for hundreds of dollars. This version uses three phases: Continued...

read comments (1) / write comment

views: 57   printer-friendly version

Writing Effective Security Policies
@ Articles -> Link     Dec 19 2008, 11:57 (UTC+0)
How to write an effective security policy, covering elements of technical controls that should be found in the majority of policies in the world of PCI DSS, SOX, Euro SoX, Hippa and ISO 127001.

Writing an Effective Security Policy (Part 1)

- Introduction
- The challenge
- What is a policy?
- Authority
- Framework
- Who should the policy apply to?
- Technical controls
- Managing, protecting and dealing with data
- Reporting
- Summary

Writing an Effective Security Policy (Part 2)

- To: From:
- Human resources and their involvement
- Uses of security policy
- Where do security policies go to die?
- What now?
- Summary

read comments (0) / write comment

views: 60   printer-friendly version

LFI to RCE Exploit with Perl Script
@ Articles -> Link     Dec 19 2008, 11:44 (UTC+0)
##########
Contents
##########

[0x00] - Introduction
[0x01] - File Inclusion (RFI/LFI)
[0x01a] - How the attack works for Remote File Inclusion [RFI]
[0x01b] - How the attack works for Local File Inclusion [LFI]
[0x01c] - Vulnerable PHP Function for File Inclusion
[0x02] - Local File Inclusion To Remote Command Execution [LFI RCE]
[0x02a] - LFI RCE via Apache Log Injection
[0x02b] - LFI RCE via Process Environ Injection
[0x02c] - LFI RCE via Other Files
[0x03] - Fundamental of Perl Library for Exploit Website
[0x03a] - Introduction to Socket
[0x03b] - Introduction to Library for WWW in Perl (LWP)
[0x03c] - Condition to use Socket or LWP
[0x04] - Writing LFI RCE Exploit with Perl Script
[0x04a] - Perl Exploit to Injecting code into Target
[0x04b] - Perl Exploit to Executing injected code on Target
[0x04c] - LFI RCE Complete Exploit [Use Logfile Injection]
[0x05] - How to protect File Inclusion
[0x06] - References
[0x07] - Greetz To

Continued...

read comments (1) / write comment

views: 62   printer-friendly version

Robert Seacord on the CERT C Secure Coding Standard
@ Articles -> Link     Dec 19 2008, 01:57 (UTC+0)
Robert C. Seacord and David Chisnall discuss the CERT C Secure Coding standard, developing C standards, and the future of the language and its offshoots.

I recently had the opportunity to interview Robert Seacord, author of the recently-published The CERT C Secure Coding Standard. Robert has been deeply involved with C and UNIX for longer than I've been programming in any language. Read on to find out about his work on developing C standards and his views on the future of the language.

Continued...

read comments (0) / write comment

views: 48   printer-friendly version

Free Virtualization eLearning and eBook
@ Articles -> Link     Dec 18 2008, 14:16 (UTC+0)
Make sure you use this offer to access a free 400+ pages eBook around Microsoft's virtualization strategy, not only Hyper-V but also Desktop and Application Virtualization.

Continued...

read comments (0) / write comment

views: 59   printer-friendly version

Understanding Encryption
@ Articles -> Encryption     Dec 18 2008, 02:59 (UTC+0)
lone_REBEL writes: BASIC CONCEPT:
All of us (computer users) are familiar to the word "encryption" even if we don't exactly know what it really means. Windows encryption utility, zip file encryption, hard disk encryption softwares, online data encryption ... blah blah blah. WHAT DOES ALL THIS ENCRYPTION FUSS MEAN? Lets see what this fuss means.

continued...

read comments (15) / write comment

views: 362   printer-friendly version

EDRi-gram Number 6.24, 17 December 2008
@ Articles -> Networking     Dec 18 2008, 02:57 (UTC+0)
EDRi-gram

biweekly newsletter about digital civil rights in Europe

Contents
========

1. ECHR decided against the UK DNA Database
2. Wikipedia filtered by UK ISPs for cover album picture
3. ECHR rules on identifying serious privacy infringers
4. Romanian Authority asks ISPs to block 40 pornographic websites
5. Bulgarian Court annuls a vague article of the data retention law
6. Snooping law, "Lex Nokia", proceeding slowly but surely in Finland
7. German Federal Archives provides Wikipedia with 100 000 images
8. UK Government now in favour of the extension of the copyright term
9. Spanish collective society fined for making clandestine wedding video
10. ENDitorial: First FRA Conference on Fundamental Rights
11. Recommended Reading
12. Agenda
13. About

Continued...

read comments (0) / write comment

views: 60   printer-friendly version

IE7 Zero Day Technical Analysis
@ Articles -> Link     Dec 18 2008, 02:18 (UTC+0)
Following our alert, we completed this analysis for the Zero Day attack. The exploit for this vulnerability has two parts:
A. _javascript_ heap spray code and x86 shellcode
B. The XML/SPAN tag vulnerability

- Advanced shellcode
- Hooks
- Checks for hooks
- UrlDownloadToCache
- CreateProcessA
- LdrShutDownThread
- shdocvw ordinal 101
- Last words on the shellcode

IE7 Zero Day Technical Analysis by Jun Zhang and Nicolas Brulez

Continued...

read comments (0) / write comment

views: 75   printer-friendly version

Anti-XSS 3.0 Beta and CAT.NET public Beta
@ Articles -> Link     Dec 17 2008, 03:05 (UTC+0)
I am delighted to say that we have released two new free tools.
CAT.NET CTP and Anti-XSS 3.0 Beta.

CAT.NET - Community Technology Preview

CAT.NET is a managed code static analysis tool for finding security vulnerabilities. It's exactly the same tool we use internally to scan all of our Line of Business (LOB) applications; it runs as a Visual Studio plug-in or as a stand-alone application. It was engineered by this group (CISG) and has been designed in partnership with the ACE Team and Microsoft Research.

Continued...

read comments (0) / write comment

views: 69   printer-friendly version

Writing a web services fuzzer in 5 minutes to SQL injection
@ Articles -> Link     Dec 15 2008, 15:42 (UTC+0)
This week, I was doing an internal penetration test for a client of a web service, which is used by applications loaded on kiosk machines around the country. I didn’t have much time to do the test, so I had a couple advantages, like having network access to the service, the WSDL and also ability to interact with the developers. This also gave me a chance to see how capable our web application firewall was at being able to detect attacks.

Continued...

read comments (0) / write comment

views: 106   printer-friendly version

Internet Explorer 8.0 Beta 2 Anti-XSS Filter Vulnerabilities
@ Articles -> Link     Dec 15 2008, 15:32 (UTC+0)
Aspect9 has discovered several vulnerabilities in Microsoft Windows Internet Explorer 8.0 Beta 2. This new version of Microsoft's famous browser includes new security improvements such as a Cross Site Scripting (XSS) filter. This version also includes a new object that safely allows transferring data across domains, allowing them to interact with each other.
The Anti-XSS filter has been found to have some security holes in the current implementation. Microsoft decided to filter "Type 1 XSS" which is free text send to the server being reflected to the user and therefore injecting HTML code into the website's page. They chose not to handle certain situations such as injection into a _javascript_ tag space, which would be extremely difficult to filter. The software giant also chose not to filter injection into HTTP headers, which will drive hackers to focus on discovering CRLF vulnerabilities.

Credit:
The information has been provided by Rafel Ivgi.

Continued...

read comments (0) / write comment

views: 68   printer-friendly version

How to Prevent Digital Snooping
@ Articles -> Link     Dec 13 2008, 06:34 (UTC+0)

Appeared in The Wall Street Journal
December 9, 2008

As the first digital president, Barack Obama is learning the hard way how difficult it can be to maintain privacy in the information age. Earlier this year, his passport file was snooped by contract workers in the State Department. In October, someone at Immigration and Customs Enforcement leaked information about his aunt's immigration status. And in November, Verizon employees peeked at his cellphone records.

What these three incidents illustrate is not that computerized databases are vulnerable to hacking �C we already knew that, and anyway the perpetrators all had legitimate access to the systems they used �C but how important audit is as a security measure.

Continued...

read comments (1) / write comment

views: 123   printer-friendly version

Security Through Virtualization
@ Articles -> Link     Dec 11 2008, 19:36 (UTC+0)
We all know that virtualization can save companies money and simplify management of IT resources, but can it also be used to enhance the security of our systems and networks? From the creation of virtual honeypots and honeynets to the use of Hyper-V to isolate server roles to seamless sandboxing of virtual applications with the latest version of VMWare Workstation, the answer is yes. This article will explore ways you can use virtualization tools to increase the security of your Windows environment.

Continued...

read comments (10) / write comment

views: 128   printer-friendly version

Browser Security Handbook
@ Articles -> Link     Dec 11 2008, 19:14 (UTC+0)
This document is meant to provide web application developers, browser engineers, and information security researchers with a one-stop reference to key security properties of contemporary web browsers. Insufficient understanding of these often poorly-documented characteristics is a major contributing factor to the prevalence of several classes of security vulnerabilities.
Although all browsers implement roughly the same set of baseline features, there is relatively little standardization - or conformance to standards - when it comes to many of the less apparent implementation details. Furthermore, vendors routinely introduce proprietary tweaks or improvements that may interfere with existing features in non-obvious ways, and seldom provide a detailed discussion of potential problems.

Continued...

read comments (0) / write comment

views: 121   printer-friendly version

Pushing the Limits of Windows: Virtual Memory
@ Articles -> Link     Dec 11 2008, 13:20 (UTC+0)
In my first Pushing the Limits of Windows post, I discussed physical memory limits, including the limits imposed by licensing, implementation, and driver compatibility. This time I’m turning my attention to another fundamental resource, virtual memory. Virtual memory separates a program’s view of memory from the system’s physical memory, so an operating system decides when and if to store the program’s code and data in physical memory and when to store it in a file. The major advantage of virtual memory is that it allows more processes to execute concurrently than might otherwise fit in physical memory.

Continued...

read comments (0) / write comment

views: 125   printer-friendly version


Reply via email to