[Full-disclosure] Hackito Ergo sum // HES2012 Final CFP // Call for Hackers

2012-02-16 Thread Jonathan Brossard


  °==°
 -=  =-
 -= Hackito Ergo Sum 2012 - HES2012 Final CFP=-
 -=  =-
 -=   ** http://2012.hackitoergosum.org **   =-
 -=  =-
 -= 12-14 April 2012 / Paris / France=-
 -=  =-
  °==°

  Kak dela Komrad,



--[ Synopsis:

This is the final call for papers for the HES 2012 Conference.

Hackito Ergo Sum 2012 will take place in Paris from the
12th to the 14th of April 2012.


--[ Venue:

HES 2012 will take place in the building of the French Communist Party.
This is an amazing historical building, located in Paris (19th
arrondissement).
We would like to thank the French Communist Party to allow a bunch of
hackers
to take possession of this greate piece of architecture for 3 days.

The exact address is:
Espace Oscar Niemeyer - Siège du Parti Communiste
2 Place Colonel Fabien, 75019 Paris, France

A map is avaiable here:
http://tinyurl.com/6mlarx6


--[ What is HES ? Why would I like it anyway ?

HES is a 100% hardcore technical security conference. HES is
unique by its continuous outstanding technical quality, but also
by its unusual freedom and spirit. HES is a 100% non profit conference,
mainly supported by the /tmp/lab Parisian hackerspace and generous
sponsors (who in exchange for their sponsoring, don't get their say
on any of the organisation, format or content of the conference :).

If you are unsure of wether you'll like it, feel free to have a look
at the content of previous editions. Talks included topics such as
SS7 phone networks hacking, satellites take overs via x25, kernel land
exploits against grsecurity hardened kernels, or the pwnie awards
winner Tarjei Mandt for his first presentation on this topic (note
to Dave Aitel: yeah man, face it, it was first seen at HES !!) and
many more.

Presentations on new RD projects are the core of the conference.
By RD and security, HES really means new offensive RD security.
Researchers from all around the internet are welcome to come to
Paris and talk, without discrimination whatsoever : everyone is
equal in front of a computer. Maybe skills appart that is ;)

HES is also an open big party, by the hacking community and for the
hacking community, with people coming literally from around the world.
If you'd like to not only come, but be part of HES by organising a
workshop (lockpickers and organisers of a social engineering contest
wanted !) or contest : please do and refer the relevant section below.


--[ Quality:

The quality of submitions is so critical to the Hackito Ergo Sum
conference that papers will be reviewed by the scary HES Programming
Comitee of death. It wasn't made to dissuade you from submitting,
but to ensure that the talks selected for HES will be as interresting
and new as possible.

Submitions should be original and as fresh as in never seen anywhere
before. Massive upgrades and significant new research added to
talks previously presented at a few great conferences may make it.
Talks given more than 3 times will be rejected.

Intense debates often spread inside the Programming Comitee on wether
a given topic is of interrest or new at all. Consensus as been reached
though regarding a few security buzz words. In order to avoid bullshit
talks, topics on Social Engineering and SCADA will only be considered
if demos are provided, and if themagnitude of the attack would at least
affect affect a significant portion of say, a city. Old well documented
techniques such as web applications (especially XSS, CSRF and clickjacking)
but also basic exploitation techniques (or easy targets lacking modern
security  protections) are discouraged. To the opposite, hacking non
understood and poorly documented technologies including for instance
hardware,
protocols, architectures, devices, networks, or applications among
others are warmly welcome.

In a nutshell, submitions on how to achieve world domination in 2012
and how to eventually avoid it are of primary importance. How to survive and
facilitate privacy in an incrinsingly policed internet are also a concerned.


--[ Disclosure policy:

It is worth noticing that we do not enforce any disclosure policy on
our speakers. We believe they are responsible adults and can chose
what they believe is the best way to present their work to others
by themselves. We also belive they are smart enough to take into
consideration any legal and professional constraints.


--[ Submitting:

We are glad you are reading this section and are therefore thinking about
submitting to HES.

Before submitting, we gently recommand you to have a look at the

[Full-disclosure] Operation Bring Peace To Machines - War Game

2012-02-16 Thread Jerome Athias
Good morning Hacker,

Your mission, should you decide to accept it is to save the CyberSpace.

As mentioned in the U.S. INTERNATIONAL STRATEGY FOR CYBERSPACE[1]
document, we need interoperable and secure technical standards,
determined by technical experts.

Requirements: ~15 minutes of your time, a headset and the Boléro

The Rand Strategy Assessment Center provides you the following
computerised model:
Software Vulnerability Mitigation Automation,
(an incomplete Conceptual Map)

https://corevidence.com/research/vulnerability_interoperability_ivil_v1.jpg

some links extracted:
[1]
http://www.whitehouse.gov/blog/2011/05/16/launching-us-international-strategy-cyberspace
IVIL-XML
http://www.cupfighter.net/index.php/2010/10/ivil-an-xml-schema-to-exchange-vulnerability-information/
ThreadFixhttp://code.google.com/p/threadfix/


We will provide you soon IVIL v1.0, so be ready for action!

i = x2ivil + ivil2x
where i is interoperability and x a software (vulnerability
scanner,... + waf, virtual patching system, ...)

Examples:

openvas2ivil
nessus2ivil
qualys2ivil
nikto2ivil
ivil2mod_security
ivil2snort


As always, should you or any of your I.M. Force be caught or killed, the
Secretary will disavow any knowledge of your actions.

This tape will always stay here.


-- 
Jerome Athias - NETpeas
VP, Director of Software Engineer
Palo Alto - Paris - Casablanca

www.netpeas.com
-
Stay updated on Security: www.vulnerabilitydatabase.com

The computer security is an art form. It's the ultimate martial art.



smime.p7s
Description: Signature cryptographique S/MIME
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Arbitrary DDoS PoC

2012-02-16 Thread Lucas Fernando Amorim

I will not answer this anymore, sorry for feeding trolls.

On 15-02-2012 17:34, Sanguinarious Rose wrote:

On Wed, Feb 15, 2012 at 7:53 AM, Lucas Fernando Amorim
lf.amo...@yahoo.com.br  wrote:
   

I do not know what you expect of public repos at Github, really do not
understand, you think that I would deliver the gold as well? Well, I think
you're a guy too uninformed to find that the maximum is 200 threads with
pthread. Have you tried ulimit -a? I even described in the readme.

Missing the point that async would have drastic improvements on
anything network base, even if you increase it to say 500 threads a
async model still pawns anything using threads for simple
connect/disconnect handling.
   

Feel free to implement. ;)
   

As the algorithm recaptcha, you really thought it would have all code in the
main file? Why would I do that? I distributed in classes.
 

No, there wasn't. It was 12 lines of code which just called another
OCR library. (could be why you deleted the public repo this morning)

I did hear google cache does a good job of uncovering OMG RAGE DELETE

http://webcache.googleusercontent.com/search?q=cache%3Ahttps%3A%2F%2Fgithub.com%2Flfamorim%2Frebreakerie=utf-8oe=utf-8aq=trls=org.mozilla:en-US:officialclient=firefox-a

   
I do have to declare myself the defaulted winner of this engagement

now because if you have to delete stuff in order to claim facts about
it...

   

Winner of what? Thats a priv8 repos now. Did you looked at utils directory?

There was an algorithm to find the ellipses of the captcha, that he was 
developing to walk the edge, correcting the distortion.

And why do you think IntensiveDoS accepts arguments and opens and closes a
socket? Why is a snippet of code to not only HTTP DoS.
 

I read the code could be why.
   

I'm making another question. Why you think IntesiveDoS accepts arguments?

As for the trojan, you really think I would do something better and leave
the public?

What planet do you live?
 

Totally because a bindshell trojan that connects to a port is
something highly special that the world will end if someone got a hold
of such a dangerous piece of code. In fact, why isn't the world ended
yet when you can just google and get a few dozen of them?

Should I tell you how dangerous and what planet do you live on to
release your so so very dangerous innovative python code? (hypocrisy
for the win!)

   
There's nothing special, but is the only code of this on GitHub. Fell 
free to fork and share. And thats dangerous? I think not, but run nowadays.

And Curl is a great project to parallel HTTP connections, python is not so
much, and that is why only the fork stays with him.

 

Curl is indeed great I agree. The rest I don't see as even a point
going anywhere?
   
If curl is a good project and written in C, why reason I will implement 
the same thing in Python?

On 14-02-2012 02:48, Lucas Fernando Amorim wrote:

On Feb 13, 2012 4:37 AM, Lucas Fernando Amorimlf.amo...@yahoo.com.br
wrote:
 

With the recent wave of DDoS, a concern that was not taken is the model
where the zombies were not compromised by a Trojan. In the standard
modeling of DDoS attack, the machines are purchased, usually in a VPS,
or are obtained through Trojans, thus forming a botnet. But the
arbitrary shape doesn't need acquire a collection of computers.
Programs, servers and protocols are used to arbitrarily make requests on
the target. P2P programs are especially vulnerable, DNS, internet
proxies, and many sites that make requests of user like Facebook or W3C,
also are.

Precisely I made a proof-of-concept script of 60 lines hitting most of
HTTP servers on the Internet, even if they have protections likely
mod_security, mod_evasive. This can be found on this link [1] at GitHub.
The solution of the problem depends only on the reformulation of
protocols and limitations on the number of concurrent requests and
totals by proxies and programs for a given site, when exceeded returning
a cached copy of the last request.

[1] https://github.com/lfamorim/barrelroll

Cheers,
Lucas Fernando Amorim
http://twitter.com/lfamorim

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
   



 


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] 2012 Honeynet Project Security Workshop

2012-02-16 Thread Guillaume Arcas
Hi.

The Honeynet Project holds its second Public Event on March 19 - 20,
2012 at Facebook HQ, SF Bay Area, Ca (USA).

Public event consists on a one-day technical presentations and a one-day
hands-on tutorial trainings.

There even will be a CTF and a Forensic Challenge!

All details available here:
https://honeynet.org/SecurityWorkshops/2012_SF_Bay_Area

If you have the opportunity to attend, let's join !

Regards,

Guillaume Arcas
-
PR - The Honeynet Project


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [PRE-SA-2012-01] Denial-of-service vulnerability in java.util.zip

2012-02-16 Thread Timo Warns
PRE-CERT Security Advisory
==

* Advisory: PRE-SA-2012-01
* Released on: 16th February 2012
* Affected products: Oracle Java SE 7 below Update 3
 Oracle Java SE 6 below Update 31
 IcedTea6 1.8.x below 1.8.13
 IcedTea6 1.9.x below 1.9.13
 IcedTea6 1.10.x below 1.10.6
 IcedTea6 1.11.x below 1.11.1
 IcedTea 2.x below 2.0.1
 Older versions may also be affected.
* Impact: denial-of-service
* Origin: java.util.zip
* Credit: Timo Warns (PRESENSE Technologies GmbH)
* CVE Identifier: CVE-2012-0501


Summary
---

The function countCENHeaders() in zip_util.c of the java.util.zip
implementation contains an off-by-one bug. The bug can be exploited via
corrupted ZIP files to cause an endless recursion. The endless recursion
results in a segmentation fault of the JVM.

The following assessment is based on the JDK sources available from
Oracle's website (jdk-6u23-fcs-src-b05-jrl-12_nov_2010.jar).

readCEN() in zip_util.c is used by java.util.zip to read the central
directory of ZIP files.

It reads the total number of entries from the ZIP file via the
ENDTOT field:

(543) total = (knownTotal != -1) ? knownTotal : ENDTOT(endbuf);

A corrupted ZIP file may have set the total number of entries to 0.
Alternatively, knownTotal may have been passed as a parameter with
value 0.

readCEN() iterates over all directory entries

(552) for (i = 0, cp = cenbuf; cp = cenend - CENHDR; i++, cp +=
CENSIZE(cp)) {

and recognizes an incorrect total field

(557) if (i = total) {

In this case, readCEN() counts the total number of fields via
countCENHeaders() before calling itself recursively

(561) cenpos = readCEN(zip, countCENHeaders(cenbuf, cenend));

However, countCENHeaders() has an off-by-one bug. It fails to count
an entry that is precisely CENHDR bytes long

(431) for (i = 0; i + CENHDR  end - beg; i += CENSIZE(beg + i))

and returns 0 in this case.

Hence, readCEN() is called recursively with knownTotal = 0 resulting
in an endless recursion.


Solution


The issue was fixed in the following versions:
Oracle Java SE 7 Update 3
Oracle Java SE 6 Update 31
IcedTea6 1.8.13
IcedTea6 1.9.13
IcedTea6 1.10.6
IcedTea6 1.11.1
IcedTea 2.0.1
IcedTea 2.1


References
--

http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html
http://blog.fuseyism.com/index.php/2012/02/15/security-icedtea6-1-8-13-1-9-13-1-10-6-and-icedtea-2-0-1-released/
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-February/017233.html
http://blog.fuseyism.com/index.php/2012/02/15/icedtea-2-1-released-openjdk7-u3-release/

When further information becomes available, this advisory will be
updated. The most recent version of this advisory is available at:

http://www.pre-cert.de/advisories/PRE-SA-2012-01.txt


Contact


PRE-CERT can be reached under prec...@pre-secure.de. For PGP key
information, refer to http://www.pre-cert.de/.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [Spanish] - Webinario gratuito - Ataques reales a sitios web de latinoamerica

2012-02-16 Thread runlvl
Estimados, los invitamos a participar del proximo webinario que
brindamos desde Exploit Pack:

Fecha: Febrero, Sabado 18 - 20:30hs ( GMT -3:00 Hora Argentina )
Duracion: 1 hora
Webinario gratuito - Ataques reales a sitios web de latinoamerica

Link de registracion: http://www.anymeeting.com/PIID=EC51D983844F

En el webinario vamos a buscar vulnerabilidades web en escenarios
reales que nos propongan los asistentes.


Los esperamos
Saludos
Juan Sacco
Exploit Pack

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] nullcon CTF Battle Underground 2012 is on

2012-02-16 Thread murtuja bharmal



We are back !

http://nullcon.net/battleunderground/

LaLa Land is going to wage war against Penguin Land.


LaLa Land's newly founded National Hacker's Organization (NHO) is
tasked to penetrate Penguin's Ice Headquarters (IHQ) and gather
information about Penguin deployment plans and orbats.

LaLa Land’s Technical LaLa Division decided to create Teams of Hackers
in NHO and independently task them to gather as much information as
possible.

Your job as a respected member of LaLa Land’s NHO is to penetrate
Penguin Land’s IHQ network and gather as much documents as you can
which will earn you brownie points.

Rules
__

This is an open ended contest and the winner will be declared based on maximum 
score at the end of day 2. The winner will be contacted via the e-mail address 
they use for registration.


Player need to create an account in order to participate in the challenge. 

Please use a valid email address as the account needs to be validated before 
you can start the fun.
Only the First Person to complete challenge will win SANS SEC 504: Hacker 
Techniques, Exploits  Incident Handling Class (worth $4095)

Battle Underground (2012) does NOT give participants any legal permission to 
exploit http://nullcon.net or its hosting partner in a destructive manner . Any 
attack against the site or the hosted servers will be observed under general 
legal framework.

The winner can claim his prize only after submission of very brief writeup  
(Vulnerability found) of the contest and his solution / approach

The unofficial back channel for Battle Underground (2012) 
is irc.chat4all.org #nullcon
Follow us on @nullcon for twitter updates.

Cheers
|\/|___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/