DIMVA 2007, Fourth GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment

From Wednesday 11 July until Friday 14 July I’ll attend Dimva 2007, the Fourth GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment in Luzern.

If someone wants to hang out during this conference then feel free to drop me a note. Outside the conference hours I’ll probably be paying for beers at an Irish pub.

ARP Cache Poisoning Incident

Op de blog van Neil Carpenter, een medewerker van Microsoft van het PSS Security Support Team, valt er een interessant artikel te lezen over een ARP Cache Poisoning Incident.

De auteur beschrijft een situatie waarbij bij welke web-request een iframe werd ingevuld. Na hun onderzoek kwamen ze er op uit dat de invoegingen gebeurden via’n gehackte machine die zich via ARP packets als de nieuwe default gateway bekend maakte.

De worm Worm.Delf.fs is één vanRead more.

Phrack 64 ; of toch niet helemaal

Een nieuwe hoax vertelde over de laatste versie van het hacker magazine Phrack . De nieuwe editie zou te vinden zijn op Phrack.ru. Let op de “.ru” ….

Op het archief van Full-Disclosure staan nog enkele van de “nieuwe” artikels :

PHRACK 64: INTRODUCTION PHRACK 64: YOUTUBE IS THE ATTACK PHRACK 64: PHRACK WORLD NEWS PHRACK 64: THE UNDERGROUND SCENE PHRACK 64: PROPEDOPHILE PHRACK 64: AUTOMATED VULNERABILITY AUDITING IN MACHINE CODE PHRACK 64: THERead more.

Firewalling with OpenBSD’s PF packet filter

A tutorial by Peter Hansteen on PF.

Vulnerability in RPC on Windows DNS Server Could Allow Remote Code Execution

A recently detected flaw in the Microsoft DNS (Domain Name Services) Server’s RPC (Remote Procedure Call) management server might allow a remote attacker to execute arbitrary code.

The folks at MSRC updated their data and indicated that when a Windows DNS server is not properly protected (firewalling, ip-filtering) it can be exploited by sending malicious packets to the RPC ports (tcp/135, tcp/445, tcp/>1024).

The Metasploit framework already has a plugin to test vulnerable servers.

Gone in 60 seconds… Hotel Safe cracked with a paperclip

Major Malfunction performs a security audit on the safe in his hotelroom with a paperclip and multitool. The video is at YouTube.

Top 10 Apple products which flopped

Besides the rather “sexy” products like the iPod and iMac, Apple also had its share of flopped products. There’s a list of 10 products that hit the market and failed to impress.

Powered by ScribeFire.

R2-D2 Mailboxes Confirm Rumors

The U.S Postal Service and Lucasfilm collaborated to help Star Wars celebrate its 30th anniversary. They created the R2-D2 Mailbox.

 

 

 

 

The full story is at The Force

Metasploit Framework 3.0 Released

The Metasploit Project released new Metasploit Framework 3.0 today. It is one of best tools to perform penetration tests system administrators to verify patch installations product vendors to perform regression testing.

The new version is at http://framework.metasploit.com/

ISPs ‘should be responsible’ for hacker attacks

Dit leuke artikel mocht ik vanmorgen lezen.

Internet service providers (ISPs) should be made legally liable for the damage caused by “denial of service” (DoS) attacks carried out via their networks, a leading internet lawyer says.

Welja, waarom niet.