Bios Password

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, December 6, 2008

Security and Forensics Roundup: Heavy Version #2

Posted on 11:15 PM by Unknown

cc image credit: Jeremy Botter, flickr

Standing guard so you can remain alert.

So many, many very good security and forensics related links, my head is spinning from trying to organize them all into a single and coherent post.

To help achieve that, commentary will be kept to a minimum.

Must Reads

  • (IN)SECURE Magazine – Volume 19 was released this week in PDF format.  Always an engaging mix of technical discussions, security concepts, and hidden tools and tricks. Highlight articles (to me) include:

    • The future of AV: looking for the good while stopping the bad
    • Eight holes in Windows login controls
    • Web filtering in a Web 2.0 world
    • The role of password management in compliance with the data protection act,
    • 5 strategies for proactively embracing failure
    • Navigating a sea of fake codecs,
    • Role Based Access Control, and
    • How to build a security strategy to grow your career, success, and results.

  • Secret Geek A-Team Hacks Back, Defends Worldwide Web – Amazing Wired Magazine article covering the incredible discovery by Dan Kaminsky on a critical DNS flaw, and the ensuing damage control.  If you haven’t read this yet, stop and read it now.  There have been lots of follow-on discussions on the web regarding this issue, but this is a foundational read.  Great writing on technical security subject by Joshua Davis.

Password?

  • NirBlog: Saved Password Locations – NirBlog post that provides awesome background information on the locations in the Registry or file system for popular password storage.

Good information for sysadmins and auditors.

  • FireFox ‘plug-in’ harvests web passwords - heise Security UK
  • BitDefender detects novel approach to stealing web passwords – BitDefender press release.
  • Trojan.PWS.ChromeInject.B – BitDefender Defense Center

All signs point to caution when installing Firefox Add-ons.  Don’t get caught.

  • Manufacturer claims that passwords in Acrobat 9 are easier to crack than in version 8 - heise Security UK
  • Security Matters: Acrobat 9 and password encryption – Adobe responds, sort-of.
  • Vendor claims Acrobat 9 passwords easier to crack than ever – And Dancho Danchev sorts it out.

Score: ElcomSoft 1 : Adobe 0

Password: Stop the Leak

Fresh on the heels of SynJunkie’s excellent wireless pen-attack story comes a new series on an insider attack and investigation.

  • Syn: The Story of an Insider - Introduction
  • Syn: The Story of an Insider - Part 1. Shoulder Surfin Goodness

Kick back and enjoy…depending on your perspective…

Tools and Tips for Forensic Examiners

  • Basic eBlaster forensic analysis – CFMADI blog.  Great breakdown on eBlaster computer monitoring software detection.

  • Cisco Router Forensics - SANS Computer Forensics, Investigation, and Response.   For a higher audience then the desktop level work I deal with but it was good stuff anyway.

  • Perl and Forensics - SANS Computer Forensics, Investigation, and Response. I’m quickly realizing that it might be a good thing to add “Learn Perl” to my “to-do” list.

Speaking of Forensic Examiners: R U A π?

While new legislative requirements within states for forensics professionals to hold private investigators credentials are not a new subject, they seem to again be popping up and causing some degree of confusion and concern in security circles.

I even recall concern for syadmins and pc-repair tech shops believing that new legislation in Texas would lead them to shut-down until they got proper PI accreditation. (Probably not…yet.)

Thus behind that backdrop, comes even more movement on the PI (get it now? PI, pi, π) certification front in forensics.

  • Are Computer Forensics Professionals Required to be Licensed as Private Investigators? -  SANS Computer Forensics, Investigation, and Response
  • Michigan To Require Certifications For Computer Forensics Private Investigator’s License - SANS Computer Forensics, Investigation, and Response
  • Sam Spade, CISSP - Security For All blog

On the surface it seems like a very good idea.  I’m all for professional accreditation where it will provide valuable and critical training/knowledge to work done in the field.  If however it provides nothing but a piece of paper on the wall and no true relevant test of demonstrated skill in the forensics field, well, even I can let you show me where a horse has been stabled and I will find evidence of what he ate and call it proof for you.

For a perfect and crystal-clear example of just why real and certifiably proven professional forensics experts are needed (and not just those who are clearly “certifiable”) look no further than this case:

  • The Julie Amero forensic analysis – Sunbelt Blog

Alex Eckelberry and a team of real-world experts took a look at the official court record of evidence along with a Ghost copy of the hard-drive.

I’ve read the PDF they’ve provided based on their own professional analysis and it is simply frightening.  I don’t know where to begin.  Reading it certainly clears up a number of misconceptions I had.  And it helps me understand the whole problem much more clearly.

It should be a must-read for all forensic folks as well as system administrators/security wonks.  I almost put it in at the top.

I’m wondering if the PI accreditation requirements would have helped changed the prosecution’s "forensic” experts’ evaluation and conclusions.  Somehow I suspect not.

Which comes back to my take. Experience has taught me the following wisdom; experience doesn’t necessarily make you an “expert”, nor does any degree, honor, or accreditation. In the end it is what you do personally with any and none of those things that truly will define if you are an expert in the eyes of the public and your peers.  Enough said.

I see…malware in your future

In high-school I went through a very brief fascination with the Tarot cards.  That lasted until the reading I took regarding a hook-up with a very particular pretty girl in my class fell through.  I decided then and there it was bunk.

However, the dark-arts are alive and well in the world of malware.  And that is a prediction I would put money on to remain true.

  • Malware constructor – Sunbelt Blog highlights a new malware building tool for the masses.  Looks pretty cute and harmless until you come to find out from other links that it also seems to contain a trojan.  No honor among thieves I guess…

  • VirusTotal += Comodo – Yep. Comodo’s earned a major recognition upgrade here by getting its AV scanning engine included in the VirusTotal arsenal.

  • CBS.COM was compromised – Finjan MCRC Blog – Darn it.  And all I wanted to do was get tickets for “The Price is Right”….

  • Microsoft adds malware detection to its Webmaster tools - heise Security UK.  I’ve already signed up and have this blog being monitored by Webmaster Center.  So far so good.  Still need to enroll in Google’s Webmaster Tools which has similar features.  It was very simple and pretty easy to enroll and configure. No pain.

  • Merry Malware - You’d better watch out, you’d better think twice… and O Come All Ye Malware– Microsoft Malware Protection Center blog.  More fun and holiday cheer than a bad company holiday party coupled with rancid eggnog.  Yeah.  That good.

  • VLC Exploit In The Wild – Infosecurity.us – I’ve used and loved a portable version of VLC for quite a while, but Secunia’s PSI tool never has been happy with VLC for some reason. No matter how hard I patch it, it never seems like it was enough.  Now it seems that there are even more problems with it from a vulnerability standpoint.  I only use it with trusted media files, and it has not been set as an associated application. I’m not giving up yet. But you better be careful all the same and stick to trusted media files, from trusted sources.

Rootkits?

  • Rootkit discovered in Enterprise Information Security software - heise Security UK
  • Suspicious Rootkit Lurks in EIS Software - TrendLabs Malware Blog

Here we go again with software vendors dropping rootkit like stuff into their products.  So it appears folks have already forgotten Sony’s failed foray into this arena?

The Ghost of USB/AutoRun malware past

  • Under Worm Assault, Military Bans Disks, USB Drives - Danger Room from Wired.com
  • Agent.btz malware spreads across US military network – Napera Networks
  • Malware successfully installed. Click OK to Finish! - The Security Eunoia
  • Is there no end to the AutoRun madness? - Zero Day blog
  • Honor Thy Settings – Windows Incident Response blog
  • How to correct "disable Autorun registry key" enforcement in Windows – Microsoft KB953252

As I responded at Harlan Carvey’s post in the comments:

Daughter unit (Alvis) needed a USB stick to take to her high school to save work from a computer-lab if her assignment work wasn't completed. She had responsibly asked me a few days in advance and I promptly forgot. We got in the car a few days later and I remembered again and asked her about it. She had the forethought to grab one of our old/small USB sticks (32MB?) and had it with her.

I had to confiscate it with regret.

  1. I didn't know what of our data was still on it and needed to "audit" it and remove anything of importance in case of loss/theft at the school. (update for the curious: Turns out it had two archived KeePass databases from early 2007 (!), numerous jr.high project documents, probably every picture from icanhascheezburger, some Zoo Tycoon save files, mid-2008 dated JSON and OMPL backup files from my Firefox profile, and a PE disk building tutorial from work.  Would have been “ok” but I’ve gone back and (securely) cleaned all the old stuff off anyway.)

  2. I needed to make sure it was "clean" of any thing that might get her into trouble at school for "possessing" (forbidden utilities perhaps such as pentesting tools and other PUPS, etc.).

  3. I have NO idea the condition of the lab-pc's she will be using at school. Don't know how their IT department maintains them, what AV/AM software is used, how often they are scanned/checked for rootkits and other baddies, etc. So cross-infection of our systems could be a real possibility.

  4. Need to figure out a "reasonable" way for daughter-unit to use a USB drive between school/friends houses/systems and our own but that will minimize chance of infecting our own. Going to have to spend time looking at my new AV/AM software to check out automatic detection and scanning/access settings for removable (USB) devices.  (update: from the comments, Steve suggested looking at Didier Stevens’ USBVirusScan which can be configured to launch an AV application when a USB stick gets inserted.  Awesome tip and now added to my Sunday “to do” list! Thanks Steve!)

(Sigh)

It's hard being an IT dude AND a dad these days. Oh to be blissfully unaware....

Harlan encouraged me to start applying the MS patch and registry fix. I’m working my way through our systems this weekend.

Hogfly also chimed in with tips

There are ways to mitigate risk on a usb stick.

1) Buy one with a write block switch. Kanguru sells these.

2) Create a directory(yes a directory) named Autorun.inf. This is known to help mitigate the ability of the malware to write to the drive.

3) Disable Autorun using group policy on your computers and force the following registry change:

REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\IniFileMapping\Autorun.inf]
@="@SYS:DoesNotExist"

These steps work.

So today I bought a 2 GB USB stick with a write-block switch for Alvis and will be keeping an eye on it as well as its contents.  I will also be removing all the U3 preloaded stuff, doing some more of Hogfly’s tips as well as adding a TrueCrypt container and showing her how to use everything. I might even round it out with one of the PortableApps Suites along with some extra apps as well.

Alvis even liked the carabiner clip it came with.  It passed the cool factor.

What a dad.

Software and Tip Roundup

Get along little doggies!

  • FileAlyzer shows you detailed info for any Windows file - Download Squad.  Been using this tool for years.  Easy to use and free.  Great starting point for looking into file specifics when mashing malware. FileAlyzer is developed by the makers of Spybot Search and Destroy malware scanner.  A new 2.0.0.10 version now supports multiple file handling.  By that I mean you can open more than one file and cascade/tile them in the main window (a la Windows Office files) for rapid comparison work.  It performed fast and great in my testing of the newest beta version.

  • PowerShell - Finding New User Accounts – SynJunkie blog. Script to locate all accounts created between two specified dates.

  • Patching offline virtual machines – Security4all. I think I remember forgetting I could do this. Now I am sure to do it.

  • Update: Restoring Safe Mode with a .REG file, and a Live CD - Didier Stevens shows us how to restore Safe Mode’s “SafeBoot” keys to the Registry via a LiveCD when they have been removed by malware attack. Got to add these to my own custom PE 2.0 build disk.

  • Privacy Alert - ISPs putting ad service boxes in the clickstream is bad - Scott Wright’s Security Views. At the risk of veering completely off target, indications are that a new partnership between Phorm and ISP’s could mean a major change in the way ads and your data is parsed through your ISP.  Tinfoil-hat stuff or true security risk?  Minority Report ad-service coming true?

  • Building a Security Tool Chest – InfoSec blog. Stumbled on this series of posts.  The first list is pretty short. The rest build in number of tools and usefulness. They might be a good starting point.  I like scanning these lists to see if I might come across a new tool or two. Your mileage here may vary.

    • Part 1 - Live CDs – Backtrack and Helix
    • Part 2 - Recon Tools – Quite a few goodies!
    • Part 3 - Web App Testing Tools – Firefox Add-ons, websites, and misc. apps.

Keep it safe!

--Claus V.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in anti-virus software, Link Fest, malware tools, security, utilities | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Finally! Time to Post! New material list
    After a recent text from my bro reminding me it has been since March since I’ve done a blog post, I was finally able to clear the schedule a...
  • Oscar watch Linkpost
    Alvis and Lavie are watching the Oscars tonight and I’m along for the ride. I wasn’t able to come even close to getting out some of the pos...
  • New Year’s Day - First Post 2011
    Same day I came out with my first post after a long drought, I fell upon this article Blogging Seems To Have Peaked, Says Pew Report over a...
  • Utility Gumbo
    There’s a lot in this pot.  Probably something everyone can find to enjoy. I’m serving it up tonight out of the back of the truck on the s...
  • iodd : Multi-boot madness!
    Like many computer technicians and responders, I seem to always have at hand a collection of bootable media; CD’s, DVD’s, USB-HDD’s, flash m...
  • Ubuntu 13.10 Upgrade - Lessons Learned & VIDMA utility found
    A few weeks ago a new release of Ubuntu came out. Naturally that meant it was update time! I have been getting pretty good at this now so ...
  • Interesting Malware in Email Attempt - URL Scanner Links
    Last weekend I spent some time with extended family helping confirm for them that their on-line email account got hacked and had been used t...
  • Windows 8 Linkage: A Bit Behind the Ball
    CC attribution: behind the eight ball by Ed Schipul on flickr . OK. Confession time. I’m more than a bit exhausted this weekend. Besides a...
  • Lego MiniFig Extravaganza
    picture clipped from Wired’s clip from Gizmodo clip… Thanks in no small part to the Windows 7 RC release, XPM mode research, and a big “l...
  • This Week in Security and Forensics: Beware the cake!
    Cube Party! image used with permission from John Walker at "rockpapershotgun.com" Yeah, the cake is a Portal thing.  Let’s d...

Categories

  • Active Directory
  • anti-virus software
  • Apple
  • architecture
  • art
  • AVG
  • Blogger
  • blogging
  • books
  • boot-cd's
  • browsers
  • cars
  • cell-phones
  • cheat sheets
  • Chrome/Chromium
  • command-line interface
  • cooking
  • crafts
  • crazy
  • curmudgeon
  • DHC
  • Dr. Who
  • E-P1
  • Education
  • family
  • Firefox
  • firewalls
  • For the Gentleman
  • forensics
  • Gmail
  • Google
  • graphics
  • hacks
  • hardware
  • humor
  • hurricanes
  • imagex
  • Internet Explorer
  • iOS
  • iPhone
  • iPod
  • iTunes
  • Kindle
  • Learning
  • Link Fest
  • Linux
  • malware tools
  • Microsoft
  • movies
  • music
  • networking
  • NewsFox
  • NFAT
  • Nook
  • Opera
  • organization
  • PDF's
  • photography
  • politics
  • PowerShell
  • recipes
  • Remote Support
  • RSS
  • science
  • Scripting
  • search engines
  • security
  • Shuttle SFF
  • software
  • Texana
  • Thunderbird
  • troubleshooting
  • TrueCrypt
  • tutorials
  • utilities
  • VBscript
  • video
  • Virtual PC
  • virtualization
  • viruses
  • Vista
  • Vista mods
  • wallpapers
  • Win FE
  • Win PE
  • Win RE
  • Windows 7
  • Windows 8
  • Windows Home Server
  • Windows Live Writer
  • Windows Phone
  • writing
  • XP
  • XP mods
  • Xplico

Blog Archive

  • ►  2013 (83)
    • ►  November (8)
    • ►  October (8)
    • ►  September (14)
    • ►  August (6)
    • ►  July (10)
    • ►  June (10)
    • ►  April (11)
    • ►  March (6)
    • ►  February (7)
    • ►  January (3)
  • ►  2012 (96)
    • ►  December (8)
    • ►  November (4)
    • ►  October (9)
    • ►  September (8)
    • ►  August (12)
    • ►  July (4)
    • ►  June (3)
    • ►  May (7)
    • ►  April (13)
    • ►  March (3)
    • ►  February (5)
    • ►  January (20)
  • ►  2011 (41)
    • ►  December (8)
    • ►  November (7)
    • ►  September (4)
    • ►  August (4)
    • ►  July (2)
    • ►  June (6)
    • ►  March (5)
    • ►  February (1)
    • ►  January (4)
  • ►  2010 (69)
    • ►  December (1)
    • ►  October (3)
    • ►  September (2)
    • ►  August (13)
    • ►  July (17)
    • ►  June (3)
    • ►  May (3)
    • ►  April (3)
    • ►  March (11)
    • ►  February (1)
    • ►  January (12)
  • ►  2009 (177)
    • ►  December (20)
    • ►  November (11)
    • ►  October (7)
    • ►  September (7)
    • ►  August (21)
    • ►  July (17)
    • ►  June (7)
    • ►  May (18)
    • ►  April (9)
    • ►  March (17)
    • ►  February (23)
    • ►  January (20)
  • ▼  2008 (35)
    • ▼  December (23)
      • Calling H-Town Techies: Help Save our Laptop!
      • Merry Christmas and Happy New Year!
      • Early Monday morn Linkfest: Utility Focus
      • Late Sunday Linkfest: Focus on Security
      • Custom Win PE Boot Disk Building: Step Two – PGP I...
      • USB Security: AutoRunGuard, Encryption options, an...
      • Security and Forensics Roundup: Heavy Version #3
      • Browser Bullets: #3
      • Mid-December Linkfest: Snowflake version
      • Utility Bag dump-out
      • (In)Security Response: Room for Improvement
      • Custom Win PE Boot Disk Building: Step One – WAIK up
      • NTFS Formatting an Imation USB Disk
      • Custom Win PE Boot Disk Building Saga: Introduction
      • Security and Forensics Roundup: Heavy Version #2
      • Windows Vista and Slipstreaming: A Primer
      • Software Goodies
      • Windows 7 News Roundup #4
      • Warm things for cool and blustery days
      • Browser Bullets: #2
      • Who are u.exe?
      • Quick Browser and Google Bits
      • Pushing through the wall
    • ►  November (12)
Powered by Blogger.

About Me

Unknown
View my complete profile