Tumblelog by Soup.io
Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

July 16 2009

arik
16:28
7331 05b3
Wordle example
arik
16:28

Wordle


Wordle is a toy for generating “word clouds” from text that you provide. The clouds give greater prominence to words that appear more frequently in the source text. You can tweak your clouds with different fonts, layouts, and color schemes. The images you create with Wordle are yours to use however you like. You can print them out, or save them to the Wordle gallery to share with your friends.

July 15 2009

arik
12:42
arik
12:34

SE-PostgreSQL

Security-Enhanced PostgreSQL (SE-PostgreSQL) is a security extension built in PostgreSQL. It works as a reference monitor within relational database management system, and provides fine-grained mandatory access control features collaborating with SELinux and its security policy. 

arik
12:32

Chaostables

Chaostables is a package with iptables/Netfilter targets that will spoof network scanners. Documentation on how it works and how to reimplement it in userspace are also provided. Special features include recognition of all nmap scan types including -sS SYN Scan, proactive slowdown of TCP and UDP (10000+%), and providing back fake nondeterministic information.

arik
12:31
arik
12:29
arik
12:28
arik
12:27

June 15 2009

arik
11:01

Hum, are they going to create the biggest botnet ever seen ?

"Green Dam" is a software used for monitoring and anti-pornography, popularizing by
Chinese goverment. After July 1st, it will be forced to install on all new Chinese PCs.
Now it already has 50 million copies in China.
In order to monitor the URL that user is exploring, Green Dam injected the browser
process. When Green Dam is trying to handle a long URL, a stack overflow will occur in the
browser process.
This exploit can be used for exploitation on IE, on those computers installed Green Dam.
I used the .net binary to deploy shellcode, for it`s more stable than Heap Spray, and able
to bypass DEP and ASLR on Vista.
The exploit page contains a .net control, so it should be published on IIS.
---seer[N.N.U]

http://milw0rm.com/sploits/2009-green-dam.zip

# milw0rm.com [2009-06-12]
Reposted byraistlin raistlin

June 14 2009

arik
21:40
arik
21:39
2775 f236 500
SSTIC 2009 epic fail

SELinux when not properly configured is more a danger than a shield

June 08 2009

arik
21:28

Like Checkpoint Tmobile has been owned for some time. We have everything, their databases, confidental documents, scripts and programs from their servers,
financial documents up to 2009.

We already contacted with their competitors and they didn't show interest in buying their data -probably because the mails got to the wrong people- so now we are
offering them for the highest bidder.

Please only serious offers, don't waste our time.

Full Disclosure: T-Mobile sources and data
Reposted fromraistlin raistlin
arik
21:28

[USN-783-1] eCryptfs vulnerability

"Chris Jones discovered that the eCryptfs support utilities would
report the mount passphrase into installation logs when an eCryptfs
home directory was selected during Ubuntu installation.  The logs are
only readable by the root user, but this still left the mount passphrase
unencrypted on disk, potentially leading to a loss of privacy."

Well... no comments...

May 25 2009

arik
18:17

Crypto Law Survey : Overview per country

May be important depending on the visited country (ex china)

May 12 2009

arik
19:35
arik
00:31

April 23 2009

arik
01:10

Dedicated servers and secure deletion

Today I got my new dedicated server from a company offering "cheap hosting" (20€ per month for a dedicated server) - very popular in France.
During the install I accidentally deleted a file, so I fired up photorec to recover it...
... more than 120 000 files recovered : gz, png, txt, pdf, word docs, etc

Morale de l'histoire :
- when your contracts finishes reboot in rescue mode and wipe your disk, you'll avoid exposing all your backups to the next customer.
- encrypt all sensible information. For backups the best is to encrypt locally and then send it. Of course it is not always possible, ex reserved source code which was tested on the server.
- when you get a new server, first thing to do is to reboot in rescue mode and wipe all the disk. you'll avoid having to explain why certain kind of forbidden material is present on your disk.

By the way, why don't they wipe their disk after the end of the contract? All their infrastructure is fully automated, from partitioning to OS install.
Reposted byraistlin raistlin

April 19 2009

arik
14:30

April 17 2009

arik
19:33
Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.

Don't be the product, buy the product!

Schweinderl