Faster GPU Cracking | TechSNAP 65

Faster GPU Cracking | TechSNAP 65

Everyone’s beloved password cracker has had a major update, and you won’t believe what it can do now!

The Aerospace industry has a new Advanced Persistent Threat, and a major Microsoft XML flaw already being exploited.

Plus we share some infrastructure wisdom in today’s feedback segment.

All that and more, on this week’s TechSNAP!

Thanks to:

Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Limited time offers:

$1.99/mo economy hosting for 3 months – special offer!
Code:  199tech
Expires:  June 30, 2012

$3.99 .US domain!
Code:  399us4

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

New version of John the Ripper targets slow hashes with GPUs

  • The new version focuses on adding GPU support, both CUDA (for nVidia) and OpenCL (for AMD and other cards)
  • Other interesting new additions:
  • Non-hash cracking support for:
    • Mac OS X keychains
    • KeePass 1.x files
    • ODF and MS Office 2007/2010 files
    • Mozilla Firefox/Thunderbird/etc master password files
    • RAR -p and -hp encryption modes
    • WPA-PSK
    • VNC Challenge/response auth
    • SIP challenge/response auth
    • HMAC-SHA1/224/256/384/512
  • New hashes supported:
  • sha256crypt (CPU or CUDA)
  • sha512crypt (CPU/CUDA/OpenCL)
  • DragonFly BSD SHA256/512
  • Drupal 7 custom PHP SHA–256 hashes
  • Raw-SHA1-LinkedIn
  • Interestingly, bcrypt (OpenBSDs implementation of blowfish as a password hashing algorithm), even on an AMD 7970, is slower on a GPU than a CPU due to the nature of the algorithm
  • Full Release Announcement

Unpatched Microsoft XML exploit added to Blackhole toolkit

  • An exploit for the unpatched vulnerability is now included in recent versions of the blackhole exploit kit, sold to cyber criminals and installed on infected and compromised websites across the internet
  • Numerous attack vectors have been used to exploit this flaw in the Microsoft XML engine, including MS Office documents, Flash, and Internet Explorer it self
  • The flaw is present in versions 3, 4 and 6 of MS XML Core Services, and exploitable on all supported versions of windows (XP/Vista/7, 2003/2008/R2 Server)
  • Microsoft published the advisory about the flaw on June 12th, after it was already actively being exploited in the wild
  • At this time, there is still not a fix for ‘Microsoft XML Core Services’, however Microsoft offers a ‘Fix-It’ that is supposed to mitigate the flaw, but suggests that this may cause application compatibility issues
  • The Microsoft EMET Toolkit may prevent the exploitation of this vulnerability, but as discussed previously, is incompatible with AMD Video Drivers
  • CVE–2012–1889
  • Official Microsoft Announcement

New version of trojan used in highly targetted attack

  • The Sykipot trojan is not new, however the latest version is being used more successfully than before
  • Phishing emails and targeted web advertisements are being used to drive users to sites where they are infected by drive-by-downloading of the trojan using the MS XML exploit
  • This requires zero user interaction in order to become infected
  • Previous versions of Sykipot have relied on file format exploits (MS Office files, PDFs)
  • The latest attack seems to be targeting attendees to the IEEE’s Aerospace Conference (the International Conference for Aerospace Experts, Academics, Military Personnel, and Industry Leaders)
  • Researchers have found a Sykipot variant that was programmed to steal credentials from systems using ‘ActivIdentity’s ActivClient’, the smart card application used by the U.S. Department of Defense’s Common Access Card (CAC)
  • This could result in the compromise of such smart cards, allowing the attack to gain access to highly sensitive materials

A third of top UK Univerisities use weak SSL configurations

  • TechWeek Europe used the SSL Labs tool to test the SSL implementations used at the top Univertisities in the UK
  • Many of the schools received grades of C or D instead of the expected A
  • Such weakness in the implementation of SSL could allow an attacker to inject data into encrypted packets, in order to exploit the user’s machine while they are visiting a trusted site, or to hijack the session or compromise other private data
  • Many of the schools responded quickly with configuration changes to upgrade their scores, while others were hesitant to make configuration changes for fear of affecting accessibility for users
  • SSL Best Practices Guide
  • ScaleEngine.com ‘s Results

Feedback:

Round Up:

Question? Comments? Contact us here!