acta – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 22 Feb 2016 02:45:52 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png acta – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Down with TPP | Unfilter 75 https://original.jupiterbroadcasting.net/46317/down-with-tpp-unfilter-75/ Wed, 13 Nov 2013 22:04:22 +0000 https://original.jupiterbroadcasting.net/?p=46317 A Pivotal section of the Trans-Pacific Partnership has been revealed by Wikileaks. Some say the TPP would threaten access to the Internet, and cultural works.

The post Down with TPP | Unfilter 75 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A Pivotal section of the Trans-Pacific Partnership has been revealed by Wikileaks, today. Shrouded in secrecy from the beginning some say the TPP would threaten access to information, the Internet, and cultural works. One thing is for sure, the world needs to challenge this controversial agreement, that’s on the fast track for the end of the year.

New leaks reveal the NSA and GCHQ Infiltrated OPEC’s Computer Network to perform economic espionage, and you won’t believe how they got in.

Plus your feedback, or follow up, and much much more. On this week’s episode of… Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is CRAZY

In January 2008, the NSA department in charge of energy issues reported it had accomplished its mission. Intelligence information about individual petroleum-exporting countries had existed before then, but now the NSA had managed, for the first time, to infiltrate OPEC in its entirety.

A secret GCHQ document dating from 2010 states that the agency had traditionally had “poor access” to OPEC. But that year, after a long period of meticulous work, it had managed to infiltrate the computers of nine OPEC employees by using the “Quantum Insert” method, which then creates a gateway to gain access into OPEC’s computer system. GCHQ analysts were even able to acquire administrator privileges for the OPEC network and gain access to two secret servers containing “many documents of interest.”

The cooperation is conducted under a voluntary contract, not under subpoenas or court orders compelling the company to participate, according to the officials. The C.I.A. supplies phone numbers of overseas terrorism suspects, and AT&T searches its database and provides records of calls that may help identify foreign associates, the officials said.


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Casey K

  • Chris B

  • B J

  • Maxime R

  • Spencer S

  • Daniel A

  • Rellon L

  • Thanks to our 253 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • NEW Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • NEW Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


TPP Property Rights Chapter Leaked

Today, 13 November 2013, WikiLeaks released the secret negotiated draft text for the entire TPP (Trans-Pacific Partnership) Intellectual Property Rights Chapter. The TPP is the largest-ever economic treaty, encompassing nations representing more than 40 per cent of the world’s GDP. The WikiLeaks release of the text comes ahead of the decisive TPP Chief Negotiators summit in Salt Lake City, Utah, on 19–24 November 2013.

The TPP is being referred to as “NAFTA on steroids,” and concerned citizens all over the nation are organizing to stop this from being fast-tracked. Organizations such as Backbone Campaign, Public Citizen’s Global Trade Watch, Fair Trade Coalition in Oregon and Washington, Popular Resistance and many others have joined together to form FlushTheTPP.org, an action campaign aimed at stopping the Trans-Pacific Partnership. These organizations are also launching a coordinated day of action Tuesday, November 12 with light projections planned in Dallas, Spokane, Detroit, Olympia, Baltimore, DC, Seattle and other cities.

  • The draft contains US and Japanese proposals designed to enhance the ability of pharmaceutical manufacturers to extend and widen their patents on drugs and medicines.

  • US and AU seek to criminalise modifications of technology devices to circumvent region restrictions.

  • US and Australia oppose a clause stating that ISPs “cannot be held legally responsible for copyright infringement on their networks”

  • US pushes a clause to patent surgical methods.

Source | Source | Source

Public Citizen has some analysis here on the chapter, noting lengthening and extension of copyright and access to medicine.

In the US, this is likely to further entrench controversial aspects of US copyright law (such as the Digital Millennium Copyright Act [DMCA]) and restrict the ability of Congress to engage in domestic law reform to meet the evolving IP needs of American citizens and the innovative technology sector. The recently leaked US-proposed IP chapter also includes provisions that appear to go beyond current US law.

The TPP would force the adoption of the US DMCA Internet intermediaries copyright safe harbor regime in its entirety. For example, this would require Chile to rewrite its forward-looking 2010 copyright law that currently establishes a judicial notice-and-takedown regime, which provides greater protection to Internet users’ expression and privacy than the DMCA.

– Tracking the Spokesholes –

Blunt last year became chief spokesman
and a lobbyist in Washington for Detroit’s Big Three automakers
just as the American automotive industry was enjoying a
resurgence.

David Lee Carden is an American lawyer and diplomat who is the United States Representative to the Association of Southeast Asian Nations (“ASEAN”) with the rank of Ambassador Extraordinary and Plenipotentiary. He was nominated by President Barack Obama in November 2010 and confirmed by the U.S. Senate in March, 2011.


MexiCoke Watch 2013!

America’s small but vocal Cult of Mexicoke freaked out. It was enough to prompt a reversal of sorts from Arca, which subsequently vowed to continue using only cane sugar in the Coke it exports to the U.S. Call it a New Coke moment in reverse for the maker of Mexican Coke. The uproar also revealed that much of the Coke sold south of the border already contains high-fructose corn syrup. Arca’s corn-to-sugar mix for the soda it sells at home is around 50/50.

Feedback:

  • Voice Mail.

  • Bitmessage Address: BM-GuQ4gqmBeW8CYpSo3Htg2pBrBdHbvpe7

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Down with TPP | Unfilter 75 first appeared on Jupiter Broadcasting.

]]>
The Fluoride Question | Unfilter 9 https://original.jupiterbroadcasting.net/21611/the-fluoride-question-unfilter-9/ Fri, 13 Jul 2012 18:22:10 +0000 https://original.jupiterbroadcasting.net/?p=21611 Some call it one of the most significant public health advances in history, others call it a dangerous toxic substance. We look at the Fluoride debate.

The post The Fluoride Question | Unfilter 9 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Some call it one of the most significant public health advances in history, others call it a dangerous toxic substance. In this episode we look at the Fluoride debate.

And a new generation of technology is empowering our cars, but what is being done to safeguard your privacy?

Plus: Your feedback, and our follow up.

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

HD Feed | Mobile Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Show Notes:

ACT ONE:

ACT TWO:

ACT THREE: Feedback

  • Rutger Writes…
  • Archie wrote in to say he felt we were hard on farmers last episode.

Picks of the week:

Song pick of the week:
For You by Staind UK Link

Follow the Team:

The post The Fluoride Question | Unfilter 9 first appeared on Jupiter Broadcasting.

]]>
Token Security | TechSNAP 64 https://original.jupiterbroadcasting.net/21117/token-security-techsnap-64/ Thu, 28 Jun 2012 15:37:03 +0000 https://original.jupiterbroadcasting.net/?p=21117 How attackers can defeat an RSA token in as little as 15 minutes. And a botched software update that shutdown a bank for days.

The post Token Security | TechSNAP 64 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

How attackers can defeat an RSA token in as little as 15 minutes, FBI has taken down an online fraud ring, we’ve got the details. And a botched software update that shutdown a bank for days.

Plus some great audience questions and our answers.

All that and more on this week’s TechSNAP!

Thanks to:

Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Limited time offers:

$1.99/mo economy hosting for 3 months – special offer!
Code:  199tech
Expires:  June 30, 2012

$3.99 .US domain!
Code:  399us4

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

Show Notes:

Researchers can defeat RSA SecurID 800 tokens in under 15 minutes

  • Researchers were able to use a ‘Padding Oracle Attack’ to compromise the plain text of an imported encrypted key in under 15 minutes
  • A ‘Padding Oracle Attack’, is a side channel attack that allows an attacker to see if a message was decrypted successfully or not
  • By purposely corrupting the encrypted message and/or its padding in different ways, and watching the error message (or even just the amount of time the device takes to attempt the decryption) the attacker is able to gain more and more information about the encrypted message, until they are able to recover the entire message
  • The researchers developed a more efficient version of the ‘million messages attack’, that only requires to be carried out with only a few 10s of thousands of messages, and found that some devices can be attacked with as few as 3800 messages
  • Researcher Blog Post
  • Research Paper
  • Don’t Believe Everything You Read…Your RSA SecurID Token is Not Cracked
  • RSA contends that the researchers did not ‘crack’ the RSA SecurID Token, but rather that they exploited a flaw in PKCS#1v1.5
  • However the researchers show (Table 1 on Page 9 and Table 3 on Page 12) that because the RSA SecurID tokens use a very simple padding check (not checking the length of the encrypted message), they disclose more information about the encrypted message during each attempt, this results in the RSA SecurID tokens taking the least amount of time to compromise
  • The researchers were not able to afford an HSM, but postulate that their attack could compromise even the more secure ones in mere hours

PayPal starts Bug Bounty Program

  • Paypal joins the ranks of Google, Mozilla, Facebook, Barracuda and others with bug bountry programs
  • This resolves a potential legal ambiguity where researchers that were attempting to forge or modify data being sent to the paypal site, might be accused of unauthorized access rather than legitimate research
  • Colin Percivals BSDCan 2012 Presentation – Crowdsourcing Security

FBI run sting operation nets 26 arrests of attempted ‘carders’

  • The operation intercepted over 400,000 compromised credit cards
  • The FBI estimates it prevented $200 million in losses (likely exaggerated)
  • The FBI notified 47 companies, government entities, and educational institutions of the breach of their networks
  • Example charges:
  • zer0 used hacking tools to steal information from the internal databases of a bank, a hotel, and various online retailers, and then sold the information to others, including an individual he believed to be a fellow carder, but who in fact was an undercover FBI agent
  • JoshTheGod (apparently a member of UGNazi) met in Manhattan with an undercover FBI agent to accept delivery of counterfeit cards encoded with stolen information. He was then arrested after attempting to withdraw funds from an ATM using one of the cards
  • kool+kake sold stolen CVVs and advertised to fellow carders that he got fresh CVV’s on a daily basis from hacking into databases around the world
    • According to the PCI-DSS (Security standard for processing credit cards, CVVs are NOT allowed to be stored in database, they are specifically designed to make databases of stolen credit cards useless, since the attacker will NOT have the CVV value (which is a 3 or 4 digit numeric hash of the credit card data and the banks secret key)

Botched software update as Royal Bank of Scotland freezes customer accounts for days


Feedback:

Round-Up:

The post Token Security | TechSNAP 64 first appeared on Jupiter Broadcasting.

]]> Extreme WiFi Makeover | TechSNAP 52 https://original.jupiterbroadcasting.net/18618/extreme-wifi-makeover-techsnap-52/ Thu, 05 Apr 2012 17:40:38 +0000 https://original.jupiterbroadcasting.net/?p=18618 What happens when the Internet Engineering Task Force is faced with unreliable hotel WiFi? And details on backdoor built into AT&T’s Microcell’s back door!

The post Extreme WiFi Makeover | TechSNAP 52 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Find out what happens when the Internet Engineering Task Force is faced with unreliable hotel WiFi

And we’ve got the details on backdoor built into AT&T’s Microcell’s back door. Yep the back door, has a back door.

Plus some viewer feedback, and a war story straight from the headlines!

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Limited time offer: $5.99 .coms, up to 5 domains! just use our code 599com7

Want to save money on your entire order? Use our code spring7 and save 15%!

 

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Support the Show:

Show Notes:

Researchers disassemble an AT&T microcell and find that even AT&T’s backdoors have backdoors

  • A microcell is a small consumer device that increases the signal strength of your mobile connection be acting as a miniature cell tower in your house, using your broadband internet connection to connect back to the telco via a secure IPSEC tunnel
  • The device is fairly complex and includes two System-on-Chips (one Ralink, the other picoChip), a Xilinx FPGA, radio hardware and a GPS module. GPS is used both for radio timing and for determining the position of the box. The box is only ‘allowed’ to work when within the area nominally serviced by AT&T.
  • The device includes a nice little tamper-detection mechanism which uses a set of 6 possible jumpers (3 of which are marked in purple on the above photo) to detect when someone removes the covers. The specific jumper-settings are supposedly unique per device. However researches believe they have worked around this.
  • After opening the device, researchers were able to locate the serial console for the Ralink device fairly quickly.
  • At boot time, the device spews a lot of information, and allows you to interrupt the boot process by pressing a number to select a ‘bootloader shell’. The bootloader is u-boot.
  • Using the u-boot ‘md’ (memory display) command, we were able to dump the Ralink’s flash memory over the serial connection
    +The Ralink SoC runs a 2.6.21 linux kernel. The kernel contains an lzma-compressed initramfs, which is the root filesystem for the device. It is mounted rw, but changes don’t persist between reboots
  • The system includes users for ssh and root, both of which have the same password. The password is non-dictionary, but after around 5 days of average processing, we were able to determine the password. This allows us to log-in to the device at the serial console
  • Topping it all is the ‘wizard’: It turns out that wizard is quite the magician. Its main trick is to provide a full backdoor to the device, allowing for full, remote, unauthenticated, root command execution on the box. You only need to know where to point your netcat 😉
  • It is probably only intended to be used over the secure IPSEC tunnel which the picoChip SoC creates automatically. In other words, the microcell creates a tunnel back ‘home’ to AT&T headquarters, then they connect over this tunnel, and send packets to the wizard. Unfortunately, they set up the wizard to bind on 0.0.0.0 (an alias for all IP addresses), so the backdoor is accessible over the WAN interface, allowing anyone with access to control the device
  • The backdoor uses simple UDP packets to transmit requests and receive responses.
  • There are a number of operations supported, but the most useful one is called ‘BackdoorPacketCmdLine’. Yes. It’s actually called ‘Backdoor’. This command lets you execute any linux command. Execution is performed using the backticksh function.
  • The response packets are sent to a hard-coded UDP address: 234.2.2.7. In order to get around this, we can set up a ‘redirection’ in the iptables firewall running on the box, to make packets which would go to 234.2.2.7 instead go to our own host – allowing us to see the output of the commands we send.
  • Hardware Tear Down

FTC fines RockYou for making claims about user privacy and data security while storing user passwords in plaintext

  • In late 2009 social gaming site RockYou.com was breached and their database of 32 million email address and passwords was leaked online
  • The critical part of this story is that the passwords were stored in plain text, this was one of the largest such breaches of plain text passwords and results in some interesting studies on the patterns people use to select passwords
  • Unlike other breaches such as gawker, where the passwords were insecurely hashed, the analysis extended beyond just weak passwords that could easily have their hashes cracked, the passwords being in plain text meant that every password was exposed, giving researchers more insight into the more secure passwords as well
  • Further exacerbating the issue was the fact that 179,000 of the accounts that were exposed belonged to minors, and were collected in violation of the COPPA laws
  • The site was compromised via a fairly trivial SQL injection
  • the FTC specifically took issue with the security claims on RockYou.com’s website, and as part of the settlement, RockYou.com has been barred from making future deceptive claims about user privacy and data security, must submit to regular 3rd party security audits for the next 20 years, delete all user data illegally collected from minors and pay $250,000 in civil fines
  • Full settlement details
  • Nitpicking: the ZD article ends quite a quote “if you store your customers’ data in plain text, please go encrypt it”. Passwords should NOT be encrypted, encryption is reversible, and requires the same key to encrypt as to decrypt, meaning the system must have to key in order to store new passwords, and that same key can be used to decrypt all passwords, providing almost 0 additional security if that server is compromised. Passwords should always be hashed using a cryptographically secure hashing algorithm, such as a salted SHA256 or Blowfish hash
  • Slashdot coverage of original breach

Feedback:

War Story:

What happens when the IETF (Internet Engineering Task Force) shows up for their conference at your hotel, and your wireless and wired internet is flaking? They fix it for you

Major players in the IETF showed up in Paris last week for the 83rd IETF meeting only to find the hotel’s wifi network almost entire unusable. The wired network was not much better, a situation exacerbated by the fact that the in room TV systems share the data connection.

“I’ve got what looks like a pretty good 802.11 connection, but am seeing about 30% packet loss. It’s really not usable from my room as it is currently performing,” noted attendee Ben Campbell.

“There was no WiFi signal when on the desk in front of the window in my room, but after some experiments, I discovered that the signal was quite good… on the ceiling of the bathroom,” emailed Marc Petit-Huguenin. “I have a Nexus S phone, so I taped it on the ceiling of the bathroom, and used tethering over Bluetooth to bridge the gap to the desk”

The hotel was also having power problems with network equipment of all types above the 27th floor

Attendees negotiated with the hotel and were given access to the network infrastructure, the IETF makeover team made a number of changes, included:

  • Decreasing the AP receiver sensitivity (changing the distance setting from “large” to “small”
  • Increasing the minimum data and multicast rate from 1Mbps to 2Mbps
  • Decreasing the transmit power from 20dBm to 10dBm
  • And, turning off the radios on numerous APs to reduce the RF noise
  • Installing netdisco and rancid and establishing a makeshift NOC to manage the network

(The network appears to have been setup by relative amateurs who assumed that jacking up the radio power would result in stronger connections, and who added too many APs without doing a proper site survey to determine where the APs should be placed)

There were also problems caused by the international spectrum of visitors, different countries allow different RF spectrum, and so some channels that are allowed in France and not allowed in the US, and vise versa.

US Apple Macs won’t associate to WIFI channel 13. This is something that the IETF has argued with Apple about–I believe it should be up to the AP to set the allowed channels and clients should be able to use them. I’m not worried about this in this case–folks should see other channels at acceptable signal strengths, and the Europeans, for example, will get a bit of a speed advantage

Later on, after the situation was less critical and they had time to better understand the existing network and develop a plan, a new scheme was developed:

Each floor now has approximately two access points on each of these four channels, with the channels staggered on adjacent floor. That design maximizes the distance between access points on the same channel. “I hope this will significantly improve the coverage in some rooms that had marginal or no signal while also improving the signal to noise ratio for all,” he said
In addition, he switched a couple of the single-radio Colubris access points on each floor from 2.4 to 5 GHz, which would let at least laptops make use of one of four channels on the much less crowded band.

Round Up:

The post Extreme WiFi Makeover | TechSNAP 52 first appeared on Jupiter Broadcasting.

]]> Email Constipation | TechSNAP 46 https://original.jupiterbroadcasting.net/17312/email-constipation-techsnap-46/ Thu, 23 Feb 2012 19:17:56 +0000 https://original.jupiterbroadcasting.net/?p=17312 We answer the question: What to do when your email server gets blocked, and why it keeps happening. GSM phones are vulnerable to a simple attack.

The post Email Constipation | TechSNAP 46 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We answer the question: What to do when your email server gets blocked, and why it keeps happening.

PLUS: GSM phones are vulnerable to a simple tracking attack, all you need is some open source software and some spare hardware, we’ll share the details! And we introduce the TechSNAP “Hall of Shame”.

All that more, on this week’s TechSNAP!

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Super special savings for TechSNAP viewers only. Get a .co domain for only $7.99 (regular $29.99, previously $17.99). Use the GoDaddy Promo Code cofeb8 before February 29, 2012 to secure your own .co domain name for the same price as a .com.

Pick your code and save:
cofeb8: .co domain for $7.99
techsnap7: $7.99 .com
techsnap10: 10% off
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans
Deluxe Hosting for the Price of Economy (12+ mo plans)
Code:  hostfeb8
Dates: Feb 1-29

   

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

 

Subscribe via RSS and iTunes:

Show Notes:

GSM Networks allow attacks to determine your location without your knowledge

  • Researchers at the University of Minnesota have found a way that an attacker using open source software could locate your cell phone to within 1 square kilometer
  • The GSM Protocol attempts to mask the identity of individual devices by using temporary IDs, however it is possible to map the phone number to these temporary IDs
  • The attack works by placing repeated PSTN phone calls to the mobile number, but disconnecting before the first ring on the handset (~4 seconds)
  • This causes the cell towers in the area where the networks believe the user to be to broadcast ‘paging’ requests to the target handset’s temporarily or immutable ID
  • By listening in on the radio frequency for this broadcast, the attacker can determine if the target is in range of one of the cell towers near them. A few repeated calls allow the attacker to isolate which temporary ID corresponds to the mobile device they are placing the aborted calls to
  • In a large area services by many towers, an attacker can determine if the target is within approximately 100 square kilometers
  • This attack could be used by oppressive governments to determine if a person is present at a protest or other gathering without relying on support from the telco, to determine is a victim is away from home before attempting a robbery, or even to locate a high profile individual for stalking or assassination
  • Research Paper

Feedback:

Q: (Traci) My webhost has been added to an RBL and now emails sent from my domain and from my website cannot be received by some people, can you explain what an RBL is and why it is blocking my email. (Dreamhost servers blocked by Trend Micro RBL )[https://www.dreamhoststatus.com/2012/02/14/mailservers-on-trend-micro-rbl-working-on-removal-from-list/]

A: An RBL or Real Time Blacklist is a list of IP addresses or domain names that the maintainer of the list feels should be blocked from sending emails. There are many different RBLs which different criteria from inclusion and removal from their lists. Most RBLs operate based on DNS due to its light weight and extremely low latency.

So, when an ISP, say, comcast, receives new email directed to one of its customers, it will check details of that email against a number of RBLs they comcast subscribes to. It checks the sending IP, any links included in the email, etc. If one or more of these RBLs returns a positive result, the email may be flagged as spam, or rejected entirely.

Different RBLs cover different problems, Spamhaus.org has lists that cover spam, Trojaned PCs and Open Proxies, Dynamic IP ranges, Spam Domains (sites that spam links to), and compromised servers. Spamcop.net bases its RBL on emails they intercept at honeypot addresses, and sampling the emails that users pay $30/year to have their email filtered via spamcop.net.

One of the most common ways for a webhost to get added to an RBL is when one or most customers run insecure CGI or PHP scripts that send email. When that happens, and attacker can cause your site to send email, or install a script that sends email. Sending large amounts of spam from the web host’s servers will cause it to be listed in the RBLs until the webhost resolves the issue. Many RBLs are automated, where they will add an IP when it is detected as a source of spam, and remove it once it has stopped sending spam for 24 hours. The other common cause of listing in an RBL is hosting sites that are the target of the spam messages (rather than the source). When a web application such as wordpress is compromised, the attacker may be able to install their own site in a subdirectory, using your hosting to host the link that send out in their spam messages. The target of the spam could be a page directing the user to buy something, a phishing site designed to look like paypal or a bank, or even malware, hosting the executable or javascript that the unsuspecting user will run. This last example is similar to the exploit we saw with cryptome last week, if other websites on the internet were infected and made to load a javascript file from a domain hosted at your host, then anti-virus vendors such as Trend Micro may add your webhost to their block list.

In the past, there have been a number of legal battles against RBLs where senders have tried to prosecute the RBL for blocking their communications, however, in the end, it is up the individuals ISPs to decide which RBLs to use and how to interpret the results returned by the RBL.

Email Blacklist Check – See if your server is blacklisted


War Story:

Another in our continuing series of War Stories submitted by the other other Alan (Irish_Darkshadow)

*
This incident took place in mid-April 1999 about two months into my technical support career with the US Thinkpad desk. Despite my rocky start I had managed to establish a reputation for myself as an agent who liked to tackle the more difficult calls. In addition, I had also managed to avoid having a single customer “escalate” on me. That is where a user demands a superior or someone who knows more about their issue to take over the call. That all changed with a single call.

I arrived to work that day for my 16:30 to 01:30 shift and settled in to take my first call. It was a relatively easy one where the user had picked up their laptop from a servicer and was having boot problems. It turned out to be a simple case of the servicer having left a driver disk in the floppy drive. Top to bottom the call took about 13 minutes including typing up the documention for it in our ticketing system. I sat in Avail on my phone for the next few minutes before my next call arrived.

Once I managed to get the initial greeting script out I was slammed with a guy screaming down the line about wanting to speak to a manager. I was resigned at this point to losing my “no escalation” record but I still needed to follow procedure and determine what grievance had the user so irate before putting a team lead or manager on the line with him. It took me a few mins to calm him down enough and to vent sufficiently for me to start gathering some information. It turned out that he had returned his laptop to IBM on three separate occasions in the first nine weeks he had owned it for various compatibility issues with 3rd party devices he had purchased. I could see his point of view perfectly in wanting an escalation and I placed him on hold to go look for someone in authority to help the guy out.

My team leader (TL) at the time was easily located and once I had explained the situation he decided to delegate the matter to his assistant team leader (ATL). I took her to my desk where she started speaking with the user and I strolled back to my TL to get some ribbing for my first customer escalation. Normally when a TL or ATL takes over a call it results in the user being placated in some manner or else the customer gets transferred to Customer Relations to be dealt with appropriately. Either way, once an agent handed off a call like that they simply waited for a resolution before taking the next call. No such luck this time. The ATL walked up to where I was standing and started to explain the situation to the TL and how the user had returned the machine three times with no faults found but he still could not get his 3rd party devices to work. Nothing too new there but then she dropped the bombshell that she had promised the user that I would troubleshoot the hardware issues for him immediately! This was unheard of, the customer had four devices that I had no familiarity with and this ATL had just thrown me under the frickin’ bus. I looked at the TL for some sanity to be brought to the situation but he had to acknowledge that the ATL had committed a course of action to the customer and I was going to have to pay for her generosity. Back to my desk I went whilst cursing the ATL, her lineage and any future offspring…..but in a harmless way 😀

Once I was back on the call with the user I started to gather some details on exactly what I was dealing with. The user had a Thinkpad 560 which is termed a “single spindle” machine in that it only had a hard drive within the chassis and no floppy or optical devices. The external floppy drive was attachable via an IBM proprietary connector and the machine was a Pentium 120 with 32mb RAM, a 2.1 Gb HDD and an IrDA 1.0 header.

Now that I had some idea of the core hardware I ventured into the realm of 3rd party peripherals that the user was struggling with. He had a backpack cdrom (parallel port optical drive), a PCMCIA modem, a PCMCIA network card and a HP printer that he wanted to connect to via Infrared. I knew I was screwed at that point but figured I couldn’t really make the problem worse since none of the hardware operational anyway.

I began working with the backpack cdrom which was attached to the printer port. Windows 95 v2.1 was not detecting any new hardware once the drive was switched on. I tried the usual places like device manager for clues but all I could determine was that the parallel port appeared to be operational. I put the cdrom to the side and started working on the two PCMCIA cards. Despite the user having the proprietary CardMagic software installed that acted as a crutch to Windows 95 plug & play (*pray) neither card was detected and a pattern was beginning to emerge. The IR printer suffered from the same lack of detection and so I asked the user if he had any other device that we could attach to the laptop just to see if Windows was detecting anything at all. He connected up the external floppy drive and instantly it was detected and accessible in Windows Explorer. SHIT!!! My instincts were telling me that the OS was corrupted in some way and a reload was imminent and I hated having to do that to any user.

I sent an IM to the Team Leader to let him know that I was going to have to do a reload and he told me to stay on the call with the customer until the reload was complete and then resume working on the 3rd party hardware. As I was preparing the user for the reload I had a sudden realisation of how bad the situation really was. A single spindle machine comes with a specific reload solution where a user starts up Windows for the first time and they get prompted to insert floppy disks onto which the reload disk images will be “burned”. At first the customer didn’t recall any such prompt and I began to get a sinking feeling that I would need to have this laptop shipped to IBM for the 4th time just for a reload and then once it was returned to him, I would need to pick up with troubleshooting the 3rd party hardware. The user had a Eureka moment and told me that he believed that he had a shoe box with the floppy disks that had been in his office closet since the day he made them. He managed to locate the shoe box and the 37 floppy disks inside. 26 of those were the base OS and 11 were for the application layer.

I reckoned that the reload was going to take about two hours to complete which presented me with another challenge due to the team leader telling me to stay on the phone through to completion. One of the rules was that there should not be any dead silences during a tech support call so I was going to have to find a way to get this guy talking for the two hours in between me asking him about what was on the screen and how many disks he had left to go through. This was gonna be fun!

For the two hours of the reload, as the customer went through his 37 disks, I managed to lure him into topics like his job and prior computer experience and pretty much anything else I could come up with to keep things flowing. I was trying to hit on a topic that would allow for lots of conversation with minimal input from my side. It turned out that he was a Judge in NYC who handled criminal cases. The only common ground there is that I could explain to him that I loved My Cousin Vinny which I figured would not go down very well. Eventually he mentioned that his son was at soccer practice and he needed to arrange someone else to pick him up while we reloaded the laptop. That was my angle, I started talking to the guy about every possible soccer item that came to mind and the rest of the reload flew by without incident. I got him to go into the BIOS and I set up the the parallel port and PCMCIA slots before dealing with Windows.

Once the operating system was back on there and up and running I got him to attach the backpack cdrom and I heard the detection sound over the phone. That meant I had at least found one issue and corrected it. Device manager showed the cdrom with an exclamation mark and it looked to me like this thing needed to be installed from a DOS perspective before it would work in Windows. He had a driver disk for the cdrom which I was able to get running in DOS mode so that it added the driver to the config.sys file and called it from the autoexec.bat file. A quick reboot later and the cdrom was usable from within Windows 95. Problem #2 solved. Time for the PCMCIA fun and games.

I decided to go with setting up the modem first as it would be easiest to test. Upon insertion the card was instantly detected and I was able to talk him through configuring it in the CardMagic application. He hooked it up to his fax line and was able to connect to his ISP at a staggering, no, blistering 28.8kbps! Either way, problem #3 solved.

The network card was up next and once more upon insertion it was detected and was able to find a driver on the backpack cdrom drive. There was no network near the user that I could test with but I was able to talk him through some ping tests and winipcfg.exe tests that implied the TCP/IP stack was operational and the bindings to the card were good. So we agreed to call that problem #4 solved. I felt that I was in the home stretch now and when I looked at the clock I realised that the call was coming up on three and a half hours already. Now it was time to get the printer operational.

The printer was able to print a self test page from the buttons on it and so it appeared to be working from a hardware perspective. I got the user to test it using the parallel port by removing the backpack cdrom and that was also successful. The problem came when trying to get the IR link to the printer to work. No matter what configuration I tried I just could not get a connection between the IrDA header on the laptop and that on the HP printer. The customer refused to believe that it was the printer and was adamant that the IrDA header on the Thinkpad was at fault. I was completely stuck for a way to prove otherwise. At some point during that desperation to come up with a troubleshooting idea after nearly four hours of work I hit upon an idea that made sense…at least to me. I asked the user to confirm what COM port the IrDA was configured as and then I had him connect to that COM port via the Hyperterminal application. My next request was a weird one, I asked him to get a remote from a TV or a VCR for me. He rummaged around for a while and then found one for some small TV he had in his office that was barely used. I asked him to point it at the IrDA header on the laptop and keep pressing random buttons on it while watching the hyperterminal window. He said that gibberish symbols came up in the window whenever he pressed a button on the remote. EUREKA! I had solved problem #5 by proving that the issue was with the IR port on the printer and not the one on the laptop. He agreed with my conclusion and he asked me if I would set up the printer on the parallel port so that he could just hook up a cable if he needed to. As we were going through the steps of hooking up the backpack to install the driver he told me that he got a blue and then a black screen. The text said “registry not found”. Apparently he had decided to pull out the PCMCIA cards while the LPT printer driver was installing and it had thrashed Windows.

My first attempt at a solution was a reboot into safe mode but that failed with the same error and I was only able to get the system to reboot into DOS mode. From there I backed up the existing registry files and restored the user.da0 and system.dao clean registry files. When he booted back into Windows, we were back where things started….no hardware was detected once attached. EPIC USER FAIL!!!
With just over four hours on the timer, the whole procedure had to be done all over again. I asked the user if I could put him on hold and he agreed. Firstly I dealt with my bladder and then I went to the TL and told him what was happening and the sadistic bastard told me to go back with the user and see it through to completion. Fucker.

I got back onto the call and we started going through the whole process all over again from the ground up with one caveat – don’t do anything with the computer unless I authorised it. During the two hour reload portion of the call I got him to give me his AOL email address and I sent him a copy of a tool from the Microsoft site called E.R.U. (emergency recovery utility). This time around once we had managed to get all of the hardware and software to where it needed to be and we had done enough tests to convince us both that everything was operational. At that point I ran the ERU application and made him store that recovery set in his shoe box of floppy disks. We exchanged pleasanties and parted ways. I checked the timer and 8 hrs 38 minutes had passed.

On an average day I would deal with twenty to twenty five calls in a single shift. On this day I managed a grand total of two calls with 1 pee break and no food as I hadn’t taken any of my breaks. However, I was able to leave the office two hours earlier than expected. That didn’t really help with my complete burnout after that long of a call but at least I had a new record for the longest tech support call in the history of the call center and that record still stands today as far as I know.

Try to get a 8hr plus support call in a current day call center. Aside from the focus on 7 minutes per call I doubt you will find the will and dedication to send a customer away satisfied with the experience.

And I never even got a medal but if I ever get into nefarious matters in NYC, I will be calling in a favour from a certain Judge I know there.


Round Up:

The post Email Constipation | TechSNAP 46 first appeared on Jupiter Broadcasting.

]]> DHCP Attacks | TechSNAP 43 https://original.jupiterbroadcasting.net/16601/dhcp-attacks-techsnap-43/ Thu, 02 Feb 2012 20:29:53 +0000 https://original.jupiterbroadcasting.net/?p=16601 Find out how a simple system update brought DreamHost down for nearly two days, and we answer frequently asked DNS questions!

The post DHCP Attacks | TechSNAP 43 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Find out how a simple system update brought DreamHost down for nearly two days, and how the MS Updater Trojan works.

PLUS: We answer frequently asked DNS questions, and a war story you’ll never forget!

All that and more, on this week’s TechSNAP!

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Super special savings for TechSNAP viewers only. Get a .co domain for only $7.99 (regular $29.99, previously $17.99). Use the GoDaddy Promo Code cofeb8 before February 29, 2012 to secure your own .co domain name for the same price as a .com.

Pick your code and save:
cofeb8: .co domain for $7.99
techsnap7: $7.99 .com
techsnap10: 10% off
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans
Deluxe Hosting for the Price of Economy (12+ mo plans)
Code:  hostfeb8
Dates: Feb 1-29

   

Direct Download Links:

   

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

 

Subscribe via RSS and iTunes:

   

Show Notes:

Ongoing targeted attacks against defense and aerospace industries

  • The research provides detailed analysis of the ‘MSUpdater Trojan’
  • The trojan was mostly spread using targeted spear phishing attacks, emailing people who would have access to sensitive information
  • The goal of the remote administration trojan was to steal sensitive or classified information about aerospace or defense designs
  • The trojan changed rapidly to avoid detection, and used a variety of methods to infect computers, including zero-day PDF exploits, fake conference invitations (usually specifically targeted to the recipient area of interest, including ISSNIP, IEEE Aerospace Conference, and an Iraq Peace Conference)
  • Communications between the infected machines and the C&C servers often took the form of HTTP traffic using the URL structure of Microsoft Windows Update (where the trojan got its name) and Windows Error Reporting likely to avoid detection by some IDSs and manual traffic analysis. Other versions of the trojan included fake google searches with encoded parameters
  • The trojan dropped was able to detect that it was being run in a virtual machine, and if so would not attempt to infect the machine. This allowed it to go on undetected for a longer period of time and until discovered, hampered its analysis by researchers
  • Outline by Researchers
  • Research and Analysis of the Trojan
  • Research paper on detecting Virtual Machines

DreamHost suffers massive outage due to automated Debian package updating

  • DreamHost had a policy where they would automatically install the latest packages from the their repository on all of their machines, including VPS and Dedicated servers rented to customers
  • Something in one or more of these packages caused some dependencies to be uninstalled resulting in Apache, the FTP server and in some instances, MySQL being uninstalled or unable to start properly
  • DreamHost is a very large attack target due to the number of servers and domains that they host, they must work diligently to ensure updates are applied to prevent massive numbers of machines from becoming compromised
  • DreamHost has to manually resolve many of the dependencies was unable to fix the issue in an automated fashion, requiring hands on admin time on each individual server and VPS
  • DreamHost has now changed their policy regarding updates, where they will now test all of the packages from Debian extensively before they are pushed to all customer servers

Feedback

Q: Chris D asks about monitoring solutions

A: I personally use Nagios + NagiosGraph for my monitoring, although I have also experimented with Zabbix recently. We discussed a number of monitoring applications in TechSNAP 20 – Keeping it up . Nagios configures each host/service from files, but supports extensive templating and host/service groups, allowing you to quickly configure servers that are nearly identical. Zabbix is powered by a database, which is both a pro and a con, but the main advantage I gave to NagiosGraph was that the historical data is stored in RRD files rather than a database, meaning it is aged to require less space. Zabbix by default deleted old data to avoid accumulating massive amounts of data.

Chris uses: monitor.us (want’s them to sponsor us)
Allan has monitoring included in his DNS Failover Service from DNS Made Easy
*

Q: Joshua asks about DNS A Records vs CNAME Records

A: If the CNAME is inside the same domain, the authoritative server will usually return the result with the response for the CNAME. For example, if static.example.com is a CNAME to www.example.com, the A record for www.example.com will be included in the response. However if the CNAME is for something like example.cdn.scaleengine.net then a 2nd lookup is required. To answer the second part of your question, it is not possible to do an HTTP redirect at the DNS level, so NGINX is the best place to do it, if done correctly this redirect can be cached by Varnish to avoid any additional latency. You could hard-code the redirect in to Varnish as well. I applaud your use of a cookieless domain for your static content.


War Story

This week’s war story is sent in by Irish_Darkshadow (the other other Alan)


The Setting:

IBM has essentially two “faces”, one is the commercial side that deals with all of the clients and the other is a completely internal organisation called the IGA (IBM Global Account) that provides IT infrastructure and support to all parts of IBM engaged with commercial business.

The events described here took place in early 2005.

The Story:

There is an IBM location in Madrid, Spain which was stafffed by about two thousand people at the time of this war story. The call centre in Dublin was tasked with supporting the users in that site and every single one of them had been trained in what I called “Criticial Situations – Connectivity Testing”. The training took about 4 hours to deliver and was followed up with some practical tests over the next two weeks to ensure the content was sinking in. There was also some random call recording done to detect the techniques being used on live calls too.

Early one morning a call came in to the Spanish support line from a user who had arrived to work late and was unable to get access to her email server. The agent immediately started to drill into the specifics of the problem and realised that the user simply had no network connectivity to her email. The next step in the training says to establish whether the user actually has partial connectivity or a complete loss. The agent began with a simple IPCONFIG /ALL and noticed right away that the user had a 192.168.x.x IP address. This is quite an unusual thing to get on a call from an internal IBM user and the agent didn’t know what to do next and started to get some empirical data before escalating the issue. The key question was – are you the only user affected? The user confirmed that everyone around her was working away with no issues.

The team leader for the Spanish support desk picked up on the call and decided to call my team for some troubleshooting tips. I dropped over to the call and started listening in (which was useless as it was all in frickin’ Spanish) in the hopes of catching something “weird” from the call. The 192 address piqued my curiosity so I had the agent check for a statically assigned IP address…the XP based computer the user was operating was set to use DHCP. Hmmmm…

While this call really started to gain my interested I started hearing of other calls beginning to come in from other users in the same building with the same problem. The agents on those calls were able to confirm to me that these users were on different floors than the original user. So I now had a building on my hands that was slowly losing connectivity to these 192 addresses and the only possibility was a rogue DHCP server.

I suspected that the network topology and physical structure was about to play an important part in isolating the problem so I called up the onsite technicians and managed to get one who knew the building and the network inside out. Each floor of this 20+ floor building has a comms room where 24 / 48 port switches were used to supply each area of the floors. The best part was that this guy actually had a map of which ports were patched to which desks for every floor.

Now that I was firmly into Sherlock Holmes mode I asked the onsite guy to arrange some teams for me. For each of the know affected floors I needed a tech in the comms room and another testing computers. We had hatched a plan to start from the original floor that was affected by unpatching one switch at a time from the building network and doing a release / renew on a PC in that newly unpatched section to see if we got a 169.254.x.x address. If that happened then we knew that the rogue DHCP server was not in that specific section (clever eh? what do you mean no? well screw you, you werent’ there man…it was a warzone!). We repeated this pattern for five floors with no success so we expanded one floor up and one floor down. Eventually one of the techs ran the test and the PC picked up a new 192.168.x.x lease…..we had the root of the problem within our grasp and it was time to close the net (too much? I’m trying to make this sound all actiony….it my head it has AWESOME danger music).

The onsite guys managed to check every PC in the suspect floor area and the rogue server was still not found. They yanked the cable from every PC in the area and while the rest of the building was recovering, we knew that if we repatched this section that the problem would spread again. When all the PCs were disconnected, I asked the onsite guy to check the switch for activity and there was still one port showing traffic. Despite having all the PCs on the floor disconnect…the rogue was still operational. I questioned if there were any meeting rooms or offices on the floor and there was one. AHA! Upon closer inspection, the empty office had a laptop on the desk that was showing activity on the NIC lights. They yanked the cable and tested a PC on the floor…..169.254.x.x…SUCCESS. The switch was repatched to the building network and all of the PCs recovered. The technician I had called originally started to cackle maniacally over the phone. Perhaps it was better described as derisive laughter. Apparently the door to the office that housed the rogue DHCP laptop had a sign on it that read – IT Manager!!!

When we managed to get a full post mortem / lessons learned done it turned out that the IT Manager had arrived to the building about an hour after most users start work and half an hour prior to the arrival of the original caller to the Dublin support centre. So every user who worked normal hours had arrived to work and gotten a valid IP lease. Then the IT Manager showed up, connected his laptop and buggered off to a meeting. 192.168.x.x addresses started getting issued. At that point the original user arrives to work, gets a bad IP and calls the support desk. It turned out that over the weekend the IT Manager had enabled Internet Connection Sharing so that his daughter could get online through the broadband on the laptop from her home PC. He hibernated the laptop, forgot all about the ICS being enabled and just connected it up at work that morning without even thinking about it .

Sometimes, late at night….I can still hear that derisive laughter and it makes me sad when I think of all those IT Managers out there who can do stupid shit like this and yet retain their positions!


It just goes to show, that the methodical approach may not always be the fastest approach, but because it solves the problem every single time, it usually results in a faster resolution and a better understanding of what the issue was.


Round Up

The post DHCP Attacks | TechSNAP 43 first appeared on Jupiter Broadcasting.

]]> Answers for Everyone | TechSNAP 42 https://original.jupiterbroadcasting.net/16331/answers-for-everyone-techsnap-42/ Thu, 26 Jan 2012 20:40:12 +0000 https://original.jupiterbroadcasting.net/?p=16331 We’ve got the answer to life the universe and everything, plus why you need to get upset about ACTA, and patch your Linux Kernel. In this Q&A PACKED edition!

The post Answers for Everyone | TechSNAP 42 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We’ve got the answer to life the universe and everything, plus why you need to get upset about ACTA, and patch your Linux Kernel!

All that and more, in this Q&A PACKED edition of TechSNAP!

Thanks to:
GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Pick your code and save:
DOTCO9: .co domain for $17.99
techsnap7: $7.99 .com
techsnap10: 10% off
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans

   

Direct Download Links:

   

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

 

Subscribe via RSS and iTunes:

Show Notes:

Dreamhost gets hacked, resets all customers’ passwords, has scale issues

  • On January 19th, Dreamhost.com detected unauthorized activity in one of their databases
  • It is unclear which databases were compromised, if they were dreamhost databases of customer data, or customer site databases
  • Dreamhost uses separate passwords for their main web control panel, and individual user SSH and FTP accounts
  • Dreamhost ran in to scale issues, where their centralized web control panel could not handle the volume of users logging in and attempting to change their shell passwords
  • The fast forced password reset by DreamHost appears to have promptly ended the malicious activity
  • Based on the urgency of the reset, there seem to be indications that DreamHost stores users’ passwords in plain text in one or more databases
  • This assertion is further supported by the fact that they print passwords to confirmation screens and in emails
  • Dreamhost also reset the passwords for all of their VPS customers

Linux root exploit – when the fix makes it worse

  • Linux kernel versions newer than 2.6.39 are susceptible to a root exploit that allowed writing to protected memory
  • Prior to version 2.6.39 write access was prevent by an #ifdef, however this was deemed to be to weak, and was replaced by newer code
  • The new security code that was to ensure that writes were only possible with the correct permissions, turned out to be inadequate and easily fooled
  • Ubuntu has confirmed that an update for 11.10 has been released, users are advised to upgrade
  • This issue does not effect Redhat Enterprise Linux 4 or 5, because this change was not backported. A new kernel package for RHEL 6 is now available
  • Analysis
  • Proof of Concept
  • Proof of Concept for Android

Feedback

Q: Tzvi asks how to best Monitor employee Internet usage?

A: There are a number of ways to monitor and restrict Internet access through a connection you control. A common suggestion is the use of a proxy server. The issue with this is that it requires configuration on each client machine and sometimes even each client application. This is a lot of work, and is not 100% successful. However, there is an option know as a ‘transparent proxy’. This is where the router/firewall, or some other machine that all traffic to the internet must pass through analyzes the traffic, and routes connections outbound for port 80 or 443 (HTTP and HTTPS respectively, and optional additional ports) through the proxy server, without any configuration required on the individual clients. Then, you can use the firewall to deny all traffic outbound that is not via the proxy.

This is relatively easy to setup, so much so that as part of the final exam in my Unix Security class, students had 2 hours to setup their machine as follows:

  • Configure TCP/IP stack
  • Download GPG and Class GPG Key
  • Decrypt Exam Instructions
  • Install Lynx w/ SSL support
  • Install a class self-signed SSL certificate and the root certificate bundle to be trusted
  • Install and configure Squid to block facebook with a custom error page
  • Configure Lynx to use Squid
  • Create a default deny firewall that only allows HTTP via squid and FTP to the class FTP server
  • Access the college website and facebook (or rather the custom error page when attempting to access facebook)

While they had a little practice, and didn’t have to configure a transparent proxy, it is still are fairly straight forward procedure.

Instead of rolling your own, you can just drop in pfSense and follow these directions


Q: Brett asks, what do you do after a compromise?

A: The very first thing you do after a compromise, is take a forensic image of the drive. A bit by bit copy, without ever writing or changing the disk in any way. You then pull that disk out and put it away for safe keeping. Do all of your analysis and forensics on copies of that first image (but no not modify it either, you don’t want to have to do another copy from the original). This way as you work on it, and things get modified or trashed, you do not disturb the original copy. You may need the original unmodified copy for legal proceedings, as the evidentiary value is lost if it is modified or tampered with in any way.

So your best bet, is to boot off of a live cd (not just any live cd, many try to be helpful and auto-mount every partition they find, use a forensics live cd that will not take any auction without you requesting it). Then use a tool like dd to image the drive to a file or another drive. You can then work off copies of that. This can also work for damaged disks, using command switches for dd such as conv=noerror,sync . Also using a blocksize of 1mb or so will speed up the process greatly.

You asked about tripwire and the like, the problem with TripWire is that you need to have been running it since before the incident, so it has a fingerprint database of what the files should look like, so it can detect what has changed. If you did not have tripwire setup and running before, while it may be possible to create a fingerprint database from a backup, it is not that useful.
The freebsd-update command includes an ‘IDS’ command, that compares all of the system files against the central fingerprint database used to update the OS, and provides quick and powerful protection against the modification of the system files, but it does not check any files installed my users or packages. The advantage to the freebsd-update IDS over tripwire is that it uses the FreeBSD Security Officers fingerprint database, rather than a locally maintained one that may have been modified as part of the system compromise. In college I wrote a paper on using Bacula as a network IDS, I’ll see if I can find it and post it on my blog at appfail.com.


Q: Jono asks, VirtualBox vs. Bare to the metal VMs?

  • Xen, KVM and VirtualBox are not bare metal, they requires a full linux host
  • XenServer is similar to VMWare ESXi, in that it is bare metal. It uses a very stripped down version of CentOS and therefore far fewer resources than a full host. However XenServer is a commercial product (though there is a free version)
    +The advantage to XenServer over VMWare ESXi (both are commercial but free), is XenServer is supported by more open source management tools, such as OpenStack

Q:Gene asks, IT Control is out of control, what can we users do?


Q: Crshbndct asks, Remote SSH for Mum


Roundup

The post Answers for Everyone | TechSNAP 42 first appeared on Jupiter Broadcasting.

]]> FreeBSD 9.0 Review | LAS | s20e03 https://original.jupiterbroadcasting.net/16121/freebsd-9-0-review-las-s20e03/ Sun, 22 Jan 2012 15:35:18 +0000 https://original.jupiterbroadcasting.net/?p=16121 Turns out FreeBSD is still a thing you can think about download! We take a look at version 9.0! And it's new anti-crash-usb-thumb-drive removal technology!

The post FreeBSD 9.0 Review | LAS | s20e03 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Turns out FreeBSD is still a thing you can think about download! We take a look at version 9.0! And marvel at its new anti-crash-usb-thumb-drive removal technology!

Plus Red hat’s big release that require it’s customers to use Microsoft Windows.. A little LESS, kinda!

And so much more!

All this week on, The Linux Action Show!

Thanks to

GoDaddy.com Use our codes LINUX to save 10% at checkout, or LINUX20 to save 20%

$7.99 .COM Offer Code: linuxcom

Direct Download:

HD Video | Large Video | Mobile Video | Ogg Video | MP3 Audio | Ogg Audio | YouTube

RSS Feeds:

Large Video Feed | Mobile Video Feed | MP3 Feed | Ogg Feed | iTunes Feeds

Show Notes:

Runs Linux:

Android Pick:

Universal Pick:

Random Distro Of The Day

Linux Action Show Subreddit

NEWS:

FreeBSD 9 Review:
  • UFS Softupdate Journaling
  • The FreeBSD Fast File System now supports softupdates journaling. It introduces a intent log into a softupdates-enabled file system which eliminates the need for background fsck(8) even on unclean shutdown
  • This new feature means that a fsck after an unexpected reboot is no longer required. In modern FreeBSD only a basic preen was required, and then a full fsck would take place on a snapshot of the file system, in the background after the system had finished rebooting. With the new softupdate journaling (basically an intent log), a full fsck is no longer required at all
  • Journaling support is enabled by default on all newly created file systems, and can be enabled on existing UFS2 partitions using tunefs(8)
  • Full TRIM support for SSDs
  • The FreeBSD Fast File System now supports the TRIM command when freeing data blocks. The TRIM-enable flag makes the file system send a delete request to the underlying device for each freed block
  • TRIM support can also be enabled during newfs(8) or on an existing file system with tunefs(8)
  • ZFS Upgraded to v28
  • ZFS v28 introduces support for data deduplication, triple parity RAIDZ (raidz3), snapshot holds, log device removal, zfs diff, zpool split, zpool import -F, and read-only zpool import
  • The zpool(8): utility now supports a zpool labelclear command. This allows to wipe the label data from a drive that is not active in a pool
  • HAST Improvements
  • The Highly Available Storage daemon now supports data checksumming (crc32 or sha256) and compression (zero hole or lzf) and improved security
  • Introduction of the GEOM RAID class graid(8)
  • Which supports:
    • RAID0
    • RAID1
    • RAID1E
    • RAID10
    • SINGLE
    • CONCAT
  • It also supports the on disk formats for:
    • Intel RAID BIOS
    • JMicron RAID BIOS
    • NVIDIA MediaShield RAID BIOS
    • Promise and AMD/ATI RAID BIOS
    • SiliconImage RAID BIOS
  • Additionally, geom_map(4) allows specific areas of a device to be mapped as separate devices, especially useful for embedded flash storage
  • GEOM also support the following classes: CACHE, ELI, JOURNAL, LABEL, MIRROR, MOUNTVER, MULTIPATH, NOP, PART, RAID3, SCHED, SHSEC, STRIPE and VIRSTOR
  • NFSv4 with ACLs
  • In addition to NFSv2 and v3,
  • New utmpx(3) user accounting system
  • 5 new TCP congestion control schems
  • The FreeBSD TCP/IP network stack now supports the mod_cc(9) pluggable congestion control framework. This allows TCP congestion control algorithms to be implemented as dynamically loadable kernel modules
  • The following kernel modules are available as of 9.0-RELEASE: cc_chd(4) for the CAIA-Hamilton-Delay algorithm, cc_cubic(4) for the CUBIC algorithm, cc_hd(4) for the Hamilton-Delay algorithm, cc_htcp(4) for the H-TCP algorithm, cc_newreno(4) for the NewReno algorithm, and cc_vegas(4) for the Vegas algorithm.
  • An h_ertt(4) (Enhanced Round Trip Time) module has been added, which allows per-connection, low noise estimates of the instantaneous RTT in the TCP/IP network stack.
  • New CAM based disk subsystem
  • The ATA/SATA disk subsystem has been replaced with a new cam(4)-based implementation. cam(4) stands for Common Access Method, which is an implementation of an API set originally for SCSI–2 and standardized as “SCSI–2 Common Access Method Transport and SCSI Interface Module”
  • The ada(4) driver now supports per-device write cache control. New sysctl(8) variables kern.cam.ada.write_cache and kern.cam.ada.N.write_cache settings of 1 enables and 0 disables the write cache, and –1 leaves the device default behavior. sysctl(8) variables can override the configuration in a per-device basis (the default value is –1, which means to use the global setting)
  • New Resource Accounting and Limiting APIs
  • RACCT is a new resource accounting API has been implemented. It can keep per-process, per-jail, and per-loginclass resource accounting information
  • The new resource-limiting API RCTL works in conjunction with the RACCT resource accounting implementation and takes user-configurable actions based on the set of rules it maintains and the current resource usage
  • Full USB3 support
  • OpenSSH upgraded to 5.8p2 with HPN for faster transfer speeds
  • OpenResolv to manage resolv.conf for multiple interfaces
  • Support for SHA–256 and SHA–512 cryptographic password hashing
  • sh updated
  • new arithmetic expression handling imported from dash (which is originally from NetBSD ash)
  • changes to the way builtin commands relate to PATH env
  • fixed various other bugs
  • Capsicum Capability Mode
  • New Sandboxing and compartmentalization framework from Cambridge University
  • Improved privilege separation in OpenSSH and DHClient
  • Replacement of various GPL tools and utilities with BSD licensed ones to avoid GPLv3
  • libreadline
  • grep
  • llvm/clang imported, will eventually replace gcc 4.2 (last GPL v2)
  • compiler-rt replaced libgcc

If you are using an older version of FreeBSD, the FreeBSD-Update tool can do a quick in-place upgrade using bsdiff binary patching.

As always, instructions for installing the OS and Packages, securing and managing your system can be found in the FreeBSD Handbook

Support Jupiter Broadcasting

Find us on Google+
Find us on Twitter:

Follow the network on Facebook:

Jupiter Broadcasting Forum:

Catch the show LIVE Sunday 10am PDT:

The post FreeBSD 9.0 Review | LAS | s20e03 first appeared on Jupiter Broadcasting.

]]> SOPA Report | FauxShow 73 https://original.jupiterbroadcasting.net/16086/sopa-report-fauxshow-73/ Sat, 21 Jan 2012 07:43:35 +0000 https://original.jupiterbroadcasting.net/?p=16086 Angela and Chris re-cap the web's unified protest of SOPA and PIPA, and highlight some of the more creative ways sites displayed their outrage.

The post SOPA Report | FauxShow 73 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Angela and Chris re-cap the web\’s unified protest of SOPA and PIPA, and highlight some of the more creative ways sites displayed their outrage.

Plus what\’s changed since the protests. And a quick look at ACTA and OPEN, are they the next SOPA, or even worse?

Direct Download:

HD Download | Mobile Download | MP3 Download

Show Notes

https://blog.reddit.com/2012/01/technical-examination-of-sopa-and.html
https://www.savetheinternet.com/pipa-whiplist
https://www.google.com/landing/takeaction/
https://latimesblogs.latimes.com/technology/2012/01/sopa-blackout-sopa-and-pipa-lose-three-co-sponsors-in-congress.html
https://latimesblogs.latimes.com/technology/2012/01/sopa-blackout-who-is-joining-the-protest.html
https://twitpic.com/88ueqz
Hitler reacts to SOPA.
SOPA & PIPA message from Capt. Jean-Luc Picard
https://www.quickmeme.com/meme/35qwxd/
Anonymous – Don\’t Mess With Us
https://mashable.com/2012/01/19/doj-megaupload-anonymous/
https://a4.sphotos.ak.fbcdn.net/hphotos-ak-ash4/405609_2605008455123_1552234156_32516316_334758957_n.jpg
https://techland.time.com/2012/01/20/10-sites-skewered-by-anonymous-including-fbi-doj-u-s-copyright-office/
https://www.pcworld.com/article/248468/congress_puts_sopa_pipa_on_hold.html
https://mashable.com/2012/01/17/sopa-dangerous-opinion/
https://www.washingtonpost.com/business/technology/sopa-action-delayed/2012/01/20/gIQAFxYhDQ_story.html
https://blog.auctionbytes.com/cgi-bin/blog/blog.pl?/pl/2012/1/1326895607.html
https://craphound.com/images/Super-PIPA-SOPA1.gif
https://theoatmeal.com/sopa https://images.plurk.com/20b2c1b2103a55fceb57d23e259c620c.gif
https://inhabitat.com/wp-content/blogs.dir/1/files/2012/01/SOPA-Blackout-Success-1-537×326.jpg
https://www.buzzfeed.com/mattcherette/25-people-who-thought-sopa-was-about-soap
https://thinkgeek.com/blog/2012/01/feeling-more-productive-yet.html?cpg=tw
https://www.screenshots.com/sopa-pipa/
https://images.plurk.com/f67512b1a83f3939166dedbc6ecb1e20.jpg

The post SOPA Report | FauxShow 73 first appeared on Jupiter Broadcasting.

]]>