colo – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Wed, 27 Jun 2018 16:00:57 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png colo – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 What You Need to Know about WPA3 | Ask Noah Show 73 https://original.jupiterbroadcasting.net/125741/what-you-need-to-know-about-wpa3-ask-noah-show-73/ Wed, 27 Jun 2018 08:00:57 +0000 https://original.jupiterbroadcasting.net/?p=125741 Show Notes: podcast.asknoahshow.com/73

The post What You Need to Know about WPA3 | Ask Noah Show 73 first appeared on Jupiter Broadcasting.

]]>

Show Notes: podcast.asknoahshow.com/73

The post What You Need to Know about WPA3 | Ask Noah Show 73 first appeared on Jupiter Broadcasting.

]]>
PIS Poor DNS | TechSNAP 268 https://original.jupiterbroadcasting.net/100021/pis-poor-dns-techsnap-268/ Thu, 26 May 2016 17:32:03 +0000 https://original.jupiterbroadcasting.net/?p=100021 Is the “Dark Cloud” hype, or a real technology? Using DNS tunneling for remote command and control & the big problem with 1-Day exploits. Plus your great question, our answers, a breaking news roundup & more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD Video | Mobile Video | MP3 Audio | […]

The post PIS Poor DNS | TechSNAP 268 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Is the “Dark Cloud” hype, or a real technology? Using DNS tunneling for remote command and control & the big problem with 1-Day exploits.

Plus your great question, our answers, a breaking news roundup & more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

APT Groups still successfully exploiting Microsoft Office flaw patched 6 months ago

  • “A Microsoft Office vulnerability patched six months ago continues to be a valuable tool for APT gangs operating primarily in Southeast Asia and the Far East.”
  • “CVE-2015-2545 is a vulnerability discovered in 2015 and corrected with Microsoft’s update MS15-099. The vulnerability affects Microsoft Office versions 2007 SP3, 2010 SP2, 2013 SP1 and 2013 RT SP1.”
  • “The error enables an attacker to execute arbitrary code using a specially crafted EPS image file. The exploit uses PostScript and can evade Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) protection methods.”
  • One of the groups using the exploit targeted the Japanese military industrial complex
  • “In December 2015, Kaspersky Lab became aware of a targeted attack against the Japanese defense sector. In order to infect victims, the attacker sent an email with an attached DOCX file exploiting the CVE-2015-2545 vulnerability in Microsoft Office using an embedded EPS (Encapsulated Postscript) object. The EPS object contained a shellcode that dropped and loaded a 32-bit or 64-bit DLL file depending on the system architecture. This, in turn exploited another vulnerability to elevate privileges to Local System (CVE-2015-1701) and download additional malware components from the C&C server.”
  • “The C&C server used in the attack was located in Japan and appears to have been compromised. However, there is no indication that it has ever been used for any other malicious purpose. Monitoring of the server activity for a period of several months did not result in any new findings. We believe the attackers either lost access to the server or realized that it resulted in too much attention from security researchers, as the attack was widely discussed by the Japanese security community.”
  • The report details a number of different teams, with different targets
  • Some or all of the teams may be related
  • “The attackers used at least one known 1-day exploit: the exploit for CVE-2015-2545 – EPS parsing vulnerability in EPSIMP32.FLT module, reported by FireEye, and patched by Microsoft on 8 September 2015 with MS15-099. We are currently aware of about four different variants of the exploit. The original one was used in August 2015 against targets in India by the Platinum (TwoForOne) APT group.”
  • Kaspersky Lab Report

Krebs investigates the “Dark Cloud”

  • “Crooks who peddle stolen credit cards on the Internet face a constant challenge: Keeping their shops online and reachable in the face of meddling from law enforcement officials, security firms, researchers and vigilantes.”
  • “In this post, we’ll examine a large collection of hacked computers around the world that currently serves as a criminal cloud hosting environment for a variety of cybercrime operations, from sending spam to hosting malicious software and stolen credit card shops.”
  • How do you keep your site online while hosting it on hacked machines you do not control
  • How do you keep the data secure? Who is going to pay for stolen credit cards when they can just hack one of the compromised machines hosting your site?
  • “I first became aware of this botnet, which I’ve been referring to as the “Dark Cloud” for want of a better term, after hearing from Noah Dunker, director of security labs at Kansas City-based vendor RiskAnalytics. Dunker reached out after watching a Youtube video I posted that featured some existing and historic credit card fraud sites. He asked what I knew about one of the carding sites in the video: A fraud shop called “Uncle Sam,” whose home page pictures a pointing Uncle Sam saying “I want YOU to swipe.””
  • “I confessed that I knew little of this shop other than its existence, and asked why he was so interested in this particular crime store. Dunker showed me how the Uncle Sam card shop and at least four others were hosted by the same Dark Cloud, and how the system changed the Internet address of each Web site roughly every three minutes. The entire robot network, or “botnet,” consisted of thousands of hacked home computers spread across virtually every time zone in the world, he said.”
  • So, most of these hacked machines are likely just “repeaters”, accepting connections from end users and then relaying those connections back to the secret central server
  • This also works fairly well as a DDoS mitigation mechanism
  • “the Windows-based malware that powers the botnet assigns infected hosts different roles, depending on the victim machine’s strengths or weaknesses: More powerful systems might be used as DNS servers, while infected systems behind home routers may be infected with a “reverse proxy,” which lets the attackers control the system remotely”
  • “It’s unclear whether this botnet is being used by more than one individual or group. The variety of crimeware campaigns that RiskAnalytics has tracked operated through the network suggests that it may be rented out to multiple different cybercrooks. Still, other clues suggests the whole thing may have been orchestrated by the same gang.”
  • A more indepth report on the botnet is expected next week
  • “If you liked this story, check out this piece about another carding forum called Joker’s Stash, which also uses a unique communications system to keep itself online and reachable to all comers.”

Wekby APT gang using DNS tunneling for C&C

  • “Palo Alto Networks is reporting a shift in malware tactics used by the APT group Wekby that has added a rare but effective new tool to its bag of tricks. Wekby attackers are turning to the technique known as DNS tunneling in lieu of more conventional HTTP delivery of command and controls for remote access control of infected computer networks.”
  • “Wekby is a group that has been active for a number of years, targeting various industries such as healthcare, telecommunications, aerospace, defense, and high tech. The group is known to leverage recently released exploits very shortly after those exploits are available, such as in the case of HackingTeam’s Flash zero-day exploit.”
  • “The malware used by the Wekby group has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism. Additionally, it uses various obfuscation techniques to thwart researchers during analysis. Based on metadata seen in the discussed samples, Palo Alto Networks has named this malware family ‘pisloader’.”
  • “The initial dropper contains very simple code that is responsible for setting persistence via the Run registry key, and dropping and executing an embedded Windows executable. Limited obfuscation was encountered, where the authors split up strings into smaller sub-strings and used ‘strcpy’ and ‘strcat’ calls to re-build them prior to use. They also used this same technique to generate garbage strings that are never used. This is likely to deter detection and analysis of the sample.”
  • “The payload is heavily obfuscated using a return-oriented programming (ROP) technique, as well as a number of garbage assembly instructions. In the example below, code highlighted in red essentially serves no purpose other than to deter reverse-engineering of the sample. This code can be treated as garbage and ignored. The entirety of the function is highlighted in green, where two function offsets are pushed to the stack, followed by a return instruction. This return instruction will point code execution first at the null function, which in turn will point code execution to the ‘next_function’. This technique is used throughout the runtime of the payload, making static analysis difficult.”
  • “The malware is actually quite simplistic once the obfuscation and garbage code is ignored. It will begin by generating a random 10-byte alpha-numeric header. The remaining data is base32-encoded, with padding removed. This data will be used to populate a subdomain that will be used in a subsequent DNS request for a TXT record.”
  • “The use of DNS as a C2 protocol has historically not been widely adopted by malware authors.”
  • “The use of DNS as a C2 allows pisloader to bypass certain security products that may not be inspecting this traffic correctly.”
  • “The C2 server will respond with a TXT record that is encoded similar to the initial request. In the response, the first byte is ignored, and the remaining data is base32-encoded. An example of this can be found below.”
  • The Malware also looks for specific flags in the DNS response, to prevent it being spoofed by a DNS server not run by the authors. Palo Alto Networks has reverse engineered the malware and found the special flags
  • The following commands, and their descriptions are supported by the malware:
    • sifo – Collect victim system information
    • drive – List drives on victim machine
    • list – List file information for provided directory
    • upload – Upload a file to the victim machine
    • open – Spawn a command shell
  • “The Wekby group continues to target various high profile organizations using sophisticated malware. The pisloader malware family uses various novel techniques, such as using DNS as a C2 protocol, as well as making use of return-oriented programming and other anti-analysis tactics.”
  • Palo Alto Networks Report

Feedback:


Round up:


The post PIS Poor DNS | TechSNAP 268 first appeared on Jupiter Broadcasting.

]]>
Baby Got Backend | CR 73 https://original.jupiterbroadcasting.net/45412/baby-got-backend-cr-73/ Mon, 28 Oct 2013 11:18:30 +0000 https://original.jupiterbroadcasting.net/?p=45412 From backups to deployment, we go back to the backend! The new solutions giving us the opportunity to reconsider the infrastructure around our projects.

The post Baby Got Backend | CR 73 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

From backups to deployment, we go back to the backend! The new solutions giving us the opportunity to reconsider the infrastructure around our projects.

Plus gearing up for 64bit development, and much more.

Thanks to:


\"GoDaddy\"


\"Ting\"

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

Feedback

Announcement Recap

With the A7 chip, the iPad Air offers twice the CPU and graphics performance of the previous iPad. The 64-bit architecture supports Open GL ES version 3.0, for \”game console-like visual effects.\”

A nearer-term reason the Apple A7 might appeal to programmers has nothing to do with its 64-bit nature: the ARMv8 architecture itself brings some real advantages.

One of them is a larger number of registers — tiny on-chip storage areas where the processor stores data for very fast access. ARMv8 roughly doubles general-purpose registers from 16 to 31, which means the chip needn\’t fritter away as many cycles swapping things into and out of memory.

Backing up

We\’re joined by two gentlemen from dotCloud, the folks behind Docker. We chat about what Docker is best at, how far out the 1.0 release is, the projects use of Go, the future of Docker, and much more.

Docker is an open-source project to easily create lightweight, portable, self-sufficient containers from any application.

The same container that a developer builds and tests on a laptop can run at scale, in production, on VMs, bare metal

Docker is an open-source engine that automates the deployment of any application as a lightweight, portable,
self-sufficient container that will run virtually anywhere.

Docker containers can encapsulate any payload, and will run consistently on and between virtually any server. The same
container that a developer builds and tests on a laptop will run at scale, in production*, on VMs,
bare-metal servers, OpenStack clusters, public instances, or combinations of the above.

The post Baby Got Backend | CR 73 first appeared on Jupiter Broadcasting.

]]>
Callback Coders | CR 22 https://original.jupiterbroadcasting.net/27006/callback-coders-cr-22/ Mon, 05 Nov 2012 11:39:15 +0000 https://original.jupiterbroadcasting.net/?p=27006 We discuss if developers get trapped callback hell, the role of Javascript on the desktop, Android’s birthday, Windows 8’s potential, and the Ubuntu SDK!

The post Callback Coders | CR 22 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We discuss if developers get trapped in callback hell, the role of Javascript on the desktop, Android’s birthday, Windows 8’s potential, and the Ubuntu SDK!

Plus a batch of your feedback and much more!

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

Show Notes:

Feedback

  • Mike is still alive. Score!
  • Brandon shares that in his experience colos can be very expensive.
  • Jason is striking out on his own but doesn’t know where to find clients.
  • Zane would like to know what resources I recommend for learning the basic of designs for a developer.
  • Ben would like to know if Chris has a different VM for each client.

This Week’s Dev World Hoopla

El Ocho

  • My MS.Cheese() has been moved!
  • Language++
  • The future of C#
  • The future of JS on MS

Book of the Week

[asa]1449320104[/asa]

Follow the show

The post Callback Coders | CR 22 first appeared on Jupiter Broadcasting.

]]>