DNSCrypt – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Wed, 10 Jul 2019 03:37:09 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png DNSCrypt – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 The Future is Open | LINUX Unplugged 309 https://original.jupiterbroadcasting.net/132656/the-future-is-open-linux-unplugged-309/ Tue, 09 Jul 2019 19:37:09 +0000 https://original.jupiterbroadcasting.net/?p=132656 Show Notes: linuxunplugged.com/309

The post The Future is Open | LINUX Unplugged 309 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxunplugged.com/309

The post The Future is Open | LINUX Unplugged 309 first appeared on Jupiter Broadcasting.

]]>
Zero-Days Of Our Lives | TechSNAP 240 https://original.jupiterbroadcasting.net/90321/zero-days-of-our-lives-techsnap-240/ Thu, 12 Nov 2015 10:22:06 +0000 https://original.jupiterbroadcasting.net/?p=90321 The first remote administration trojan that targets Android, Linux, Mac and Windows. Joomla and vBulletin have major flaws & tips for protecting your online privacy from some very motivated public figures. Plus some great questions, a rockin’ roundup & much, much more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD Video | […]

The post Zero-Days Of Our Lives | TechSNAP 240 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The first remote administration trojan that targets Android, Linux, Mac and Windows. Joomla and vBulletin have major flaws & tips for protecting your online privacy from some very motivated public figures.

Plus some great questions, a rockin’ roundup & much, much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

First remote administration trojan that targets Android, Linux, Mac, and Windows: OmniRat

  • “On Friday, Avast discovered OmniRat, a program similar to DroidJack. DroidJack is a program that facilitates remote spying and recently made news when European law enforcement agencies made arrests and raided the homes of suspects as part of an international malware investigation.”
  • “OmniRat and DroidJack are RATs (remote administration tools) that allow you to gain remote administrative control of any Android device. OmniRat can also give you remote control of any Windows, Linux or Mac device. Remote administrative control means that once the software is installed on the target device, you have full remote control of the device.”
  • “On their website, OmniRat lists all of the things you can do once you have control of an Android, which include: retrieving detailed information about services and processes running on the device, viewing and deleting browsing history, making calls or sending SMS to any number, recording audio, executing commands on the device and more.”
  • “Like DroidJack, OmniRat can be purchased online, but compared to DroidJack, it’s a bargain. Whereas DroidJack costs $210, OmniRat costs only $25 to $50 depending on which device you want to control.”
  • “A custom version of OmniRat is currently being spread via social engineering. A user on a German tech forum, Techboard-online, describes how a RAT was spread to his Android device via SMS. After researching the incident, I have come to the conclusion that a variant of OmniRat is being used.”
  • “The author of the post received an SMS stating an MMS from someone was sent to him (in the example, a German phone number is listed and the SMS was written in German). The SMS goes on to say “This MMS cannot be directly sent to you, due to the Android vulnerability StageFright. Access the MMS within 3 days [Bitly link] with your telephone number and enter the PIN code [code]“. Once the link is opened, a site loads where you are asked to enter the code from the SMS along with your phone number. Once you enter your number and code, an APK, mms-einst8923, is downloaded onto the Android device. The mms-einst8923.apk, once installed, loads a message onto the phone saying that the MMS settings have been successfully modified and loads an icon, labeled “MMS Retrieve” onto the phone.”
  • “The OmniRat APK requires users to accept and give OmniRat access many permissions, including edit text messages, read call logs and contacts, modify or delete the contents of the SD card. All of these permissions may seem evasive and you may be thinking, “Why would anyone give an app so much access?”, but many of the trusted and most downloaded apps on the Google Play Store request many of the same permissions. The key difference is the source of the apps. I always recommend that users read app permissions carefully. However, when an app you are downloading directly from the Google Play Store requests permissions, it is rather unlikely the app is malicious.”
  • “The victim then has no idea their device is being controlled by someone else and that every move they make on the device is being recorded and sent back to a foreign server. Furthermore, once cybercriminals have control over a device’s contact list, they can easily spread the malware to more people. Inside this variant of OmniRat, there is a function to send multiple SMS messages. What makes this especially dangerous is that the SMS spread via OmniRat from the infected device will appear to be from a known and trusted contact of the recipients, making them more likely to follow the link and infect their own device.”
  • Additional Coverage: Softpedia
  • “The Softpedia article about OmniRAT includes a video, but declined to post the tool’s homepage. You can easily find it via a Google search.”

Joomla, one of the most popular web platforms after wordpress, has critical flaw affecting millions of sites

  • “Joomla is a very popular open-source Content Management System (CMS) used by no less than 2,800,000 websites (as of September 2015).”
  • An SQL injection attack was discovered that affects versions 3.2 through 3.4.4
  • “Unrestricted administrative access to a website’s database can cause disastrous effects, ranging from complete theft, loss or corruption of all the data, through obtaining complete remote control of the web server and abusing or repurposing it (for instance, as a host for malicious or criminal content), and ending in infiltration into the internal network of the organization, also-known-as lateral movement.”
  • “3 CVEs has been assigned to the vulnerability – CVE-2015-7297, CVE-2015-7857 and CVE-2015-7858. It has been tested and found working on a number of large websites, representing different business verticals”
  • “We encourage site administrators to update their Joomla installations immediately, deploy a 3rd-party protection product, or at the very least take their site down until a proper solution is found. According to the Verizon 2015 Database Breach Investigation Report, “99.9% of the exploited vulnerabilities were compromised more than a year after the CVE was published” so not patching your system will almost guarantee it will be hacked.”
  • Timeline:
  • Oct 15, 2015 – Disclosure to the Joomla security team
  • Oct 19, 2015 – Vulnerability is acknowledged by Joomla
  • Oct 22, 2015 – Patch released by Joomla
  • Oct 30, 2015 – Disclosure published by PerimeterX
  • It turns out, proper sanitization of the ‘select’ (columns) and ‘limit’ (pagination) parameter was not being done. One of the most obvious and ubiquitous SQL injection vectors.
  • “Using this SQLI we could extract all users, reset password tokens, sessions, and other configuration data stored in the DB. This will ultimately allow an attacker to obtain admin credentials, and therefore control the system’s PHP code using the ‘edit theme’ interface, effectively compromising the entire server.”
  • So I can replace the hash of the admin user with one I know the password for (or just create my own new admin user), as well as extract the hashed passwords of all other users.
  • “This vulnerability is a classic example of how having a too-dynamic code can reflect very severely on security. I expect this disclosure will stir up a hornet’s nest regarding the system’s dynamic nature, and more vulnerabilities exploiting it will be discovered. When you are developing a complex system, keep in mind that although your design is convenient for other developers, it is convenient for vulnerability researchers, too.”

Camgirl OPSEC: How the worlds newest porn stars protection their online privacy

  • Not the type of thing you would normally expect us to cover on TechSNAP, but it turns out, if you want to maintain your privacy online, it helps to take advice from the experts
  • Women already have more crap to deal with online, but camgirls often receive the worst of it
  • “But with modern technology comes modern problems: swatting, doxxing, and the fact that on most sites, there’s a large chat window right by the camgirl’s face, into which anyone with a credit card can say anything.”
  • If people can find out who you are, or where you live, they can do all sorts of nasty things.
  • Most “performers” use an alias, so for them, the first step is to protect their true identity
  • Related to this, they also wish to keep their location secret
  • Some examples of ways your location can be exposed:
    • Pandora, the music streaming service, uses location based advertisements. In this case, they ask for your ZIP code, enter a fake one
    • Many other sites also use location based advertisements, use a VPN to hide your real location
    • “Speaking of VPNs, use one. If you use Skype, there’s Skype Resolvers out there that can show your IP by simply entering a username”
    • “Amazon wishlists reveal your town, which is why people use PO boxes”
  • “People can simply call Amazon/the shipper and find out the address their purchase was sent to if they pry enough. I don’t know what the company policy is for this, but it’s happened”
  • “Camgirl #OpSec tip: I know craft beers are delicious, but they circumscribe your location to a very tight circle.”
  • Make sure photos that you post online do not have GPS or location metadata included
  • Even things as “smalltalk” as the weather, with multiple samples, can give away your location
  • “Also make sure you don’t go to your PO box alone, because someone may be waiting for you there, especially if you publicly reveal your PO box address and/or say specifically when you’ll be going to it”
  • “Google Voice provides fake numbers, so you can use them for texting, or any apps/sites that require a number”
  • “Do not accept gift cards as payments towards your service from random people”, they may be able to track how/where it was spent
  • Use a separate browser for “work” and “personal” internet use, to ensure cookies and logins do not get contaminated
  • Especially things like Facebook and Google that track you all over the internet
  • Avoid creating ‘intersections”, where your two identities can be correlated. Make sure your username doesn’t give it away
  • Consider changing your alias on a regular basis. Balance building a reputation against OPSEC
  • Use strong passwords, and DO NOT reuse passwords for multiple sites, use 2FA whenever possible

Feedback:


Round Up:


The post Zero-Days Of Our Lives | TechSNAP 240 first appeared on Jupiter Broadcasting.

]]>
Docker Shocker | TechSNAP 167 https://original.jupiterbroadcasting.net/60337/docker-shocker-techsnap-167/ Thu, 19 Jun 2014 18:24:07 +0000 https://original.jupiterbroadcasting.net/?p=60337 An exploit that leaves Docker containers leaky, who really owns your email account and one hash algorithm to rule them all. Then it’s a great batch of your questions and much, much more! Thanks to: Direct Download: HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile […]

The post Docker Shocker | TechSNAP 167 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

An exploit that leaves Docker containers leaky, who really owns your email account and one hash algorithm to rule them all.

Then it’s a great batch of your questions and much, much more!

Thanks to:


\"DigitalOcean\"


\"Ting\"


\"iXsystems\"

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

— Show Notes: —

Docker Linux containers spring a security leak

  • A security exploit has surfaced that can allow rogue programs to break out of Docker containers and access files on their host OS.
  • The flaw has been solved in the latest version of the tech.
  • The flaw \”Demonstrates that any given Docker image someone is asking you to run in your Docker setup can access ANY file on your host, e.g. dumping hosts /etc/shadow or other sensitive info, compromising security of the host and any other docker container is on\”
  • \”The proof of concept exploit relies on a kernel capability that allows a process to open any file in the host based on its inode. On most systems, the inode of the / (root) filesystem is 2. With this information and the kernel capability it is possible to walk the host’s filesystem tree until you find the object you wish to open and then extract sensitive information like passwords,\” Docker explained in a blog post published after the flaw came out.
  • \”In earlier Docker Engine releases (pre-Docker Engine 0.12) we dropped a specific list of kernel capabilities, ( a list which did not include this capability), and all other kernel capabilities were available to Docker containers. In Docker Engine 0.12 (and continuing in Docker Engine 1.0) we drop all kernel capabilities by default. Essentially, this changes our use of kernel capabilities from a blacklist to a whitelist.\”
  • \”Please remember, however, that at this time we don\’t claim that Docker Engine out-of-the-box is suitable for containing untrusted programs with root privileges,\”
  • Proof of Concept exploit prints /etc/shadow from the host from within Docker

Generalized Secure Hashing Algorithm

  • Ted Unangst (one of the lead developers of LibreSSL, as well as OpenBSDs secure signing infrastructure and many other things) posted a thought experiment to his blog
  • How would you design an uncrackable password hashing algorithm?
  • Ted’s idea: create a very large number of unique hashing algorithms, or rather, a generalized hashing algorithm that takes a ‘tweaking’ parameters that changes how the hash is generated
  • “Consider a hash function GSHA512, very similar to SHA512, but with slight variations on each of its constants. You could use GSHA512 #42, or GSHA512 #98765, or even GSHA512 #658743092112345678890 if there were enough variants available. 2^512 variants should be enough for anyone.”
  • Now, instead of having to spend a few million on specialized SHA512 cracking hardware, an attacker (the NSA) would have to build 2^512 different specialized cracking chips
  • The results?
  • “Safe to say we’ve defeated custom silicon. Nobody has a fab that can trace out millions of distinct custom circuits per second.”
  • “FPGA is finished too. Assuming you don’t melt it trying, you can’t reprogram an FPGA fast enough.”
  • “GPUs are harder. Without having tried it, my gut tells me you won’t be able to copy out the GSHA code to the GPU fast enough to make it worthwhile.”
    • “An attacker with lots of CPUs can still crack our password, but CPUs are very expensive. What if somebody could fab their own very cheap, very limited CPUs? Like a 100000 core CPU with only just enough cache to implement GSHA? Now we may be in trouble. The transistor count for GSHA is quite low, but they need to be the special high speed general purpose kind of transistor circuit. The scrypt paper notes that a CPU could be cheaper than RAM if stripped of all its extra functionality, but in practice it’s hard to calculate all the tradeoffs.”
    • “This part isn’t very practical The idea is that a cracker would look less like a SHA512 cracker, capable only of performing one hash, and more like a typical CPU, capable of performing many hashes. Requiring the attacker to be adaptable in this way brings their costs in line with our costs. Maybe. Waves hands.”
  • Of course, to defeat custom CPUs, one could just use GSHA512 as the core to something like scrypt, which tries to defeat customer hardware by requiring a lot of memory instead
  • Example Implementation
  • “Don’t use these functions for anything but password hashing. (Don’t use them at all is even sounder advice.)”

Who owns your email account?

  • A user had their Yahoo email account terminated by Yahoo for violation of its terms of service
  • The violation was apparently for flaming another user in the comments thread under Yahoo news articles
  • Since the email address is part of the overall ‘Yahoo Account’, it was terminated
  • Eric Goldman, law professor at Santa Clara University says: \”A cloud service can lock off your assets,\” he adds. \”They may still be your assets from a matter of legal ownership, but if you have no access to them, who cares?\” (Possession is 9/10th of the law?)
  • Microsoft and Google have similar terms, although Google adds: \”If we discontinue a Service, where reasonably possible, we will give you reasonable advance notice and a chance to get information out of that Service\”
  • This is why it is probably best to always use your own domain, that you own it
  • Even if you use gmail or some other service to actually host the mail, if your gmail account gets terminated, you can move your hosting elsewhere and most importantly, your email address does not change
  • There is also the option to host your own email, with a hosting account, VPS or dedicated server
  • In these cases, especially when you do not have multiple servers to provide backup MX, I recommend a service such as: DNSMadeEasy Backup Email Service

Feedback:


Round Up:


The post Docker Shocker | TechSNAP 167 first appeared on Jupiter Broadcasting.

]]>
The Friendly Sandbox | BSD Now 39 https://original.jupiterbroadcasting.net/58472/the-friendly-sandbox-bsd-now-39/ Thu, 29 May 2014 13:26:06 +0000 https://original.jupiterbroadcasting.net/?p=58472 This time on the show we\’ll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now – the […]

The post The Friendly Sandbox | BSD Now 39 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

This time on the show we\’ll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now – the place to B.. SD.

Thanks to:


\"iXsystems\"


\"Tarsnap\"

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

BSDCan 2014 talks and reports


Defend your network and privacy with a VPN and OpenBSD

  • After all the recent news about spying, backdoored routers, deep packet inspection and everything else, you might want to start taking steps at getting some privacy back
  • This article describes how to set up a secure network gateway and VPN using OpenBSD and related crypto utilities
  • There are bits for DHCP, DNS, OpenVPN, DNSCrypt and a watchdog script to make sure your tunnel is always being used
  • You can transparently tunnel all your outbound traffic over the VPN with this configuration, nothing is needed on any of the client systems – this could also be used with Tor (but it would be very slow)
  • It also includes a few general privacy tips, recommended browser extensions, etc
  • The intro to the article is especially great, so give the whole thing a read
  • He mentions our OpenBSD router guide and other tutorials being a big help for this setup, so hello if you\’re watching!

You should try FreeBSD

  • In this blog post, the author talks a bit about how some Linux people aren\’t familiar with the BSDs and how we can take steps to change that
  • He goes into some FreeBSD history specifically, then talks about some of the apparent (and not-so-apparent) differences between the two
  • Possibly the most useful part is how to address the question \”my server already works, why bother switching?\”
  • \”Stackoverflow’s answers assume I have apt-get installed\” ← lol
  • It includes mention of the great documentation, stability, ports, improved security and much more
  • A takeaway quote for would-be Linux switchers: \”I like to compare FreeBSD to a really tidy room where you can find everything with your eyes closed. Once you know where the closets are, it is easy to just grab what you need, even if you have never touched it before\”

OpenBSD and the little Mauritian contributor

  • This is a story about a guy from Mauritius named Logan, one of OpenBSD\’s newest developers
  • Back in 2010, he started sending in patched for OpenBSD\’s \”mg\” editor, among other small things, and eventually added file transfer resume support for SFTP
  • The article talks about his journey from just a guy who submits a patch here and there to joining the developer ranks and even getting his picture taken with Theo at a recent hackathon
  • It really shows how easy it is to get involved with the different BSDs and contribute back to the software ecosystem
  • Congrats to Logan, and hopefully this will inspire more people to start helping out and contributing code back

Interview – Jon Anderson – jonathan@freebsd.org

Capsicum and Casperd


Tutorial

Encrypting DNS lookups


News Roundup

FreeBSD Journal, May 2014 issue

  • The newest issue of the FreeBSD Journal is out, following the bi-monthly release cycle
  • This time the topics include: a letter from the foundation, a ports report, some 9.3-RELEASE plans, an events calendar, an overview of ipfw, exploring network activity with dtrace, an article about kqueue, data distribution with dnssec and finally an article about TCP scaling
  • Pick up your (digital) copy at Amazon, Google Play or on iTunes and have a read

LibreSSL porting update

  • Since the last LibreSSL post we covered, a couple unofficial \”portable\” versions have died off
  • Unfortunately, people still think they can just port LibreSSL to other BSDs and Linux all willy-nilly – stop doing that!
  • This post reiterates that LibreSSL currently relies on a lot of OpenBSD-specific security functions that are not present in other systems, and also gives a very eye-opening example
  • Please wait for an official portable version instead of wasting time with these dime-a-dozen github clones that do more harm than good

BSDMag May 2014 issue is out

  • The usual monthly release from BSDMag, covering a variety of subjects
  • This time around the topics include: managing large development projects using RCS, working with HAMMER FS and PFSes, running MeteorJS on FreeBSD 11, another bhyve article, more GIMP tutorials and a few other things
  • It\’s a free PDF, go grab it

BSDTalk episode 241

  • A new episode of BSDTalk is out, this time with Bob Beck
  • He talks about the OpenBSD foundation\’s recent activities, his own work in the project, some stories about the hardware in Theo\’s basement and a lot more
  • The interview itself isn\’t about LibreSSL at all, but they do touch on it a bit too
  • Really interesting stuff, covers a lot of different topics in a short amount of time

Feedback/Questions


  • All the tutorials are posted in their entirety at bsdnow.tv
  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
  • We\’re looking for new tutorial ideas, so if there\’s something specific you\’d like to learn about, let us know
  • FreeBSD core team elections are in progress – nominations ended today. There are 21 candidates, and voting is open for the next month. We\’ll let you know how it goes in a future episode.
  • Watch live Wednesdays at 2:00PM Eastern (18:00 UTC)

The post The Friendly Sandbox | BSD Now 39 first appeared on Jupiter Broadcasting.

]]>
The Installfest | BSD 19 https://original.jupiterbroadcasting.net/49237/the-installfest-bsd-19/ Fri, 10 Jan 2014 08:37:03 +0000 https://original.jupiterbroadcasting.net/?p=49237 It's the long-awaited "installfest" segment, where we go through the installer of each of the different BSDs.

The post The Installfest | BSD 19 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We\’ve got some special treats for you this week on the show. It\’s the long-awaited \”installfest\” segment, where we go through the installer of each of the different BSDs. Of course we also have your feedback and the latest news as well… and… we even have our very first viewer contest! There\’s a lot to get to today on BSD Now – the place to B.. SD.

Thanks to:


\"iXsystems\"

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

FreeBSD\’s new testing infrastructure

  • A new test suite was added to FreeBSD, with 3 powerful machines available
  • Both -CURRENT and stable/10 have got the test suite build infrastructure in place
  • Designed to help developers test and improve major scalability across huge amounts of CPUs and RAM
  • More details available here
  • Could the iXsystems monster server be involved…?

OpenBSD gets signify

  • At long last, OpenBSD gets support for signed releases!
  • For \”the world\’s most secure OS\” it was very easy to MITM kernel patches, updates, installer isos, everything
  • A commit to the -current tree reveals a new \”signify\” tool is currently being kicked around
  • More details in a blog post from the guy who committed it
  • Quote: \”yeah, briefly, the plan is to sign sets and packages. that\’s still work in progress.\”

Faces of FreeBSD

  • This time they interview Isabell Long, a 19 year old female that\’s involved with FreeBSD
  • She\’s a volunteer staff member on the freenode IRC network
  • In 2011, she participated in the Google Code-In contest and became involved with documentation
  • \”The new committer mentoring process proved very useful and that, plus the accepting community of FreeBSD, are reasons why I stay involved.\”

pkgsrc-2013Q4 branched

  • The quarterly pkgsrc branch from NetBSD is out
  • 13472 total packages for NetBSD-current/amd64 + 13049 binary packages built with clang!
  • Lots of numbers and stats in the announcement
  • pkgsrc works on quite a few different OSes, not just NetBSD
  • See our interview with Amitai Schlair for a bit about pkgsrc

OpenBSD on Google\’s Compute Engine

  • Google Compute Engine is a \”cloud computing\” platform similar to EC2
  • Unfortunately, they only offer poor choices for the OS (Debian and CentOS)
  • Recently it\’s been announced that there is a custom OS option
  • It\’s using a WIP virtio-scsi driver, lots of things still need more work
  • Lots of technical and networking details about the struggles to get OpenBSD working on it

This episode was brought to you by

\"iXsystems


The Installfest

We\’ll be showing you the installer of each of the main BSDs. As of the date this episode airs, we\’re using:
+ FreeBSD 10.0
+ OpenBSD 5.4
+ NetBSD 6.1.2
+ DragonflyBSD 3.6
+ PCBSD 10.0


News Roundup

Building an OpenBSD wireless access point

  • A neat write up we found around the internet about making an OpenBSD wifi router
  • Goes through the process of PXE booting, installing base, using a serial console, setting up networking and wireless
  • Even includes a puffy sticker on the Soekris box at the end, how cute

FreeBSD 4.X jails on 10.0

  • Blog entry from our buddy Michael Lucas
  • For whatever reason (an \”in-house application\”), he needed to run a FreeBSD 4 jail in FreeBSD 10
  • Talks about the options he had: porting software, virtualizing, dealing with slow old hardware
  • He goes through the whole process of making an ancient jail
  • It\’s \”an acceptable trade-off, if it means I don’t have to touch actual PHP code.\”

Unscrewed: a story about OpenBSD

  • Pretty long blog post about how a network admin used OpenBSD to save the day
  • To set the tone, \”It was 5am, and the network was down\”
  • Great war story about replacing expensive routers and networking equipment with cheaper hardware and BSD
  • Mentions a lot of the built in tools and how OpenBSD is great for routers and high security applications

PCBSD weekly digest

  • 10.0-RC3 is out and ready to be tested
  • New detection of ATI Hybrid Graphics, they\’re working on nVidia next
  • Fixed an issue with detecting disk drives that take a LONG time to probe
  • Re-classifying Linux jails as unsupported / experimental (and all 4 people that use them wept)

Feedback/Questions

  • Daniel writes in: https://slexy.org/view/s2uns1hMml
  • Erik writes in: https://slexy.org/view/s2MeJNCCiu
  • SW writes in: https://slexy.org/view/s21fBXkP2K
  • Bostjan writes in: https://slexy.org/view/s20N9bfkum
  • Samuel writes in: https://slexy.org/view/s20FU9wUO5

Contest

  • We\’re going to be having our first viewer contest!
  • We\’ll be giving away a handmade FreeBSD pillow – yes you heard right
  • All you need to do is write a tutorial for the show
  • Submit your BSD tutorial write-ups to feedback@bsdnow.tv
  • If you want to email us your idea first, I can tell you if I already have a tutorial for that topic prewritten for the show in the backlog
  • Check bsdnow.tv/contest for all the rules, details, instructions and a picture of the pillow.

  • All the tutorials are posted in their entirety at bsdnow.tv
  • The OpenBSD router tutorial has gotten some improvements. It now includes an option to encrypt all your DNS lookups, as well as some cool utilities you can use for bandwidth monitoring, performance improvements and other fun router stuff
  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
  • Watch live Wednesdays at 2:00PM Eastern (19:00 UTC)
  • BSD Now got some unintended publicity at the 30th Chaos Communication Congress (1:28:16 – 1:31:00 in the video)

The post The Installfest | BSD 19 first appeared on Jupiter Broadcasting.

]]>
Two Factor Fail | TechSNAP 35 https://original.jupiterbroadcasting.net/14778/two-factor-fail-techsnap-35/ Thu, 08 Dec 2011 20:02:11 +0000 https://original.jupiterbroadcasting.net/?p=14778 Find out how some simple Social Engineering skills can earn you $45k, a drug cartel’s private cell network.

The post Two Factor Fail | TechSNAP 35 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Find out how some simple Social Engineering skills can earn you $45k, a drug cartel’s private cell network.

Plus: Are there better alternative’s to Windows Small Business server?

All that and more, on this week’s TechSNAP!

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Free Private Registration

GoDaddy Offer Code: techsnap17
Link: https://www.godaddy.com/domainaddon/private-registration.aspx?isc=techsnap17

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

   
Subscribe via RSS and iTunes:

   

Show Notes:

Clever criminals defeat two-factor authentication using social engineering attack

  • The criminals accessed the mortgage account of a small business owner and made off with $45,000
  • Normally, sending a large sum of money or otherwise transacting with an account you have not done business with before, prompts the bank to engage its two factor authentication system
  • However the criminals managed to port the victims mobile phone number to their own device, causing them, rather than the victim, to receive the two factor authentication code. With this code in hand, they were able to complete the transfer
  • It seems the criminals made calls to the victims home and workplace, gathering information from him, and his family in order to obtain his mobile phone number, and the basic personal data required by the phone company to verify your identity when porting your phone number (usually only your date of birth)
  • The criminals also sent a text message to the victim, purporting to be his mobile provider, telling him they were having network problems, to try to avoid the victim becoming suspicious when not receiving any incoming calls
  • The victim’s bank has covered the $45,000 loss, as is standard practice for online banking fraud in Australia
  • The banks are seeking legislation giving them access to the telcos live database of number porting activities so they can prevent verification codes from being sent to
    recently ported numbers

New browser cache sniffing attack

  • The new attack allows a website to determine if you have been to specific other websites with a reasonable level of certainty
  • Unlike the older css :visited attacks that levered the browser’s history, the new attack leverages the browser cache. Previous attacks based on this same concept were unreliable because they were destructive, meaning, they caused the url they were probing to be cached, such that if you ran the test twice, it would then return a false positive.
  • The proof of concept creates an iframe pointing to about:blank, then, the javascript changes the source of the iframe to point it to the url it wants to test, If the browser does not instantly return the object from the cache, the source is changed back before navigation can be completed, and a cache miss is recorded. This method allows the script to determine if you have been to the site, without actually loading the site and causing it to be cached.
  • The test does not work against the actual page url, like youtube.com, but rather cachable objects, such as the CSS files or graphical logo of the site, that are generally cached got long periods of time.
  • This means the tool must constantly be updated as the target sites change their designs
  • There is currently no known resolution to this issue, save for disabling caching, however this is very detrimental to your web browsing performance

Mexican government shuts down Zeta’s private communications network

  • The Mexican military has completed an operation to shutdown a communications network along Mexico’s norther border. The network was used by drug runners to communicate and to track government security forces
  • The military confiscated more than 1,400 radios, 2,600 cell phones and other computer equipment
  • The equipment was often painted green and brown to camouflage it
  • The Mexican government says that this will be a severe blow to the drug runners, as they will no longer be able to track the activities of government security forces working against them
  • The estimated value of the equipment was $350,000
  • This raises the question, could a community effort create a private communications network spanning a large metro area that cheaply, and drive business away from the monopolistic telcos

Intel and Micron announce new 20nm 16gb (128 gigabit) NAND flash chips

  • The new smaller die size did not come with a reduction in the expected lifetime of the flash chips, unlike previous die shrinks

  • Intel attributes this to the use of a Hi-K/metal gate design, the first time this process has been used for NAND flash production

  • These new larger chips mean that we can expect to see SSDs with up to 2TB of capacity coming in the near future. IMFT (Intel Micron Flash Technologies) has already started mass producing 64 gigabit versions of the new chips

  • The 64Gbit chips use a page size of 8,192 bytes, whereas the 128Gbit dies will use 16,384 bytes. This means controllers and firmware and OSs will need to be updated to accommodate the new page sizes

  • The 128Gbit chips will also use the new ONFi 3 interface, allowing 333 MegaTransfers/sec instead of the 200 MT/s of ONFi 2


Feedback:

  • Q: EasyBreeze writes: I was wondering what the songs are you play as the themes for the TechSNAP roundup and feedback?

  • A: The intro and outro theme music was composed by Chris, and is a simple combination of a few stock clips. The feedback (Snap) and the round up (Disorganized Fun) are tracks created, and used by with permission from Ronald Jenkees

  • Q: Having worked as an IT Consultant for years on the Windows side of things, I am very well versed in Microsoft technology. What are my options for open source alternatives to a windows small business server.

  • A:

  • Samba 3
    • Can emulate a Windows NT 4 type domain controller
    • Works (barely) with Windows XP, I’ve not tried to do it with Vista or 7
    • Uses OpenLDAP to store the objects
    • Can only be managed using the Windows NT tools (not the tools that come built in to XP)
    • Allan used a system based on this setup to allow users to login to windows machines using the username and password they had created on our website for an Internet Cafe
    • 389 Directory Server (Open Source LDAP)
  • Samba4
    • Can emulates a full windows 2008 domain controller
    • Provides integration with bind 9 for full AD DNS
    • Build in LDAP with AD Schema to store the objects
    • Internal Kerberos server for authentication
  • Both of these are solutions are quite hacky, and really are not great solutions.

  • You can outsource or cloud source things like exchange servers

  • BizSpark licensing

Round Up:

Thanks to the TechSNAP Subreddit!

Holiday Reading:

[asa default]0307269930[/asa]

The post Two Factor Fail | TechSNAP 35 first appeared on Jupiter Broadcasting.

]]>