explained – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Tue, 17 Oct 2017 03:16:49 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png explained – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Doin’ Lines of WiFi | Ask Noah 30 https://original.jupiterbroadcasting.net/119126/doin-lines-of-wifi-ask-noah-30/ Mon, 16 Oct 2017 19:16:49 +0000 https://original.jupiterbroadcasting.net/?p=119126 RSS Feeds: MP3 Feed | HD Video Feed | iTunes Feed Become a supporter on Patreon: — Show Notes: — — The Cliff Notes — RedHat, 5 Billion Goal Krack Attack High DPI in Linux Vox Tel Sys — Stay In Touch — Find all the resources for this show on the Ask Noah Dashboard […]

The post Doin' Lines of WiFi | Ask Noah 30 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

MP3 Feed | HD Video Feed | iTunes Feed

Become a supporter on Patreon:

Patreon

— Show Notes: —

— The Cliff Notes —

— Stay In Touch —

Find all the resources for this show on the Ask Noah Dashboard

Ask Noah Dashboard

Need more help than a radio show can offer? Altispeed provides commercial IT services and they’re excited to offer you a great deal for listening to the Ask Noah Show. Call today and ask about the discount for listeners of the Ask Noah Show!

Altispeed Technologies

Contact Noah

asknoah [at] jupiterbroadcasting.com

— Twitter —

The post Doin' Lines of WiFi | Ask Noah 30 first appeared on Jupiter Broadcasting.

]]>
7 Year Malware | TechSNAP 150 https://original.jupiterbroadcasting.net/51967/7-year-malware-techsnap-150/ Thu, 20 Feb 2014 17:57:45 +0000 https://original.jupiterbroadcasting.net/?p=51967 The Mask, an advanced persistent threat is revealed, a slew of various home router models are actively being exploited, we’ll share the important details.

The post 7 Year Malware | TechSNAP 150 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The Mask, an advanced persistent threat is revealed, a slew of various home router models are actively being exploited, we’ll share the important details.

Plus some routing basics explained, and much much more.

On this week’s TechSNAP

Thanks to:


\"GoDaddy\"


\"Ting\"


\"iXsystems\"

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

— Show Notes: —

Kaspersky discovered “The Mask” APT

  • We got some hints about Careto (also know as “The Mask” or “The Masked APT”) a few weeks ago, and speculation suggested that the unusual native language of the attackers was Korean
  • In an even bigger surprise, it turns out the attackers are Spanish speaking
  • the Spanish-speaking attackers targeted government institutions, energy, oil & gas companies and other high-profile victims via a cross-platform malware toolkit
  • Full Research PDF
  • The APT has been going on since 2007 or earlier
  • “More than 380 unique victims in 31 countries have been observed to date”
  • “What makes “The Mask” special is the complexity of the toolset used by the
    attackers. This includes an extremely sophisticated malware, a rootkit, a bootkit, 32 and 64 bit Windows versions, Mac OS X and Linux versions and possibly versions for Android and iPad/iPhone (Apple iOS)”
  • “The Mask also uses a customized attack against older versions of Kaspersky Lab products to hide in the system, putting them above Duqu in terms of sophistication and making it one of the most advanced threats at the moment. This and several other factors make us believe this could be a nation state sponsored campaign”
  • “When active in a victim system, The Mask can intercept network traffic, keystrokes, Skype conversations, PGP keys, analyse WiFi traffic, fetch all information from Nokia devices, screen captures and monitor all file operations”
  • “The malware collects a large list of documents from the infected system, including encryption keys, VPN configurations, SSH keys and RDP files. There are also several extensions being monitored that we have not been able to identify and could be related to custom military/government level encryption tools”
  • “Overall, we have found exploits for Java, Flash SWF (CVE-2012-0773), as well as malicious plugins for Chrome and Firefox, on Windows, Linux and OS X. The names of the subdirectories give some information about the kind of attack they launch, for instance we can find /jupd where JavaUpdate.jar downloads and executes javaupdt.exe”
  • “CVE-2012-0773 has an interesting history. It was originally discovered by French
    company VUPEN and used to win the “pwn2own” contest in 2012. This was the first
    known exploit to escape the Chrome sandbox. VUPEN refused to share the exploit
    with the contest organizers, claiming that it plans to sell it to its customers”
  • “A Google engineer offered Bekrar (of VUPEN) $60,000 on top of the $60,000 he had already won for the Pwn2Own contest if he would hand over the sandbox exploit and the details so Google could fix the vulnerability. Bekrar declined and joked that he might consider the offer if Google bumped it up to $1 million, but he later told WIRED he wouldn’t hand it over for even $1 million.”
  • This suggests that the threat actor may be a government
  • However, Chaouki Bekrar denies the VUPEN exploit was used
  • “Several attacks against browsers supporting Java have been observed.
    Unfortunately, we weren’t able to retrieve all the components from these attacks, as
    they were no longer available on the server at the time of checking”
  • Also exploits CVE-2011-3544 against Java
  • Additional Coverage

Linksys Router Malware

  • Researchers say they have uncovered an ongoing attack that infects home and small-office wireless routers from Linksys with self-replicating malware, most likely by exploiting a code-execution vulnerability in the device firmware.
  • Johannes B. Ullrich, CTO of the Sans Institute, told Ars he has been able to confirm that the malicious worm has infected around 1,000 Linksys E1000, E1200, and E2400 routers, although the actual number of hijacked devices worldwide could be much higher.
  • A blog post Sans published shortly after this article was posted expanded the range of vulnerable models to virtually the entire Linksys E product line. Once a device is compromised, it scans the Internet for other vulnerable devices to infect.
  • Compromised routers remain infected until they are rebooted. Once the devices are restarted, they appear to return to their normal state. People who are wondering if their device is infected should check for heavy outbound scanning on port 80 and 8080, and inbound connection attempts to miscellaneous ports below 1024.
  • The attack begins with a remote call to the Home Network Administration Protocol (HNAP), an interface that allows ISPs and others to remotely manage home and office routers. The remote function is exposed by a built-in Web server that listens for commands sent over the Internet.
  • Typically, it requires the remote user to enter a valid administrative password before executing commands, although previous bugs in HNAP implementations have left routers vulnerable to attack.
  • After using HNAP to identify vulnerable routers, the worm exploits an authentication bypass vulnerability in a CGI script.
  • Infected devices are highly selective about the IP ranges they will scan when searching for other vulnerable routers. The sample Ullrich obtained listed just 627 blocks of /21 and /24 subnets.
  • The discovery comes a week after researchers in Poland reported an ongoing attack used to steal online banking credentials, in part by modifying home routers\’ DNS settings.
  • The phony domain name resolvers listed in the router settings redirected victims\’ computers, tablets, and smartphones to fraudulent websites masquerading as an authentic bank service; the sites would then steal the victims\’ login credentials.
  • The objective behind this ongoing attack remains unclear. Given that the only observable behavior is to temporarily infect a highly select range of devices, one possible motivation is to test how viable a self-replicating worm can be in targeting routers.
  • Two days after this article was published, Linksys representatives issued the following statement:

Linksys is aware of the malware called “The Moon” that has affected select older Linksys E-Series routers and select older Wireless-N access points and routers. The exploit to bypass the admin authentication used by the worm only works when the Remote Management Access feature is enabled. Linksys ships these products with the Remote Management Access feature turned off by default. Customers who have not enabled the Remote Management Access feature are not susceptible to this specific malware.
+ Additional Coverage Internet Storm Center
+ These are not the only routers that have problems
+ Home Routers pose the biggest threat to consumer security
+ An old backdoor from 2005 was found in brand new Cisco home “Gigabit Security Routers”
+ As the covered last year, 40-50 million routers have uPnP flaw
+ Yesterday, researchers found a stack overflow bug in Linksys WRT120N routers
+ The new protocol that proposes to make “security” easier on the next generation of home routers may cause more harm than good
+ Asus Routers are also vulnerable including the RT-AC66R, RT-AC66U, RT-N66R, RT-N66U, RT-AC56U, RT-N56R, RT-N56U, RT-N14U, RT-N16, and RT-N16R


Feedback:


Round Up:


The post 7 Year Malware | TechSNAP 150 first appeared on Jupiter Broadcasting.

]]>
Dark Mail: A New Hope | LINUX Unplugged 13 https://original.jupiterbroadcasting.net/45892/dark-mail-a-new-hope-lup-13/ Tue, 05 Nov 2013 16:54:15 +0000 https://original.jupiterbroadcasting.net/?p=45892 What is the Dark Mail Alliance? We’ll dig into how it’s more of a protocol, and a hope than an actual product.

The post Dark Mail: A New Hope | LINUX Unplugged 13 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

What is the Dark Mail Alliance? We’ll dig into how it’s more of a protocol, and a hope than an actual product. Now the time to replace email we’ll explain how you can help get the concept kickstarted.

Plus your follow up on upstart vs systemd, a brief SteamOS chat, and more!

Thanks to:

\"Ting\"


\"DigitalOcean\"

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed | WebM Torrent Feed

FU

Dark Mail Explained:

The goal is to cleanup and release the source code that was used to power Lavabit as a f/oss project with support for dark mail added.

Lavabit creator Ladar Levison has launched a Kickstarter campaign for the dark mail encrypted email initiative he\’s working on in partnership with Silent Circle.

The project is looking to raise $196,608 to take the Lavabit source code and turn it into a free and open-source project with the new dark mail protocol.

Mail Sack:

The post Dark Mail: A New Hope | LINUX Unplugged 13 first appeared on Jupiter Broadcasting.

]]>
Bitcoin Explained | TechSNAP 9 https://original.jupiterbroadcasting.net/9276/bitcoin-explained-techsnap-9/ Fri, 10 Jun 2011 07:41:55 +0000 https://original.jupiterbroadcasting.net/?p=9276 We’ll dig into bitcoin and explain what it is, and how it works. Is there a future for this Cryptocurrency?

The post Bitcoin Explained | TechSNAP 9 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We’ll dig into bitcoin and explain what it is, and how it works. Is there a future for this Cryptocurrency?

Plus Sony is in the news again, and its not good… And we talk about a new ruling on how far your bank has to go to protect you from cyber criminals.

Please send in more questions so we can continue doing the Q&A section every week! techsnap@jupiterbroadcasting.com


Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

[ad#shownotes]

Show Notes:



Topic: Sony hacked yet again

  • Lulzsec has compromised a few more Sony properties in the last week
  • at 11 a.m. EST on June 6, Lulzsec leaked the source code to the Sony PSN Developers Network
  • This could allow people to find more flaws with the Sony system very quickly
  • This also opens up the possibility of a ‘private’ version of the PSN network, allowing owners of hacked playstations to get the benefits of a number of PSN services without cost or worrying about being identified.
  • The fact that Lulzsec was able to access the source code also opens up the possibility that they could have made changes to the code, allowing all sorts of mayhem (unlocking paid content for everyone, or damaging the users by streaming all credit card transactions offsite somewhere)
  • Lulzsec also uses an SQL injection attack against Sony Pictures, and was able to export 150,000 records from a database of more than 4.5 million records
  • SQL injection attacks are very common, with the number that have been successfully executed against Sony in the last 2 months, one would expect that would have made efforts to repair some of their software
  • One apparent member of Lulzsec, Robert Cavanaugh, was taken in to custody by the FBI. Lulzsec claims he is not a member.
  • Lulzsec also compromised a Nintendo server and published it’s configuration file as proof. No corporate or customer data was taken.
  • Lulzsec has also started going after sites affiliated with the FBI
  • In addition, Lulzsec has taken responsibility for compromising Fox TV, and publishing a list of X-Factor contestants.

Topic: RSA Admits SecurID tokens compromised

  • RSA is expected to have to replace all 40 million tokens that are in use world wide
  • Popular users of RSA SecurID Tokens: The Pentagon, Lockheed Martin and other military contractors, World of Warcraft, PayPal/eBay, major account holders at some banks

Topic: US Court ruling to define ‘Reasonable Security’

  • An ongoing court battle is nearing an end, the final ruling will likely determine the standard for how much commercials banks must do to protect their customers from cyber thieves.
  • The case stems from an incident where a construction company that used online banking to do it’s payroll, had it’s PC compromised with the ZeuS trojan. The botnet operators managed to siphon $588,000 out of the companies account using a series of ACH transfers over the course of 7 days.
  • The Bank managed to recover $243,406 of the funds, leaving the contractor on the hook for the remaining $345,445
  • The bank had recently changed its policies to require users to answer one of their security questions for each transaction. This change actually made it easier for the botnet operators to capture the answers to these questions, which allowed them to initiate their own transfers
  • Guidelines established in 2005 by the Federal Financial Institutions Examination Council (FFIEC) require two-factor authentication
  • The bank claims it was doing two factor authentication by checking the username/password (something you know) and a ‘device id’ (something you have). The device ID appears to have been nothing more than the browser string, which is easily faked, or in this case, circumvented by the ZeuS trojan, which users the victims own browsers on their own PC to initiate the fraudulent transfers.

Topic: Bit Coin farmers raided by police for suspected pot farm

  • A local law allowed the police to get a warranty for any property that used more than an average amount of electricity each month

Topic: What is bitcoin?

Bitcoin is a digital currency created in 2009 by Satoshi Nakamoto. It is also the name of the open source software designed in order to use this currency.
Bitcoin is one of the first implementations of a concept called cryptocurrency, which was first described in 1998 by Wei Dai on the cypherpunks mailing list.

Building upon the notion that money is any object, or any sort of record, accepted as payment for goods and services and repayment of debts in a given country or socio-economic context, Bitcoin is designed around the idea of using cryptography to control the creation and transfer of money, rather than relying on central authorities.

Great video: https://www.weusecoins.com/
Ars Technica also has a great write up.

Isn’t it just a fake vaporware currency?

  • It’s already valued at $200 million USD.
  • There are various definitions of success here. Bitcoin may always see value as simply serious competition to PayPal.
  • Bitcoin’s value is as “fake” as the dollar, or many other things we as a people agree to collectively assign value to.

Ugh.. Another virtual money? Linden dollars, Xbox Points, Atari Credits, ENOUGH!!

  • bitcoin goes beyond just another online “virtual dollar”.
  • It’s distributed P2P nature means no single controlling interest can shutdown your account, or refuse a transaction, or charge a transfer fee.
  • No single controlling party can impact the value of the bitcoin.
  • Bitcoin could have the potential to unify everything to a single online currency.
  • Users value would move with them between games/services. This is more critical to those with limited funds to spend on these types of services/games.
  • Mining bitcoins gives advantages that level the playing field to those who otherwise can not economically participate in the common up-sale environments found with online gaming and services.

What are the REAL issues?

One pool to rule them all?
deepbit.net: If too much of the network power goes to one pool, don’t we just create a single point of failure? MANY in the bitcoin community are very worried about deepbit.net aproaching 50% of the mining power of the network. Many are calling/asking for miners to switch to new pools to balance things out.

Hashrate Distribution:

Comparison of mining pools

What about the Exchange?
Mt. Gox is the #1 way to get cash into Bitcoin, if this site were taken down by the gov, or something else, it would be a massive blow to the value of bitcoin.

What happens if Mt. Gox goes down?

What is next?

More places* need to accept bitcoin, this is starting to happen more and more:

*The online porn industry could really win big here. Bitcoin for porn could be huge. Anonymous money, that can be generated via your GPU.

Legal Battles:
US senitors seek crackdown of Bitcoin and could possibly try to target Mt. Gox

Safley transfer bitcoin between parties with escrow?

Bitcoin for a little fun?

Bitcoin Poker Room
Chris’ captured footage of the live poker stream

How to Mine & Get Started with Bitcoin:

Is it worth it? Use this: Bitcoin Mining Calculator
Check out Nean’s guide in the Colony

Download any of these bitcoin miners:

How to get started with GPU Mining with bitcoin:
Mining hardware comparison
Ubuntu Natty Narwhal 11.04 Mining Guide / HOWTO
Profit Calculator

Buy them:
Trade bitcoins IRL
Mt Gox
#bitcoin-otc marketplace – Currently the best way to buy bitcoin with PayPal.

How can bitcoin help business like JB?

Donate some coins: 1CirPhywbP9qNEL1CH8dTMPiqSfY1SmV4m

Community pooling, with a network “fee” that goes to support the network. The community mines for each other, and the network. Fans helping fans.

Bitcoin Javascript page, easy mining to help the network –

  • Could less reputable sites hide/embed this JS code to steal your CPU cycles? YES.
  • Could it become a way to replace Ads on a site? Maybe…

Follow Chris’ always up-to-date obsession feed with bitcoin!

Want to know more about bitcoin?

Download & Comment:

The post Bitcoin Explained | TechSNAP 9 first appeared on Jupiter Broadcasting.

]]>