ICANN – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Fri, 21 Oct 2016 07:27:55 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png ICANN – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Long Broken SSL History | TechSNAP 289 https://original.jupiterbroadcasting.net/104096/long-broken-ssl-history-techsnap-289/ Thu, 20 Oct 2016 23:26:01 +0000 https://original.jupiterbroadcasting.net/?p=104096 RSS Feeds: HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Spreading the DDoS Disease and Selling the Cure Krebs has done some more digging into DDoS for hire businesses “Earlier this month a hacker released […]

The post Long Broken SSL History | TechSNAP 289 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Spreading the DDoS Disease and Selling the Cure

  • Krebs has done some more digging into DDoS for hire businesses
  • “Earlier this month a hacker released the source code for Mirai, a malware strain that was used to launch a historically large 620 Gbps denial-of-service attack against this site in September. That attack came in apparent retribution for a story here which directly preceded the arrest of two Israeli men for allegedly running an online attack for hire service called vDOS. Turns out, the site where the Mirai source code was leaked had some very interesting things in common with the place vDOS called home.”
  • “The domain name where the Mirai source code was originally placed for download — santasbigcandycane[dot]cx — is registered at the same domain name registrar that was used to register the now-defunct DDoS-for-hire service vdos-s[dot]com”
  • “Normally, this would not be remarkable, since most domain registrars have thousands or millions of domains in their stable. But in this case it is interesting mainly because the registrar used by both domains — a company called namecentral.com — has apparently been used to register just 38 domains since its inception by its current owner in 2012, according to a historic WHOIS records gathered by domaintools.com (for the full list see this PDF).”
  • That is highly unusual, the cost of ICANN accreditation ($3,500, plus $4,000/year) makes this seem unlikely
  • “What’s more, a cursory look at the other domains registered via namecentral.com since then reveals a number of other DDoS-for-hire services, also known as “booter” or “stresser” services.”
  • vDoS, before it was taken down by authorities thanks to Krebs, was hacked, and its user database and history were posted online. From this data, Krebs was able to gather a list of other DDoS for Hire services, that were just reselling the vDoS service, using its API to launch attacks on behalf of their own customers
  • “And a number of those vDOS resellers were registered through Namecentral, including 83144692[dot].com — a DDoS-for-hire service marketed at Chinese customers. Another Namecentral domain — vstress.net — also was a vDOS reseller.”
  • “Other DDoS-for-hire domains registered through Namecentral include xboot[dot]net, xr8edstresser[dot]com, snowstresser[dot]com, ezstress[dot]com, exilestress[dot]com, diamondstresser[dot]net, dd0s[dot]pw, rebelsecurity[dot]net, and beststressers[dot]com.”
  • So, it seems a lot of these might have actually been the same company, just with many faces
  • “Namecentral’s current owner is a 19-year-old California man by the name of Jesse Wu. Responding to questions emailed from KrebsOnSecurity, Wu said Namecentral’s policy on abuse was inspired by Cloudflare, the DDoS protection company that guards Namecentral and most of the above-mentioned DDoS-for-hire sites from attacks of the very kind they sell.”
  • When asked about why the registrar had so few domains: Wu: “Like most other registrars, we register domains only as a value added service,” he replied via email. “We have more domains than that (not willing to say exactly how many) but primarily we make our money on our website/ddos protection/ecommerce protection.”
  • Wu: “We have a policy inspired by Cloudflare’s similar policy that we ourselves will remain content-neutral and in the support of an open Internet, we will almost never remove a registration or stop providing services, and furthermore we’ll take any effort to ensure that registrations cannot be influenced by anyone besides the actual registrant making a change themselves – even if such website makes us uncomfortable,” Wu said. “However, as a US based company, we are held to US laws, and so if we receive a valid court issued order to stop providing services to a client, or to turn over/disable a domain, we would happily comply with such order.”
  • “Taking a page from Cloudflare, indeed. I’ve long taken Cloudflare to task for granting DDoS protection for countless DDoS-for-hire services, to no avail. I’ve maintained that Cloudflare has a blatant conflict of interest here, and that the DDoS-for-hire industry would quickly blast itself into oblivion because the proprietors of these attack services like nothing more than to turn their attack cannons on each other. Cloudflare has steadfastly maintained that picking and choosing who gets to use their network is a slippery slope that it will not venture toward.”
  • “Although Mr. Wu says he had nothing to do with the domains registered through Namecentral, public records filed elsewhere raise serious unanswered questions about that claim.”
  • Krebs found a paper trail linking a number of the DDoS for Hire services to Thomas McGonagall, who at one point is also listed as the directory of “Namecentral LTD”
  • “Now we were getting somewhere. Turns out, Wu isn’t really in the domain registrar business — not for the money, anyway. The real money, as his response suggests, is in selling DDoS protection against the very DDoS-for-hire services he is courting with his domain registration service.”
  • But then Krebs caught Wu in a lie
  • “That other company —SIMPLIFYNT LTD — was registered by Mr. McGonagall on October 29, 2014. Turns out, almost the exact same information included in the original Web site registration records for Jesse Wu’s purchase of Namecentral.com was used for the domain simplifynt.com, which also was registered on Oct. 29, 2014. I initially missed this domain because it was not registered through Namecentral. If someone had phished Mr. Wu in this case, they had been very quick to the punch indeed.”
  • “In the simplyfynt.com domain registration records, Jesse Wu gave his email address as jesse@jjdev.ru. That domain is no longer online, but a cached copy of it at archive.org shows that it was once a Web development business. That cached page lists yet another contact email address: sales@jjdevelopments.org. I ordered a reverse WHOIS lookup from domaintools.com on all historic Web site registration records that included the domain “jjdevelopments.org” anywhere in the records. The search returned 15 other domains, including several more apparent DDoS-for-hire domains such as twbooter69.com, twbooter3.com, ratemyddos.com and desoboot.com.”
  • “Among the oldest and most innocuous of those 15 domains was maplemystery.com, a fan site for a massively multiplayer online role-playing game (MMORPG) called Maple Story. Another historic record lookup ordered from domaintools.com shows that maplemystery.com was originally registered in 2009 to a “Denny Ng.” As it happens, Denny Ng is listed as the co-owner of the $1.6 million Walnut, Calif. home where Jesse until very recently lived with his mom Cindy Wu (Jesse is now a student at the University of California, San Diego).”
  • Then there is another person, that uses Namecentral
  • “Another domain of interest that was secured via Namecentral is datawagon.net. Registered by 19-year-old Christopher J. “CJ” Sculti Jr., Datawagon also bills itself as a DDoS mitigation firm. It appears Mr. Sculti built his DDoS protection empire out of his parents’ $2.6 million home in Rye, NY. He’s now a student at Clemson University, according to his Facebook page.”
  • Krebs talked to this person back in 2015 about their cybersquatting suit with Dominos Pizza, and when Sculti didn’t like what Krebs wrote about him, he started DDoS’ing Krebs’ skype account and website.
  • “Last year, Sculti formed a company in Florida along with a self-avowed spammer. Perhaps unsurprisingly, anti-spam group Spamhaus soon listed virtually all of Datawagon’s Internet address space as sources of spam.”
  • “Are either Mr. Wu or Mr. Sculti behind the Mirai botnet attacks? I cannot say. But I’d be willing to bet money that one or both of them knows who is. In any case, it would appear that both men may have hit upon a very lucrative business model. More to come.”
  • DDoS Protection services, with connections to DDoS for Hire services, sounds an aweful lot like racketeering to me

The VeraCrypt Audit Results

  • “The QuarksLab audit of VeraCrypt has been completed, and this is the public release of the results”
  • The quick and dirty:
  • VeraCrypt 1.18 and its bootloaders were evaluated. This release included a number of new features including non-western developed encryption options, a boot loader that supports UEFI (modern BIOSes), and more. QuarksLab found:
  • 8 Critical Vulnerabilities
  • 3 Medium Vulnerabilities
  • 15 Low or Informational Vulnerabilities / Concerns
  • “This public disclosure of these vulnerabilities coincides with the release of VeraCrypt 1.19 which fixes the vast majority of these high priority concerns. Some of these issues have not been fixed due to high complexity for the proposed fixes, but workarounds have been presented in the documentation for VeraCrypt.”
  • “VeraCrypt is much safer after this audit, and the fixes applied to the software mean that the world is safer when using this software.”
  • “I’d also like to extend a special thank you to Fred, Jean-Baptiste, and Marion at QuarksLab for conducting this audit, to Mounir at Idrix for his enthusiastic participation and continued development of this crucial open-source software, and to VikingVPN and DuckDuckGo and all of our individual donors for the funding to make this audit possible. We have all made the digital world a little bit safer for all of us.”
  • “This report describes the results of the security assessment of VeraCrypt 1.18 made by Quarkslab between Aug. 16 and Sep. 14, 2016 and funded by OSTIF. Two Quarkslab engineers worked on this audit, for a total of 32 man-days of study.”
  • The audit followed two lines of work:
  • The analysis of the fixes introduced in VeraCrypt after the results of the Open Crypto Audit Project’s audit of TrueCrypt 7.1a have been published.
    • The assessment of VeraCrypt’s features that were not present in TrueCrypt.
  • “VeraCrypt is a hard to maintain project. Deep knowledge of several operating systems, of the Windows kernel, of the system boot chain and good concepts in cryptography are required. The improvements made by IDRIX demonstrate the possession of these skills.”
  • “Vulnerabilities which require substantial modifications of the code or the architecture of
    the project have not been fixed. These include:”
  • TC_IOCTL_OPEN_TEST multiple issues (need to change the application behavior)
  • EncryptDataUnits() lacks error handling (need to design a new logic to retrieve
    errors)
  • AES implementation susceptible to cache-timing attacks (need to fully rewrite the AES implementations)
  • “Vulnerabilities leading to incompatibilities with TrueCrypt, as the ones related to cryptographic mechanisms, have not been fixed. Most notable are:”
  • Keyfile mixing is not cryptographically sound
  • Unauthenticated ciphertext in volume headers.
  • “Among the problems found during the audit, some must be corrected quickly:”
  • The availability of GOST 28147-89, a symmetric block cipher with a 64-bit block size, is an issue. This algorithm must not be used in this context.
  • Compression libraries are outdated or poorly written. They must be updated or replaced
  • If the system is encrypted, the boot password (in UEFI mode) or its length (in legacy mode) could be retrieved by an attacker
  • “Finally, the UEFI loader is not mature yet. However, its use has not been found to cause security problems from a cryptographic point of view”
  • The full assessment PDF is on the website linked at the top of this story
  • With the original authors not around to sue anyone, it seems this Apache 2 licensed fork will continue, and might not be a bad choice for those that need to encrypt files across OSes

SSL/TLS and PKI History

  • “A comprehensive history of the most important events that shaped the SSL/TLS and PKI ecosystem. Based on Bulletproof SSL and TLS, by Ivan Ristić”
  • It starts in November of 1994: “Netscape develops SSL v2, an encryption protocol designed to support the Web as a hot new commerce platform. This first secure protocol version shipped in Netscape Navigator 1.1 in March 1995.”
  • A year later: “SSL v2 is shot down because of serious security issues. Consequently, Netscape scrambles to release SSLv3. This protocol seems good enough for now and the golden era of the Web begins. The specification was eventually published as RFC 6101”
  • So, we knew SSLv2 was bad, in 1995… why was it still in use in 2015?
  • January 1999: “In 1996, an IETF working group is formed to standardize SSL. Even though the resulting protocol is almost identical to SSL v3, the process takes 3 years. TLS v1.0 is published as RFC 2246. Microsoft forces the change of protocol name to Transport Layer Security (TLS), creating a confusion that continues to this day.”
  • January 2001: “Someone calls VeriSign claiming to be from Microsoft, pays $400, and gets away with two code-signing certificates. The certificates have no special powers, but the owner name is misleading and potentially dangerous.”
  • April 2006: “A new version of the TLS protocol is released as RFC 4346. This version addresses the BEAST attack, but it will be 5 years before the world realizes.”
  • June 2007: “In the early days, CAs are strict about identify verification before certificate issuance. Eventually, some CAs realise that they can get away with less work and domain-validated (DV) certificates are born. To restore the balance, Extended Validation (EV) certificates are designed as a way of guaranteeing a connection between a domain name and a real-life business entity.”
  • It used to require a lot of money ($100s or $1000s), a lot of paperwork, and a reasonable amount of time to get an SSL certificate. Eventually DV certificates meant anyone could get a cert for $9 a year. So the CAs came up with a way to charge $100s again.
  • May 2008: “It is discovered that a catastrophic programming error had been introduced to Debian in September 2006, becoming part of the official release in April 2007. All private keys generated on vulnerable systems were insecure.”
  • August 2008: “A new version of TLS is released as RFC 5246, although hardly anyone notices. A major new feature in this version is authenticated (AEAD) encryption, which removes the need for streaming and block ciphers (and thus the inherently vulnerable CBC mode).”
  • July 2009: “SSL Labs launches to build better tools for secure server assessment and research how SSL/TLS and PKI are used in practice.”
  • March 2011: “The IETF attempts to formally deprecate SSL v2 by publishing RFC 6176. According to SSL Labs, 54% HTTPS servers supported this obsolete protocol version in 2011.”
  • August 2011: DigiNotar
  • July 2012: “After their success with EV certificates, the CA/Browser Forum publishes Baseline Requirements to standardise issuance of all certificates.”
  • May 2013: “Edward Snowden releases thousands of classified NSA documents to selected journalists, changing the public’s perspective of the Internet forever. We eventually realise the extent of passive monitoring of plaintext communication.”
  • August 2013: “Work on TLS 1.3 begins. Although TLS 1.2 seems good enough for now, it’s clear that it can’t support the next few decades of Internet evolution. Thus, work on the next-generation encryption protocol begins.”
  • January 2014: “At the beginning of 2014, 1024-bit RSA keys for subscriber certificates are retired; 2048-bit RSA certificates become the new minimum. Weak intermediate and root keys remain in use.”
  • April 2014: “A critical vulnerability in OpenSSL, a very widely used TLS library, is discovered. If exploited, Heartbleed enables attackers to retrieve process memory from vulnerable servers, often resulting in private key compromise. Because of tremendous hype associated with the attack, most public servers fix the vulnerability practically overnight. A long tail of vulnerable devices remains, though. Heartbleed’s biggest contribution is showing the world how severely underfunded the OpenSSL project was in its 20 years of existence. In the following months, large organisations start contributing to the project and a big cleanup begins.”
  • February 2015: “The IETF publishes RFC 7465 to formally prohibit usage of the weak but ever-popular RC4 cipher.”
  • November 2015: “Let’s Encrypt is launched to provide free certificates with automated issuance. It is widely expected that this new non-profit CA will further drive down the price of DV certificates and encourage similar programs from other, more established CAs. However, it is their focus on automated issuance that excites, allowing all infrastructure to be protected.”
  • January 2016: “CAs are no longer allowed to issue public SHA1 certificates. The key word here is “public”. Some CAs continue to issue SHA1 certificates from roots that are not trusted by modern browsers, but continue to be trusted by older devices.”
  • February 2016: “Previous versions of SSL and TLS were either rushed (SSL v2 and SSL v3) or maintenance efforts (TLS v1.0-v1.2). With TLS v1.3, the working group is taking a different approach; after more than two years in development, a workshop is held to carefully analyse the new designs.”
  • The timeline extends into the future
  • January 2017: Browsers will stop accepting all SHA1 certificates
  • July 2018: “From July 2018, PCI-compliant merchants must not support TLS 1.0. Originally, this date was intended to be in July 2016, but that was not realistic because of too many users relying on obsolete technology that doesn’t support modern protocols.”

Feedback:


Round Up:


The post Long Broken SSL History | TechSNAP 289 first appeared on Jupiter Broadcasting.

]]>
WHOIS Hiding | TechSNAP 129 https://original.jupiterbroadcasting.net/43687/whois-hiding-techsnap-129/ Thu, 26 Sep 2013 08:35:11 +0000 https://original.jupiterbroadcasting.net/?p=43687 Big changes could be coming to the WHOIS database in the name of privacy, but security experts have major concerns.

The post WHOIS Hiding | TechSNAP 129 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Big changes could be coming to the WHOIS database in the name of privacy, but security experts have major concerns.

Plus our suggestions for rolling your own server, a huge batch of questions, and much much more!

On this week’s TechSNAP.

Thanks to:


\"GoDaddy\"


\"Ting\"

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

— Show Notes: —

WHOIS Privacy Plan Draws Fire

  • Internet regulators are pushing a controversial plan to restrict public access to WHOIS Web site registration records. Proponents of the proposal say it would improve the accuracy of WHOIS data and better protect the privacy of people who register domain names.
  • According to an interim report (PDF) by the ICANN working group, the WHOIS data would be accessible only to \”authenticated requestors that are held accountable for appropriate use\” of the information.

  • The working group’s current plan envisions creating what it calls an “aggregated registration directory service” (ARDS) to serve as a clearinghouse that contains a non-authoritative copy of all of the collected data elements.

  • The registrars and registries that operate the hundreds of different generic top-level domains (gTLDs, like dot-biz, dot-name, e.g.) would be responsible for maintaining the authoritative sources of WHOIS data for domains in their gTLDs.
  • Those who wish to query WHOIS domain registration data from the system would have to apply for access credentials to the ARDS, which would be responsible for handling data accuracy complaints, auditing access to the system to minimize abuse, and managing the licensing arrangement for access to the WHOIS data.
  • The interim proposal has met with a swell of opposition from some security and technology experts who worry about the plan\’s potential for harm to consumers and cybercrime investigators.

\”Internet users (individuals, businesses, law enforcement, governments, journalists and others) should not be subject to barriers — including prior authorization, disclosure obligations, payment of fees, etc. — in order to gain access to information about who operates a website, with the exception of legitimate privacy protection services,\” reads a letter (PDF) jointly submitted to ICANN last month by G2 Web Services, OpSec Security, LegitScript and DomainTools.

  • Kerbs says: the working group’s interim report leaves open in my mind the question of how exactly the ARDS would achieve more accurate and complete WHOIS records. Current accreditation agreements that registrars/registries must sign with ICANN already require the registrars/registries to validate WHOIS data and to correct inaccurate records, but these contracts have long been shown to be ineffective at producing much more accurate records.

WeChat security found to be lax, your password is at risk

  • The WeChat Android client has an undocumented debugging interface that can be accessed by other apps on your Android device
  • This interface allows an attacker to intercept all data flowing through the WeChat application, including your username and hashed password
  • The password is only hashed with straight md5, making it trivial to brute force or rainbow table
  • “In WeChat versions up to 4.3.5 we identified several vulnerabilities which allow an attacker who can intercept the traffic to quickly decrypt the message body, thus being able to access the messages sent and received by the user. More recent versions seems to be immune to these attacks, but we still have to perform a more in-depth analysis of the encryption scheme implemented in the latest WeChat releases. “
  • The local SQLite database used by WeChat is encrypted, but the key is a derived from the WeChat uid and the local DeviceID, meaning an attacker with access to this debug interface has access to both parameters
  • “We tried to contact developers to notify our findings, but with no luck: we wrote an e-mail to Tencent technical support both on August 30th and on September 3th, but we got no reply.”

DRAM prices still being driven up by plant fire

  • As TechSNAP reported previously, there was a chemical explosion and fire at the SK Hynix plant in Wuxi China on September 4th
  • SK Hynix is attempting to rush repairs to the damaged fab, and has reopened the remaining fab at the Wuxi site on September 7th. The two fabs are isolated to prevent a problem at one from crippling the other
  • SK Hynix is also shifting some production to other plants in Korea
  • However the expected shortage has still driven DRAM prices up 27 percent
  • The Wuxi plant makes approximately 10% of the worlds supply of DRAM
  • SK Hynix expects the plant to be back at full capacity sometime in October
  • Full repairs will take between three months and six months and reduce total output by two months’ worth of production
  • Even once the repaired plant is online, SK Hynix plans to ram up production beyond the previous levels as well as maintain the increased production in Korea
  • SK Hynix will also ramp up production in stages as portions of the damaged plant are cleaned and repaired to match what analysts expect will be a spike in demand for PC-oriented chips as the Oct. 18 ship date of Windows 8.1 approaches, analysts said.

Feedback:

Build your own Google Reader replacement, or check out one of the hosted options. Will run down the list of the candidates we think have the best potential to replace Google Reader on Linux.

Round Up:

The post WHOIS Hiding | TechSNAP 129 first appeared on Jupiter Broadcasting.

]]>
Exploits for Sale | TechSNAP 50 https://original.jupiterbroadcasting.net/18177/exploits-for-sale-techsnap-50/ Thu, 22 Mar 2012 16:39:34 +0000 https://original.jupiterbroadcasting.net/?p=18177 Does your government use taxpayer money to buy exploits from the open market? We’ll share the details, malware is being spread via Skype, and more!

The post Exploits for Sale | TechSNAP 50 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Does your government use taxpayer money to buy exploits from the open market? We’ll share the details, malware is being spread via Skype, and we’ve got great news for VLC users!

And why you might be logged in as Kenneth today

All that and much more, on this week’s TechSNAP.

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Super special savings for TechSNAP viewers only. Get a .co domain for only $7.99 (regular $29.99, previously $17.99). Use the GoDaddy Promo Code cofeb8 before the end of March to secure your own .co domain name for the same price as a .com.

Private Registration use code: march8

Pick your code and save:
cofeb8: .co domain for $7.99
techsnap7: $7.99 .com
techsnap10: 10% off
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans

   

 

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

Support the Show:

Show Notes:

French Security Firm Vupen discovers and collects zero day exploits then sells them to intelligence agencies

  • At Google’s recent hack-a-thon, they offered $60,000 for each bug in Chrome that hackers disclosed to them, so that they would fix them
  • Vupen (whose name stands for “vulnerability research” and “penetration testing”) was at the conference, and had an exploit for Chrome, however they said “We wouldn’t share this with Google for even $1 million, We don’t want to give them any knowledge that can help them in fixing this exploit or other similar exploits. We want to keep this for our customers.”
  • Vupen claims to only sell to NATO governments and their partners and that they have a strict policy of only dealing with democratic governments, however they admits that their exploits could fall into the wrong hands
  • Many make analogies of Vupen as a Cyber Warfare Arms Dealer
  • The problem with selling weapons is that they can then be transferred to other parties, a situation illustrated last year when telecom surveillance gear from Blue Coat Systems was sold to a United Arab Emirates firm but ended up being used to tracking political dissidents in Syria
  • Governments pay a $100,000/year subscription for access to the catalogue of zero day exploits
  • Each individual exploit must be purchased separately and is not sold exclusively, meaning that the other Vupen customers have access to it as well
  • Vupen claims to have off the self undisclosed vulnerabilities in Micro­soft Word, Adobe Reader, Google’s ­Android, Apple’s iOS and every major browser
  • Most exploits sell for far in excess of the 6 figure subscription you pay just to find out about their existence
  • When Vupen started in 2008 the company and its researchers initially worked with some software vendors to patch the flaws. However after taking $1.5 million in venture capital from 360 Capital Partners and Gant & Partners, the firm found that it could earn far more by keeping its findings under wraps and selling them at a premium

Anti-dissident Malware spread via Skype in Syria

  • Hackers loyal to the government of Syria have taken to spreading malware to dissidents via Skype
  • The tool that purports to allow you to change your MAC address to better hide your identity and avoid detection by the government, is actually a standard RAT trojan, and gives the attacks full control over your system, including keylogging and access to your documents
  • The trojan connects to a command and control server in Syria hosted in an IP range belonging to the Government Owned Syrian Telecommunications Establishment
  • Other malware also distributed via skype chats carries a facebook icon, but installs a different malware variant
  • The attackers seem to be using Skype as a method of social engineering and tricking users in to running the files, they do not appear to have exploited Skype in any way.

First ever trans-arctic fibre lines will be installed this summer

  • The cables are called Artic Fibre and Arctic Link and will cross the Canadian Northwest Passage. A third cable, ROTACS (Russian Optical Trans-Arctic Submarine Cable System), will skirt the north coast of Scandinavia and Russia.
  • The completed cables are estimated to cost between $600 million and $1.5 billion each
  • The new cables will reduce the internet latency between London, England and Tokyo, Japan from the current average of 230 ms by approximately 60ms (30%) to 170ms
  • The reduced latency will benefit financial markets and automated trading as well as increasing the available bandwidth
  • These new fibres will also offer much needed redundancy, currently all fibre between Europe and Asia goes through choke points in the Middle East or the Luzon Strait between the Philippine and South China seas

Feedback:

Q: (Bilbo) How does HLS (HTTP Live Streaming) work?
A: ScaleEngine has offered an HLS stream for JupiterBroadcasting for quite some time, but HLS was only implemented by Apple’s iOS at the time. Since then, some Android 3.x and all Android 4.x devices have added support for the protocol. This week, version 2.0.1 of VLC was released which fixed the last remaining bug that prevented the stream from working. It is now possible to watch the live stream reliably from your desktop via VLC, as well as from most mobile devices and tablets. Unlike the original VLC stream we offered, which used the RTSP protocol, the HLS stream is much smoother. RTSP used separate connections for audio and video, which could cause them to get out of sync, and RTSP was notorious for working poorly through NAT.

And HLS stream relies on a process called packetization, where the live video stream is divided into separate small files, called segments. The default segment size is 10 seconds. So in an HLS stream, the first request to our server returns a playlist, detailing the different streams that are offered (if multiple bit rates are offered, if there is an audio only version, etc). Your device then creates a session and requests the appropriate stream playlist. This playlist will contain the most recent segments of the live stream, and look something like this:

#EXTM3U
#EXT-X-ALLOW-CACHE:NO
#EXT-X-TARGETDURATION:3
#EXT-X-MEDIA-SEQUENCE:698
#EXTINF:3,
media_698.ts?wowzasessionid=418744583
#EXTINF:3,
media_699.ts?wowzasessionid=418744583
#EXTINF:3,
media_700.ts?wowzasessionid=418744583

As you can see here, the playlist contains 3 segments, each 3 seconds long. Your client will start by requesting the first, and continue requesting each segment on the playlist (the number of segments on the playlist is adjustable server side). Once your client has requested all of the segments on the last playlist, it will request the next playlist, which will contain new segments.

Your player will start playing as soon as the first segment is ready, and will continue adding new segments to the end of the buffer as it plays, attempting to keep up or ahead of the playback.

This effect can be best demonstrated by the VLC debugging output:

info: HTTP Live Streaming (videocdn-us.geocdn.scaleengine.net:1935/jblive-iphone/live/jblive.stream/playlist.m3u8)
info: Meta playlist
info: Live Playlist HLS protocol version: 1
info: Choose segment 0/3 (sequence=774)
info: downloaded segment 774 from stream 0
info: downloaded segment 775 from stream 0
info: playing segment 774 from stream 0
info: downloaded segment 776 from stream 0
info: playing segment 775 from stream 0
info: Reloading HLS live meta playlist
info: Live Playlist HLS protocol version: 1
info: updating hls stream (program-id=1, bandwidth=875507) has 3 segments
info: – segment 777 appended
info: downloaded segment 777 from stream 0
info: playing segment 776 from stream 0
info: Reloading HLS live meta playlist
info: updating hls stream (program-id=1, bandwidth=875507) has 3 segments
info: – segment 778 appended
info: downloaded segment 778 from stream 0
info: Reloading HLS live meta playlist
info: Live Playlist HLS protocol version: 1
info: updating hls stream (program-id=1, bandwidth=875507) has 3 segments
info: Reloading HLS live meta playlist
info: Live Playlist HLS protocol version: 1
info: updating hls stream (program-id=1, bandwidth=875507) has 3 segments
info: playing segment 777 from stream 0
info: Reloading HLS live meta playlist
info: Live Playlist HLS protocol version: 1
info: updating hls stream (program-id=1, bandwidth=875507) has 3 segments
info: – segment 779 appended
info: downloaded segment 779 from stream 0

< snip >

info: Live Playlist HLS protocol version: 1
info: updating hls stream (program-id=1, bandwidth=875507) has 3 segments
info: – segment 784 appended
info: playing segment 783 from stream 0
info: downloaded segment 784 from stream 0
info: Reloading HLS live meta playlist
info: Live Playlist HLS protocol version: 1
info: updating hls stream (program-id=1, bandwidth=875507) has 3 segments
info: – segment 785 appended
info: downloaded segment 785 from stream 0
info: playing segment 784 from stream 0

We are sysadmins @ reddit. Ask us anything! Best of:

Round Up:

The post Exploits for Sale | TechSNAP 50 first appeared on Jupiter Broadcasting.

]]> Amazon’s Secrets | TechSNAP 49 https://original.jupiterbroadcasting.net/18002/amazons-secrets-techsnap-49/ Thu, 15 Mar 2012 18:35:54 +0000 https://original.jupiterbroadcasting.net/?p=18002 Secrets about Amazon’s EC2 back-end have been revealed, and we’ll share them with you, and important details on a critical Microsoft patch.

The post Amazon’s Secrets | TechSNAP 49 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Microsoft has released an extremely critical patch, the race against hackers has begun. We’ll give you the details on this important update.

Secrets about Amazon’s EC2 back-end have been revealed, and we’ll share them with you.

Plus, this week’s war story is a real pisser, urine for a treat!

All that and more, on this week’s TechSNAP!

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Super special savings for TechSNAP viewers only. Get a .co domain for only $7.99 (regular $29.99, previously $17.99). Use the GoDaddy Promo Code cofeb8 before the end of March to secure your own .co domain name for the same price as a .com.

Private Registration use code: march8

Pick your code and save:
cofeb8: .co domain for $7.99
techsnap7: $7.99 .com
techsnap10: 10% off
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans

   

 

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

Support the Show:

   

Show Notes:

Microsoft releases patch for RDP vulnerability, recommends everyone patch immediately

  • Microsoft has released a major security update to fix two critical vulnerabilities in the Remote Desktop Protocol (formerly Terminal Services), CVE–2012–0002 and CVE–2012–0152
  • The first vulnerability is to do with the way RDP accesses memory that has been improperly initialized or deleted, and allows an attacker to send specially crafted packets to the RDP service and cause attacker supplied code to be executed on your machine, this means the attacker can install a trojan, add full privileged users, access or modify data, and otherwise take over your machine
  • The second vulnerability is a denial of service vulnerability in the way RDP processes packets, where an attacker who exploits the vulnerability can cause the RDP service to stop responding, thereby locking the all RDP users out of the machine
  • The vulnerability affects every version of windows, and Microsoft has released patches for all supported versions of Windows (Windows XP SP3, XP x64 SP2, Vista SP2, Windows 7 SP1, Server 2003 SP2, Server 2008 SP2, Server 2008 R2 SP1, Server 2003/2008/2008R2 for Itanium, and all ‘Core’ versions of Windows Server). Windows 8 Developer Preview is also affected.
  • Official Microsoft Security Bulletin MS12–020
  • List of March updates
  • The Race for MS12–020

Amazon AWS powered by nearly half a million servers

  • Just like Google and others, Amazon does not publish details about their infrastructure, however researches have made an educated guess that Amazon has no fewer than 454,400 servers spread between its 7 data center regions
  • Based on estimates generated by analyzing IP address space utilization, Amazon has approximately 5000 racks full of servers in the various data centers that make up the US-EAST region, representing over 70% of all Amazon Cloud capacity
  • By contrast, it is estimate that the most expensive US-WEST location in Oregon has only 40–50 Racks, which are known to be deployed in containers
  • The article contains more details about the estimate methodology and some contrary evidence
  • Amazon data center size
  • Amazon suffers multiple outages over the past week. March 10: 57 minutes, March 15: 20 minutes TarSNAP creator
    *

    Are multiword pass phrases actually more secure?

  • Is it better to use am easier to remember multi-word pass phrase, or a random string?
  • Research in to the topic has been spurred by the simple fact that auto-complete of dictionary words would simply entering multi-word pass phrases on mobile devices
  • Research in to the advantages of multi-word pass phrases covers some analysis of how users choose random phrases and how they can introduce weakness in to their passwords. The research focuses on data provided from the now defuncted Amazon PayPhrase
  • Research from Cambridge University suggests multi-word pass phrases still vulnerable to dictionary attacks
  • Coverage from Bruce Schneier
  • “even 5-word phrases would be highly insecure against offline attacks, with fewer than 30 bits of work compromising over half of users”
  • Using a sentence makes the password more predictable, it is better to use random words

Feedback:

Reminder: BSDCan is in Ottawa May 11th and 12th at the University of Ottawa
Talks will include:
+ Unified Deployment and Configuration Management
+ Virtually-Networked FreeBSD Jails
+ pfSense 2.1: IPv6 and more
+ Intro to DNSSEC
+ Crowdsourcing security
+ Fast reboots with kload
+ Optimizing ZFS for Block Storage
+ and the BSD-A

War Story:

At one point in my tech support career I managed to get myself transferred onto “Mobiles Gold” which was basically laptop support for corporate customers like Insurance companies. It was a more prestigious position but turned out to have less call volume and when a call did come in, I was only required to work out if the problem was hardware or software. Hardware issues were sent to service sites and software issues were sent to onsite technicians for replacements while reloads were done. Too simple, too boring and I frequently found myself listening to calls from people around me to stay amused.

Thanks to my lack of work at one point I picked up on the following call:

Agent: Ok Sir, when did you first notice that the keyboard on your Aptiva (desktop PC) has stopped working?

User: Eh, it was this mornin’ right after breakfast.

Agent: Have you changed any software or hardware settings recently?

User: I don’t think so. It was working fine last night but today it does nothing.

Agent: Would you happen to have another keyboard in the house that we could try instead?

User: Well, now that I think about it, I might have one in the garage. I’ll be right back,

At this point, the agent started typing up the case in the ticketing tool to save time later but was interrupted by a woman’s voice on the phone.

Woman: Uh, hello? Is anybody there?

Agent: Yes, I’m with IBM Tech Support Ma’am. I’m waiting for the man who called to return.

User: Ok, that’s my husband. Is his computer thingy not working no more?

Agent: No Ma’am. The keyboard appears to be faulty.

Woman: Well, that might be my fault. Since my husband bought that damn computer he’s been paying less and less attention to me. We had a big set to after dinner last night and when he stormed off in his truck….I peed on his keyboard!

Agent: Thank you for that Ma’am, that will definetely help me with diagnosing the problem.

Woman: That’s good. I hope it helps.

Over the next few minutes, the agent had time to think of how to approach this issue with the user and had a devious look on his face before long.

User: Hi there, you were right. The other keyboard works perfectly. Can you send me out a replacement keyboard?

Agent: Yes sir, that won’t be a problem. I just need your credit card details first.

User: Why do you need my credit card details. This computer is only a month old!

Agent: Because I need to bill you for the replacement as your warranty does not cover urination.

I’m sure there was more after that but I was too busy rolling around on the floor laughing to have heard any of it.


Round-Up:

The post Amazon’s Secrets | TechSNAP 49 first appeared on Jupiter Broadcasting.

]]>