IETF – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 21 Jan 2019 15:55:53 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png IETF – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 The ACME Era | TechSNAP 395 https://original.jupiterbroadcasting.net/128941/the-acme-era-techsnap-395/ Mon, 21 Jan 2019 07:54:32 +0000 https://original.jupiterbroadcasting.net/?p=128941 Show Notes: techsnap.systems/395

The post The ACME Era | TechSNAP 395 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/395

The post The ACME Era | TechSNAP 395 first appeared on Jupiter Broadcasting.

]]>
Cleaning up our Mess | TechSNAP 141 https://original.jupiterbroadcasting.net/48322/cleaning-up-our-mess-techsnap-141/ Thu, 19 Dec 2013 17:52:50 +0000 https://original.jupiterbroadcasting.net/?p=48322 In light of recent events some of us have called for greater use of Encryption, but are we too late? Has the Internet already been broken?

The post Cleaning up our Mess | TechSNAP 141 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Target stores suffer a massive breach, we’ll round up everything you need to know. In light of recent events some of us have called for greater use of Encryption, but are we too late? Has the Internet already been broken? We’ll discuss.

Plus a batch of your questions, our answers, and much more!

Thanks to:


GoDaddy


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

— Show Notes: —

Target PoS systems breached, more than 40 million credit and debit cards may have been compromised

  • “Target confirmed the breach and in a statement said 40 million credit and debit cards were accessed starting the day before Thanksgiving and that hackers had access to the company’s systems until Dec. 15”
  • “According to sources at two different top 10 credit card issuers, the breach extends to nearly all Target locations nationwide, and involves the theft of data stored on the magnetic stripe of cards used at the stores”
  • Because the breach was of the PoS system, the attackers have the full ‘track data’ from the magnetic stripe and could encode that data on blank cards (or gift cards) and use them to make fraudulent purchases
  • If the attackers also managed to capture PIN numbers of debit cards, they could also program new cards in order to make cash withdrawals at ATMs
  • It is not yet clear how the attackers compromised the Point-of-Sales systems
  • Official Statement
  • Additional Coverage
  • Additional Coverage

PHK: We made this mess…

  • Prolific software developer Poul-Henning Kamp (Varnish, FreeBSD, md5crypt) talks about how more encryption is not the answer, how the people who created and use the Internet need to fight politics with politics
  • “And that \”we\” is people like you and me, people who connected computers, people who wrote software, people who ran ISPs, and people who told everybody and their grandmother how great the Internet was. … without thinking it fully through.“ “In particular without fully thinking through what people who are not like us might use the Internet for.”
  • “Any attempt from now on to claw back the privacy which have been illegally removed from our lives, will be met by similar fierce resistance.”
  • “Resistance from the military industrial complex, for whom \”Cyberwar\” and \”Total Situational Awareness\” is the new cash-cow.”
  • “A lot of the \”we\”, are currently arguing that adding more encryption will solve the problem, but they are deceiving nobody but themselves: More encryption only means that more encryption will be broken, backdoored, trojaned or otherwise circumvented .”
  • “If you think you can solve political problems with technical means, you\’re going to fail: Politicians have armies and police forces, you do not.”
  • Also talks about how Jordan Hubbard (founder of the FreeBSD project) accidentically invented spam and warned that it needed to be controlled, as well as other examples of events the presaged the technical problems of the modern Internet

Krebs: RDP and weak passwords still a huge problem

  • “Businesses spend billions of dollars annually on software and hardware to block external cyberattacks, but a shocking number of these same organizations shoot themselves in the foot by poking gaping holes in their digital defenses and then advertising those vulnerabilities to attackers”
  • Many servers have remote administration tools enabled, like SSH or in the case of Windows servers, RDP
  • Just like the constant barrage of attacks against an SSH server, RDP is also subjected to constant brute force attack, however these servers are often less well defended
  • Worse yet, there are still prolific numbers of servers with easily guessed username/password combinations remote1/Remote1 and sisadmin/sisadmin
  • Krebs profiles a service advertised on cybercrime forums that sells credentials to these compromised servers
  • “Prices range from $3 to $10 based on a variety of qualities, such as the number of CPUs, the operating system version and the PC’s upload and download speeds”
  • Looking at the owners of the IP addresses, Krebs even wrote a little seasonal jingle

Feedback:


Round Up:


The post Cleaning up our Mess | TechSNAP 141 first appeared on Jupiter Broadcasting.

]]>
Exploit Brokers | TechSNAP 119 https://original.jupiterbroadcasting.net/40537/exploit-brokers-techsnap-119/ Thu, 18 Jul 2013 17:24:48 +0000 https://original.jupiterbroadcasting.net/?p=40537 The business of selling 0day exploits is booming, we’ll explain how this shady market works.

The post Exploit Brokers | TechSNAP 119 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The business of selling 0day exploits is booming, we’ll explain how this shady market works, and how a couple guys turned a Verizon Network Extender into a spy listening post.

A huge batch of your questions…

And much much more, on This week’s TechSNAP!

Thanks to:

Use our code tech249 to score .COM for $2.49!

Get private registration FOR FREE with a .COM! code: free5

 

Visit techsnap.ting.com to save $25 off your device or service credits.

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Yahoo to start recycling disused email addresses, introduces new security feature to prevent abuse

  • Yahoo’s email server has been running for a very very long time
  • As such, many of the best usernames are taken, even though many of them have not been used in a decade
  • So, Yahoo plans to start recycling those addresses that are no longer used
  • The obvious problem with a move like this is that if there are any accounts still tied to this old email address, the new owner can request a password reset to the email address that they now control, and take over that account
  • Yahoo’s Developers have come up with a rather ingenious way to prevent this, although the implementation is dependant on the 3rd party services to implement it (Facebook already has)
  • Yahoo’s mail servers will now respect the non-standard header ‘Require­-Recipient­-Valid­-Since’
  • The idea is that when Facebook sends a password reset email, they include this header with the date that the facebook account was created, if the yahoo email address is NEWER than that date, it may not belong to the same person any more, and yahoo will send a bounce message back to Facebook, rather than delivering the email
  • This prevents someone from acquiring the disused email address and performing the password reset
  • Yahoo has created an IETF Draft specification for this header, if ratified, it will become an internet standard and be added to the IANA Permanent Message Header Field registry
  • It is not yet clear if other services such as Twitter will implement this
  • It seems unlikely that Online Banking and other services will implement this system, so make sure all of your online services have a valid current email address, preferably one you plan to keep for the long term
  • Yahoo Developers Blog

The business of selling 0day exploits is booming

  • There are a number of businesses selling zero day exploits including: Vupen in Montpellier, France; Netragard in Acton, Mass.; Exodus Intelligence in Austin, Tex.; and ReVuln in Malta
  • There is as a Virginia startup called Endgame, apparently involving a former director of the NSA which is doing a lot of undisclosed business with the US Government
  • The USA, Israel, Britain, Russia, India and Brazil spend staggering amounts of money buying these exploits
  • Many other countries including North Korea, a number of Middle Eastern intelligence agencies, Malaysia and Singapore are also in the market
  • These exploits have value both offensively and defensively, if you know the details of a zero day exploit, you can better protect yourself from others who may know about it as well
  • However if you report it to the vendor so it gets patched, you protect everyone, but lose the offensive value
  • The average zero-day exploits goes undetected for 312 days, before it gets used enough that AV vendors notice it and it gets reported and patched
  • Services like Vupen charge $100,000/year for access to their catalogue, with varying prices of the actual exploits
  • Netragard only sells to US clients, and reports that the average flaw now sells from $35,000 to $160,000
  • In years past, rather than selling these flaws to companies like Vupen and ReVuln, who then sell them to governments, security researchers would report them to vendors like Microsoft and Google, just for the recognition and sometimes a t-shirt
  • Many vendors now have bug bounty programs to reward researchers for reporting vulnerabilities, rather than keeping them, using them or selling them
  • To counter this, Microsoft recently raised its bug bounty reward program, now up to $150,000

Feedback:

TechSNAP Bitmessage: BM-GuGEaEtsqQjqgHRAfag5FW33Dy2KHUmZ


Round Up:


The post Exploit Brokers | TechSNAP 119 first appeared on Jupiter Broadcasting.

]]>
Extreme WiFi Makeover | TechSNAP 52 https://original.jupiterbroadcasting.net/18618/extreme-wifi-makeover-techsnap-52/ Thu, 05 Apr 2012 17:40:38 +0000 https://original.jupiterbroadcasting.net/?p=18618 What happens when the Internet Engineering Task Force is faced with unreliable hotel WiFi? And details on backdoor built into AT&T’s Microcell’s back door!

The post Extreme WiFi Makeover | TechSNAP 52 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Find out what happens when the Internet Engineering Task Force is faced with unreliable hotel WiFi

And we’ve got the details on backdoor built into AT&T’s Microcell’s back door. Yep the back door, has a back door.

Plus some viewer feedback, and a war story straight from the headlines!

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Limited time offer: $5.99 .coms, up to 5 domains! just use our code 599com7

Want to save money on your entire order? Use our code spring7 and save 15%!

 

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Support the Show:

Show Notes:

Researchers disassemble an AT&T microcell and find that even AT&T’s backdoors have backdoors

  • A microcell is a small consumer device that increases the signal strength of your mobile connection be acting as a miniature cell tower in your house, using your broadband internet connection to connect back to the telco via a secure IPSEC tunnel
  • The device is fairly complex and includes two System-on-Chips (one Ralink, the other picoChip), a Xilinx FPGA, radio hardware and a GPS module. GPS is used both for radio timing and for determining the position of the box. The box is only ‘allowed’ to work when within the area nominally serviced by AT&T.
  • The device includes a nice little tamper-detection mechanism which uses a set of 6 possible jumpers (3 of which are marked in purple on the above photo) to detect when someone removes the covers. The specific jumper-settings are supposedly unique per device. However researches believe they have worked around this.
  • After opening the device, researchers were able to locate the serial console for the Ralink device fairly quickly.
  • At boot time, the device spews a lot of information, and allows you to interrupt the boot process by pressing a number to select a ‘bootloader shell’. The bootloader is u-boot.
  • Using the u-boot ‘md’ (memory display) command, we were able to dump the Ralink’s flash memory over the serial connection
    +The Ralink SoC runs a 2.6.21 linux kernel. The kernel contains an lzma-compressed initramfs, which is the root filesystem for the device. It is mounted rw, but changes don’t persist between reboots
  • The system includes users for ssh and root, both of which have the same password. The password is non-dictionary, but after around 5 days of average processing, we were able to determine the password. This allows us to log-in to the device at the serial console
  • Topping it all is the ‘wizard’: It turns out that wizard is quite the magician. Its main trick is to provide a full backdoor to the device, allowing for full, remote, unauthenticated, root command execution on the box. You only need to know where to point your netcat 😉
  • It is probably only intended to be used over the secure IPSEC tunnel which the picoChip SoC creates automatically. In other words, the microcell creates a tunnel back ‘home’ to AT&T headquarters, then they connect over this tunnel, and send packets to the wizard. Unfortunately, they set up the wizard to bind on 0.0.0.0 (an alias for all IP addresses), so the backdoor is accessible over the WAN interface, allowing anyone with access to control the device
  • The backdoor uses simple UDP packets to transmit requests and receive responses.
  • There are a number of operations supported, but the most useful one is called ‘BackdoorPacketCmdLine’. Yes. It’s actually called ‘Backdoor’. This command lets you execute any linux command. Execution is performed using the backticksh function.
  • The response packets are sent to a hard-coded UDP address: 234.2.2.7. In order to get around this, we can set up a ‘redirection’ in the iptables firewall running on the box, to make packets which would go to 234.2.2.7 instead go to our own host – allowing us to see the output of the commands we send.
  • Hardware Tear Down

FTC fines RockYou for making claims about user privacy and data security while storing user passwords in plaintext

  • In late 2009 social gaming site RockYou.com was breached and their database of 32 million email address and passwords was leaked online
  • The critical part of this story is that the passwords were stored in plain text, this was one of the largest such breaches of plain text passwords and results in some interesting studies on the patterns people use to select passwords
  • Unlike other breaches such as gawker, where the passwords were insecurely hashed, the analysis extended beyond just weak passwords that could easily have their hashes cracked, the passwords being in plain text meant that every password was exposed, giving researchers more insight into the more secure passwords as well
  • Further exacerbating the issue was the fact that 179,000 of the accounts that were exposed belonged to minors, and were collected in violation of the COPPA laws
  • The site was compromised via a fairly trivial SQL injection
  • the FTC specifically took issue with the security claims on RockYou.com’s website, and as part of the settlement, RockYou.com has been barred from making future deceptive claims about user privacy and data security, must submit to regular 3rd party security audits for the next 20 years, delete all user data illegally collected from minors and pay $250,000 in civil fines
  • Full settlement details
  • Nitpicking: the ZD article ends quite a quote “if you store your customers’ data in plain text, please go encrypt it”. Passwords should NOT be encrypted, encryption is reversible, and requires the same key to encrypt as to decrypt, meaning the system must have to key in order to store new passwords, and that same key can be used to decrypt all passwords, providing almost 0 additional security if that server is compromised. Passwords should always be hashed using a cryptographically secure hashing algorithm, such as a salted SHA256 or Blowfish hash
  • Slashdot coverage of original breach

Feedback:

War Story:

What happens when the IETF (Internet Engineering Task Force) shows up for their conference at your hotel, and your wireless and wired internet is flaking? They fix it for you

Major players in the IETF showed up in Paris last week for the 83rd IETF meeting only to find the hotel’s wifi network almost entire unusable. The wired network was not much better, a situation exacerbated by the fact that the in room TV systems share the data connection.

“I’ve got what looks like a pretty good 802.11 connection, but am seeing about 30% packet loss. It’s really not usable from my room as it is currently performing,” noted attendee Ben Campbell.

“There was no WiFi signal when on the desk in front of the window in my room, but after some experiments, I discovered that the signal was quite good… on the ceiling of the bathroom,” emailed Marc Petit-Huguenin. “I have a Nexus S phone, so I taped it on the ceiling of the bathroom, and used tethering over Bluetooth to bridge the gap to the desk”

The hotel was also having power problems with network equipment of all types above the 27th floor

Attendees negotiated with the hotel and were given access to the network infrastructure, the IETF makeover team made a number of changes, included:

  • Decreasing the AP receiver sensitivity (changing the distance setting from “large” to “small”
  • Increasing the minimum data and multicast rate from 1Mbps to 2Mbps
  • Decreasing the transmit power from 20dBm to 10dBm
  • And, turning off the radios on numerous APs to reduce the RF noise
  • Installing netdisco and rancid and establishing a makeshift NOC to manage the network

(The network appears to have been setup by relative amateurs who assumed that jacking up the radio power would result in stronger connections, and who added too many APs without doing a proper site survey to determine where the APs should be placed)

There were also problems caused by the international spectrum of visitors, different countries allow different RF spectrum, and so some channels that are allowed in France and not allowed in the US, and vise versa.

US Apple Macs won’t associate to WIFI channel 13. This is something that the IETF has argued with Apple about–I believe it should be up to the AP to set the allowed channels and clients should be able to use them. I’m not worried about this in this case–folks should see other channels at acceptable signal strengths, and the Europeans, for example, will get a bit of a speed advantage

Later on, after the situation was less critical and they had time to better understand the existing network and develop a plan, a new scheme was developed:

Each floor now has approximately two access points on each of these four channels, with the channels staggered on adjacent floor. That design maximizes the distance between access points on the same channel. “I hope this will significantly improve the coverage in some rooms that had marginal or no signal while also improving the signal to noise ratio for all,” he said
In addition, he switched a couple of the single-radio Colubris access points on each floor from 2.4 to 5 GHz, which would let at least laptops make use of one of four channels on the much less crowded band.

Round Up:

The post Extreme WiFi Makeover | TechSNAP 52 first appeared on Jupiter Broadcasting.

]]>