monitor – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 22 Feb 2016 02:48:45 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png monitor – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Subscription Lock-in | CR 169 https://original.jupiterbroadcasting.net/87291/subscription-lock-in-cr-169/ Fri, 04 Sep 2015 09:56:45 +0000 https://original.jupiterbroadcasting.net/?p=87291 With Mike’s move to Florida in progress he joins us via phone for a run through of the major JetBrains subscription hoopla, transitioning from a tester to a developer & that big poaching scandal comes to an expensive close! Thanks to: Get Paid to Write for DigitalOcean Direct Download: MP3 Audio | OGG Audio | […]

The post Subscription Lock-in | CR 169 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

With Mike’s move to Florida in progress he joins us via phone for a run through of the major JetBrains subscription hoopla, transitioning from a tester to a developer & that big poaching scandal comes to an expensive close!

Thanks to:


Linux Academy


DigitalOcean

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

Become a supporter on Patreon:

Foo

Show Notes:

Hoopla

How I went from a tester to a developer role

Yesterday’s big news, at least for many developers, is that JetBrains – maker of popular tools like IntelliJ and ReSharper – is moving to a software-as-a-service subscription model for their products.

Previously, buying a JetBrains product got you a perpetual license and a year of upgrades. Once the license expired, any software you had received under that license would continue to work, but you would need to buy another license to get further upgrades. It was a simple model that worked just fine for many people, and most customers upgraded every year.

Starting November 2, though, that all stops. After that date, JetBrains will no longer sell these perpetual licenses. Instead, you can rent access to their software on a month-by-month basis.

As of November 2, 2015, we will introduce JetBrains Toolbox—a collection of our popular desktop tools (IDEs, utilities and extensions) available on a monthly or yearly subscription basis. With JetBrains Toolbox, you can pick and choose one or more tools that best suit your current needs, or go for the ‘All products’ plan that comes with special savings. You decide what to put in your Toolbox and for how long.

My indie (personal) IntelliJ purchase was $100/year. Now it’s $120/year (except for the first-year upgrade hook of $10 off) and it now turns off after each year.

Don’t Build a Billion-Dollar Business. Really.

Apple, Google, and other tech giants will pay $415 million in poaching scandal settlement

Feedback

The post Subscription Lock-in | CR 169 first appeared on Jupiter Broadcasting.

]]>
Lenovo smells Superfishy | Tech Talk Today 136 https://original.jupiterbroadcasting.net/77647/lenovo-smells-superfishy-tech-talk-today-136/ Thu, 19 Feb 2015 10:49:59 +0000 https://original.jupiterbroadcasting.net/?p=77647 Lenovo has shipped PCs with man-in-the-middle adware that breaks HTTPS connections. We’ll go into the details & this discuss if this is a deal breaker for our panel. A great article points out its not just Samsung that’s listening to you & an unboxing and first impressions of the $70 WinBook TW700 tablet. Direct Download: […]

The post Lenovo smells Superfishy | Tech Talk Today 136 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Lenovo has shipped PCs with man-in-the-middle adware that breaks HTTPS connections. We’ll go into the details & this discuss if this is a deal breaker for our panel.

A great article points out its not just Samsung that’s listening to you & an unboxing and first impressions of the $70 WinBook TW700 tablet.

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

Lenovo PCs ship with man-in-the-middle adware that breaks HTTPS connections [Updated] | Ars Technica

Lenovo is selling computers that come preinstalled with adware that hijacks encrypted Web sessions and may make users vulnerable to HTTPS man-in-the-middle attacks that are trivial for attackers to carry out, security researchers said.

The critical threat is present on Lenovo PCs that have adware from a company called Superfish installed. As unsavory as many people find software that injects ads into Web pages, there’s something much more nefarious about the Superfish package. It installs a self-signed root HTTPS certificate that can intercept encrypted traffic for every website a user visits. When a user visits an HTTPS site, the site certificate is signed and controlled by Superfish and falsely represents itself as the official website certificate.

It’s not just Samsung TVs — lots of other gadgets are spying on you — Fusion

But Samsung’s televisions are far from the only seeing-and-listening devices coming into our lives. If we’re going to freak out about a Samsung TV that listens in on our living rooms, we should also be panicking about a number of other emergent gadgets that capture voice and visual data in many of the same ways.

Revealed: The experts Apple hired to build an electric car | 9to5Mac

In the last few weeks we’ve heard about a poaching war between Apple and Tesla, a couple hires by Apple from the auto industry, and a whole lot of speculation followed by reports that Apple has a team of hundreds working on an electric vehicle. But who exactly is working on the project at Apple?

Winbook TW700 Tablet – Windows 8.1 with full-size USB port, IPS Display, and one year of FREE Microsoft Office 365

  • HD IPS Display
  • Bluetooth/Wifi
  • 2 USB Ports – 1 full size, 1 micro.2 Megapixel front and back camera
  • MicroHDMI port and MicroSD slot
  • Includes One year of Office 365 – for your TW700 AND a PC or Mac

Ubuntu on the Winbook TW700

I recently stopped by Houston’s new MicroCenter (they recently moved into a new store), and walked out of the store with their WinBook TW700 tablet for about $40. This tablet is built around Intel’s Bay Trail Atom architecture, sporting a 1.33GHz quad core Atom processor, Windows 8.1, and a free (1) year subscription to Office 365. This little tablet only has a 7″ screen, 1GB of RAM, and 16GB of internal storage, but the Micro-SD slot and a full sized USB 2.0 port sealed the deal for me.

The post Lenovo smells Superfishy | Tech Talk Today 136 first appeared on Jupiter Broadcasting.

]]>
Big Brother’s Malware | TechSNAP 169 https://original.jupiterbroadcasting.net/61502/big-brothers-malware-techsnap-169/ Thu, 03 Jul 2014 12:08:05 +0000 https://original.jupiterbroadcasting.net/?p=61502 It’s great to be a malware author, if your selling to the government, Bypassing PayPal’s two-factor authentication is easier than you might think. Plus a great batch of your questions and our answers and much, much more! Thanks to: Direct Download: HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | […]

The post Big Brother's Malware | TechSNAP 169 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

It’s great to be a malware author, if your selling to the government, Bypassing PayPal’s two-factor authentication is easier than you might think. Plus a great batch of your questions and our answers and much, much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

— Show Notes: —

Flaw in mobile app allows attackers to bypass PayPal two-factor authentication

  • Researchers at Duo Security have produced a proof-of-concept app that is able to bypass the two-factor authentication when using the PayPal mobile app, allowing an attacker to transfer funds out of a PayPal account with only the username and password, without needing to provide the one-time password
  • The PayPal bug was discovered by an outside researcher, Dan Saltman, who asked Duo Security for help validating it and communicating with the PayPal security team
  • “PayPal has been aware of the issue since March and has implemented a workaround, but isn’t planning a full patch until the end of July”
  • Currently, the PayPal mobile apps do not support 2 factor authentication, meaning if you have 2FA enabled on your PayPal account, you cannot use the mobile app
  • The exploit tricks the PayPal app into ignoring the 2FA flag and allowing the mobile app to work anyway
  • The researchers found that in the PayPal mobile app, the only thing preventing a 2FA enabled account from working was a flag in the response from the server
  • After modifying that flag, it was found that the client could login, and transfer funds
  • The check to prevent 2FA enabled accounts from logging in without the one-time passwords appears to only be enforced on the client, not the server as it should be
  • Once logged in with a valid session_id, the proof-of-concept app is able to use the API to transfer funds
  • “There are plenty of cases of PayPal passwords being compromised in giant database dumps, and there’s also been a giant rise in PayPal related phishing”
  • It is not clear how large the bug bounty on this vulnerability will be

“Hacking Team”

  • “Hacking Team” is an Italian company that develops “legal” spyware used by law enforcement and other government agencies all over the world
  • They originally came to light in 2011 after WikiLeaks released documents from 2008 where Hacking Team was trying to sell its software to governments
  • The software bills itself as “Offensive Security”, allowing LEAs to remotely monitor and control infected machines
  • The software claims to be undetectable, however when samples were anonymously sent to AV vendors in July of 2012, most scanners added definitions to detect some variants of the malware
  • In newly released research, Kaspersky has tracked the Command & Control (C2) servers used by “HackingTeam”
  • The countries with the most C2 servers include the USA, Kazakhstan, Ecuador, the UK and Canada
  • It is not clear if all of the C2 servers located in these countries are for the exclusive use of LEAs in those countries
  • “several IPs were identified as “government” related based on their WHOIS information and they provide a good indication of who owns them.”
  • The malware produced by Hacking Team has evolved to include modern malware for mobile phones
  • Although this is rarely seen, if it is only used by LEAs rather than for mass infection, this is to be expected
  • On a jail broken iOS device, the malware has the following features:
  • Control of Wi-Fi, GPS, GPRS
  • Recording voice
  • E-mail, SMS, MMS
  • Listing files
  • Cookies
  • Visited URLs and Cached web pages
  • Address book and Call history
  • Notes and Calendar
  • Clipboard
  • List of apps
  • SIM change
  • Live microphone
  • Camera shots
  • Support chats, WhatsApp, Skype, Viber
  • Log keystrokes from all apps and screens via libinjection
  • The Android version is heavily obfuscated, but it appears to target these specific applications:
  • com.tencent.mm
  • com.google.android.gm
  • android.calendar
  • com.facebook
  • jp.naver.line.android
  • com.google.android.talk
  • The article also provides details about how mobile phones are infected. Connecting a phone to an already compromised computer can silently infect it. In addition, the research includes screenshots of the iOS “Infector”, that merely requires LEAs connect the phone to their computer, where they can manually infect it before returning it to the owner
  • Additional Coverage – ThreatPost
  • Additional Coverage – SecureList
  • Additional Coverage – SecureList – Original article on HackingTeam from April 2013

Feedback:


Round Up:


The post Big Brother's Malware | TechSNAP 169 first appeared on Jupiter Broadcasting.

]]>
Has Microsoft Lost Its Mojo? | CR 102 https://original.jupiterbroadcasting.net/57752/has-microsoft-lost-its-mojo-cr-102/ Mon, 19 May 2014 16:59:41 +0000 https://original.jupiterbroadcasting.net/?p=57752 Mike and Chris discuss how, even when a laptop seems like the obvious choice, sometimes a desktop may be a better fit. Then, will the fate of Microsoft be slowly and embarrassingly slipping into irrelevance? And of course your fantastic feedback and much, much more! Thanks to: Direct Download: MP3 Audio | OGG Audio | […]

The post Has Microsoft Lost Its Mojo? | CR 102 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Mike and Chris discuss how, even when a laptop seems like the obvious choice, sometimes a desktop may be a better fit. Then, will the fate of Microsoft be slowly and embarrassingly slipping into irrelevance?

And of course your fantastic feedback and much, much more!

Thanks to:


\"Linux


\"DigitalOcean\"

Direct Download:

MP3 Audio | OGG Audio | Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

— Show Notes: —

Follow up / Feedback


\"CR100

Dev Hoopla

The post Has Microsoft Lost Its Mojo? | CR 102 first appeared on Jupiter Broadcasting.

]]>
Insane In The Ukraine | Unfilter 86 https://original.jupiterbroadcasting.net/51907/insane-in-the-ukraine-unfilter-86/ Wed, 19 Feb 2014 22:57:34 +0000 https://original.jupiterbroadcasting.net/?p=51907 After three months building pressure the Ukraine is exploding this week. Now the United States and Russia find themselves in a pissing match.

The post Insane In The Ukraine | Unfilter 86 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

After three months building pressure the Ukraine is exploding this week, as anti-government protests turn more and more violent. Now the United States and Russia find themselves in a pissing match over who is more just to influence the revolution. The propaganda is flying, and we’ll break it down and discuss the real reasons the people are taking to the streets.

New Snowden leaks reveal the NSA tracked WikiLeaks supporters, legal bud gets a money boost from the feds, Syria is heating back up, and much much more.

On this week’s episode of, Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is Crazy

The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at****what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous.

“The end game here is to limit the encroachment on our 4th Amendment rights,” Roberts told the Daily Herald of Provo. “We’d love to see Congress fix that on their own, but I don’t have a lot of faith in that happening. So this is a state effort to take a step in that direction.”

He does have supporters, though, including the Libertas Institute, a libertarian-leaning think tank in Utah.

Advancing the cause of liberty in Utah


– Thanks for Supporting Unfilter –

  • Thanks to our 335 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


Ukraine mayhem

Opposition leaders, backed by protesters in the streets, want a return to a constitution enacted in 2004 that would move substantial powers over the government from the president to parliament – a proposal rejected by President Viktor Yanukovich and his supporters, who have had a majority in the legislature.

The proposals would curb the powers of President Viktor Yanukovych, but the opposition say they were blocked from submitting their draft, meaning no debate could take place.

The development came after clashes between police and protesters left at least 25 people dead in capital Kiev.

Ukrainian police yesterday moved in to clear a protest camp in Kiev’s Independence Square, known as the Maidan, the heart of anti-government demonstrations sparked by President Yanukovich’s rejection of a trade and investment deal with the European Union last November.

Ukraine’s security service has announced it is launching a counter-terror operation. Radicals have seized over 1,500 firing arms and 100,000 bullets in the last 24 hours, the service said.

Reacting to the “conscious, purposeful use of force by means of arson, killings, kidnapping and terrorizing people,” which Yakimenko treats as “terrorist acts,” the Security Service and Anti-terrorist center of Ukraine have decided to launch a counter-terrorist operation.

The man the government blames for the deaths is opposition leader Leopoldo Lopez, who turned himself in to authorities on Tuesday.

What’s happening in Ukraine is complicated and driven by many factors: the country’s history as an unhappy component of the Soviet Union, its deep economic woes, a sense of cultural fondness for the West, wide discontent with government corruption, two decades of divided politics and a sense that Yanukovych caved to Putin.

No single datapoint could capture or explain all of that. But the map below comes perhaps as close as anything could. It shows Ukraine, color-coded by the country’s major ethnic and linguistic divisions. Below, I explain why this map is so important and why it helps to tell Ukraine’s story. The short version: Ukraine’s politics have long been divided into two major factions by the country’s demographics. What’s happening right now is in many ways a product of that division, which has never really been reconciled.

(Wikimedia Commons)
(Wikimedia Commons)

Roughly speaking, about four out of every six people in Ukraine are ethnic Ukrainian and speak the Ukrainian language. Another one in six is ethnic Russian and speaks Russian. The last one-in-six is ethnic Ukrainian but speaks Russian. This map shows where each of those three major groups tend to live. (I’m rounding a bit on the numbers; about five percent of Ukrainians are minorities who don’t fit in any of those three categories.)

Here’s why this matters for what’s happening in Ukraine now: Since it declared independence in 1991, the country has been politically divided along these ethnic-linguistic lines. In national elections, people from districts dominated by that majority group (Ukrainian-speakers who are ethnically Ukrainian) tend to vote for one candidate. And people from districts with lots of ethnic Russians or Russian-speakers tend to vote for the other candidate.


Bonus Round

The Obama administration on Friday gave the banking industry the green light to finance and do business with legal marijuana sellers, a move that could further legitimize the burgeoning industry.

For the first time, legal distributors will be able to secure loans and set up checking and savings accounts with major banks that have largely steered clear of those businesses. The decision eliminates a key hurdle facing marijuana sellers, who can now legally conduct business in 20 states and the District.

They are also are looking at newer, more far-reaching options, including drone strikes on extremists and more forceful action against Assad, whom President Barack Obama told to leave power 30 months ago.

Obama’s top aides plan to meet at the White House before week’s end to examine options, according to administration officials.

The national license-plate recognition database, which would draw data from readers that scan the tags of every vehicle crossing their paths, would help catch fugitive illegal immigrants, according to a DHS solicitation. But the database could easily contain more than 1 billion records and could be shared with other law enforcement agencies,

A spokeswoman for DHS’s Immigration and Customs Enforcement agency (ICE) stressed that the database “could only be accessed in conjunction with ongoing criminal investigations or to locate wanted individuals.”

Top Story in the unfilter Subreddit


Feedback:

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Insane In The Ukraine | Unfilter 86 first appeared on Jupiter Broadcasting.

]]>
Scenic BGP Route | TechSNAP 137 https://original.jupiterbroadcasting.net/46702/scenic-bgp-route-techsnap-137/ Thu, 21 Nov 2013 19:21:23 +0000 https://original.jupiterbroadcasting.net/?p=46702 Attackers use BGP to redirect and monitor Internet traffic, 42 Million dating site passwords leaked, and the data center that could be coming to a town near you

The post Scenic BGP Route | TechSNAP 137 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Attackers use BGP to redirect and monitor Internet traffic, 42 Million dating site passwords leaked, and the data center that could be coming to a town near you.

Plus a great batch of your questions, our answers, and much much more!

On this week’s TechSNAP!

Thanks to:


\"GoDaddy\"


\"Ting\"

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Show Notes:

Attackers compromise core routers and redirect internet traffic

  • Attackers have managed to compromise some routers running BGP (Border Gateway Protocol), and cause them to inject additional hops into some routes on the Internet, allowing them to execute man-in-the-middle (MitM) attacks and/or monitor some users’ traffic
  • Renesys has detected close to 1,500 IP address blocks that have been hijacked on more than 60 days this year
  • “[The attacker is] getting one side of conversation only,” Cowie said. “If they were to hijack the addresses belonging to the webserver, you’re seeing users requests—all the pages they want. If they hijack the IP addresses belonging to the desktop, then they’re seeing all the content flowing back from webservers toward those desktops. Hopefully by this point everyone is using encryption.”
  • In one attack the hop starting in Guadalajara, Mexico and ending in Washington, D.C., included hops through London, Moscow and Minsk before it’s handed off to Belarus, all because of a false route injected at Global Crossing, now owned by Level3
  • “In a second example, a provider in Iceland began announcing routes for 597 IP networks owned by a large U.S. VoIP provider; normally the Icelandic provider Opin Kerfi announces only three IP networks, Renesys said. The company monitored 17 events routing traffic through Iceland”
  • Renesys does not have any information on who was behind the route hijacking

Cupid Media Hack Exposed 42M Passwords

  • The data stolen from Southport, Australia-based dating service Cupid Media was found on the same server where hackers had amassed tens of millions of records stolen from Adobe, PR Newswire and the National White Collar Crime Center (NW3C), among others.
  • Plain text passwords for more than 42 million accounts
  • Andrew Bolton, the company’s managing director. Bolton said the information appears to be related to a breach that occurred in January 2013.
  • When Krebs told Bolton that all of the Cupid Media users I’d reached confirmed their plain text passwords as listed in the purloined directory, he suggested I might have “illegally accessed” some of the company’s member accounts. He also noted that “a large portion of the records located in the affected table related to old, inactive or deleted accounts.”
  • > “The number of active members affected by this event is considerably less than the 42 million that you have previously quoted,” Bolton said.
  • The danger with such a large breach is that far too many people reuse the same passwords at multiple sites, meaning a compromise like this can give thieves instant access to tens of thousands of email inboxes and other sensitive sites tied to a user’s email address.
  • Facebook has been mining the leaked Adobe data for information about any of its own users who might have reused their Adobe password and inadvertently exposed their Facebook accounts to hijacking as a result of the breach.
  • The Date of Birth field is a ‘datetime’ rather than just a ‘date’, and seems to include a random timestamp, maybe from when the user signed up
  • Additional Coverage

Feedback:


Round Up:

[asa]B00GHME0RE[/asa]


The post Scenic BGP Route | TechSNAP 137 first appeared on Jupiter Broadcasting.

]]>
Answers for Everyone | TechSNAP 42 https://original.jupiterbroadcasting.net/16331/answers-for-everyone-techsnap-42/ Thu, 26 Jan 2012 20:40:12 +0000 https://original.jupiterbroadcasting.net/?p=16331 We’ve got the answer to life the universe and everything, plus why you need to get upset about ACTA, and patch your Linux Kernel. In this Q&A PACKED edition!

The post Answers for Everyone | TechSNAP 42 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We’ve got the answer to life the universe and everything, plus why you need to get upset about ACTA, and patch your Linux Kernel!

All that and more, in this Q&A PACKED edition of TechSNAP!

Thanks to:
GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Pick your code and save:
DOTCO9: .co domain for $17.99
techsnap7: $7.99 .com
techsnap10: 10% off
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans

   

Direct Download Links:

   

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

 

Subscribe via RSS and iTunes:

Show Notes:

Dreamhost gets hacked, resets all customers’ passwords, has scale issues

  • On January 19th, Dreamhost.com detected unauthorized activity in one of their databases
  • It is unclear which databases were compromised, if they were dreamhost databases of customer data, or customer site databases
  • Dreamhost uses separate passwords for their main web control panel, and individual user SSH and FTP accounts
  • Dreamhost ran in to scale issues, where their centralized web control panel could not handle the volume of users logging in and attempting to change their shell passwords
  • The fast forced password reset by DreamHost appears to have promptly ended the malicious activity
  • Based on the urgency of the reset, there seem to be indications that DreamHost stores users’ passwords in plain text in one or more databases
  • This assertion is further supported by the fact that they print passwords to confirmation screens and in emails
  • Dreamhost also reset the passwords for all of their VPS customers

Linux root exploit – when the fix makes it worse

  • Linux kernel versions newer than 2.6.39 are susceptible to a root exploit that allowed writing to protected memory
  • Prior to version 2.6.39 write access was prevent by an #ifdef, however this was deemed to be to weak, and was replaced by newer code
  • The new security code that was to ensure that writes were only possible with the correct permissions, turned out to be inadequate and easily fooled
  • Ubuntu has confirmed that an update for 11.10 has been released, users are advised to upgrade
  • This issue does not effect Redhat Enterprise Linux 4 or 5, because this change was not backported. A new kernel package for RHEL 6 is now available
  • Analysis
  • Proof of Concept
  • Proof of Concept for Android

Feedback

Q: Tzvi asks how to best Monitor employee Internet usage?

A: There are a number of ways to monitor and restrict Internet access through a connection you control. A common suggestion is the use of a proxy server. The issue with this is that it requires configuration on each client machine and sometimes even each client application. This is a lot of work, and is not 100% successful. However, there is an option know as a ‘transparent proxy’. This is where the router/firewall, or some other machine that all traffic to the internet must pass through analyzes the traffic, and routes connections outbound for port 80 or 443 (HTTP and HTTPS respectively, and optional additional ports) through the proxy server, without any configuration required on the individual clients. Then, you can use the firewall to deny all traffic outbound that is not via the proxy.

This is relatively easy to setup, so much so that as part of the final exam in my Unix Security class, students had 2 hours to setup their machine as follows:

  • Configure TCP/IP stack
  • Download GPG and Class GPG Key
  • Decrypt Exam Instructions
  • Install Lynx w/ SSL support
  • Install a class self-signed SSL certificate and the root certificate bundle to be trusted
  • Install and configure Squid to block facebook with a custom error page
  • Configure Lynx to use Squid
  • Create a default deny firewall that only allows HTTP via squid and FTP to the class FTP server
  • Access the college website and facebook (or rather the custom error page when attempting to access facebook)

While they had a little practice, and didn’t have to configure a transparent proxy, it is still are fairly straight forward procedure.

Instead of rolling your own, you can just drop in pfSense and follow these directions


Q: Brett asks, what do you do after a compromise?

A: The very first thing you do after a compromise, is take a forensic image of the drive. A bit by bit copy, without ever writing or changing the disk in any way. You then pull that disk out and put it away for safe keeping. Do all of your analysis and forensics on copies of that first image (but no not modify it either, you don’t want to have to do another copy from the original). This way as you work on it, and things get modified or trashed, you do not disturb the original copy. You may need the original unmodified copy for legal proceedings, as the evidentiary value is lost if it is modified or tampered with in any way.

So your best bet, is to boot off of a live cd (not just any live cd, many try to be helpful and auto-mount every partition they find, use a forensics live cd that will not take any auction without you requesting it). Then use a tool like dd to image the drive to a file or another drive. You can then work off copies of that. This can also work for damaged disks, using command switches for dd such as conv=noerror,sync . Also using a blocksize of 1mb or so will speed up the process greatly.

You asked about tripwire and the like, the problem with TripWire is that you need to have been running it since before the incident, so it has a fingerprint database of what the files should look like, so it can detect what has changed. If you did not have tripwire setup and running before, while it may be possible to create a fingerprint database from a backup, it is not that useful.
The freebsd-update command includes an ‘IDS’ command, that compares all of the system files against the central fingerprint database used to update the OS, and provides quick and powerful protection against the modification of the system files, but it does not check any files installed my users or packages. The advantage to the freebsd-update IDS over tripwire is that it uses the FreeBSD Security Officers fingerprint database, rather than a locally maintained one that may have been modified as part of the system compromise. In college I wrote a paper on using Bacula as a network IDS, I’ll see if I can find it and post it on my blog at appfail.com.


Q: Jono asks, VirtualBox vs. Bare to the metal VMs?

  • Xen, KVM and VirtualBox are not bare metal, they requires a full linux host
  • XenServer is similar to VMWare ESXi, in that it is bare metal. It uses a very stripped down version of CentOS and therefore far fewer resources than a full host. However XenServer is a commercial product (though there is a free version)
    +The advantage to XenServer over VMWare ESXi (both are commercial but free), is XenServer is supported by more open source management tools, such as OpenStack

Q:Gene asks, IT Control is out of control, what can we users do?


Q: Crshbndct asks, Remote SSH for Mum


Roundup

The post Answers for Everyone | TechSNAP 42 first appeared on Jupiter Broadcasting.

]]>