Project Zero – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Fri, 06 Sep 2019 06:52:45 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Project Zero – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Mobile Security Mistakes | TechSNAP 411 https://original.jupiterbroadcasting.net/134107/mobile-security-mistakes-techsnap-411/ Thu, 05 Sep 2019 23:30:40 +0000 https://original.jupiterbroadcasting.net/?p=134107 Show Notes: techsnap.systems/411

The post Mobile Security Mistakes | TechSNAP 411 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/411

The post Mobile Security Mistakes | TechSNAP 411 first appeared on Jupiter Broadcasting.

]]>
Linux Action News 73 https://original.jupiterbroadcasting.net/127366/linux-action-news-73/ Sun, 30 Sep 2018 14:06:06 +0000 https://original.jupiterbroadcasting.net/?p=127366 Episode Links: linuxactionnews.com/73

The post Linux Action News 73 first appeared on Jupiter Broadcasting.

]]>

Episode Links:

linuxactionnews.com/73

The post Linux Action News 73 first appeared on Jupiter Broadcasting.

]]>
Too Many Containers | TechSNAP 353 https://original.jupiterbroadcasting.net/121877/too-many-containers-techsnap-353/ Thu, 25 Jan 2018 19:38:26 +0000 https://original.jupiterbroadcasting.net/?p=121877 RSS Feeds: HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: DNSFS. Store your files in others DNS resolver cache s A while ago I did a blog post about how long DNS resolvers hold results in cache for, using RIPE Atlas probes testing […]

The post Too Many Containers | TechSNAP 353 first appeared on Jupiter Broadcasting.

]]>

RSS Feeds:

HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

DNSFS. Store your files in others DNS resolver cache s

A while ago I did a blog post about how long DNS resolvers hold results in cache for, using RIPE Atlas probes testing against their default resolvers (in a lot of cases, the DNS cache on their modem/router).

Unauthenticated LAN remote code execution in AsusWRT

However due to a number of coding errors, it is possible for an unauthenticated attacker in the LAN to achieve remote code execution in the router as the root user.

AI is moving towards acceptance in cyber security, says Check Point

Artificial intelligence (AI) is making headway in the security industry as a means to better analyse mountains of information, but will not be widely adopted in the short term because of a lack of actionable data and human expertise, according to security services supplier Check Point.

Alphabet is launching a new CyberSecurity unit.

Alphabet, the parent company of Google, announced today that they will be launching Chronicle, a new business unit that will focus on Cyber Security, using their servers and infrastructure. The new organization hopes to focus on machine learning and artificial intelligence to assist in the fight against cybercrime moving forward.

Google Project Zero claims new BitTorrent flaw could enable cyber crooks get into users’ PCs

Google Project Zero security researchers have found what they claim is a “critical flaw” in the Transmission BitTorrent client that could enable cyber crooks to take control of users’ computers.

Kubernetes

Kubernetes, at its basic level, is a system for managing containerized applications across a cluster of nodes. In many ways, Kubernetes was designed to address the disconnect between the way that modern, clustered infrastructure is designed, and some of the assumptions that most applications and services have about their environments.

Fun fact: The seven spokes in the Kubernetes logo refer to the project’s original name, “Project Seven of Nine.”

We’ve been running Kubernetes for deep learning research for over two years. While our largest-scale workloads manage bare cloud VMs directly, Kubernetes provides a fast iteration cycle, reasonable scalability, and a lack of boilerplate which makes it ideal for most of our experiments. We now operate several Kubernetes clusters (some in the cloud and some on physical hardware), the largest of which we’ve pushed to over 2,500 nodes. This cluster runs in Azure on a combination of D15v2 and NC24 VMs.

Feedback

If infrastructures are to be treated as a code than projects that manage them must be treated as software projects. As your infrastructure code gets bigger and bigger you have more problems to deal with it. Code layout, variable precedence, small hacks here and there. Therefore, organization of your code is very important, and in this repository you can find some of the best practices (in our opinion) to manage your infrastructure code.

About the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan

The post Too Many Containers | TechSNAP 353 first appeared on Jupiter Broadcasting.

]]>
Cloudy with a Chance of Leaks | TechSNAP 308 https://original.jupiterbroadcasting.net/107191/cloudy-with-a-chance-of-leaks-techsnap-308/ Tue, 28 Feb 2017 21:37:19 +0000 https://original.jupiterbroadcasting.net/?p=107191 RSS Feeds: HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Announcing the first SHA1 collision Not just Google on this, they worked with CWI SHA1 is a Cryptographic hash function SHA-1 was developed as part […]

The post Cloudy with a Chance of Leaks | TechSNAP 308 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Announcing the first SHA1 collision

CloudBleed


Feedback


Round Up:


The post Cloudy with a Chance of Leaks | TechSNAP 308 first appeared on Jupiter Broadcasting.

]]>
Project Zero Goes To War | TechSNAP 177 https://original.jupiterbroadcasting.net/65572/project-zero-goes-to-war-techsnap-177/ Thu, 28 Aug 2014 19:01:59 +0000 https://original.jupiterbroadcasting.net/?p=65572 Pre-crime is here, with technology that lets you predicting a hack before it happens. We’ll tell you how. Google’s project zero goes to war, we get real about virtualization. And then its a great batch of your questions, our answers & much more! Thanks to: Direct Download: HD Video | Mobile Video | MP3 Audio […]

The post Project Zero Goes To War | TechSNAP 177 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Pre-crime is here, with technology that lets you predicting a hack before it happens. We’ll tell you how. Google’s project zero goes to war, we get real about virtualization.

And then its a great batch of your questions, our answers & much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

Predicting which sites will get hacked, before it happens

  • Researchers from Carnegie Mellon University have developed a tool that can help predict if a website is likely to become compromised or malicious in the future
  • Using the Archive.org “Wayback Machine” they looked at websites before they were hacked, and tried to identify trends and other information that may be predictors
  • “The classifier correctly predicted 66 percent of future hacks in a one-year period with a false positive rate of 17 percent”
  • “The classifier is focused on Web server malware or, put more simply, the hacking and hijacking of a website that is then used to attack all its visitors”
  • The tool looks at the server software, outdated versions of Apache and PHP can be good indicators of future vulnerabilities
  • It also looks at how the website is laid out, how often it is updated, what applications it runs (outdated wordpress is a good hacking target)
  • It also compares the sites to sites that have been compromised. If a site is very like another, and that other was compromised, there is an increased probability that the first site will also be compromised
  • The classifier looks at many other factors as well: “For instance, if a certain website suddenly sees a change in popularity, it could mean that it became used as part of a [malicious] redirection campaign,”
  • The most common marker for a hackable website: The presence of the ‘generator’ meta tag with a value of ‘Wordpress 3.2.1’ or ‘Wordpress 3.3.1’
  • Research PDF from USENIX
  • There are tools like those from Norse, that analyze network traffic and attempt to detect new 0-day exploits before they are known

Google’s Project Zero exploits the unexploitable bug

  • Well over a month ago Google’s Project Zero reported a bug in glibc, however there was much skepticism about the exploitability of the bug, so it was not fixed
  • However, this week the Google researchers were able to create a working exploit for the bug, including an ASLR bypass for 32bit OSs
  • The blog post details the process the Project Zero team went through to develop the exploit and gain root privileges
  • The blog post also details an interesting (accidental) mitigation found in Ubuntu, they caused the researchers to target Fedora to more easily develop the exploit
  • The blog also discusses a workaround for other issues they ran into. Once they had exploited the set-uid binary, they found that running: system(“/bin/bash”) started the shell with their original privileges, rather than as root. Instead, they called chroot() on a directory they had setup to contain their own /bin/sh that calls setuid(0) and then executes a real shell as the system root user.
  • The path they used to get a root shell relies on a memory leak in the setuid binary pkexec, which they recommend be fixed as well as the original glibc bug
  • “The ability to lower ASLR strength by running setuid binaries with carefully chosen ulimits is unwanted behavior. Ideally, setuid programs would not be subject to attacker-chosen ulimit values”
  • “The exploit would have been complicated significantly if the malloc main linked listed hardening was also applied to the secondary linked list for large chunks”
  • The glibc bug has since been fixed

Secret Service warns over 1000 businesses hit by Backoff Point-of-Sales terminal malware

  • The Secret Service and DHS have released an advisory warning businesses about the POS (Point-of-Sales terminal) malware that has been going around for a while
  • Advisory
  • “The Department of Homeland Security (DHS) encourages organizations, regardless of size, to proactively check for possible Point of Sale (PoS) malware infections. One particular family of malware, which was detected in October 2013 and was not recognized by antivirus software solutions until August 2014, has likely infected many victims who are unaware that they have been compromised”
  • “Seven PoS system providers/vendors have confirmed that they have had multiple clients affected“
  • “Backoff has experts concerned because it’s effective in swiping customer credit card data from businesses using a variety of exfiltration tools, including memory, or RAM scraping, techniques, keyloggers and injections into running processes”
  • “A report from US-CERT said attackers use Backoff to steal payment card information once they’ve breached a remote desktop or administration application, especially ones that are using weak or default credentials”
  • “Backoff is then installed on a point-of-sale device and injects code into the explorer.exe process that scrapes memory from running processes in order to steal credit card numbers before they’re encrypted on the device and sent to a payment processor. “
  • “Keylogging functionality is also present in most recent variants of ‘Backoff’. Additionally, the malware has a C2 component that is responsible for uploading discovered data, updating the malware, downloading/executing further malware, and uninstalling the malware,”
  • US-CERT Advisory
  • Krebs reports that Dairy Queen may also be a victim of this attack
  • “Dairy Queen says it has no indication of a card breach at any of its thousands of locations, but the company also acknowledges that nearly all stores are franchises and that there is no established company process or requirement that franchisees communicate security issues or card breaches to Dairy Queen headquarters”

Feedback:


Round Up:

The post Project Zero Goes To War | TechSNAP 177 first appeared on Jupiter Broadcasting.

]]>