Archive for the 'Security' Category


Google search for malware accessible to all…

Tuesday, July 18th, 2006

The metasploit project is now hosting a malware search that uses Google. It essentially uses a binary google search technique that was referenced last week to find malicious files hosted on the web. Of course, this will be partly limited by Google’s indexing which recently has not been quite as thorough as before, but… all […]

IPtables magic, or… Blocking Aggressive Outbound Traffic with IPtables

Sunday, July 16th, 2006

Blocking Aggressive Outbound Traffic with IPtables. For starters, I’ve tested this on a test system that started out with NO iptables rules, and then moved on to an IPCop install (the vmware download from vmwarez.com…) I’ve detailed previously one dilemma that I had with regard to my own cable connection which made me question how […]

Linux Local kernel vulnerability

Friday, July 14th, 2006

SANS has a story on another local kernel vulnerability for linux. I’ve got to say that I typically haven’t looked as much at “local” vulnerabilities on this site as I have talked about remote vulnerabilities. Usually local vulnerabilities are flaws that allow a user that’s already logged into a system to escalate their user rights […]

Firewall musings…

Friday, July 14th, 2006

Yesterday I had a bit of a realization. I had just been looking at a wireless router/firewall setup and was thinking about the firewalling rules (which seemed to be geared at the WIRELESS lan… i.e. blocking that activity on the Wireless segment.) You know, traditionally firewalls have had the attitude of defending the internal network […]

Powerpoint zero day

Friday, July 14th, 2006

This has been a rough quarter for Office vulnerabilities… there seems to be a pattern, Microsoft patch day, then…. zero-day exploit within a week for an Office component. First Word, then Excel and now this month our vulnerable app is Powerpoint. The Security Fix has some coverage and notes the pattern – the likely motivation […]

Debian development server compromise

Wednesday, July 12th, 2006

Sans also brings this story about the Debian development server being compromised. Investigation is ongoing. The machine was gluck.debian.org and hosted CVS among other things (ddtp, lintian, people, popcon, planet, ports, release). It has been taken offline currently for a reinstall, other systems have been locked down until they can patch the vulnerability that they […]

Anonymized Botnet?

Wednesday, July 12th, 2006

Sans has a story on botnet traffic spotted coming from the TOR network. Now, I had to refresh my memory on what TOR is, but it’s an anonymizing network, essentially a computer running TOR, would collect a list of TOR client machines on the internet and then connections to other pcs are routed through encrypted […]

Adobe Acrobat reader update

Wednesday, July 12th, 2006

On the heels of yesterdays massive update day from Microsoft, Adobe has released an update for the free Adobe Reader. The Adobe reader is one of those ALMOST essential applications that MOST everyone has installed. So, this will be of particular interest to MOST computer users. A SERIOUS security flaw (They’re tagging it CRITICAL) could […]

Phisher’s getting sneakier

Tuesday, July 11th, 2006

The SecurityFix reports on this clever two-factor authentication phishing attempt. They were looking for Citibank Business customers and in addition to username password information they were looking to verify a supplied token. The bottom line is that phishers will look to find any way possible to social engineer you out of your information credentials, whether […]

Another Wolf in Sheeps Clothing to watch for “Spyheal”

Friday, July 7th, 2006

Sunbeltblog has the heads up on this one. Spyheal is the name it goes by and it hangs out at spyheal (dot) com So, if you’re in a position to block sites that looks like one to filter for your network.    Send article as PDF   

Google
 
Web www.averyjparker.com