| |
I am a hacker and you are afraid and that makes you more dangerous than I ever could be. |
|
Topic: Miscellaneous |
10:25 pm EST, Nov 27, 2007 |
It only took about 8 hours before I started getting SMS messages telling me that joining the Borg was inevitable and that resistance was futile. Divide, KP, Thank you for being my messengers! |
|
Topic: Miscellaneous |
5:19 pm EST, Nov 27, 2007 |
Billy: [reading an RSA 08 flyer] "What would Alan Turing Do?" Mark: What *wouldn't* Alan Turing do? Billy: Yeah, well, thats kind of why he's dead. How fucking pompous is it for RSA to postulate what Alan Turing would or wouldn't do? |
|
Damn you Adam Shostack!!! |
|
|
Topic: Current Events |
2:13 pm EST, Nov 27, 2007 |
Damn you Adam Shostack! Damn you! [shakes fist] :-) I knew I shouldn't have introduced you two at Black Hat! :-) |
|
ASP.NETRegEx Validators fail open? WTF? |
|
|
Topic: Technology |
3:26 pm EST, Nov 20, 2007 |
RegEx Validators are handy for implementing Whitelist input validation so it pays to see what they actually do under the covers.
try
{
Match match = Regex.Match(controlValidationValue,
this.ValidationExpression);
return ((match.Success && (match.Index == 0))
&& (match.Length == controlValidationValue.Length));
}
catch
{
return true;
}
A final thing that caught my eye was the try ... catch ... block. If the Regex.Match() call throws an exception, the validator returns true indicting the input is safe. This means in event of an error, the validator fails open instead of failing closed! Deciding when applications/appliances/software/hardware/structures should fail open or fail closed is way beyond the scope of this post and the answer is almost always circumstantial based on the individual situations. Quick, should firewalls fail open or closed? Fail open? Well then an attacker knocks out your firewalls and its open seasons on the FTP servers and Samba shares inside your organization. Fail closed? Thats a nifty DoS you built into your network infrastructure now isn't it? when should input validation fail open or fail closed? Again depend, but my gut tells me it should fail closed more often than it fails open.
More web sec people read Memestreams than read the SPI Labs blog. I'm not really sure what to make of that. :-) ASP.NETRegEx Validators fail open? WTF? |
|
Topic: Miscellaneous |
11:50 pm EST, Nov 14, 2007 |
I knew it was only a matter of time before I had to start filtering out poorly written and technically incompetent XSS "0day" posts on WebAppSec. I just hoped it would have lasted a little longer. This attack is known as 0day because it has just been reported to public and this is first day of public vulnerability, and 0day means 'published.'
... [sigh] There is so much wrong with this sentence my head might just explode. |
|
Silver Bullets and the Network Werewolves |
|
|
Topic: Miscellaneous |
10:30 pm EST, Nov 8, 2007 |
That's quite an image, isn't it? It's ISS CEO Tom Noonan holding a silver bullet, announcing the Proventia IPS product in the October 2003 issue of ISS' Connect magazine. Raise your hand if you think IPS or anything else ISS has produced is a silver bullet. No takers? I don't mention this to criticize ISS, specifically. Rather, I'd like to emphasize the importance of proper frames of reference when considering security.
HAHA! I've enjoyed Richard Bejtlich's humor for a while now, but this was too good not to post. Kidding aside, Richard raises a good point that nothing in security is a silver bullet. Not an application, not a WAF, not WebInspect, not security as a service, nothing. Security must be layered, composed of many and varied products and defenses. Anyone who says otherwise is a charlatan. Silver Bullets and the Network Werewolves |
|
Hushmail Spills it to Feds |
|
|
Topic: Current Events |
9:26 am EST, Nov 8, 2007 |
A September court document from a federal prosecution of alleged steroid dealers reveals the Canadian company turned over 12 CDs worth of e-mails from three Hushmail accounts, following a court order obtained through a mutual assistance treaty between the U.S. and Canada. The charging document alleges that many Chinese wholesale steroid chemical providers, underground laboratories and steroid retailers do business over Hushmail.
... uhhhhh... ... Must go now. [begins shredding] Hushmail uses industry-standard cryptographic and encryption protocols (OpenPGP and AES 256) to scramble the contents of messages stored on their servers. They also host the public key needed for other people using encrypted email services to send secure messages to a Hushmail account. The first time a Hushmail user logs on, his browser downloads a Java applet that takes care of the decryption and encryption of messages on his computer, after the user types in the right passphrase. So messages reach Hushmail's server already encrypted. The Java code also decrypts the message on the recipient's computer, so an unencrypted copy never crosses the internet or hits Hushmails servers. In this scenario, if a law enforcement agency demands all the e-mails sent to or from an account, Hushmail can only turn over the scrambled messages since it has no way of reversing the encryption. However, installing Java and loading and running the Java applet can be annoying. So in 2006, Hushmail began offering a service more akin to traditional web mail. Users connect to the service via a SSL (https://) connection and Hushmail runs the Encryption Engine on their side. Users then tell the server-side engine what the right passphrase is and all the messages in the account can then be read as they would in any other web-based email account. The rub of that option is that Hushmail has -- even if only for a brief moment -- a copy of your passphrase. As they disclose in the technical comparison of the two options, this means that an attacker with access to Hushmail's servers can get at the passphrase and thus all of the messages.
Hushmail Spills it to Feds |
|
Ajax Security is more than an Increased Attack Surface |
|
|
Topic: Miscellaneous |
1:19 pm EST, Nov 7, 2007 |
And while over 2/3 understand that Ajax applications have an increased attack surface, many of the comments showed that some people believe Ajax security is just about an increased attack surface. Let me assure you, if Ajax Security was only about an increased attack surface two things would have happened: 1. Addison Wesley won't have asked me to write a 500 page book about it 2. Bryan and I would have finished a long time ago :-) There are many issues surrounding Ajax Security and hopefully this piece will help people see the bigger Ajax Security picture.
A little peak into some of the many topics we cover in Ajax Security, our book on all things Ajax. Hopefully this little taste shows you that there is far far more to Ajax Security than some JavaScript eye candy and an increased attack surface. Developer, QA professional, and hacker alike will all find Ajax Security an enormously powerful resource to help design, build, test, and hack Ajax applications.
Ajax Security is more than an Increased Attack Surface |
|
Trophy Wives and the Blue Wall of Silence |
|
|
Topic: Miscellaneous |
1:56 pm EST, Nov 6, 2007 |
Friends and relatives of Stacy Peterson, 23, say her disappearance is suspicious. Her husband of four years, Bolingbrook police Sgt. Drew Peterson, 53, reportedly has told police his wife said she was leaving him for another man, and police are not treating the disappearance as a criminal investigation.
... 23 - 4 = 19 53 - 4 = 49 Since when do cops get trophy wives 30 years their junior? And that doesn't even including dating. They got married when she was 19, so they started dating when she was what, 18? 17? [checks story] Hmmm I could have sworn this would have taken place in the South. Trophy Wives and the Blue Wall of Silence |
|