Create an Account
username: password:
 
  MemeStreams Logo

Curiouser and Curiouser

search

Acidus
Picture of Acidus
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Acidus's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
Recreation
Local Information
Science
Society
Sports
(Technology)

support us

Get MemeStreams Stuff!


 
Current Topic: Technology

Speaking at Black Hat Federal 2006!
Topic: Technology 10:20 am EST, Dec  1, 2005

I hadn't told many people about this because I didn't know if I would get accepted, but I am presenting at BlackHat Federal in January. The topic is Analysis of Web Application Worms and Viruses

Yes, Rattle was right, I am working on some badass Javascript stuff right now. This presentation grew out of that and my analysis of things like Perl.Sanity and the MySpace.com Virus. The really cool Javascript stuff will hopefully be at BlackHat in Las Vegas this summer.

A detailed outline of this talk is available on Most Significant Bit Labs. Be sure to check the details on Web Worms and Web Viruses to better understand the threat.

Worms traditionally propagate by exploiting a vulnerability in an OS or an underlying service. 2005 saw the release in the wild of the first worms that propagate by exploiting vulnerabilities in web applications served by simple http daemons. With the near ubiquity of W3C compliant web browsers and advances in dynamic content generation and client-side technologies like AJAX, major players like Google, Yahoo, and Microsoft are creating powerful application accessible only through web browsers. The security risks of web applications are already largely neglected. The discovery of programs that automatically exploit web applications and self-replicate will only make the situation worse.

This presentation will analyze the scope of these new threats. First we will examine how Web Worms and Viruses operate, specifically focusing on propagation methods, execution paths, payload threats and limitations, and design features. Next we will autopsy the source code of the Perl.Sanity worm and the MySpace.com virus to better understand how these programs function in the wild. We will discuss the shortcomings of these two attacks, what that tells us about the authors sophistication, and how their impact could have been worse. Then we will hypothesize two future programs, the Smogmoh worm and the 1929 virus, and discuss their capabilities to learn how these threats might evolve. Finally, we will present guidelines for implementing new web applications securely to resist these new threats.

Participates should have a good understanding of the different HTTP methods, Javascript, DOM manipulation and security, Perl, and be familiar with web application design.

Speaking at Black Hat Federal 2006!


RE: Google also a hacker ally - IT Security News - SC Magazine UK
Topic: Technology 8:14 am EST, Nov 30, 2005

Ethanol Demagogue wrote:

A malicious user can use the ultra-popular search website – or one that operates like it – to find vulnerabilities in corporate websites more quickly than had previously been possible, hacking expert Johnny Long has said.

More and more I'm seeing centralized media lag behind, especially when it comes to tech news. This particular article has been around for over 2 years now.

Media, meet Perl.Sanity, Perl.Sanity, meet the Media.

I submitted to BlackHat Federal in January to discuss trends in web worms like Sanity. I'll post my 8 page CFP soon.

RE: Google also a hacker ally - IT Security News - SC Magazine UK


Mounting ISO images in a virtual CD-ROM drive
Topic: Technology 2:57 pm EST, Nov 22, 2005

Microsoft's internal, unsupported application for mounting CD/DVD ISOs as drives. No more stupid daemon tools with their spyware filled BS that takes 20 minutes to get rid of!

Mounting ISO images in a virtual CD-ROM drive


Design and Deploy Secure Web Apps with ASP.NET 2.0 and IIS 6.0
Topic: Technology 12:22 pm EST, Nov 18, 2005

Web applications are among the most common computing services that are exposed to the Internet, and thus they pose an inviting target to anyone who wants to break into your network to steal sensitive information, tamper with your data, or otherwise compromise your system. Ensuring the security of a Web application is a serious task, and requires consideration throughout the design, development, deployment, and operation phase

Working reading that doesn't feel like work.

Design and Deploy Secure Web Apps with ASP.NET 2.0 and IIS 6.0


Why would Google want AOL?
Topic: Technology 1:59 pm EST, Nov 16, 2005

AIM Robots are sponsored and operated by AOL and other vendors and appear as buddy icons in the buddy lists of AIM users who install them.

For example, users can send an instant message to the AOLYellowpages AIM Robot with the name of a local business or with simply a keyword and the robot replies with related directory listings. The Wall Street Journal robot lets users set up news alerts to be delivered via AIM, as well as request stock prices.

For those who have been under an IT rock, Time Warner is looking to sell off AOL. With Yahoo dropping out the main parties interested are Microsoft and Google.

AOL's instant messaging technologies and userbase is its crown jewel. While Google does have an IM service I couldn't figure out why Google would be interested. How wrong I was! Google doesn't care about AOL's dial-up customers or adding AIM users. Google sees AIM as a conduit to spread services.

Decius has a T-Mobile Sidekick. So does my friend Strick. Web browsing on it is about on par with a 9600 baud modem. While there are some services/proxies/gateways which will strip HTML down to something doable on a handheld, I find they leave much to be desired. This is because they are doing it in real time. At times its faster to IM Rattle to search for something than to actually search for something.

So what does this mean about IM? IM is fast. IM is faster than web browsing on most non-PC devices. AIM compatible IM clients exist in many mobile phones. AIM has a ton of existing users. Creating Google IM Robots to respond to Local searches, Direction requests, Maps, address lookups would fill a need for mobile devices. In short, AOL and AIM allows Google to expand beyond the computer.

Why would Google want AOL?


US Gov't weighs in on Sony DRM
Topic: Technology 4:55 pm EST, Nov 15, 2005

A representative of the United States government last week warned entertainment publishers against using CD and DVD copy protection software that hides inside computers.

"It's very important to remember that it's your intellectual property; it's not your computer. And in the pursuit of protection of intellectual property, it's important not to defeat or undermine the security measures that people need to adopt in these days," said Stewart Baker, the assistant secretary the Department of Homeland Security, at a conference.

oh how I wish he had said "its important not to endanger a computer or impede the fair use of the intellectual property."

Can't win them all.

US Gov't weighs in on Sony DRM


WHOIS: Holy Crap!
Topic: Technology 2:39 pm EST, Nov 15, 2005

Server Used: [ whois.pir.org ]

ida.org = [ 129.246.225.12 ]

Domain ID: D1226635-LROR
Domain Name: IDA.ORG
Created On: 11-Aug-1988 04: 00: 00 UTC
Last Updated On: 22-Oct-2004 21: 05: 23 UTC
Expiration Date: 10-Aug-2007 04: 00: 00 UTC
Sponsoring Registrar: Network Solutions LLC (R63-LROR)
Status: CLIENT TRANSFER PROHIBITED
Registrant ID: 19939329-NSI
Registrant Name: Institute for Defense Analyses
Registrant Organization: Institute for Defense Analyses
Registrant Street1: 4850 Mark Center Drive
Registrant Street2:
Registrant Street3:
Registrant City: Alexandria
Registrant State/Province: VA
Registrant Postal Code: 22311
Registrant Country: US
Registrant Phone: 1.70384525

A co-worker got a call from these guys today. Who did you contact in 1988 to even register? The US Commerce department? These guys are in VA and seem to scream Feds...

Update: These guys are serious players

WHOIS: Holy Crap!


Put on your thinking caps
Topic: Technology 11:34 am EST, Nov  3, 2005

Y Combinator is a new kind of venture firm specializing in funding very early stage startups. We help startups through what is for many the hardest step, from idea to company.

We invest mostly in software and Web services. And because we are ourselves technology people, we prefer groups with a lot of technical depth. We care more about how smart you are than how old you are, and more about the quality of your idea than whether you have a formal business plan.

Very cool concept, the deadline for their second batch of funding is past but there's always next time. Basically they provide you all the money you need to survive for a few months during which you do nothing but work on developing a prototype and business plan -- in return they have an investment in your company should it succeed.

Put on your thinking caps


Google Code: Projects
Topic: Technology 1:25 pm EST, Nov  1, 2005

Open Source Projects

Everyone always talks about how Google uses open source. Here is a list of open source projects google has started all of which are hosted on SourceForge.

Google Code: Projects


RE: TinyDisk - An anonymous shared file system on top of TinyURL.
Topic: Technology 11:58 am EDT, Oct 25, 2005

colorado wrote:
This sounds useful for creating add-on modules for open source CMS (Content Management System) web apps. Can TinyDISK or NanoURL be installed and used on a remotely hosted unix server and MySQL database, administered via FTP or through a web-baseed interface like cpanel?

Sure. NanoURL was written to test TinyDisk and to provide a framework for future services.

What most of the slashdot crowd doesn't seem to get is:

-This hack is about how things like PHP magic quotes cannot secure you if your web application design is bad.
-This hack is about how to write extensions to web applications, hopefully adding value to them (Chicagocrime.org)
-This hack could be applied to nearly any service on the Internet.
-This hack is crippled by default to *NOT* flood TinyURL.
-This hack is supposed to be fun. Come on, there's a picture of a dude hugging a Penguin in there now!

RE: TinyDisk - An anonymous shared file system on top of TinyURL.


(Last) Newer << 12 ++ 22 - 23 - 24 - 25 - 26 - 27 - 28 - 29 - 30 ++ 40 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0