web-archive-net.com » NET » S » SHORTINFOSEC.NET

Total: 241

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Information Security Short Takes: Obtaining a valid MAC address to bypass WiFi MAC Restriction
    18 March 1 February 4 January 6 Alexa Rank Follow me on Twitter Recent Posts Maintaining quality in outsourcing telco services Engaging a team for a security analysis Hacking Virtual Machines Part 1 Sniffing Mac Antivirus Staying careful and safer Steganography Passing through the defenses Choosing a Disaster Recovery Center Location Avoiding security complications when servicing desktop equpment Fuzzing with OWASP s JBroFuzz Mitigating Risks of the IT Disaster Recovery Test Internet Security Categories antivirus 2 audit 1 biometrics 1 Blog carnival 8 business continuity 9 competition 2 Computer security 42 Databases 3 disaster recovery 2 encryption 13 forensics 11 fraud 7 GPS 1 How To 29 Incident Management 7 information security 194 information strategy 78 Instant Messaging 2 malware 1 microsoft 9 Network security 22 penetration testing 38 Physical security 4 privacy 21 SLA 6 software development 14 Solution building 34 steganography 2 Templates 2 training and certification 4 trojan 1 windows 6 Site Meter BlogCommunities Obtaining a valid MAC address to bypass WiFi MAC Restriction A reader in the comments on our post Example Bypassing WiFi MAC Address Restriction made the following comment Obtain a valid MAC address that is allowed on the network And that right there is the hard bit Perhaps an article on that before declaring how easy it is First I would like to clarify several things Every hacker attack requires some amount of specific knowledge time effort and resources If this wasn t the case they wouldn t have been called hackers they would be called everyone it is not the goal of this site to provide step by step tutorials on actual hacker attack methods The presented MAC Address restriction protection is very easy and it requires the least amount of knowledge time and resources compared to bypassing other protection methods and

    Original URL path: http://www.shortinfosec.net/2008/07/obtaining-valid-mac-address-to-bypass.html (2016-04-27)
    Open archived version from archive


  • Information Security Short Takes: Example - Bypassing WiFi MAC Address Restriction
    Part 1 Sniffing Mac Antivirus Staying careful and safer Steganography Passing through the defenses Choosing a Disaster Recovery Center Location Avoiding security complications when servicing desktop equpment Fuzzing with OWASP s JBroFuzz Mitigating Risks of the IT Disaster Recovery Test Internet Security Categories antivirus 2 audit 1 biometrics 1 Blog carnival 8 business continuity 9 competition 2 Computer security 42 Databases 3 disaster recovery 2 encryption 13 forensics 11 fraud 7 GPS 1 How To 29 Incident Management 7 information security 194 information strategy 78 Instant Messaging 2 malware 1 microsoft 9 Network security 22 penetration testing 38 Physical security 4 privacy 21 SLA 6 software development 14 Solution building 34 steganography 2 Templates 2 training and certification 4 trojan 1 windows 6 Site Meter BlogCommunities Example Bypassing WiFi MAC Address Restriction Among security professionals it is a well known fact that using only MAC Address restriction is useless as a protection mechanism for WiFi But for the general publiv this is still a popular method This post aims to show how easy it is to actually hijack someones MAC address and bypass this restriction Here is the process as used on a Windows laptop Obtain a valid MAC address that is allowed on the network Download macshift created by one of Internet s renaissance men Nate True Copy macshift exe to c Windows System32 Find the windows name of your wireless connection from the Network Connections for example Wireless Network Connection Open a Command Prompt start run cmd exe Obtain your adapter s MAC address by typing ipconfig all on the command prompt The result will include the MAC address of all interfaces Type macshift VALID MAC ADDRESS i Wireless Network Connection Here is an example screenshot Happy surfing NOTE Don t forget to change your MAC to it s original value when you are done The process without step 1 takes a total of 5 minutes Now it can be argued that it is not easy to obtain a valid MAC address here are two scenarios If the WiFi network does not allow for unlisted MAC addresses to associate then you can Put your WiFi card in monitor mode and capture some traffic from there it is easy to find the MAC addresses Write a brute force program that will cycle the MAC address of your adapter and try to associate with the LAN You can optimize the brute force by finding a laptop that can connect to the network and record the actual model Then you can just cycle through half of the MAC address bytes If the WiFi network allows for unlisted MAC addresses to associate and then uses some sort of egress filtering on the router or service selection gateway things are much easier just run a sniffer for 5 minutes and collect all other MAC addresses on the network Filter out the gateway MAC and at a later time usually in the dead of night try them one by one This example is presented

    Original URL path: http://www.shortinfosec.net/2008/07/example-bypassing-wifi-mac-address.html (2016-04-27)
    Open archived version from archive

  • Information Security Short Takes: 5 Rules to Home Wi-Fi Security
    GPS 1 How To 29 Incident Management 7 information security 194 information strategy 78 Instant Messaging 2 malware 1 microsoft 9 Network security 22 penetration testing 38 Physical security 4 privacy 21 SLA 6 software development 14 Solution building 34 steganography 2 Templates 2 training and certification 4 trojan 1 windows 6 Site Meter BlogCommunities 5 Rules to Home Wi Fi Security The philosophy of security is to strike the delicate balance between cost of protection and usability Making something very secure is very expensive but making something very usable means that the bad guys can use it The same philosophy goes for a hacker attack the cost of the attack should always be less then the value of the prize Here are 5 rules that maintain a very reasonable level of usefulness of a home Wi Fi network while increasing the cost of an attack to the hacker beyond the value of the prize Always choose a non default non broadcasting SSID this will not stop a more efficient attacker but it will avoid a good number of script kiddies A good name is one which contains both letters and numbers and cannot be deducted from the personal info of owner of the network Always set up the strongest possible encryption Choosing the strongest encryption available is always a strong attack mitigating factor For home users with 802 11b g LANs at the moment it is WPA 2 Encryption Maintain password complexity and change it often Always set up a complex password to WPA 2 at least 8 characters long containing at minimum characters and numbers that cannot be deducted from the personal info of owner of the network Make a habit of changing it at least once every three months Maintain minimal possible range of the Wi Fi

    Original URL path: http://www.shortinfosec.net/2008/04/5-rules-to-home-wi-fi-security.html (2016-04-27)
    Open archived version from archive

  • Information Security Short Takes: Template - Corporate Information Security Policy
    27 June 25 May 15 April 18 March 1 February 4 January 6 Alexa Rank Follow me on Twitter Recent Posts Maintaining quality in outsourcing telco services Engaging a team for a security analysis Hacking Virtual Machines Part 1 Sniffing Mac Antivirus Staying careful and safer Steganography Passing through the defenses Choosing a Disaster Recovery Center Location Avoiding security complications when servicing desktop equpment Fuzzing with OWASP s JBroFuzz Mitigating Risks of the IT Disaster Recovery Test Internet Security Categories antivirus 2 audit 1 biometrics 1 Blog carnival 8 business continuity 9 competition 2 Computer security 42 Databases 3 disaster recovery 2 encryption 13 forensics 11 fraud 7 GPS 1 How To 29 Incident Management 7 information security 194 information strategy 78 Instant Messaging 2 malware 1 microsoft 9 Network security 22 penetration testing 38 Physical security 4 privacy 21 SLA 6 software development 14 Solution building 34 steganography 2 Templates 2 training and certification 4 trojan 1 windows 6 Site Meter BlogCommunities Template Corporate Information Security Policy Implementing an Information Security Management System within a company is not a simple process But as all things it needs to begin somewhere and the right place to begin is at the top All information security efforts should start with a strong top management commitment This commitment is usually communicated via the Information Security Policy The Policy needs to be concise easily readable by all employees and should clearly express the following statements Management is very serious about Information Security All employees are responsible for and must enforce Information Security Operational responsibility and guidelines for the Information Security Management will be delegated to the named persons and via the named documents The Policy should be an internal document available and emphasized on the intranet and if possible on the public web site

    Original URL path: http://www.shortinfosec.net/2008/07/template-corporate-information-security.html (2016-04-27)
    Open archived version from archive

  • Information Security Short Takes: San Francisco WAN Lockout - Pointing Fingers at Everyone Responsible
    He created an authentication scheme where only he had administrative access on the network Apparently the situation in points 1 to 3 was well know to the users and management and was accepted as such Mr Childs clashed with the new Security Manager on the subject of authentication and control which led to poor formal review The poor performance review and other undocumented power struggles led to the dismissal of Terry Childs and his subsequent arrest after he refused to relinquish the administrative passwords Who s responsible Terry Childs He played god and isolated all other network engineers from the network thus preventing them from any chance to learn how to manage the network He created and to date is enforcing the actual lockout that is the reason for all this ruckus Terry Childs direct line manager and the one level above They knew that Terry Childs had absolute control over the network and permitted that If they were uninformed of the situation they should be fired for gross incompetence They did not create conditions for knowledge distribution and reduction of dependency on a single person Terry Childs could have fallen ill or gotten in a car accident they still need another engineer They did not identify that there is a potential superiority problem with Terry Childs This superiority problem usually manifests in insubordination when the control is taken away from a person Poor human resource management if all other network admins were so incompetent that administrative authority couldn t be given to them why did they hire them Top management They delayed or avoided implementing a security policy which Terry Childs would have had to obey They did not create no single point of failure strategy for their personnel Security Officer He did not identify a risk that the employee may cause serious problems and did not propose alternative workarounds for instance hire the equipment manufacturer professional services to regain control and lock out Terry Childs Entire line management Poor problem management Once it became clear that it will be difficult to regain control over the LAN they fired Mr Childs and called the cops This only worsened the problem since the cat is out of the bag and the problem is still unresolved So someone in the great City of San Francisco should now go around and actually look into the work of all named here because incident caused by Terry Childs is just the effect not the root cause Talkback and comments are most welcome 1 49 PM Email this post Labels information security information strategy 4 comments Anonymous said 1 Apparently Mr Childs was the only person with unrestricted administrative right to manage the network supposedly because of the incompetence of the other members of the team Terry Childs was the only person directed and paid by the City of San Francisco to implement manage and secure the FiberWAN network Whether or not anyone else was competent is irrelevant to this particular point The city did

    Original URL path: http://www.shortinfosec.net/2008/07/san-francisco-wan-lockout-pointing.html (2016-04-27)
    Open archived version from archive

  • Information Security Short Takes: Network Access Control - A Solution with Problems
    Alexa Rank Follow me on Twitter Recent Posts Maintaining quality in outsourcing telco services Engaging a team for a security analysis Hacking Virtual Machines Part 1 Sniffing Mac Antivirus Staying careful and safer Steganography Passing through the defenses Choosing a Disaster Recovery Center Location Avoiding security complications when servicing desktop equpment Fuzzing with OWASP s JBroFuzz Mitigating Risks of the IT Disaster Recovery Test Internet Security Categories antivirus 2 audit 1 biometrics 1 Blog carnival 8 business continuity 9 competition 2 Computer security 42 Databases 3 disaster recovery 2 encryption 13 forensics 11 fraud 7 GPS 1 How To 29 Incident Management 7 information security 194 information strategy 78 Instant Messaging 2 malware 1 microsoft 9 Network security 22 penetration testing 38 Physical security 4 privacy 21 SLA 6 software development 14 Solution building 34 steganography 2 Templates 2 training and certification 4 trojan 1 windows 6 Site Meter BlogCommunities Network Access Control A Solution with Problems A lot of companies lately are seeing that their employees attach personal and company laptops to corporate networks and bring Trojans and viruses into the network A defence mechanism for this risk is seen in Network Access Control NAC solutions However as all new solutions this one can problems of its own The fundamental idea behind NAC is to allow the network to make access control decisions based on gathered intelligence about end systems laptops computers To do this effectively any NAC system needs to do the following Establish controls to allow deny access at the network level Gather information about the end systems This means that the NAC system will need to integrate with network elements and have partial or full control over them to enable disable access access to inventory software and possibly even install a client agent on every end system When in operation the NAC system should identify every end system connecting to the network authenticate it against a preset policy verify it s compliance to antivirus levels patch level and possibly group policy applied and take protective measures The measures can range from simple denial of access via message for manual update of systems to become compliant to automatic updating of all required elements to make the system compliant Primary targets for NAC are financial institutions and large corporations with distributed offices There are definite benefits from An intelligent access control also system has it s drawbacks I did an interview about the percieved risks of NAC implementation with a CEO a Network Admin a System Admin and a user of a company Here are the problems that they identify The CEO s view A NAC is costly to implement the costs are not only for the NAC system we need to upgrade a lot of network equipment to be interoperable with the NAC A NAC will require a large effort to achieve full compliance on all end systems This will reflect in additional operating expenditures for the personnel effort The NetAdmin s view A NAC will include

    Original URL path: http://www.shortinfosec.net/2008/06/network-access-control-solution-with.html (2016-04-27)
    Open archived version from archive

  • Information Security Short Takes: Example - SMTP message spoofing
    6 May 3 March 1 January 1 2010 47 December 2 November 7 October 8 September 6 June 1 May 1 April 2 March 13 February 1 January 6 2009 70 December 13 November 17 October 4 July 1 June 2 April 6 March 8 February 9 January 10 2008 130 December 5 November 4 October 3 September 2 August 20 July 27 June 25 May 15 April 18 March 1 February 4 January 6 Alexa Rank Follow me on Twitter Recent Posts Maintaining quality in outsourcing telco services Engaging a team for a security analysis Hacking Virtual Machines Part 1 Sniffing Mac Antivirus Staying careful and safer Steganography Passing through the defenses Choosing a Disaster Recovery Center Location Avoiding security complications when servicing desktop equpment Fuzzing with OWASP s JBroFuzz Mitigating Risks of the IT Disaster Recovery Test Internet Security Categories antivirus 2 audit 1 biometrics 1 Blog carnival 8 business continuity 9 competition 2 Computer security 42 Databases 3 disaster recovery 2 encryption 13 forensics 11 fraud 7 GPS 1 How To 29 Incident Management 7 information security 194 information strategy 78 Instant Messaging 2 malware 1 microsoft 9 Network security 22 penetration testing 38 Physical security 4 privacy 21 SLA 6 software development 14 Solution building 34 steganography 2 Templates 2 training and certification 4 trojan 1 windows 6 Site Meter BlogCommunities Example SMTP message spoofing I got reactions from readers regarding my Spear Phishing post that creating a perfect spoofed e mail representing the manager is impossible Although I agree with this opinion I must stress that the attacker can create a near perfect spoofed message Here is how All he needs is an open relay mail server a mail server that will accept and relay e maiil messages regardless of sender and recipient parameters Then

    Original URL path: http://www.shortinfosec.net/2008/06/example-smtp-message-spoofing.html (2016-04-27)
    Open archived version from archive

  • Information Security Short Takes: Tutorial - Mail Header Analysis for Spoof Protection
    Point to a suspect email in your inbox and right click On the context menu select Options A new window will appear In that window the e mail headers are displayed at the bottom in the box titled Internet headers Outlook express all versions Point to a suspect email in your inbox and right click On the context menu select Properties A new window will appear In that window click on the details tab The e mail headers are displayed in the box titled Internet headers for this message Gmail When you open an e mail message at the top there is a link titled Show original Click on it and a new browser window will appear with the e mail header at the top Yahoo Mail When you open an e mail message at the bottom there is a link titled Full Headers Click on it and the windows w ill re render showing a very nice presentation of the e mail header at the top II How does e mail headers work First lets review how the SMTP Simple Mail Transfer Protocol works to transfer your e mails Let s assume that you are sending an e mail message for mailto webmaster shortinfosec net When you click send your local mail server will receive the e mail message for further delivery The mail server will then break the recipient address into user webmaster and domain shortinfosec net The mail server needs to know which mail server knows how to deliver an e mail to webmaster shortinfosec net For this it will query the DNS server asking for a Mail eXchanger MX record for the domain shortinfosec net The MX record is actually a DNS name of another mail server which is registered as authoritative for a specific domain i e knows what to do with e mails for that domain The mail server contacts the MX server the shortinfosec net domain and delivers the e mail message Then the MX server will follow internal rules on how to deliver the message to webmaster shortinfosec net There are specific mail servers on the Internet called relay servers which don t actually hold real mailboxes They are usually hosted by ISP s and provide availability to receive e mails for many domains which are then internally delivered to the real mail servers residing on slow links or hidden behind corporate firewalls An e mail message may traverse multiple hops on the Internet before being delivered to the recipient Each mail server that processes an e mail message during it s transit will add a line to the e mail header of the e mail message A legitimate mail server will NEVER rewrite or alter an e mail header This was originally designed for troubleshooting but is very useful in spotting scams and fake e mails III How to I analyze the e mail headers Let s review a real life example The following e mail headers are from an e

    Original URL path: http://www.shortinfosec.net/2008/07/mail-header-security-analysis.html (2016-04-27)
    Open archived version from archive