Friday, August 30, 2002

Internet anonymity for Windows power users
Our previous article, "Do-it-yourself Internet anonymity" was targeted towards average Windows users. It generated a startling number of e-mail requests for some advanced tactics, which I'm happy to supply. However, power user or not, I'd recommend at least skimming the earlier article if you haven't read it, just to ensure that you're not forgetting something obvious and useful. I'm not going to re-cap much of it here.
Proxys - 4 - All : Helping Secure Your Privacy & Anonymity on the Internet
These proxy servers can be used by anyone.
SOCKS
SocksCapTM automatically enables Windows-based TCP and UDP networking client applications to traverse a SOCKS firewall. SocksCap intercepts the networking calls from WinSock applications and redirects them through the SOCKS server without modification to the orginal applications or to the operating system software or drivers.
Do-it-yourself Internet anonymity
Along with the recent government hysteria over terrorists, we've seen legislative measures and 'emergency powers' inviting law-enforcement agencies worldwide to conduct Internet surveillance on an unprecedented scale. But because the state-of-the-art of electronic dragnets makes it difficult if not impossible to exclude the comings and goings of innocent citizens, we thought this a good time to run down the basic techniques for ordinary, law-abiding folk to come and go anonymously on the Net, and keep their private business private.

Thursday, August 29, 2002

E-mail a treasure trove for cops
Not since the glory days of letter-writing, before the advent of the telephone, have people committed so much revealing stuff to written form as they do in the age of computers. All those e-mail messages and electronic files are a treasure trove of evidence for law enforcement officers, whether they are targeting terrorists, crooked CEOs or local drug dealers.
Next-Generation Win32 exploits: fundamental API flaws
This paper presents a new generation of attacks against Microsoft Windows, and possibly other message-based windowing systems. The flaws presented in this paper are, at the time of writing, unfixable. The only reliable solution to these attacks requires functionality that is not present in Windows, as well as efforts on the part of every single Windows software vendor. Microsoft has known about these flaws for some time; when I alerted them to this attack, their response was that they do not class it as a flaw - the email can be found here. This research was sparked by comments made by Microsoft VP Jim Allchin who stated, under oath, that there were flaws in Windows so great that they would threaten national security if the Windows source code were to be disclosed. He mentioned Message Queueing, and immediately regretted it. However, given the quantity of research currently taking place around the world after Mr Allchin's comments, it is about time the white hat community saw what is actually possible.

This paper is a step-by-step walkthrough of how to exploit one example of this class of flaw. Several other attack methods are discussed, although examples are not given. There are many ways to exploit these flaws, and many variations on each of the stages presented. This is just one example.
WirelessSniffer
More and more WirelessSniffers are becoming available. These could be quite useful.
Computer Fraud & Security
Computer Fraud & Security has grown with the fast-moving information technology industry and has earned a reputation for editorial excellence with IT security practitioners around the world.

Every month Computer Fraud & Security enables you to see the threats to your IT systems before they become a problem. It focuses on providing practical, usable information to effectively manage and control computer and information security within commercial organizations.

Current News - A round up of all the latest IT fraud and security news worldwide giving you advance warning of all the latest threats and countermeasures.
Security Reports - Leading experts discuss recent headline security events will help you better understand the problems and learn from the mistakes of others.
In-depth Feature Articles - Providing advice and solutions to key IT security management issues to help you develop, implement and strengthen your corporate IT security policy.
Regular columns: Tales from the Crypt examines the changing face of international cryptography policy. Web Review takes a look at excellent new Web sites to guide the security professional to useful pages. Shockwave Writer offers a stimulating view on a number of hot topics in IT security.
Technical aspects - IT security explained in clear English to help you convey the value of IT security to board level.
Computer Law & Security Report
Equally accessible to lawyers and computer security professionals alike, The Computer Law and Security Report regularly covers:
Data protection and privacy
Data and software protection
European community developments in IT, IP and telecoms law
IT contracts
Telecommunications law and online liability
Internet law and security policy
Electronic commerce
Internet fraud and misuse
Systems security and risk management

The Forum includes more than 80 specialists in computer law and security - between them specializing in every aspect of computer and communications law - spotting trends, highlighting practical concerns, monitoring new problems, and outlining key developments.

Each issue contains well-researched reliable and thought provoking articles, case studies, detailed features and news reports - ensuring that you do not miss out on the impact of legislation worldwide and that you understand the problems of managing the legal and security requirements of computer use.

Wednesday, August 28, 2002

Who’s spying on my Hotmail?
Think using Yahoo or Hotmail e-mail at work protects you from your boss’ prying eyes? Think again. New spy software essentially lets employers or parents co-pilot virtually any kind of e-mail account, including private Web-based e-mail accounts like Yahoo and Hotmail. A new version of eBlaster spyware will secretly forward all e-mail coming and going through such Web-based accounts to a spy’s e-mail, allowing anyone to “ride-along” even the supposedly private e-mail.
Loophole Software
Loophole Server and Loophole Client use a technique called HTTP Tunneling to avoid filtering by the firewall or web filter. This process makes Loophole's Internet traffic appear to be web browsing.
Tunneling combines with strong encryption to make your Internet traffic secure against monitoring.
Doxpara Researc!
DoxPara Research exists as a repository for information security analysis, UI theory, and the miscellaneous writings of its founder, Dan Kaminsky.
WhiteHat Arsenal
WhiteHat Arsenal is designed to be the next generation of professional web application security audit software. Architected from the ground up to be a generic web application security productivity tool, WhiteHat Arsenal provides security professionals and web application developers access to the tools they need to make the job of securing web applications faster and easier than ever before.
Mixmaster
Mixmaster is an anonymous remailer. Remailers provide protection against traffic analysis and allow sending electronic mail anonymously or pseudonymously. Mixmaster consists of both client and server installations.
Ettercap
Ettercap is a multipurpose sniffer/interceptor/logger for switched LAN.
It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis.
Achilles
Achilles is a tool designed for testing the security of web applications. Achilles is a proxy server that allows you to intercept and maipulate data sent to and received from the destination server. Achilles supports secure socket layer (SSL) transactions. Achilles waits to receive all packets before building the request or reply and features the ability to recalculate the content-length field before retransmitting to avoid invalid request errors.
HTTPush
HTTPush aims at providing an easy way to audit HTTP and HTTPS application/server security. It supports on-the-fly request modification, automated decission making and vulnerability detection through the use of plugins and full reporting capabilities.
Websleuth - Open Source Web Application Security Auditing Tool
WebSleuth was developed from my own personal need for a web application analysis tool. It represents the exact functionality I found necessary in the trenchs of a security audit.

Sleuth puts a nice twist on efficiency of design and visual tools keeping a complete toolbox of testing aids at the intutive auditors fingertips.
The Open Web Application Security Project
The Open Web Application Security Project (OWASP) is an Open Source community project staffed entirely by volunteers from across the world. The project is developing software tools and knowledge based documentation that helps people secure web applications and web services.
Dos and Don'ts of Client Authentication on the Web
Several publications.
HTTP Basic Auth Encode and Decode
Base64 en- and decoder.
Firewalk
Firewalking is a technique developed by Mike D. Schiffman and David E. Goldsmith that employs traceroute-like techniques to analyze IP packet responses to determine gateway ACL filters and map networks. Firewalk the tool employs the technique to determine the filter rules in place on a packet forwarding device. The newest version of the tool, firewalk/GTK introduces the option of using a graphical interface and a few bug fixes.
The Internet Printing ProtocolThe Internet Printing Protocol (IPP) is a new development in the TCP/IP suite of protocols. It is intended to make printing over a network or a larger internetwork much easier, based on IP addresses. Companies such as Hewlett-Packard have already introduced some devices that support the proposed IPP standards, and more expected to arrive as IPP works toward a standard.

This article will explain what IPP is and how it works. Although may not have much need for IPP if you only have an printer attached to your computer, it does show how network based printing can be used.
Network Monitoring Tools
This is a list of tools used for Network (both LAN and WAN) Monitoring tools and where to find out more about them. The audience is mainly network administrators.

Monday, August 26, 2002

Eavesdropping Detection and Counterespionage Consulting
Eavesdropping Detection and Counterespionage Consulting for Business & Government

Specialists in detecting…
• audio eavesdropping
• computer intercepts
• video voyeurism
• wiretaps
• technical espionage
• competitive intelligence
How to prepare for and react to being hacked
You have that funny feeling that something is not right. One of your admins reported that his Unix box keeps rebooting in OpenWindows. You sit down at the box, type some commands, and wham, it reboots again. This doesn?t look like a bug, you?ve been hacked! Now what do you do?
Audiotel
Established in 1978 Audiotel International is the leading manufacturer of electronic countermeasures equipment and other secure communications products. Today we offer a complete range of electronic sweep equipment for all types of situation. We combine the latest advances in technology with the need to keep the equipment quick and practical to use.
Air Magnet
AirMagnet provides mission-critical wireless LAN (WLAN) administration and diagnostic tools to help companies deploy, administer and secure their networks.
The company's products address the unique challenges confronting network and security professionals in deploying and maintaining WLANs, by offering a new generation of integrated solutions designed for wireless network and security administration.
Unix logfiles
We'll discuss the unix logfiles, how the administrator of the system can secure the system enough to have log files containing trustful and reliable information. We'll also discuss the possibilities for the hacker to trick the system logfiles and delete the traces of his activities. As always, I'm trying to discuss the things from 'both sides of chessboard'. Hackers and administrators are all the same, most of good and security-minded admins did some annoyance in past by hacking. In any case, if someone wants to secure his system well, its really important to understand things from both sides.
Tuning Red Hat for maximum performance
This tutorial details the ins and outs of transforming a stock, "out of the box" Red Hat installation into a finely tuned, stable system customized to individual needs and tastes. The material presented here is based on Red Hat 7.3, although many of the techniques and procedures discussed are equally applicable to other mainstream Linux distributions. And while the title uses the phrase "performance tuning," you'll soon discover that performance and security often go hand in hand.