tssci security

Bust through HTTP Proxies

I came across a neat little command that will allow you to SSH through an http-proxy. Useful for when you're at a library or elsewhere and need to make an outbound SSH connection and the only thing stopping you is a proxy.

Features of connect.c are:

Hacking Techniques for Law Enforcement - A good idea or asking for trouble?

Mikko @ F-Secure made a post on their blog about whether or not law enforcement organizations should be permitted to utilize security tools and hacking techniques in investigations that got me thinking. To me the answer to this question is very clear -- NO WAY JOSE! -- not unless proper oversight can be implemented and safe guards to protect our privacy are devised. EFF, help us on this one!

Given that police have been abusing laws made to combat terrorism to violate the rights of US citizens that are not members of terrorist organizations, I think that opening the gates to allowing the use of hacking techniques and malware invites a whole host of other problems.

The first problem that I have with this is the cost of training. Will training police in computer security be cost-effective? I would be leaning more towards saying no. Learning security techniques is not something that they can create two week training courses on. Also, will the cost of providing advanced security training to police provide enough benefit to us to justify the spending?

The second problem that I have with this is the risk associated with police using these tools and techniques without proper understanding of the tools and their effects. Will Joe Blow Officer here in Phoenix know what he's doing or will he be damaging my server I have at home while he tries to install his spyware?

Another problem that I have with this is how will prosecutors be able to prove that the data collected by investigators hasn't been tampered with or fabricated. Without proper controls and oversight for these types of operations officers with an axe to grind will be able to go penetrate computers and plant fabricated evidence. Will companies be forced through legislation to preinstall the software onto computers prior to shipping them to consumers? and if so, will it be a felony to remove it?

Lastly, if we properly secure our systems against what I feel is a gross violation of my rights to privacy, will there be legal ramifications? Will I get sent to jail because I have a proper firewall and IDS? Will they 'disarm' us of security tools like Britain did to their citizens when taking firearms? Will security tools be outlawed without a license to own them? We need to think about things like this and tell our local government officials what we think before it's too late.

What makes a security project fail?

I started working on a project that has no doubt, been done before. It's something no one has publicly posted information on and it's not new -- something everybody wants yet every vendor says is impossible. The problem with this project, is it can't be managed by IT security at a "sysadmin level" in production. The only role IT security will have in the project after rollout, is implementing new features. If it can't serve the customers (site owners) exactly as they want at an abstracted level, it's just another project to waste several weeks on.

Too often in security we'll do things just to please us -- to make us feel good, but what value do we really add? That's what I learned this first week of my internship.

Disable Firefox automatic updates

Christopher Soghoian has an excellent remote vulnerability disclosurereport concerning Firefox Add-ons. More than several extensions from various 3rd parties are vulnerable to man-in-the-middle attacks.

Q: Who is at risk?

A: Anyone who has installed the Firefox Web Browser and one or more vulnerable extensions. These include, but are not limited to: Google Toolbar, Google Browser Sync, Yahoo Toolbar, Del.icio.us Extension, Facebook Toolbar, AOL Toolbar, Ask.com Toolbar, LinkedIn Browser Toolbar, Netcraft Anti-Phishing Toolbar, PhishTank SiteChecker.

Q: When am I at risk?

A: When you use a public wireless network, an untrusted Internet connection, or a wireless home router with the default password set.

He provides two fixes to the problem:

  1. Disable extensions not obtained through https://addons.mozilla.org or through an authorized SSL enabled website. (Add-ons obtained through the official Mozilla add-on repository and/or secured, SSL enabled sites are not vulnerable to MITM attacks)
  2. Disable automatic updates of Firefox Add-ons

I disable automatic updates for Firefox on my laptop through Edit>Preferences>Advanced>Update tab (Tools>Options>Advanced>Update tab for Windows users).

The thing that gets me about this vulnerability is it doesn't seem very probable. Around 75% of my computer illiterate friends use Firefox, and over 90% of them don't even know what an extension or add-on is, since they were so used to IE and are accustomed to that level of functionality. They still have the default news RSS feed in the bookmark toolbar and all bookmarks are under the top directory). It would take an attacker watching unsecured wifi networks or cafe hotspots all day long to find someone vulnerable to exploit. Doesn't seem very economical to me, when there are so many other vectors for attack.

Dell + Google Toolbar... profit??!?!

Andrew Hay writes:

Dell & Google Secretly Installing Software to Make Money Off Your Typos

  • Those bastards, how is this business practice not illegal?

New Dell machines that include the Google toolbar as part of a marketing agreement also include a secret program that redirects non-url information typed into a browser window to a Dell-branded page filled with ads. For example if you type in dogfood.cim, instead of getting a browser error message, the secret Google Address Redirector redirects the query to an ad-filled page of search results.

They're simply redirecting invalid DNS requests to their own page. When you use OpenDNS, they redirect mistyped queries to their own page as well. OpenDNS is having a fit because it's competing with their revenue stream, powered by Yahoo!

To remove all installed software, leaving you with a clean system and for those who don't wish to reformat their new computer, run PC Decrapifier.

« Newer entries — 33 — Older entries »

blog comments powered by Disqus