One of Microsoft’s recent patches should really be installed right away on any system running Remote Desktop Protocol. It’s only a matter of time – weeks at best, days at worst — before reverse engineers get to work on the patch and start crafting an exploit. Details available at the ISC.
WPS, or WiFi Protected Setup, is a vendor-neutral scheme to make it easier for computer neophytes to securely configured a home wireless access point. Unfortunately, the PIN-based scheme it uses for authentication is easily bruteforced.
From the article:
“When the PIN authentication fails the access point will send an EAP-NACK message back to the client. The EAP-NACK messages are sent in a way that an attacker is able to determine if the first half of the PIN is correct. Also, the last digit of the PIN is known because it is a checksum for the PIN. This design greatly reduces the number of attempts needed to brute force the PIN. The number of attempts goes from 108 to 104 + 103 which is 11,000 attempts in total.”
The recent capture of an American drone by Iranian forces has been a hot news item. Interestingly, Iranian engineers are coming forward with information on how it was captured. Rather than trying to crack the encryption on the command-and-control link to the pilot, they used spoofed GPS data to force its autopilot to land in Iran, all the while thinking it was in Kandahar. Nice hack.
HP is looking into some new attacks on their Laserjet printer line, discovered by researchers at Columbia. It seems that the printers will, by default, accept unauthenticated firmware updates sent along with a print job. Uh-oh.
From a post on the Interesting People mailing list:
Craig S Wright says: “I was contracted to test the systems on a Boeing 747. They had added a new video system that ran over IP. They segregated this from the control systems using layer 2 – VLANs. We managed to break the VLANs and access other systems and with source routing could access the Engine management systems.”
Poor SSL. It’s been the standard for so long, but it’s had a rough go of it the last few months. First there were the breaches at Comodo and Diginotar, allowing intruders to generate seemingly-authentic certs to trick users, and now this.
In particular, security researchers Juliano Rizzo and Thai Duong have built a tool that’s capable of decrypting and obtaining the authentication tokens and cookies used in many websites’ HTTPS requests. “Our exploit abuses a vulnerability present in the SSL/TLS implementation of major Web browsers at the time of writing,” they said.
The world of hacking has always been one built on boasting and prestige – but now it’s official. A new leaderboard at rankmyhack.com is tracking live exploits, awarding points based on complexity and skill, and hoping to become the definitive ranking system for the computer underground.
Someone who cracked baidu.com is at the top of the list. Impressive stuff.
A new Apache denial-of-service tool, named “Apache Killer”, has been posted on Full Disclosure and usage has been observed in the wild. Both the 1.3 and 2.0 codebases are affected – the Apache project says that a patch is upcoming. More details at the link.
Sure, if you want to steal someone’s ATM PIN, you can shoulder-surf it, or use a pinhole camera, or even compromise the ATM itself. But why bother when a thermal camera is so much easier?
Nearly four million pages have been infected with iframe exploits due to a hole in older versions of the osCommerce business software. If your own web site is using osCommerce, make sure that it is a patched, current version.