Archive

Posts Tagged ‘Confidence2010’

Confidence 2010: Microsoft Patch Analysis – Patch Tuesday – Exploit Wednessday

May 25th, 2010 No comments

By Yaniv Miron

lolcat adaptation #3

lolcat adaptation #3, a Creative Commons Attribution No-Derivative-Works (2.0) image from kevinsteele's photostream

Exploit wednessday ois the day after patch Tuesday, the second Tuesday of the month when Microsoft releases its patches. While some people say it’s impossible to write an attack in one day, Yaniv has seen it happen and tries to explain how.

This process is based on diffing. Diffing means finding the differences between the old and the patched version of the binary file.

This could be done on the same machine, or between two different versions of the OS (e.g. Windows XP and Vista).

The toolkit for a typical patch analysis consists of:

  • Diff programs
  • Compare programs
  • Decompiles  and compilers
  • Different versions of windows

Yaniv, then went off to demonstrate a to us the creation of an exploit for MS10-005.

First of all information from public source was gathered to find out which program was effected, what the root cause of the vulnerability was and in which version of Windows the problem is present.

The next part is extracting the patch and analyzing it. First this that needs to be done is finding the files that will be updated. The these files will be compared against the original file, just to find which functions have been changed.

Read more…

Confidence 2010: Well known vulnerabilities in human brain and behavior – common admin mistakes

May 25th, 2010 No comments

By Wojciech Bojdol

Wojciech started his talk by explaining the basic principles of social engineering.

The his talk highlights three bugs in human behaviour

Bug #1: We want to trust the world

We are not open to information that contradicts our own view. Information that contradicts our own believes costs us effort.

Bug #2: People are lazy

Read more…

Confidence 2010: Security Sucks

May 25th, 2010 No comments

By Eddie Schwartz  (@eddieschwartz and LinkedIn)

Security today is sold by three may motivations. FUD: Fear, Uncertainty and Doubt.

Security sucks because there are certain factors that you cannot do anything about. E.g. if you get a mail from your kids school that 10 children have fallen ill to a new disease, would you open it?

Eddie further highlighted that there is a significant imbalance between the defense and offence. Offence runs broad organizations that make money from there activities (Cybercrime) whereas defense is costing organizations money just to make sure nothing happens (IT Security)

There is quite a different perception if compliance aids security between security officers and information officers.

Read more…

Confidence2010: Anonymity, Privacy, and Circumvention with Tor in the Real World

May 25th, 2010 No comments

By Jacob Applebaum (@ioerror)Tor logo

Jacob had to start his talk without slides due to technical difficulties, but he did alright.

First off he talks about some treats against our privacy. Political plans for nation wide key escrow and wide scale data retention are popping up all over the western world.

The Australian web filter against child pornography has proven that these kind of filters don’t work. Before it was deployed nation wide the filter already succeeded in creeping its scope by blocking a dentists web site.

Jacob, personally, specifically cares about cases where Tor is used to censor people.Censorship will never serve humanity and in fact humanity becomes a slave to the truth of its sensors.

Read more…