:::: MENU ::::

Blog

  • Sep 30 / 2014
  • 0
Categories

ShellShock Vulnerability (CVE-2014-6271)

Hi All,

Recently A remotely exploitable vulnerability has been discovered by Stephane Chazelas in bash on Linux, and it is unpleasant. The vulnerability has the CVE identifier CVE-2014-6271. This affects Debian as well as other Linux distributions. The major attack vectors that have been identified in this case are HTTP requests and CGI scripts. Another attack surface is OpenSSH through the use of AcceptEnv variables.Also through TERM and SSH_ORIGINAL_COMMAND. An environmental variable with an arbitrary name can carry a nefarious function which can enable network exploitation.

What is Bash?
Bash, or bourne-again shell, is the default shell in Ubuntu. When you are interfacing with the terminal (either through the terminal emulator, over a tty, or ssh), you are generally typing commands that bash will read, and execute. Even if you do not use the terminal at all, you still have Bash.
http://en.wikipedia.org/wiki/Bash_(Unix_shell)

How does the exploit affects me?
Bash and the OS keep track of a set of environment variables that describe the current logged-on user, where to look for programs on the hard disk, and other such functions. By crafting an environment variable with a specific structure, an attacker might be able to execute code next time Bash starts.

Continue Reading

  • Apr 11 / 2014
  • 0
Advanced Hacks, Categories, Network Security, Security News

OpenSSL Heartbleed Vulnerability

Hello Every One,

Recently Web Researcher has  uncovered an extremely critical vulnerability in recent versions of OpenSSL in short this vulnerability allows anyone on the Internet to read the memory of the systems protected by the OpenSSL software.


openssl

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).CVE-2014-0160 is the official reference to this bug.

Continue Reading

  • Feb 14 / 2014
  • 0
Web Application Security

Insufficient Authorization- Yahoo (Bug Bounty)

Hi All,

Recently, I found an interesting issue qualifying for Yahoo bug bounty program.
Yahoo-logo

But before going into this let’s understand -

What Authorization means?
In generic term’s authorization talks about activity or role which he or she can perform. In terms of Information security this means access rights based on this Authorization is classified in to two categories :

  1. Horizontal Privilege -Basically User having same right’s in generic – all Facebook User
  2. Vertical Privilege - User having different right in generic – Admin user & Normal User

Continue Reading

  • Feb 09 / 2014
  • 0
Categories, Miscellaneous, Network Security, Security Fundamentals

Network Security Part 3

Know better Information Security with OSI Model.

This section will demonstrate common information security problems mapped with OSI seven layers and evaluate the same for solutions to secure the organisation’s information resources.

Layer 1 – Physical Layer

  • The physical layer is responsible for the physical communication between end devices .
  • The logical first step in securing our information is to insure that the physical resources are not compromised.
  • Quite often, technologists fail to recognize the importance of the simple measures, like properly locking storage units, server cabinets, equipment rooms and office spaces.
  • Gaining access to resources is the first step in compromising them. Where is the information stored and who might have physical access to it?
  • Typically, efforts to physically secure information are a shared responsibility between technologists and those who manage the facility in which the information resides.
  • In some organizations, you must have a card key, hardware key, biometric access to enter areas where sensitive information can be accessed.
  • Even with the resources physically locked, they are at risk.
  • Social engineering is a form of infiltration that takes advantage of common social interaction to gain physical access.
  • Environmental factors should also be considered.
  • In extreme circumstances, a good disaster recovery plan is essential in the event that information resources are compromised.
  • Off-site data storage, asset inventories and vendor contacts are critical to knowing what to replace, where to get replacements and how to restore access.

Continue Reading

  • Feb 09 / 2014
  • 0
Categories, Miscellaneous, Network Security, Security Fundamentals

Network Security Part 2

1.1       ISO/OSI Network Model

Layer 7 – Application Layer

The Application layer provides services to the software through which the user requests network services.
Your computer application software is not on the Application layer. This layer isn’t about applications and doesn’t contain any applications. In other words, programs such as Microsoft Word or Corel are not at this layer, but browsers, FTP clients, and mail clients etc.
A few of the most popular Application layer protocols are-

File Transfer Protocol (FTP): A protocol that enables a client to send and receive complete files from a server.

HyperText Transfer Protocol (HTTP): The core protocol of the World Wide Web.

Telnet: The protocol that lets you connect to another computer on the Internet in a terminal emulation mode.

Simple Mail Transfer Protocol (SMTP): One of several key protocols that are used to provide e-mail services.

Domain Name System (DNS): The protocol that allows you to refer to other host computers by using names rather than numbers.
Continue Reading

  • Feb 09 / 2014
  • 0
Categories, Miscellaneous, Network Security

Network Security Part 1

Hi All,

Along with database and web application security let’s spice up security domain with network security as if no network then nor database or web applications are useful ;-)

I am going to take you through network security as whole from basic to expert level. It will help you get better idea of Network Security. It’s just the reference for people who are interested in network security but don’t know from where to start there is more to do by own.

Always remember that Defense In Depth is Key of NETWORK SECURITY.

Yes let me know about your feedback and suggestions to improve this topic.

So Let’s begin!!!
Continue Reading

  • May 29 / 2013
  • 0
Database Security

Oracle Hardening – Part II

Hey there!! Time for next part after a long gap.

We will be going through security parameters to be configured. Let’s go through each important parameter in detail.

O7_DICTIONARY_ACCESSIBILITY

  • WHAT:
    • Controls restrictions on SYSTEM privileges. If the parameter is set to true, access to objects in the SYS schema is allowed. The default setting is false.
    • System privileges that allow access to objects in “any schema” are not allowed access to objects in the SYS schema.
  • WHY:Unauthorized/ Inadvertent access and changes to SYSTEM.

Continue Reading

Pages:12
Visit Us On FacebookVisit Us On TwitterVisit Us On YoutubeVisit Us On Google PlusCheck Our Feed