Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security

Submission + - NetBIOS Design Allows Traffic Redirection (skullsecurity.org) 1

iago-vL writes: Security researchers at SkullSecurity released research demonstrating how the NetBIOS protocol allows trivial hijacking due to its design; they have demonstrated this attack in a tool called 'nbpoison' (in the package 'nbtool'). If a DNS lookup fails on Windows, the operating system will broadcast a NetBIOS lookup request that anybody can respond to. One vector of attack is against business workstations on an untrusted network, like a hotel; all DNS requests for internal resources can be redirected (Exchange, proxy, WPAD, etc). Other attack vectors are discussed here. Although similar attacks exist against DHCP, ARP, and many other LAN-based protocols, and we all know that untrusted systems on a LAN means game over, NetBIOS poisoning is much quieter and less likely to break other things.
Security

Submission + - Security-enhanced Linux distro can rebuild itself (openwall.com) 3

iago-vL writes: Last week, the Openwall Project released the latest build of Openwall GNU/*/Linux (Owl for short) (announcement). This distribution, which has the ability to completely rebuild itself from source, is designed from the ground up to be secure. From source code audits of critical components to advanced privilege separation, secure defaults, and integration of OpenVZ container-based virtualization, Owl makes a great server platform!

Comment Re:Bloat. (Score 5, Informative) 73

As the original poster, and the author of a dozen or more Nmap scripts, I agree 100%. If you look at the tool itself, you'll see that everything is fairly separate and independent, even if they share a common codebase -- between the scripting and the "bonus" tools, the core is still fairly tight.

My comment at the end about the bloat + Emacs was intended 100% as humour, not actual commentary. I'm hoping nobody took it as a legitimate stab at Nmap, because it wasn't.

Security

Submission + - Nmap 5.00 Released! (nmap.org)

iago-vL writes: "The long-awaited Nmap Security Scanner version 5.00 was just released (download)! This marks the most important release since 1997, and is a huge step in Nmap's evolution from a simple port scanner to an all-around security and networking tool suite. Significant performance improvements were made, and dozens of scripts were added. For example, Nmap can now log into Windows and perform local checks (PDF), including Conficker detection. New tools included in 5.00 are Ncat, a modern reimplementation of Netcat (with IPv6, SSL, NAT traversal, port redirection, and more!), and Ndiff, for quickly comparing scan results. Other tools are in the works for future releases, but we're still waiting for them to add email and ftp clients so we can finally get off Emacs!"
Security

Submission + - Using Conficker's tricks to root out infections (seclists.org)

iago-vL writes: "The folks at Nmap have done it again: despite having their domain blacklisted by Conficker, they released Nmap 4.85BETA8, which promises better detection of the Conficker worm. How? By talking to it on its own peer to peer network! By sending encrypted messages to a suspect host, Conficker.C and higher will reveal itself. This curious case of using Conficker's own tricks to find it is similar to the last trick that Slashdot reported. More info from the author can be found here, and you can download Nmap here (or, if you're a Conficker refugee, try this link instead)."

Comment Re:So... (Score 2, Informative) 288

That's correct. I added a 'safe' parameter last night, since the Connficker check is safe, and have been advocating its use in all my posts (you'll see "script-args=safe=1" in everything). Watch out for that.

And for what it's worth, even if 'safe' is missing, it's only going to crash stuff that isn't patched for MS08-067.

Comment Re:So... (Score 0, Troll) 288

Glad to hear it! When I wrote the ms08-067 script, I was surprised to see it posted around the Internet -- I wrote it as a demo of what Nmap can do, not as a production-grade scanner, and I guess it ended up being more useful than the other scripts that I've put *far* more work into :)

Comment Re:From the article (Score 1, Troll) 182

Don't forget that every security patch that Microsoft releases is a hole that blackhats could already have been exploiting. Patches created now could (and often do) fix vulnerabilities dating back to the release of Windows 2000 or Windows NT. There's no way to guarantee that the holes aren't known and exploited by others.

That being said, any system with proper firewalling mitigates much of the issue. If the only port open to the public network is the one running the proxy software (or whatever it is), then there is very little attack surface.

Security

Submission + - 10 Years of Nmap (net-security.org)

J0hn5 writes: To celebrate the 10th anniversary of this powerful tool, Nmap 4.50 has been released. It is the first stable release in more than a year and the first major release since 4.00 two years ago. Also, here's a quick look at Zenmap, Nmap's official GUI that is a multi-platform free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. Frequently used scans can be saved as profiles to make them easy to run repeatedly.

Slashdot Top Deals

"God is a comedian playing to an audience too afraid to laugh." - Voltaire

Working...