Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security

Submission + - WASC Distributed Open Proxy Honeypot Releases Data

An anonymous reader writes: This just went out on the WebSecurity Mail-list:
The Web Application Security Consortium (WASC) is pleased to announce the inital release of data collected by the Distributed Open Proxy Honeypot Project. This first release of information is for data gathered from January — April, 2007. During this timeframe, we had 7 internationally placed honeypot sensors deployed and sending their data back to our central logging host.
What did we see? Here are some brief highlights -

— SQL Injection Attacks
— Brute Force Attacks
— OS Command Injection
— Web Defacement Attempts
— Google-Abuses (Google-Hacking and Proxying for BannerAd/Click Fraud)
— Information Leakage

We have created a PDF document here -
http://www.webappsec.org/projects/honeypots/Threat _Report_05072007.pdf. The attacks are mapped to the WASC Threat Classification categories. There are some high-level statistics shown, however they are very crude as this was not the focus of this phase of the project. We understand that the data presented is a bit raw, however we wanted to release this information so that the public may have a chance to review it and provide feedback. Our initial goal was to identify the types of current attacks that are using open proxy servers. In our future deployments, we will attempt to refine the data analysis processes to extract out trend data and high level concepts. In the near future, we will be updating both the VMware honeypot sensors themselves and will also use a newer version of the centralize logging host (ModSecurity Console).

We are also planning to release more frequent information in the form of diary entries on the project webpage as new attacks/trends are identified. While the initial deployment was a success, we still need participants who are willing to participate by deploying our VMware honeypot sensor on their network. If you are interested in participating, please checkout the project webpage -
http://www.webappsec.org/projects/honeypots/
Internet Explorer

Submission + - IE7 and FF 2.0 share vulnerability

hcmtnbiker writes: Internet Explorer 7 and Firefox 2.0 share a logic flaw. The issue is actually more severe, as the two versions of the Microsoft and Mozilla browsers are not the only ones affected. The vulnerability impacts Internet Explorer 5.01, Internet Explorer 6 and Internet Explorer 7, and Firefox 1.5.0.9. "In all modern browsers, form fields (used to upload user-specified files to a remote server) enjoy some added protection meant to prevent scripts from arbitrarily choosing local files to be sent, and automatically submitting the form without user knowledge. For example, ".value" parameter cannot be set or changed, and any changes to .type reset the contents of the field," said Michal Zalewski, the person that discovered the IE7 flaw. There are Proof of concepts for both IE7 and firefox

Slashdot Top Deals

Somebody ought to cross ball point pens with coat hangers so that the pens will multiply instead of disappear.

Working...