Microsoft Corp. patched three vulnerabilities in the company’s Server Message Block (SMB) file-sharing protocol, including two that could make “Swiss cheese” out of enterprise networks, according to one researcher. “Expect to see a worm on this one in the very near future, [because] this is Blaster and Sasser all over again.” Those two worms, 2003’s Blaster and 2004’s Sasser, wreaked havoc worldwide as they spread to millions of Windows machines.
Of the three bugs outlined in the MS09-001 security bulletin, two were rated “critical,” the most serious ranking in Microsoft’s four-step scoring system, while the third was pegged “moderate.” The pair identified as critical are extremely dangerous because attackers can exploit them simply by sending malformed data to unpatched machines, according to the chief technology officer. “These flaws enable an attacker to send evil packets to a Microsoft computer and take any action they desire on that computer [with] no credentials required,” he said. “The only prerequisite for this attack to be successful is a connection from the attacker to the victim over the NetBIOS ports, TCP 139 or TCP 445. By default, most computers have these ports turned on. More people have blocked those ports, and more personal firewalls block them by default, but they are typically left open in a corporate network.”
Source: Computer World
Every year Cisco and IBM’s XForce release their yearly report highlighting the security space, what went wrong, biggest trends etc.
Cisco 2008 Annual Security Report
IBM Internet Security Systems X-Force 2008 Mid-Year Trend Statistics
***X-Force’s annual report will be released sometime during January — stay tuned….
McAfee has released their January spam reports which can be found here January Spam Report and here State of Spam report. Althought spam levels are elevated in the last few weeks it is nothing near what we were seeing before McColo was shutdown last November.
I’ve recently been trying to teach my young cousin the basics of computer security. I started by having him get the Backtrack live-cd which is geared for penetration testing.
Once you have Backtrack running you need a dummy machine to test against. People have packaged live-cd’s and virtual machines that are running some combination of the following:
- Unpatched operating systems (Win XP SP1)
- Unpatched applications (httpd, ftpd, etc)
You can find these ready to be exploited packages here:
Old softwares with bugs:
Do you have an old disc of Windows 9x or Redhat 6.2 lying around?
- Install VirtualBox
- Create your own virtual machine with those old OS discs that are now collecting dust
Have fun & remember to keep this limited to dummy machines 🙂
HOPE (abbreviation Hackers on Planet Earth or the first two letters in Hotel Pennsylvania) is a conference series sponsored by the hacker magazine 2600 The Hacker Quarterly. There have been seven conferences to date.
You can get a copy of the presentations here.
What could keep you up at night in the new year may not be what you expect — a look at some of the lesser-known threats predicted for 2009….Click here for the complete article.