SeacureIT Preview Conference 2009
We are glad to announce the first international security conference in Italy, SeacureIT Preview 2009. The conference will take place between 21st and 23rd October at Fiera Milano City, Milan's conference and trade show center, co-located with SMAU, Italy's largest ICT tradeshow. The conference will consist of two days of top notch trainings and one day of bleeding edge talks. Topics of presentations this year include but are not limited to OSX security, hardware hacking, SAP exploiting, web 2.0 threats and malware analysis. Aside from highly technical presentations we are pleased to have a roundtable and a number of talks focusing on the economic aspect of cybersecurity, brought to you by well known cybersecurity and cybercrime experts. To read the full line-up of speakers please see: http://www.seacure.it/speakers.htm The conference will be concluded by a networking event with a full typical Milanese "aperitivo". For those interested in trainings, the topics range from SAP security to Oracle hacking, from exploitation techniques to physical security. To learn more on the trainings, please visit http://www.seacure.it/training.htm SeacureIT preview (hosted in Milan, the world-renown "city of fashion") is a launch event for our main conference which will take place in 2010 in beautiful Sardinia, in the middle of the Mediterranean sea. A full description of this year's location as well as next year's can be seen at: http://www.seacure.it/venue.htm You will have the opportunity of listening to a set of excellent speakers, at a really convenient entrance fee; additionally, all the participants to the Preview edition will enjoy a 100 EUR rebate on the 2010 edition of the conference (and the trainings participants will get a full 200 EUR rebate on any training of their choice next year!). We hope to see all of you in Milan! Best regards, The SeacureIT team
Call for papers and trainers - note extended deadline - SeacureIT 2009
Dear colleagues, this is a short message just to reconfirm that the deadline for submission of speech and training proposals for SEaCURE.IT is set to February 10th, and not to Jan 31st as originally noted in the website. We have received many excellent submission, besides the invited speakers already mentioned on our website, and we will notify selected speakers shortly after the deadline. However, it is still not too late to submit and be part of the event! SEaCURE.IT (http://www.seacure.it) will be held from May 19th to 22nd in the wonderful seaside resort Tanka Village, located in Villasimius, Sardinia, a large and beautiful island in the Mediterranean sea. Besides the main conference, featuring two tracks of top-notch presentations over two intense days, the programme will include two days of advanced trainings, and a set of unique social events (Italian style), in order to foster networking. I remind you that we are a non-product, non-vendor biased security conference, and do not accept vendor pitches. Any talk evidently aimed at selling products or services will be rejected without consideration. We look for novel research and contributions in the fields of computer, network and information security. Please, submit your idea to us: we will carefully evaluate it. We will also evaluate proposals for 1-dat or 2-days technical trainings on the same topics. We offer the following speaker privileges: * * One economy class return-ticket to Cagliari for each accepted presentation. * * 3 nights of accomodation in the Conference Hotel. * * Meals for the speakers, and speaker activities during, before, and after the conference. * * A comprehensive program of activities for non-geek partners :) * * Speaker party We offer the following trainer privileges: * * 50% of the net profit of the class * * 3 nights of accomodation in the Conference Hotel * * Meals during the days of the training * * Free access to the Conference * * Participation to speaker activities Please send your submission to c...@seacure.it with the following information IN PLAIN TEXT in your email: 1. Presenter name and affiliation 2. Country and city of origin for your travel to the conference, as well as nationality/passport for visa requirements 4. contact information (e-mail address and a landline phone if possible) 5. SHORT biography, and a list of SELECTED publications and papers 6. Proposed paper title / proposed training title 7. Proposed paper abstract / proposed training outline 8. Three key reasons why you want to speak at SEaCURE.IT and why we would want you to speak :) 9. Optionally, any samples of prepared material or outlines (for this, a pdf attachment is acceptable) 10. Please list any other publications or conferences where this material has been or will be published/submitted. Concurrent submission is not a reason for rejection, while un-announced multiple submissions will make you look considerably bad ;-) This last point also applies for the trainings, please let us know how many times the training has been delivered and where. Regards, Stefano Zanero
Re: Plunet BusinessManager failure in access controls and multiple stored cross site scripting
Dear all, just in order to give complete information, after being contacted by the vendor (thanks !) we can confirm the following version information: > Systems affected: Plunet BusinessManager 4.1 Therefore, the vendor recommended fix is as follows: > *** FIX INFORMATION *** Upgrade Plunet BusinessManager to the latest available version, and in any case to a version >=4.2 Our advisory has been updated to reflect this new information: http://www.securenetwork.it/ricerca/advisory/download/SN-2008-04.txt For the records, what apparently happened is that our first advisory was correctly received and immediately acted upon by the vendor, but we never received an acknowledgment and fix information afterwards for some communication mishap. Our later contact attempts did not apparently reach the appropriate person(s) inside the company. We thank the vendor for working with us on this. Best regards, Stefano Zanero
Call for papers and trainers - SeacureIT 2009
ns or conferences where this material has been or will be published/submitted. Concurrent submission is not a reason for rejection, while un-announced multiple submissions will make you look considerably bad ;-) This last point also applies for the trainings, please let us know how many times the training has been delivered and where. Regards, Stefano Zanero
Re: "Exploit creation - The random approach" or "Playing with random to build exploits"
Nelson Brito wrote: > 1. Slammer was the very first Flash Worm, Well, no, actually, Slammer was not a flash worm. A flash worm is a worm which follows a precomputed spreading path, by using prior knowledge of all the systems that are vulnerable to the particular exploit in use. And Slammer didn't. It is actually akin to a Warhol worm. > dissemination, it only took 15 minutes to crash all the Internet > infra-structure How exagerate ;) > we didn't learn how to deal with worms Nope, we didn't. But people stopped writing worms, because writing bots is much more rewarding, economically. > -[ Polymorphic Code > > This is not a new topic No, indeed, it's very old. > for years and years, but all our attention was gave to the shellcode. Well, actually that's because the polymorphic code for viruses and worms came even before, and was already a beaten issue. > even during my research, when I talked to someone about the perspective of > having a real polymorphic code, people always got confused with polymorphic > shellcode. Strange, usually it's the other way round. > Polymorphic code means that a code will change every time it executes, > making it unpredictable. What we have, so far, are static codes, and I never > saw any “dynamic” code exploiting any vulnerability. Didn't you mention you were NOT thinking of polymorphic SHELL-code, but polymorphic code ? >That is the reason some > IPS/IDS can easily add signatures. Well, actually shellcode signatures are common, but they are not the reason. And, signature based IPS/IDS have so many faults that you don't really need polymorphic (shell)code to fool them. > Now, we know how we must build the exploit, and I think we can do a great > job randomizing all the fields. Here are the fields ENG needs to deal with: > attack vector, buffer, return address, jumps, writable address, nops, and > shellcode. This is what most of us would call "obfuscating an attack", or "mutating an attack". Just so that you know, a tool named SPLOIT was already made to perform a number of mutations over exploits (at this and other levels). Thanks for the write up. It's an handy cheat sheet for some things. > I do hope I could proof all the concepts behind this idea, Yep, well, you could just mention them. We already knew them ;-) And, I don't see how these have to do with making a Warhol worm more dangerous. Signature-based systems will never be useful against a Warhol worm in any case, because the updates will simply be too late. SZ
CFP: European Conference on Computer Network Defense
CALL FOR PAPERS: EC2ND 2008 European Conference on Computer Network Defense (in cooperation with ENISA) December 11th & 12th 2008, Dublin City University, Dublin, Ireland. http://2008.ec2nd.org/ Call for Papers The fourth annual EC2ND conference will take place on December 11th & 12th 2008 in the Faculty of Engineering and Computing at Dublin City University. The theme of the conference is the protection of computer networks. As with past EC2ND conferences, this year's event will encourage participants from academia and industry within Europe and beyond to discuss current topics in applied network and systems security. EC2ND 2008 invites submissions presenting novel ideas at an early stage with the intention to act as a discussion forum and feedback channel for promising, innovative security research. While our goal is to solicit ideas that are not completely worked out, and might have challenging and interesting open questions, we expect submissions to be supported by some evidence of feasibility or preliminary quantitative results. Topics include but are not limited to: Intrusion Detection Denial-of-Service Privacy Protection Security Policies Peer-to-Peer and Grid Security Network Monitoring Web Security Vulnerability Management and Tracking Network Forensics Wireless and Mobile Security Cryptography Network Discovery and Mapping Incident Response and Management Malicious Software Web Services Security Legal and Ethical Issues Important Dates Paper Submission Deadline: September 1st, 2008 Notification of Acceptance: September 18th, 2008 Final Paper Due: October 1st, 2008 Conference Dates: December 11th & 12th, 2008 Organisers Conference & General Chair Liam Meany, Dublin City University, Dublin, Ireland. Programme Co-Chairs Dr. Sotiris Ioannidis, FORTH, Heraklion, Greece. Dr. Kostas Anagnostakis, Institute for Infocomm Research, Singapore. Programme Review Committee Prof. Gritzalis Stefanos, University of the Agean, Greece. Dr. Stefano Zanero, Milano Technical University, Milan, Italy. Christopher Kruegel , University of California, Santa Barbara,USA. Prof. Diomidis Spinellis, Athens University, Greece. Eric Cronin, University of Pennsylvania, Philadelphia, USA. Prof. George Polyzos, University of California, San Diego, USA. Dr. Panagiotis Trimintzios, ENISA, Heraklion, Greece. Sandro Etalle, Technical University of Eindhoven, Holland. Michalis Polychronakis, University of Crete, Greece. Prof. Javier Lopez, University of Malaga, Spain. Dr. Theo Tryfonas, University of Glamorgan, Wales, UK. Prof. Engin Kirda, Eurecom Graduate School, Cote d'Azur, France. Thorsten Holz, University of Mannheim, Germany. Prof. Herbert Bos, Vrije Universiteit Amsterdam, Amsterdam, Holland. David Brumley, Carnegie Mellon University, Pittsburgh, USA. Marco Cremonini, Università degli Studi di Milano, Milan. Dr. Ulrike Meyer, Darmstadt University of Technology, Darmstadt, Germany. Dr. Philippe Owezarski, National Centre for Scientific Research, Toulouse, France. Dr. George Danezis, ESAT, Flanders, Belgium. Dr. Austin Donnelly, Microsoft Research, Cambridge, UK. Prof. Angelos Stavrou, George Mason University, Virginia, USA. Dr. Sven Ubik, CESNET Research, Czech Republic. Cyril Onwubiko, Kingston University, London, UK. Dr. Mike Scott, Dublin City University, Dublin, Ireland. Carlos Ribeiro, IST, Lisbon, Portugal. Steering Committee Prof. Evangelos Markatos, FORTH, Heraklion, Greece. Dr. Panagiotis Trimintzios, ENISA, Heraklion, Greece. Dr. Andrew J Blyth, University of Glamorgan, Wales, UK. Dr. Sotiris Ioannidis, FORTH, Heraklion, Greece. Dr. Kostas Anagnostakis, Institute for Infocomm Research, Singapore. Prof. Vasilios Siris, University of Crete, Greece. Anna Doxastaki, FORTH, Heraklion, Greece. Dr. Theo Tryfonas, University of Glamorgan, Wales, UK. -- Cordiali saluti, Stefano Zanero Politecnico di Milano - Dip. Elettronica e Informazione Via Ponzio, 34/5 I-20133 Milano - ITALY Tel.+39 02 2399-4017 Fax.+39 02 2399-3411 E-mail: [EMAIL PROTECTED] Web:http://home.dei.polimi.it/zanero/
CFP: Workshop on Open Source Software for Computer and Network Forensics
[ Our anticipate apologies if you receive this call for paper more than once! ] CALL FOR PAPERS: 1st Workshop on Open Source Software for Computer and Network Forensics (OSSCoNF) We are currently inviting the submission of full papers to the 1st Workshop on Open Source Software for Computer and Network Forensics (OSSCoNF), which will be held in conjunction with OSS2008, the Fourth International Conference on Open Source Systems. The conference will take place in September 7-10, 2008, in Milan, Italy. Workshops will be on September 10th, immediately after the main OSS2008 conference. OSSCoNF aims at creating an informal, but selected academic venue to discuss the benefits (and drawbacks, if any) of using Free, Libre, and Open Source Software (FLOSS) for computer and network forensics, incident management and digital investigations. It will allow participants to present and discuss technical issues, exchange research ideas, introduce new development projects (and new revision of existing projects), in order to foster the creation of a community of practitioners and (people from academia - academics) , and to promote the usage of FLOSS tools in computer and network forensics. The main topics of interest for the workshop are: - FLOSS tools for Evidence Management - Tools for acquisition, collection, and storage of digital evidence - Tools for identification, authentication, integrity preservation of digital evidence - FLOSS tools for Analysis and Identification of Evidence - Tools for the analysis and search of digital evidence - Tools for cybercrime scenarios reconstruction, correlation and data mining applied to digital forensics - Tools for analysis of embedded or non-traditional devices such as cellphones, cameras... - FLOSS tools for analysis of cybercrime - Data mining systems for cyber-crime strategy analysis and modeling - Systems for data collection and monitoring of attack trends - FLOSS tools validation and test cases, or FLOSS validation approaches for proprietary tools - FLOSS tools for the automation of the forensic process and case management We expect technical papers detailing implementation and validation of such tools, comparisons between open source and proprietary tools, and papers balancing benefits and drawbacks of open source and proprietary tools in digital investigation. While the main focus of the workshop is technical, papers dealing with legal and ethical issues will also be evaluated. As the workshop theme is FLOSS, all the papers must describe tools that are publicly available under a free software or open source license. New tools are welcome, but the authors must commit to make them available under a suitable license before the paper revision process ends. Papers not related to FLOSS are subject to immediate rejection. The workshop website can be found at the following URL: http://conferenze.dei.polimi.it/ossconf The website of the conference is available at: http://oss2008.dti.unimi.it/ FORMAT AND SUBMISSION Papers should be formatted according to the guidelines for the main conference, as listed at URL http://oss2008.dti.unimi.it/index.php?id=authorKit.htm Papers should be submitted by e-mail to [EMAIL PROTECTED] . IMPORTANT DATES: June 7: submission deadline (firm) June 24: notification to the authors July 10: camera-ready papers due ORGANIZATION Workshop Co-Chairs: Ewa Huebner (University of Western Sydney), [EMAIL PROTECTED] Stefano Zanero (Politecnico di Milano), [EMAIL PROTECTED] Programme Committee: Derek Bem (University of Western Sydney) Andrew Blyth (University of Glamorgan) Brian Carrier (Basis Technology) Engin Kirda (Institut Eurecom) Jesse Kornblum (ManTech International Corporation, MD) Sotiris Ioannidis (ICS-FORTH, Crete) Evangelos Markatos (University of Crete) Mattia Monga (University of Milan - DICO) Marcus Rogers (Purdue University) Iain Sutherland (University of Glamorgan) Magdalena Szezynska (Warsaw University of Technology) Theodore Tryfonas (University of Glamorgan) Doug Wampler (Indiana Department of Correction) Alec Yasinsac (Florida State University) -- Cordiali saluti, Stefano Zanero Politecnico di Milano - Dip. Elettronica e Informazione Via Ponzio, 34/5 I-20133 Milano - ITALY Tel.+39 02 2399-4017 Fax.+39 02 2399-3411 E-mail: [EMAIL PROTECTED] Web:http://home.dei.polimi.it/zanero/
CFP: Workshop on Open Source Software for Computer and Network Forensics
[ Our anticipate apologies if you receive this call for paper more than once! ] CALL FOR PAPERS: 1st Workshop on Open Source Software for Computer and Network Forensics (OSSCoNF) We are currently inviting the submission of full papers to the 1st Workshop on Open Source Software for Computer and Network Forensics (OSSCoNF), which will be held in conjunction with OSS2008, the Fourth International Conference on Open Source Systems. The conference will take place in September 7-10, 2008, in Milan, Italy. Workshops will be on September 10th, immediately after the main OSS2008 conference. OSSCoNF aims at creating an informal, but selected academic venue to discuss the benefits (and drawbacks, if any) of using Free, Libre, and Open Source Software (FLOSS) for computer and network forensics, incident management and digital investigations. It will allow participants to present and discuss technical issues, exchange research ideas, introduce new development projects (and new revision of existing projects), in order to foster the creation of a community of practitioners and (people from academia - academics) , and to promote the usage of FLOSS tools in computer and network forensics. The main topics of interest for the workshop are: - FLOSS tools for Evidence Management - Tools for acquisition, collection, and storage of digital evidence - Tools for identification, authentication, integrity preservation of digital evidence - FLOSS tools for Analysis and Identification of Evidence - Tools for the analysis and search of digital evidence - Tools for cybercrime scenarios reconstruction, correlation and data mining applied to digital forensics - Tools for analysis of embedded or non-traditional devices such as cellphones, cameras... - FLOSS tools for analysis of cybercrime - Data mining systems for cyber-crime strategy analysis and modeling - Systems for data collection and monitoring of attack trends - FLOSS tools validation and test cases, or FLOSS validation approaches for proprietary tools - FLOSS tools for the automation of the forensic process and case management We expect technical papers detailing implementation and validation of such tools, comparisons between open source and proprietary tools, and papers balancing benefits and drawbacks of open source and proprietary tools in digital investigation. While the main focus of the workshop is technical, papers dealing with legal and ethical issues will also be evaluated. As the workshop theme is FLOSS, all the papers must describe tools that are publicly available under a free software or open source license. New tools are welcome, but the authors must commit to make them available under a suitable license before the paper revision process ends. Papers not related to FLOSS are subject to immediate rejection. The workshop website can be found at the following URL: http://conferenze.dei.polimi.it/ossconf The website of the conference is available at: http://oss2008.dti.unimi.it/ FORMAT AND SUBMISSION Papers should be formatted according to the guidelines for the main conference, as listed at URL http://oss2008.dti.unimi.it/index.php?id=authorKit.htm Papers should be submitted by e-mail to [EMAIL PROTECTED] . IMPORTANT DATES: June 7: submission deadline (firm) June 24: notification to the authors July 10: camera-ready papers due ORGANIZATION Workshop Co-Chairs: Ewa Huebner (University of Western Sydney), [EMAIL PROTECTED] Stefano Zanero (Politecnico di Milano), [EMAIL PROTECTED] Programme Committee: Derek Bem (University of Western Sydney) Andrew Blyth (University of Glamorgan) Sotiris Ioannidis (ICS-FORTH, Crete) Engin Kirda (Institut Eurecom) Jesse Kornblum (ManTech International Corporation, MD) Evangelos Markatos (University of Crete) Mattia Monga (University of Milan - DICO) Marcus Rogers (Purdue University) Iain Sutherland (University of Glamorgan) Magdalena Szezynska (Warsaw University of Technology) Theodore Tryfonas (University of Glamorgan) Doug Wampler (Indiana Department of Correction) Alec Yasinsac (Florida State University) -- Cordiali saluti, Stefano Zanero Politecnico di Milano - Dip. Elettronica e Informazione Via Ponzio, 34/5 I-20133 Milano - ITALY Tel.+39 02 2399-4017 Fax.+39 02 2399-3411 E-mail: [EMAIL PROTECTED] Web:http://home.dei.polimi.it/zanero/
Final CFP: EuroSec Workshop (March 31st, 2008)
[ Our anticipate apologies if you receive this call for paper more than once! ] CALL FOR PAPERS - EUROSEC WORKSHOP EuroSec (http://www.cs.vu.nl/eurosec08/) is a new workshop associated with the Annual ACM SIGOPS EuroSys conference. The workshop aims to bring together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. The focus of the workshop is on novel, practical, systems-oriented work. EuroSec will be held on the 31st of March, 2008, in Glasgow, Scotland. Topics of Interest EuroSec seeks contributions on all aspects of systems security. Topics of interest include (but are not limited to): * new attacks, evasion techniques, and defenses * operating system security * hardware architectures * "trusted computing" and its applications * identity management, anonymity * small trusted computing bases * mobile systems security * measuring security * malicious code analysis and detection * web security * systems-based forensics * systems work on fighting spam/phishing In accordance with the spirit of the EuroSys conference we also seek * Experience with existing systems * Reproduction or refutation of previous results * Negative results * Early ideas You are hereby invited to submit papers of 6-8 single-spaced pages (including figures, tables and references). Font size should be 10pt. The format of submitted papers should correspond to our Latex style file, which can be found on the Workshop web page (http://www.cs.vu.nl/eurosec08/). SUBMISSION WEBSITE is now accessible at the following URL: https://www.softconf.com/eurosys/EUROSEC2008/submit.html EuroSec explicitly encourages members of the systems community to explore leading-edge topics and ideas before they are presented at a major conference. All submissions will be reviewed by the Program Committee. Only papers with original, novel work and results will be considered for publication. Accepted papers will be published in the proceedings of EuroSec in the ACM Digital Library Important dates: Paper submission:15 Feb 2008 Acceptance notification: March 1 2008 Final paper due:14 Mar 2008 Workshop.: 31 Mar 2008 Organisation Program Chair: Herbert Bos (Vrije Universiteit Amsterdam) Program Co-chair: Evangelos Markatos (FORTH and Univ. of Crete) Publicity Co-Chairs: Angelos Stavrou (George Mason University) Stefano Zanero (Politecnico di Milano) Program Committee Kostas Anagnostakis (Institute for Infocomm Research) John Aycock (University of Calgary) Herbert Bos (Vrije Universiteit Amsterdam) David Brumley (Carnegie Mellon University) Manuel Costa (Microsoft Research Cambridge) Marc Dacier (Eurécom and Symantec) Leendert van Doorn (AMD) Jon Giffin (Georgia Tech) Ashvin Goel (U. of Toronto) Hermann Härtig (TU Dresden) Sotiris Ioannidis (FORTH) Engin Kirda (TU Vienna and Eurécom Institute) Christopher Krügel (TU Vienna and UC Santa Barbara) Evangelos Markatos (FORTH and Univ. of Crete) Niels Provos (Google) Angelos Stavrou (George Mason University) Wietse Venema (IBM TJ Watson) Michael Waidner (IBM Tivoli Software, Somers, NY) Stefano Zanero (Politecnico di Milano) -- Cordiali saluti, Stefano Zanero Politecnico di Milano - Dip. Elettronica e Informazione Via Ponzio, 34/5 I-20133 Milano - ITALY Tel.+39 02 2399-4017 Fax.+39 02 2399-3411 E-mail: [EMAIL PROTECTED] Web:http://home.dei.polimi.it/zanero/
CFP: EuroSec Workshop (March 31st, 2008)
[ Our anticipate apologies if you receive this call for paper more than once! ] CALL FOR PAPERS - EUROSEC WORKSHOP EuroSec (http://www.cs.vu.nl/eurosec08/) is a new workshop associated with the Annual ACM SIGOPS EuroSys conference. The workshop aims to bring together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. The focus of the workshop is on novel, practical, systems-oriented work. EuroSec will be held on the 31st of March, 2008, in Glasgow, Scotland. Topics of Interest EuroSec seeks contributions on all aspects of systems security. Topics of interest include (but are not limited to): * new attacks, evasion techniques, and defenses * operating system security * hardware architectures * "trusted computing" and its applications * identity management, anonymity * small trusted computing bases * mobile systems security * measuring security * malicious code analysis and detection * web security * systems-based forensics * systems work on fighting spam/phishing In accordance with the spirit of the EuroSys conference we also seek * Experience with existing systems * Reproduction or refutation of previous results * Negative results * Early ideas You are hereby invited to submit papers of 6-8 single-spaced pages (including figures, tables and references). Font size should be 10pt. The format of submitted papers should correspond to our Latex style file, which can be found on the Workshop web page (http://www.cs.vu.nl/eurosec08/). Submission details will be available soon at the same URL. EuroSec explicitly encourages members of the systems community to explore leading-edge topics and ideas before they are presented at a major conference. All submissions will be reviewed by the Program Committee. Only papers with original, novel work and results will be considered for publication. Accepted papers will be published in the proceedings of EuroSec in the ACM Digital Library Important dates: Paper submission:15 Feb 2008 Acceptance notification: March 1 2008 Final paper due:14 Mar 2008 Workshop.: 31 Mar 2008 Organisation Program Chair: Herbert Bos (Vrije Universiteit Amsterdam) Program Co-chair: Evangelos Markatos (FORTH and Univ. of Crete) Publicity Co-Chairs: Angelos Stavrou (George Mason University) Stefano Zanero (Politecnico di Milano) Program Committee Kostas Anagnostakis (Institute for Infocomm Research) John Aycock (University of Calgary) Herbert Bos (Vrije Universiteit Amsterdam) David Brumley (Carnegie Mellon University) Manuel Costa (Microsoft Research Cambridge) Marc Dacier (Eurécom and Symantec) Leendert van Doorn (AMD) Jon Giffin (Georgia Tech) Ashvin Goel (U. of Toronto) Hermann Härtig (TU Dresden) Sotiris Ioannidis (FORTH) Engin Kirda (TU Vienna and Eurécom Institute) Christopher Krügel (TU Vienna and UC Santa Barbara) Evangelos Markatos (FORTH and Univ. of Crete) Niels Provos (Google) Angelos Stavrou (George Mason University) Wietse Venema (IBM TJ Watson) Michael Waidner (IBM Tivoli Software, Somers, NY) Stefano Zanero (Politecnico di Milano) -- Cordiali saluti, Stefano Zanero Politecnico di Milano - Dip. Elettronica e Informazione Via Ponzio, 34/5 I-20133 Milano - ITALY Tel.+39 02 2399-4017 Fax.+39 02 2399-3411 E-mail: [EMAIL PROTECTED] Web:http://home.dei.polimi.it/zanero/
Re: Standing Up Against German Laws - Project HayNeedle
Florian Echtler wrote: > As a native German speaker, allow me to clarify: with respect to IP > communication, the law mandates saving the following information for 6 > months: > > - which customer was assigned which IP for what timespan > - sender mail address, receiver mail address and sender IP for each mail > - in case of VOIP: caller and callee phone number and IP address This data was required in Italy as well, and indeed was the core of a EU-wide "data retention" spree. Stefano
DeepSec 2007 Registration: hurry up, seats are filling fast
Hallo list members, and sorry if you receive multiple copies of this message this is just a friendly reminder that registration for the DeepSec Security Conference 2007 is available at the URL http://deepsec.net/register/ The conference is taking place in less than 3 weeks in the awesome city of Vienna, Austria (20-23 November, with the first two days dedicated to trainings and the last two days to the conference itself). As we are filling up seats very fast, advance booking allows us to make room for more of you. So, if you want to attend, please do us and yourself a favor and register right now! To give you a compelling reason to book in advance, we will extend regular booking rates till November 9th. Beware that after that date registering online will cost you 100EUR more, and on-site registration (IF seats are still available) will cost 200EUR more, so save by booking now (and help us size the rooms correctly, as this is the first year of the show). As a reminder, DeepSec will offer: * 36 top-notch Talks in two tracks, as can be seen at http://deepsec.net/schedule/ * Two exceptional keynote speakers, Paul Simmonds and Jeff Moss * 6 Training classes (and three of these are almost complete, so hurry up even more !) * An exceptional venue (see http://deepsec.net/venue/) with redesign and lightning art expressly set up for DeepSec * Great Networking Opportunities * Web Hacking Competition * Live Capture the Flag Contest organized by Hack in the Box (https://conference.hackinthebox.org/) * Evening Parties at the Roboexotica Cocktail Robotics Festival (see http://www.roboexotica.org/) including two free drinks! * After Party at the Metalab Hackerspace on Saturday (http://metalab.at/) - wooo-hoo ! Still waiting? Hurry up and register here now: http://deepsec.net/register/ ISSA members and members of other associations can get a discount, to check availability of a discount for your association please get in touch with us as soon as possible. Members of the working press are also invited to get in touch in order to get accreditation and access to the conference. We'd like to thank our sponsors SEC-Consult, T-Systems, Telekom Austria, Microsoft, Phion, and Secure Network, as well as all our community and media partners for making this event possible. We sincerely hope to see you all in Vienna! Stefano, on behalf of the DeepSec Team (You are very welcome to republish, forward or otherwise share this announcement)
CFP: 3rd European Conference on Computer Network Defense (EC2ND)
Thanks in advance for sharing this CFP with any interested individual or mailing list. 3rd European Conference on Computer Network Defense (EC2ND) 4-5 October 2007, FORTH-ICS, Heraklion, Crete, Greece http://2007.ec2nd.org/ Call for Papers The 3rd European Conference on Computer Network Defense will take place in October 2007 at the Foundation for Research and Technology Hellas, in Crete, Greece. The theme of the conference is the protection of computer networks. The conference will draw participants from academia and industry in Europe and beyond to discuss hot topics in applied network and systems security. EC2ND invites submissions presenting novel ideas at an early stage with the intention to act as a discussion forum and feedback channel for promising, innovative security research. While our goal is to solicit ideas that are not completely worked out, and might have challenging and interesting open questions, we expect submissions to be supported by some evidence of feasibility or preliminary quantitative results. Topics include but are not limited to: * Intrusion Detection * Denial-of-Service * Privacy Protection * Security Policy * Peer-to-Peer and Grid Security * Network Monitoring * Web Security * Vulnerability Management and Tracking * Network Forensics * Wireless and Mobile Security * Cryptography * Network Discovery and Mapping * Incident Response and Management * Malicious Software * Web Services Security * Legal and Ethical Issues Submitting a Paper You are hereby invited to submit papers up to 6-8 single-spaced pages long. We particularly encourage position papers on preliminary work that shows promise, rather than mature and well-polished papers studying well-known ideas. Surprising results and thought-provoking ideas will be strongly favored. All submissions will be reviewed by the Program Committee. Accepted papers will be published in the electronic proceedings of the conference. Some papers may have to go through a shepherding process in collaboration with one of the PC members. Important Dates * Submissions due: June 24, 2007 * Notification: July 24, 2007 * Final version due: August 10, 2007 Organizers General chair: Vasilios A. Siris (FORTH) and Panos Trimintzios (ENISA) PC co-chairs: Sotiris Ioanidis and Kostas Anagnostakis Local Arrangements Chair: Vasilios A. Siris Local Arrangements Committee: Yiannis Askoksylakis and Anna Doxastaki Program Committee Herbert Bos, Vrije Universiteit Amsterdam, The Netherlands Eric Cronin, University of Pennsylvania, USA George Danezis, KU Leuven, Belgium Austin Donnelly, Microsoft Research, UK Stefanos Gritzalis, University of the Aegean, Greece Mehis Hakkaja, ENISA, EU Bjorn Knutsson, KTH, Sweden Christopher Kruegel, TU Wien, Austria Tieyan Li, Institute for Infocomm Research, Singapore Javier Lopez, Universidad de Malaga, Spain Ulrike Meyer, Nokia Siemens Networks GmbH & Co., Germany Stefan Miltchev, Microsoft, USA Philippe Owezarski, LAAS-CNRS, France Michalis Polychronakis, University of Crete and FORTH-ICS, Greece George C. Polyzos, AUEB/MMlab, Greece Carlos Ribeiro, Universidade Tecnica de Lisboa, Portugal Pierangela Samarati, Universita di Milano, Italy Diomidis Spinellis, Athens University of Economics and Business, Greece Theodore Tryfonas, University of Glamorgan, UK Sven Ubik, CESNET, Czech Republic Stefano Zanero, Politecnico di Milano, Italy Steering Committee Panagiotis Trimintzios, ENISA Evangelos Markatos, FORTH-ICS, Greece Andrew Blyth, University of Glamorgan, UK -- Cordiali saluti, Stefano Zanero Politecnico di Milano - Dip. Elettronica e Informazione Via Ponzio, 34/5 I-20133 Milano - ITALY Tel.+39 02 2399-4010 Fax.+39 02 2399-3411 E-mail: [EMAIL PROTECTED] Web:www.elet.polimi.it/upload/zanero
Re: local Calendar System v1.1 (lcStdLib.inc) Remote File Include
Gadi Evron wrote: > How can we all automate the testing process for fake vulns in and list > them as such without overburdening OSVDB, CVE, Milworm and SecuriTeam? I suggest to ask for a pointer to the single source file where the vulnerability exists, a pointer to the archive of the correct version of the application, and a clear description of the vuln, or otherwise reject the posting altogether. This would at least add a filter... and make our life easier when cross-checking. Stefano
Re: Open Conference Systems = 2.8.2 Remote File Inclusion
[EMAIL PROTECTED] wrote: > # Open Conference Systems <= 2.8.2 Remote File Inclusion Bogus ? > # Download Source : http://pkp.sfu.ca/ocs/download/ocs-1.1.3.tar.gz The file is not in that archive. Where did you test this ? > file ; > import_xml.php Stefano
Re: local Calendar System v1.1 (lcStdLib.inc) Remote File Include
[EMAIL PROTECTED] wrote: > local Calendar System v1.1 (lcStdLib.inc) Remote File Include Fake vuln > code : The variables are set in config.php > exploit: You never tested them. Which is pretty lame. Stefano
Re: FreeForum 0.9.0 <=- (index.php fpath) Remote File Include Vulnerability
> FreeForum 0.9.0 <=- (index.php fpath) Remote File Include Vulnerability Bogus. You really don't know what you are doing, as others pointed out. > code : > include("$fpath/forum.php"); That variable is initialized two lines above, so this is BOGUS. Stefano
Re: Advanced Guestbook <=- 2.4.2 (include_path) Remote File Include Vulnerability
> Advanced Guestbook <=- 2.4.2 (include_path) Remote File Include > Vulnerability Bogus > code :. > > require_once $include_path."/admin/config.inc.php"; > require_once $include_path."/lib/$DB_CLASS"; > require_once $include_path."/lib/image.class.php"; > require_once $include_path."/lib/template.class.php"; Line above: $include_path = dirname(__FILE__); So your proposed "exploit" does not work. Please STOP reporting fake web vulns. Stefano
Re: Trevorchan <= v0.7 Remote File Include Vulnerability
[EMAIL PROTECTED] wrote: > Script:Trevorchan v0.7 Fake vuln > require_once($tc_config['rootdir']."/inc/functions.php"); > require_once($tc_config['rootdir']."/inc/encryption.php"); These vars are initialized in config.php, which is require-d by the files you mention. > Exploit: Obviously, you didn't care to test them. PLEASE STOP REPORTING FAKE PHP VULNS. Stefano
Re: cisco nac bypass vulnerability - cisco trust agent
thorben schroeder wrote: > the cisco network admission control system gives an adminitrator the > chance to check the clients, whether they have installed certain > patches / hotfixes. this check is not reliable. This is a known vulnerability of any system of NAC which trusts a client based agent. Since you cannot determine what program is running on the remote system, you cannot really trust what it is declaring. So, nothing really new in what you reported (you could also reverse engineer and write a client which answers the server exactly what it wants to hear). The point is knowing and accepting the unavoidable limits of such technologies. Stefano
Re: OpenPinboard <= Remote File Include
[EMAIL PROTECTED] wrote: > # Download > :http://osdn.dl.sourceforge.net/sourceforge/openpinboard/openpinboard_2.0.tar.gz > #code : ;(require_once ($language > $language is set in config.php which is generated by the install script. Did you actually test it, or is it bogus as it seems ? Stefano
Re: Phpjobscheduler 3.0 - Multiple Remote File Include
[EMAIL PROTECTED] wrote: > # Phpjobscheduler 3.0 - Multiple Remote File Include by Firewall Bogus > # Code: >include_once($installed_config_file) include_once("functions.php"); some lines above includes a file which statically sets that variable, so > # ExPloit : None of these work. Please stop reporting bogus vulnerabilities ! Thanks ! Stefano
Re: dev_wms => 1.5 Remote File Include Vulnerabilities
> # CodE : > include $configuration->language_file; Initialized above by including class_configuration.php. Bogus ! Stefano
Re: blogcms => 4.0.0 Remote File Include
[EMAIL PROTECTED] wrote: > # CodE : > require_once('themes/' . $blog_theme . '/user_style.php'); Bogus... > # Expl0itS : > http://Site/[path]/index.php?DIR_PLUGINS=[shell_script] Bogus, initialized in config file included > http://Site/[path]/install.php?DIR_LIBS=[shell_script] Bogus, initialized before being used > http://Site/[path]/admin/libs/ADMIN.php?DIR_LIBS=[shell_script] > http://Site/[path]/admin/libs/globalfunctions.php?DIR_LIBS=[shell_script] > http://Site/[path]/admin/libs/MEMBER.php?DIR_LIBS=[shell_script] > http://Site/[path]/admin/libs/PLUGINADMIN.php?DIR_LIBS=[shell_script] > http://Site/[path]/admin/libs/SKIN.php?DIR_LIBS=[shell_script] Classes and functions, that for what I see cannot be called like that. Stefano
Re: PLS-Bannieres 1.21 (bannieres.php) File Include
mahmood ali wrote: > PLS-Bannieres 1.21 (bannieres.php) File Include > modules/bannieres/bannieres.php > In Line 13 :_ > > include "$chemin/includes/connexion.php" ; Including ONE (1) more line of code: $chemin = "." ; include "$chemin$chemin/includes/connexion.php" ; ... Another example of untested BOGUS vuln advisory... Stefano
Re: phpLedAds 2.0(dir) File Include
mahmood ali wrote: > phpLedAds 2.0(dir) File Include > Vulnerable Code:_ > > click.php & ledad.php & ledad_js.php > In Line 41 :_ > > require_once($dir . '/ad_class.php'); Right above that: $dir = dirname(__FILE__); if(empty($dir)) { $dir = getcwd( ); } if(empty($dir)) { $dir = '.'; } So, this is once again a case of LUGCS (Lame Usage of Google Code Search). Flag as bogus, please... (Gadi, how right are you...) Stefano