RE: [Full-Disclosure] How big is the danger of IE?

2004-07-11 Thread Curt Purdy
Nick FitzGerald wrote:
>http://www.kb.cert.org/vuls/id/713878
>
>...
>
>Use a different web browser

Thanks for the link Nick.  I've been telling everyone for months,
securityfocus told us a few weeks ago and now CERT is telling us - run,
don't walk and download FireFox as quickly as you can click.  Also a few of
the extensions are real productivity improvers, although FireSomething does
steal a few seconds every day ;)

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] RE: Unchecked buffer in mstask.dll

2004-07-15 Thread Curt Purdy
Nick FitzGerald wrote:
> > I'd say that's because you changed the filetype; pif files simply
> > contain information on how to handle a DOS executable; they aren't a
> > program themselves. All you did was make it get confused and kill
> > itself.
>
> Yeah, but how long is it now since we've been telling programmers
> "don't trust user-supplied data"??  (H -- does it also fail on
> W2K3??)

No, in W2K3 you get "Cannot query the properties for this program. There may
not be enough memory available. blah blah" as opposed to 100% cpu in 2K.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- former White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [ok] [Full-Disclosure] RE: Unchecked buffer in mstask.dll

2004-07-16 Thread Curt Purdy
Dmitry Yu wrote:
> > Being curious, on Win2k, I copied cmd.exe (from
> winnt\system32) as xyz.pif;
> > then (right-click) Properties, Program crashes explorer. Is
> this related to
> > IconHandler, and is it exploitable?
>
>   Disassembly window shows that there was an attempt to read dword
> at [EAX] (EAX=0).  So at first glance this doesn't seem to be
> trivially
> exploitable, but I'm not a win32 expert, and intuition
> suggests that there
> must be a way.

One possible exploit is to simply place the file on your desktop.
explorer.exe goes to 100% cpu.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- former White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [ok] [Full-Disclosure] Possible Virus/Trojan

2004-07-25 Thread Curt Purdy



Todd Towles  wrote:
> I received 
an e-mail today that looked very much like a virus. Here is the message 
>

> Attachment 
– erupts.avi.exe
>
> Subject – 
New Southern 
California wildfire 
erupts
 .
>
> Either this 
is a new Trojan that changes it body and subject based on the current  AP  news or someone 
used a very lame trick against me. =)  
 
I'm guessing the latter.  Although story scraping would be 
possible, intellegent naming of the .exe would not be.  Most likely a 
friend... or enemy.
 
Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDAInformation 
Security EngineerDP 
SolutionsIf you spend 
more on coffee than on IT security, you will be hacked.What's more, you 
deserve to be hacked.-- former White House cybersecurity adviser Richard 
Clarke 
 


RE: [ok] Re: [Full-Disclosure] Cry For help

2004-07-25 Thread Curt Purdy
Abilash Praveen wrote:
> whats this about?
> - Original Message - 
> From: "g0bb13s" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Sunday, July 25, 2004 12:58 PM
> Subject: [Full-Disclosure] Cry For help
> 
> 
> > Good sirs and madames,


It's a 491 scam parody.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked. 
What's more, you deserve to be hacked.
-- former White House cybersecurity adviser Richard Clarke  

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [ok] [Full-Disclosure] RE: [Full-Disclosure]MS should re-write code with security in mind

2004-08-18 Thread Curt Purdy
Clairmont, Jan M wrote:
> M$ should just bite the bullet and re-write windows with 
> security in mind, give it a true process scheduler, multi-user
> with windows as a client server processes.


It ain't gonna happen.  There is so much legacy code, dating all the way
back to NT 3.5 in 2K XP that no-one really knows how it works.  Of course,
that is the beauty of open-source, lots of people know how Linux works.  

Of course you don't have to be open-source to be secure, as Netware was
always built with security in mind.  Novell engineers have a saying, "We
patch Netware twice a year whether it needs it or not."  I hate to see it
go.  I love SuSE linux, am running the 64-bit version on AMD, but I wish
they were keeping the Netware kernal also, for my security-critical clients.
Sadly, the days of not having to run around patching servers all the time
will be gone after Netware 7.

BTW, when I have to run windows (rarely), I start a VMWare session under
SuSE, do what I need, and close it out as quickly as possibe, after checking
for patches of course ;)

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked. 
What's more, you deserve to be hacked.
-- former White House cybersecurity adviser Richard Clarke 
<>

RE: [in] Re: [Full-Disclosure] Will a vote for John Kerry be counted by a Hart InterCivic eSlate3000 in Honolulu?

2004-10-21 Thread Curt Purdy
 
Exibar wrote:
> The question comes to mind... why oh why did you cast your 
> vote for  Kerry?
> I guess you want the US to be policed and governed by the UN. 
>  I guess you want 


Though in danger of starting a flame war...

Exibar, Dude! You've fallen head over heals for the Republican brain-washing
line.  There might be a lot about John Kerry you don't like, like his
honesty, forthrightednes, and straght-forward talking.  But I will never
vote for a President that has coldly lied to his people.  And I am one of
those people Bush has bold-facely lied to.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer 
DP Solutions

-

If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- former White House cybersecurity zar Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] EULA

2003-09-09 Thread Curt Purdy
Actually, failure to achieve compliance with  HIPAA could find hospital
executives and physicians facing fines of up to $25,000. Certain  criminal
violations could cost individuals and  organizations $250,000 and up to 10
years in jail.  This is quoted out of more than one reference.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions
[EMAIL PROTECTED]
936.637.7977 ext. 121



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- former White House cybersecurity zar Richard Clarke


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Gregory A.
Gilliss
Sent: Tuesday, September 09, 2003 5:13 PM
To: [EMAIL PROTECTED]
Subject: [inbox] Re: [Full-Disclosure] EULA


Okay, this is from my girlfriend, so flame her if it's wrong :-)

Basically, a HIPAA compliant hospital/practice/etc. that is found to be
in violation of, say, the regs on software change control, can be fined
up to US$ 10,000 per violation. I would guess that tha *could* be construed
as "per personal computer" if they wanted to be dicks about it...

But, it gets better...if they hospital/practice/etc that has been
inspected and cited doesn't comply with the violated HIPAA regs,
they can be closed down.  BAM!  In practice I do not think that this has
happened (yet) because the whole HIPAA thing is so new. However if you
look at it from the security perspective, I expect that M$ legal will be
amending their existing EULA for health care providers as soon as they read
about this...

G

On or about 2003.09.09 14:08:04 +, David Hayes ([EMAIL PROTECTED])
said:

> So, if a HIPAA site uses Windows and accepts the SP3 EULA, they're
> screwed.  If a HIPAA site uses Windows and does not accept the SP3
> EULA, they're screwed.
>
> Logical conclusion, if a HIPAA site uses Windows, they're screwed.
> Thus they should use a different OS?
>
> --
> David HayesNetwork Security Operations Center MCI Network Svcs
> email: [EMAIL PROTECTED]  vnet: 777-7236 voice: 972-729-7236
>
>
> On Mon, Sep 08, 2003 at 01:13:21PM -0400, [EMAIL PROTECTED] wrote:
> > On Mon, 08 Sep 2003 08:43:14 PDT, D B <[EMAIL PROTECTED]>  said:
> >
> > > does the EULA of Microsoft violate lawyer client
> > > privilege . as in  if my lawyer is using windows
> > > is he violating my rights
> >
> > I can't speak for the legal profession, but the SP3 EULA (the one where
you agree to
> > allow Microsoft to install, without warning or notification, anything
labeled a "security
> > patch", even if it breaks 3rd party software), is known to be very bad
mojo for sites
> > covered by HIPPA, because it cedes software change control.
> >
> > Of course, if you fail to agree to the EULA and you're a HIPPA site,
you're still screwed
> > because then you can't install post-SP3 patches.
> >
>
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html

--
Gregory A. GillissTelephone: 1 650 872
2420
Computer Engineering   E-mail:
[EMAIL PROTECTED]
Computer SecurityICQ:
123710561
Software Development  WWW:
http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C
A3

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Security firm Symantec has rubbed subscribers to the Full-Disclosure mailing list the wrong way

2003-09-16 Thread Curt Purdy



Yes, in this time of 
the "Busch"wackers, it is all too easy for the gov'ment to rob us of our 
freedom.  And unfortunately there are far too many corporate types ready to 
take advantage of that in the name of the almighty buck. Wired is cool 
though.  They went on to say " He did not say, though, how legislators would 
determine the difference between malicious information and that used for 
legitimate security research, or whether such a law might compromise freedom of 
speech."
 
Curt Purdy CISSP, 
GSEC, MCSE+I, CNE, CCDA Information Security Engineer DP 
Solutions 
 
If you spend more on coffee than on IT security, you 
will be hacked. What's more, you deserve to be 
hacked. -- former White House cybersecurity 
zar Richard Clarke 


  -Original Message-From: 
  [EMAIL PROTECTED] 
  [mailto:[EMAIL PROTECTED]On Behalf Of Geoff 
  ShivelySent: Monday, September 15, 2003 4:40 PMTo: 
  [EMAIL PROTECTED]Subject: [inbox] [Full-Disclosure] 
  Security firm Symantec has rubbed subscribers to the Full-Disclosure mailing 
  list the wrong way
  
  "Security firm Symantec has rubbed subscribers to the Full-Disclosure 
  mailing list the wrong way by due to a 
  quote attributed to its chief operating officer, John Schwarz. 
  In a Wired story titled " Just Say No 
  to Viruses and Worms", Schwarz was quoted as calling for laws to make it a 
  criminal offence to share information and tools online which could be used by 
  malicious hackers and virus writers. "
  http://www.smh.com.au/articles/2003/09/12/1063268553158.html
   
  Cheers,Geoff Shively, CTOPivX Solutions, LLC
   
  Are You Secure?http://www.pivx.com


Re: [Full-Disclosure] What about astalavista.net

2003-09-25 Thread Curt Purdy
They are two virtual servers on the same box.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- former White House cybersecurity zar Richard Clarke


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Jordan Wiens
Sent: Thursday, September 25, 2003 8:27 AM
To: GARCIA Lionel
Cc: Full-Disclosure (E-mail)
Subject: [inbox] Re: [Full-Disclosure] What about astalavista.net


Dunno, but I sure hope it's more than just a pretty frontend to:

http://astalavista.box.sk/

Because that would be a rip if so.

--
Jordan Wiens, CISSP
UF Network Incident Response Team
(352)392-2061

On Thu, 25 Sep 2003, GARCIA Lionel wrote:

> Hi,
>
> This may be a little out of subject, but I'm looking for experiences on
> www.astalavista.net.
> Subscription is $29 for a 6 months access, and I'm wondering if it worth
it
> and if I should ask my hierarchy to spend bucks in it.
>
> Thanks by advance.
>
> Lionel GARCIA
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] [Full-Disclosure] DoS of Antivir Gateways with huge amount of attatchments with same name

2003-09-25 Thread Curt Purdy
Yes, very interesting Helmut.  In fact this has been an interesting month
for email admins with both sobig and swen.  Swen hosed up our Postfix server
with millions of messages to newsgroups, had to end up manually blocking
them.  Please keep us abreast of your results when you figure out which AV
it was.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- former White House cybersecurity zar Richard Clarke


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Helmut
Hauser
Sent: Wednesday, September 24, 2003 12:42 PM
To: [EMAIL PROTECTED]
Subject: [inbox] [Full-Disclosure] DoS of Antivir Gateways with huge
amount of attatchments with same name


We got an E-Mail yesterday from one of our customers.
It had 291 (!) base64 coded attatchments which caused our antivirus gateway
to fail.
Further investigation of this mail shows that there were saved html pages
with all pictures saved seperatly so there were 7 times the same picture(s)
in this mail with the same filename(s).
We have different Antivirproducts working together and one of them (still
can´t figure out which one) has been fooled by the same filename(s) and
caused the gateway to fail. Very interesting.



Helmut Hauser
Systemadministration EDV

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] CyberInsecurity: The cost of Monopoly

2003-09-27 Thread Curt Purdy
I think we have lost the point of the thread CyberInsecurity: The Cost of
Monopoly which states your exact point that diversity is the most important
aspect of network protection.  It clearly states, and I agree, that
Microsoft has been the biggest danger to that diversity by creating a
monolithic Tower of Babel that could all come crashing down at the
displacement of a single foundation stone.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- former White House cybersecurity zar Richard Clarke


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Rick
Kingslan
Sent: Saturday, September 27, 2003 11:02 AM
To: '*Hobbit*'; [EMAIL PROTECTED]
Subject: [inbox] RE: [Full-Disclosure] CyberInsecurity: The cost of
Monopoly


Wouldn't this have been better posted in alt.religious?

And, to wit - working in a completely homogenous environment with Microsoft
products, Red Hat, AIX, Tandem, much custom written apps, and the platform
chosen for the best APPLICATION fit (remember - it doesn't really matter if
you prefer Linux if the business drivers DICTATE an APP that only runs on
Windows, and CygWin, wine, etc. are not options), I think I can speak to
both sides of the argument.

BTW - Don't care about certs

Do I personally feel like I've wasted 10+ years of MY life?  No - absolutely
not.

Do I take PRIDE in my WORK? Absolutely yes.  Working to integrate and
interoperate disparate platforms and OSs to provide a cohesive Business
solution is both challenging and enlightening.  One learns the best of both
worlds - and is not hobbled by prejudice and raw hate for a given product or
company.  (However, SCO is on the real strong dislike list.)

Would I change?  Nope - I like flexibility and the ability to choose a
solution based on what the requirements are - not because someone has
dictated a given OS is the only one we support.  That thinking would have
kept Linux out of our environment, and there would be more MS product.

I'm also not so hard headed to realize that diversity is a good thing - in
computing, and in life.

-rtk

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of *Hobbit*
Sent: Friday, September 26, 2003 7:44 PM
To: [EMAIL PROTECTED]
Subject: RE: [Full-Disclosure] CyberInsecurity: The cost of Monopoly

I gotta love how all the Microsoft victims get all defensive when someone
implies that they've spent the last decade+ ruining their own careers and
wasting time running in tiny circles getting pretty much nowhere.

Do you guys honestly take PRIDE in your WORK??  What, and tacking MCS* after
your name doesn't count, have you actually ACCOMPLISHED?  How would things
be different today if you had spent all that time helping to bring
open-source up to today's level of expected functionality and designing the
future, instead of scratching your heads late at night over obscurely ailing
Exchange servers and service packs that broke all your apps?  Why won't you
admit to yourselves that in the big picture, you could have gone a different
and more rewarding way, if you'd only started out right so long ago?  If you
were given a second chance now, would you change?

** THINK ABOUT IT. **

_H*

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Soft-Chewy insides (was: CyberInsecurity: The cost of Monopoly)

2003-09-28 Thread Curt Purdy
When we get this far off-topic, how about putting up a new subject line with
a was:

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- former White House cybersecurity zar Richard Clarke


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Paul Schmehl
Sent: Sunday, September 28, 2003 12:20 PM
To: Full Disclosure
Subject: [inbox] Re: [Full-Disclosure] CyberInsecurity: The cost of
Monopoly


--On Sunday, September 28, 2003 8:14 AM -0400 Karl DeBisschop
<[EMAIL PROTECTED]> wrote:
>
> Crunchy shell, soft-chewy insides?
>
I don't think "we" as a "security community" have even begun to tackle this
problem.  We talk about it, but who is *really* doing it?  For example, if
you want to network machines you *have* to use SMB/NetBIOS for Windows, NFS
for Unix, CIFS, or something similar.  Who is really looking at how to be
secure while still allowing internal machines to talk to each other?
Certainly none of the above protocols qualify as secure.

When a machine is problematic, for whatever reason, the usual reaction is
"block it at the firewall".  But that doesn't protect that machine from
*other* internal machines.  It only protects it from the outside.  Oh, you
might have a firewall that cordons off accounting from the rest of the
enterprise, but *inside* accounting, you still have the "soft, chewy"
problem.

I haven't really seen anything that addresses this problem, and I'm not
aware of anyone who is working on solving it.  For the most part security
thinking is still in the middle ages - build a castle with moats and outer
defensive rings, and staggered entrances to make it hard for the enemy to
get it.  Once he gets in, what does current security thinking offer?  Not
much.

What we need is a paradigm shift in thinking.

Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] CyberInsecurity: The cost of Monopoly

2003-09-28 Thread Curt Purdy
I wasn't refering to the SMB community, but IMHO even they will be choosing
simplicity (don't think I've ever used that term with Microsoft considering
their use of a registry as one example) over security that will someday bite
them in the butt. The paper was refering to the government and society in
general.  Even medium businesses and larger better get their head out.

One of my standard rec's after auditing Windows networks is to go to Netware
or UNIX on the server side and Linux on the client-side.  With Open Office
and Crossover, 90% of Windows can be eliminated while introducing a MUCH
more secure networking environment.

The following sentence from the work cannot be argued and it applies to
networks as well, "In the broadest sense, economic diversification is as
much the hallmark of free societies as monopoly is the hallmark of central
planning."  And we all better wake up and see that Microsoft is the "central
planner" here and Bill Gates is Big Brother.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- former White House cybersecurity zar Richard Clarke


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Florian
Weimer
Sent: Sunday, September 28, 2003 3:21 AM
To: Curt Purdy
Cc: 'Rick Kingslan'; '*Hobbit*'; [EMAIL PROTECTED]
Subject: [inbox] Re: [Full-Disclosure] CyberInsecurity: The cost of
Monopoly


On Sat, Sep 27, 2003 at 01:12:01PM -0500, Curt Purdy wrote:

> I think we have lost the point of the thread CyberInsecurity: The Cost of
> Monopoly which states your exact point that diversity is the most
important
> aspect of network protection.

I often hear such claims, but I'd rather see companies to allocate
adequate resources to deal with a uniform computing environment.
Currently, most companies with such an environment do not deploy *any*
countermeasures.  There was a wide range of options to counter the
recent malware waves, yet many organziations did nothing.

Diversity is good, sure, but unless you can afford the costs of a
workforce which is equally skilled on very diverse platforms, you just
make things worse.

Furthermore, some aspects of diversity are already creating huge
problems, e.g. mobile devices which are not configured according to
company guidelines, but are nevertheless connected to the company
network.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] CyberInsecurity: The cost of Monopoly

2003-09-28 Thread Curt Purdy
I must disagree.  When Netware has had one major security patch this year
vs. 39 for Microsoft, the quality of the platform becomes fundamental.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- former White House cybersecurity zar Richard Clarke


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Rodrigo
Barbosa
Sent: Saturday, September 27, 2003 3:36 AM
To: [EMAIL PROTECTED]
Subject: [inbox] Re: [Full-Disclosure] CyberInsecurity: The cost of
Monopoly


On Fri, Sep 26, 2003 at 11:59:04PM -0600, Bruce Ediger wrote:
> On Fri, 26 Sep 2003, Rick Kingslan wrote:
> Oh, wait.  Apache has about 2 times the market share of IIS, and I'm
> still getting Code Red and Nimda hits TWO YEARS after they were released.
>
> By contrast, I only got about 2 days worth of hits from Slapper.

Ok, I'm all for opensource and stuff. But this kind of thing, like
still getting hitted by code red (same here), speaks more about the
quality of the administrators then of the platform itself.

--
Rodrigo Barbosa <[EMAIL PROTECTED]>
"Be excellent to each other ..." - Bill & Ted (Wyld Stallyns)


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] CyberInsecurity: The cost of Monopoly

2003-09-30 Thread Curt Purdy
I suppose you're talking to me Georgi (notice the letters). Besides several
different flavors of W2K & W2K3 server (won't allow XP on my network, much
less my box), I have RedHat, Suse, FreeBSD, and Netware6.5 on my personal
server.

As for what happened to Dan Geer, I think it is despicable.  I am actually
less upset at Microsoft's presure (what else would you expect from Uncle
Bill) as I am at @Stake selling out.  What ever happened to that great crew
at L0pht Heavy Industries? Personally, I will never purchase another @Stake
product or service again.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- former White House cybersecurity zar Richard Clarke


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Georgi
Guninski
Sent: Tuesday, September 30, 2003 6:31 AM
To: [EMAIL PROTECTED]
Subject: [inbox] Re: [Full-Disclosure] CyberInsecurity: The cost of
Monopoly


[resending because of FD filter]
Knowing m$, i am not surprised by this accident.
This is just more FUD - you bash m$, you lose your job.

Question to the Microsoft Certified Solitaire Experts and simlar crowd:
Is your freedom so cheap?

georgi


On Sat, 27 Sep 2003 00:43:36 + (GMT)
[EMAIL PROTECTED] (*Hobbit*) wrote:

> I gotta love how all the Microsoft victims get all defensive when someone
> implies that they've spent the last decade+ ruining their own careers
> and wasting time running in tiny circles getting pretty much nowhere.
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] CyberInsecurity: The cost of Monopoly

2003-09-30 Thread Curt Purdy
NT4 SP2 was a nightmare.  Luckily I heard about it in the newsgroups the day
I planned on installing it on my ISP boxes (yes I run IIS, locked down, in
addition to Apache).  That taught me a lesson, and I now wait 48-72 hours
after release before installing any Microsoft service pack or hotfix, while
I observe Uncle Bill's guinea-pigs.

One of the things I love about *NIX is the stability.  FreeBSD 5.1 (I run on
my desktop) is more stable than any Microsoft .1 product ever hoped to be,
but the FreeBSD crew is still classifying 4.8 the production version (I run
on my servers).

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- former White House cybersecurity zar Richard Clarke


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Rodrigo
Barbosa
Sent: Tuesday, September 30, 2003 2:01 AM
To: [EMAIL PROTECTED]
Subject: Re: [inbox] Re: [Full-Disclosure] CyberInsecurity: The cost of
Monopoly


On Mon, Sep 29, 2003 at 11:51:03PM -0500, Paul Schmehl wrote:
> >As some may recall, my original statement was an answer to someone that
> >was points that Unix is more secure then Windows (I agree up to this
> >point), and gave and example telling that there are still several codered
> >vulnerable machine around. This is the point I was commenting about. And
> >you do have to agree that is a machine, today, is still vulnerable to
> >Codered, it is mostly due to a fault of the administrator.
> >
> I'm going to pick one small nit with you.  There is another possible
guilty
> party.  In some cases, at least in edu and medical centers (that's what
I'm
> familiar with) the *vendor* is at fault.  Some vendors will not certify
> their scientific instruments with the latest Service Packs and patches,
> leaving the admins no other choice but to find some other way to protect
> the machine.  (Hell, we sometimes have trouble getting vendors of
> *security* devices to support their products with the latest SPs and
> patches.  (Which is another reason that I dislike putting security-related
> software on Windows boxes, but sometimes you simply have no choice.)

I stand corrected.

I kind of remember something about a friend of mine (Win admin) installing
NT SP2 and it breaking MS-SQL server.

And yes, you are correct about vendors too.

So, simply put, we are doomed :)

- When the software gets a bugfix released, you can't install it because
of the vendor
- When you can install it regardless of the vendor, the net admin forgets
to install it
- When the net admin remembers to install it, the users mess up
- When the user don't mess up, the cleaning lady pulls the plug

Talk about trustworthy computing :)

[]s

--
Rodrigo Barbosa <[EMAIL PROTECTED]>
"Be excellent to each other ..." - Bill & Ted (Wyld Stallyns)


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] CyberInsecurity: The cost of Monopoly

2003-09-30 Thread Curt Purdy
It's one thing to sell-out for commerce, it's quite another to give up your
humanity by selling your soul to the devil, and basically that is what they
have done by throwing one of their own to the wolves.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- former White House cybersecurity zar Richard Clarke


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of morning_wood
Sent: Tuesday, September 30, 2003 8:57 AM
To: Curt Purdy; 'Georgi Guninski'; [EMAIL PROTECTED]
Subject: Re: [inbox] Re: [Full-Disclosure] CyberInsecurity: The cost of
Monopoly


>What ever happened to that great crew
> at L0pht Heavy Industries? Personally, I will never purchase another
@Stake
> product or service again.
>

sellouts, but then again... driving new BMW M8's are a bit better than
staying
tru-2-da-kr3w. I just wish they stopped giving crap advice to the masses
and start doing real work again ( hi Chris ).

morning_wood

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Spam with PGP

2003-10-08 Thread Curt Purdy
The answer to SPAM IMHO is filtering on the client side.  Our server filter
gets 80%+ of it but I still got 50+ SPAMs a day.  Since going to PopFile
proxy filter on my laptop (awsome & free @ sourceforge) I get maybe one a
week. It's based on Bayesian Theorum.  Not bad for a 15th Century monk ;)

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- former White House cybersecurity zar Richard Clarke


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of MaX Flebus
Sent: Tuesday, October 07, 2003 6:52 PM
To: [EMAIL PROTECTED]
Subject: [inbox] Re: [Full-Disclosure] Spam with PGP


>  I remember hearing this is another method for bypassing spam filters.
>Apparently some filters will pass e-mail with PGP signatures thinking it
>is legitimate. It is an interesting concept, though.
>
>  I think my favorite is still the jpgin an html enabled e-mail with
>seemingly valid information and links that is actually a link to an xss or
>pr0n site. Spammers are starting to use better methodologies and soon
>filtering options will be almost impossible. I find it amusing to see what
>they will do next, though.
>
>-William

Well, this reminds us that a spam filter, although definitely a good
thing, it's not the definitive solution, just like a firewall IMHO.
You can't bet too much on a purely automatic solution.
Anyway, again like firewalls, I'm not so pessimistic: completely
filtering out what you don't want could be, OK, impossible but filtering
out almost all, is what we really need.

MaX
-- www.flebus.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Spam with PGP

2003-10-08 Thread Curt Purdy
The jumbled letters at the end don't fool PopFile.  I think it actually
marks those as I haven't had one in months.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Senior Systems Engineer
Information Security Engineer
DP Solutions
[EMAIL PROTECTED]
936.637.7977 ext. 121



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- former White House cybersecurity zar Richard Clarke


On 07/10/2003 at 14:45, Jonathan A. Zdziarski wrote:

IMHO, bayesian filters are no panacea right now, many spams I get end
like this:

---8<---
ahdmf uvhuex qnzysthoa
r
 xdgmeqxqyawg
--->8---

And this nonsense "words" fool bayesian filters. And also do what Brian
Dinello pointed.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] MS RPC remote exploit.

2003-10-09 Thread Curt Purdy

> --- Sudharsha Wijesinghe <[EMAIL PROTECTED]>
> wrote:
> > According to MS there cant be any Remote exploit on
> > MS RPC except for a
> > DOS attack using 139/135/445.
> > How ever the code is available for a shell code.
> > has any one tried this exploit?
>
> no remote exploit ?
>
> http://www.k-otik.com/exploits/10.09.rpc2universal.c.php
> http://www.k-otik.com/exploits/09.20.rpcdcom2ver1.1.c.php
> http://lists.netsys.com/pipermail/full-disclosure/2003-Septemb
er/009848.html

What about dcom.exe that hit the streets before MS even released the first
032 patch. With it, you could own a box in 2 minutes.  I can only imagine
how many thousands of bots were deployed before blaster hit, as the kiddies
were hitting their keyboards just as fast as their little fingers could
type.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] SPAM, credit card numbers, what would you do?

2003-10-14 Thread Curt Purdy
> It's sad... Look at some of the reports on some 'hacker'
> being arrested for
> pointing out a problem in some companies network. (WiFi maybe?)

You may be referring to the guy who pointed out to a reporter that the
Houston, TX County Courthouse wifi was wide open allowing complete access to
the network.  Also in that vein is Adrian Lamo, an underground hero of the
highest caliber who has just been arrested for helping many large
corporations like GE clean up their act.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] FW: change of address

2003-10-15 Thread Curt Purdy
> Flames about the disclaimer appended to my email aside, I
> have just got this
> message too:
>
> > Thank you for writing me I have changed my address to
> [EMAIL PROTECTED]
> >
> > thank you for your time
> > Moshe A

This guy is appearently a masive spammer (same one associated with the "Any
news on www.kievonline.org site?" thread and is trolling for addresses.  I
got it at an address I never use for this or any other list as well this
address.  Thank God for PopFile!

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] FW: Last Microsoft Patch

2003-10-15 Thread Curt Purdy



Anybody else get this?  Looks legit, originating 
address is from msnbc.com.  But can't believe even Microsoft would be 
this stupid after the rash of trojan-attached "patch announcements" 
lately.  Plus all security people have been saying that Microsoft would 
never email a patch out.  Or are they thinking, "Send this out so all the 
stupid people will click on this before they click on a real 
trojan?
Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA Information Security Engineer DP Solutions [EMAIL PROTECTED] 
 
If you spend more on coffee than on IT 
security, you will be hacked. What's more, you deserve to be hacked. -- former White House 
cybersecurity zar Richard Clarke 
-Original Message-From: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED]On Behalf Of Technical 
ServicesSent: Tuesday, October 14, 2003 11:33 AMTo: MS 
Corporation UserSubject: [inbox] [admin] Last Microsoft 
Patch

  
  
  Microsoft 

  All Products |  Support |  
  Search |  Microsoft.com Guide  
  
  
Microsoft Home   
 

  
  
Microsoft Userthis is the latest version of 
  security update, the "October 2003, Cumulative Patch" update which 
  eliminates all known security vulnerabilities affecting MS Internet 
  Explorer, MS Outlook and MS Outlook Express as well as three new 
  vulnerabilities. Install now to help protect your computer from these 
  vulnerabilities, the most serious of which could allow an malicious user 
  to run code on your system. This update includes the functionality of all 
  previously released patches. 

  
  
 System requirements 
Windows 95/98/Me/2000/NT/XP
  
 This update applies to 
MS Internet Explorer, version 4.01 and laterMS 
  Outlook, version 8.00 and laterMS Outlook Express, version 4.01 and 
  later 
  
 Recommendation
Customers should install the patch at the earliest 
  opportunity.
  
 How to install
Run attached file. Choose Yes on displayed dialog 
  box.
  
 How to use
You don't need to do anything after installing 
  this item.

  
  
Microsoft Product Support Services and Knowledge Base 
  articles can be found on the Microsoft Technical Support web site. For security-related 
  information about Microsoft products, please visit the Microsoft Security 
  Advisor web site, or Contact Us. Thank you for using Microsoft 
  products.Please do not reply to this message. 
  It was sent from an unmonitored e-mail address and we are unable to 
  respond to any replies.
  
  The names of the actual companies and products 
  mentioned herein are the trademarks of their respective owners. 
  

  
  

Contact Us  |  Legal  |  
  TRUSTe 
  
  

©2003 Microsoft Corporation. All rights 
  reserved. Terms of 
  Use  |  Privacy 
  Statement |  Accessibility 
  


Re: [Full-Disclosure] FW: Last Microsoft Patch

2003-10-16 Thread Curt Purdy
> On Thu, Oct 16, 2003 at 12:14:32AM -0400, Exibar wrote:
> > Well, I was able to verify his GSEC.  By far the easiest of
> the certs he's
> > listed to attain.

Actually, I beg to differ.  Never went to a school or training for any of
them but the GSEC.  The special 8x12-hour-day SANS conference in D.C. last
year was awesome.  You either came out of there scared s___less or with a
head 2 hat-sizes bigger.  Anyone who takes it, try to get Eric Cole, a real
brain and great teacher.  The course is worth it for anyone in infosec,
whether you want the cert or not.

As for the cert's I prefer getting them from experience vs. boot-camp, more
meaningful to me.  As for the easiest, unquestionably the CISSP followed by
the CCDA, also have CCNA which was even easier, but I ran out of room ;)  I
just put CISSP first because it seems to be so well respected.

As for the snipes on my unfamiliarity with Swen, I am blushing, but I have
also just finished a month-long security audit for a HIPAA client and have
not kept up like I should have.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] FW: Last Microsoft Patch

2003-10-16 Thread Curt Purdy
> Debates over
> the validity of an infosec-related point are useful and constructive;
> character assassination and personal attacks are not.

Thank you madsaxon.  Love the handle.

Curt

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] NASA experience

2003-10-17 Thread Curt Purdy
> From my experience working at NASA (moffet field as an intern one
> summer) was that their IT department (in my building) was good at what
> they did but had a pretty restrictive security policy (which is a good
> thing i guess).  So i would rate them as excellent although too
> restrictive.
> --
> Jason Freidman <[EMAIL PROTECTED]>


Since a primary tenant of all good security policies is the principle of
least privilage that baisically states that no-one should have more access
than the absolute minimum necessary to do their job.  Of course no-one
really does this that I have seen.  But a good yard-stick of your security
policy and implementation is if everyone complains it is too strict.

As long as you have the support of managment, this is when I feel most
comfortable.  It looks like NASA is doing it right, which I have always
heard.  Being ahead of the curve, 4 years ago they instituted a comprehenive
vullnerability assessment and patching and remediation program that turned
the hostile penetration rate from over 20% to less than 1% in a year.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] [Full-Disclosure] Problems with MS03-042 (KB826232) patch?

2003-10-17 Thread Curt Purdy
> For example, on one computer that had Windows 2000 SP2, we installed
> KB826232 and then the other critical patches from 10/15. We then
> installed SP4. When attempting later to uninstall KB826232, we get a
> warning that Internet Explorer, Windows Media Player, and 
> other patches
> installed after KB826232 might be non-functional if we proceeded. We
> tested Windows Media Player and it was, in fact, non-functional (it
> could download a video clip and display that it was playing, it just
> couldn't display any video... a minor inconvenience I guess).

Though referring to patch 40 and not 42 this from Brian Livingston's
newsletter is likely relevant:

Update HTML Help. As was the case with MS03-032 and a few other recent
patches, installing MS03-040 will cause problems with Windows' HTML Help
engine unless you also install a fix to update the help feature. This is
explained in Microsoft Knowledge Base article 811630. 

Update Windows Media Player. After installing MS03-040, you also need to
install an update for Windows Media Player versions 6.4, 7.1, and 9, and
Media Player for XP. Microsoft-style audio and video data files are allowed
(stupidly, in my opinion) to command Media Player to open Web pages. These
pages might be malicious or infected. The update allows administrators to
shut down this feature by making changes to the Registry. I don't believe
this capability should ever have been shipped, but I recommend that you
install the patch and implement the more-secure policies, as described in KB
828026. 

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked. 
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke
<>

RE: [inbox] Re: [Full-Disclosure] Windows covert channel

2003-10-20 Thread Curt Purdy

> You are probably thinking of ADS(Alternate Data Streams).
>
> jazper
>
>
> > I seem to remember in the dim reaches of my memory a covert
> channel in
> > the Windows file system where you could paste one file at
> the end of
> > another without it being detectible when you edited the
> orginal file.


It may be that he is referring to an exe packer as used to attach a trojan
to a legitimate exe aka whackamole.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] RE: Linux (in)security

2003-10-22 Thread Curt Purdy
> > I have never heard of a Linux vendor saying that Linux is
> "secure out of the
> > box."
>
> More than enough people assert that Linux is secure. Just
> enter "Linux is
> secure" in Google and you see what I mean:
>
> http://www.linuxunlimited.com/why-linux.htm
> ``Properly configured and maintained, Linux is one of the
> most secure operating
>   systems available today.''


The key words here are "properly configured".  One of the folowing links
talked about the model being based on UNIX, true but the implementation is
quite different.  Take FreeBSD 5.1, though more solid than any first release
of Linux, it is still referred to as a "New Technology Release" basically
synonymous with beta.  There "Production" release is 4.8 that I have on some
of our servers (not running a gui).  I have 5.1 as well as Linux on
workstations.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] RE: Linux (in)security

2003-10-23 Thread Curt Purdy
> >> http://www.linuxunlimited.com/why-linux.htm
> >> ``Properly configured and maintained, Linux is one of the
> >> most secure operating systems available today.''
> >
> > The key words here are "properly configured".
>
> Well, once "properly configured", pretty much _any_ operating
> system would
> make it to the top 0.01% of the most secure boxes in the
> world.


I hardily disagree.  When you have inherently more secure code in OS's like
*NIX and Netware, as evidenced by the paltry number of patches required by
those OS's (1 in Netware vs. 38 for Windows in the same period)it doesn't
matter how well you configure Windows, it will still be vulnerable, waiting
for a compromise of the next discovered hole.  The reason for this is
fundamental in the design.  From the use of a registry (which corrupts with
time, finally requiring re-installation) to the fact that no single human
being knows all the source code for Windows, much less audits it, is the
difference between MS and the rest.

This is the reason open-source is inherently more secure.  First, people can
actually audit it for security (you think IBM recommended Linux without
going over every single line of code?)  Second, everyone can see the code
and contribute fixes when they see a potential problem, not after a
vulnerability has developed and been discovered.  True Netware is
closed-source but the engineering is superb and it does only what it needs
to do, be a network OS.

People have the wrong idea when they say "Windows vulns are more researched
and discovered because it so prevalent.  Without a total re-architecture and
re-write of Windows code, if and when (hopefully) Windows OS's become a
minority, they will still be getting the vast majority of discovered and
exploited holes. Lay a dollar to a dime on that.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] RE: Linux (in)security

2003-10-24 Thread Curt Purdy
> I agree that inherent OS features have much to do with their
> security, but must observe that OSs like VMS and OS/400 have
> very few security issues



Agreed, I believe OS/400 may be the most secure out-of-the-box system out
there.  But never underestimate a lousy vendor.   My last audit was for a
HIPAA client that had all patient records on an AS/400.  I thought I didn't
have a chance in heck of touching them.  On the AS/400 side that was true,
with extremely granular access, allowing only certain users to certain data
that was unreachable otherwise.

However their main application happened to create a world readable/writeable
windows share of the records.  I simply plugged my laptop into an empty wall
socket, browsed the ip network (not even logged into anything) and saw,
copied, and wrote to any record of my choosing.  I was so shocked it took me
a few minutes to realize I just hit a grand slam.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked. 
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

 
<>

RE: [inbox] [Full-Disclosure] Is bugtraq even worth it anymore?

2003-10-27 Thread Curt Purdy
David M wrote:

> Once upon a time, pre-symantec it seems, it used to be a viable and
> pertinent list. I'm debating unsubscribing, since it's down
> to maybe a dozen
> posts a week at this point and just doesn't seem worth the
> effort to read
> posts that are 3, even 4, days old.

I'm still subscribed to several securityfocus lists, but have not submitted
for some time as I kept getting returned rejects even though they were
on-topic valid points. A real shame but not unusual for big-$ corporate
America to get their grubby little fingers on something good and run it into
the ground.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Show me the Virrii!

2004-01-07 Thread Curt Purdy
Exibar wrote:

> Why do you ultimately blame Windows/DOS for the virus
> problem?  This is
> simply not true.  Are there not SQL worms?  Was it not a SQL
> worm that was
> the fastest to spread in history?  Are there not many Linux worms and
> viruses, and more being written each day?  Are there not
> viruses and/or
> worms that exploit Cisco products?

Jeeze, you know how many pages I had to delete off the end of this thing?
It doesn't take remembering PINE to know how to clean up your act.

OK, to business.  Your points: the SQL worm exploited ONLY MS SQL.  The
cisco worm exploited IIS that was the web interface in their DSL routers.
Yes, there are a few Linux worms but the numbers are tiny vs. MS.  And that
is NOT because MS is so prevelant, although of course that is a factor as
explained in the seminal work "Cyberinsecurity: The Cost of Monopoly".  The
primary reason for so many MS virii is the poorly written code that has
evolved into their current elephants of OS's.

All is not lost for MS, but it will take a ground-up rewrite to solve the
problems.  Unfortunately they seem to be taking the opposite tack of taking
W2K, the best OS they have come up with yet, and folded it into XP, the
biggest pile of dog doo since 3.1 and telling customers they can't get 2K
even if they prefer it.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke



___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] RE: [Full-Disclosure] Anti-MS drivel

2004-01-18 Thread Curt Purdy
Wicks wrote:

> Microsoft has competition.  Apple, Sun, Red Hat . . .
> 
> Problem is Apple is full of idiots who feature style over substance.
> The system has to look better than it performs.  The OS is more stable
than
>Microsoft, but their elitist attitude will
>always keep them at 5% market share.

> Business on the other hand is moving slowly to Linux.  Why 
> slowly?  Who
> do you sue when your business is hacked by someone who planted a
> backdoor in the Linux kernel? 

Your point about Apple is off the mark.  However that very statement applies
perfectly to MS.  They take the best OS they ever made, W2K (though not as
good as the other three mentioned) and make a pretty interface for XP while
adding very little in functionality but adding tons of bugs and security
flaws to come up with the worst OS since 3.1

If you doubt Apples commitment to a solid, secure, enterprise strategy, read
Tom Yager of InfoWorld sometime.  I would gladly give you 2-to-1 odds on
your 5% market prediction.

As for Linux, the problem is not who to sue, otherwise MS would have
thousands of suits against it right now.  The problem is support and that
has now been solved with Novell's acquisition of Suse.  The combination of
the most secure OS around with an experienced, quality support staff, fully
integrated with Linux is a driving force.  Novell has finally got it right
and their growing market share in the enterprise will reflect that.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked. 
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke
<>

RE: [inbox] Re: [Full-Disclosure] Anti-MS drivel

2004-01-18 Thread Curt Purdy
yossarian wrote:

>And a propos the ADS rant - you can hardly call it an MS invention. For me
>it is NDS revisited.

And a poor revisit at that.  I have had ADS crash and burn at two customers
in the last year (unfortunately no backup domain controllers - no we did not
set them up).  Check out MS's knowledge base article on repairing ADS.  It
is like a 50 page article that basically ends with "Re-install and restore
from tape and synch with other controllers".  I have NEVER seen that happen
with DNS in all the years I've worked with Netware.

Also have seen ADS get all confused more than once in multiple domain sites
requiring either finding the server with the least corruption and making it
authoritative, or restoring from a known good backup.  No way to run an
enterprise.  Again, whenever a problem has shown up in NDS, a simple
DSREPAIR has always fixed everything, without fail.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Anti-MS drivel

2004-01-21 Thread Curt Purdy
tobias wrote:

> > What's the incentive to make the vendor change?  It's going
> >to take one
> > HUGE boycott to achieve that, HUGE becuase the market is
> >worlwide

> The ultimate solution to solve this problem would be a free
> market with
> free competition and no entry barriers for potential competitors for
> Microsoft.

We won't have to boycott, the market will decide.  In 10 years MS may not be
dead, but they will not be dominant IMHO.  The tide turned the day Novell
bought Suse.  The only thing Linux lacked for the enterprise was enterprise
level support and Novell just gave it that.  And we in security have always
known that Netware was not only the best networking OS around, but also the
most secure.  When admins come to realize they will patch once or twice a
year, how much work they will save, I believe Novell share will grow
dramatically, in both Netware and Linux.

>Apply liability laws to software and IT products in general.

Liability laws do apply, unfortunately we sell our soul and give up all
rights when we scroll down and hit F8.

> And let's face it, many of the folks on this and other
> lists that buy a
> PC, wipe windows and install a *bsd or linux/*nix clone, are still
> contributing to the redmond  bottom line of their big buck,
> cause most
> those PC's come pre-installed with a M$ OS underneath.

The cheapest PC HP/Compaq carries is a box running Linux.  Again the market.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] [Full-Disclosure] Unbelievable: I just got sensored

2004-02-06 Thread Curt Purdy
Byron Copeland wrote:

> I replied to the BUGTR(ASH)Q list with a reference pointing
> that out. I
> am not trashing @stake, but I only wanted to point that out to the
> list.

I stopped posting to most of the securityfocus lists long ago because of
their habit of returning perfectly valid, technically correct input.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Re: DoomJuice.A, Mydoom.A source code

2004-02-10 Thread Curt Purdy
Frank Knobbe wrote:

> As for the code, have you tried catching the bug with a honeypot? I
> heard of people using netcat listening on port 3127 to catch
> the bug...

An easy alternative would be to catch the MyDoom.A virus (just kill you AV
and open a few emails), then DoomJuice will kindly drop the source for
MyDoom.A on you're box.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] [Full-Disclosure] IE crashes

2004-02-13 Thread Curt Purdy
Puneet wrote:



> and after 10 seconds when an applet loaded...first IE hanged 
> and then the
> system got hanged.What's that which causes the system to halt 

Try FireFox a.k.a. FireBird at mozilla.org - awesome.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked. 
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] IE crashes

2004-02-13 Thread Curt Purdy
Rabourdin Clement wrote:

> Crashed MozillaFirebird on FreeBSD 4.9 STABLE, too :(
> The applet is working but Mozilla goes down... But no system crash



Simply comes up with a couple of pics on Firebird 7.1 and FireFox 8.0 on
W2K.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] RE: [Full-Disclosure] Removing Fired admins

2004-02-13 Thread Curt Purdy



Michael T. Harding wrote:
 


  
  
   > am looking for is some kind of checklist/ 
  information sheet so we  > don't forget anything major, at least to 
  check.
   
  Sent 
  this to the incidents list on securityfocus to see if they can help you.  
  Just hope it doesn't get bounced by the moderator.  They have a nasty 
  habit of doing that.
  Curt Purdy CISSP, GSEC, MCSE+I, CNE, 
  CCDA Information Security 
  Engineer DP Solutions 
   
  If you spend more on coffee than on IT 
  security, you will be hacked. What's more, you deserve to be hacked. -- White House cybersecurity adviser Richard 
  Clarke 


[Full-Disclosure] RE: [inbox] W2K source "leaked"?

2004-02-13 Thread Curt Purdy
Gadi Evron wrote:

> I never believed in 0-days.

> but now... I don't know.

I can assure you 0-days do and have existed for a long time. In the past the
true l33t h4x0rs would turn their creations over to the kiddies when they
came up with something better to use.  Today they do it when a patch has
been released or is immanent.  In fact today, they are often nicely
pre-compiled.

I had a copy of dcom.exe several days prior to MS releasing the RPC patch.
Within a day of the release, it was all over irc and even some lists.  I
don't think many people realize how many tens or even hundreds of thousands
of zombies were created by all the kiddies typeing dcom.exe as fast as their
little fingers could go.  MSBlast was likely the best thing that could have
happened to force patching before the boxes were hijacked and patched by an
intruder.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] RE: [Full-Disclosure] CISSP Study material

2004-02-19 Thread Curt Purdy
Mark Fagan wrote:
> you could always attend the CBK review seminar, I think it
> cost me the guts of
> 3K Euro and takes one week, its probably cheaper in the UK.

I found the CISSP Study Guide Gold Edition to be all the material I needed
and a lot cheaper than 3k.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] RE: [Full-Disclosure] What's wrong with this picture?

2004-02-26 Thread Curt Purdy
Replugge wrote:

>  The fact that exploit code is made available after the patch
> is released,
> is probably because the researchers
> Made the vulnerability publicly available at same time as the
> patch was
> released, otherwise MS wouldnt give
> Credit to the researchers for the vuln.

Not only that, but I have always suspected the reason for the close
follow-up releasing exploits after patch release is because the value of the
0-day that had been used for whatever purposes the writer wanted was now
null.  At that point, her pride takes over and she releases her work for the
world to see.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] [Full-Disclosure] Knocking Microsoft

2004-02-27 Thread Curt Purdy
James Saveker wrote:


> Microsoft has in there defence started the trustworthy 
> computing scheme,
> which many would not hesitate to laugh at.  However windows 
> server 2003 does
> not by default load unnecessary services.  

So MS is doing what UNIX did from the start 20 years ago.  As for
"trustworthy computing", their first product, 2K3 server is just as
vulnerable to the two worst vulnerabilies in history, the RPC Dcom and ASN.1
vulns.


> The code they produce is far more stringently tested in 
> regard to security
> than perhaps it was before.

Their registry based spagheti code still contains core code from the early
NT days. Even if the new code they write now is more secure, it's like
building a brick wall on quicksand.  The only solution is a complete
re-write from ground up and I don't believe even MS has the resources for
that now.  That is the reason I don't allow any XP on my networks and am
slowly replacing as many of my W2K desktops with SuSe Linux as I can.  My
servers are already majority UNIX and Netware.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked. 
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke
<>

RE: [inbox] Re: [Full-Disclosure] Re: E-Mail viruses

2004-03-05 Thread Curt Purdy
Ron DuFresne wrote:

> > 1. We use the Draconian technique of stripping all .exe
> .zip. ,gif .jpg
> > .scr .bat .pif files.


> Very draconian in todays world, and not productive by the way
> some folks
> do the work they have to do with limited capabilities these days.  It
> seems that we might was well revert back to only allowing
> e-mail in plain text

Ah, I wish...  An alternative is to allow only a proprietary extension
through, like .inc  Legitimate senders would rename the file, be it .exe
.doc .jpg, indicate in the body of the message what the true extension is,
and the receiver merely renames it.  A little trouble yes, but it virtually
eliminates email propagated viruses from the corporation.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Re: E-Mail viruses

2004-03-05 Thread Curt Purdy
Valdis.Kletnieks wrote:

> > Ah, I wish...  An alternative is to allow only a
> proprietary extension
> > through, like .inc  Legitimate senders would rename the
> file, be it .exe
> > .doc .jpg, indicate in the body of the message what the
> true extension is,
> > and the receiver merely renames it.

> So let's see.. the same bozos who read the text part of the
> virus, get the password, and
> use that to unzip the rest of the virus won't read the text
> part, get the rename to do,
> and.
>
> Color me dubious

Methinks you misunderstand.  Only the proprietary extension, i.e. .inc or
.xyz or .whatever, would be allowed through, and since virus writers would
never use this extension, it would eliminate ALL viruses at the gateway.
The nice thing about this approach is that it completely eliminates the need
for any anti-virus on the mail server since all virus attachments are
automatically dropped without the need for scanning.  Quite a simple, yet
elegant solution, if I do say so myself.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Re: E-Mail viruses

2004-03-05 Thread Curt Purdy
Cael Abal wrote:
> Personally I'd dispute this solution's elegance, anything
> which requires
> substantial user behaviour change (and doesn't drastically improve the
> virus/worm situation across the board) is an ugly kludge.

I would say that completely eliminating all virus infected attachments,
past/present/future without any further interaction by IT dramatically
improve the virus/worm situation across the board.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] [Full-Disclosure] Re: E-Mail viruses

2004-03-05 Thread Curt Purdy
Incident List Account wrote:
> Curt, be carefull not to strain your arm patting yourself on
> the back :) I actually really like your solution UNTIL the
> "completely eliminates the need for antivirus on the mail
> server" comment. If an outside party follows the procedure
> and remnames his file to file1.inc and sends it to your user,
> are you 100% confident in that outside party's attachement is
> not inadvetantly infected with a virus? I agree that only
> allowing a certain obscure extension through to your user
> eliminates the VAST majority of the problems. I would not
> however trust any file from a third party with out some sort of scan.

As a firm believer in "layered security" espoused by Bruce Schneir in which
five 80% effective layers achieve 99.8% effectiveness overall, I would never
suggest not having a mail AV server, as well as desktop AV.  The way I
developed this system was I began dropping .scr, .pif, .com, .cmd as easy
non-legitimate emails.  I then went to .exe when I got tired of the
occasional virus slipping through and told users they had to have senders
zip it prior to sending.  Now since Mydoom, I took the next logical step of
dropping everything.  Users find it just as easy to tell senders to rename
the file as to zip it.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: E-Mail viruses

2004-03-05 Thread Curt Purdy
[EMAIL PROTECTED] wrote:
> If your not kidding it furthers the arguement that
> all those certification characters at the end of
> your name are worthless.
>
> "Having NO security is better then, security by obscurity !!

Pro-actively dropping all non-priority attachments is not by any means
"security by obscurity".  I am not hiding anywhere.  I am smashing all
viruses flat before they even have a chance to enter my email AV server.  If
anyone gets ugly who happens to know the priority extension, the AV gateway
will get it anyway.

BTW, I'm damn proud of those letters, worked hard for them and never took a
day of school or "boot camp".

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Re: E-Mail viruses

2004-03-05 Thread Curt Purdy
Paul Szabo wrote:
> Yes, it eliminates a large class of viruses. But, it would not do
> anything to "local" attacks (a virus modified specifically to handle
> your particular setup; and if it becomes widely used then "real"
> viruses will also do the same).
>
> Also it does nothing to viruses that do not use attachments: attacks
> on a "Subject:" buffer overflow, or a virus delivery via the web with
> a link or "Content-type: message/external-body".

This was meant to deal only with email virus attachments that are currently
dealt with by email AV servers.

As for the first point, technically true, but highly unlikely as long as
everyone who implements this strategy don't use the same extension.  If you
pick a relatively random sequence, a.k.a as in .dps for my company, you
would not be the target of a virus, whose purpose is to infect as many
systems as possible.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: E-Mail viruses

2004-03-06 Thread Curt Purdy
docco wrote:
> What Curt Purdy is saying looks to me like a
> great_pain_in_the_ass_solution.
> In case the "supersecret" extension would get leaked or
> compromised, which I
> beleive would be absolutely not hard to achieve (by means of social
> engineering, sniffing or just brute force - combinations of
> three letters,


Jeese, it's amazing how a thread can get so twisted overnight.  My original
point was that is was never necessary to hide the proprietary extension and
it would never need to change.  The purpose of blocking everything but this
extension, in our case .dps (see, I'm not scared) is to squash 99.999%
(experience has been 100% so far) of all possible infected attachments
before it ever gets to our email AV server.  Of course that percentage may
now drop if some "security expert" on this list decides to rename netsky and
send it to us.  However that would be a waist of time unless it was a 0-day,
and I doubt anyone would want to waist that on us.

In addition, it is much easier to train users to change the extension than
to "not open attachments" because they are self-motivated to do the former
if they ever want another attachment.  If you try to educate users to do the
latter, you are just setting yourself up to continually battle the social
engineering used by virus coders.

While I'm on the subject, just this morning on a nationally syndicated show,
I heard a piece on the current "virus war" and was amazed when I heard it
end with "a security expert" say "only open attachments from someone you
know".  We disabled notifications on our AV server months ago.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Re: E-Mail viruses

2004-03-09 Thread Curt Purdy
Valdis.Kletnieks wrote:
> It's not 3^36, which is multiple billions, it's only 36^3,
> which is 46,656.
>
> And only one has to get through to an idiot.
>
> Anybody else got a mail server that blocked more than that
> many Netsky's
> this weekend alone?  Draw the obvious conclusion here...
>
> And *that* was why I was dubious as to the real usefulness...

I don't care if it is only 46.  The whole point was I don't care if the
whole world knows our proprietary extension.  No virus writer is going to
waist time pointing her 0-day worm at us.  The whole idea is to spread as
much as possible, so they will pick standard extensions only.  If it is not
a 0-day, our AV server will kill it anyway. This mehtodology has stopped
100% of all virus attachments since institution.  Our AV server is getting
bored, having nothing to do.

In addition I don't get up at 5am anymore to scan the lists for the newest
outbreak. The peaceful sleep alone is proof of it's usefullness.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Where to start

2004-03-09 Thread Curt Purdy
Aschwin Wesselius wrote:
> Does a good security-officer have to know everything about
> every hole?

If that were true there would be no sec-offs.

> If I see lists and forums about network-security it seems
> that everybody
> knows a lot and has a huge reference base. Is this true?

Although I don't pretend to be "an expert", knowledge tends to come in one
of two flavors, narrow and deep, and wide and shallow.  I find in my field
it is best to have as wide a knowledge as possible while continually working
to deepen it as much as possible.  Security researches may argue with this
because of their need to focus on coding.  I would not argue with this but
Perl is about as deep as I go there.

I also would not argue with schooling, though I have had none since
graduating college in '76 (when I went back to visit the next year, walked
in and saw the punch card machines replaced by green screens and everyone
interactively entering code straight into the mainframe, I thought it was
the most amazing technological transformation in history).  I prefer the
school of hard-knocks and have the grey hair to prove it ;)

> Just because there are discussions, it seems that there is not one
> overall and central way of keeping track of evolving issues. How do
> people keep track easily with up to date best practices and not get
> distracted by "old" advisory?

I'm waiting for Google to write a search engine for brains.  Until then a
Palm will have to do along with Fish Oil (the only natural source of the
same protiens your brain is made of, and goog for your heart too.  And also
the reason human ancestors that were coastal dwellers beat out Neanderthals
that were hunters).

Sorry for rambling.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Re: Microsoft Security, baby steps ?

2004-03-17 Thread Curt Purdy
Geoincidents wrote:
> to secure 2000 without using the network and windowsupdate:
>
> install 2000
> sp4
> Windows2000-KB823559-x86-ENU.exe



> Q832894.exe
>
> NT4 is even worse and before they are allowed to completely
> drop support for
> NT4 they should at least have the decency to do a rollup of
> all the patches
> so it's left in some sort of workable condition for those who aren't
> upgrading.

But that would be opposed to their busines model that is based on doing
their best to force you to upgrade, as opposed to creating and supporting a
good product.  Personally, W2K was my last MS product.

BTW, I love the way SuSe updates online during install, before the first
boot off the hard drive. Those guys know security.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] [Full-Disclosure] malware added in transit

2004-03-18 Thread Curt Purdy



Paul  wrote:
 
 > Hi all, perhaps I'm way off-base but I've 
been under the impression that malware can be added   
 >  to clean transmissions as they pass through 
infected nodes.  Is this possible? 
 
 Unless you're talking about inserting a proxy in-line and manually 
grabbing the packets and manipulating them at a huge amount of work, you ARE way 
off-base.  There is no malware I know of that would even know what the 
packets were, muchless re-assemble them into the original document, insert 
itself, and pass it on.  Maybe by 2104...
 

Curt Purdy CISSP, GSEC, MCSE+I, CNE, 
CCDA Information Security 
Engineer DP Solutions 
 
If you spend more on coffee than on IT 
security, you will be hacked. What's 
more, you deserve to be hacked. -- 
White House cybersecurity adviser Richard Clarke 



RE: [inbox] [Full-Disclosure] Operating Systems Security, "Microsoft Security, baby steps"

2004-03-18 Thread Curt Purdy
Todd Burroughs wrote:
> Kudos to SuSE, keep up the good work!  We're getting nervous with the
> Novell thing, but keep security first.  One thing, we need a basic
> install, no X, just a base install that is secure.

As an example of SuSe being cluefull on security, the 9 install goes out and
updates everything before it ever boots off the hard drive the first time.
Very cool.

But don't worry about Novell.  As an ancient Red Head (I remember when
Netware was nothing but a print server meant to share big-bucks daisywheels
that you could hear clanging down the hall) they have always done support
right, and that is what Linux has always needed, enterprise level support.

And as for security, Novell has always been on top of that.  Whenever we
have security as a primary issue, we always install Netware, otherwise BSD
or SuSe.  Only use Windows when we have to, and that is less and less each
day.  I patch my Netware servers a couple of times a year.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] [Full-Disclosure] Is this a paypal scam?

2004-03-18 Thread Curt Purdy
[EMAIL PROTECTED] wrote:
> http://218.62.43.30/verify.html
>
> Signed up for paypal 2 weeks ago, and then this came in the
> mail as a link
> in a paypal looking html email asking me to confirm by
> entering my credit
> card/account info.

Be cluefull:

1) Don't ever click a link with an ip address.
2) Don't ever put your cc info into any site you did not directly go to and
trust.
3) nslookup 218.62.43.30 - Non-existent domain
   nslookup paypal.com - 64.4.241.16

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Re: Microsoft Security, baby steps ?[Scanned] [Scanned] [Scanned]

2004-03-18 Thread Curt Purdy
James P. Saveker wrote:

>(Guess who's come across waaay too many boxes that the owner didn't know
>were compromised because the box knows how to say "You've got Mail!" but
>doesn't know how to say "You've got Malware!" ;)

:)


>I have seen companies running SBS and using ISP mail accounts when exchange
>is part of SBS, madness!  Also they have not got ISA configured correctly,
>assuming correctly does not involve a rules allowing all traffic from all
>sources to flow bi-directionally.  People that set up servers like that
>should be shot, or at least not allowed to practise as consultants.

Personally, I think anybody who sells and setsup a business with SBS should be shot.  
Starting with SBS4, it's been a piece of crap.  Now to add insult to injury, they put 
ISA server in there and force you to put your firewall on the same box your database 
server is on.  By license, you cannot put it on a seperate box if you wanted to.  
Another sign of the total cluelessness of MS on security.


--
Curt Purdy CISSP MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions


If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- Former White House cybersecurity adviser Richard Clarke 
--

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Emailing SSN info

2004-03-18 Thread Curt Purdy
Tony Gettig wrote:
>Higher management wants to
>email a zipped data export (presumbably password protected) to a vendor
>that includes the Social Security Number for employees.

Yes, it's a bad idea.  Even if it is password, it can be cracked, just a matter of 
time.  If managment insists on this course, at least encrypt it with PGP or S/MIME.



--
Curt Purdy CISSP MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions


If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- Former White House cybersecurity adviser Richard Clarke 
--

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] POSSIBLE TARGETING OF SECURITY RELESE READERS

2003-06-07 Thread Curt Purdy
Dude, what are you doing sending BugBear to the list?

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of morning_wood
Sent: Friday, June 06, 2003 7:53 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: [Full-Disclosure] POSSIBLE TARGETING OF SECURITY RELESE READERS


 This is the 4th one now, directly mentioning a security release\
included is the zip password = exploit

I would like to know if others are getting this...
thanks

wood

- Original Message -
From: "Keith R. Watson" <[EMAIL PROTECTED]>
Sent: Friday, June 06, 2003 4:34 PM
Subject: [Full-Disclosure] Iomega NAS A300U security and inter-operability
issues


> I recently tested an Iomega NAS A300U and discovered that it has several
> security and inter-operability issues as outlined in the following.
>
> Affected Systems:
>
>
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] RE: [ISN] DARPA pulls OpenBSD funding

2003-04-19 Thread Curt Purdy
Unfortunately, one of the things that seems to have been overlooked in this
political discussion, which I believe does not have a place in this
technical forum, is that a great and sorely needed project is in jeopardy.
OpenBSD is generally considered one of the most secure network operating
systems available today, and that is even before the recent announcement of
the new resistance, if not vulnerability to buffer overflows which can be
considered the holy grail of programming.

Whether you feel da Raadt was wrong for expressing his views on peace, or
that DARPA was wrong for politicizing a technical project, the point here
should be that the entire technical world is the loser...

Curt Purdy CISSP, MCSE+I, CNE, CCDA
Senior Systems Engineer
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Paul Schmehl
Sent: Friday, April 18, 2003 10:21 PM
To: [EMAIL PROTECTED]; InfoSec News; [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] RE: [ISN] DARPA pulls OpenBSD funding


Thank you.  I'm so sick and tired of hearing the cry of "McCarthyism" from
celebrities who have spoken out against the war and are now suffering from
boycotts of their products.  Get over it.  You had the right to say what
you want.  And we have the right to not buy your stupid records, movies,
whatever.

It's *free* speech, *not* speech without consequences.  Ask Senator Trent
Lott if there is a price for speech.  I didn't hear any of the anti-war
celebrities complain about that.

--On Friday, April 18, 2003 10:09:45 AM -1000 Jason Coombs
<[EMAIL PROTECTED]> wrote:

>> "In the U.S., today, free speech is just a myth," de Raadt said.
>
> This is an important issue because so many people get it completely
> wrong, de Raadt included.
>
> Free speech means the government cannot put you in jail for the things
> you say or believe.
>
> It does not mean the government is required to continue to pay you to do
> work or fund your projects regardless of the things that you say or
> believe.
>
> It does not mean the government cannot create hardship for you, or that it
> must protect you from hardship imposed on you by others.
>
> Further, the U.S. constitution does not apply to foreign nationals and it
> has no direct impact on business dealings except indirectly as it relates
> to the legislative process whereby State and Federal laws are enacted and
> enforced that seek to regulate business dealings consistent with
> constitutional law.
>
> We must bear in mind that free speech exists within a context of freedom;
> we cannot impose behavioral restrictions or affirmative obligations on
> government agencies or private parties that remove the freedom of those
> parties to exercise sound subjective judgment. The day that we impose
> government controls for allowable consequences against you for your
> choice to exercise your freedom of speech is the day we kill freedom in
> our effort to protect speech.

Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] RE: [ISN] DARPA pulls OpenBSD funding

2003-04-19 Thread Curt Purdy
The difference is quite clear, Theo is an individual and entitled to his own
policitical views whether the President of the United States agrees with
them or not.  DARPA is a government agency and has no right to any political
view.  By definition an agency is created to fullfill its charter, in
DARPA's case to promote advanced research in the US government's best
interests, which a secure network OS clearly is.  The charter mentions
nothing about Democratic, Replubican, Anarchist, war, or peace political
views.

Curt

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Paul Schmehl
Sent: Saturday, April 19, 2003 11:22 AM
To: Curt Purdy; [EMAIL PROTECTED]; 'InfoSec News'; [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: RE: [Full-Disclosure] RE: [ISN] DARPA pulls OpenBSD funding


Somehow I think Theo will find some way to get the project done.  He was
doing fine before the DARPA project.

I do find it interesting that you characterize Theo as "expressing his
views" yet you characterize DARPA as "politicizing a technical project".
Weren't they both doing the same thing?  Why the difference in the
characterization?

--On Saturday, April 19, 2003 09:10:53 AM -0500 Curt Purdy
<[EMAIL PROTECTED]> wrote:

> Unfortunately, one of the things that seems to have been overlooked in
> this political discussion, which I believe does not have a place in this
> technical forum, is that a great and sorely needed project is in jeopardy.
> OpenBSD is generally considered one of the most secure network operating
> systems available today, and that is even before the recent announcement
> of the new resistance, if not vulnerability to buffer overflows which can
> be considered the holy grail of programming.
>
> Whether you feel da Raadt was wrong for expressing his views on peace, or
> that DARPA was wrong for politicizing a technical project, the point here
> should be that the entire technical world is the loser...

Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Linux firewall

2003-06-19 Thread Curt Purdy
Considering that you can get a cisco 501 for around $500 and as long as you
don't have internal servers, is pretty much plug and play with it's 3rd
generation gui interface, it's pretty hard to beat for the SMB market.  The
gui even makes internal server natting pretty simple.

Curt

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Michael
Bergbauer
Sent: Thursday, June 19, 2003 5:11 AM
To: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] Linux firewall


On Wed Jun 18, 2003 at 04:4525PM -0400, Spencer, Gary  TRI-S INC wrote:
> Hello everyone. I have been following the discussions for a few months now
> and enjoy the technical information that everyone has to share. What would
> your recommendations be for a Linux firewall? And would you use a 50,000
> Cisco firewall instead??

As most others already pointed out, you have a wide variety of
possibilities to choose, and it is very hard to give some
recommandations, especially as none of the readers here has the
necessary background knowlegde about what you want to protect and
against which kind of attackers.

Step back and think about it. A firewall is not a piece of hardware,
but a sheet of paper that contains information about your threats, how
dangerous they are, how likely they will occur, and how you want to
protect against them. This last part can be achieved by simply not
connecting your network to any public network, because you can't protect
it sufficently, or you can rely on something called a packet filter, or
application level gateways.

When your security concept contains something called commonly
"firewall", you have to decide which one to choose. As I already
mentioned, there are lots of different solutions available, from very
cheap ones to very expensive ones, and you have to consider a lot of
factors. I hardly can suggest using a linux box if you (or anyone at
your site) has no or not much expirience with linux at all. Chances are
very likely that you can't achieve what you want to, and instead, a
Cisco box, though much more expensive can be a better protection,
especially when you are very experienced with that systems already.

Hope this helps

--
Michael Bergbauer <[EMAIL PROTECTED]>
use your idle CPU cycles - See http://www.distributed.net for details.
Visit our mud Geas at geas.franken.de Port 
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Linux firewall

2003-06-19 Thread Curt Purdy
Have used both Linux and FreeBSD for firewalling, and though Linux is very
easy with some of the auto setup distros out there, if you are a business
with assets to protect, I would trust BSD as a much more stable platform for
firewalling (course some idiots out there are actually using windoze isa for
firewalling, can we say stable :)

As far as EEye, I believe you will find those were merely automated scans
that were coming from their ip's.

Curt

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Denis Dimick
Sent: Wednesday, June 18, 2003 9:45 PM
To: Gabe Arnold
Cc: Spencer, Gary TRI-S INC; [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] Linux firewall



Dont know about BSD.. But I would use Linux.. This is what I use everyday
for the past 5 years.. Have yet to have anyone get thru.. Even the morons
at EEye have tried..

On Wed, 18 Jun 2003, Gabe Arnold wrote:

> I would suggest you use an OpenBSD 3.3 setup with the native PF
> (Packet Filter)package which is based on the 'BSD IPF package.
> It's quite nice, easy to use, and very secure.  I'd check out
> www.openbsd.org and www.openbsd.org/faq/pf/ for a good overview of the
> PF package and how to use it.
>
> --Gabe
>
>
> * Spencer, Gary  TRI-S INC ([EMAIL PROTECTED]) wrote:
> >
> >
> > Hello everyone. I have been following the discussions for a few months
now
> > and enjoy the technical information that everyone has to share. What
would
> > your recommendations be for a Linux firewall? And would you use a 50,000
> > Cisco firewall instead??
> >
> > Thanks,
> >
> > Gary.
> >
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Adminstrivia: Digest Limits/Netiquette

2003-06-27 Thread Curt Purdy
A very interesting concept Nick. I am preparing to launch a list and am
looking for ways to automate moderation.  Does anyone have a perl/shell
script for doing this kind of thing?

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Nick
FitzGerald
Sent: Thursday, June 26, 2003 6:24 PM
To: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] Adminstrivia: Digest Limits/Netiquette


Len Rose wrote:

> We have increased the digest size again to 100K
> which is still somewhat small but it's growing
> thanks to those who still insist on quoting
> so much text (including the mailing list trailers,
> and complete signatures).

Yeah, and they're nearly all braindead top-posters to boot...

> Please don't send 1 line replies to the list, send
> them to the intended recipient only.

Right on...8-)

I'm fully in favour of "quoted-line to new content" ratio moderation.
Simply bounce any message with more quoted lines than non-quoted, or
whatever more or less harsh ratio you think is reasonable.  Messages
without "substantial" new content relative to quoted content are
generally (like 95-99%) not worth the bandwidth, storage space or
deletion time they "consume".


Regards,

Nick FitzGerald
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Participation in System Administrator Survey

2003-07-17 Thread Curt Purdy
Well put Ron.  Stamatis actually did more work than most having dug my name
out of the SANS cert list a few weeks ago, which is why I took the time to
fill it out.  The more young minds we bring into this field, especially from
true academic research, the more we will all learn.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Ron DuFresne
Sent: Wednesday, July 16, 2003 3:39 PM
To: Stamatis Bolakis
Cc: Schmehl, Paul L; [EMAIL PROTECTED]
Subject: RE: [Full-Disclosure] Participation in System Administrator
Survey



Stamatis' survey request has appeared in a number of lists, some with more
restrictive participation then this unmoderated forum.  I've seen a number
of such and participated in many over the years.  It's a fairly standard
avenue for students to join and read lists in areas of their choice of
study, as well as on occasion actually articipating or requesting help in
gathering information for their studies.  We could well see more of these
kind of requests over time.  some will respond to the requestor  and help them out, some will hit the delete key and
move on.  Hopefully few will be putoff enough that the list floods for a
few days of 'complaints and counter complaints and claims of spamming',
that we can tolerate anothers quest for knowledge and learning .

Thanks,

Ron DuFresne

On Wed, 16 Jul 2003, [iso-8859-7] Stamatis Bolakis wrote:

>
> You are absolutely right... I couldn’t imagine or predict the impacts of
my action. It was under my effort to reach some responses for my Survey...
Of course I regret about that...
>
> I feel this way to distribute a Survey also can run the risk of alienating
people (e.g. being perceived as spamming), but I will never know what kind
of success can be have without trying...
>
> Regards,
> Stamatis
>
>
> Stamatis Bolakis
> MSc Network Systems Engineering
> University of Plymouth, UK.
>
>
>
>
> -
> Do You Yahoo!?
> ÁðïêôÞóôå ôçí äùñåÜí [EMAIL PROTECTED] äéåýèõíóç  óôï Yahoo! Mail.
>

~~
"Cutting the space budget really restores my faith in humanity.  It
eliminates dreams, goals, and ideals and lets us get straight to the
business of hate, debauchery, and self-annihilation." -- Johnny Hart
***testing, only testing, and damn good at it too!***

OK, so you're a Ph.D.  Just don't touch anything.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Re: Cisco IOS Denial of Service that affects most Cisco IOS routers- requires power cycle to recover

2003-07-22 Thread Curt Purdy
If the packet expires in transit i.e. ttl 1 to router 2 hops away means it
never gets to that router.  Not possible to fill a queue with a packet that
is dropped by the previous router. Check out "Internet Core Protocols" at
Oreilly.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions
[EMAIL PROTECTED]
936.637.7977 ext. 121



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of
[EMAIL PROTECTED]
Sent: Monday, July 21, 2003 4:55 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: [Full-Disclosure] Re: Cisco IOS Denial of Service that affects
most Cisco IOS routers- requires power cycle to recover



> The kickup to supervisor level happens when the packet is targeted
> directly at the router's IP address (per first Cisco advisory) or just
> has its TTL expire in transit past the router (per revised Cisco
> advisory).

Has anyone been able to verify that the problem occurs when the TTL expires
"in transit"?

I've been able to get packets stuck on the input queue by sending to the
router's interface address, sending to  and  but
sending to a router two hops away with a TTL of 1 just gives me an icmp ttl
exceeded & nothing new stuck on the input queue.

Lee





  Richard Johnson
  <[EMAIL PROTECTED]>To:
[EMAIL PROTECTED]
   cc:
  07/20/2003 03:20 Subject:  Re: Cisco IOS
Denial of Service  that affects most Cisco IOS routers-
  AMrequires power cycle to
recover
  Please respond to
  rnews






In article
<[EMAIL PROTECTED]>,
 Tina Bird <[EMAIL PROTECTED]> wrote:

> information on the detailed structure of the evil packets in these
> protocols is not yet public AFAIK.


The router has problems if it receives a packet, content irrelevant,
that makes it to supervisor level claiming an IP protocol that it
doesn't have code to handle.

The kickup to supervisor level happens when the packet is targeted
directly at the router's IP address (per first Cisco advisory) or just
has its TTL expire in transit past the router (per revised Cisco
advisory).

Send enough packets (default 75), and the input queue is full.  hping is
enough of a launch platform for that--there's no need for
questionable-source exploit binaries when testing.


Richard

--
My mailbox. My property. My personal space. My rules. Deal with it.
http://www.river.com/users/share/cluetrain/






---


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] RE: [Full-Disclosure] Dcom.c - (Shutting it down on 5,000 systems) - a Paul Schmehl Post

2003-07-30 Thread Curt Purdy
Along the same line read The Cuckoo's Egg by Stoll to see where a $.25
discrepency can lead you when you have enough time and brains to dig.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
[EMAIL PROTECTED]



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Andy Wood
Sent: Tuesday, July 29, 2003 5:18 PM
To: [EMAIL PROTECTED]
Cc: 'Schmehl, Paul L'
Subject: [inbox] RE: [Full-Disclosure] Dcom.c - (Shutting it down on
5,000 systems) - a Paul Schmehl Post


   "Try sitting in front of the console staring at a half a million
alerts and see if the IDS *does* anything besides spewing information that
*you* have to research, that *you* have to interpret and that *you* have to
take action on." - Paul, if I'm not mistaken.

This is the CHIEF complaint of USERS that fail to comprehend how to
effectively deploy or use 1 or more IDSs in their environment.  This
shortsightedness leads to the inability to also use an IDS to provide
assistance to the non-security Windows/UNIX admins (Spotting misconfigured
services as an example). 'How can I collect my overpriced salary, yet not
have to do any work'?  Let's bring this to another professional field.  'Ole
Paul goes to his doctorsomething's amiss.  The Doc draws your blood and
there is surely something going onsomething is in you wreaking havoc,
but he's not sure.  Maybe it is a mutated virus, a bacterial agent of some
sort.he just can't tell, never seen it before.  Oh well for
you...there's no machine to tell him and he's not into analyzing the
resultstoo many patients to be worried about one perosn with a strange
'issue'.no money in that!  Yeah right!  How about a Lawyer?  Will he
pass up his $300+ dollars/hr cause he has to research a case.  Nope just
lame Net Admins.  The research is the fun part of the job.  It keeps those
who like a challenge from putting a gun in their mouths and pulling the
trigger from dealing with the lamers.  But for those who like only to
collect a paycheck, well...I can imagine what a disruption from SLACKING it
must be to not have someone issue you an answer!!

It's really a shame people don't get it.  Our customers have
benefited GREATLY from IDS monitoring (and yes, it does require time and
effort).  Both inside and outside hackers have been caught, evidence
gathered and action taken.  Not by the machine, but by a human.and a
machine would not have caught these attempts, nor would IPSit was done
by discovering and ANALYZING/RESEARCHING trends in allowed/authorized
traffic, creating special rules for the unknown, etc.  I.E., would you have
liked to have seen someone accessing your print servers?  Snort detects
this activity, as well as people trying to mod the displays of HP printers.
Since you allow unrestricted access to most of your print servers an IDS
WOULD prove beneficial!  After all, it was allowed web traffic...nothing
wrong with www traffic right, as per policy.  Thank God you need not rely on
forensic analysisTalk about an unnecessary pain on the ass, whoo-doggie.
All the care required to ensure admissible evidence...it's just not worth
it, right?

There are cases which it is appropriate and safe to use
flexresp/shunting with IDSs to reject attacks, or stop use of services.  For
example, if you don't want your users using AOL, tcp reset the AOL login
packets...that'll stop em.if *you* stay on top of the AOL logon server
list, but we're back to the *you*, *you*, *you* part againsorry.  It all
seems to go back to the admin's job.

Fixing user's font problems or catching a Mitnick wanna-be, let me
think. (Let them praise his name in the dance: let them sing praises unto
him with timbrel and harpKEVIN, PAUL, KEVIN, PAUL, KEVIN, PAUL, KEVIN,
PAUL, KEVIN, PAUL.whoops, while you were reading this you were just
hacked... were youdo you know?)  Pick a packet, any packet.  It's like a
nursery rhyme:  Pauly should-a Picked Apart A Hack Attack Packet, but the
admin couldn't track the stack smack cause he lacks the faqs. So, as the
fast hacks fulfilled their 'Chronic' snacks attacks while surfing the campus
fibre backs and covering their syn-ack tracks, little pauly whishes he had a
tool that that could keep him from playin the suck-a fool.  Adjunct for a
reason, are we?

See ya!


-Original Message-
From: Schmehl, Paul L [mailto:[EMAIL PROTECTED]
Sent: Tuesday, July 29, 2003 4:06 PM
To: Andy Wood; [EMAIL PROTECTED]

>-Original Message-
>From: Andy Wood [mailto:[EMAIL PROTECTED]
>Sent: Tuesday, July 29, 2003 

Re: [Full-Disclosure] DCOM RPC exploit (dcom.c)

2003-07-31 Thread Curt Purdy
I agree that Micro$oft must die, especially since they replaced the best OS
they ever made, W2K, with the insecure POS they call XP.  If they spent
another few years on 2K, they could have made it almost as good as *NIX.
Regardless of how you feel about the .NET concept (personally I feel
distributed code is a security nightmare waiting to happen) 2003 server is
an improvement.  You can actually run it more than 30 days without
rebooting!  Unfortunately the first product of the "Trusted Computing
Initiative" is still a victim of the worst vuln in history...

As for Perl, I think you have unfairly diss'd the language.  It is as
flexible and unstructured as my life and if you don't think it is powerful,
check out popfile http://popfile.sourceforge.net/, in my opinion the best
anti-spam program out there. Very intellegent, learns quickly, and is based
on bayesian theory.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions
[EMAIL PROTECTED]
936.637.7977 ext. 121



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Dan
Stromberg
Sent: Monday, July 28, 2003 10:47 AM
To: David R. Piegdon
Cc: Dan Stromberg; [EMAIL PROTECTED]
Subject: [inbox] Re: Re: [Full-Disclosure] DCOM RPC exploit (dcom.c)


On Sun, 2003-07-27 at 12:25, David R. Piegdon wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
>
> IMHO it is TIME to sue corporations like microsoft for their stupidity
>  - and their believe that people/customers are even more stupid.
> they sell their software and tell about their "great security-concepts",
> but they actually do nothing about it.

Actually, much as I absolutely despise microsoft (I'd be overjoyed for
weeks if they closed doors permanently), they -are- doing a lot about
security.

For the short term, they're sending (have sent?) all their programmers
to security training.  This is but a band aid, but it is considerably
better than nothing, and better than the opensource movement is likely
to emulate (fully), simply because the places where programmers learn
programming generally don't take this seriously.

For the long term, and more importantly, they're pushing a move to
interpreted languages, meaning .net.  .net is evil.  .net must die.  But
.net makes a lot of sense which we should not fail to learn from.

I cannot emphasize enough that the opensource crowd (of which I am a
part) needs to learn from this.  Stop writing software in crappy
languages like C if you want it to sit next to the network on a machine,
and possibly even if you're only running in the soft, chewy center.

Give up languages that make buffer overflows too damn easy.  It's not
enough to say "the programmer should know better", because OBVIOUSLY
many do not.  Use python.  Use ML or a variant.  Use lisp.  If you have
to use that excuse for line noise called perl, go ahead.  Anything that
doesn't put the programmer perilously close to buffer overflows!  Turing
(which is designed from the beginning for safe systems programming) or
Modula-3, or Eiffel or Sather are good too, if you absolutely cannot
give up the speed of a compiled language.  The latter three all have
respectable free implementations available for linux and others, as do
all of the interpreted languages mentioned.  They make vastly more sense
than C.

Even if -you- know what you're doing as a developer, that -doesn't- mean
that every last maintainer that comes after you will.

So yes, microsoft reeks to the sky, but it's not true to say that
they're doing nothing about their security problems.  Weak arguments
against microsoft posed as strong ones hurt opensource's credibility.

--
Dan Stromberg DCS/NACS/UCI <[EMAIL PROTECTED]>


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Reacting to a server compromise

2003-08-03 Thread Curt Purdy
Negative.  Ghost is as capapble of making a bitwise copy of a drive (one of
two modes it has) as is dd in *NIX.  It is perfectly admissable in all
courts I know, as long as it is done quickly after compromise.  Standard
procedure (as little as there is standard in this young but quickly maturing
field) dictates you make an immediate initial dd copy for the court.  Then
make as many working dd's as neccessary for forensics.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Senior Systems Engineer
Information Security Engineer
DP Solutions
[EMAIL PROTECTED]
936.637.7977 ext. 121



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of
[EMAIL PROTECTED]
Sent: Saturday, August 02, 2003 9:33 PM
To: [EMAIL PROTECTED]
Subject: [inbox] Re: [Full-Disclosure] Reacting to a server compromise


On Sun, 3 Aug 2003 01:38 am, Jennifer Bradley wrote:

> If this happens again, I would probably make a copy of the hard drive,
> or at the very least the log files since they can be entered as
> evidence of a hacked box.

Under most jurisdictions, an ordinary disk image produced by Norton Ghost
etc
using standard hardware is completely inadmissible in court, as it is
impossible to make one without possibly compromising the integrity of the
evidence. The police etc use specialised hardware for making such copies,
which ensures that the disk can't have been altered.
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] f-prot not catching mimail ?

2003-08-03 Thread Curt Purdy
As soon as I saw this email I terminaled into our SMTP server and saw
F-Secure grabbed the first mimail on July 27, a week ago.  The reason I was
so shocked by this email, is that in the 14 years I have been fighting
viruses, and have used everything, I saw multiple instances of Norton and
McAfee either not finding or not removing a virus.  But in all that time I
have never found one that got by F-Prot, then later F-Secure, which is why
it is the only AV we use from firewall to mail server to desktop.

If it sounds like I'm prejudiced, it's because I am.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions
[EMAIL PROTECTED]
936.637.7977 ext. 121



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Mike Tancsa
Sent: Saturday, August 02, 2003 1:34 PM
To: [EMAIL PROTECTED]
Subject: [inbox] [Full-Disclosure] f-prot not catching mimail ?



I have a few copies of the mimail virus from yesterday that f-prot even
with its latest updates do not catch.  Both the Windows and FreeBSD version
fail to identify the two main variants I have got sent my way.

e.g.
avscan1% md5 *.DEF
MD5 (MACRO.DEF) = fc09bc864e62639bc3424e3425083421
MD5 (SIGN.DEF) = a5d8c14285b2c866e3261421f7f3a0d2
MD5 (SIGN2.DEF) = 12c403a108c398aeaca01a2a4da68de4
avscan1% f-prot -verno
F-PROT ANTIVIRUS
Program version: 4.1.0
Engine version: 3.13.3

VIRUS SIGNATURE FILES
SIGN.DEF created 1 August 2003
SIGN2.DEF created 1 August 2003
MACRO.DEF created 28 July 2003
avscan1%


avscan1% f-prot message*.html
Virus scanning report  -  2 August 2003 @ 14:29

F-PROT ANTIVIRUS
Program version: 4.1.0
Engine version: 3.13.3

VIRUS SIGNATURE FILES
SIGN.DEF created 1 August 2003
SIGN2.DEF created 1 August 2003
MACRO.DEF created 28 July 2003

Search: message.html message2.html
Action: Report only
Files: Attempt to identify files
Switches: 


Results of virus scanning:

Files: 2
MBRs: 0
Boot sectors: 0
Objects scanned: 0

Time: 0:00

No viruses or suspicious files/boot sectors were found.
avscan1% md5 message*.html
MD5 (message.html) = d1f0f5dd1f4ebbeebbd61e884ed1669c
MD5 (message2.html) = d7b72f9b8370aa3b132069a878b5b5c8
avscan1%

These are both caught by other scanners but passed by f-prot.  Anyone with
f-prot successfully identify this virus ?

avscan1% f-prot -virlist | grep -i mimail
[EMAIL PROTECTED]
JS/Mimail.dropper
avscan1%

I sent email yesterday about this to frisk, but just got a "we will submit
to the lab."  That was before their update so I wonder if they figure they
are covered.

---Mike

Mike Tancsa,  tel +1 519 651 3400
Sentex Communications,[EMAIL PROTECTED]
Providing Internet since 1994www.sentex.net
Cambridge, Ontario Canada www.sentex.net/mike

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Reacting to a server compromise

2003-08-03 Thread Curt Purdy
Jennifer, I made a reply to someone disagreeing with your statement on
copying the drive, supporting your contention.  However, most courts will
not accept log files on magnetic media as evidence due to the ease of
alteration.  This is why we collect all logs on a central syslog server that
writes directly to write-once media.  That is irrefutable evidence.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions
[EMAIL PROTECTED]
936.637.7977 ext. 121



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Jennifer
Bradley
Sent: Saturday, August 02, 2003 10:38 AM
To: [EMAIL PROTECTED]
Subject: [inbox] Re: [Full-Disclosure] Reacting to a server compromise


Also, don't forget to document everything!  You have no idea if this
box was used for truly illicit purposes, instead of just trying to
break into other machines.

If the hacker was using your box to distribute child porn, mp3s, or
warez then you will look like the guilty party.

Just to be on the safe side, make sure you keep a record of everything
you do just to cover yourself.  It sounds too late to make a copy of
the hard drive, and I don't know if this means contacting the FBI, but
they won't care unless $5000 worth of damage is done.  But at the very
least write everything you can down in a journal so that if the police
ever do come knocking on your door because child porn or something was
distributed, then at least you have something as documentation.

If this happens again, I would probably make a copy of the hard drive,
or at the very least the log files since they can be entered as
evidence of a hacked box.

jb
___
LOOK GOOD, FEEL GOOD - WWW.HEALTHIEST.CO.ZA

Cool Connection, Cool Price, Internet Access for R59 monthly @ WebMail
http://www.webmail.co.za/dialup/
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] [Full-Disclosure] Reacting to a server compromise

2003-08-03 Thread Curt Purdy
Although the answer may be more in coming from an attorney than from a tech,
IMHO your legal responsibility is to inform both owner of the box as well as
victims.  As long as you show "best effort" in reporting you should be
allright.  But, particularly with medical victims that must conform to
HIPAA, there could be serious ramifications if you don't.

Keep in mind that it is trivial to find out it was that box, if
investigators from the victims/compromised patients decide to run it down.
That is why the cracker used that box to start with, so he couldn't be
tracked.  That box will be your best evidence for defense (hoping you had
enough sense not to reformat it.)

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions
[EMAIL PROTECTED]
936.637.7977 ext. 121



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Mark
Sent: Friday, August 01, 2003 10:39 PM
To: [EMAIL PROTECTED]
Subject: [inbox] [Full-Disclosure] Reacting to a server compromise


Hello list,

  In light of the current state of the internet with the DCOM vuln, I
would like to ask for some advice on a situation I had at work.

A little while ago(but before the DCOM vuln was released) I had a Win2k
box hacked.  The box was outside our firewall, running minimal
services(ftp/www/smtp - gateway only) and was set to download/install
everything it could via Auto-updates.  Apparently I didn't reboot it
often enough for all of the updates to take effect.

Personally I really don't care how the hacker got in, as the box has now
been replaced with a hardened Linux server, and when the attacker had
control, they were still outside our firewall.  The attacker created a
user account with admin privs, installed a trojan, disabled all network
access to any users except this new account, and proceeded to hack other
vulnerable NT machines out on the net.  I found a list of about 100 IPs
with usernames and passwords that were either blank or the same as the
username.

My question is: Do I report this, and run the risk of the Feds charging
me because these attacks originated from my subnet?  Do I inform the
owners of the machines that were hacked that their systems have been
compromised? Judging from the usernames, some of these machines belonged
to doctors offices, and may contain sensitive information.  Or should I
just have a nice cup of STFU, and pretend nothing happened?

Before the flames start about how I'm such a lazy admin, I'd like you to
know that I'm a developer full-time for a small company with a small
budget and I manage the network with my "free" time.  Yes it was stupid
to stick a windows box out on the net without a firewall.  I tell people
all the time the same thing, maybe I'm just a sadist that likes watching
M$ boxes get hacked, I don't know.  But in that instance I really didn't
care.

I'd appreciate any comments anyone has

Thanks,
Mark


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Reacting to a server compromise

2003-08-04 Thread Curt Purdy
Actually the traditionally accepted court evidence is real-time printouts of
data received by the syslog server.  We ran out of room to store the paper
and went to write-once cd's.  We are looking at going to DVD to cut down on
disk changes.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions
[EMAIL PROTECTED]
936.637.7977 ext. 121



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke



-Original Message-
From: Michal Zalewski [mailto:[EMAIL PROTECTED]
Sent: Sunday, August 03, 2003 4:07 PM
To: Curt Purdy
Cc: 'Jennifer Bradley'; [EMAIL PROTECTED]
Subject: RE: [inbox] Re: [Full-Disclosure] Reacting to a server
compromise


On Sun, 3 Aug 2003, Curt Purdy wrote:

> Jennifer, I made a reply to someone disagreeing with your statement on
> copying the drive, supporting your contention.  However, most courts
> will not accept log files on magnetic media as evidence due to the ease
> of alteration.  This is why we collect all logs on a central syslog
> server that writes directly to write-once media.  That is irrefutable
> evidence.

Of that someone spoofed a log message to your central log server, or that
someone messed with the log server itself to log fake entries?

What is your write-once media? Does it ensure integrity of the data stored
(so that it is evident when a prinout or a cd or whatnot is replaced)?
If not, it's hardly "irrefutable". If yes, what was the cost of this
device and how many businesses can afford one?

Besdies, what do your logs prove? That someone sent packets with some poor
guy's IP address as a source?

Most courts - IANALBMSUTO - will accept electronic logs, although they
usually expect them to be confirmed by several sources (i.e.  the attacked
host, your ISP) and backed with an official expert opinion to be of any
value.

Still, hardly an evidence the owner of the box was in control of the
application that sent the offending traffic. The hard evidence comes from
a different source, usually.

--
- bash$ :(){ :|:&};: --
 Michal Zalewski * [http://lcamtuf.coredump.cx]
Did you know that clones never use mirrors?
--- 2003-08-03 22:54 --




___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Reacting to a server compromise

2003-08-04 Thread Curt Purdy
HIPAA has made it a new world.  The attorneys are already salivating and
trying to dig up any potential "victims" they can find, look to Arizona as
an example.  Since this box was used to attacke doctor's records, there is a
good chance it's tracks will be found.  This guys got two options, either
don't touch the box, play dumb, and hope the cracker doesn't know how to
cover his tracks (unlikely), or dd the drive, take the box offline (in that
order in case it has a smart-bomb planted), and notify notify notify.

We are instituting IDS and logging systems for healthcare customers every
day and are finding attacks that they would not have even guessed at a year
ago.  By law they must keep their logs three years, plenty of time for even
scumbag lawyers to find it.  If you have done due diligence, you will be a
sitting duck.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions
[EMAIL PROTECTED]
936.637.7977 ext. 121



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Aron
Nimzovitch
Sent: Sunday, August 03, 2003 12:28 PM
To: [EMAIL PROTECTED]
Subject: [inbox] Re: [Full-Disclosure] Reacting to a server compromise




No good deed goes unpunished.

Been there, tried that, nearly got hit with a lawsuit (IMMEDIATE
threat from the suit involved).  If the suits running the place had
half a brain between them, your "info" would be unnecessary.

If you cannot prove 'beyond a reasonable doubt' that you did not
conduct the attacks yourself and then post this BS as a coverup, you
will be overrun, no matter how "white" you might be.  Better have deep
pockets to proceed, or get the noobs here telling you to "tell all" to
pony up to your defense fund.  Ask Randall Schwartz about it sometime.

Welcome to the real America!
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] [Full-Disclosure] Re: Reacting to a server compromise

2003-08-04 Thread Curt Purdy
Doing a disk dd with *NIX or a bitwise ghost does not compromise the data
(other than in the quantum sense of not being able to observe an electron
without changing it's orbit). If this is the rigor you would impose then any
copying including your "specialized police hardware", would fall under the
same restriction.  Although I am not familiar with this hardware, most law
inforcement I know use Encase, a $30K dd with a few analysis tools thrown
in.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Alexandre
Dulaunoy
Sent: Sunday, August 03, 2003 2:01 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: [inbox] [Full-Disclosure] Re: Reacting to a server compromise


On 03/Aug/03 12:33 +1000, [EMAIL PROTECTED] wrote:
> On Sun, 3 Aug 2003 01:38 am, Jennifer Bradley wrote:
>
> > If this happens again, I would probably make a copy of the hard drive,
> > or at the very least the log files since they can be entered as
> > evidence of a hacked box.
>
> Under most jurisdictions, an ordinary disk image produced by Norton Ghost
etc
> using standard hardware is completely inadmissible in court, as it is
> impossible to make one without possibly compromising the integrity of the
> evidence. The police etc use specialised hardware for making such copies,
> which ensures that the disk can't have been altered.

Getting evidence  by reading (via  any software or  hardware solution)
may compromise the integrity of the evidence. I would like to know the
difference between  for example a  (s)dd and the  specialised hardware
that you talk about ? Do you have any references ?

Preserving  the  scene integrity  is  really  difficult.  You have  to
minimize the  intrusion to the  scene. On computer hardware  is really
difficult...  Using a hardware device that doesn't change too much the
scene is difficult... (think of a compromised disk firmware).

And  the worst,  sometimes  we  see something  that  doesn't exist  at
all. Forensic analysis is the land of illusion...

just my .02 EUR.

adulau

--
--   Alexandre Dulaunoy (adulau) -- http://www.foo.be/
-- http://pgp.ael.be:11371/pks/lookup?op=get&search=0x44E6CBCD
-- "Knowledge can create problems, it is not through ignorance
--that we can solve them" Isaac Asimov

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Reacting to a server compromise

2003-08-08 Thread Curt Purdy
The key here is to have the paper handled by only one person and witnessed
by another and the access to that paper by only that person.  Therefore the
validity of the printouts are as sound as that person.  As long as that
person can not be repudiated, neither can the printouts.

That is also applicable to the optical media we now use, with one person
responsible for handling and storage with a reliable witness.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Michal
Zalewski
Sent: Tuesday, August 05, 2003 2:46 AM
To: Curt Purdy
Cc: 'Jennifer Bradley'; [EMAIL PROTECTED]
Subject: RE: [inbox] Re: [Full-Disclosure] Reacting to a server
compromise


On Mon, 4 Aug 2003, Curt Purdy wrote:

> Actually the traditionally accepted court evidence is real-time printouts
of
> data received by the syslog server.

So what would stop anyone from replacing some of the printouts after the
fact?

It's pretty much as insecure as log files in terms of being susceptible to
tampering with by the alleged victim (although less susceptible to remote
manipulation by the attacker after the fact, true).

--
- bash$ :(){ :|:&};: --
 Michal Zalewski * [http://lcamtuf.coredump.cx]
Did you know that clones never use mirrors?
--- 2003-08-05 09:43 --

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Hard drive images

2003-08-09 Thread Curt Purdy
Actually the prefered method is to dd one or more copies for forensics and
use the orginal in court if you are able to immediately shut that box down
afterward.  However if it is a mission-critical that cannot immediately be
brought down, it is preferrable to use that first copy for evidence and make
multiple copies of it for forensics.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Craig Pratt
Sent: Tuesday, August 05, 2003 5:27 PM
To: Ron DuFresne
Cc: David Hayes; [EMAIL PROTECTED]
Subject: [inbox] Re: [Full-Disclosure] Hard drive images



On Tuesday, Aug 5, 2003, at 13:23 US/Pacific, Ron DuFresne wrote:
> On Tue, 5 Aug 2003, David Hayes wrote:
>
>> Our old standby, "dd", is perfectly acceptable for making an image of
>> a hard drive to be used in court.  It's even the #1 choice of the FBI,
>> and accepted by U.S. federal courts.  From the trial court order on
>> admission of evidence in the case of Zacarias Moussaoui (the accused
>> 20th hijacker of 9/11):
>>
>
> Interesting, I would have thought that the original was required for
> the
> courts, and that forensics was conducted on the copy.
>
> Thanks,
>
> Ron DuFresne

I believe there are ways to recover data at the physical/magnetic level
- magnetic  remnants of previously-deleted data, for instance - which
would require access to the original platters. I read an article about
this somewhere - would have to be SciAm or /.

C

---
Craig Pratt
Strongbox Network Services Inc.
mailto:[EMAIL PROTECTED]
dtmf:503.706.2933


--
This message checked for dangerous content by MailScanner on StrongBox.


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: Fwd: Re: [Full-Disclosure] Administrivia: Binary Executables w/o Source

2003-08-19 Thread Curt Purdy
FWIW I disagree with any moderation at all.  If I have to put up with all of
the stupid fat on here to get the meat that does come, I can take care of
myself with executables.  If someone is afraid of getting hacked, they have
no business on this list.  The only downside I see is network bandwidth
usage, and if Micro$oft would kindly go out of business, program size would
again become manageable.

The point is, this is a FREE forum, one of the few left in the world.  That
was the original concept of the Net and we must all work hard to protect
that freedom, whether from governments or from crackers.  That's my .02 of
bandwidth usage.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- former White House cybersecurity adviser Richard Clarke


On 19 Aug 2003, Russell Fulton wrote:

snip

> How about attachments invoke automatic moderation  (i.e. any messages
> with attachment get shunted to the moderator for approval).
>

This sounds like a decent workgap, if the moderators are going to wish to
invest the added resources.  Of course, it might be expanded if they are
willing to provide more resources , and rather then decide to approve binaries, to post
it to a website themselves, thus not *offending* anyone silly enough to
execute them, and allowing readers to decide if grabbing it is of merit to
them.  This does make an argument about enabling idiots to do more stupid
things, but, then again, they are most likely already available to these
folks already...

Thanks,
Ron DuFresne
~~
"Cutting the space budget really restores my faith in humanity.  It
eliminates dreams, goals, and ideals and lets us get straight to the
business of hate, debauchery, and self-annihilation." -- Johnny Hart
***testing, only testing, and damn good at it too!***

OK, so you're a Ph.D.  Just don't touch anything.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] [Full-Disclosure] What Antivirus Should I Get

2004-03-22 Thread Curt Purdy
Nancy Kramer wrote:
> I would like list members to suggest what anti virus software
> I should
> get.

I have been fighting virii for 15 years, longer than either Norton or McAfee
have been.  Back then, they were mostly passed by sneakernet.  Over the
years, I have found multiple instances when fully updated versions of both
Norton and McAfee either could not find or could not remove a virus.  I have
not found one time that F-Prot, now F-Secure could not find and remove all
virii.

They were the first anti-virus company in the world, and IMHO still the
best.  On the technical side, one of their engines (they have 3) operates at
the very lowest level of I/O, immediately scanning a file as it comes off
the disk, before it enters memory or interacts with OS.  This makes it very
fast and very efficient.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] [Full-Disclosure] Possible Comprimised IIS 5 on Win2k help

2004-03-24 Thread Curt Purdy



 [EMAIL PROTECTED]  
wrote: > I think my 
IIs 5.0(Win2k) Server has been comprimised. I would like to do some  
> forensics on it to find out how the person 
got in. I dont want to re-image the  
> machine and find out he setup a backdoor 
threw the code and not the o/s 
Get Vision from Foundstone as a good start, locate the 
illicite services and files.  Do a date search several days around those 
shown by the services.  Once you've found all the files (hopefully), Google 
until you've found what you've got and figure out how it got there and how to 
clean it.  Also tools like strings is good for analyzing non-text files as 
well as many other tools from SysInternals.
 

Curt Purdy CISSP, GSEC, MCSE+I, CNE, 
CCDA Information Security 
Engineer DP Solutions 
 
If you spend more on coffee than on IT 
security, you will be hacked. What's 
more, you deserve to be hacked. -- 
White House cybersecurity adviser Richard Clarke 



RE: [inbox] [Full-Disclosure] stenagrophy software recommendations

2004-03-25 Thread Curt Purdy
[EMAIL PROTECTED] wrote:
> i'm looking for a very simple,reliable, small (certainly less
> the 1mb),
> must-have gui, windows,  stenographic encryption program. i'd
> appreciate
> any recommendations.

There's a nice list at: http://www.jjtc.com/Steganography/toolmatrix.htm

Although steganography has close links to crypto, they are different.  Where
crypto hides data behind encryption, stego hides it in plain site.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Training & Certifications

2004-04-03 Thread Curt Purdy
Robert Repp wrote:
> I'd like to be able to point out a credible
> authority whose
> training informs our work.

> I agree that the
> right people and
> skillset is much more important than simply having the right
> certs on the
> lobby wall. Side question: Is there a reliable test you favor when
> interviewing new techs about network administration?

I'm not an authority on training as the only training I've had is SANS, but
I can vouch for the quality it.  My hat size was two sizes bigger when I got
out of there ;)

But I can talk about hiring qualified people for both sysadmin and security
work.  Although a bunch of letters behind the name don't mean everything
(even if they are PHD), when I see certain letters, I do pay closer
attention.  But when it comes to a decision, I usually make it from a 15
minute interview where I ask a series of 5-10 increasingly difficult
questions.

I'll break the ice by starting with something facetious like "What is the
first thing you do with a Windows box and the last thing you do with a *NIX
box when you have trouble?" Answer: reboot. Then I'll go with something like
"How do you see what ports are open and to whom on a Windows box?"  Progress
to "What is a tcp/ip 3-way handshake?", and "How do you disable remote root
access on a *NIX box?", and culminate with something like "What is a regular
expression?"

For sysadmins, I ask easier, more system specific questions, but for
security I ask broad, tough questions because of the requirements of the
field. I have only had one person so far, answer all correctly.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Training & Certifications

2004-04-04 Thread Curt Purdy
Harlan Carveywrote:
> > I'm not an authority on training as the only
> > training I've had is SANS, but
> > I can vouch for the quality it.
>
> Any particular instructors?

I had Eric Cole and was very impressed with his knowledge, experience, and
teaching style.  He was in the process of getting his doctorate in
steganography and his experience included a stint with the CIA.

> > ...when I see certain letters, I do pay closer
> > attention.
>
> Which ones?

Like the ones behind my name ;)  Actually the one I've always wanted, CCIE,
I'll likely never get because of the time and resources you need to dedicate
to it.

> "What is the
> > first thing you do with a Windows box and the last
> > thing you do with a *NIX
> > box when you have trouble?" Answer: reboot.
>
> In the real world, rebooting a Windows
> box isn't the first thing you should be doing.

Oh contraire, the first thing we do when we go onsite to work on windows box
is ask my client to reboot it first, particularly if it is a server, as
occassionally they they do not come back up, and we do not want to be blamed
just because the OS is unstable (we have never had a problem with *NIX or
Netware, or AS/400 for that matter).  Also 90% of the time, that simple
rebooting fixes the problem they had (again attributal to a flaky OS).  Of
course if this is a production that is still online and working, we arrange
to do this off-hours. This is the reason all our in-house servers are UNIX
and Netware and 90% of our desktops are Linux (I prefer SuSe from a security
standpoint.)

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Training & Certifications

2004-04-04 Thread Curt Purdy
Harlan Carvey wrote:
> With that said, the most notable Security
> > cert would have to be CISSP.
>
> The CISSP may be useful for Robert's upper-level
> folks, but it's really more of a management level
> cert.

Agreed, the CISSP is wide and shallow and management-oriented, the SANS GIAC
certs are narrow and deep and engineering-oriented, although they do offer a
management-oriented one also. The GSEC that I have is the widest and still
fairly deep cert they offer.  FYI, of the two, I found the CISSP much easier
to pass.  I only put it up front because it seems to be more respected,
being the oldest of the security certs and now requiring a bachelors degree
as a pre-requisite.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] ron1n phone home, episode one, reloaded

2004-04-04 Thread Curt Purdy
Bugtraq Security Systems wrote:
> We at BSS (Bugtraq Security Systems) are proud to announce
> the publication
> of a series of next generation whitepapers detailing advances in many
> areas of the information security realm. We have dubbed this
> series the
> guides to Mostly Harmless Hacking and feel it will direct new
> and upcoming
> talent onto the shining path of the whitehat way.


Very cool concept.  Kind of like learning to hack with a conscience.
Although I am a "security professional" and have been hacking since back in
the BBS days (but never cracked without prior authorization, but have to
admit it is the most fun short of sex when you do, and get paid for it), I
am looking forward to future chapters.  I might even learn something ;)

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: The Return of Carolyn Meinel (was Re: [Full-Disclosure] ron1n phone home...)

2004-04-05 Thread Curt Purdy
Etaoin Shrdlu wrote:
> Oh. My. God. I thought that the first post was a delayed April Fool's
> Prank. I feel as though the world has been stood on end. This
> is posted (in
> part) by none other than Carolyn Meinel

> Man, you haven't been around long.

Jeese, did not mean to get in the middle of this.  Obviously Ms. Meinel has
pissed off a few people in the past.  Actually I have been around long and
have the grey hair to prove it. Just never participated in the chat room
underground, too busy learning to build tcp packets from scratch ;)

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] MCSE training question

2004-04-05 Thread Curt Purdy
Hello list,

I have a friend who wants to take an MCSE bootcamp (I know, tried my best to
get him to switch to Novell Certified Linux Engineer, but he wouldn't listen
;)

If anyone has had experience with one of these and would care to give me
their opinion of that company, I would appreciate the rec or unrec as the
case may be.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] A sucker is born every day

2004-04-05 Thread Curt Purdy



 Carolyn Meinel 
wrote:
> Stories in the New York 
Times and Vanity Fair quoted the FBI 
>saying Martin was wrong, but what 
does the FBI know? Jay Dyson 
>tells you to believe, so believe 
you must, because it is cool.
 
I don't intend to get in the middle of 
the crossfire here, but I just wanted to say that whatever the past holds is 
irrelevant to me, as it is hard enough to hold onto the present these 
days.  After all reality is relative, in fact  
Jacob Bekenstein in Scientific American put forth that reality is actually 
be a hologram.
 
Be that as it may Carolyn, I like the 
idea of what you are doing.  I wished I had a chance to tell that to St. 
Jude before she crossed over into the OneNet. We all know that knowledge is 
good and self is bad.  Anything we can do to pass that knowledge along with 
the installation of the responsiblity that knowledge carries, I am for.  
Keep up the good work granny hacker from heck.
 

Curt 
 
Practice safe hex. - Andrew Briney, editor Information Security 

 
 


RE: [inbox] [Fwd: Re: [Full-Disclosure] MCSE training question]

2004-04-07 Thread Curt Purdy
Alexander MacLennan wrote:
> A certificate is intended to give you the skills to operate a
> particular
> product or suite of products. The certificate may or may not
> teach you
> the fundamentals behind the product.

Actually that only applies to vendor certs like MCSE.  Both CISSP and GIAC
certs are in a different class of certs that apply to technologies, not
products, i.e. information security, auditing, and even in the case of CEH
(which I would not touch with a 10-foot pole), hacking.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Training & Certifications

2004-04-07 Thread Curt Purdy
[EMAIL PROTECTED] wrote:
> Curt, you didn't define the case scenario for the first thing you do
> on a windows box.
>
> One would hate to reboot a box and lose any valuable evidence
> of an intruder
> or otherwise incriminating material.


Of course id3nt, my bad, and it appearently caused a good deal of
misunderstanding.  I was referring to our troubleshooting Windows problems,
not security forensics.  When we are called to a site to work on a problem
with a Windows server related to networking/performance/system problems, not
security issues, the first thing we do is ask the sysadmin to reboot the
device.

We have learned this over the years, you basically can't make any change in
Windows without rebooting, and the look on the client's face when it comes
back with a bluescreen, not caused by anything you have done, is not a
pretty site. And when you then spend the rest of the night rebuilding the
system and not getting paid for it because the client "knows" the bluescreen
was caused by us, is not fun.

We have never once had this happen on a *NIX or Netware box.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] [Full-Disclosure] ROSI

2004-04-07 Thread Curt Purdy
n30 wrote:
> Any good links/pointers to ROSI (Return on security investment)?

Here's what I've got:

ROSI

A classic argument is that there is similarly no clear return on life
insurance, but that doesn't stop most of us from buying it; still,
attempting to formulate operational-security ROI may be a lost cause.

Assign values to everything from tangible assets (measured in dollars with
depreciation taken into account) to intangible assets (measured in relative
value, for example, software A is three times as valuable as software B).
Different types of hacks were assigned costs according to an existing and
largely accepted taxonomy developed by the Department of Defense. Annual
Loss Expectancy (ALE) was figured. ALE is an attack's damage multiplied by
frequency.

Determining cost-benefit

(R-E) + T = ALE
R-ALE = ROSI

R =the cost per year to recover from an intrusion
E = the savings gained by stopping the intrusion
T = the cost of the intrusion detection tool
ALE = the Annual Loss Expectancy
ROSI = Return On Security Investment

www.csds.uidaho.edu/director/costbenefit.pdf

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Cisco LEAP exploit tool...

2004-04-14 Thread Curt Purdy
Ron DuFresne wrote:
> >  we are considering
> > implimenting an EAP encrypted AP directly on the lan, and I
> am looking for
> > reasons to say it should be DMZed.
>
> All wireless traffic should be treated as unsecured, and
> pushed through a
> DMZ/encryption tunneled setup.


Agreed.  If the packets/hashes can be accessed it can be compromised.
"Unbreakable" has been touted from the 48-bit Netscape encryption that took
USC's distributed network a week to crack, to Oracle 9i that took one day to
compromise, I believe.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] The new Microsoft math: 1 patch for 14 vulnerabilities, MS04-011

2004-04-14 Thread Curt Purdy
Exibar wrote:
> Do the world a favor and hide behind your precious little
> *nix machines
> and *think* that you're immune to patching and security holes
> while the "bad
> guys" happily take over your systems, one by one

Got you all beat with my newest and most beloved desktop, namely a dual G5
Mac running Panther OSX.  One of, if not THE most secure *NIX kernels, BSD,
known for having the fewest vulns, combined with THE most awesome gui
around.

Toss in nice features like an auto patcher that drops a prominant dialogue
in the middle of your screen the moment it detects a patch, and the ability
to have a terminal session where you can execute all the *NIX commands and
scripts you're used to, and I have everything in a desktop I've always
wanted.

In addition to be blazingly fast, and an OS that has had one virus in 5
years, the aluminum box looks really cool.  I'm in love.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Cisco LEAP exploit tool...

2004-04-15 Thread Curt Purdy
Amaury Jacquot wrote:
> > To get a 2.4 Ghz signal to travel 7 miles you would have to
> install an
> > amplifier to boost the output to somewhere between 5 to 10
> watts
>
> not exactly
> in fact, you don't need amplifiers in most cases.
> you don't even need 1 watt
> in fact, the trick lies in the antenna you attach to the
> active end of
> the communication devices.
> for instance, we were able to do a 15km link at 11mbit/s with 2 15dBi
> antennas from hyperlinktech.com. that's much more than 7 miles (it's
> about 10 miles).
> with 21dB antennas, we calculated that we'd be able to do
> 30km, or 20 miles.

This scenario requires point-to-point directional high db parabolic
antennae. The original sceanario of the thread was reading packets from an
AP inside a building.  It would not have even a tower-mounted high db
omni-directional, but even if it did, would have a maximum range of 2-3
miles under legal power limits.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] RE: [Full-Disclosure] Cisco LEAP exploit tool...

2004-04-15 Thread Curt Purdy
[EMAIL PROTECTED] wrote:
> Dear Dave and what was it ... jeff, Curt and exhibar, your in
> here too,
>
>  and I'll throw Fitzgerled on just for fun
>
> Neither one of you know what the



> Have you ever properly setup a 2.4 ghz wireless link longer
> than 7 miles?
> If not, don't post what some1 eles states as it may not be
> true. I have

Don't know where you get off including me in your list, but I have
personally setup Cisco units up to 20 miles with parabolics and Adaptive
Broadband up to 35 miles.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] Re: [Full-Disclosure] Hi! Antiviruses Comparison - A Little Research Results

2004-04-16 Thread Curt Purdy
Of 3APA3A wrote:
> FT> Only finnish F-Secure and american CA has Windows/Linux
> AV products
> FT> with multiple independent virus scanning engines. This
> gives protection
> FT> against false positives, but requires more system resources.
>
> Not exactly. At least Chinese iduba.net from Kingsoft uses 2
> kernels. As
> far  as  I  know  Russian  Dr.Web  works on engine to work
> with multiple
> antiviral kernels of different vendors.

Been following this thread and I can bite my tongue no longer.  As a
long-time user of the first AV in the world, F-Secure, then F-Prot in '88, I
have found it to be the only AV that could detect and remove every virus I
have ever come upon, including multiple instances where fully updated Norton
and McAfee either did not detect or could not remove them.

They were the first AV with signature auto-updating over 4 years ago. And it
does not update once a week or once a day, but continually checks on an
hourly basis for new sigs.  It has three seperate scan engines, so it's like
having a layered defense in one product.  And it operates at the lowest
level of any AV I am aware of, running at the base level of I/O, actually
grabbing it off the disk before any other process can touch it, making it
extremely fast and efficient with no noticble impact in performance, even on
slow boxes.  My $.02

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [inbox] [Full-Disclosure] Hi! Antiviruses Comparison - A Little Research Results

2004-04-16 Thread Curt Purdy
Feher Tamas wrote:
> If you are a lamer in the AV area, then please don't fool
> others! There
> are at least 12 major players in the AV arena, each with diverse
> weaknesses and strong points.



> It could make a book, not just the disorganized
> mess of text I wrote above.
>
> Sincerely: Tamas Feher from Hungary.

Actually Tamas, that is one of the best short critiques I have seen on the
AV market and I agree with almost every point.  Factual and without bias.
Maybe you should write that book.

Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions



If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


  1   2   >