Items Tagged with "Network Security"
October 05, 2011 Added by:Rafal Los
Dynamic Application Security Testing (DAST) is one of the long-standing staples of Software Security Assurance, and has been the anchor by which many organization have boot-strapped their efforts to write better code. Whether this is the correct approach or not is not the question...
October 04, 2011 Added by:Rob Fuller
Say you need to get your bearings quickly on an internal test and going into each shell and doing a PS, then looking through the list for all the users logged in is a definitely not ideal. I wrote a quick script that you can throw in the Meterpreter scripts folder to aide you a bit with this...
October 04, 2011 Added by:Headlines
"Weaknesses in information security policies and practices at 24 major federal agencies continue to place... sensitive information and information systems at risk... reports of security incidents from federal agencies are on the rise, increasing over 650 percent over the past 5 years..."
October 04, 2011 Added by:Headlines
At the EastWest Institute's Worldwide Security Conference (WSC) in Brussels, experts from the United States, Russia, China and other countries advanced ongoing efforts to develop recommendations for areas of potential cooperation to protect critical infrastructure...
October 03, 2011 Added by:Enno Rey
After having introduced the basic elements of the concepts of trust, control and confidence in a previous post on the RSA breach, today I’ll try to strengthen your understanding of these ideas - and maybe even my own as well - by applying them to another candidate: Dropbox...
September 29, 2011 Added by:Brian McGinley
We have moved from being a computer-assisted society to one that is computer-dependent. Control is critical to maintaining a secure operation. That requires assistance from technical experts. But good control begins with a company’s employees, an area you can’t afford to ignore...
September 26, 2011 Added by:Craig S Wright
There are a multitude of systems that simply need to be crashed, not controlled using an automated tool without human interaction. A human with control of a RAT does not need to write a variant for each system. They simply need to take control of the underlying operating system...
September 25, 2011 Added by:Jamie Adams
This simple real-world example demonstrates how MAC rules supersede DAC settings. I encourage you to read the system documentation and experiment on lab systems. Too often system administrators become frustrated by "AVC Denial" messages and resort to disabling this enhanced security...
September 25, 2011 Added by:Scot Terban
In order to have the “mass casualties” scenario, Stuxnet variants would have to be as varied as the number of makers of PLC systems out there. Just as the actual payload file to make a fire sale scenario happen would geometrically increase to have to become its own form of bloatware...
September 23, 2011 Added by:Craig S Wright
Nearly all SCADA systems are online. The addition of a simple NAT device is NOT a control. Most of these systems are horribly patched and some run DOS, Win 95, Win 98 and even old Unixs. Some are on outdated versions of VMS. One I know of is on a Cray and another is on a PDP-11...
September 23, 2011 Added by:Scot Terban
Sure, there are many systems out there running PLC’s and they are likely vulnerable to any number of attacks. However, can you please look back and see how long it actually took persons unknown to create the Stuxnet attack, and breathe a little before you go crying to the likes of the Monitor?
September 23, 2011 Added by:Headlines
"After Stuxnet was identified as a weapon, we recommended to every asset owner in America – owners of power plants, chemical plants, refineries and others – to make it a top priority to protect their systems... That wakeup call lasted about a week. Thereafter, everybody fell back into coma..."
September 22, 2011 Added by:Jamie Adams
SELinux is an enhancement to the standard kernel that provides fine-grained security MAC rules. The Targeted policy provides security for commonly used daemons such as httpd, dhcpd, mailman, named, portmap, nscd, ntpd, portmap, mysqld, postgres, squid, syslogd, winbind, and ypbind...
September 22, 2011 Added by:Headlines
The revised guidance has been expanded to include more information on a variety of risk factors essential to determining information security risk, such as threat sources and events, vulnerabilities and predisposing conditions, impact, and likelihood of threat occurrence...
September 21, 2011 Added by:Stefan Fouant
Not a day that goes by since having passed the JNCIE-SEC exam that I don't receive an inquiry in one form or another regarding how I prepared for the exam. So instead of constantly repeating myself, I figured I'd just put it up on the blog so others can benefit...
September 21, 2011 Added by:Craig S Wright
People have seen IPv6 as a simple addressing extension to the existing internet and see few changes to the way we secure systems. These people cannot be further from the truth. IPv6 will change the way we think about security. We need to start planning now or we will be left in the dust...