Security News #0x23
- The Maryland Digital Forensics Investigation Challenge has been announced.
- Raphael Mudge has updated his talk to version 2.0- Dirty Red Team Tricks II.
- Brian Krebs, has a great discussion of the security of web browsers. His conclusion? Since 2011, there have been 89 days where Internet Explorer had known, unpatched vulnerabilities that were being actively exploited. The total for all other browsers? Zero. Read the article for details (and caveats!).
- Pierre-Marie de Rodat has a discussion of some of the 2012 CSAW CTF qualifying exercises. You can get the exercises themselves from Shell-Storm.
- While I am thinking about CSAW-2012, one intrepid adventurer bypassed a WAF in one of the 300 level problems via HTTP Parameter Pollution. At its core, the attack relies on the web server and the WAF interpreting a misconfigured GET string differently. The article by Chrysostomos Daniel that describes the approach is well worth reading.
- Metasploit has a new module for privilege escalation on Windows XP (SP2, SP3) and Server 2003 (SP2) machines. The AfdJoinLeaf Privilege Escalation attack was patched in MS11-080 and the vulnerability announced in CVE 2011-2005.
- The Washington Post has a piece that describes the local demand for more cybersecurity professionals. Take note students!
- Bruce Scheier talks about the selection of Keccak as SHA-3.
- Last week I mentioned ExploitShield, a product that aims to protect users against zero-days. It may not be as cool as hoped.
- I am disappointed that I haven’t seen any new hacks on televisions lately. I guess I will have to make do with an attack on hotel door locks with a dry erase marker…