Home > Uncategorized > Security News #0x2D: MoreSQL

Security News #0x2D: MoreSQL

  • In addition to all of the MySQL attacks mentioned in Security News #0x2C, Kingcope also pointed out that the best way to attack MySQL passwords is not via repeated logins (which are slow), but rather to use the change_user command. This is much faster, though it does require an (unprivileged) account on the server to start.
  • Michael Mimoso at Threatpost discusses some of the implications of the vulnerabilities announced by Kingcope.
  • In case you think that MySQL is hoarding all of the love, Metasploit released a module to attack PostgreSQL. It seems that the default install on some Linux systems allows files to be written to /tmp then executed, letting the attacker run arbitrary code.
  • Splunk runs as root (on Linux) or Administrator (on Windows); it also has the ability to run custom scripts, including Perl and Python scripts. This means that anyone who can get access to the Splunk server can have a lot of fun (and remember that the free version logs you in directly as admin, something that we have discussed before). The folks at Seven Elements developed a Metasploit module to exploit Splunk 5.0, which is now official. Once again, Eric Romang has a demo. The folks at Seven Elements also describe how to secure the free version of Splunk; see also the tips provided by EyeIS this past summer.
  • If you are interested in learning more about how to exploit software in Windows (and who isn’t?), you might want to check out the tutorial provided by 0xdabbad00.com that shows how to create and exploit a simple binary in Windows.
  • A few weeks ago we noted two posts at Ars Technica showing how to set up an Nginx server. They continue the series, adding PHP-FPM support and database support.
  • Here is an example of general PHP weirdness I ran across.
  • Ars Technica reports that Internet Explorer versions 6-10 allow the motion of the mouse to be tracked, even if the browser is minimized. The original work is by Spider.io, and they have a demo to show how the attack works. (And no, I don’t run IE, and no, I haven’t tested it…).
  • Ars Technica reports that attackers managed to compromised the heating and cooling system of a New Jersey company by exploiting the Niagara AX Framework control system.
  • Threatpost describes some recent work of Luigi Auriemma who can now hack into Samsung televisions, including gaining root access to the device.
Categories: Uncategorized
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: