Article A day Provides the latest and the greatest in technology articles, cloud computing, security, pc-tips, networking, technology news.

Sunday, 10 April 2011

McAfee strikes first deal under Intel for database monitoring software

The security giant is expanding into the database security market, announcing its intention to acquire Sentrigo. The terms of the deal were not released.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google

Source: http://www.pheedcontent.com/click.phdo?i=fa9d3619d2c105aa1cb7ad24272ef4e2

trainings we at hypnos corporate trainings academic trainings security awareness trainings

Call for Papers: EC2ND'10

Source: http://honeyblog.org/archives/61-Call-for-Papers-EC2ND10.html

code review trainings we at hypnos corporate trainings academic trainings

Saturday, 9 April 2011

Wrap Firefox in a Cocoon of privacy

Web browsers are ground zero for Internet security threats, and the debate over responsibility for preventing those threats has resulted in a Gordian knot. The people behind the new add-on for Firefox called Cocoon (download) want to cut through debate by serving the entire Web to you via proxy. (Cocoon is also available at GetCocoon.com.)

Made by Santa Barbara, Calif., start-up Virtual World Computing, Cocoon's goal is to put the Internet on a server to prevent individual users from having to touch it, Cocoon Chief Executive Officer and co-founder Jeff Bermant said in an interview today at CNET's San Francisco offices. The add-on, which has about 4,000 users since it entered into private beta 18 months ago, creates a safe state in which the user can browse the Internet by forcing all interactions between the computer in front of you and the Internet to occur over protected SSL connections to Cocoon's servers. Those servers, in turn, are guarded by Security-Enhanced Linux, which was developed by the United States' National Security Agency.

Cocoon opened its beta to the public in January of this year. Cocoon installs as a toolbar just below the location bar in Firefox 4, although the add-on supports the browser back to Firefox 3.6. You can turn it on or off using the universal power button icon on the left of the toolbar, or "pause" Cocoon lock/unlock button that's next to it. Settings are available from a hard-to-see drop-down arrow just next to the lock button.

Source: http://www.hackinthebox.org/index.php?name=News&file=article&sid=40823

vulnerability assessments network analysis code review trainings corporate trainings

First Line of Defense for Web Applications ? Part 5

First of all folks, my apologies for this delayed post. I have been traveling and busy doing a very  interesting Threat Modeling exercise. But i am back & Lets cover some other validation bloopers -

SQL injection 

Weak Validation Examples

Code Snippets

a)      Replacing single Quotes to double quotes

Sample.aspx.cs

 

catergoryID=Request.QueryString(id);

 

SqlCommand myCommand = new SqlCommand("SELECT  * FROM Products WHERE CategoryID = " + SanitizeSQL(categoryID) +", myConnection);

 

 

public static string SanitizeSQL(string strSQL)

                        {

        Return ( strSQL.Replace("'","''") );

                        }

Exploit code to bypass this validation

Validation function is assuming that the user will only enter single quote to SQL inject. But this is not the case. For example:

Unexpected : 21; Delete from Products where ProductID = 102--

Recommendation

  1. Whenever you are expecting an integer value, the best validation on this type of input is to type cast it and check if it is really an integer. If not, reject the input. Bottom line:  if the input is of a primitive type, one can cast it.

e.g

 

                int id;

try

                                {

                id = int.Parse(Request.Form(?userinput?));

                                                }

                catch (Exception ex)

                                {

                return;

                                }

 

2.       Use parameterized SQL.

 Active X Components 

Weak Validation in Active X

Explanation

Safe for scripting

A control that is marked safe for scripting can be scripted not only by the Web page author who uses it, but by other Web sites on the Internet as well. It gives ability to other Web page authors to reuse the control for malicious purposes.

Exploit code to bypass

ActiveX controls can be hosted by scripting environments and driven by script. In some hosts, such as Microsoft� Internet Explorer, the script can come from an unknown and possibly untrusted source.

A control can be initialized by data from an arbitrary interface. This interface could come from either a local or a remote Uniform Resource Locator (URL). This is a potential security hazard because the data could come from an untrusted source.

Recommendation

The SiteLock template enables you to restrict access so that the control is only deemed safe in a predetermined list of domains.

SiteLock automatically queries for the URL where the control is hosted, extracts the Uniform Resource Identifier (URI) type and domain name from that URL, and compares the URI to a list to see if the site should be trusted. The developer creates the list at build time.

e.g :

 

const CYourObject::SiteList CYourObject::rgslTrustedSites[2] =

   {{ SiteList::Deny,  L?http?,  L?users.microsoft.com? },

    { SiteList::Allow, L?http?,  L?microsoft.com?       },

 

Again, it is recommended to use the white list approach here, not the black list approach; Define all sites that are allowed to initiate the control rather than listing out sites which should be denied.

Implementing Client side validation

Implementing client side validation is good as long as you have server side validation controls in place as well. If you only reply on client side validation, your application is wide open for attacks.

To bypass client side validations, an attacker can:

o   Switch off Java script in browsers. Since the browser does not execute any scripts, all script based validations on client end will fail.

o   Use HTTP debugging proxy software?s to fiddle with the incoming responses and outgoing requests. Tools like Fiddler can do this seamlessly.

o   Use SOAPTool like tools to bypass the thick /smart client?s altogether and send malicious data to the back end web services. All thick client based validations will no longer be in effect.

 

However, there is no technological restriction enforced to limit which client can communicate with a server, or vice versa; such restrictions are either unrealistic or not possible. Tools like Fiddler, TamperIE, etc make it possible to edit requests and responses between a client and server or to play back a client request or server response. These proxy tools can even alter packets and send data that the vendor?s software would never send.

 

Keep it Secure.

 

Anmol Malhotra

Senior Security Consultant

ACE Services

 

Source: http://blogs.msdn.com/b/hackers/archive/2007/12/16/first-line-of-defense-for-web-applications-part-5.aspx

hypnos infosecurity mission hypnos infosecurity team careers at hypnos infosecurity hypnos infosecurity downloads cyber crime news

Friday, 1 April 2011

Is Google Being Anal about Android OS?

Is Google becoming more Apple-like as it asks for prior approval for Android software tweaks?

Add to digg Add to Reddit Add to Slashdot Email this Article Add to StumbleUpon

Source: http://feeds.pcworld.com/click.phdo?i=72f6a49429407696cfefeca25e9f380f

google circles pen-testing ahmedabad security security awareness training information systems

MLB Releases IPhone, IPad App Updates

Major League Baseball Advanced Media released updates to its mobile apps late Wednesday, adding some major features to its iPad and iPhone editions and also...

Add to digg Add to Reddit Add to Slashdot Email this Article Add to StumbleUpon

Source: http://feeds.pcworld.com/click.phdo?i=60a1a535fc2f690600ea8b2bcf65c37b

hypnosec xss google circles pen-testing ahmedabad security