about img
blogger img

UnderPaidLoveMonkis posts img

buchos posts img

Corys posts image

scotts posts image

Security's Archive

$5.66M/hr of transactions!

UnderpaidLoveMonki @ 10:39 pm Thursday, December 6th, 2007

My goodness! That’s alot of money per hour. Read here on how Paypal is running a grid of 4000 Redhat Linux boxes.

PayPal takes Red Hat Enterprise Linux and strips out all features unnecessary to its business, then adds proprietary extensions around security. Another virtue of the grid is that PayPal’s 800 engineers can all get a copy of that customized system on their development desktops, run tests on their raw software as they work, and develop to PayPal’s needs faster because they’re working in the target environment.

XBI

UnderpaidLoveMonki @ 8:30 pm Wednesday, October 10th, 2007

I have always been interested in security. Tonight I ran across this post publicizing the white paper on cross-build injection (XBI) vulnerabilities. Some of the listed examples of XBI attacks were OpenSSH, Sendmail and Irssi. If you build software, you definitely want to read this paper and find out the recommendations to mitigate your risk from this kind of attacks.

Software Security Can Threaten Physical Security Systems

Scott Rippee @ 10:43 pm Thursday, September 27th, 2007

Software security is and will become much more important in the security industry especially as security systems begin spanning public networks. Cisco seems to be taking a proactive approach to identifying and notifying customers about software security vulnerabilities. From Security Dreamer:

Cisco uses the error reporting policy to improve its products and boost its reputation. Cisco looks for problems in its products, encourages users to report new problems through a public forum, promptly notifies customers, then fixes the problem. Now that’s a company with the welfare of its customers and its brand in mind

This provides insight into a different area of customer service than the traditional.

A Fence for Concern

Scott Rippee @ 10:33 am Saturday, September 8th, 2007

slippery_fence.jpg

I found this on Security Dreamer with many comments on Schneier on Security

Beware of the lube!

Wireless Security with Scapy

UnderpaidLoveMonki @ 9:42 pm Tuesday, June 12th, 2007

If you’re into wireless security, you should check out this tool called Scapy (written in Python) and also read this informative article.

Security Tip: Defending against brute force ssh attacks

UnderpaidLoveMonki @ 10:04 pm Wednesday, June 6th, 2007

Samhain Labs published an article on defending against brute force ssh attacks. It is very good and informative for those who have computers connected to the Internet with ssh enabled.

Ossim

UnderpaidLoveMonki @ 9:44 pm Wednesday, May 23rd, 2007

I found this neat, comprehensive open-source security/network tool from reading this article. Ossim stands for Open Source Security Information Management. There’s also screenshots available.

Here’s a snippet of what this tool contains:

* Arpwatch, used for mac anomaly detection.
* P0f, used for passive OS detection and os change analisys.
* Pads, used for service anomaly detection.
* Nessus, used for vulnerability assessment and for cross correlation (IDS vs Security Scanner).
* Snort, the IDS, also used for cross correlation with nessus.
* Spade, the statistical packet anomaly detection engine. Used to gain knowledge about attacks without signature.
* Tcptrack, used for session data information which can grant useful information for attack correlation.
* Ntop, which builds an impressive network information database from which we can get aberrant behaviour anomaly detection.
* Nagios. Being fed from the host asset database it monitors host and service availability information.
* Osiris, a great HIDS.

Running your own OpenID server

UnderpaidLoveMonki @ 6:43 am Friday, March 9th, 2007

From OpenID Enabled, you can download OpenID server in an implementation of your favorite language. It’s open source. Port it to your language of choice if you don’t see it on the list.

Hmmm….I don’t see an implementation in Erlang. Imagine the flexibilty of OpenID server’s decentralization implemented in Erlang, a derivative of Prolog, that is highly scalable, fault tolerant.

By the way, Programming Erlang will be out soon. There’s also a Rails plugin, open_id_authentication. I got too many ideas, too little time. *SIGH* Good times anyways! :)

VoIP Wiretap HowTo

UnderpaidLoveMonki @ 2:15 pm Saturday, July 29th, 2006

Props to Ian Blenke on his VoIP wiretap howto via Linux or Winblowz! Must read for tech gheekz!

Funny IRC Conversation

Scott Rippee @ 9:05 pm Saturday, May 13th, 2006

Good ole bash.org. This is a good one.

http://www.bash.org/?244321

Got iPod? Check this tool out!

UnderpaidLoveMonki @ 11:26 am Monday, February 20th, 2006

http://www.vnunet.com/vnunet/news/2150627/consultant-writes-ipod

An IT security consultant has developed a program designed to scan corporate networks for sensitive files and automatically transfer them to an iPod.

Using slurp.exe on my iPod it took me 65 seconds to copy all document files (*.doc, *.xls, *.htm, *.url, *.xml, *.txt, etc.) off of my computer as a logged in user,” said the originator in an article on the topic on the corporate website.

corporate ipod

Be afraid, be vely afraid…!

Four most common Unix security mistakes

UnderpaidLoveMonki @ 3:13 pm Saturday, February 11th, 2006

Another good read. The article lists very sound advice on security for *nix where many organizations care to ignore.

security trojan.jpg

I try my best to follow them when I admin my *nix boxes.

My motto is: “Train as you fight, and fight as you train.” Replace fight with sysadmin. =
I’ve heard this over and over again throughout my career:

Management tends to promote projects and people using the same technology the managers involved grew up with.

SANS 2005 Information Security Salary

UnderpaidLoveMonki @ 11:05 am Saturday, February 4th, 2006

Do you wonder what’s the average salary of an IT security professional? Well, read on suckazzz!! (Btw, it’s a pdf file.)

More than 4,250 security professionals participated in the 2005 Information Security Salary and Career Advancement Survey, conducted between October 20 and November 18, 2005. They provided detailed answers to thirty questions about their compensation, their background, their employer, their certifications, their job responsibilities and satisfaction and what it takes to get promoted. This executive summary provides a top level view of (I) employer and employee factors that impact security professionals’ salaries, (II) how certifications impact salaries and technical job performance, (III) what it takes to satisfy security workers and (IV) what critical skills are necessary for professional advancement.

A Secure LiveCD!

UnderpaidLoveMonki @ 8:18 pm Sunday, January 15th, 2006

Want to surf the web with anonymity? Use the secured network, Tor?

Check this article out and see what’s it about!

Anonym.OS is just the first step in making anonymity widely available. Future versions, they say, may run on a USB keychain. Additionally, they plan to implement Enigmail to allow encrypted e-mail for Thunderbird and Gaim Off The Record, which allows users to use instant messaging without their logs being tied to them.

Symantec embeds rootkits and gets new government Open Source grants

Scott Rippee @ 12:47 am Thursday, January 12th, 2006

Big news for security corp. Symantec!
They first got mention in the article Homeland Security helps secure open-source code:

Through its Science and Technology Directorate, the department has given $1.24 million in funding to Stanford University, Coverity and Symantec to hunt for security bugs in open-source software and to improve Coverity’s commercial tool for source code analysis

The Homeland Security Department grant will be paid over a three-year period, with $841,276 going to Stanford, $297,000 to Coverity and $100,000 to Symantec

Which pretty much confussed the hell out of everyone on slashdot…. Why is giving Symantec money going to help linux security?

But the kicker is eweek’s breaking news story, Symantec caught embedding rootkits:

Symantec Corp. has fessed up to using a rootkit-type feature in Norton SystemWorks that could provide the perfect hiding place for attackers to place malicious files on computers.

Now thats a beauty. Sounds like they will do a great job increasing opensource security.

bad symantec