The Epic Turla Operation: Information on Command and Control Server infrastructure
|
|
|
- Carmella Lewis
- 10 years ago
- Views:
Transcription
1 The Epic Turla Operation: Information on Command and Control Server infrastructure v1.00 (August 7, 2014) Short Report by Laboratory of Cryptography and System Security (CrySyS Lab) Budapest University of Technology and Economics Department of Networked Systems and Services Authors: CrySyS Malware Intelligence Team in collaboration with Ukatemi Technologies
2 1. Introduction Together with international partners, we have investigated the Turla/Uroburos/Snake related Epic/Wipbot/TavDig/Wordlcupsec operations and the command and control server infrastructure of it. Although hundreds of servers related to the threats were discovered by the community, most of them are not alive as of the analysis. We tried to obtain as much information as possible on the operation, structure and data related to these servers. 2. List of active C&C servers The following C&C servers were alive at the time of our analysis: proxies to Server side scripts The servers are implemented in PHP. Figure 1 PHP files found on the C&C servers The scripts found on the examined servers differ, but mainly contain the followings: bfile.php: It can be used for downloading a file from the server. Uses 2 POST parameters. delfile.php: Deletes a file. It also needs 2 POST parameters. delfolder.php: Deletes a folder. delinf.php: Likely it was used by a previous version of the malware. It deletes the "inf" file of the given victim, but now it is useless. ginf.php: Gets the inf file of the victim, whose id is passed as a POST parameter. in.php: This is where the victims checks in. Stores the ip address, counter, timestamp and data. In some cases this was just a proxy. The proxy used TCP sockets and forwarded the whole data and did not make any log (e.g.: arshinmalalan forwarded data to busandcoachdirectory.com.au inf.php: Simple script showing results of phpinfo() PHP call 2
3 post.php: Debug file upl.php: Uploads a new task [redacted].php: It creates and displays a list of all the victims with timestamp + IP controlled by that specific C&C. (Summarizes information stored in the data directories) [redacted2].php: On multiple servers a backdoor was found which was password protected. The backdoor seems to be very similar or identical to the one used in attacks by MiniDuke attackers. 1.2 Data storage Figure 2 Sample directory structure for data storage Client instances are identified by UUIDs, and the associated data is stored in dedicated directories. The directory names are derived from UUIDs with the following algorithm (python code snippet): binascii.hexlify(str(uuid)[::-1]). Examples for conversion UUID to directory name: aa212f1a-2f eaae -> d d d fd26af8a-d2d7-43a2-1a6e67e -> d d d Each directory may contain the following files: add: IP addresses associated with this client separated by semicolon. cnt: Number of times the client connected to the server. tstamp: Timestamp of the last connection. inf: Encrypted command for the client to execute. i: Unknown, generally empty. Most likely created for debug purposes. [timestamp]: Encrypted result of a command execution. (The file name is the timestamp of the file upload) 1.3 Data encryption The command and the execution result files are encrypted using El-Gamal and AES-256. The malware samples include the command decoding private keys and these files are thus decryptable, but 3
4 uploaded result files cannot be decrypted. We identified a number of implementation problems that make the encryption less secure but we were not able to break it: Using time seeded random generator (in combination with ad-hoc XORing buffers into the output) while storing the timestamp on the server side (the name of the uploaded file) Using small random numbers Text-book El-Gamal implementation that has some published weaknesses (Why Textbook ElGamal and RSA Encryption Are Insecure) 1.4 Victims We ve identified 165 unique victim IP addresses. Figure 3 Last check-in date by number of UUIDs Top countries by number of victim IP addresses: 1. THAILAND: RUSSIAN FEDERATION: SLOVENIA: MONTENEGRO: MACEDONIA: UNITED STATES: 10 A heat map on the victim list can be found below. 4
5 Figure 4 Heat map of victims Data gathered from analyzed C&C servers directly 1.5 List of all samples of decrypted command files For each victim, command files (PE executables) might be stored on the C&C servers as described in the section above about data storage. We found a number of files on the C&C servers. We have successfully decrypted all these files and collected their hash identifiers (MD5, SHA1, SHA256). voyagez-avec-nous.fr - main 'upgrade' upl file efd33fdb3dfdd2303a174e3eeb97949e 673d6d637ba884f7a70cb911f573460d872ae b6585cd1cc7e3d501ebad2f001ace903e f ec - d9102f08-853e-4a94-[redacted] bca d3273ac424864e6be9c995 2c2233aa7c08f1f87ed2ab7f95cb38a02aada7d7; b34a9ac8c4cafdd4921c93f3cecaf64a32c954399dcca00e66ce a3 - bb039b03-d7f [redacted] bfd efb2d33e9b20a61de bfbf3e42b96ef870bf07789f1bc4a8415bfc95 1d4c1a96dd3681a13936f478b6894fb9b963e3b71e2b6cf59e5cf629ec8d222e busandcoachdirectory.com.au - cd [redacted] 0e98e0d634446b88d607bc9454d56e fecea42029f27bdd9685e55c170fe8d2ffa 3cd521891ba6cc5cf2e84f1c4c56a2fe2f8ca2aece2c9ef7eb6e0043f9514d5f busandcoachdirectory.com.au - cd4b822c-50b3-4aa6-[redacted] dc5db183ba8ceab4f093ac92fd8df21c 5
6 81334c b28c37ffcbfe897c7f49a d4e46bcc3ce7bc803cbda3e0d109fe11f e43dc031be3e6ba6b09e8 busandcoachdirectory.com.au - 3befc03a-b8fc-4409-[redacted] dc5db183ba8ceab4f093ac92fd8df21c 81334c b28c37ffcbfe897c7f49a531767; d4e46bcc3ce7bc803cbda3e0d109fe11f e43dc031be3e6ba6b09e8 busandcoachdirectory.com.au c842-2b [redacted] 2849fdd549823f23d92e4aeda9940dc1 83fb1b6ae1c4c5dc3fd8a0b13ab3760cd8de8ff5 571b808b90e063da31e98c fc33d09168d70bcfa80d2378aaa47ebe busandcoachdirectory.com.au - 15C428094A FD86C9C08321CE8 2a5454b6c aef1f215 e9317d65febb4304c036545fea44cdbfc89f3bd3; c537c7eef90e286a48cf09f201c64aa6351d35726e441e00c834b4f55a2e67fe busandcoachdirectory.com.au - aa168c4c-d951-4bd8-[redacted] 0e98e0d634446b88d607bc9454d56e fecea42029f27bdd9685e55c170fe8d2ffa 3cd521891ba6cc5cf2e84f1c4c56a2fe2f8ca2aece2c9ef7eb6e0043f9514d5f busandcoachdirectory.com.au - fcbd f9-464d-[redacted] e9580b6b db018c320e80865f fdf4b281df1cc472d12c81060e8415ba2 2007aa72dfe0c6c93beb44f737b85b6cd487175e7abc6b717dae9344bed46c6c busandcoachdirectory.com.au - 41d8808e a9-[redacted] 636dae414eb5db930eb4e519931ee99a 5c380a59a a5d399589d2558ac3c231f b546280bb875d3981d03c855602e7693d2c177f74620c8e0772d2a155f busandcoachdirectory.com.au - 2c30a9b [redacted] 3a34980e80b6a6b68daa67d499e3d2ce c08611e7f49c517bd3dc9b d899b5ec298; f472741bec78fdfcc42dfc5d c9c42775a7df398c32b39ee84784 busandcoachdirectory.com.au daf6-c e-[redacted] 2849fdd549823f23d92e4aeda9940dc1 83fb1b6ae1c4c5dc3fd8a0b13ab3760cd8de8ff5 571b808b90e063da31e98c fc33d09168d70bcfa80d2378aaa47ebe 5. Decrypted command files - hashes In addition to PE executables, command files can also be windows batch files. We found around ~10 different batch files. Some of these were highly customized to the target, therefore we do not share actual content for these. The content of a data collecting batch file can be seen below: dir c:\ dir "C:\Users\" ipconfig -all netstat -an net view /DOMAIN net view arp -a dir %TEMP%\ 6. Sample command file - batch 6
Web Application Security Guidelines for Hosting Dynamic Websites on NIC Servers
Web Application Security Guidelines for Hosting Dynamic Websites on NIC Servers The Website can be developed under Windows or Linux Platform. Windows Development should be use: ASP, ASP.NET 1.1/ 2.0, and
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Networks & Security Course. Web of Trust and Network Forensics
Networks & Security Course Web of Trust and Network Forensics Virtual Machine Virtual Machine Internet connection You need to connect the VM to the Internet for some of the Web of Trust exercises. Make
Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.
CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and
McAfee Firewall Enterprise 8.2.1
Configuration Guide FIPS 140 2 Revision A McAfee Firewall Enterprise 8.2.1 The McAfee Firewall Enterprise FIPS 140 2 Configuration Guide, version 8.2.1, provides instructions for setting up McAfee Firewall
Capture Pro Software FTP Server System Output
Capture Pro Software FTP Server System Output Overview The Capture Pro Software FTP server will transfer batches and index data (that have been scanned and output to the local PC) to an FTP location accessible
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
HIDING THE NETWORK BEHIND THE NETWORK. BOTNET PROXY BUSINESS MODEL Alexandru Maximciuc, Cristina Vatamanu & Razvan Benchea Bitdefender, Romania
HIDING THE NETWORK BEHIND THE NETWORK. BOTNET PROXY BUSINESS MODEL Alexandru Maximciuc, Cristina Vatamanu & Razvan Benchea Bitdefender, Romania Email {amaximciuc, cvatamanu, rbenchea}@ bitdefender.com
DarkFS - An Encrypted File System
1 DarkFS - An Encrypted File System Team: Arjun Narayanan, Yuta 1. Motivation In many software applications, we want to store files in a remote, untrusted file server. With an untrusted file server, we
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
FIREEYE THREAT INTELLIGENCE HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group JULY 2015 SECURITY REIMAGINED
S P E C I A L R E P O R T FIREEYE THREAT INTELLIGENCE HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group JULY 205 SECURITY REIMAGINED CONTENTS HAMMERTOSS 3 APT29 5 Introducing HAMMERTOSS
McAfee Firewall Enterprise 8.3.1
Configuration Guide Revision A McAfee Firewall Enterprise 8.3.1 FIPS 140-2 The McAfee Firewall Enterprise FIPS 140-2 Configuration Guide, version 8.3.1, provides instructions for setting up McAfee Firewall
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Spam and All Things Salty: Spambot v2013
Spam and All Things Salty: Spambot v2013 Jessa dela Torre 1 and Sabrina Lei Sioting 2 1 Forward-Looking Threat Research Team 2 Threat Cleanup and Analysis Team Trend Micro, Inc., Philippines Abstract.
Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...
Hush Encryption Engine White Paper Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...4 Passphrase Requirements...4 Data Requirements...4
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
Inception: APT Campaign Spanning PCs, Mobile, the Cloud, and Home Routers
SESSION ID: BR-T10 Inception: APT Campaign Spanning PCs, Mobile, the Cloud, and Home Routers Snorre Fagerland Sr. Principal Security Researcher Blue Coat Systems @SnorreFagerland Waylon Grange Sr. Threat
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
This report is a detailed analysis of the dropper and the payload of the HIMAN malware.
PAGE 5 Check Point Malware Research Group HIMAN Malware Analysis December 12, 2013 Researcher: Overview This report is a detailed analysis of the dropper and the payload of the HIMAN malware. This malware
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance
Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance Juniper Networks, Inc. 1 Table of Contents Before we begin... 3 Configuring IKEv2 on IVE... 3 IKEv2 Client Side Configuration on Windows
How To Test The Bandwidth Meter For Hyperv On Windows V2.4.2.2 (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2
BANDWIDTH METER FOR HYPER-V NEW FEATURES OF 2.0 The Bandwidth Meter is an active application now, not just a passive observer. It can send email notifications if some bandwidth threshold reached, run scripts
Enterprise Security Critical Standards Summary
Enterprise Security Critical Standards Summary The following is a summary of key points in the Orange County Government Board of County Commissioners (OCGBCC) security standards. It is necessary for vendors
Published. Technical Bulletin: Use and Configuration of Quanterix Database Backup Scripts 1. PURPOSE 2. REFERENCES 3.
Technical Bulletin: Use and Configuration of Quanterix Database Document No: Page 1 of 11 1. PURPOSE Quanterix can provide a set of scripts that can be used to perform full database backups, partial database
WildFire Cloud File Analysis
WildFire Cloud File Analysis The following topics describe the different methods for sending files to the WildFire Cloud for analysis. Forward Files to the WildFire Cloud Verify Firewall File Forwarding
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
Experian Secure Transport Service
Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport
Executable Integrity Verification
Executable Integrity Verification Abstract Background Determining if a given executable has been trojaned is a tedious task. It is beyond the capabilities of the average end user and even many network
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
Windows Quick Start Guide for syslog-ng Premium Edition 5 LTS
Windows Quick Start Guide for syslog-ng Premium Edition 5 LTS November 19, 2015 Copyright 1996-2015 Balabit SA Table of Contents 1. Introduction... 3 1.1. Scope... 3 1.2. Supported platforms... 4 2. Installation...
Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox
Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...
Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire
SAMPLE CREDIT UNION INFORMATION SECURITY DUE DILIGENCE QUESTIONNAIRE FOR POTENTIAL VENDORS Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire 1. Physical security o Where is
DKIM Enabled Two Factor Authenticated Secure Mail Client
DKIM Enabled Two Factor Authenticated Secure Mail Client Saritha P, Nitty Sarah Alex M.Tech Student[Software Engineering], New Horizon College of Engineering, Bangalore, India Sr. Asst Prof, Department
FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SSL/FTP (File Transfer Protocol over Secure Sockets Layer)
FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE This troubleshooting guide covers secure file transfers using the SFTP and SSL/FTP file transfer protocols for Claims, POC, and Medical EDI transmissions.
Hide and seek - how targeted attacks hide behind clean applications Szappanos Gábor
Hide and seek - how targeted attacks hide behind clean applications Szappanos Gábor Principal Malware Researcher 1 Honourable mentions: 2010. Stuxnet digitally signed drivers: stolen certificate June 2012.
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Lieberman Software Corporation Enterprise Random Password Manager
Lieberman Software Corporation Enterprise Random Password Manager RSA envision Ready Implementation Guide Last Modified: January 27, 2011 Partner Information Product Information Partner Name Web Site Product
Five Steps to Improve Internal Network Security. Chattanooga ISSA
Five Steps to Improve Internal Network Security Chattanooga ISSA 1 Find Me AverageSecurityGuy.info @averagesecguy [email protected] github.com/averagesecurityguy ChattSec.org 2 Why? The methodical
Using Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
Redline Users Guide. Version 1.12
Redline Users Guide Version 1.12 Contents Contents 1 About Redline 5 Timeline 5 Malware Risk Index (MRI) Score 5 Indicators of Compromise (IOCs) 5 Whitelists 5 Installation 6 System Requirements 6 Install
Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner [email protected]
Computer Security Curriculum at the Univ. of Wisconsin Eau Claire Paul J. Wagner [email protected] Background! Attended week-long workshop at Indiana University of Pennsylvania in 2002 with colleague Andy
CRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
WS_FTP Professional 12. Security Guide
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 2 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...
CGHub Client Security Guide Documentation
CGHub Client Security Guide Documentation Release 3.1 University of California, Santa Cruz April 16, 2014 CONTENTS 1 Abstract 1 2 GeneTorrent: a secure, client/server BitTorrent 2 2.1 GeneTorrent protocols.....................................
Proto Balance SSL TLS Off-Loading, Load Balancing. User Manual - SSL. http://www.protonet.co.za/
Proto Balance SSL TLS Off-Loading, Load Balancing http://www.protonet.co.za/ User Manual - SSL Copyright c 2003-2010 Shine The Way 238 CC. All rights reserved. March 13, 2010 Contents 1. Introduction........................................................................
Enhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S 121(8a)E 122(14)S This feature was introduced Support for this feature was integrated into Cisco IOS Release 121(8a)E This feature was integrated
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
How to hack VMware vcenter server in 60 seconds
Invest in security to secure investments How to hack VMware vcenter server in 60 seconds Alexander Minozhenko #whoami Pen-tester at Digital Security Researcher DCG#7812 / Zeronights CTF Thanks for ideas
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Künftige Cyber-Attacken: Risiken und Techniken. Future Cyber attacks: Risks and techniques. Prof. Dr. T. Nouri [email protected]. sd&m 16.09.
Künftige Cyber-Attacken: Risiken und Techniken Future Cyber attacks: Risks and techniques Prof. Dr. T. Nouri [email protected] sd&m 16.09.08 Content 1. Hacking Techniques 2. Main Goals of IT-security
Submitting UITests at the Command Line
Submitting UITests at the Command Line Overview This guide discusses how to submit your UITests tests to Xamarin Test Cloud using the command line. This scenario is appropriate for continuous integration
Protecting Your POS System from PoSeidon and Other Malware Attacks
Protecting Your POS System from PoSeidon and Other Malware Attacks A Multi-tier, Defense in Depth Strategy for Securing Point of Sale Systems from Remote Access Attacks Retailers are being threatened by
WS_FTP Professional 12
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method...1 About SSL...1 About SSH...2 About OpenPGP...2 Using FIPS 140-2 Validated Cryptography...2
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
Introduction. How does FTP work?
Introduction The µtasker supports an optional single user FTP. This operates always in active FTP mode and optionally in passive FTP mode. The basic idea of using FTP is not as a data server where a multitude
Internet Mail Client Control Library SSL Supplement
Codestone Ltd Internet Mail Client Control Library SSL Supplement Codestone Ltd 2004 Page 1 / 22 Welcome to the Internet Mail Client Control Library SSL Supplement we hope you will find the library to
WordPress Security Scan Configuration
WordPress Security Scan Configuration To configure the - WordPress Security Scan - plugin in your WordPress driven Blog, login to WordPress as administrator, by simply entering the url_of_your_website/wp-admin
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access
The Best First for Beginners who want to become Penetration Testers PTSv2 in pills: Self-paced, online, flexible access 900+ interactive slides and 3 hours of video material Interactive and guided learning
Snow Agent System Pilot Deployment version
Pilot Deployment version Security policy Revision: 1.0 Authors: Per Atle Bakkevoll, Johan Gustav Bellika, Lars, Taridzo Chomutare Page 1 of 8 Date of issue 03.07.2009 Revision history: Issue Details Who
Cloud Backup Express
Cloud Backup Express Table of Contents Installation and Configuration Workflow for RFCBx... 3 Cloud Management Console Installation Guide for Windows... 4 1: Run the Installer... 4 2: Choose Your Language...
Installing buzztouch Self Hosted
Installing buzztouch Self Hosted This step-by-step document assumes you have downloaded the buzztouch self hosted software and operate your own website powered by Linux, Apache, MySQL and PHP (LAMP Stack).
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
SafeNet MSSQL EKM Provider User Guide
SafeNet MSSQL EKM Provider User Guide Version 4.8.5 Documentation Version: 20080705 Copyright Information 2009 SafeNet, Inc. All rights reserved All intellectual property is protected by copyright. All
VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE. Summary. Distribution and Installation
VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE Distribution: Merchants, Acquirers Who should read this: Information security, incident response, cyber intelligence staff Summary Kuhook
FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SFTP (Secure File Transfer Protocol)
FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE This troubleshooting guide covers secure file transfers using the SFTP file transfer protocols for Claims, POC, and Medical EDI transmissions. SFTP
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
Quick Start Guide. Hosting Your Domain
Quick Start Guide Hosting Your Domain http://www.names.co.uk/support/ Table of Contents Web Hosting... 3 FTP (File Transfer Protocol)... 3 File Manager... 6 SiteMaker... 7 2 Please keep these documents
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals Ae Chan Kim 1, Won Hyung Park 2 and Dong Hoon Lee 3 1 Dept. of Financial Security, Graduate School of Information Security,
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
Malware Detection in Android by Network Traffic Analysis
Malware Detection in Android by Network Traffic Analysis Mehedee Zaman, Tazrian Siddiqui, Mohammad Rakib Amin and Md. Shohrab Hossain Department of Computer Science and Engineering, Bangladesh University
Automated CPanel Backup Script. for home directory backup, remote FTP backup and Amazon S3 backup
Automated CPanel Backup Script for home directory backup, remote FTP backup and Amazon S3 backup Version : 1.0 Date : August 10, 2011 Developed by : Dody Rachmat Wicaksono ([email protected])
Capture Pro Software FTP Server Output Format
Capture Pro Software FTP Server Output Format Overview The Capture Pro Software FTP server will transfer batches and index data (that have been scanned and output to the local PC) to an FTP location accessible
Uploads from client PC's to mercury are not enabled for security reasons.
Page 1 Oracle via SSH (on line database classes only) The CS2 Oracle Database (Oracle 9i) is located on a Windows 2000 server named mercury. Students enrolled in on line database classes may access this
WildFire Overview. WildFire Administrator s Guide 1. Copyright 2007-2015 Palo Alto Networks
WildFire Overview WildFire provides detection and prevention of zero-day malware using a combination of malware sandboxing and signature-based detection and blocking of malware. WildFire extends the capabilities
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
PROCESSES LOADER 9.0 SETTING. Requirements and Assumptions: I. Requirements for the batch process:
SETTING UP DATA LOADER 9.0 FOR AUTO PROCESSES Requirements and Assumptions: 9.0 The purpose of this document is to document findings on the setup of Data Loader 9.0 for automated processes. I will be updating
WHY ATTACKER TOOLSETS DO WHAT THEY DO
WHY ATTACKER TOOLSETS DO WHAT THEY DO (or.. Reasons they just keep working ) Matt McCormack OVER THE LAST YEAR 50+ engagements Good chunk of different verticals, industries, etc. Varying qualities and
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
WS_FTP Professional 12. Security Guide
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 1 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
MOVEIT: SECURE BY DESIGN BY JONATHAN LAMPE, GCIA, GSNA
MOVEIT: SECURE BY DESIGN BY JONATHAN LAMPE, GCIA, GSNA The MOVEit DMZ server, MOVEit clients, and FIPS 140-2 validated MOVEit cryptographic software products by Ipswitch File Transfer have been designed
How to configure SSL proxying in Zorp 6
How to configure SSL proxying in Zorp 6 April 17, 2015 Abstract This tutorial describes how to configure Zorp to proxy SSL traffic Copyright 1996-2015 BalaBit IT Security Ltd. Table of Contents 1. Preface...
WebApp S/MIME Manual. Release 7.2.1. Zarafa BV
WebApp S/MIME Manual Release 7.2.1 Zarafa BV January 06, 2016 Contents 1 Introduction 2 2 Installation 3 2.1 RPM based distributions............................................. 3 2.2 DEB based distributions.............................................
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014
1 ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014 About the Presenters Ms. Irene Selia, Product Manager, ClearSkies SecaaS SIEM Contact: [email protected],
