Skeletons in Microsoft s Closet - Silently Fixed Vulnerabilities. Andre Protas Steve Manzuik
|
|
|
- Cynthia Norman
- 9 years ago
- Views:
Transcription
1 Skeletons in Microsoft s Closet - Silently Fixed Vulnerabilities Andre Protas Steve Manzuik
2 Presentation Outline - Introductions / Outline - That s this slide so we are done with that. - Non-Disclosure - Politics of not disclosing a vulnerability when it is fixed. - What vendors practice this? - Why is this bad? - Silently Fixed Bug Hunting - Our methodology. - Tools we used. - Reversing Potential Hits - Output from the tools. - Identifying potential issues.
3 Presentation Outline - Filtering the List - What we ignored. - Why we ignored? - Vulnerabilities Found - Issues identified - Vulnerabilities vs. Security Enhancements - Details - Security enhancements - Vulnerabilities found - Vulnerability Exposed - Demo - Where we found the vulnerability - How do you exploit the vulnerability - Questions - Buy us beer!!!
4 Why This Topic? ASN.1 Story -Vendor released a patch (MS04-007) fixing what appeared to be 1 issue -Vendor who discovered the vulnerability had 2 advisories -Exploit code for a third issue was created and sold privately on the vulnerability market. -Upon further analysis a total of seven issues were actually fixed. -Apparently 1 = 7. New math? -So who cares? Or better yet why care?
5 NonDisclosure What is Non-Disclosure? -In the context of Information Security Non-Disclosure is the act of not disclosing any details of a security vulnerability. -Many vendors, not just Microsoft, practice this on a regular basis. Politics - Disclosure = Press (bad?) - Does press affect buying habits? - Perception of security outweighs reality.
6 NonDisclosure Vendor View - Why disclosure internally found issues - NDA agreements with third party consultants - Adds release process overhead - Customers install all patches anyways. Right? If a vulnerability is found in a component, you should look for all related issues in that component - Writing Secure Code Second Edition Microsoft Press
7 NonDisclosure Why This Is Bad - Customers do *NOT* install all patches. - Affects patch management methodology. - Signature based vendors may not catch on. A Word About Signatures -Many vendors do not have the resources or skill to reverse a patch. -The nature of our industry means that being first is best. -Being first doesn t always equal being right.
8 Silently Fixed Bug Hunting Methodology - Identify patches that most likely have silent fixes - Document publicly known issues addressed in the patch - Catalog files in the patch - Gather pre-patch files that are related - Compare prepatch.dll with patch.dll - Identify areas of interest - Review interest areas for potentially exploitable flaws - Exploit flaw in pre-patch environment - Test exploit against post-patch environment - Test against a signature based security solution
9 Silently Fixed Bug Hunting Patch Identification - Priority system for reviewing patches for silently fixed vulnerabilities. Anonymous remotely accessible patched system functionality. Non-Anonymous remote system functionality. Non-remote system functionality
10 Silently Fixed Bug Hunting Document publicly known issues addressed in the patch - During Patch Tuesday, details may be at a minimum. Use CVE and Advisory details (if they exist) to try to pinpoint the disclosed vulnerability. Monitor exploit posts for the vulnerability to better understand the function that is being exploited. The MIDL_user_allocate function in the Microsoft Distributed Transaction Coordinator (MSDTC) proxy (MSDTCPRX.DLL) allocates a 4K page of memory regardless of the required size, which allows attackers to overwrite arbitrary memory locations using an incorrect size value that is provided to the NdrAllocate function, which writes management data to memory outside of the allocated buffer.
11 Silently Fixed Bug Hunting Catalog Files In The Patch - Usually pretty easy using the /x command on the installer. - Filter update installer files out of the directory, and only include the files that were updated as part of the patch itself.
12 Silently Fixed Bug Hunting Gather pre-patch files that are related - VMWare images can be a huge help here. Keep VMWare images of each SP/UR as well as a current one for use against upcoming patches - Keep a solid filing convention for the files that are to be analyzed to avoid confusing Especially useful in batch analysis of service packs or update rollups
13 Silently Fixed Bug Hunting Diffing In General - The process of enumerating the changes made between two entities Typically performed on files to look for textual differences (+ / - / change) Great for learning the differences between configuration files - But this can also be used in binary files. Enumerate the functionality between two dlls/exe/etc files (+ / - / change) Great for learning what security/functionality enhancements may have been introduced in the patch. Use IDA Pro to reverse engineer the system file both pre- and post-patch.
14 Silently Fixed Bug Hunting Reverse Engineering A compiled file can be disassembled to show the machine code being processed for that file. - Allows for pseudo-translation into source code. - A disassembly be used to find flaws, hidden APIs, or any other number of low level functionality that may/may not be documented in standard references. - Our Use? We use reverse engineering to dissect the security enhancements applied in Microsoft patches.
15 Silently Fixed Bug Hunting Tools we used - File information extraction - Muddle diff - Strings diff - Symbol retrieval - Analysis with IDAPro - Custom IDA(Python)? Plugins - Sabre BinDiff - Normal Debugging/Testing Environments - Pre/Post Patch VMWares (not snapshots )
16 What About Service Packs / Update Rollups? Automation is key - Enter BS (binary_diffing starter) - Useful suite of scripts to automate the basic binary diffing dependencies to allow for less wasted time. Informational Gathering (sizes, names, versions, md5s, etc) PDB symbol retrieval IDB generation (pre/post PDB symbols) Muddle/String diff utility Allows for a specified IDC script to be run - This tool allows for a complete basic reconnaissance of a service pack / update rollup once it has finished analyzing all of the files (pre and post patch) that were update.
17 Potential Hits Output IDA Split Screen
18 Potential Hits Output Strings Diff
19 Potential Hits Output BinDiff
20 Filtering the List Ignored Results - Although we didn t ignore tool output completely, some information was not used as much except for a support role to the IDA twin-disassembly or the BinDiff IDA plugin. - Strings_Diff - Removed subroutines from disassembly. - Muddle_Diff
21 Filtering the List Why we ignored - We ignored much of the string diff generation, as there were many false positives that were reported by the string generation tool. - Although removed functionality could be interesting as well, we were primary concerned with the added functionality / security enhancements. - Most of the muddle output was ignored as muddle can generate many false positives (complicated data structures could be equal, but would alert a diffing tool as changed).
22 Security Enhancements Found Not Vulnerabilities But - The release notes from Windows 2000 Update Rollup 1 says; This update rollup contains security-related updates that were produced for Windows 2000 between the release of Windows 2000 SP4 and April 30, On April 30, 2005, the contents of Update Rollup 1 were locked for final testing by Microsoft and customer beta testing. This update rollup also contains several important non-security updates. This article contains detailed information about this update rollup, answers frequently asked questions, and lists the updates that are included in this update rollup. - Do you understand this paragraph?
23 Security Enhancements Found Not Vulnerabilities But - Non-Strict RPC connections now enforced Previously allowed for context switching between RPC interfaces within the same process (i.e. services.exe) Allows for RPC evasion (via ALTER_CONTEXT) Potential DoS (access violation) from improperly checked context handle from possibly Example: Eventlog.dll CLSID: 82273fdc-e32a-18c3-3f dc23ea NOTE: This is the ONLY dll with this change.
24 Vulnerabilities Found Don t worry. We were not done looking for silently fixed bugs.
25 Vulnerabilities Found MS MSDTC Vulnerability CAN After being disappointed with Windows 2000 Update Release 1 - MS fixed only 1 MSDTC vulnerability and a few others - But what is "wcscpy(arg_28, pwsznull_guid)" A remote code execution and local elevation of privilege vulnerability exists in the Microsoft Distributed Transaction Coordinator that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system.
26 Security Flaws Found MSDTC (MS05-051) Heap Overflow: CRpcIoManagerServer::BuildContext Lack of input validation allows for overwrite of the pszguidout argument with a null GUID string Attacks XP/2000 (BuildContextW opnum 7) as well as NT40 (BuildContext opnum 1). Interesting new string added: 'At least one of the buffers passed into BuildContext has an incorrect length. (0x6DFDE24B) 4 new string length checks added Found by Derek Soeder in a standard patch diffing session
27 Vulnerabilities Found MS Microsoft Exchange TNEF Issue - After being disappointed with Windows 2000 Update Release 1 - Found multiple vulnerable functions - But only 1 was reported in the advisory TNEF Decoding Vulnerability - CVE A remote code execution vulnerability exists in Microsoft Outlook and Microsoft Exchange Server because of the way that it decodes the Transport Neutral Encapsulation Format (TNEF) MIME attachment. An attacker could exploit the vulnerability by constructing a specially crafted TNEF message that could potentially allow remote code execution when a user opens or previews a malicious message or when the Microsoft Exchange Server Information Store processes the specially crafted message. An attacker who successfully exploited this vulnerability could take complete control of an affected system.
28 Security Flaws Found TNEF (MS06-003) Vulnerability reported from MS Security team only mentions HrDecodeEncapsulation. Many other changes were released in the patch within different functions. Example: HrDecodeRecipTable new > (2710h) check after _WSTRM_Read call Potentially exploitable (demo) Also added (encoding) updates to not allow malformed outbound TNEF. NOTE: This is one of MANY size/length checks added in MS
29 Demonstration Demo
30 Demonstration Demo time
31 In Closing What you don t know can hurt you. Relying only on signatures can hurt you. Full-Disclosure from vendors would help. This is not just a Microsoft issue. - Oracle - Apple - HP - IBM - Other (Linux?)
32 References OpenRCE.org Reverse Engineering Community Sabre-Security Professional binary tools IDAPython Python interface to IDA plugin API IDA Palace Random IDA goodness eeye Blink Generic Endpoint Security Thanks: Derek Yoda Soeder, Barnaby The Claw Jack, Hugo The Puto
33 Questions
Reverse Engineering and Computer Security
Reverse Engineering and Computer Security Alexander Sotirov [email protected] Introduction Security researcher at Determina, working on our LiveShield product Responsible for vulnerability analysis and
Microsoft Patch Analysis
Microsoft Patch Analysis Patch Tuesday - Exploit Wednesday Yaniv Miron aka Lament 1 / About Me Yaniv Miron aka Lament Security Researcher and Consultant Found security vulnerabilities in IBM, Oracle, Microsoft
Bruh! Do you even diff? Diffing Microsoft Patches to Find Vulnerabilities
SESSION ID: HT-T10 Bruh! Do you even diff? Diffing Microsoft Patches to Find Vulnerabilities Stephen Sims Security Researcher SANS Institute @Steph3nSims Part I Binary Diffing Binary Diffing Security patches
esrever gnireenigne tfosorcim seiranib
esrever gnireenigne tfosorcim seiranib Alexander Sotirov [email protected] CanSecWest / core06 Reverse Engineering Microsoft Binaries Alexander Sotirov [email protected] CanSecWest / core06 Overview
Bug hunting. Vulnerability finding methods in Windows 32 environments compared. FX of Phenoelit
Bug hunting Vulnerability finding methods in Windows 32 environments compared FX of Phenoelit The goal: 0day What we are looking for: Handles network side input Runs on a remote system Is complex enough
What Happens In Windows 7 Stays In Windows 7
What Happens In Windows 7 Stays In Windows 7 Moti Joseph & Marion Marschalek Troopers Conference 2014 About Us Joseph Moti Security Researcher Marion Marschalek Malware Analyst 8 7 3 1-7 3 6 4-1 9 3 2-9
Nessus scanning on Windows Domain
Nessus scanning on Windows Domain A little inside information and Nessus can go a long way By Sunil Vakharia [email protected] Version 1.0 4 November 2003 About this paper This paper is not a tutorial
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Introduction. Figure 1 Schema of DarunGrim2
Reversing Microsoft patches to reveal vulnerable code Harsimran Walia Computer Security Enthusiast 2011 Abstract The paper would try to reveal the vulnerable code for a particular disclosed vulnerability,
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Custom Penetration Testing
Custom Penetration Testing Compromising a Vulnerability through Discovery and Custom Exploitation Stephen Sims Advanced Penetration Testing - 2009 SANS 1 Objectives Penetration Testing Precompiled Tools
The Leader in Cloud Security SECURITY ADVISORY
The Leader in Cloud Security SECURITY ADVISORY Security Advisory - December 14, 2010 Zscaler Provides Protection in the Face of Significant Microsoft Year End Patch Cycle Zscaler, working with Microsoft
MWR InfoSecurity Advisory. Interwoven Worksite ActiveX Control Remote Code Execution. 10 th March 2008. Contents
Contents MWR InfoSecurity Advisory Interwoven Worksite ActiveX Control Remote Code Execution 10 th March 2008 2008-03-10 Page 1 of 9 Contents Contents 1 Detailed Vulnerability Description...5 1.1 Introduction...5
Discovering passwords in the memory
Discovering passwords in the memory Abhishek Kumar ([email protected]) November 2003 Escalation of privileges is a common method of attack where a low privileged user exploits a vulnerability
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Windows XP SP3 Registry Handling Buffer Overflow
Windows XP SP3 Registry Handling Buffer Overflow by Matthew j00ru Jurczyk and Gynvael Coldwind Hispasec 1. Basic Information Name Windows XP SP3 Registry Handling Buffer Overflow Class Design Error Impact
Persist It Using and Abusing Microsoft s Fix It Patches
Persist It Using and Abusing Microsoft s Fix It Patches Jon Erickson : isight Partners : [email protected] Abstract: Microsoft has often used Fix it patches, which are a subset of Application
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Hotpatching and the Rise of Third-Party Patches
Hotpatching and the Rise of Third-Party Patches Alexander Sotirov [email protected] BlackHat USA 2006 Overview In the next one hour, we will cover: Third-party security patches _ recent developments
PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES
PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES Ira Winkler Codenomicon Session ID: MBS-W05 Session Classification: Intermediate Zero Day Attacks Zero day attacks are rising in prominence They tend to be
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
Common Criteria Web Application Security Scoring CCWAPSS
Criteria Web Application Security Scoring CCWAPSS Author Frédéric Charpentier, security pentester. France. [email protected] Releases Version 1.0 : First public release September 2007 Version
31 Ways To Make Your Computer System More Secure
31 Ways To Make Your Computer System More Secure Copyright 2001 Denver Tax Software, Inc. 1. Move to more secure Microsoft Windows systems. Windows NT, 2000 and XP can be made more secure than Windows
APPLICATION SECURITY RESPONSE: WHEN HACKERS COME A-KNOCKING
APPLICATION SECURITY RESPONSE: WHEN HACKERS COME A-KNOCKING Katie Moussouris Senior Security Strategist Microsoft Security Response Center http://twitter.com/k8em0 (that s a zero) Session ID: ASEC-T18
Citect and Microsoft Windows XP Service Pack 2
Citect and Microsoft Windows XP Service Pack 2 Citect and Windows XP Spk 2 White Paper Page 1 About Citect Citect Pty Ltd is a worldwide leader in industrial automation and information management. Its
Kaseya 2. User Guide. Version 7.0. English
Kaseya 2 Patch Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS
HP OpenView Patch Manager using Radia Version 3.0
HP OpenView Patch Manager using Radia Version 3.0 Summary of Changes in Support of Microsoft Update Wayne Dalesio and Ben Sweetser HP OpenView Configuration Management 2004 Hewlett-Packard Development
Fuzzing in Microsoft and FuzzGuru framework
Fuzzing in Microsoft and FuzzGuru framework OWASP-IL May-2007 John Neystadt [email protected] Lead Program Manager Forefront Edge, Microsoft Agenda Overview Introduction to Fuzzing FuzzGuru Architecture
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities
Objectives After reading this chapter and completing the exercises, you will be able to: Describe vulnerabilities of Windows and Linux operating systems Identify specific vulnerabilities and explain ways
============================================================= =============================================================
Stephan Lantos Subject: FW: @RISK: The Consensus Security Vulnerability Alert: Vol. 13, Num. 23 In partnership with SANS and Sourcefire, Qualys is pleased to provide you with the @RISK Newsletter. This
Microsoft Security Bulletin MS09-053 - Important
Microsoft Security Bulletin MS09-053 - : Vulnerabilities in FTP Service for...page 1 of 28 TechNet Home > TechNet Security > Bulletins Microsoft Security Bulletin MS09-053 - Vulnerabilities in FTP Service
Barracuda Intrusion Detection and Prevention System
Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques
Exploiting Transparent User Identification Systems
Exploiting Transparent User Identification Systems Wayne Murphy Benjamin Burns Version 1.0a 1 CONTENTS 1.0 Introduction... 3 1.1 Project Objectives... 3 2.0 Brief Summary of Findings... 4 3.0 Background
Web Application Firewall Profiling and Evasion. Michael Ritter Cyber Risk Services Deloitte
Web Application Firewall Profiling and Evasion Michael Ritter Cyber Risk Services Deloitte Content 1. Introduction 2. WAF Basics 3. Identifying a WAF 4. WAF detection tools 5. WAF bypassing methods 6.
TECHNICAL NOTE 08/04 IINTRODUCTION TO VULNERABILITY ASSESSMENT TOOLS
TECHNICAL NOTE 08/04 IINTRODUCTION TO VULNERABILITY ASSESSMENT TOOLS 1 OCTOBER 2004 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor
Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers
Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, 2011. Juan Ortega. Juan Ortega, [email protected]. 1 Juan Ortega, juaorteg@uat.
1 Penetration Testing NTS330 Unit 1 Penetration V1.0 February 20, 2011 Juan Ortega Juan Ortega, [email protected] 1 Juan Ortega, [email protected] 2 Document Properties Title Version V1.0 Author Pen-testers
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Microsoft STRIDE (six) threat categories
Risk-based Security Testing: Prioritizing Security Testing with Threat Modeling This lecture provides reference material for the book entitled The Art of Software Security Testing by Wysopal et al. 2007
MCAFEE FOUNDSTONE FSL UPDATE
MCAFEE FOUNDSTONE FSL UPDATE 2012-JUN-13 To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and
Automating Security Testing. Mark Fallon Senior Release Manager Oracle
Automating Security Testing Mark Fallon Senior Release Manager Oracle Some Ground Rules There are no silver bullets You can not test security into a product Testing however, can help discover a large percentage
The Hacker Strategy. Dave Aitel [email protected]. Security Research
1 The Hacker Strategy Dave Aitel [email protected] Security Research Who am I? CTO, Immunity Inc. History: NSA->@stake -> Immunity Responsible for new product development Vulnerability Sharing Club
IOActive Security Advisory
IOActive Security Advisory Title Severity Discovered by CVE Lenovo s System Update Uses a Predictable Security Token High Michael Milvich [email protected] Sofiane Talmat [email protected]
Source Code Review Using Static Analysis Tools
Source Code Review Using Static Analysis Tools July-August 05 Author: Stavros Moiras Supervisor(s): Stefan Lüders Aimilios Tsouvelekakis CERN openlab Summer Student Report 05 Abstract Many teams at CERN,
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Exchange 2007/2010 Journaling for Cryoserver
Exchange 2007/2010 Journaling for Cryoserver How to set up Exchange 2007 / 2010 Journaling, to capture an archive copy of all inbound/outbound and internal mail, for delivery to the Cryoserver system February
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
How to Grow and Transform your Security Program into the Cloud
How to Grow and Transform your Security Program into the Cloud Wolfgang Kandek Qualys, Inc. Session ID: SPO-207 Session Classification: Intermediate Agenda Introduction Fundamentals of Vulnerability Management
Anti-SPAM Solutions as a Component of Digital Communications Management
Anti-SPAM Solutions as a Component of Digital Communications Management Ron Shuck CISSP, GCIA, CCSE Agenda What is Spam & what can you do? What is the cost of Spam E-mail E to organizations? How do we
Installing and Administering VMware vsphere Update Manager
Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security
Format string exploitation on windows Using Immunity Debugger / Python. By Abysssec Inc WwW.Abysssec.Com
Format string exploitation on windows Using Immunity Debugger / Python By Abysssec Inc WwW.Abysssec.Com For real beneficiary this post you should have few assembly knowledge and you should know about classic
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
Professional Penetration Testing Techniques and Vulnerability Assessment ...
Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment
MCAFEE FOUNDSTONE FSL UPDATE
MCAFEE FOUNDSTONE FSL UPDATE 2013-FEB-25 To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and
MSRPC NULL sessions. Exploitation and protection. Jean-Baptiste Marchand <[email protected]>
MSRPC NULL sessions Exploitation and protection Jean-Baptiste Marchand Jean-Baptiste Marchand Agenda - 2 - Introduction to NULL sessions NULL sessions internals Tools to
HP ProLiant Essentials Vulnerability and Patch Management Pack Release Notes
HP ProLiant Essentials Vulnerability and Patch Management Pack Release Notes Supported platforms... 2 What s new in version 2.1... 2 What s new in version 2.0.3... 2 What s new in version 2.0.2... 2 What
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Database Security Guide
Institutional and Sector Modernisation Facility ICT Standards Database Security Guide Document number: ISMF-ICT/3.03 - ICT Security/MISP/SD/DBSec Version: 1.10 Project Funded by the European Union 1 Document
Deploying Microsoft Operations Manager with the BIG-IP system and icontrol
Deployment Guide Deploying Microsoft Operations Manager with the BIG-IP system and icontrol Deploying Microsoft Operations Manager with the BIG-IP system and icontrol Welcome to the BIG-IP LTM system -
Install this update to increase the performance of web sites that use Ajax. After you install this item, you may have to restart your computer.
Windows XP Pro Service Pack 2 Approved Window Update Windows XP (KB896423) Update Description A security issue has been identified in the Print Spooler service that could allow an attacker to compromise
Vulnerability Disclosure Guideline for Software Developers
Vulnerability Disclosure Guideline for Software Developers Excerpt of Information Security Early Warning Partnership Guideline Appendix 5 Contents 1. Introduction 2 2. Vulnerability Information: Provide
Complete Patch Management
Complete Management Targeted, Reliable and Cost-efficient In- Depth CSI Corporate Software Inspector Empower your IT-Operations and Security Teams with the most reliable Vulnerability & Management solution
Smart home appliance security and malware
Smart home appliance security and malware om Jeong wook (Matt) Oh HP Security Research, September 2014 Why Smart TV? The most popular smart device in real life TVs are everywhere If you bought a new TV
X05. An Overview of Source Code Scanning Tools. Loulwa Salem. Las Vegas, NV. IBM Corporation 2006. IBM System p, AIX 5L & Linux Technical University
X05 An Overview of Source Code Scanning Tools Loulwa Salem Las Vegas, NV Objectives This session will introduce better coding practices and tools available to aid developers in producing more secure code.
Reporting and Incident Management for Firewalls
Reporting and Incident Management for Firewalls The keys to unlocking your firewall s secrets Contents White Paper November 8, 2001 The Role Of The Firewall In Network Security... 2 Firewall Activity Reporting
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
CVE-2012-1535 Adobe Flash Player Integer Overflow Vulnerability Analysis
Your texte here. CVE-2012-1535 Adobe Flash Player Integer Overflow Vulnerability Analysis October 11 th, 2012 Brian MARIANI & Frédéric BOURLA A FEW WORDS ABOUT FLASH PLAYER Your Adobe texte Flash here
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup
Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
Patch Management. A newsletter for IT Professionals. Issue 6. I. Background of Patch Management. Education Sector Updates
Patch Management A newsletter for IT Professionals Education Sector Updates Issue 6 I. Background of Patch Management A software patch is an additional piece of program codes or executable designed to
VMware vcenter Update Manager Administration Guide
VMware vcenter Update Manager Administration Guide vcenter Update Manager 4.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
The Microsoft JPEG Vulnerability and the Six New Content Security Requirements
The Microsoft JPEG Vulnerability and the Six New Content Security Requirements Table of Contents OVERVIEW...3 1. THE VULNERABILITY DESCRIPTION...3 2. NEEDED: A NEW PARADIGM IN CONTENT SECURITY...4 3. PRACTICAL
Using Windows Update for Windows Me
Using Windows Update for Windows Me Contents Introduction... 1 Before You Begin... 2 Downloading and Installing the Windows Update Components... 2 Maintaining a Secure Computing Environment... 6 Introduction
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION
VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION copyright 2003 securitymetrics Security Vulnerabilities of Computers & Servers Security Risks Change Daily New
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Trevor Richmond, Sales Engineer Trend Micro Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock)
Linux Kernel. Security Report
Linux Kernel Security Report September 25 Authors: Andy Chou, Bryan Fulton and Seth Hallem Coverity has combined two years of analysis work carried out in a commercial setting at Coverity with four years
AUTOMATIC DETECTION OF VULNERABILITY IN WRAPPED PACKAGES IN ORACLE
AUTOMATIC DETECTION OF VULNERABILITY IN WRAPPED PACKAGES IN ORACLE Presenters: Yaron Gur-Arieh Nikita Zubrilov Ilya Kolchinsky The Problem Our Project Deals With One of the key threats to the security
CS3235 - Computer Security Thirteenth topic: System attacks. defenses
Overflows... Security case studies CS3235 - Computer Security Thirteenth topic: System attacks and defenses Hugh Anderson National University of Singapore School of Computing March/April, 2016 Hugh Anderson
