Practical Mac OS X Insecurity. Security Concepts, Problems and Exploits on your Mac
|
|
|
- Stuart Parks
- 10 years ago
- Views:
Transcription
1 Practical Mac OS X Insecurity Security Concepts, Problems and Exploits on your Mac
2 Who am I? Student of physics, mathematics and astronomy in Bonn Mac user since 1995 I love Macs Mac evangelist
3 Intentions Macs have to become even more secure Apple needs to react appropriately Give an overview on Mac security
4 Overview Mac OS X Security Concepts Worst vulnerabilities and exploits Securing your Mac
5 Security Concepts
6 Security Concepts What s good: No network services are listening by default User is never logged in as root Relies on the strong Unix security and permissions model Malware usually needs some sort of privilege escalation exploit
7 Security Concepts What s not so good: Closed-source security components (e.g. Admin.framework) User can do almost anything without entering the password Insecure default settings
8 Vulnerabilities
9 Vulnerability #1 System Preferences
10 System Preferences Closed-source Relies on setuid root helper tool Many things can be done without password Start and stop services, change power management settings, add new users
11 System Preferences You can add users to the admin group You can get root within 5 seconds Still works in Tiger AppleScript Demo!
12 System Preferences How do I fix it?
13 System Preferences I reported this bug to Apple in October I sent the exploit and suggested a workaround The answer was: You can enable the "Require password to unlock each secure system preferences" checkbox, which can be found in the Security preference pane. Note: After doing so, any user will have to provide the admin name and password in order to change settings, including Accounts.
14 System Preferences This was no question, this was a local privilege escalation vulnerability I wrote them again This time they answered: Thank you for the clarification. Please know that we have forwarded this information on to the appropriate engineering team for review.
15 System Preferences The year is now over, it is still not fixed
16 System Preferences This morning, I got mail from Apple We are taking security seriously Wait for next security update Don t publish it Too late, it s already in the congress proceedings
17 Vulnerability #2 Bad Installers and wrong Permissions
18 Bad Installers and wrong Permissions Global startup items can be put to /Library/StartupItems They will be executed as root
19 Bad Installers and wrong Permissions The directory /Library/StartupItems does not exist by default Many installers will create it with wrong permissions It will likely be user- or even world-writable
20 Bad Installers and wrong Permissions Execution of arbitrary code as root by putting it in /Library/StartupItems and rebooting
21 Bad Installers and wrong Permissions Disk Utility can repair permissions The problem is: Disk Utility does not repair the permissions of /Library/StartupItems This is a major bug
22 Bad Installers and wrong Permissions How do I fix it? Put something like chown -R root:wheel /Library/StartupItems chmod -R og-w /Library/StartupItems into /etc/rc or /etc/daily as a workaround.
23 Vulnerability #3 Clear Text Passwords in Swap File
24 Clear Text Passwords Apple s Security Framework does not lock passwords in physical memory by using something like mlock() Eventually they will be written to the swap file Type: sudo strings /var/vm/swapfile0 grep -A 4 -i longname and you will much likely see your password in clear text
25 Clear Text Passwords Fix? In Panther, there is a way but it makes OS X unstable Wait for Tiger which lets you encrypt your swap But: it s no clean solution, breaks performance
26 Vulnerability #4 Personal Filesharing Denial of Service
27 Personal Filesharing Denial of Service Personal Filesharing is the Mac equivalent to Samba on Windows Contains a guest account by default You cannot disable it in System Preferences
28 Personal Filesharing Denial of Service The guest account has write access to a drop box There is no limit on the amount of written data The Harddisk is the limit
29 Personal Filesharing Denial of Service The attacker can fill up all disk space with bullshit OS X will likely crash when it has no free swap space anymore Especially dangerous over gigabit ethernet RendezPoo Demo!
30 Personal Filesharing Denial of Service The guest account can be disabled in /Library/Preferences/com.apple.AppleFileServer.plist by setting <key>guestaccess</key> <true/> to <key>guestaccess</key> <false/>
31 Vulnerability #5 Mach Injection
32 Mach Injection Mach Kernel API Inject code into running Programs and execute it Override C-Functions at runtime
33 Mach Injection With Objective-C it gets interesting
34 Intermezzo: Objective-C Categories Categories: Objective-C language feature Add new methods to existing classes at compile time Subclassing without subclassing ;-)
35 Intermezzo: Objective-C Categories Example: Extend NSString to be able to deal with regular expressions In your App, create a Category NSString (RegExp) Implement all methods you want to add All NSString are now capable of regular expresions
36 Intermezzo: Objective-C Categories No subclassing and casting necessary Also used to split up large classes into a number of smaller files
37 Mach Injection It gets even cooler... We have seen what we can do with Objective-C at compile time On Mac OS X, you can inject Categories into running Applications at runtime I repeat, at runtime!
38 Mach Injection It doesn t stop there... The Objective-C Runtime Library lets you replace one method with another MethodSwizzling I repeat, at runtime!
39 Mach Injection What does it mean? You can selectively replace arbitrary methods with your own implementations in any Objective-C App at runtime Even possible when you don t have the source code
40 Mach Injection Consequences: You can patch the closed-source components in Mac OS X at runtime (e.g. the Finder or Safari) You can do almost anything you want with any running App
41 Mach Injection Implications on security: You don t get a free root shell It makes it easy for malware to patch the system in a malicious way No privileges needed
42 Mach Injection New kind of malware that works entirely with user privileges It will be able to patch the system in a malicious way and perhaps even hide itself Rootkit without root Pretty welcoming atmosphere for viruses
43 Mach Injection Implications for security are not yet explored
44 Vulnerability #6 Disguised Executables
45 Disguised Executables An executable can be camouflaged as any other filetype in the Finder How? Simply change the suffix and the symbol to e.g. match an mp3 file
46 Disguised Executables Fix? None known
47 Summary 1. System Preferences privilege escalation 2. Bad permissions 3. Clear text passwords in swap 4. Personal Filesharing DOS 5. Mach Injection 6. Disguised executables
48 One more thing
49 The first Mac OS X Worm Proof-of-concept, no malicious routine
50 The first Mac OS X Worm Demo!
51 Resources Slides available at: Demo source code available soon
Practical Mac OS X Insecurity
Practical Mac OS X Insecurity Security Concepts, Problems, and Exploits on Your Mac Angelo Laub [email protected] December 11, 2004 1 Introduction While rumors have it that Mac OS X is extremely secure
Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation
Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization
TIPS FOR USING OS X 10.8 MOUNTAIN LION
Mac OS X Tutorial 10.8 Mountain Lion 1 TIPS FOR USING OS X 10.8 MOUNTAIN LION LAUNCHPAD Launchpad is an application launcher first introduced in OS X 10.7 Lion and improved upon in Mountain Lion. Launchpad
User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1
User's Manual Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 VirusBarrier Server 2 and VirusBarrier Mail Gateway 2 for Macintosh 2008 Intego. All Rights Reserved Intego
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Instructions for Adding a MacOS 10.4.x Client to ASURITE
Instructions for Adding a MacOS 10.4.x Client to ASURITE Before beginning, it would be prudent not to have an account with the same username and password as your Active Directory account. For DHCP Workstations:
The safer, easier way to help you pass any IT exams. Exam : 9L0-518. OS X Server Essentials 10.8 Exam. Title : Version : Demo 1 / 6
Exam : 9L0-518 Title : OS X Server Essentials 10.8 Exam Version : Demo 1 / 6 1.In Server app, which procedure will configure OS X Server to let members of a specific group use the Messages service? A.
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
System Security Policy Management: Advanced Audit Tasks
System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that
Future Technology Devices International Ltd. Mac OS-X Installation Guide
Future Technology Devices International Ltd. Mac OS-X Installation Guide I Mac OS-X Installation Guide Table of Contents Part I Welcome to the Mac OS-X Installation Guide 2 Part II Installing FTDIUSBSerialDriver
Take Your Mac OS X Security to NSA Standards June 19, 2014 by Larry Chafin
Take Your Mac OS X Security to NSA Standards June 19, 2014 by Larry Chafin Forword While doing research for another article, I came across NSA s security setup for Mac OS X. No, the information gained
Mac OS X. Staff members using NEIU issued laptops and computers on Active Directory can access NEIU resources that are available on the wired network.
Mac OS X The University Technology Services is privileged to offer a secure wifi network to the university community. Connecting to this network will provide you with benefits in security and improved
EECS 354 Network Security. Introduction
EECS 354 Network Security Introduction Why Learn To Hack Understanding how to break into computer systems allows you to better defend them Learn how to think like an attacker Defense then becomes second-nature
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Securing ios Applications. Dr. Bruce Sams, OPTIMAbit GmbH
Securing ios Applications Dr. Bruce Sams, OPTIMAbit GmbH About Me President of OPTIMAbit GmbH Responsible for > 200 Pentests per Year Ca 50 ios Pentests and code reviews in the last two years. Overview
System Security Fundamentals
System Security Fundamentals Alessandro Barenghi Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico di Milano alessandro.barenghi - at - polimi.it April 28, 2015 Lesson contents Overview
Host/Platform Security. Module 11
Host/Platform Security Module 11 Why is Host/Platform Security Necessary? Firewalls are not enough All access paths to host may not be firewall protected Permitted traffic may be malicious Outbound traffic
Sophos Anti-Virus for Mac OS X Help
Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014
Security Testing Vulnerability Assessment vs Penetration Testing Gabriel Mihai Tanase, Director KPMG Romania 29 October 2014 Agenda What is? Vulnerability Assessment Penetration Testing Acting as Conclusion
CEN 559 Selected Topics in Computer Engineering. Dr. Mostafa H. Dahshan KSU CCIS [email protected]
CEN 559 Selected Topics in Computer Engineering Dr. Mostafa H. Dahshan KSU CCIS [email protected] Access Control Access Control Which principals have access to which resources files they can read
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
Homeland Security Red Teaming
Homeland Security Red Teaming Directs intergovernmental coordination Specifies Red Teaming Viewing systems from the perspective of a potential adversary Target hardening Looking for weakness in existing
Case Studies. Joint software development Mail 1 / 38. Case Studies Joint Software Development. Mailers
Joint software development Mail 1 / 38 Situations Roles Permissions Why Enforce Access Controls? Unix Setup Windows ACL Setup Reviewer/Tester Access Medium-Size Group Basic Structure Version Control Systems
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems
IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy
Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes
Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes Compass Security AG, Daniel Stirnimann Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel +41 55-214 41 60 Fax +41
Penetration Testing in Romania
Penetration Testing in Romania Adrian Furtunǎ, Ph.D. 11 October 2011 Romanian IT&C Security Forum Agenda About penetration testing Examples Q & A 2 What is penetration testing? Method for evaluating the
1. Open the Account Settings window by clicking on Account Settings from the Entourage menu.
Using TLS Encryption with Microsoft Entourage This guide assumes that you have previously configured Entourage to work with your Beloit College email account. If you have not, you can create an account
Sophos Anti-Virus for Mac OS X: Home Edition Help
Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
CS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System J.D. DeVaughn-Brown University of Massachusetts Amherst Department of Computer Science [email protected] 1 Reminders After
DeployStudio Server Quick Install
DeployStudio Server Quick Install v1.7.0 The DeployStudio Team [email protected] Requirements OS X 10.7.5 to 10.11.1 DeployStudioServer_v1.7.x.pkg and later NetBoot based deployment 100 Mb/s switched
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
Crowd Security Intelligence. syn.ac/virusb2014. @patrickwardle. (download slides)
Crowd Security Intelligence (download slides) syn.ac/virusb2014 @patrickwardle METHODS of MALWARE PERSISTENCE on os x mavericks ABOUT [synack] sources a global contingent of vetted security experts worldwide
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Case Study: Access control 1 / 39
Case Study: Access control 1 / 39 Joint software development Mail 2 / 39 Situations Roles Permissions Why Enforce Access Controls? Classic Unix Setup ACL Setup Reviewer/Tester Access Medium-Size Group
CEH Version8 Course Outline
CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information
(General purpose) Program security. What does it mean for a pgm to be secure? Depends whom you ask. Takes a long time to break its security controls.
(General purpose) Program security These ideas apply also to OS and DB. Read Chapter 3. What does it mean for a pgm to be secure? Depends whom you ask. Takes a long time to break its security controls.
Secure Shell Demon setup under Windows XP / Windows Server 2003
Secure Shell Demon setup under Windows XP / Windows Server 2003 Configuration inside of Cygwin $ chgrp Administrators /var/{run,log,empty} $ chown Administrators /var/{run,log,empty} $ chmod 775 /var/{run,log}
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Mac OS X Security Checklist:
Mac OS X Security Checklist: Implementing the Center for Internet Security Benchmark for OS X Recommendations for securing Mac OS X The Center for Internet Security (CIS) benchmark for OS X is widely regarded
Kaspersky Endpoint Security 10 for Windows. Deployment guide
Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses
eggon SDK for ios 7 Integration Instructions
eggon SDK for ios 7 Integration Instructions The eggon SDK requires a few simple steps in order to be used within your ios 7 application. Environment This guide assumes that a standard ios Development
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Administering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012
Administering FileVault 2 on OS X Lion with the Casper Suite Technical Paper July 2012 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that
Malwarebytes Anti-Malware for Mac User Guide Version 1.1 1 October 2015
Malwarebytes Anti-Malware for Mac User Guide Version 1.1 1 October 2015 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and
Online Backup Client User Manual
For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.
RACK911 Labs. Year in Review. May 6, 2014
RACK911 Labs Year in Review May 6, 014 The security of the hosting industry has always been a concern of RACK911 and in May of 013 we decided to take a more proactive role by creating a new brand called
CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006
CSE331: Introduction to Networks and Security Lecture 15 Fall 2006 Worm Research Sources "Inside the Slammer Worm" Moore, Paxson, Savage, Shannon, Staniford, and Weaver "How to 0wn the Internet in Your
CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004
CSE331: Introduction to Networks and Security Lecture 32 Fall 2004 Hackers / Intruders External attacks Typical hacker Exploits carried out remotely Does not have an account on the remote machine Insider
Mac OS X Server Migration Guide
Mac OS X Server Migration Guide Includes detailed instructions for upgrading to Mac OS X Server from AppleShare IP, Macintosh Manager, and Mac OS X Server 1.2 K Apple Computer, Inc. 2001 Apple Computer,
Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing. Installation Section
Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing Installation Section Purpose: We are setting up a server in ASU s specific environment. Power on the Server Insert the CD Hold
Sophos Endpoint Security and Control Help
Sophos Endpoint Security and Control Help Product version: 10.3 Document date: June 2014 Contents 1 About Sophos Endpoint Security and Control...3 2 About the Home page...4 3 Sophos groups...5 4 Sophos
View CPU, Memory, Disk, and Network Usage in Activity Monitor.
Identify and quit applications that have become nonresponsive. Identify support options customized for your Mac. View CPU, Memory, Disk, and Network Usage in Activity Monitor. 98_9780789753939_ch5online.indd
Nikolay Zaynelov Annual LUG-БГ Meeting 2015. nikolay.zaynelov.com [email protected]
Nikolay Zaynelov Annual LUG-БГ Meeting 2015 nikolay.zaynelov.com [email protected] Introduction What is WordPress WordPress is a free and open source content management system (CMS). It is the most
TUXERA NTFS for Mac USER GUIDE 2/13. Index
2/13 Index 1. Introduction to Tuxera NTFS for Mac... 3 1.1 What is a file system driver?... 3 1.2 How does it work?... 3 2. Installation... 5 2.1 Installing Tuxera NTFS for Mac... 5 2.2 Uninstalling Tuxera
Discovering Mac OS X Weaknesses and Fixing Them with the New Bastille OS X Port
Discovering Mac OS X Weaknesses and Fixing Them with the New Bastille OS X Port Jay Beale Slides v1.0 updated at www.bastille-linux.org/dc14.pdf Looking at OS X Security We ll introduce Bastille soon,
USM IT Security Council Guide for Security Event Logging. Version 1.1
USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate
Eugene Tsyrklevich. Ozone HIPS: Unbreakable Windows
Eugene Tsyrklevich Eugene Tsyrklevich has an extensive security background ranging from designing and implementing Host Intrusion Prevention Systems to training people in research, corporate, and military
Mac OS X Security Framework
Mac OS X Security Framework Leon Towns-von Stauber, Occam's Razor Seattle SAGE Group, February 2004 http://www.occam.com/osx/ X Contents Opening Remarks...3 Overview...5 Daemons...8 Authorization Services...12
Online Backup Client User Manual Mac OS
Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC
Online Backup Client User Manual Mac OS
Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC
Sophos Anti-Virus for Mac OS X Help
Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X version 10.4 or later Product version: 8 Document date: April 2012 Contents 1 About Sophos Anti-Virus...3 2 Scanning
McAfee Vulnerability Manager 7.0.2
McAfee Vulnerability Manager 7.0.2 The McAfee Vulnerability Manager 7.0.2 quarterly release adds features to the product without having to wait for the next major release. This technical note contains
Table of Contents. Cisco Cisco VPN Client FAQ
Table of Contents Cisco VPN Client FAQ...1 Questions...1 Introduction...2 Q. Why does the VPN Client disconnect after 30 minutes? Can I extend this time period?...2 Q. I upgraded to Mac OS X 10.3 (known
CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.
CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net
User's Manual. Intego Remote Management Console User's Manual Page 1
User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
Top 10 Database. Misconfigurations. [email protected]
Top 10 Database Vulnerabilities and Misconfigurations Mark Trinidad [email protected] Some Newsworthy Breaches From 2011 2 In 2012.. Hackers carry 2011 momentum in 2012 Data theft, hacktivism, espionage
Optional Mainserver Setup Instructions for OS X Support
Optional Mainserver Setup Instructions for OS X Support Essentials Friday, November 2, 2012 Summary Some of the exercises in Apple Pro Training Series: OS X Support Essentials require access to a specially
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security
Smartphones and their applications have become an integral part of information society Security and privacy protection technology is an enabler for innovative business models Recent research on mobile
A SECURITY COMPARISON OF OPEN-SOURCE AND CLOSED- SOURCE OPERATING SYSTEMS
A SECURITY COMPARISON OF OPEN-SOURCE AND CLOSED- SOURCE OPERATING SYSTEMS Kishen Iyengar Dept. of Information Systems and Operations Management, University of Texas at Arlington, Box 19437 University of
Worms, Trojan Horses and Root Kits
Worms, Trojan Horses and Root Kits Worms A worm is a type of Virus that is capable of spreading and replicating itself autonomously over the internet. Famous Worms Morris Internet worm (1988) Currently:
Shellshock Security Patch for X86
Shellshock Security Patch for X86 Guide for Using the FFPS Update Manager October 2014 Version 1.0. Page 1 Page 2 This page is intentionally blank Table of Contents 1.0 OVERVIEW - SHELLSHOCK/BASH SHELL
OS Security. Malware (Part 2) & Intrusion Detection and Prevention. Radboud University Nijmegen, The Netherlands. Winter 2015/2016
OS Security Malware (Part 2) & Intrusion Detection and Prevention Radboud University Nijmegen, The Netherlands Winter 2015/2016 A short recap Different categories of malware: Virus (self-reproducing, needs
How To Fix A Snare Server On A Linux Server On An Ubuntu 4.5.2 (Amd64) (Amd86) (For Ubuntu) (Orchestra) (Uniden) (Powerpoint) (Networking
Snare System Version 6.3.5 Release Notes is pleased to announce the release of Snare Server Version 6.3.5. Snare Server Version 6.3.5 Bug Fixes: The Agent configuration retrieval functionality within the
Enterprise Apple Xserve Wiki and Blog using Active Directory. Table Of Contents. Prerequisites 1. Introduction 1
Table Of Contents Prerequisites 1 Introduction 1 Making the Xserve an Open Directory Master 2 Binding the Xserve to Active Directory 3 Creating a Certificate 3 Setting up Apache Web Server 4 Applying the
Oracle Security on Windows
Introduction - commercial slide. UKOUG Windows SIG, September 25 th 2007 Oracle Security on Windows By Pete Finnigan Written Friday, 07 September 2007 Founded February 2003 CEO Pete Finnigan Clients UK,
Undercover. User Guide
Undercover User Guide Contents 1. Installing and Registering Undercover 1 Undercover requirements Setting up Undercover 2. Setting up your Mac 2 Creating a dummy account Privacy Settings Setting up the
Linux Security Ideas and Tips
Linux Security Ideas and Tips Hugh Brown Sr. Systems Administrator ITS Enterprise Infrastructure University of Iowa October 8, 2014 Hugh Brown (University of Iowa) Linux Security Ideas and Tips October
Sophos Anti-Virus for Mac OS X Help. For networked and single computers running Mac OS X version 10.4 or later
Sophos Anti-Virus for Mac OS X Help For networked and single computers running Mac OS X version 10.4 or later Product version: 7 Document date: October 2009 Contents 1 About Sophos Anti-Virus...3 2 On-access
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
An overwhelming majority of IaaS clouds leverage virtualization for their foundation.
1 2 3 An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 4 With the use of virtualization comes the use of a hypervisor. Normally, the hypervisor simply provisions resources
by New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document
Avitage IT Infrastructure Security Document The purpose of this document is to detail the IT infrastructure security policies that are in place for the software and services that are hosted by Avitage.
ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
Compromise-as-a-Service
ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg 3/31/14 Compromise-as-a-Service Our PleAZURE Felix Wilhelm & Matthias Luft {fwilhelm, mluft}@ernw.de ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg Agenda
The current version installed on your server is 2.6.32-431.5.1.el6.x86_64 and it's the latest available.
IP : nnn.nnn.nnn.n 173.255.141.4 Hostname : example.domain.com webserver.theewfinc.org OS : CentOS release 6.6 (Final) The following is a report on the security and performance of your server. It includes
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis
