SSH flaw could still cause problems

May 18, 2009 – 7:18 PM

A highly dangerous SSH flaw discovered a few months ago could still cause your organisation headaches, according to security experts.

The vulnerability was first made public when it emerged last November that researchers at Royal Holloway’s Information Security Group had found the flaw, which could allow hackers access to sensntive data.

SSH, or the Secure Shell Protocol, was designed to provide a secure channel between networked devices by encrypting data and is widely used by system administrators to allow them to securely access remote systems and to transfer sensitive data across the internet, according to the ISG.

The team duly discovered a basic design flaw which opens up the possibility of limited plaintext recovery attacks against SSH.

Although the attack is difficult to achieve, it is a very dangerous flaw given the fact that SSH is meant to be bullet-proof, and because of what it is meant to protect.

Source:
http://www.security-watchdog.co.uk/2009/05/ssh-flaw-could.html

Samurai Web Testing Framework 0.6 Released

May 18, 2009 – 4:57 AM

The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on testing and attacking websites. In developing this environment, we have based our tool selection on the tools we use in our security practice. We have included the tools used in all four steps of a web pen-test.

Starting with reconnaissance, we have included tools such as the Fierce domain scanner and Maltego. For mapping, we have included tools such WebScarab and ratproxy. We then chose tools for discovery. These would include w3af and burp. For exploitation, the final stage, we included BeEF, AJAXShell and much more. This CD also includes a pre-configured wiki, set up to be the central information store during your pen-test.

Download:
http://sourceforge.net/project/showfiles.php?group_id=235785

Home:
http://samurai.inguardians.com/

Most Malware Hosted On Trusted Sites

May 12, 2009 – 8:10 PM

Symantec’s MessageLabs says the assumption most web-based malware originates from recently created, temporary, trashy adult sites is becoming an old-fashioned notion. Modern hackers are focusing on well-established, trusted websites they can compromise-sites users trust every day of the week.

According to data collected last week, 84.6 percent of website domains blocked by security programs for hosting malicious content were over a year old. Only 15.4 percent were less than a year old, 10.2 percent less than a month, and 3.1 percent less than a week.

“It is highly likely that older sites are legitimate sites, while those that are only a week old or less are likely to be temporary sites set up with the sole purpose of distributing malware,” said MessageLabs senior analyst Paul Wood. “People need to be extra vigilant and understand that even sites they know and trust can be compromised through attacks such as SQL injection attacks.”

Or cross-site scripting (XSS) for that matter. The most recent and frightening examples come from Google and even security company McAfee.

Source:
http://www.securitypronews.com/insiderreports/insider/spn-49-20090512MostMalwareHostedOnTrustedSites.html

Mathematical advances strengthen IT security

May 12, 2009 – 12:34 PM

Rapidly rising cyber crime and the growing prospect of the Internet being used as a medium for terrorist attacks pose a major challenge for IT security. Cryptography is central to this challenge, since it underpins privacy, confidentiality, and identity, which together provide the fabric for e-commerce and secure communications. Cryptography since the beginning of the Internet has been based extensively on the RSA public key system, used for digital signatures and the exchange of private keys that in turn encrypt message content. The RSA cryptosystem, introduced by Rivest, Shamir, and Adlement in 1977, relies for its security on the difficulty of working out the factors dividing large integers (whole numbers). RSA has performed well until now, but the level of protection it provides has been eroded by constant efforts to develop more efficient methods for breaking it.

However a different approach based on the mathematical theory of elliptic curves has emerged as a leading candidate for more efficient cryptography capable of providing the optimum combination of security and processing efficiency. Elliptic curves* are equations with two variables, say x and y, including terms where both x and y are raised to powers of two or more. The theory of elliptic curves played an important role in the solution of the famous problem, Fermat’s Last Theorem, in the early 1990s, and also ironically has been exploited for attacks on RSA cryptography.

The potential for elliptic curves and other modern techniques of mathematics were discussed at a recent workshop organised by the European Science Foundation (ESF), which set the stage for development of a programme of European-wide research on the field.

“The impact of the elliptic curve method for integer factorisation (developed by my PhD advisor Hendrik Lenstra) has played a role in introducing elliptic curves to cryptographers, albeit for attacking the underlying problem on which RSA is based (the difficulty of factoring integers),” said David Kohel, convenor of the ESF workshop, from the Institut de Mathematiques de Luminy in Marseille, France.

Indeed it so happened that elliptic curves started to be applied to both number factorisation and cryptography at about the same time, in the late 1980s. At first the application to factorisation advanced much more quickly, while the technical difficulty involved held back elliptic curve cryptography. But the very success of elliptic curve factorisation started to undermine the security of RSA, since this relies on the difficulty of factorising the product of two prime numbers. This in turn has stimulated development of elliptic curve cryptography in more recent years, said Kohel. So having first undermined the prevailing RSA method of cryptography, the sophisticated mathematics of elliptic curves has itself come to the rescue.

As Kohel noted, the advantage of elliptic curve cryptography lies in its immunity to the specialised attacks that have eroded the strength of RSA, with the result that smaller keys can be used to provide a given level of protection. “The size of the parameters (essentially the key size) for elliptic curve cryptography (ECC) needed to ensure security (under our current state of understanding) is much lower for ECC than for RSA or ElGamal (another alternative cryptographic method,” said Kohel. Indeed keys 160 bits long provide ECC with the same level of security as 1024 bit keys for RSA.

Source:
http://www.eurekalert.org/pub_releases/2009-05/esf-mas051109.php

D-Link adds CAPTCHA anti-trojan security to routers

May 12, 2009 – 5:26 AM

D-Link have announced new CAPTCHA security for selected models in their router range, promising more resilience against DNS-altering malware and spyware. The new firmware – which is also available to upgrade on existing models – adds the familiar distorted letters and numbers to common router settings pages.

By changing the DNS settings in a home or office router, users’ traffic can be diverted through a security-impaired network where login, credit card and internet banking details are harvested. Even if the router is password protected, entering that password from a malware-infected PC can then give the trojan access; the CAPTCHA prevents that.

D-Link router models that now feature CAPTCHA include the DIR-615, DIR-625, DIR-628, DIR-655, DIR-825, DIR-855, DIR-685 and DGL-4500. The updated firmware is available at support.dlink.com.

Source:
http://www.slashgear.com/d-link-add-captcha-anti-trojan-security-to-routers-1243531/