Good Practice Guide on Vulnerability Disclosure from Challenges to Recommendations
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Reducing the Window of Exposure
Surviving 0-days reducing the window of exposure Andreas Lindh, VB2013 About me • Security analyst/architect • Used to work for Volvo IT • Defender by profession • @addelindh on Twitter So what’s this about? • Software vulnerabilities, exploits and the current defense model • A suggested way of improving that model Defense Legacy implementation • Perimeter protection • Access controls • System hardening • Antivirus Evolution • All the legacy and more: – SIEM – DLP – Application firewalls – Etc. • Basically, more tools Client-side attacks Got protection? What does this mean? • The perimeter changed • Our defenses didn’t • Antivirus to the rescue? The New York Times hack So how did we get here? • Human nature – Easier to buy tools than to work hard – Bad prioritization • Defense isn't sexy "Put another way, n people want to fix security holes, 10n people want to exploit security holes, and 100000n want Tetris.” (Dan Kaminsky) But we patch, right? Well, sort of but... • We do it slowly • Sometimes we can’t patch – Legacy systems – 3rd party systems HD Moore’s law What about 0-days? The Microsoft report This can’t be good... • 46% of Remote Code Execution vulnerabilities exploited before patch available in 2012 Source: Software Vulnerability Exploitation Trends ...and remember this? • Dec 2012 – Jan 2013 • The watering hole attack Wait a minute, wasn’t this supposed to be a talk about flashy 0-day defense? There is no flashy fix. Priorities, priorities Back to basics • Get re-acquainted with our environments • Start using the tools we already have • Focus on what matters Hardening • Usually only done high level • Not that effective anymore • Why don’t we do it to software? Learning from history • Where? • What? • Exploitability? • Protection? Software hardening • Exploit mitigation – ASLR, DEP, EMET, etc. -
ATTACKING RDP How to Eavesdrop on Poorly Secured RDP Connections
IT SECURITY KNOW-HOW Adrian Vollmer ATTACKING RDP How to Eavesdrop on Poorly Secured RDP Connections March 2017 © SySS GmbH, March 2017 Wohlboldstraße 8, 72072 Tübingen, Germany +49 (0)7071 - 40 78 56-0 [email protected] www.syss.de Vollmer | Attacking RDP 1 Introduction The Remote Desktop Protocol (RDP) is used by system administrators everyday to log onto remote Windows machines. Perhaps most commonly, it is used to perform administrative tasks on critical servers such as the domain controller with highly privileged accounts, whose credentials are transmitted via RDP. It is thus vital to use a secure RDP configuration. We at SySS regularly observe that due to misconfigurations, system administrators in an Active Directory environment are routinely presented with (and ignore) certificate warnings like this: Figure 1: An SSL certificate warning If warnings like these are a common occurrence in your environment, you will not be able to recognize a real man-in-the-middle (MitM) attack. This article was written to raise awareness of how important it is to take certificate warnings seriously and how to securely configure your Windows landscape. The intended audience is system administrators, penetration testers and security enthusiasts. While not necessary, it is recommended that you have a firm understanding of the following subjects: – Public key cryptography as well as symmetric cryptography (RSA and RC4) – SSL – x509 certificates – TCP 2 Vollmer | Attacking RDP – Python – Hexadecimal numbers and binary code We will demonstrate how a MitM can sniff your credentials if you aren’t careful. None of this is particularly new – it even has been done before, for example by Cain [2]. -
The Future Computer the Future Computer
Anyone MICROSOFT TECHNOLOGY who knows DEPLOYMENT ISSUE 6 OCTOBER 2003 this much TECHNOLOGY about our software .NET: CHANGING THE FACE OF DEVELOPING is probably SQL SERVER: WAITING FOR YUKON TERMINAL SERVICES: certifiable. AT YOUR FINGERTIPS The Affinity Homes Group chose Phoenix Software, a Microsoft Certified Partner, to migrate 250 users and their 20 servers to It takes a special company to be a Microsoft Gold Certified Open here Windows 2000, Microsoft Exchange 5.5 and Partner, one that’s demonstrated an exceptional level of You naturally want your IT service provider to have proven Microsoft Exchange 2000 Server. Richard Swift, specialist expertise in a particular Microsoft solution. And expertise across the full range of Microsoft products for the ultimate Head of Information Systems at Affinity you will reap the rewards for all their hard work, as you get commented: “We had been working with and solutions. Every Microsoft Certified Partner has met the assurance of the highest possible levels of service. Microsoft resource guide Phoenix for a number of years and they are a rigorous technical criteria set by Microsoft, so you can be THETHE FUTUREFUTURE Whatever challenges you’re facing, a Microsoft Gold Certified Microsoft Certified Partner, that gave us the confident that they can give you the high level of service Partner is perfectly qualified to make your IT systems for IT Professionals and added comfort of knowing that they had the you expect, together with trustworthy, independent advice. Developers right level of expertise that we were looking for”. workFor moreharder details, for you. visit Visit www.microsoft.com/uk/certified www.microsoft.com/uk/certified COMPUTERCOMPUTER PUSHINGPUSHING THETHE BOUNDARIESBOUNDARIES ATAT < ©Microsoft©Microsoft Corporation. -
Download Deploying Windows 7, Essential Guidance
FROM THE Windows® 7 Resource Kit Mitch Tulloch, Tony Northrup, Jerry Honeycutt, Ed Wilson, and the Windows 7 Team at Microsoft I Chapter 3 Deployment Platform .............................................. 85 I Chapter 4 Planning Deployment ............................................ 113 I Chapter 5 Testing Application Compatability ........................... 139 I Chapter 6 Developing Disk Images ......................................... 179 I Chapter 7 Migrating User State Data ...................................... 223 I Chapter 8 Deploying Applications .......................................... 247 I Chapter 9 Preparing Windows PE ........................................... 273 I Chapter 10 Confi guring Windows Deployment Services .............. 293 I Chapter 11 Using Volume Activation ........................................ 335 I Chapter 12 Deploying with Microsoft Deployment Toolkit ........... 355 DEPLOYING WINDOWS 7 83 Chapter 3 Deployment Platform n Tools Introduction 85 n Windows 7 Deployment Terminology 87 n Platform Components 89 n Deployment Scenarios 99 n Understanding Setup 101 n Basic Deployment Process 105 n Microsoft Deployment Toolkit Process 107 n Summary 110 n Additional Resources 111 uilding on technology that the Windows Vista operating system introduced, Windows 7 Bdeployment technology has evolved significantly since Windows XP Professional . For example, it supports file-based disk imaging to make high-volume deployments quicker, more efficient, and more cost effective . The Windows 7 operating system also provides -
Spring 2009 Edition of Genesis V Alumni Magazine
theGenesis alumni magazine of saint ignatius college preparatory Vspring 2009 1 Joe Boswell ’02 and Kate Brandt ’03, who both work in the Obama Administration, are pictured here in the historic Indian Treaty Room in the Eisenhower Office Building with the White House in the background. Read about them on pages 35 and 38. AttleePhotography.com. genesis v A Report to Concerned Individuals Vol. 46, No. 1 Spring 2009 Administration Rev. Robert T. Walsh, S.J. President Mr. Joseph A. Vollert Vice President for Development Mr. Patrick Ruff Principal Rev. Thomas H. O’Neill, S.J. Superior Mr. John J. Ring Director of Alumni Relations Ms. Marielle A. Murphy Associate Director of Development Mrs. Cynthia Fitzgibbon Director of Special Events Mr. Fred L. Tocchini Director of Special Projects Mr. John J. Grealish Business Manager Editorial Staff Mr. Paul J. Totah Editor Arthur Cecchin Sports Editor Nancy Barisic Layout & Design Douglas A. Salin Photo Editor GENESIS V (USPS 899-060) is published quarterly by St. Ignatius College Preparatory, 2001 37th Avenue, San Francisco, CA 94116-9981. Periodicals Postage Paid at San Francisco, CA, and at additional mailing offices. POSTMASTER: Send address changes to GENE SIS V, 2001 37th Avenue, San Francisco, CA 94116-9981. CONTACT US: You can send e-mail to [email protected] or reach us at (415) 731-7500 ext. 206. You can also read the issue on our web site at www.siprep.org/genesis. ST. IGNATIUS, mindful of its mission to be witness to the love of Christ for all, admits students of any race, color and national and/or ethnic origin to all the rights, privileges, programs and activities generally accorded to or made available to students at this school. -
Computer Security
CSE 40567 / 60567: Computer Security Network Security 1 !1 Homework #5 is due tonight at 11:59PM (your timezone) See Assignments Page on the course website for details !2 Live Tuesday in Class RC Johnson (PayPal) (Will not be recorded) !3 Course Roadmap Basics The Web (weeks 1 & 2) (weeks 15 & 16) 3 Core Areas (weeks 3 - 6) (weeks 6 - 10) (weeks 11 - 15) !4 Heartbleed What is it? Serious input validation vulnerability in OpenSSL Bug introduced: OpenSSL version 1.0.1 on March 14, 2012 Bug disclosed: April 7th, 2014 Protocol affected: TLS • Successor to SSL • Meant to secure network traffic from eavesdropping attacks • Good example of security software making things less secure http://heartbleed.com/ !5 Heartbleed bug explained A depiction of Heartbleed BY-SA 3.0 FenixFeather !6 The bug in OpenSSL p is a pointer to start of message /* Read type and payload length first */ hbtype = *p++; No bounds checking to enforce n2s(p, payload); consistency between pl = p; payload_length and the actual payload The fix: hbtype = *p++; n2s(p, payload); if (1 + 2 + payload + 16 > s->s3->rrec.length) return 0; /* silently discard per RFC 6520 sec. 4 */ pl = p; !7 Scope of the vulnerability 700 525 350 175 0 8 April, 2014, 4PM UTC 9 April, 2014, 7:30AM UTC 10 April, 2014, 12:30AM UTC Vulnerable Websites Among the Top 10,000 Among the Top Websites Vulnerable !8 Response from the community "OpenSSL is not developed by a responsible team." - Theo de Raadt Large mistake: OpenSSL developers wrote their own memory management routines, circumventing library protections -
IT Academy Program Benefits
IT Academy Program Benefits What Membership Offers IT Academy membership offers many valuable benefits. You can: • Increase your students’ employability with relevant technology courses that help them get jobs after graduation. • Offer educators and other staff members the opportunity to enhance their own professional development. • Gain access to resources that will help you save time and money. • Unlimited access to E-Learning portfolio courses focused on the Microsoft Office applications plus Windows desktop courses, Windows Server, Windows Client, SQL Server, Visual Studio, and many other Microsoft technologies. • The ability to administer content and manage your students’ progress with the online Instructor Learning Management System. • Essential computer skills training with Microsoft Digital Literacy. • One complimentary enrollment in the Microsoft Certified Trainer program for a qualified educator at your institution and a 25 percent discount on enrollments for any additional instructors. • A 60 percent discount on the Full E-Reference Library, which is a collection of E-Reference Libraries for Microsoft Press. • Academic pricing on Microsoft Official Academic Courses (MOAC). • Academic pricing on Microsoft Official Courseware (MOC). • Academic pricing on Microsoft Certification exams. • Up to 100 lab licenses for Windows 7, Microsoft Office Professional 2007, or Microsoft Office Professional Academic 2010. • Five complimentary annual subscriptions to the Full E-Reference Library from Microsoft Press and a 60 percent discount for additional subscriptions. • One complimentary subscription to Microsoft DreamSpark. • One complimentary, Not for Resale (NFR) version of Microsoft TechNet Subscription Professional. Lea • Educator resources such as downloadable and customizable lesson plans to help you save class preparation time, personalized course completion certificates, and a complementary tool that enables you to create your own online courses. -
Tapani Havia
Tapani Havia Microsoft Windows Server 2012 Centrally Managed Basic Services for Microsoft Windows 8 Clients Helsinki Metropolia University of Applied Sciences Bachelor of Engineering Information Technology Bachelor’s Thesis 14th May 2013 PREFACE This Bachelor’s Thesis is the outcome of my professional knowledge of the Microsoft Windows Server 2012 centrally managed basic services. I wish to thank my instructors Kari Järvi and Jonita Martelius for their invaluable help and support while writing the study. Last but not least I wish to thank my wife Mia Havia for her endless patience while writing the study. Espoo, May 14, 2013 Tapani Havia Abstract Author(s) Tapani Havia Title Microsoft Windows Server 2012 Number of Pages 153 pages + 10 appendices Date 14th May 2013 Degree Bachelor of Engineering Degree Program Information Technology Specialization option Data Networks Instructor(s) Kari Järvi, Principal Lecturer Microsoft published the latest operating system versions; Windows Server 2012 and Windows 8 last autumn. It was the correct time to create a test environment and test how basic services and their centralized remote management could be done nowadays. The purpose was to come up with as versatile an environment as possible which any person interested in the topic could do and continue to the desired direction. The initial plan was to create the test environment in one computer virtually. The environment was done with redundancy of basic services without Network Load Balancing or Failover Clustering features. Finally, the environment within the framework of the study included 11 virtual servers and three virtual workstations. For the host computer’s operating system was chosen the Windows Server 2012 Datacenter edition and the needed hypervisor software was chosen between Microsoft Hyper-V and VMware Workstation 9, the environment was done with VMware. -
Configuring Microsoft Sharepoint Hybrid Capabilities
Configuring Microsoft SharePoint Hybrid Capabilities Jeremy Taylor, Neil Hodgkinson, and Manas Biswas Forewords by Jeff Teper, Corporate Vice President, Microsoft OneDrive and SharePoint and Seshadri Mani, Principal Program Manager, Microsoft Offi ce 365 OneDrive and SharePoint PUBLISHED BY Microsoft Press A division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2016 by Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. ISBN: 978-1-5093-0243-7 Microsoft Press books are available through booksellers and distributors worldwide. If you need support related to this book, email Microsoft Press Support at [email protected]. Please tell us what you think of this book at http://aka.ms/tellpress. This book is provided “as-is” and expresses the author’s views and opinions. The views, opinions and information expressed in this book, including URL and other Internet website references, may change without notice. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. Microsoft and the trademarks listed at http://www.microsoft.com on the “Trademarks” webpage are trademarks of the Microsoft group of companies. All other marks are property of their respective owners. Acquisitions and Developmental Editor: Rosemary Caperton Editorial Production: Dianne Russell, Octal Publishing, Inc. Copyeditor: Bob Russell, Octal Publishing, Inc. Technical Reviewers: Jeremy Taylor, Neil Hodgkinson, and Manas Biswas; Technical Review services provided by Content Master, a member of CM Group, Ltd. -
8.2.03 Release Guide
WebFOCUS Release Guide Release 8.2 Version 03 March 06, 2019 Active Technologies, EDA, EDA/SQL, FIDEL, FOCUS, Information Builders, the Information Builders logo, iWay, iWay Software, Parlay, PC/FOCUS, RStat, Table Talk, Web390, WebFOCUS, WebFOCUS Active Technologies, and WebFOCUS Magnify are registered trademarks, and DataMigrator and Hyperstage are trademarks of Information Builders, Inc. Adobe, the Adobe logo, Acrobat, Adobe Reader, Flash, Adobe Flash Builder, Flex, and PostScript are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Due to the nature of this material, this document refers to numerous hardware and software products by their trademarks. In most, if not all cases, these designations are claimed as trademarks or registered trademarks by their respective companies. It is not this publisher's intent to use any of these names generically. The reader is therefore cautioned to investigate all claimed trademark rights before using any of these names other than to refer to the product described. Copyright © 2018, by Information Builders, Inc. and iWay Software. All rights reserved. Patent Pending. This manual, or parts thereof, may not be reproduced in any form without the written permission of Information Builders, Inc. Contents 1. WebFOCUS Release Information ................................................5 Functionality ......................................................................... 5 Browser Information ...................................................................6 -
The Bad-Attitude Guide to Computer Security
The Bad-Attitude Guide to Computer Security Keith Winstein Stanford University https://cs.stanford.edu/~keithw Bad (-attitude?) advice 1. 2. 3. 4. 5. 6. 7. 8. Bad (-attitude?) advice 1. Do build your own cryptographic protocol. 2. 3. 4. 5. 6. 7. 8. Mosh (mobile shell) Mosh deployment I Impetus: SSH for bad Wi-Fi I + intermittent connectivity I + roaming I + local echo I + security against forged RST I First release: 2012 I Today: appx. 2{20 million users Mosh protocol I Every datagram wrapped with AES-OCB I Every datagram represents idempotent operation I No TLS, no DTLS, no public-key crypto I No timestamps, no replay cache, no daemon I No cipher negotiation, no file IO, no root I Roaming: server replies to source address of highest-numbered authentic incoming datagram Hacker News \One man band by the looks of it. Implements its own private crypto protocol (has it been vetted for replay attacks? padding attacks? [insert 20 years of perplexing bugs confounding the greatest minds in computer science]?)" Slashdot \Welcome to Yet Another Protocol Devised By Academics Who Have Not Been Near a Real Network in Twenty Years, If Ever." Twitter Dan Kaminsky: \Mosh being outside of SSH Transport makes academic perf code unauthenticated. Love MoSH, would love it much more if it operated inside SSH's channel" Q: \any particular reason? Since quick recovery from packetloss is one of its main goals, UDP+OCB is needed." Kaminsky: \It's *tricky* to build new secure channels. Look at DTLS's long and painful dev cycle." Twitter (cont.) Moxie Marlinspike: \I dunno, from a semantic sec perspective, it'd be hard to do worse than SSH. -
Deployment Guide | Microsoft Office 365 for Citrix Xenapp and Xendesktop 7.X
Deployment Guide | Microsoft Office 365 for Citrix XenApp and XenDesktop 7.x Microsoft Office 365 for Citrix XenApp and XenDesktop 7.x Microsoft Office 365 ProPlus is a bundled These challenges are relevant for most software plus subscription-based offering organizations. focused on user productivity-based applications. Office 365 ProPlus includes a Historically, Microsoft Office is one of the combination of online-based applications most common applications delivered via that are accessed from anywhere via a web Citrix XenApp, due to its ability to provide browser, in addition to the latest traditional, the user with the latest version of Office with locally installed version of Microsoft Office. the best user experience for a wide range of Included with Office 365 ProPlus is an online use cases. With Office 365 ProPlus, the value email account that has 50 GB of mail storage of Citrix XenApp has not changed. To deliver and 1 TB of file storage per user licensed for Office 365 to users properly, we provide the OneDrive for Business. following recommendations to enable an optimized user experience while minimizing the potential impact to the underlying Office 365 is a great solution for any infrastructure. organization, but due to user, application and business requirements, there is often Outlook a requirement for a locally installed version of the Office applications in addition to the As part of an Office 365 implementation with online versions. Typically, organizations Citrix XenApp or XenDesktop, organizations require the locally installed versions for the can use Exchange Online instead of managing following reasons: and maintaining Exchange servers installed on-premises.