* Posts by koolholio

257 publicly visible posts • joined 3 Mar 2010

Page:

Twitter breach leaks emails, passwords of 250,000 users

koolholio
FAIL

Re: the java angle....

But some javascript methods can trigger a native java context within particular browsers / configurations.

Or havent you discovered that with the latest revision of it?

Cloud doctors, DevOps and unconferences: Pass the Vicodin

koolholio
Angel

Devs rule, Geeks rule, Ops think they rule

The "happy as larry ecosystem"

Very much agreed --- "The fact that many developers do write awful code does not mean this is universally applicable."

Its interesting how it refers to the layers... of the OSI model? However this is different from knowing ITIL or other frameworks, which are (ab)/used commonly.

Doesnt cloud require hardware? even on a client and server side.

I guess an Operational Developer is better than a dysfunctional one though?

Fundamentally, I'd rather leave GPs out of my comment.

First the NYT, now the Wall Street Journal: But are hacking attacks from China new?

koolholio
FAIL

Own opinion of the patterns laid in this article

Aurora and RSA I believe had links with the TDSS (TDL) rootkit? Which ironically, Russian-based Kaspersky were the first AV company to make a tool to 'fix'

Night Dragon sounds similar to stuxnet style according to a whitepaper by Mcafee?

Whilst TitanRain, ShadyRAT sound like they go hand in hand? -- Like bugware would or Kryptik (which even sounds like a little russian gimmic?)

The chinese might use honeypots in order to identify threats to their networks (Provided they have sufficient HIPS and IDS solutions) --- I guess the great firewall of china was built for this purpose, perimeter control? --- Oh wait, it was to censure the population?

Next will the Arabic nations be to blame? Since I've noticed a trend of turkish / arabic groups on Zone-H.org?

AV is only as good as the heuristics it uses, its not a fully comprehensive security package!

Either way, It'll all seem to go in circles? :-/

Apple blocks Java on the Mac over security concerns

koolholio
FAIL

Apple, ooh Apple!

How many will have upgraded or even noticed Quicktime 7.7.3 was released recently! New Apple TV and iOS revisions? with all this finger pointing at Java and Flash, since Apple kits are supposedly 'exempt' from vulnerability? --- the common fanboi attitude -- perhaps even a misconception?

At least Apple are trying to take a proactive approach! I'll give them kudos for that! But not for the prior TIFF bugs!

Although, He who throw stones in glass houses be a little silly? Since no company could ever be perfect and it is unrealistic to believe so. Issac Newtons law of gravity isn't it? Or is it Murphy's law?

'Silent but deadly' Java security update breaks legacy apps - dev

koolholio
FAIL

JavaFX has been Integrated

Bad uninstall procedures if you ask me, given older versions of JavaFX is listed separately under the installer id's

Since they incorporated java FX updates within the JRE now!

Report: DDoS attacks now MORE ANGRY, complex and targeted

koolholio
Holmes

Only just figured this out?

Web services are usually easy targets, since theres the issue of 'upgrading the platform' but 'forgetting' to upgrade the code running through the platform to suit, so they rarely do either usually, unless its break-fixing, mainly due to service level agreements.

I severely doubt application layer/multi vectors or spoofing or poisoning attacks are any "new" tactic, but it would make, theoretically, logical sense to get the maximum bang for your buck in the "criminal underworld"?

DNS specs have changed considerably in the last 10 years and the invention of IPv6, this is why some networks have modified their servers for their clients 'stupidity' without knowing/measuring the full extent of their changes.

Java open-source frameworks 'pose risk' to biz - report

koolholio
FAIL

If they contain the following in any java applet:

AverageRangeStatisticImpl its got an RCE.

Method Handle its got an RCE.

Thats not a misconfiguration, thats a 'security risk by code'. *applauds this so-called revolution*

Help us out here: What's the POINT of Microsoft Office 2013?

koolholio

Re: Ah, sequels... ‘Transformers of the Caribbean’ anyone?

creation of .docx files?

A few improvements security wise?

Speaking in Tech: 'ARM makes enterprise chips? Over my dead body!'

koolholio
Joke

Fish and chips is an english delicacy! Do I smell something sizzling?

Oracle 'fesses up: Java security flaws more than storm in teacup

koolholio
Facepalm

Re: On my wishlist then...

JRE is Java Runtime Environment (the interpretter), which can run on a number of devices, most commonly phones .e.g. JAR files, possibly even COD/ALX coded files? Just as SQLite appears to be a standard these days for phone databases?

Servers would, presumably, require the JRE in order to serve it to a client? :-/

koolholio
FAIL

how many servers require JRE installed...

http://msisac.cisecurity.org/advisories/2013/2013-008.cfm

Fujitsu reveals data transfer protocol 30 times faster than TCP

koolholio
Joke

They missed out on the handshake?

I'll go buy a milkshake instead, thats as secure as UDP is gonna get without handshaking!

UPnP scan shows 50 million network devices open to packet attack

koolholio

Re: There are other solutions

I could think of some instances where upnp may be required, for instance two users within the same address space require using ports between the ranges of such and such for a certain amount of time.

What I believe this to mainly focus upon is explicitly external-facing devices. (which at least takes the remote out of the equation, but not neccessarily the local)

A good network admin should monitor and have something in place for this kind of unusual activity anyway! UPnP, and later variants: SSDP and HNAP/SOAP has been around long enough?

Big biz, expensive beancounters write UK tax law, says senior MP

koolholio
IT Angle

Technically

Wheres the IT company/angle in this?

Could an IT company do the same?

DNS Poisoning?

koolholio
WTF?

Re: DNS Poisoning?

expires on 22-Sep-2022.

created on 23-Sep-1991.

koolholio

also you could try visiting either:

http://62.213.111.201/

http://62.213.111.202/

If using the IP doesnt work, its a routing issue to resolve that peer or a firewall issue etc.

koolholio

Its known as Peering issues

the Root AS nodes can sometimes drop routes between one another for various reasons e.g. maintenance ... it can also be a web cache issue, or a dns resolution issue between A and C with B being any node inbetween.

Try running (on the 'affected' machine) a traceroute to find the peer where it stops at, or an nslookup

If it returns a server failure on nslookup, the DNS server you are asking cannot request it (so check your machines DNS configuration and change it manually to the IP's of the dns servers you wish to query?)

DNS cache poisioning is usually where it redirects to a separate website, usually for malware.

Hackers squeeze through DVR hole, break into CCTV cameras

koolholio
Thumb Up

Re: That's my problem with UPnP port forwarding

You mean a bit like HNAP ? *hic hic*

koolholio
WTF?

Re: Thanks

Depending upon NAT routing and DNS Daemon type (relays/proxies for instance), depends on whether it resolves the DNS resolution internally or externally

Externally, this may not be possible? Else you may need to manually configure the config from the router (in Wordpad, since some formats are incompatible with notepad editing)

Anons hack Asteroids into US DoJ website in Swartz death protest

koolholio
FAIL

Re: a game where the only winning move was not to play.

Classic! Agreeable,,,

"1.3GB encrypted file titled Warhead-US-DOJ-LEA-2013.AES256"

1.3GB x [DOJ / AES256(4seeds)] = Easy and quick for petaflops? (when given some thought)

The anomaly is... DoJ and Warhead don't usually fit, so thus DoD is irrelevant and speculative.

Though, I dont think they'd even be bothered with that route, they'd be more likely to catch 'em and demand the keys, else lock 'em up for longer! Somebody will cough up! >_<

Swartz prosecutor: We only pushed for 'six months' in the cooler

koolholio
FAIL

Just some facts and food for thought...

Whilst we're all still alive and not in prison:

The system clearly failed in its design to 'rehabilitate' offenders... Because thats what it was designed to do?

It failed to identify a 'victim' to fund the charades... that was willing to take the case further...

It failed to convict a supposed offender, unless after his suicide / death counts? ...

It failed to add in any remorse for actions directly or indirectly of politicians or of those in power...

I wonder why he wanted to 'break rules' in the first place?

Paging Dr Evil: Philips medical device control kit 'easily hacked'

koolholio
Joke

What they didnt mention was a hidden rootkit from the programming machine which fixes "the bug"

Brits' privates furtled in TWO-THIRDS of UK fraud cases

koolholio
Stop

This is why an annual credit report helps to keep the fraudsters away

time to get strict on those data losses of idiots who 'couldnt care less for the consequences of their (in)/actions' ?

Did ZDI snub your 0-day attack? Packet Storm will buy it for $7k

koolholio
Joke

TippingPoint is by no means 'inpenetrable'... you could liken it somewhat to its 'snort signatures'

Sophisticatedly simple attacks rarely get noticed or even bothered about... Whats the most damage they can cause?

Day later: Oh... that damage!

US general: Beware of Iran's Revolutionary Cyber-Guard

koolholio
Stop

Really old news

Not surprised at all...

Wonder if the UN / NATO would step in on cyber ops? Since its rediculous to begin with!

Facebook friends bash servers, storage, and racks into bits

koolholio
FAIL

ARM stands for...

"A right mess"

Features:

Slower

Higher error rate

Fancy and Convenient, yet so many 'bugs'

F*C*book is what I'm thinking --- error bits included!

Latest Java patch is not enough, warns US gov: Axe plugins NOW

koolholio
Holmes

"This will help mitigate other Java vulnerabilities that MAY be discovered in the future."

As the title reads... Just as never turning the machine on will eliminate all except for WAKE ON technologies.

Its true that... if you have no plan to use it, or need it, why is it installed... However lets be realistic... Its not half as bad as Adobe's issues given most users probably werent aware that 11.5.502.146 was released recently since code for prior versions went public... and could easily be blocked by decent AV heuristics... because it mainly targets JMX classes in java.

Now lets focus upon more pressing matters such as... nginx, IIS 8 and Apache 2.4.3 ... IE 7,8,9 and 10 connection handling overruns which result in a DoS... and can be performed remotely!

Sheffield ISP: You don't need a whole IPv4 address to yourself, right?

koolholio
Stop

6-to-4

Simple solution is there, its been made...

This solves the issue with NAT'ing which is Directly unneccessary and hardly secured. DNAT versus SNAT

Now would someone please masquerade (oops, serenade) the 6-to-4 ... http://en.wikipedia.org/wiki/6_to_4

then they could assign us all ipv6 addresses without needing to affect anybody?

koolholio
FAIL

It would prevent services that use UPNP or prefers/demands strictly open NAT based connections

.e.g. xbox, PS, mobile wifi, android

oh and would decrease security for VPN links!

*applauds some idiots idea* I take my hat off to you, but you didnt quite think this one through properly!?

koolholio
Thumb Up

Re: "odd versions are experimental"

ipv4

xxx.xxx.xxx.xxx

ipv6

xxxx:xxx:*null*:xxxx:xx:xxxx

UDP im sure was before the TCP handshake too! Along with IPX

Today's antivirus apps ARE 'worse at slaying hidden threats'

koolholio
Go

Pro-active Prevention and Planning is key!

As simple as the title reads... the 3 P's

Filters are useful, better than just a heuristics engine with signatures!

Computers are 'electronic cocaine' that make you MANIC

koolholio
FAIL

Psychologists can read the DSM-V manual, particularly Internet Addiction Disorder (IAD)...

But trick cyclists are usually the ones doing the work? ^_^

Anger grows over the death of Aaron Swartz

koolholio
Holmes

I cant say this particular feeling is different

Theres one too many in the IT world, and elsewhere trying to get their leg over just to keep up with the jones' next door.

Americans on the other hand, this is not intended to offend, but can (yes CAN) tend to be a little OTT or overly dramatic as if its a religious calling.

What I believe is needed is more compassion within industry (notice industry and not commercial!), less 'one sided or unfair competition' and to put it simply, more morals and acceptance that every man has his vice, and that this is what selfish acts (particularly by government departments) can effectively lead to.

I wonder if they trust the right people to know what they're looking for in certain areas.... Since tradgedies such as this can result from what I call the 'leg humper' syndrome, particularly since nobody is perfect.

koolholio
Thumb Up

Whilst I whole heartedly agree with that, it would need some sort of 'structure'... maybe built around a little bit of common sense?

EU floats growth plan: Aim power hose of cash at oldsters, web start-ups

koolholio
Stop

Too many chiefs, not enough indians

We didnt mean litterally grab a bunch of indians as cheap slaves...

Perhaps this is a repeat of history? Fuelled by the same thing that caused it back then? Greed?

Help a US gov't agency switch to open source, win $3 million

koolholio
Joke

All must be fully open

But must run on a valid, licensed "copy" of Windows

Ahaha you're havin' a laugh!

UK armed forces could be 'fatally compromised’ by cyber attack

koolholio
WTF?

Re: The right evidence?@Matt Bryant

The MoD has their own parliamentary liason department for that, given the armed forces are prohibited from contacting their mp's for work purposes...

so short hand: Disillusioned, self projecting, whistleblowing procedure mentioning, vengence seeking, nimwit?

koolholio
FAIL

I'll do my bit for my country

http://www.warp.gov.uk/downloads/

Turn serversignature OFF in the httpd.conf !

koolholio
Joke

Re: The right evidence?

its a bit of a b --- sod, just like what happened with the typhoons, isnt it? pun intended for comical purposes!

koolholio
FAIL

Manual of Security

JSP440 perhaps?

Ministers should have the required clearance to perusal it. List X companies should have the clearance to follow it!

koolholio
FAIL

Re: HERE WE GET RIPPED AGAIN!

Two words you need to be reminded of:

ARPAnet and A5 Crypto ....

*coughs*

Texas schoolgirl loses case over RFID tag suspension

koolholio

Re: It's bad enough were I live...

You'd possibly be tracked by nasa? LOL

koolholio
WTF?

Instead...

They drive a car with a GPS system,

They bought her a new cell phone

They gave her a panic talisman?

Is this RFID-phobia or impulsive over use of geolocationary data. I know which one the governments would like to tackle first.

Don't shoot the Windows Live Messenger, cry IM users

koolholio
FAIL

Wouldnt be too bad if the live id sign in worked half the time! LOL

Zombie BT mobile patent emerges in hands of troll

koolholio
WTF?

surely ITU specs were patented

The ITU specs which were documented most likely way before this.... which would override any trolling patents! should take precendence!

This photo slide scanner costs €60... The bundled malware? That's free

koolholio
Mushroom

Vira-catalogorically speaking

Are you sure it had the "apparent" Conficker-B infection in the DCIM.exe (backdoor.GENERIC) and Autorun (Downadup.B) files?

Given the vmx in the sys restore is infected under what appears to be a SERVICE SID... with Conficker.K variant?

Since some antiviruses have been known to report false positives, purely for certain MD5 checksums...

And the machine appears to have a newer variant? are you sure the machine isnt infected itself? or its an extremely mis-matching virus scan/signature?

'SHUT THE F**K UP!' The moment Linus Torvalds ruined a dev's year

koolholio
FAIL

Drivers run underneath the kernel

It is not a kernels fault for driver development, not knowing which code this is reference to though...

ioctl() does exactly what it says on the tin...

input <|> output control...

You can't blame a kernel for shoddy driver development! I've seen many a dodgy driver code in my time due to exception handling being missed out or broken! some causing some right old mayhem for device and machine. Not exclusive to linux either!

30 years ago, at flip of a switch, the internet as we know it WAS BORN

koolholio
FAIL

Re: That depends...

What you would actually find is some of the hoarders have given up some of their IPv4 allocations, since 6to4 exists...

NAT didnt have anything to do with saving IPv4 at GTLD level? :-/

But I do agree, until it becomes utterly broken, people wont go fixing it.

koolholio

Re: Here in the UK...

are you thinking of the DNS specification there? which is a seperate RFC.

Phreakers also came a long long time before the script kiddies?

koolholio
Mushroom

Old school

Revive the X.25 and LAPF / LAPM articles, add in some BGP, then rethink the linking fundamentals!

Page: