<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-7284693229621840678</atom:id><lastBuildDate>Wed, 11 Sep 2024 17:47:26 +0000</lastBuildDate><category>Testing</category><category>anti-malware</category><category>nsslabs</category><category>Security</category><category>Exploit</category><category>IPS</category><category>Products</category><category>events</category><category>PCI Compliance</category><category>Browser</category><category>Methodologies</category><category>vulnerability</category><category>Misc</category><category>News</category><category>Performance</category><category>Phishing</category><category>firewall</category><title>NSS Labs</title><description>Education and perspectives on security threats, product and testing.</description><link>http://nsslabs.blogspot.com/</link><managingEditor>noreply@blogger.com (Rick Moy)</managingEditor><generator>Blogger</generator><openSearch:totalResults>77</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-7945653941073281681</guid><pubDate>Fri, 20 May 2011 05:42:00 +0000</pubDate><atom:updated>2011-05-19T22:42:49.526-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">nsslabs</category><title>Moved</title><description>This blog has moved to &lt;a href=&quot;http://www.nsslabs.com/blog&quot;&gt;www.nsslabs.com/blog&lt;/a&gt;&lt;br /&gt;
Please update your bookmarks.</description><link>http://nsslabs.blogspot.com/2011/05/moved.html</link><author>noreply@blogger.com (Rick Moy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-1793601881364525901</guid><pubDate>Wed, 13 Apr 2011 18:18:00 +0000</pubDate><atom:updated>2011-04-17T11:52:55.658-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">firewall</category><category domain="http://www.blogger.com/atom/ns#">Testing</category><title>Enterprise Network Firewalls Leak</title><description>NSS Labs released yet another hard-hitting test report, not on the latest security innovations, but rather on decades old technology: network firewalls. They&#39;ve been around long enough to take for granted and are starting to be replaced by next generation firewalls.&lt;br /&gt;
&lt;br /&gt;
In our testing, five out of six, or 83%, of the enterprise network firewalls we tested in January leaked traffic using the default settings that the vendor ships to customers, letting external attackers become trusted insiders. Yes, let that sink in for a minute as there is no way to understate the importance of this. Several currently deployed enterprise firewalls are leaking traffic. And half are also failing stability testing, which jeopardizes integrity and continuity of operations. Everything is well documented in our &lt;a href=&quot;http://www.nsslabs.com/research/network-security/firewall-ngfw/network-firewall-group-test-q2-2011.html&quot;&gt;Enterprise Network Firewall Group Test Report&lt;/a&gt; (client access required), &lt;a href=&quot;http://www.nsslabs.com/research/analysis-briefs/network-firewall-faq.html&quot;&gt;FAQ&lt;/a&gt;, and&lt;a href=&quot;http://www.nsslabs.com/research/network-security/firewall-ngfw/remediation/network-firewall-remediation-brief-for-tcp-split-handshake.html&quot;&gt; Remediation Brief &lt;/a&gt;(free to registered users). Tested firewalls include: Check Point, Cisco, Fortinet, Juniper, Palo Alto Networks, Sonicwall.&lt;br /&gt;
&lt;br /&gt;
This is not some new vulnerability. Rather, it&#39;s a well-known problem for which papers have been written, and attack code is available on the net. The bad guys have the info already. But apparently most of the vendors, and probably nearly all their customers who rely on firewall protection either don&#39;t know or have prioritized performance over security. Recognizing the widespread importance of the issue, we notified vendors immediately in January and February, and at considerable expense to us, worked with them for two months to explain the issues and solicit workarounds and fixes. Half the vendors could have protected customers, but did not, having shipped their firewalls with the protection off by default— leaving enterprise networks vulnerable out of the box. There are reasons, but no good ones in our opinion. An analogy is that of a car having the airbag disabled by default (but no warning). This is Job #1 for a firewall.&lt;br /&gt;
&lt;br /&gt;
Bottom line: Your network firewall may not be protecting you, despite having multiple certifications from test labs. In fairness, these types of certifications were designed as minimum bars vendors must pass in order for the US government to purchase them, and not comprehensive assurance. Why? Because they don&#39;t test all the things we at NSS Labs do with the same rigor or as they&#39;re actually deployed at customer sites (like hackers do).  &lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;br /&gt;
To be clear, claims that IPS or AV can stop a TCP split handshake attack are not accurate. Those are workarounds for trying to find malicious activity after the intruder has already gained access inside the firewall. It&#39;s like saying a metal detector will catch somebody who stole an employee ID card to get in the building. Only if they&#39;re carrying a gun or knife, but they could still roam freely and steal critical information if they stay under the radar.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
Now, the only way for an enterprise to know it&#39;s firewall is blocking the attack is to check the configuration and/or test it against the specific attack. Given the market deployments of firewalls, millions of deployed firewalls need to be checked for this flaw in the field. As a public service, we&#39;ve made a FAQ and remediation steps for the affected products that have &lt;a href=&quot;http://www.nsslabs.com/research/network-security/firewall-ngfw/remediation/network-firewall-remediation-brief-for-tcp-split-handshake.html&quot;&gt;TCP workarounds available&lt;/a&gt; on our site at no cost. We encourage anyone with a firewall to test their firewalls immediately for the issues described in detail in our &lt;a href=&quot;http://www.nsslabs.com/research/network-security/firewall-ngfw/network-firewall-group-test-q2-2011.html&quot;&gt;full network firewall group test report&lt;/a&gt;. Also covered in the report: security effectiveness; evasion, performance, pricing and TCO test results.&amp;nbsp;We utilized the&amp;nbsp;&lt;a href=&quot;http://www.breakingpointsystems.com/community/blog/nss-labs-firewall-report-highlights-the-need-to-rethink-firewall-testing/&quot;&gt;BreakingPointSystems&lt;/a&gt;&amp;nbsp;equipment for the testing,&amp;nbsp;and special thanks to &lt;a href=&quot;http://www.macrothink.org/journal/index.php/npa/article/view/285&quot;&gt;Tod Beardsley&lt;/a&gt;&amp;nbsp;for the research (see &lt;a href=&quot;http://www.macrothink.org/journal/index.php/npa/article/view/285&quot;&gt;paper&lt;/a&gt;).&lt;br /&gt;
&lt;br /&gt;
Testing is not exactly straight forward, and many people are trying to come to terms with it, so if you have questions or need help, &lt;a href=&quot;http://www.nsslabs.com/company/contact-form.html&quot;&gt;contact one of our security analysts&lt;/a&gt;. Given the number of firewalls out there, we all have a lot of work to do.</description><link>http://nsslabs.blogspot.com/2011/04/enterprise-network-firewalls-leak.html</link><author>noreply@blogger.com (Rick Moy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-1604873513462889833</guid><pubDate>Wed, 16 Mar 2011 18:51:00 +0000</pubDate><atom:updated>2011-03-17T10:40:49.946-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Browser</category><category domain="http://www.blogger.com/atom/ns#">News</category><category domain="http://www.blogger.com/atom/ns#">Products</category><title>What&#39;s your next browser?</title><description>Web browsers have become the new killer app - serving as the platform for accessing our favorite personal and business applications in the cloud. As we&#39;ve discussed previously on this blog and in our research, web browsers, and more often their plug-ins, represent significant vulnerability risks to individuals and organizations. This week we find ourselves in a unique point in time, when several major browser upgrades have been released (or are imminently upon us): Chrome 10, Firefox 4, Internet Explorer 9, Opera 11, Safari 5.&lt;br /&gt;
&lt;br /&gt;
Many of the key enhancements include:&lt;br /&gt;
- rendering and standards compliance&lt;br /&gt;
- security and privacy, including &#39;do not track&#39; provisions&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;- javascript and graphics performance acceleration&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;- &#39;enhanced&#39; user interfaces&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;Which one will you upgrade to?&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
document.write(&quot;&lt;scr&quot;+&quot;ipt type=\&quot;text/javascript\&quot; src=\&quot;http://www.surveygizmo.com/s3/polljs/493284-I52V3VS11P2F3Z7QA2V89M2PXWD2GD/?cookie=&quot;+document.cookie.match(/sg-response-493284/gi)+&quot;\&quot;&gt;&lt;/scr&quot;+&quot;ipt&gt;&quot;);
&lt;/script&gt;</description><link>http://nsslabs.blogspot.com/2011/03/whats-your-next-browser.html</link><author>noreply@blogger.com (Rick Moy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-6780086483180200106</guid><pubDate>Wed, 09 Mar 2011 21:09:00 +0000</pubDate><atom:updated>2011-03-09T14:03:54.760-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">anti-malware</category><category domain="http://www.blogger.com/atom/ns#">nsslabs</category><category domain="http://www.blogger.com/atom/ns#">Testing</category><title>Why you need to Test it like a hacker!</title><description>&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRbiYAhyRlUAi1CyIM37ZQ0xh6vyeb_G0Fj805XJibGSDfh_CD4Kv2CcbUjJ0oS2NGda8g4sluPdxt2B26rFhJM2lQgMm0Inu2cZFCBR4AuDVPcFWsgAThMcBACCfzvFWN-wAXXAiHk4nV/s1600/dummy.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; cssfloat: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;238&quot; q6=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRbiYAhyRlUAi1CyIM37ZQ0xh6vyeb_G0Fj805XJibGSDfh_CD4Kv2CcbUjJ0oS2NGda8g4sluPdxt2B26rFhJM2lQgMm0Inu2cZFCBR4AuDVPcFWsgAThMcBACCfzvFWN-wAXXAiHk4nV/s320/dummy.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;Some tests you don&#39;t want to be too hard. Like those we take in school that we don&#39;t think will mean too much to us in life later on. Say, for some it&#39;s abstract poetry of the middle ages, basket weaving in the precambrian era,&amp;nbsp;etc. For these you just want to get by, so when an easy test comes along, the tested party generally breathes a sigh of relief. &lt;/div&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;In contrast, some tests are hard for our own good. Physical endurance tests before summiting Mt. Whitney or K2. Crash tests of car safety equipment like seat belts, air bags and brakes. You really want to make sure those things work as advertised&amp;nbsp;so they&#39;ll function when you need them.&lt;/div&gt;&lt;br /&gt;
So it is with &lt;a href=&quot;http://www.nsslabs.com/&quot;&gt;enterprise security testing&lt;/a&gt;, and security product testing in particular. In a world where virtually every antivirus (antimalware) or &lt;a href=&quot;http://www.nsslabs.com/research/endpoint-security/&quot;&gt;endpoint security&lt;/a&gt; product is &#39;certified&#39; by two or three different labs, one would think they&#39;re all equally good. And especially if they&#39;ve got a certification from the government, right? Dead wrong. They&#39;ve all been &#39;certified&#39; because they&#39;ve been able to figure out how to pass the test, or because the test is not hard enough, not necessarily survive the crash.&lt;br /&gt;
&lt;br /&gt;
In our experience, there&#39;s rarely such a thing as &#39;too hard&#39; of a test. In order to know how well a product will defend you, you&#39;ve got to &lt;strong&gt;&lt;a href=&quot;http://www.nsslabs.com/services/custom-testing.html&quot;&gt;TEST IT LIKE A HACKER&lt;/a&gt;.&lt;/strong&gt; You need to subject the products in your environment to the same stress and attacks that&amp;nbsp;they will face against motivated, persistent adversaries sometimes even using advanced techniques. After all, fixing problems before a breach is always much less expensive than cleaning up the mess afterwards.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfhAvmExz0DJMy1LBG_TR9LuseBSDakRNC_hzUA8sxIFaA9CWz_qalHmKYZe558QweZ9Utwt-_SJ05BDfQUnnv6LZyYmc0FIpGgsgP91dHxmiQvVQP7Pb6x9DRPWveyOgyX70wHx02wVDg/s1600/NSS-black-hacker.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; q6=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfhAvmExz0DJMy1LBG_TR9LuseBSDakRNC_hzUA8sxIFaA9CWz_qalHmKYZe558QweZ9Utwt-_SJ05BDfQUnnv6LZyYmc0FIpGgsgP91dHxmiQvVQP7Pb6x9DRPWveyOgyX70wHx02wVDg/s1600/NSS-black-hacker.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
As more and more high-profile breaches are disclosed, securing our intellectual property and assets is no longer just a technical issue. NSS Labs makes a lot of its &lt;a href=&quot;http://www.nsslabs.com/research/&quot;&gt;security research and educational content&lt;/a&gt; available for free.&amp;nbsp;I encourage you to browse some of the results to find out more.</description><link>http://nsslabs.blogspot.com/2011/03/why-you-need-to-test-it-like-hacker.html</link><author>noreply@blogger.com (Rick Moy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRbiYAhyRlUAi1CyIM37ZQ0xh6vyeb_G0Fj805XJibGSDfh_CD4Kv2CcbUjJ0oS2NGda8g4sluPdxt2B26rFhJM2lQgMm0Inu2cZFCBR4AuDVPcFWsgAThMcBACCfzvFWN-wAXXAiHk4nV/s72-c/dummy.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-7806089836803940771</guid><pubDate>Wed, 02 Mar 2011 15:15:00 +0000</pubDate><atom:updated>2011-03-02T07:15:00.361-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">events</category><category domain="http://www.blogger.com/atom/ns#">nsslabs</category><title>Redefining the security gateway</title><description>This week I&#39;m at the &lt;a href=&quot;http://www.pacific-crest.com/public/&quot;&gt;Pacific Crest&lt;/a&gt; Emerging Technologies Summit in San Francisco. And security is hot.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbhpLuJuUQgXD5Z4cgre3h_XfkgLHfK6-OWEOaW6HOEHAkHul7_3ougJyIgNVS6U4CWh1h7qfa4oHJg4tghm0t3sREGxqDfKUqjC6MZSjUIYChTts65VtGgosOqJ8JLo-s1dyoArtmSZxq/s1600/investor2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbhpLuJuUQgXD5Z4cgre3h_XfkgLHfK6-OWEOaW6HOEHAkHul7_3ougJyIgNVS6U4CWh1h7qfa4oHJg4tghm0t3sREGxqDfKUqjC6MZSjUIYChTts65VtGgosOqJ8JLo-s1dyoArtmSZxq/s200/investor2.jpg&quot; width=&quot;176&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Apparently, enterprise IT buyers are not the only ones interested in information security products. Investors - institutional, hedge funds, private equity, etc - are all trying to read the tea leaves of the marketing soup being slung by security vendors.&amp;nbsp;It&#39;s a stark contrast to the crowds at BlackHat and Defcon. These investors want&amp;nbsp;to understand which companies will outperform or under-perform their competitors in the marketplace.&amp;nbsp;While they clearly posses great knowledge about the financials of these companies, several are admittedly struggling to understand the technology table-stakes and differentiators required to compete.&amp;nbsp;Increasingly, they&#39;re realizing they need to understand the security tech a little better in order to formulate and justify their investment thesis. I&#39;m fielding questions like:&amp;nbsp;Why do we need new security gateways? What is application control about? How are enterprises buying/using the technology? Can opensource security compete? Which approach will win?&amp;nbsp;Which companies have products vs. platforms?&amp;nbsp;With 20 to 40 competing companies in security market segments, surely not all of them can &#39;perform&#39; and survive long term as stand-alone entities.&lt;br /&gt;
&lt;br /&gt;
In a few hours I&#39;ll be tackling some of these questions on a panel with some of the leaders in network security - Barracuda, Fortinet and Sourcefire. This should be a good debate, and we&#39;ll have to follow up with some of those larger players who aren&#39;t represented, like Check Point, Cisco, HP/TippingPoint, IBM/ISS, Juniper.</description><link>http://nsslabs.blogspot.com/2011/03/redefining-security-gateway.html</link><author>noreply@blogger.com (Rick Moy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbhpLuJuUQgXD5Z4cgre3h_XfkgLHfK6-OWEOaW6HOEHAkHul7_3ougJyIgNVS6U4CWh1h7qfa4oHJg4tghm0t3sREGxqDfKUqjC6MZSjUIYChTts65VtGgosOqJ8JLo-s1dyoArtmSZxq/s72-c/investor2.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-4318249247412291179</guid><pubDate>Wed, 02 Mar 2011 09:47:00 +0000</pubDate><atom:updated>2011-03-02T01:47:22.748-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">events</category><category domain="http://www.blogger.com/atom/ns#">nsslabs</category><title>RSA update</title><description>Like most, I&#39;m recovering from the annual pilgrimage to the &lt;a href=&quot;http://www.rsaconference.com/2011/usa/index.htm&quot;&gt;RSA conference&lt;/a&gt; in San Francisco two weeks ago. As usual, it was a great mecca in which to reconnect with friends, clients, business partners and new folks in the community. I&#39;d especially like to thank all the supporters in our enterprise and vendor &lt;a href=&quot;http://www.nsslabs.com/company/customer-advisory-board.html&quot;&gt;advisory boards&lt;/a&gt;. The NSS team is grateful for getting 60 of the busiest people in the biz to actively participate in discussions about how to improve information security through testing. It’s a topic that’s garnering momentum. I thank all of you for your input and suggestions on how we can improve and continue to deliver meaningful, actionable information services. &lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;
&lt;br /&gt;
What are your priorities and concerns for 2011? Let us know and you could win a $100 AMEX card. Respondents will receive complementary access to the research results. &lt;a href=&quot;http://www.surveygizmo.com/s3/481636/NSS-Labs-Security-Survey&quot;&gt;Take the survey&lt;/a&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&lt;u&gt;New Research&lt;/u&gt;&lt;/strong&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;
&lt;ul type=&quot;disc&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;&quot;&gt;We have a number of endpoint      protection platform (EPP) and network security reports we are rolling out,      including EPP evasion, multi-vector attack protection, next generation      firewall (NGFW), and firewall (FW). There will be a subsequent post on      each of these.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;&quot;&gt;We have been busy      coordinating remediation of an important security issue with a number of &lt;a href=&quot;http://www.nsslabs.com/research/network-security/firewall-ngfw/&quot;&gt;firewall&lt;/a&gt;      vendors. Stay tuned for the full report.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;&quot;&gt;As &lt;a href=&quot;http://www.nsslabs.com/research/endpoint-security/&quot;&gt;Anti-malware&lt;/a&gt;      continues to fail to protect endpoints, we have been investigating      alternatives such as application control (application whitelisting), and      secure browsing. While much of this has been performed for private clients      in the financial services industry, we are gearing up for a proper group      test of these technologies in Q2. Vendors, submit your      products.&amp;nbsp;Enterprise buyers, let us know what challenges you’re      facing, your criteria and experiences. &lt;a href=&quot;http://www.nsslabs.com/company/contact-form.html&quot;&gt;Contact us&lt;/a&gt;.&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;strong&gt;&lt;u&gt;Also New from NSS Labs&lt;/u&gt;&lt;/strong&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;
&lt;ul type=&quot;disc&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo2; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;&quot;&gt;We rolled out a &lt;a href=&quot;http://www.nsslabs.com/resources/webinars/videos/nss-labs-company-overview.html&quot;&gt;new      video&lt;/a&gt; explaining the use cases for our services and how we can help      organizations make informed infosec decisions.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo2; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;&quot;&gt;We also have new collateral      which goes into greater detail. See the &lt;a href=&quot;http://www.nsslabs.com/assets/other/NSS_Labs_brochure-web.pdf&quot;&gt;services      overview&lt;/a&gt;, or dive into our &lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;ul type=&quot;circle&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level2 lfo2; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 1.0in;&quot;&gt;&lt;a href=&quot;http://www.nsslabs.com/assets/other/NSS_Labs_Subscriptions_and_Roadmap.pdf&quot;&gt;Research       calendar&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level2 lfo2; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 1.0in;&quot;&gt;Consulting and custom &lt;a href=&quot;http://www.nsslabs.com/assets/other/NSS_Labs_Custom-Testing.pdf&quot;&gt;testing       services&lt;/a&gt; for proof of concept and bake-off testing&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level2 lfo2; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 1.0in;&quot;&gt;Modeling       defense-in-depth and tracking risk exposure using our &lt;a href=&quot;http://www.nsslabs.com/assets/other/NSS_Labs_Vuln-Scope.pdf&quot;&gt;VulnScope       service&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level2 lfo2; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 1.0in;&quot;&gt;Understanding the       balance between security and cost with our &lt;a href=&quot;http://www.nsslabs.com/assets/other/NSS_Labs_SVM.pdf&quot;&gt;Security       Value Map&lt;/a&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo2; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;&quot;&gt;Finally, NSS is actively      expanding to meet the demands of our growing Fortune 2000 client base. If      you’re a talented, hands-on infosec professional who understands the value      of testing and ethical hacking, and is passionate about improving      information security, we should talk. Contact us about &lt;a href=&quot;http://www.nsslabs.com/company/careers/&quot;&gt;career opportunities&lt;/a&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ul&gt;</description><link>http://nsslabs.blogspot.com/2011/03/rsa-update.html</link><author>noreply@blogger.com (Rick Moy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-847234336101190018</guid><pubDate>Wed, 02 Mar 2011 00:25:00 +0000</pubDate><atom:updated>2011-03-01T16:25:20.329-08:00</atom:updated><title>test</title><description>Google Blogger seems to be having issues, along with some other Google Apps, like mail. Check the &lt;a href=&quot;http://www.google.com/appsstatus#di=1&amp;amp;hl=en&quot;&gt;dashboard&lt;/a&gt;.</description><link>http://nsslabs.blogspot.com/2011/03/test.html</link><author>noreply@blogger.com (Rick Moy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-1539414747141758030</guid><pubDate>Thu, 30 Dec 2010 23:30:00 +0000</pubDate><atom:updated>2010-12-30T15:31:19.362-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Exploit</category><category domain="http://www.blogger.com/atom/ns#">IPS</category><category domain="http://www.blogger.com/atom/ns#">Performance</category><category domain="http://www.blogger.com/atom/ns#">Testing</category><title>Network Intrusion Prevention Group Test Released</title><description>The security analysts at &lt;a href=&quot;http://nsslabs.com/research/network-security/network-ips/network-ips-group-test-q4-2010.html&quot;&gt;NSS Labs tested 13 different network IPS products&lt;/a&gt;, including stand-alone IPS and multi-function gateways, and one unified threat management product. If your organization is evaluating IPS solutions, or is looking to benchmark your current vendor, then this is the definitive report to read. Data and analysis are based on multiple man-years of complex, real-world testing that mimics how cyber-criminals are working to penetrate corporate defenses (see &lt;a href=&quot;http://nsslabs.com/assets/Methodologies/nss%20labs%20ips%20group%20test%20methodology%20v6.1.pdf&quot;&gt;methodology&lt;/a&gt;). No surveys, interviews or soft trends. This is the &lt;u&gt;hard test data&lt;/u&gt; upon which organizations base critical, big-dollar decisions.&lt;br /&gt;
&lt;br /&gt;
The report includes valuable information not available anywhere else:&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;• Total cost of ownership analysis – are you getting the most security for your budget?&lt;/div&gt;•             Security effectiveness – how much effort is required to protect all your assets?&lt;br /&gt;
•             Real-world performance benchmarks – can the device handle your traffic?&lt;br /&gt;
•             Management and usability insights – how much time is really required to achieve results?&lt;br /&gt;
&lt;br /&gt;
While the full breadth and depth of the research is available only to our &lt;a href=&quot;http://nsslabs.com/register/&quot;&gt;subscribers&lt;/a&gt;, we are making a&amp;nbsp;&lt;a href=&quot;http://nsslabs.com/research/network-security/network-ips/network-ips-group-test-q4-2010.html&quot;&gt;summary&lt;/a&gt; available to non-clients. Next week/year I will blog more about the key findings and what they mean for IT buyers in 2011.&lt;br /&gt;
&lt;br /&gt;
Tested Products include (alphabetically):&lt;br /&gt;
1. CHECKPOINT POWER-1 11065&lt;br /&gt;
2. CISCO IPS 4260&lt;br /&gt;
3. ENDACE CORE-100 (IDS)&lt;br /&gt;
4. FORTINET FORTIGATE 3810A&lt;br /&gt;
5. IBM PROVENTIA NETWORK IPS GX6116&lt;br /&gt;
6. JUNIPER IDP-8200&lt;br /&gt;
7. JUNIPER SRX 3600&lt;br /&gt;
8. MCAFEE M-8000&lt;br /&gt;
9. NSFOCUS NIPS-1200&lt;br /&gt;
10. PALO ALTO NETWORKS PA-4020&lt;br /&gt;
11. SOURCEFIRE 3D 4500&lt;br /&gt;
12. STONESOFT IPS-1205&lt;br /&gt;
13. STONESOFT IPS 3205</description><link>http://nsslabs.blogspot.com/2010/12/network-intrusion-prevention-group-test.html</link><author>noreply@blogger.com (Rick Moy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-282515265562555999</guid><pubDate>Mon, 20 Dec 2010 07:09:00 +0000</pubDate><atom:updated>2010-12-19T23:13:47.495-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">anti-malware</category><category domain="http://www.blogger.com/atom/ns#">Browser</category><title>Stopping malware with a browser</title><description>This week we released another &lt;a href=&quot;http://www.nsslabs.com/research/endpoint-security/browser-security/web-browser-group-test-socially-engineered-malware-q3-2010.html&quot;&gt;report on socially-engineered malware protections delivered by browsers&lt;/a&gt;. While most articles and blogs seemed to interpret the results properly, there were some inaccuracies that we wish to address. Security is a complex field and the terminology can sometimes be misinterpreted. This can be compounded when vendors who did poorly add their spin, or when the data challenges one’s own beliefs.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Stopping Malware vs. Security:&lt;/b&gt;&lt;br /&gt;
Some of the &lt;a href=&quot;http://nsslabs.blogspot.com/2010/12/threat-types-and-terminology.html&quot;&gt;key security terms&lt;/a&gt;&amp;nbsp;are clarified in a previous post, especially relating to “most secure” browser. Some articles incorrectly stated that we found IE to be the “most secure” browser. What we tested was browser effectiveness at stopping malware from reaching a user or their PCs, not the security of the browser itself or its plug-ins. Modern browsers are a wonderful, free additional layer of protection. They work well with your favorite antivirus software. Browsers however will not stop malware coming via email or USB drives.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The Malware threat:&lt;/b&gt;&lt;br /&gt;
Malware is arguably the largest security threat facing users today – with more than 60,000 unique, new samples entering circulation each day (source: &lt;a href=&quot;http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q3-2010.pdf&quot;&gt;McAfee&lt;/a&gt;). There’s a $14B industry addressing the problem of malware. These test results challenge the comfortable status quo of many of the vendors. The notion that a free product adds so much protection can easily upset the industry apple cart. The assertion that the focus of the test was narrow (made by Google and some others) flies in the face of all generally accepted data. To say one’s browser was “built with security in mind” is nice, but marketing speak. What we’ve offered is hard data about malware protection.  The exploitability of the browser is also a very important topic. But, even in this case, data doesn’t support Chrome being ‘more secure’ (i.e. less vulnerable) than other browsers (see CVEs, &lt;a href=&quot;http://www.secunia.com/&quot;&gt;Secunia&lt;/a&gt;&amp;nbsp;disclosures, etc.). We do sincerely applaud the innovations and bug bounties though, and encourage all vendors to build more security in. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Versions tested:&lt;/b&gt;&lt;br /&gt;
The claim that we tested an “old” version of Chrome is patently false. As stated in the report, the test was run in late September, when version 6 was the current browser. Since then Google has released two other so-called “major” releases, none of which have claimed improvements to the tested SafeBrowsing functionality. Here is the Timeline for Chrome Version Release:&lt;br /&gt;
Stable Version              Release Date&lt;br /&gt;
5.0.375 &amp;nbsp; &amp;nbsp; &amp;nbsp;2010-05-25        &lt;br /&gt;
6.0.472 &amp;nbsp; &amp;nbsp; &amp;nbsp;2010-09-02                    &lt;br /&gt;
7.0.517&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp;2010-10-21&lt;br /&gt;
8.0.552&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp;2010-12-02&lt;br /&gt;
Furthermore, Chrome’s sandboxing is designed for exploits protection; it does not protect against socially-engineered malware. You click it, it runs.&lt;br /&gt;
&lt;br /&gt;
At the time of the test, Opera’s website marketed protection from malware as a feature, yet our results showed no protection was available. AVG officials have separately acknowledged that the integration of its technology was not yet complete, confirming our results. Features should only be marketed after they are actually in the product.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Application Reputation:&lt;/b&gt;&lt;br /&gt;
In a world of dizzying information, there’s much rush to a sound bite of who “won”. The most significant technological message of this test may have been overlooked. This test benchmarked the world’s first implementation of an application reputation system within free web browsers that goes beyond simple black lists. Nascent stand-alone security products such as SolidCore (acquired by McAfee), Bit9 and CoreTrace utilize what is commonly referred to as white listing, and commercial endpoint security products are starting to include some form of this as well. Apple uses a “walled garden” approach to limit exposure to malware on its tightly controlled platforms by pre-approving apps. &lt;br /&gt;
&lt;br /&gt;
In web browsers, so far we’ve seen just black listing. A URL or application is either known to be bad, or unknown. What’s unique about Microsoft’s &lt;a href=&quot;http://blogs.msdn.com/b/ie/archive/2010/10/13/stranger-danger-introducing-smartscreen-application-reputation.aspx&quot;&gt;approach &lt;/a&gt;in the IE9 browser is that applications have 3 states: known good (white), known bad (black) and unknown (grey). The combination of good and bad indicators is clearly powerful, stopping 99% of malware via the web download vector. The use of application reputation to identify good applications and bad ones is unique to IE, for now. Will other vendors follow Microsoft’s lead?&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Methodology and Open Invitations:&lt;/b&gt;&lt;br /&gt;
No vendor has influence over what/how we test or where we get malware from. We constantly run our Live Test network with a variety of security products - antivirus, browsers, and other network devices.&lt;br /&gt;
Over the past 2 years we’ve been running these tests, NSS has discussed results and methodology (which is included in &lt;a href=&quot;http://www.nsslabs.com/research/endpoint-security/browser-security/web-browser-group-test-socially-engineered-malware-q3-2010.html&quot;&gt;the report&lt;/a&gt;) with all of the browser vendors; even providing sample URLs for validation to them in past tests. Some had even privately acknowledged issues.&lt;br /&gt;
&lt;br /&gt;
Our past invitations to become more involved in the ongoing testing and review of results still stands.</description><link>http://nsslabs.blogspot.com/2010/12/stopping-malware-with-browser.html</link><author>noreply@blogger.com (Rick Moy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-1796477828766895629</guid><pubDate>Fri, 17 Dec 2010 04:29:00 +0000</pubDate><atom:updated>2010-12-17T00:33:20.065-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">anti-malware</category><category domain="http://www.blogger.com/atom/ns#">Browser</category><category domain="http://www.blogger.com/atom/ns#">Exploit</category><category domain="http://www.blogger.com/atom/ns#">Phishing</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">vulnerability</category><title>Threat Types and Terminology</title><description>Terminology used to describe attacks is often misunderstood by the broader public. Thus, we are providing this brief explanation of threat types and the terms we use in our &lt;a href=&quot;http://nsslabs.com/research/&quot;&gt;reports&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
End users and their computers face a number of different attack types. At a high level there are two: 1) Socially-engineered attacks target the user, and work only when the user is tricked into performing an action; running a malicious file or giving up personal data to a fraudulent site. 2) Other attacks target vulnerabilities in systems and applications. The following chart gives a rough breakdown of common threats against end user systems.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwAqjLojwxZmujP0uYsvCTkeFssw2j7XtCUZ3pMMHszlpanWX98CwpP5rLJ5D6l8fW58bFjKsN05LK2P1RiTH4MS4ZR9vzagkJDfT11nZ4odVlIwPtavPLuqEH0bASFSSKTNaAyrcSef8i/s1600/threat-types.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;196&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwAqjLojwxZmujP0uYsvCTkeFssw2j7XtCUZ3pMMHszlpanWX98CwpP5rLJ5D6l8fW58bFjKsN05LK2P1RiTH4MS4ZR9vzagkJDfT11nZ4odVlIwPtavPLuqEH0bASFSSKTNaAyrcSef8i/s320/threat-types.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;Layers of Security&lt;/b&gt;&lt;br /&gt;
These types of security threats can be mitigated by a range of security products; including IPS, UTM, SWG appliances, and on the endpoint: Internet security suites, most anti-malware products, and even web browsers. Modern browsers have implemented an additional layer of security to help users differentiate between good and bad web sites and downloads. &lt;br /&gt;
&lt;br /&gt;
When selecting security products, either for home or business environments, it&#39;s often hard to tell from the marketing literature which products actually stop threats. And protection levels offered by products in the different categories can vary greatly.&amp;nbsp;The above taxonomy should help you ask more specific questions of vendors. It also acts as a guide to terminology used in NSS Labs test reports.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Security products protecting users and their computers&lt;/b&gt;&lt;br /&gt;
When someone says “Product X stops more malware, exploits etc.” or “Product X offers better malware or exploit protection”, what they mean is that Product X inspects traffic passing through it and stops these attacks from reaching and/or affecting the end user or the operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Security products themselves susceptible to threats&lt;/b&gt;&lt;br /&gt;
In addition, security suites and browsers (and their plug-ins) can be susceptible to exploits if the software has vulnerabilities in them. When someone says “browser X is more secure” what they are trying to say is that browser X has fewer vulnerabilities. Unfortunately, most software, and all browsers have vulnerabilities. For example in the first 9 months of 2010, Microsoft Internet Explorer had 43 new published vulnerabilities, while Google Chrome had 106, according to &lt;a href=&quot;http://www.secunia.com/&quot;&gt;Secunia &lt;/a&gt;research.&lt;br /&gt;
&lt;br /&gt;
For more exhaustive treatments on threat types including product test results, consult our research services at &lt;a href=&quot;http://nsslabs.com/&quot;&gt;nsslabs.com&lt;/a&gt;.</description><link>http://nsslabs.blogspot.com/2010/12/threat-types-and-terminology.html</link><author>noreply@blogger.com (Rick Moy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwAqjLojwxZmujP0uYsvCTkeFssw2j7XtCUZ3pMMHszlpanWX98CwpP5rLJ5D6l8fW58bFjKsN05LK2P1RiTH4MS4ZR9vzagkJDfT11nZ4odVlIwPtavPLuqEH0bASFSSKTNaAyrcSef8i/s72-c/threat-types.png" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-7661882324354850404</guid><pubDate>Thu, 11 Nov 2010 01:19:00 +0000</pubDate><atom:updated>2010-11-11T12:23:27.347-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Exploit</category><category domain="http://www.blogger.com/atom/ns#">IPS</category><category domain="http://www.blogger.com/atom/ns#">Testing</category><title>Tales from the Trenches of IPS Testing</title><description>&lt;em&gt;An update on our current 2010 IPS group test.&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;&lt;/em&gt;&lt;br /&gt;
&lt;br /&gt;
Those of you following network IPS know that the last&amp;nbsp;&lt;a href=&quot;http://www.nsslabs.com/research/network-security/network-ips/ips-2009-q4.html&quot;&gt;NSS Labs IPS&amp;nbsp;group test in Q4 2009&lt;/a&gt; made quite an impact in the marketplace. The testing soundly destroyed the notion that an organization could buy one of the ‘leading products’ and rest easy&lt;br /&gt;
- Vendors with leading market share and analyst accolades were shown to have mixed to poor results on our robust exploit testing; &lt;br /&gt;
- Over half the vendors lacking coverage for well-known evasion techniques&lt;br /&gt;
- Many put performance ahead of security effectiveness&lt;br /&gt;
&lt;br /&gt;
We were pleased to work collaboratively with many of the vendors in ensuing months to further identify and rectify issues in advance of our next group test. In the process, several vendors released new hardware and software. Excited as we were to test drive the new improved models, we were disappointed in more than a few situations to discover the latest and greatest versions had show-stopper level flaws that could cost their customers a great deal of money and time. A number of vendors requested additional time to remediate flaws, and it was clear that much would change very quickly.&lt;br /&gt;
&lt;br /&gt;
Meanwhile, the size of the NSS Labs&amp;nbsp;2010 IPS group test has also grown in number of participants and complexity, making this by far the largest, most in-depth group test of its kind.&lt;br /&gt;
- We’ve added several new vendor products; &lt;br /&gt;
- We’ve refreshed the exploits used, changing and upgrading a third of the content;&lt;br /&gt;
- Added additional HTML evasions;&lt;br /&gt;
&lt;br /&gt;
Determined to not let further delays keep our much awaited group test off the streets any longer, we decided to take a phased approach, releasing the test in two parts; Part I will contain five vendors, and Part II will contain the remaining vendors. While this phased release provides enterprises with much needed information on some of the top vendors, it arguably leaves them waiting to see the rest. This may be more or less relevant depending on one’s situation, and which products are under consideration. Certainly some vendor sales teams maybe playing catch up. In the meantime, NSS clients can utilize &lt;a href=&quot;http://nsslabs.com/services/analyst-inquiry.html&quot;&gt;analyst advisory sessions&lt;/a&gt; to receive additional guidance and help fill in the gaps. &lt;br /&gt;
&lt;br /&gt;
So, look for part one of the &lt;a href=&quot;http://nsslabs.com/&quot;&gt;NSS Labs&lt;/a&gt; IPS group test to arrive middle of next week &lt;a href=&quot;http://www.nsslabs.com/research/network-security/network-ips/&quot;&gt;here&lt;/a&gt;, and part two in the middle of December. Clients will automatically be notified when it is posted via email alert. If you’re not a client, &lt;a href=&quot;http://nsslabs.com/register/&quot;&gt;register for free here&lt;/a&gt;, or contact our &lt;a href=&quot;mailto:advisor@nsslabs.com&quot;&gt;advisory services&lt;/a&gt; group to learn more.</description><link>http://nsslabs.blogspot.com/2010/11/tales-from-trenches-of-ips-testing.html</link><author>noreply@blogger.com (Rick Moy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-1821636266882577636</guid><pubDate>Thu, 09 Sep 2010 23:34:00 +0000</pubDate><atom:updated>2010-09-09T16:34:29.038-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">News</category><category domain="http://www.blogger.com/atom/ns#">Testing</category><title>Happy Testers Day!</title><description>We have secretary&#39;s day, presidents day, mothers day, fathers day, etc. But I never suspected there would be a &#39;software developers day&#39; or other professional recognition day in our field. Twitter educated me otherwise, so I&#39;m going with it. Our profession could certainly use a little recognition and attention. The auspicious occasion as &lt;a href=&quot;http://blogs.jetbrains.com/youtrack/2010/09/happy-testers-day/&quot;&gt;this blog&lt;/a&gt; explains is the discovery of the first (literal) bug in a computer system on Sept 9, 1947.&lt;br /&gt;
Since then, we&#39;ve had a meager few decades to hone our software development skills, and our bug-finding skills are not far behind. To that end, a short homage to the hard-working testers and QA professionals who often hear these responses from developers.&lt;br /&gt;
&lt;br /&gt;
24. &quot;It works fine on MY computer&quot;&lt;br /&gt;
23. &quot;Who did you login as ?&quot;&lt;br /&gt;
22.  &quot;It&#39;s a feature&quot;&lt;br /&gt;
21. &quot;It&#39;s WAD (Working As Designed)&quot; &lt;br /&gt;
20.  &quot;That&#39;s weird...&quot;&lt;br /&gt;
19. &quot;It&#39;s never done that before.&quot;&lt;br /&gt;
18. &quot;It  worked yesterday.&quot;&lt;br /&gt;
17. &quot;How is that possible?&quot;&lt;br /&gt;
16. &quot;It must be a  hardware problem.&quot;&lt;br /&gt;
15. &quot;What did you type in wrong to get it to  crash?&quot;&lt;br /&gt;
14. &quot;There is something funky in your data.&quot;&lt;br /&gt;
13. &quot;I  haven&#39;t touched that module in weeks!&quot;&lt;br /&gt;
12. &quot;You must have the wrong  version.&quot;&lt;br /&gt;
11. &quot;It&#39;s just some unlucky coincidence.&quot;&lt;br /&gt;
10. &quot;I can&#39;t  test everything!&quot;&lt;br /&gt;
&lt;br /&gt;
For the top 9, see this &lt;a href=&quot;http://testavimas.blogspot.com/2008/09/testers-day.html&quot;&gt;site for a familiar chuckle...&lt;/a&gt;</description><link>http://nsslabs.blogspot.com/2010/09/happy-testers-day.html</link><author>noreply@blogger.com (Rick Moy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-946895857926287854</guid><pubDate>Mon, 23 Aug 2010 19:32:00 +0000</pubDate><atom:updated>2010-08-23T12:32:39.085-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">anti-malware</category><category domain="http://www.blogger.com/atom/ns#">Exploit</category><category domain="http://www.blogger.com/atom/ns#">Testing</category><category domain="http://www.blogger.com/atom/ns#">vulnerability</category><title>Client-side expoit demonstration videos</title><description>NSS has been testing exploits and exploit-detection/protection products  for the last 10 years or so, dating back to the early days of IDS and  IPS . It&#39;s arguably one of our specialties. And we have written before about the differences between &lt;a href=&quot;http://nsslabs.blogspot.com/search/label/anti-malware&quot;&gt;malware&lt;/a&gt;, &lt;a href=&quot;http://nsslabs.blogspot.com/search/label/Exploit&quot;&gt;exploits &lt;/a&gt;and &lt;a href=&quot;http://nsslabs.blogspot.com/search/label/vulnerability&quot;&gt;vulnerabilities&lt;/a&gt;. Yet, as these pernicious threats are elevated into mainstream consumer and enterprise awareness, we are seeing quite a bit of terminology confusion. So, for our latest Host Intrusion Prevention System (HIPS) &lt;a href=&quot;http://nsslabs.com/endpoint-hips-q210&quot;&gt;test of enterprise anti-malware products&lt;/a&gt;, we created some demonstration videos of &lt;a href=&quot;http://nsslabs.blogspot.com/2010/08/client-side-exploits.html&quot;&gt;client-side exploits&lt;/a&gt; used in the test.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;WordSection1&quot;&gt;&lt;br /&gt;
&lt;div align=&quot;center&quot;&gt;&lt;br /&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoNormalTable&quot; style=&quot;border-collapse: collapse;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% rgb(89, 89, 89); border-color: rgb(179, 204, 130) -moz-use-text-color rgb(179, 204, 130) rgb(179, 204, 130); border-style: solid none solid solid; border-width: 1pt medium 1pt 1pt; padding: 0in 0.5pt; width: 55.45pt;&quot; valign=&quot;top&quot; width=&quot;74&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 115%;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: white;&quot;&gt;Product&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% rgb(89, 89, 89); border-color: rgb(179, 204, 130) -moz-use-text-color; border-style: solid none; border-width: 1pt medium; padding: 0in 0.5pt; width: 79.65pt;&quot; valign=&quot;top&quot; width=&quot;106&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 115%;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: white;&quot;&gt;Vulnerability&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% rgb(89, 89, 89); border-color: rgb(179, 204, 130) rgb(179, 204, 130) rgb(179, 204, 130) -moz-use-text-color; border-style: solid solid solid none; border-width: 1pt 1pt 1pt medium; padding: 0in 0.5pt; width: 241.15pt;&quot; valign=&quot;top&quot; width=&quot;322&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 115%;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: white;&quot;&gt;Video Demonstration&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% white; border-color: -moz-use-text-color -moz-use-text-color rgb(179, 204, 130) rgb(179, 204, 130); border-style: none none solid solid; border-width: medium medium 1pt 1pt; padding: 0in 0.5pt; width: 55.45pt;&quot; valign=&quot;top&quot; width=&quot;74&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 115%;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #1f497d;&quot;&gt;Panda&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% white; border-color: -moz-use-text-color -moz-use-text-color rgb(179, 204, 130); border-style: none none solid; border-width: medium medium 1pt; padding: 0in 0.5pt; width: 79.65pt;&quot; valign=&quot;top&quot; width=&quot;106&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 115%;&quot;&gt;CVE-2010-0249&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% white; border-color: -moz-use-text-color rgb(179, 204, 130) rgb(179, 204, 130) -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 0.5pt; width: 241.15pt;&quot; valign=&quot;top&quot; width=&quot;322&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=VPEzOZniuls&quot;&gt;http://www.youtube.com/watch?v=VPEzOZniuls&lt;/a&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% rgb(204, 214, 235); border-color: -moz-use-text-color -moz-use-text-color rgb(179, 204, 130) rgb(179, 204, 130); border-style: none none solid solid; border-width: medium medium 1pt 1pt; padding: 0in 0.5pt; width: 55.45pt;&quot; valign=&quot;top&quot; width=&quot;74&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 115%;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #1f497d;&quot;&gt;Panda&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% rgb(204, 214, 235); border-color: -moz-use-text-color -moz-use-text-color rgb(179, 204, 130); border-style: none none solid; border-width: medium medium 1pt; padding: 0in 0.5pt; width: 79.65pt;&quot; valign=&quot;top&quot; width=&quot;106&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 115%;&quot;&gt;CVE-2010-0806&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% rgb(204, 214, 235); border-color: -moz-use-text-color rgb(179, 204, 130) rgb(179, 204, 130) -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 0.5pt; width: 241.15pt;&quot; valign=&quot;top&quot; width=&quot;322&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=_fstkScB7YM&quot;&gt;http://www.youtube.com/watch?v=_fstkScB7YM&lt;/a&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% white; border-color: -moz-use-text-color -moz-use-text-color rgb(179, 204, 130) rgb(179, 204, 130); border-style: none none solid solid; border-width: medium medium 1pt 1pt; padding: 0in 0.5pt; width: 55.45pt;&quot; valign=&quot;top&quot; width=&quot;74&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 115%;&quot;&gt;&lt;b&gt;F-Secure&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% white; border-color: -moz-use-text-color -moz-use-text-color rgb(179, 204, 130); border-style: none none solid; border-width: medium medium 1pt; padding: 0in 0.5pt; width: 79.65pt;&quot; valign=&quot;top&quot; width=&quot;106&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 115%;&quot;&gt;CVE-2010-0249&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% white; border-color: -moz-use-text-color rgb(179, 204, 130) rgb(179, 204, 130) -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 0.5pt; width: 241.15pt;&quot; valign=&quot;top&quot; width=&quot;322&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=DdvtTuwfa5I&quot;&gt;http://www.youtube.com/watch?v=DdvtTuwfa5I&lt;/a&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% rgb(204, 214, 235); border-color: -moz-use-text-color -moz-use-text-color rgb(179, 204, 130) rgb(179, 204, 130); border-style: none none solid solid; border-width: medium medium 1pt 1pt; padding: 0in 0.5pt; width: 55.45pt;&quot; valign=&quot;top&quot; width=&quot;74&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 115%;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #1f497d;&quot;&gt;ESET&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% rgb(204, 214, 235); border-color: -moz-use-text-color -moz-use-text-color rgb(179, 204, 130); border-style: none none solid; border-width: medium medium 1pt; padding: 0in 0.5pt; width: 79.65pt;&quot; valign=&quot;top&quot; width=&quot;106&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 115%;&quot;&gt;CVE-2006-0003&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% rgb(204, 214, 235); border-color: -moz-use-text-color rgb(179, 204, 130) rgb(179, 204, 130) -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 0.5pt; width: 241.15pt;&quot; valign=&quot;top&quot; width=&quot;322&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=U9WRkQyZvb8&quot;&gt;http://www.youtube.com/watch?v=U9WRkQyZvb8&lt;/a&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% white; border-color: -moz-use-text-color -moz-use-text-color rgb(179, 204, 130) rgb(179, 204, 130); border-style: none none solid solid; border-width: medium medium 1pt 1pt; padding: 0in 0.5pt; width: 55.45pt;&quot; valign=&quot;top&quot; width=&quot;74&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 115%;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #1f497d; font-family: &amp;quot;Verdana&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 9pt; line-height: 115%;&quot;&gt;Sophos&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% white; border-color: -moz-use-text-color -moz-use-text-color rgb(179, 204, 130); border-style: none none solid; border-width: medium medium 1pt; padding: 0in 0.5pt; width: 79.65pt;&quot; valign=&quot;top&quot; width=&quot;106&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 115%;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Verdana&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 9pt; line-height: 115%;&quot;&gt;CVE-2006-4704&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% white; border-color: -moz-use-text-color rgb(179, 204, 130) rgb(179, 204, 130) -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 0.5pt; width: 241.15pt;&quot; valign=&quot;top&quot; width=&quot;322&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Verdana&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 9pt;&quot;&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=F2gfNLzqBwg&quot;&gt;http://www.youtube.com/watch?v=F2gfNLzqBwg&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% rgb(204, 214, 235); border-color: -moz-use-text-color -moz-use-text-color rgb(179, 204, 130) rgb(179, 204, 130); border-style: none none solid solid; border-width: medium medium 1pt 1pt; padding: 0in 0.5pt; width: 55.45pt;&quot; valign=&quot;top&quot; width=&quot;74&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 115%;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #1f497d;&quot;&gt;Symantec&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% rgb(204, 214, 235); border-color: -moz-use-text-color -moz-use-text-color rgb(179, 204, 130); border-style: none none solid; border-width: medium medium 1pt; padding: 0in 0.5pt; width: 79.65pt;&quot; valign=&quot;top&quot; width=&quot;106&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 115%;&quot;&gt;CVE-2010-0483&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;background: none repeat scroll 0% 0% rgb(204, 214, 235); border-color: -moz-use-text-color rgb(179, 204, 130) rgb(179, 204, 130) -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 0.5pt; width: 241.15pt;&quot; valign=&quot;top&quot; width=&quot;322&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=RqQLmKI_R30&quot;&gt;http://www.youtube.com/watch?v=RqQLmKI_R30&lt;/a&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://nsslabs.blogspot.com/2010/08/client-side-expoit-demonstration-videos.html</link><author>noreply@blogger.com (Rick Moy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-6620722185428681257</guid><pubDate>Wed, 18 Aug 2010 07:35:00 +0000</pubDate><atom:updated>2010-08-18T17:32:32.611-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">anti-malware</category><category domain="http://www.blogger.com/atom/ns#">Exploit</category><category domain="http://www.blogger.com/atom/ns#">vulnerability</category><title>Client-side exploits</title><description>Client-side exploits are aggressive weapons used by cybercriminals that allow them to silently take control of computers that visit a web site. The infected widgets on nearly 5 million Network Solutions sites are a prime example (see &lt;a href=&quot;http://krebsonsecurity.com/2010/08/networksolutions-sites-hacked-by-wicked-widget/#more-4532&quot;&gt;Krebs&#39; report on Armorize discovery&lt;/a&gt;). And NSS Labs&#39; Q2 2010 &lt;a href=&quot;http://nsslabs.com/endpoint-hips-q210&quot;&gt;test of 10 endpoint protection products for HIPS&lt;/a&gt; evaluates protection against client-side exploits.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In recent discussions with clients and journalists we&#39;ve found the need to clarify some definitions of how these attacks work, and how they&#39;re different from typical socially-engineered malware campaigns.&lt;a href=&quot;http://www.blogger.com/post-create.do&quot;&gt;&lt;/a&gt; So, the following definitions and analogies are provided in an effort to provide clarification, as well as to bridge an ongoing communication gap between security vendors and their customers.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;Vulnerability&lt;/h3&gt;Like a locked door that can be opened with the right key or combination, a vulnerability is a bug in software code that allows a product to be exploited. An example of a software vulnerability is improperly-defined memory usage within a function that enables content sent to a specific memory location to be run with privileged rights. &lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitBoIpv60CKhT462iRYxJq5-dtm3Y7z3laABzQFrZAjOMAQ3uK0UKlV2XVRIYbf7TBCJpcA-Re5xB6cIS-jRXHAYnWcjAgoRp5V6-r-BjLrW5cJYkhIICptgPx0j1hdvdqDNUDrZjalwSA/s1600/VulnExploitPayload.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;100&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitBoIpv60CKhT462iRYxJq5-dtm3Y7z3laABzQFrZAjOMAQ3uK0UKlV2XVRIYbf7TBCJpcA-Re5xB6cIS-jRXHAYnWcjAgoRp5V6-r-BjLrW5cJYkhIICptgPx0j1hdvdqDNUDrZjalwSA/s400/VulnExploitPayload.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3&gt;Exploit&lt;/h3&gt;An exploit is a specially crafted code sequence which can ”trigger” or ”unlock” a vulnerability within an application, such as a heap spray, buffer overflow attack, etc. An exploit can be hiding in an infected website (client-side attack) where it ambushes visiting computers or be launched from an another computer (remote attack).&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;Payload&lt;/h3&gt;The payload is the content that gets delivered once the vulnerable application has been exploited. Payloads are the actions that are performed on the compromised target computer, such as command execution, writing a file to disk, returning a reverse shell, etc. This may be malware, but does not have to be.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;The Test&lt;/h3&gt;The test utilized 123 common and public  vulnerabilities dating from 2006 to 2010. These vulnerabilities were  exploited when a user visited an infected web page hosting the attack code. The attacks  occurred in two stages: &lt;br /&gt;
1. The attacker  caused a specially-crafted stream of data and code to be delivered to a precise location. This exploited the victim’s computer, gaining the  attacker the ability to perform arbitrary code execution.&lt;br /&gt;
2. Malicious code  was silently executed on the victim’s computer.&lt;br /&gt;
&lt;br /&gt;
If the attack can be thwarted in Stage One  (successful exploit), then it cannot progress to Stage Two, where a malicious payload can be delivered. As long as the exploit  is not defeated, then installing malware is just one of many possible actions  the attacker can take. And the choice of malicious code is nearly infinite.  Since there are far fewer exploits than malware, it is imperative that attacks  be defeated in the earliest possible stage. In other words, it is  advantageous for AV suites to detect the exploit vs. chasing malware  samples.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;Results and Next Steps&lt;/h3&gt;Unfortunately, 75% of corporate users are under-protected, based on vendor market share and their respective scores, which ranged dramatically from 29% to  100%; and even worse for variants. Depending which product you have, you may have significant cause for concern. So, what&#39;s next? &lt;br /&gt;
&lt;br /&gt;
For starters, if you&#39;re an organization with critical data behind any of these products, I suggest you buy and read the full report &lt;a href=&quot;http://nsslabs.com/endpoint-hips-q210&quot;&gt;here&lt;/a&gt;. There has been a lot of press coverage of the report highlights, but not the details, generally reporting failure of AV suites in this area. While you may not be ripping out thousands of endpoint deployments, you may be asking your vendor some tough questions and setting expectations for improvement. Exploit detection &amp;amp; blocking is clearly an area that the security industry needs to focus on going forward. Got questions about other threat mitigation options, consult our &lt;a href=&quot;http://nsslabs.com/&quot;&gt;other reports&lt;/a&gt;, or &lt;a href=&quot;http://nsslabs.com/general/contact-us.html&quot;&gt;contact us&lt;/a&gt;.</description><link>http://nsslabs.blogspot.com/2010/08/client-side-exploits.html</link><author>noreply@blogger.com (Rick Moy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitBoIpv60CKhT462iRYxJq5-dtm3Y7z3laABzQFrZAjOMAQ3uK0UKlV2XVRIYbf7TBCJpcA-Re5xB6cIS-jRXHAYnWcjAgoRp5V6-r-BjLrW5cJYkhIICptgPx0j1hdvdqDNUDrZjalwSA/s72-c/VulnExploitPayload.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-1071451100418192664</guid><pubDate>Fri, 18 Jun 2010 21:05:00 +0000</pubDate><atom:updated>2010-06-18T20:51:25.379-07:00</atom:updated><title>Fragroute – Bug in 24-byte fragmentation</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;In our Q4 2009 IPS test, we tested Network Intrusion Prevention Systems on their ability to resist 60 different evasion techniques, IP Fragmentation (9), TCP Segmentation (11), RPC Fragmentation (16), URL Obfuscation (15), and FTP / Telnet evasions (9).&lt;br /&gt;&lt;br /&gt;On May 19, 2010, TippingPoint brought to our attention a bug in fragroute, the de facto evasion tool for IP fragmentation.  This flaw corrupts one of the evasion techniques – 24 byte fragments.  Over the past few weeks, NSS Labs has retested all of the products from the Q4 2009 IPS Group Test with an alternate version of the tool that does not corrupt traffic when fragmenting into 24-byte segments.&lt;br /&gt;&lt;br /&gt;We found that all of the devices that initially passed this test, continued to pass.  In addition, we determined that TippingPoint does block the 24 byte fragmentation evasion with the non-corrupted attack.  The findings for all other evasion tests remain unaltered.&lt;br /&gt;&lt;br /&gt;The Q4 2009 IPS Group Test is being modified to reflect this update.&lt;br /&gt;&lt;/div&gt;</description><link>http://nsslabs.blogspot.com/2010/06/fragroute-bug-in-24-byte-fragmentation.html</link><author>noreply@blogger.com (Vikram Phatak)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-8776040259577356278</guid><pubDate>Fri, 18 Jun 2010 01:26:00 +0000</pubDate><atom:updated>2010-06-18T14:09:00.975-07:00</atom:updated><title>Approaches to Detecting Evasion</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;When an attacker uses an evasion technique, he is altering traffic so that it cannot be detected by a security product such as a Network IPS.  To accomplish this, the traffic is run through a tool which manipulates the data stream and modifies it using a pre-determined pattern – similar to an encoder.  Thus, to detect the attack, a network IPS needs to do the same in reverse – in essence, decode the data stream.&lt;br /&gt;&lt;br /&gt;Alternatively, an IPS can drop traffic that appears to have been altered (e.g. fragmented or segmented) under the assumption that it is bad.  Unfortunately, this is not the case much of the time since legitimate network traffic comes in all shapes and sizes.  Thus, when vendors elect to drop such traffic instead of normalizing / decoding it and inspecting the content, they drop legitimate traffic.  Knowing this, we have found that multiple vendors turn off those anti-evasion protections by default. This is a problem.&lt;br /&gt;&lt;br /&gt;And this is why NSS Labs tests anti-evasion using vendor default settings.&lt;br /&gt;&lt;br /&gt;Subsequent to our last IPS Group Test, NSS Labs found a loophole in our testing where multiple vendors enabled evasion detection that would block legitimate traffic. These evasion defenses would therefore never be deployed in the real world.  We are therefore adding false positive testing for evasions to our upcoming IPS Group Test scheduled for Q3 2010.&lt;/div&gt;</description><link>http://nsslabs.blogspot.com/2010/06/approaches-to-detecting-evasion.html</link><author>noreply@blogger.com (Vikram Phatak)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-1731546663148305805</guid><pubDate>Thu, 27 May 2010 18:10:00 +0000</pubDate><atom:updated>2010-05-27T11:41:58.089-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Misc</category><category domain="http://www.blogger.com/atom/ns#">PCI Compliance</category><category domain="http://www.blogger.com/atom/ns#">Testing</category><title>Passions of an assessor: Donde esta corazon?</title><description>Michelle is a passionate infosec pro and assessor. She gets some kudos today for expressing on a personal level the frustrations of many infosec practitioners whose job it is to audit, assess and help improve their clients&#39; defenses. PCI DSS forces those who would do little or nothing for security to do something more. It also encourages those who would do more to do less because it is just enough to deal with a clear and present threat: the audit.&lt;br /&gt;&lt;br /&gt;As Josh Corman at the 451 Group likes to say:  “Why focus on compliance instead of security? I might be hacked, but I  will be fined.”  (if you handle cardholder data). Given the amount of client-side attacks and botnet infection data we see, the case could be made otherwise. Corporations are getting attacked daily. They might not be aware of it though, due to the holes in their security defenses, logs, and even alerting practices.&lt;br /&gt;&lt;br /&gt;After all, security products can only alert and report on what they have detections for. Based on our testing, that leaves a significant gap with every vendor, between 12 and 83%. Do you know which holes matter on your network and where they are?  Want to hear ideas on how to improve and not just pass?&lt;br /&gt;&lt;br /&gt;I&#39;m happy to echo Michelle&#39;s call for more heart and less check box.&lt;br /&gt;&lt;br /&gt;Rick&lt;br /&gt;&lt;br /&gt;&lt;cross-posted p=&quot;417&quot;&gt;&lt;/cross-posted&gt;</description><link>http://nsslabs.blogspot.com/2010/05/passions-of-assessor-donde-esta-corazon.html</link><author>noreply@blogger.com (Rick Moy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-5264557384888888171</guid><pubDate>Fri, 14 May 2010 06:24:00 +0000</pubDate><atom:updated>2010-05-13T23:39:19.540-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Testing</category><title>Thanks for breaking it!</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHd3D9Gmrc2BSOWFUiVDfqVbF_yBlsQDt-tcqtvFZTZR_i6CziDd8Fjf4ukjD691-o77lrxgtDkq0t_kBLURCy-2111R5MZtjuLT4ctuP1BfXFS3w7Bl0czvGQHSUb9qeGJathojNi985G/s1600/rubberstamp.jpg&quot;&gt;&lt;img style=&quot;float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 200px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHd3D9Gmrc2BSOWFUiVDfqVbF_yBlsQDt-tcqtvFZTZR_i6CziDd8Fjf4ukjD691-o77lrxgtDkq0t_kBLURCy-2111R5MZtjuLT4ctuP1BfXFS3w7Bl0czvGQHSUb9qeGJathojNi985G/s320/rubberstamp.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5471009760409846914&quot; /&gt;&lt;/a&gt;&lt;br /&gt;People hire us to break stuff (and lately we&#39;re pretty good at it). Well not just, but breaking is part of testing, as is validating You&#39;d think folks wouldn&#39;t want to hire us for that, and a lot of times you&#39;d be right. But, this week, we had a large networking vendor in the lab testing their product. On day 2 we discovered a significant vulnerability that we were able to exploit. We replicated it before their eyes. What did the vendor do? He gave our lead engineer a high five!&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Why? because, after having visited several labs with this same product, we were the first to find something and not simply give it the &#39;rubber stamp.&#39; This is why you test. Not just to validate features, but so you can find out what you still need to do to improve it. Good product developers like this one &quot;get it.&quot; He just got tremendous value out of the engagement, and has already put in proposals on the spot for additional testing with us. And maybe his competitors have similar issues (which is often the case), so now this vendor is ahead of the game and will likely have it fixed very shortly. &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;IT Buyers: This is the attitude you want to see in your vendors.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://nsslabs.blogspot.com/2010/05/thanks-for-breaking-it.html</link><author>noreply@blogger.com (Rick Moy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHd3D9Gmrc2BSOWFUiVDfqVbF_yBlsQDt-tcqtvFZTZR_i6CziDd8Fjf4ukjD691-o77lrxgtDkq0t_kBLURCy-2111R5MZtjuLT4ctuP1BfXFS3w7Bl0czvGQHSUb9qeGJathojNi985G/s72-c/rubberstamp.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-8117167236502906756</guid><pubDate>Fri, 07 May 2010 07:50:00 +0000</pubDate><atom:updated>2010-05-07T01:01:26.534-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">anti-malware</category><category domain="http://www.blogger.com/atom/ns#">Testing</category><title>Measuring Security</title><description>Vik Phatak, CTO participated on a panel discussion at SourceBoston conference titled &quot;Measuring Security&quot;. This discussion explored the ins and outs of testing endpoint protection products, otherwise known as anti-virus/antimalware. Hosted by Andrew Jacquith of Forrester, and also with Peter Stelzhammer of AV-Comparatives, and Mario Vuksan of Reversing Labs. Watch the &lt;a href=&quot;http://www.blip.tv/file/3562554&quot;&gt;video link&lt;/a&gt;.</description><link>http://nsslabs.blogspot.com/2010/05/measuring-security.html</link><author>noreply@blogger.com (Rick Moy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-6725662483736381610</guid><pubDate>Mon, 03 May 2010 18:19:00 +0000</pubDate><atom:updated>2010-05-10T12:20:03.238-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">anti-malware</category><category domain="http://www.blogger.com/atom/ns#">nsslabs</category><category domain="http://www.blogger.com/atom/ns#">Testing</category><title>AV Testing double standards and independence</title><description>NSS Labs’ innovative tests are designed to inform end-users about how products truly perform against today’s motivated attackers. We perform a test or gap analysis on security products, so organizations can understand what is and isn’t being protected, and accurately assess the risk and take steps to mitigate it. While enterprises and government organizations appreciate this valuable, independent analysis, many of the AV vendors do not.&lt;br /&gt;&lt;br /&gt;When NSS Labs published its uncensored, real-world results of endpoint protection products (AV), some vendors used the anti-malware testing standards organization (AMTSO) to try to discredit the test. One of their objections was that we recommend against buying products that scored on the bottom third of our test. Sorry, we unabashedly believe malware protection should indeed be the key purchasing criteria for an AV product. And for vendors who claim their anti-spam on the corporate desktop will improve their protection against socially-engineered malware hosted on web sites, that’s just stretching it.&lt;br /&gt;&lt;br /&gt;Rather than shoot the messenger, vendors with their customer’s best interests in mind should seek to learn from tests like these in order to improve their products. Unfortunately, that’s usually not the case in the AV world after too many years of self-congratulatory testing and certification.&lt;br /&gt;&lt;br /&gt;AMTSO is an AV vendor-driven consortium, and while it can be a useful information sharing organization for AV insiders, it has demonstrated its utter failure as a credible independent organization. Throughout the 3-year history of this organization, AMTSO has failed to evaluate the tests and certifications that most of its vendor members sponsor and fund; e.g. VB100% awards, ICSA Labs and West Coast Labs certifications. These validations are important sales material in the $9B market place, but they wouldn&#39;t pass the same AMTSO guidelines that were supposedly applied to the NSS Labs test.&lt;br /&gt;&lt;br /&gt;Such market validations are a part of the industry, but can be dangerous when they convey a false sense of security to buyers as they do now. Meanwhile, end-users can stay well informed about what products do - and more importantly - what they DO NOT do, by reading our subscriber-funded research and test reports. If a vendor is complaining about our test, chances are they did poorly on an important metric. Learn what some vendors don’t want you to see by reading our independent &lt;a href=&quot;http://nsslabs.com/anti-malware&quot;&gt;anti-malware test reports&lt;/a&gt; or the &lt;a href=&quot;http://nsslabs.com/test-reports/NSSLabs_Vulnerability-based%20Protection-Google-EPPv14.pdf&quot;&gt;Google Aurora protection analysis report&lt;/a&gt; in particular (free to non-clients).&lt;br /&gt;&lt;br /&gt;caveat emptor</description><link>http://nsslabs.blogspot.com/2010/05/av-testing-double-standards-and.html</link><author>noreply@blogger.com (Rick Moy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-6714099045452198688</guid><pubDate>Tue, 16 Mar 2010 01:08:00 +0000</pubDate><atom:updated>2010-03-15T21:37:57.887-07:00</atom:updated><title>Questionable Questions (And Some Answers)</title><description>&lt;p align=&quot;justify&quot;&gt;Normally, NSS Labs does not engage in public disputes over our test results.  However, AVG’s &lt;a href=&quot;http://viruslab.blog.avg.com/2010/03/nss-labs-questionable-report.html&quot;&gt;recent blog post&lt;/a&gt; about our recent Operation Aurora test grossly misrepresents the facts in an apparent attempt to discredit the results and testers.  We have chosen to respond:&lt;br /&gt;&lt;br /&gt;The important fact for AVG’s 110 million users is: AVG Internet Security 9 did not stop the Aurora exploit. This was true when we tested on January 29, 2010.  And it was still true when we re-tested with their latest version on March 12, 2010—nearly two months after the initial attack became public. See for yourself in &lt;a href=&quot;http://www.youtube.com/watch?v=aMnqIhd2Nt8&quot;&gt;this video&lt;/a&gt;  (the exploit executes calc.exe as proof).&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;p align=&quot;justify&quot;&gt;On AVG’s blog, they claim the following:&lt;br /&gt;&lt;/p&gt;&lt;p align=&quot;justify&quot;&gt;&lt;/p&gt;“&lt;span style=&quot;font-style: italic;&quot;&gt;This is a &lt;/span&gt;&lt;a style=&quot;font-style: italic;&quot; href=&quot;http://avg.typepad.com/.a/6a00e5539a1041883401310f91f397970c-pi&quot;&gt;screenshot&lt;/a&gt;&lt;span style=&quot;font-style: italic;&quot;&gt; of AVG blocking  the Aurora 0-day attack from the AVG Labs&lt;/span&gt;.” &lt;p&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p align=&quot;justify&quot;&gt;However if you look &lt;a href=&quot;http://avg.typepad.com/.a/6a00e5539a1041883401310f91f397970c-pi&quot;&gt;closely&lt;/a&gt;, the screenshot AVG presented shows they were using Firefox, not Internet Explorer.  CVE-2010-0249 was a vulnerability in Internet Explorer, not Firefox.  &lt;span style=&quot;font-weight: bold;&quot;&gt;Showing Firefox being &quot;protected&quot; displays a fundamental misunderstanding of the nature of the Aurora attack.&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;font-style: italic;&quot; align=&quot;justify&quot;&gt;&quot;In fact, the exploit is blocked separately by three different security  rules of AVG’s product&quot;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p align=&quot;justify&quot;&gt;We don’t dispute that AVG has rules, but they did not prevent the exploit. This is why proper testing &amp;amp; QA is important. Further, as you can see in the &lt;a href=&quot;http://www.youtube.com/watch?v=aMnqIhd2Nt8&quot;&gt;video&lt;/a&gt; (using Internet Explorer), we found that AVG’s warning appears &lt;span style=&quot;font-weight: bold;&quot;&gt;after&lt;/span&gt; the exploit successfully gained control of the computer and performed remote code execution (calc.exe).&lt;br /&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p align=&quot;justify&quot;&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;/blockquote&gt;AVG has failed to provide any credible evidence that our test results are incorrect.&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;justify&quot;&gt;From the moment that AVG contacted us with concerns, we sought to share the information required for them to reproduce the attack themselves.  The Operation Aurora code was included within the &lt;a href=&quot;http://nsslabs.com/test-reports/NSSLabs_Vulnerability-based%20Protection-Google-EPPv14.pdf&quot;&gt;report itself&lt;/a&gt;.  We have since posted a video on &lt;a href=&quot;http://www.youtube.com/watch?v=aMnqIhd2Nt8&quot;&gt;YouTube&lt;/a&gt;, and we made it clear that the easiest way to reproduce the test was to use the &lt;a href=&quot;http://www.metasploit.com/&quot;&gt;Metasploit Framework&lt;/a&gt;&#39;s built-in (free) Aurora exploit and embed a payload of their choice (such as calc.exe).  With this free, publicly available information, AVG engineers should have been able to reproduce this attack, as their peers at other vendors have.&lt;br /&gt;&lt;br /&gt;However, AVG wanted us to do more…&lt;br /&gt;&lt;br /&gt;During our years of testing, we have found that some vendors have abused the time and trust of testers by not doing their homework before making claims that test results are incorrect.  We stand by our results.  And in cases where vendors insist we have made a mistake, we will work with them to resolve any ambiguities.  If it turns out that the vendor is incorrect, we expect to be compensated for our (consulting) time.  If we made a mistake, we will publicly correct the error and the vendor bears no cost.&lt;br /&gt;&lt;br /&gt;Under these conditions, AVG had nothing to lose if they were confident in their product. That they have chosen a different path speaks volumes.&lt;/p&gt;</description><link>http://nsslabs.blogspot.com/2010/03/whoosh-avg-swings-and-misses.html</link><author>noreply@blogger.com (Vikram Phatak)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-4746397543160149566</guid><pubDate>Sat, 13 Mar 2010 05:22:00 +0000</pubDate><atom:updated>2010-03-13T00:11:16.955-08:00</atom:updated><title>Vulnerabilities, Exploits &amp; Payloads, Oh My!</title><description>&lt;p align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:Calibri,Verdana,Helvetica,Arial;&quot;&gt;&lt;span style=&quot;font-size:11pt;&quot;&gt;Over the past few years at NSS Labs we have interacted with some very smart people and been able to observe which technologies and approaches work better than others. And being immersed in information security product testing, it is easy to forget that not everyone has the same vantage point that we do.&lt;br /&gt;&lt;br /&gt;I was having a conversation recently with a very smart Intel Hardware/Software Engineer when the Google / Aurora attack came up. He said that based upon the explanations from AV community, he assumed that the attack was not stoppable… I assured him that was not the case, and that there is a technical solution that can protect against attacks like Aurora. Host Intrusion Prevention technology exists and works by preventing the vulnerability (in this case CVE-2010-0249) from being exploited. If the vulnerability cannot be exploited, the payload (malware) cannot be delivered.&lt;br /&gt;&lt;br /&gt;So the question is whether it is easier and better to protect against:&lt;br /&gt;&lt;br /&gt;- One (1) vulnerability&lt;br /&gt;- Six (6) exploits&lt;br /&gt;- 55,000+ viruses, Trojans, rootkits and other malware PER DAY&lt;br /&gt;&lt;/span&gt;&lt;/span&gt; &lt;!--EndFragment--&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjh_s_mWRMyRuaF9fM10j8Tnwgyw9S03o_otIpAsxf6aAJrbA2_mBZeqDmBa0_NJd_qbMcKuYBXSpnKbiLagQ3xOh0zCWBAWxVzkAPALaArzIRqkoAqfSXreDwVLuhdU_vKqX8icGVXak4/s1600-h/vuln-exploit-malware-funnel.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 420px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjh_s_mWRMyRuaF9fM10j8Tnwgyw9S03o_otIpAsxf6aAJrbA2_mBZeqDmBa0_NJd_qbMcKuYBXSpnKbiLagQ3xOh0zCWBAWxVzkAPALaArzIRqkoAqfSXreDwVLuhdU_vKqX8icGVXak4/s320/vuln-exploit-malware-funnel.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5447985431711096962&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;!--StartFragment--&gt;&lt;span style=&quot;font-family:Calibri,Verdana,Helvetica,Arial;&quot;&gt;&lt;span style=&quot;font-size:11pt;&quot;&gt;I then shared that in our recent study of seven Endpoint Security (AV) products, only one product (McAfee) protected against Aurora and exploit variants. And that the AV industry as a whole is still focused on chasing malware and, as such, is ill equipped to deal with exploit-based attacks like Operation Aurora.&lt;br /&gt;&lt;br /&gt;So the discussion turned to ways in which someone can be infected with malware from the web. Basically, there are two methods:&lt;br /&gt;&lt;ol&gt;&lt;br /&gt;&lt;li&gt;An attack on the User – &lt;span style=&quot;font-style: italic;&quot;&gt;i.e.&lt;/span&gt; tricking someone to download software that contains malware – video codecs, pirated software, fake AV, etc.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;An attack on the computer – &lt;span style=&quot;font-style: italic;&quot;&gt;i.e.&lt;/span&gt; exploits containing malicious payloads (aka “drive-by” exploits).&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;The first is solved by a combination of user education and reputation systems like those provided in Internet Explorer 8, Firefox, Chrome, etc., which warn people that the software they are about to download is infected. Some AV products have this as well. The second is solved by HIPS. Not AV. Why HIPS? Because true HIPS products protect the vulnerability from exploit. They do this by operating in memory and inspecting data as it streams onto a computer as well as inspecting processes before allowing them to run. Traditional AV products do not do this; which is why AV vendors have purchased HIPS technology over the past few years (McAfee bought Entercept, TrendMicro bought ThirdBrigade, Cisco bought Okena, etc.).&lt;br /&gt;&lt;br /&gt;But, in general, no vendor seems to have uniform integration of HIPS into their endpoint products either on the consumer or corporate side. It clearly takes some time to integrate these technologies. Unfortunately, the marketing message of “proactive protection” has gotten ahead of the technical reality. This is what we found in our Aurora test: &lt;span style=&quot;color: rgb(0, 0, 255);&quot;&gt;&lt;u&gt;&lt;a href=&quot;http://nsslabs.com/test-reports/NSSLabs_Vulnerability-based%20Protection-Google-EPPv14.pdf&quot;&gt;http://nsslabs.com/test-reports/NSSLabs_Vulnerability-based%20Protection-Google-EPPv14.pdf&lt;/a&gt;&lt;/u&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The bottom line is that the best way to solve the “drive-by” problem is for AV vendors to implement true HIPS which prevents a vulnerability from being exploited, and thus a malware payload cannot be delivered.&lt;br /&gt;&lt;br /&gt;-----&lt;br /&gt;&lt;br /&gt;However, nearly two weeks after the attack was made public, one product still does not stop the original exploit, and 85% failed to stop additional exploit variants. Few cyber-security attacks were better publicized than this one. It is concerning that such shallow coverage was delivered. Are lesser publicized but equally dangerous vulnerabilities better protected? Probably not.&lt;br /&gt;&lt;br /&gt;In lieu of applying patches to thousands of machines, IT professionals rely on network and endpoint security products to provide a virtual shield for these vulnerabilities. Patching is usually prioritized and scheduled monthly. Deferring patching without good vulnerability coverage increases risk. When faced with these test results, organizations would be advised to install the Microsoft patch(es) as soon as possible.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://nsslabs.blogspot.com/2010/03/vulnerabilities-exploits-payloads-and.html</link><author>noreply@blogger.com (Vikram Phatak)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjh_s_mWRMyRuaF9fM10j8Tnwgyw9S03o_otIpAsxf6aAJrbA2_mBZeqDmBa0_NJd_qbMcKuYBXSpnKbiLagQ3xOh0zCWBAWxVzkAPALaArzIRqkoAqfSXreDwVLuhdU_vKqX8icGVXak4/s72-c/vuln-exploit-malware-funnel.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-7838382465022155656</guid><pubDate>Sat, 13 Mar 2010 05:02:00 +0000</pubDate><atom:updated>2010-03-12T23:16:14.808-08:00</atom:updated><title>AVG &amp; The Aurora Exploit</title><description>&lt;p align=justify&gt;&lt;span style=&quot;font-family:Calibri,Verdana,Helvetica,Arial;&quot;&gt;&lt;span style=&quot;font-size:11pt;&quot;&gt;Unfortunately,  we have observed that some products rely heavily on file-based  detection (of malware).  These products are scanning for &lt;span style=&quot;font-style: italic;&quot;&gt;payloads&lt;/span&gt; once they hit the disk.  The  problem with this approach is that &lt;span style=&quot;font-style: italic;&quot;&gt;exploits&lt;/span&gt;  occur in memory (&lt;span style=&quot;font-style: italic;&quot;&gt;e.g.&lt;/span&gt; Aurora)  and might never touch the disk.&lt;br /&gt;&lt;br /&gt;We do not know &lt;span style=&quot;font-style: italic;&quot;&gt;why&lt;/span&gt; AVG failed to prevent the Aurora  exploit (which operates in memory).  But we know that it did.  We  observed the exploit successfully gain control of the PC and perform  arbitrary remote code execution (the exploit ran Calc.exe as proof).   And we did observe AVG detect the attack in Internet Explorer&#39;s cache -  after the fact.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;This video  was captured on March 11, 2010.  We turned off automatic updates to  preserve the version in time, which of course caused multiple red blinky  warnings to be issued.  We tested again (see 2nd video below) after  updating to put to rest any FUD.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;object height=&quot;385&quot; width=&quot;480&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/tvrbCe0XjbA&amp;amp;hl=en_US&amp;amp;fs=1&amp;amp;&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://www.youtube.com/v/tvrbCe0XjbA&amp;amp;hl=en_US&amp;amp;fs=1&amp;amp;&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;385&quot; width=&quot;480&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;To be  fair, AVG may have protection for other exploits.&lt;br /&gt;&lt;br /&gt;However, as of  today, nearly 2 months after the story of the attack first broke, a  fully updated AVG still does not provide protection from the the  original Aurora exploit.  What is additionally concerning is that the  product issues a pop-up message telling the user that the threat was  detected and quarantined. See for yourself.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;This video was captured on March 12, 2010.   We turned on automatic updates, plus manually updated to ensure the  latest protection was installed.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;object height=&quot;385&quot; width=&quot;480&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/aMnqIhd2Nt8&amp;amp;hl=en_US&amp;amp;fs=1&amp;amp;&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://www.youtube.com/v/aMnqIhd2Nt8&amp;amp;hl=en_US&amp;amp;fs=1&amp;amp;&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;385&quot; width=&quot;480&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;</description><link>http://nsslabs.blogspot.com/2010/03/exploits-occur-in-memory.html</link><author>noreply@blogger.com (Vikram Phatak)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-4954017597329325</guid><pubDate>Thu, 04 Mar 2010 08:55:00 +0000</pubDate><atom:updated>2010-03-13T01:00:30.061-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">events</category><category domain="http://www.blogger.com/atom/ns#">Exploit</category><category domain="http://www.blogger.com/atom/ns#">Testing</category><title>GroupThink and InfoSec - SecurityBSidesSF</title><description>At about 1:45h into the video, Vik Phatak begins his talk about group think in infosec. It is a well-reasoned argument for more aggressive testing in order to improve our defenses. We present methodologies and results from our testing of IPS and Anti-malware products to make the case that we have much work to do and must stay vigilant and innovative.&lt;br /&gt;&lt;P&gt; &lt;br /&gt;&lt;object classid=&quot;clsid:d27cdb6e-ae6d-11cf-96b8-444553540000&quot; width=&quot;480&quot; height=&quot;386&quot; id=&quot;utv802898&quot; name=&quot;utv_n_787328&quot;&gt;&lt;param name=&quot;flashvars&quot; value=&quot;loc=%2F&amp;amp;autoplay=false&amp;amp;vid=5138815&quot; /&gt;&lt;param name=&quot;allowfullscreen&quot; value=&quot;true&quot; /&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot; /&gt;&lt;param name=&quot;src&quot; value=&quot;http://www.ustream.tv/flash/video/5138815&quot; /&gt;&lt;embed flashvars=&quot;loc=%2F&amp;amp;autoplay=false&amp;amp;vid=5138815&quot; width=&quot;480&quot; height=&quot;386&quot; allowfullscreen=&quot;true&quot; allowscriptaccess=&quot;always&quot; id=&quot;utv802898&quot; name=&quot;utv_n_787328&quot; src=&quot;http://www.ustream.tv/flash/video/5138815&quot; type=&quot;application/x-shockwave-flash&quot; /&gt;&lt;/object&gt;</description><link>http://nsslabs.blogspot.com/2010/03/groupthink-and-infosec-securitybsidessf.html</link><author>noreply@blogger.com (Rick Moy)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7284693229621840678.post-1080544874362893203</guid><pubDate>Mon, 25 Jan 2010 06:13:00 +0000</pubDate><atom:updated>2010-01-24T23:24:01.214-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Exploit</category><category domain="http://www.blogger.com/atom/ns#">vulnerability</category><title>Protecting vulnerability CVE 2010-0249</title><description>On Thursday, 1/21 Microsoft released an out of band patch for CVE-2010-0249; this was the vulnerability that was exploited during the &#39;aurora operation&#39; against Google and 30+ other companies over the last month. The press coverage and political context makes this a high profile attack, and a story rife with confusion and concern amongst CISOs.&lt;br /&gt;&lt;br /&gt;So, we performed some initial testing. On Friday, 1/22 NSS Labs validated that the patch was effective on IE6 on Windows XP, SP2 and IE8 on Windows 7 against multiple variants of the exploit. This means, that the patch appears to cover the vulnerability and multiple variants, and should be applied as soon as possible. The downside is that if you have thousands of PCs, this will take a while, including your own test cycle. Many organizations schedule monthly updates to desktops and servers, so you could be waiting a while.&lt;br /&gt;&lt;br /&gt;And in the mean time? That&#39;s what security products like Network IPS and endpoint protection (which should include Host IPS) are for.  But depending on your vendor&#39;s release schedule, and your acceptance/deployment schedule, some waiting/exposure could be involved as well.</description><link>http://nsslabs.blogspot.com/2010/01/protecting-vulnerability-cve-2010-0249.html</link><author>noreply@blogger.com (Rick Moy)</author></item></channel></rss>