<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-8593126747356640914</id><updated>2025-04-08T22:32:25.085+08:00</updated><category term="Hacking"/><category term="Security News"/><category term="Advisory"/><category term="General"/><category term="Malware"/><category term="Video"/><category term="Tools"/><category term="Patches"/><category term="Internet"/><category term="Encryption"/><category term="SPAM"/><category term="Wireless"/><category term="Challenge"/><category term="Systems"/><category term="Network"/><category term="Book"/><category term="Gadgets"/><category term="Backup"/><title type='text'>Wolf&#39;s Lair</title><subtitle type='html'>&quot;A lair is also referred to as a hideout for a superhero or supervillain&quot;</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>145</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-1197305907672156896</id><published>2021-08-30T22:04:00.005+08:00</published><updated>2021-10-26T21:32:54.540+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><title type='text'>Building High Performance Teams (3 X 3 Framework)</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1mzEkBLXxr4cUtF4eFsf68L6s3NtbwFLje7M3IrXajM9DDgZ3pwg8Fa9J6Spj42KxLLmdVxs8wUdClp9llZ8Vxftorcv8dqUUsqu46ufDcirhYfq_6jXiHG5zCBHNK8QtmD_53QqIGSk/s300/Teams.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;168&quot; data-original-width=&quot;300&quot; height=&quot;224&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1mzEkBLXxr4cUtF4eFsf68L6s3NtbwFLje7M3IrXajM9DDgZ3pwg8Fa9J6Spj42KxLLmdVxs8wUdClp9llZ8Vxftorcv8dqUUsqu46ufDcirhYfq_6jXiHG5zCBHNK8QtmD_53QqIGSk/w400-h224/Teams.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;When we talk about building a high performance teams, it will always be revolving around these five key characteristics. Trust, Clear Communication, Defined Roles and Responsibilities, Engaged Leadership and Collective Goals.&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Trust&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;This is the key factor that differentiate between the high performing team over the average one. With Trust, they will be more comfortable in taking risks and working through challenges and conflicts positively&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;Clear Communication&lt;/b&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span&gt;High performing teams find ways to streamline and optimise communication. They know when to call, when to IM, when to email or even pop by your desk. They may also use technology to stay organised and track progresses.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;Defined Rules and Responsibilities&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;Clearly defined roles and responsibilities eliminates confusion. when team members knows their roles and responsibilities well, this prevent conflicts, which will maximize productivity.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;b style=&quot;font-size: large;&quot;&gt;Engaged Leadership&lt;/b&gt;&lt;br /&gt;Being Engaged is not micro-managed. It is about providing direction and full support to help the team to succeed. An engaged leader provide positive working environment thru regular communication and building trust and respect among the team.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;Collective Goals&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;Even though each team member has their own responsibilities, but they all are collectively working towards one main goal and contributes to the overall success. High performing teams will step in to help each other to ensure all goals are met.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;u&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;3 X 3 Framework&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;/p&gt;&lt;p&gt;Recently, I came across a interesting idea on building high performing team. it changes my understanding on how goals and roles should be defined and how a high performing team should be.&lt;/p&gt;&lt;p&gt;It uses a 3 x 3 framework.There are three foundations that team needs have in place - &lt;b&gt;Goals&lt;/b&gt;,&lt;b&gt; Roles &lt;/b&gt;and&lt;b&gt; Norms&lt;/b&gt;. Then the three elements of ongoing reflection and change - &lt;b&gt;Commit&lt;/b&gt;, &lt;b&gt;Check&lt;/b&gt; and &lt;b&gt;Close&lt;/b&gt;, to maintain peak performance.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Goals&lt;/b&gt;&lt;br /&gt;This is main direction for the team. Getting agreement on where the project goes and what to accomplish. Importantly, each team member should have a personal &quot;what&#39;s in it for me&quot; connection to the goal.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Roles&lt;/b&gt;&lt;br /&gt;Being clear about who is doing what specific activities and how these tasks overlap. In a real team, there should be overlap of tasks. If there are only parallel activities, we only get a &quot;co-acting group&quot; not a team.&amp;nbsp;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Norms&lt;/b&gt;&lt;br /&gt;Norms are ground rules in areas such as information-sharing, decision-making, and conflict-resolution. Others common norms such as respecting each others, avoid hidden agendas are also important.&lt;/p&gt;&lt;p&gt;The ongoing 3 steps function:&lt;br /&gt;&lt;b&gt;Commit&lt;/b&gt; - Have good conversation with the team. Getting the team to &lt;i&gt;commit to the explicit goals, roles and norms.&lt;/i&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;i&gt;Check&lt;/i&gt; &lt;/b&gt;- As our day to day working in multiple teams and/or projects, there are too many distraction, we tend to lose focus and slowly drift from the goals, roles and norms. &lt;i&gt;Check in &lt;/i&gt;from time to time. Revisit the committed goals, roles and norms.&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;i&gt;Close&lt;/i&gt; &lt;/b&gt;- As we revisit the goals and commitment, we may find misalignment among the team. We will work to &lt;i&gt;close the gap&lt;/i&gt;. Taking small steps on targeted and specific changes.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgETeYPt7A461LR61otCBLQoqkJE4DBdDUjQKIG-3WFX1MPWXczV_g4QOtELCHv-mJ3DZnNk_ZR7uWFHdcqiPTQ8KF2Uzb2SRW1OwycsnuU9kzvWMK-lGHsEC3vrwMpqSBCf0INjKkJTCw/s460/3x3+framework.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;428&quot; data-original-width=&quot;460&quot; height=&quot;298&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgETeYPt7A461LR61otCBLQoqkJE4DBdDUjQKIG-3WFX1MPWXczV_g4QOtELCHv-mJ3DZnNk_ZR7uWFHdcqiPTQ8KF2Uzb2SRW1OwycsnuU9kzvWMK-lGHsEC3vrwMpqSBCf0INjKkJTCw/s320/3x3+framework.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Some advice for the high performing team,&lt;br /&gt;- Have good conversations among the team. &lt;br /&gt;- Focus on a few things rather than a lot of things. Teams get overwhelm.&lt;br /&gt;- Paying attention on whats going on in the team.&lt;/p&gt;&lt;p&gt;Common problems&lt;br /&gt;- Relying too much on one person.&lt;br /&gt;- Focus too much on a plan but not thinking about the execution and organising people around that plan.&lt;br /&gt;- Not paying too much attention on individual role.&lt;/p&gt;&lt;p&gt;Finally , leader of high performing team should create a &quot;&lt;i&gt;Psychological Safety&lt;/i&gt;&quot; environment, which member will feel &quot;safe&quot; to share their thoughts, able to be creative. To create this environment, you need to build trust in the team, having good one on one conversations, be a good listener and by showing empathy, showing that you care.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;Related Articles:&lt;br /&gt;- &lt;a href=&quot;https://www.forbes.com/sites/ashiraprossack1/2021/01/31/5-key-characteristics-of-high-performing-teams/amp/&quot; target=&quot;_blank&quot;&gt;Forbes: 5 Key Characteristics Of High Performing Teams&amp;nbsp;&lt;/a&gt;&lt;br /&gt;- &lt;a href=&quot;https://www.forbes.com/sites/adamgordon/2016/07/08/teamwork-lab-at-wharton/amp/&quot; rel=&quot;nofollow&quot;&gt;Forbes:&amp;nbsp;&#39;Committed Teams&#39; Captures Spirit Of Wharton Teamwork Lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/1197305907672156896/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/1197305907672156896' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/1197305907672156896'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/1197305907672156896'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2021/08/building-high-performance-teams-3-x-3.html' title='Building High Performance Teams (3 X 3 Framework)'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1mzEkBLXxr4cUtF4eFsf68L6s3NtbwFLje7M3IrXajM9DDgZ3pwg8Fa9J6Spj42KxLLmdVxs8wUdClp9llZ8Vxftorcv8dqUUsqu46ufDcirhYfq_6jXiHG5zCBHNK8QtmD_53QqIGSk/s72-w400-h224-c/Teams.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-1955358888312353772</id><published>2021-08-21T23:42:00.002+08:00</published><updated>2021-08-23T20:44:10.590+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><title type='text'>How to be a CISO?</title><content type='html'>Being a Certified Information Systems Security Professional (CISSP) and Certified Infirmation Security Manager (CISM) for more than 10 over years. I have been wondering recently, on the quality of being a Chief Information Security Officer (CISO).&amp;nbsp;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;There are many aspects and view on how to be a CISO. EC-Council, one of the leading IT Security training and certification organisation, provide a training and certification program called the Certified Chief Information Security Officer - C|CISO. It is based on the &lt;a href=&quot;https://ciso.eccouncil.org/wp-content/uploads/2020/01/CCISO-v3-Courseware-Table-of-Contents-1.pdf&quot; target=&quot;_blank&quot;&gt;EC-Council CCISO Body of Knowledge&lt;/a&gt;, which covers five Information Security Management Domains:&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Governance and Risk Management&amp;nbsp;&lt;/li&gt;&lt;li&gt;Information Security Controls, Compliance and Audit Management&amp;nbsp;&lt;/li&gt;&lt;li&gt;Security Program Management and Operations&amp;nbsp;&lt;/li&gt;&lt;li&gt;Information Security Core Competencies&amp;nbsp;&lt;/li&gt;&lt;li&gt;Strategic Planning, Finance, Procurement and Vendor Management&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;Whereas (ISC)2 seems to have a more interesting view. They have the idea of CISO Mind Map, which contains seven phases.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlR_iqzYjAtzGnQuP_OvtBJ4f41mYYUt12qO1bDdIcPe4BOUwIXqN2yshiYhP6lF2yJT5lTb__pvzygR5VK0UuVwmsZO3nDkgn-7mg4gmRW0raeUAhYWccQT_s6fL2fxb0L_dev6xRVh4/s1721/CISO+mind+Map.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1192&quot; data-original-width=&quot;1721&quot; height=&quot;278&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlR_iqzYjAtzGnQuP_OvtBJ4f41mYYUt12qO1bDdIcPe4BOUwIXqN2yshiYhP6lF2yJT5lTb__pvzygR5VK0UuVwmsZO3nDkgn-7mg4gmRW0raeUAhYWccQT_s6fL2fxb0L_dev6xRVh4/w400-h278/CISO+mind+Map.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;It start off with the Architecture, the Framework, the Risk Assessments and the Governance. Then the Threat Intelligence and Vulnerability Assessments fits into the Security Operations and finally to have continuing Education.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;u&gt;Architecture&lt;/u&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;It is the foundation for the CISO. He got to make sure he understand the enterprise information architecture. How is the network been designed (e.g. where is the DMZ. Are the firewall and control place correctly?). He have to make sure all the part in the architecture fits well and defensible.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;u&gt;Framework&lt;/u&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Framework is useful to help in designing the architecture. There are many different types of framework, from ISO to NIST. Each framework helps to serve a specific purpose, which guide and protect your infrastructure. CISO need to find the right frameworks that fits the architecture in place.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;u&gt;Risk Assessments and Governance&lt;/u&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;CISO going to be identifying risks, eliminating or mitigating them, together with the Governance Committee. CISO need to based on the architecture, the frameworks, the control objectives and the use of risk assessments to present a clear picture on how secure they are, to the Governance Committee.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;u&gt;Threat Intelligence and Vulnerability Assessments&lt;/u&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;Threat intelligence constantly feeding from multiple sources. Vulnerability assessments are using those threats and make determinations if there are really a problem. CISO need to work on the taken threat intelligence, the vulnerability assessments to risk assessed and come to conclusion.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;u&gt;Security Operations&lt;/u&gt;&lt;/div&gt;&lt;div&gt;CISO needs to have great&amp;nbsp;business impact analysis. The foundation of that is to make sure&amp;nbsp;business continuity and disaster recovery are well taken care of. Security Operation also includes the managing of critical systems based on their threat intelligence and vulnerability assessments.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;u&gt;Education&lt;/u&gt;&lt;br /&gt;&lt;div&gt;CISO needs to present education budget. He need to show that education is not optional, highlight why his team needs to have certain courses, why these certifications are important and why constant training is required.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Related Links:&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://ciso.eccouncil.org/&quot; target=&quot;_blank&quot;&gt;EC-Council’s Certified Chief Information Security Officer Program&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://www.isc2.org/Development/Immersive-Courses/Creating-Path-to-CISO&quot; target=&quot;_blank&quot;&gt;(ISC)2 -&amp;nbsp;Creating Your Path to CISO&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/1955358888312353772/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/1955358888312353772' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/1955358888312353772'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/1955358888312353772'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2021/08/how-to-be-ciso.html' title='How to be a CISO?'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlR_iqzYjAtzGnQuP_OvtBJ4f41mYYUt12qO1bDdIcPe4BOUwIXqN2yshiYhP6lF2yJT5lTb__pvzygR5VK0UuVwmsZO3nDkgn-7mg4gmRW0raeUAhYWccQT_s6fL2fxb0L_dev6xRVh4/s72-w400-h278-c/CISO+mind+Map.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-8996710573258337964</id><published>2020-11-08T18:05:00.005+08:00</published><updated>2021-08-23T20:45:59.206+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><title type='text'>What is Attack Surface Management?</title><content type='html'>&lt;p&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span face=&quot;proxima-nova, sans-serif&quot;&gt;&lt;b&gt;Attack surface &lt;/b&gt;is about&amp;nbsp;all possible security risk exposures, especially all internet-accessible external assets that adversary could discover and gain foothold into your environment.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span face=&quot;proxima-nova, sans-serif&quot;&gt;&lt;b&gt;Attack Surface&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span face=&quot;proxima-nova, sans-serif&quot; style=&quot;background-color: white;&quot;&gt;&lt;b&gt;Management&lt;/b&gt; (ASM) &lt;/span&gt;&lt;span face=&quot;proxima-nova, sans-serif&quot;&gt;is an emerging category of solutions&amp;nbsp;&lt;/span&gt;&lt;span face=&quot;proxima-nova, sans-serif&quot;&gt;that use an external attacker’s perspective to help organizations better&amp;nbsp;&lt;/span&gt;&lt;span face=&quot;proxima-nova, sans-serif&quot;&gt;manage these type of risk exposures.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;proxima-nova, sans-serif&quot;&gt;T&lt;/span&gt;&lt;span face=&quot;proxima-nova, sans-serif&quot; style=&quot;background-color: white;&quot;&gt;hese include:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span face=&quot;proxima-nova, sans-serif&quot; style=&quot;background-color: white;&quot;&gt;Continuous discovery and Inventory of unknown assets (Cloud and shadow IT)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span face=&quot;proxima-nova, sans-serif&quot; style=&quot;background-color: white;&quot;&gt;Classification and P&lt;/span&gt;&lt;span face=&quot;proxima-nova, sans-serif&quot; style=&quot;background-color: white;&quot;&gt;rioritization of risk and vulnerabilities&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span face=&quot;proxima-nova, sans-serif&quot; style=&quot;background-color: white;&quot;&gt;Continuous monitoring of assets and Threat Intelligence&lt;/span&gt;&lt;span face=&quot;proxima-nova, sans-serif&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Is ASM a&lt;i&gt; Asset Management&lt;/i&gt;? or is it &lt;i&gt;Vulnerability Management&lt;/i&gt;?&lt;br /&gt;It is actually more of a Risk Management with the following Use Cases.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Identifying and visualizing external gaps&lt;/li&gt;&lt;li&gt;Discovering of unknown assets&lt;/li&gt;&lt;li&gt;Attack Surface risk management&lt;/li&gt;&lt;li&gt;Risk-based vulnerability prioritization&lt;/li&gt;&lt;li&gt;Assessing Mergers and Acquisitions (M&amp;amp;A), and subsidiary risk&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Evaluating of Attack Surface Management&amp;nbsp;&lt;/b&gt;&lt;div&gt;SANS recently released a guide on evaluating ASM solution. the guide discuss about 2 major requirements: Product and Operational requirements&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;u&gt;Product requirement&lt;/u&gt;&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Automated Discovery - An advanced algorithm capable of building a map of assets with minimal input and limited false positives.&lt;/li&gt;&lt;li&gt;Continuous Monitoring - Ability to detect change by frequently scanning the attack surface. When an asset is removed, the ASM solution should maintain the information in the database for historical purposes.&lt;/li&gt;&lt;li&gt;&lt;/li&gt;&lt;li&gt;Risk Based Management - Create and maintain a risk score for each asset that combines the ASM provider’s external threat assessment with user provided information on relative business value, impact and remediation status.&lt;/li&gt;&lt;/ul&gt;&lt;u&gt;Operational requirement&lt;/u&gt;&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Alerting - Ability to monitor and alert on changes.&lt;/li&gt;&lt;li&gt;&lt;/li&gt;&lt;li&gt;Enterprise Management - ASM solutions should include basic enterprise management capabilities that enable large teams and organizations to operationalize the solution.&lt;/li&gt;&lt;li&gt;&lt;/li&gt;&lt;li&gt;Interoperability &amp;amp; Integrations - Supports third party integrations and custom development using a provided API.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Related Link:&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;a href=&quot;https://www.sans.org/reading-room/whitepapers/analyst/guide-evaluating-attack-surface-management-39905&quot; target=&quot;_blank&quot;&gt;The SANS Guide to Evaluating Attack Surface Management&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/8996710573258337964/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/8996710573258337964' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/8996710573258337964'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/8996710573258337964'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2020/11/what-is-attack-surface-management.html' title='What is Attack Surface Management?'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-3352985360954049259</id><published>2016-08-09T22:56:00.000+08:00</published><updated>2016-08-10T22:58:14.223+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="Video"/><title type='text'></title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7B9wRadTcAx7KQSY-bMKExxH78rt_SYKfFmOVFe5XFs_nAj35gv68gMjiArn0AfaAOLYqqRjzsBaOFRIn7rVGVzWSoogCYTy7T5_nKgi9F-LVHRy8hjmi0OkyrulAVel6IoGxJhaKSdg/s1600/themos.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7B9wRadTcAx7KQSY-bMKExxH78rt_SYKfFmOVFe5XFs_nAj35gv68gMjiArn0AfaAOLYqqRjzsBaOFRIn7rVGVzWSoogCYTy7T5_nKgi9F-LVHRy8hjmi0OkyrulAVel6IoGxJhaKSdg/s1600/themos.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Trane ComfortLink XL850 thermostats running firmware version 3.1 or lower are vulnerable to information disclosure and remote access due to a weak authentication mechanism and hardcoded credentials. The device uses a custom protocol and a predictable port number to administer remote access to virtually all of the device functions. When you combine hardcoded credentials with a network accessible port, you have a device ripe for attack from the network or even an attack from the Internet if the thermostat is exposed through the router.&lt;br /&gt;
&lt;br /&gt;
Once an attacker has gained access they can quickly extract all information from the device including the home heating and cooling schedule, current operation mode, current temperature, chat and alarm history, serial number, active socket connections, trusted URLs, secret IDs, software version info and detailed address and installer information. These will allow attackers to perform a number of dangerous operations. This includes forcing the device to maintain the maximum heating setting or disabling the device continuously thereby overriding user input. Attackers can also remove and create trusted server connections permanently disconnecting the device from the corporate command and control servers.&lt;br /&gt;
&lt;br /&gt;
Below shows the exploit that affect the device. The &quot;Get Connected&quot; banner at the top of the screen is a marketing prompt indicating that the device is not enrolled in any remote services or special features.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/7AWIqYAHYak/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/7AWIqYAHYak?feature=player_embedded&quot; width=&quot;420&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/3352985360954049259/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/3352985360954049259' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/3352985360954049259'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/3352985360954049259'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2016/08/trane-comfortlink-xl850-thermostats.html' title=''/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7B9wRadTcAx7KQSY-bMKExxH78rt_SYKfFmOVFe5XFs_nAj35gv68gMjiArn0AfaAOLYqqRjzsBaOFRIn7rVGVzWSoogCYTy7T5_nKgi9F-LVHRy8hjmi0OkyrulAVel6IoGxJhaKSdg/s72-c/themos.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-77210661689831032</id><published>2016-06-07T23:00:00.000+08:00</published><updated>2016-06-07T23:00:40.053+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Video"/><title type='text'>Hacking of Facebook Messenger</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqiTAhErFhtDAFZFilv1c9JJM0vFJNUbPqLwiO9gx2z72h-PPo9Ptb0fWf_5CVtD5IIZSj4WnO8n48BguutpvoxlkQi5HOQNalMkn2wBTsxpulNoyzldTPeO8rZldsoHh2WX5_-SnlPHE/s1600/fbchat.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqiTAhErFhtDAFZFilv1c9JJM0vFJNUbPqLwiO9gx2z72h-PPo9Ptb0fWf_5CVtD5IIZSj4WnO8n48BguutpvoxlkQi5HOQNalMkn2wBTsxpulNoyzldTPeO8rZldsoHh2WX5_-SnlPHE/s200/fbchat.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Recently Check Point disclosed a vulnerability found in Facebook Messenger, it allows an attacker to change conversation thread in the Facebook messenger.&lt;br /&gt;
&lt;br /&gt;
Hacker can manipulate message history of a conversation to claim he had reached a falsified agreement with the victim, or simply change its terms.&lt;br /&gt;
&lt;br /&gt;
Hackers can tamper, alter or hide important information in Facebook chat communications which can have legal repercussions. These chats can be admitted as evidence in legal investigations and this vulnerability opened the door for an attacker to hide evidence of a crime or even incriminate an innocent person.&lt;br /&gt;
&lt;br /&gt;
This vulnerability can also be used as a malware distribution. An attacker can change a legitimate link or file into a malicious one, and easily persuade the user to open it. The attacker can use this method later on to update the link to contain the latest C&amp;amp;C address.&lt;br /&gt;
&lt;br /&gt;
Below is the demo of the hack&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/0eEq09cQtx0/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/0eEq09cQtx0?feature=player_embedded&quot; width=&quot;420&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/77210661689831032/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/77210661689831032' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/77210661689831032'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/77210661689831032'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2016/06/hacking-of-facebook-messenger.html' title='Hacking of Facebook Messenger'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqiTAhErFhtDAFZFilv1c9JJM0vFJNUbPqLwiO9gx2z72h-PPo9Ptb0fWf_5CVtD5IIZSj4WnO8n48BguutpvoxlkQi5HOQNalMkn2wBTsxpulNoyzldTPeO8rZldsoHh2WX5_-SnlPHE/s72-c/fbchat.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-5313297049204288660</id><published>2016-06-06T22:12:00.000+08:00</published><updated>2016-06-07T23:07:08.284+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Video"/><title type='text'>Hijack and Impersonate Whatsapp account</title><content type='html'>Attacker are able to hijack a Whatsapp account and impersonate as the legitimate user.&lt;br /&gt;
How they do it? &amp;nbsp;There is actually a vulnerability in&amp;nbsp;Signaling System 7 (SS7), a global network of carriers that acts as a central hub to connect the world. The attack is done by tricking the telecom network into believing the attacker’s phone has the same number as the target’s.&lt;br /&gt;
&lt;br /&gt;
The attacker would now create a new WhatsApp account and receive the secret code that authenticates their phone as the legitimate account holder.Once complete, the attacker now controls the account, including the ability to send and receive messages.&lt;br /&gt;
&lt;br /&gt;
Below is a demo of the attack.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/wqvat0UQu44/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/wqvat0UQu44?feature=player_embedded&quot; width=&quot;420&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
You can find my previous post on extracting messages from Whatsapp in &quot;&lt;a href=&quot;http://werew01f.blogspot.sg/2012/05/can-you-extract-message-and-photo-from.html&quot;&gt;Can you extract message and photo from Whatsapp?&lt;/a&gt;&quot;&lt;br /&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/5313297049204288660/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/5313297049204288660' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/5313297049204288660'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/5313297049204288660'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2016/06/hijack-and-impersonate-whatsapp-account.html' title='Hijack and Impersonate Whatsapp account'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/wqvat0UQu44/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-5485177405202601832</id><published>2016-06-04T15:00:00.000+08:00</published><updated>2016-06-07T22:14:34.255+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Advisory"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Video"/><title type='text'>Hacking of LG handphone</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEja0yXhXziPBkEuAkdBYBynQOPphjvS3xopMkS9fyrDNSYbBzVRw0K61j087hgC0DB_u3yinBg6LyqPeauljaHsHyVqgEDjSi_yQHqqUzMojHERJKAl7PPu-sK8zLdN2Fq2OiHaf5mysNg/s1600/LG+logo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;98&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEja0yXhXziPBkEuAkdBYBynQOPphjvS3xopMkS9fyrDNSYbBzVRw0K61j087hgC0DB_u3yinBg6LyqPeauljaHsHyVqgEDjSi_yQHqqUzMojHERJKAl7PPu-sK8zLdN2Fq2OiHaf5mysNg/s200/LG+logo.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; margin-bottom: 9.5px;&quot;&gt;
&lt;span style=&quot;color: #333333;&quot;&gt;&lt;span style=&quot;line-height: 24px;&quot;&gt;Check Point disclosed today two vulnerabilities (CVE-2016-3117, CVE-2016-2035) which can be used to elevate privileges on LG mobile devices to attack them remotely at the LayerOne 2016 conference in Los Angeles.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333;&quot;&gt;&lt;span style=&quot;line-height: 24px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #333333;&quot;&gt;&lt;span style=&quot;line-height: 24px;&quot;&gt;The first vulnerability allows a malicious app installed on an LG device to abuse the lack of bind permissions in an LG service and to elevate its privileges, allowing additional control of the device.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333;&quot;&gt;&lt;span style=&quot;line-height: 24px;&quot;&gt;The second vulnerability allows a remote attacker to delete or modify SMS messages received on a device. Attacker could use it to conduct credential theft or to fool a user into installing a malicious app. The attacker could modify a user’s unread SMS messages and add a malicious URL to redirect the user to download a malicious app or to a fake overlay to steal credentials.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333;&quot;&gt;&lt;span style=&quot;line-height: 24px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #333333;&quot;&gt;&lt;span style=&quot;line-height: 24px;&quot;&gt;Steps to mitigate the risk of this attack:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333;&quot;&gt;&lt;span style=&quot;line-height: 24px;&quot;&gt;- Verify&amp;nbsp;any app installation request before accepting it to make sure it is legitimate.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333;&quot;&gt;&lt;span style=&quot;line-height: 24px;&quot;&gt;-&amp;nbsp;Use a personal mobile security solution that monitors your device for any malicious behavior.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: #333333; font-size: 16px; line-height: 1.5;&quot;&gt;
- Lookout for LG latest update on these vulnerabilities and patch it immediately&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-size: 16px; line-height: 1.5;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-size: 16px; line-height: 1.5;&quot;&gt;
Below is the video demo of the remote attack.&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/INqsk2CLvtI/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/INqsk2CLvtI?feature=player_embedded&quot; width=&quot;420&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: DIN-light, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 1.5; margin-bottom: 9.5px;&quot;&gt;
&lt;br /&gt;
For more details of these vulnerabilities, visit &quot;OEMs Have Flaws Too: Exposing Two New LG Vulnerabilities&quot;&lt;br /&gt;
http://blog.checkpoint.com/2016/05/29/oems-have-flaws-too-exposing-two-new-lg-vulnerabilities/&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: DIN-light, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 1.5; margin-bottom: 9.5px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: DIN-light, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 1.5; margin-bottom: 9.5px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/5485177405202601832/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/5485177405202601832' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/5485177405202601832'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/5485177405202601832'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2016/06/hacking-of-lg-handphone.html' title='Hacking of LG handphone'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEja0yXhXziPBkEuAkdBYBynQOPphjvS3xopMkS9fyrDNSYbBzVRw0K61j087hgC0DB_u3yinBg6LyqPeauljaHsHyVqgEDjSi_yQHqqUzMojHERJKAl7PPu-sK8zLdN2Fq2OiHaf5mysNg/s72-c/LG+logo.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-5588756749289722369</id><published>2014-12-20T16:32:00.000+08:00</published><updated>2015-01-16T16:49:20.668+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Advisory"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>Misfortune Cookies Vulnerability</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj59onF8-QImfTIUkFXOfK2Y3-JF5RRvWgyu330GXxb3qrpcyNQZCZ4NcKiD1Q_KFvN_rte-Zj3ed6W8dkkudMQdQCxo1F2fLTzHcgKUh-RyUmm9t8M1IHnf79sErr8zuhpYZ9ihjnNBK4/s1600/misfortune-cookie.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj59onF8-QImfTIUkFXOfK2Y3-JF5RRvWgyu330GXxb3qrpcyNQZCZ4NcKiD1Q_KFvN_rte-Zj3ed6W8dkkudMQdQCxo1F2fLTzHcgKUh-RyUmm9t8M1IHnf79sErr8zuhpYZ9ihjnNBK4/s1600/misfortune-cookie.png&quot; height=&quot;200&quot; width=&quot;182&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;As everybody was focusing on
the Sony hacking incident, there was a vulnerability that is affecting over 12 million
Internet routers located in 189 countries across the globe been announced. At
least over 200 different models of the devices are vulnerable. These lists of
vulnerable devices consist of companies such as ASUS, D-Link, Edimax, Huawei,
TP-Link, ZTE, and ZyXEL.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;This vulnerability, which is
discovered by the researchers from Check Point’s Malware and Vulnerability
Research Group, called it &quot;Misfortune Cookie vulnerability&quot;. It is exploitable
due to an error within the HTTP cookie management mechanism in the affected
software. It allows an attacker to determine the ‘fortune’ (critical
information) of a request by manipulating cookies. Attackers can then send
specially crafted HTTP cookies that exploit the vulnerability to corrupt memory
and alter the application state, which will trick the device’s web server to
treat the current session with administrative privileges.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;The actual vulnerability lies
on the software that is the embedded web server RomPager from AllegroSoft.
Devices running RomPager services with versions before 4.34 are vulnerable.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;So what can you do with the
exploit of this vulnerability? With administrative access to your device, an
attacker could take control over your wired and/or wireless network
infrastructure. Depending on your gateway device, there may be risk of
Man-in-The-Middle attacks, provide a possible attack vector for LAN-side
vulnerabilities, and also gave the attacker the ability to extract useful
information from the network connections from your devices.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;With information extracted
from your network, it also provide the stage for further attacks, such as
installing malware on devices and making permanent configuration changes the
bypassing gateway protection just as firewall or network isolation of your
local network.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;Since this is one of the
most widespread vulnerabilities revealed in recent years, how can we mitigate
it? There is actually a patch to the vulnerable software. AllegroSoft issued a
fixed version to address this “Misfortune Cookie vulnerability” in 2005. It is advice
to check with the device vendor if the patched firmware is already available.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;But there is always this
common issue of device vendors taking too long to patch up their firmware. Even
if the patch of the vulnerable software available, they need to integrate this
patch into their device firmware, test to make sure nothing breaks and then
make it available which normally takes a long time. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span lang=&quot;EN&quot; style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.0pt; line-height: 115%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: SimSun; mso-fareast-language: ZH-CN; mso-fareast-theme-font: minor-fareast;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
















&lt;span lang=&quot;EN&quot; style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.0pt; line-height: 115%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: SimSun; mso-fareast-language: ZH-CN; mso-fareast-theme-font: minor-fareast;&quot;&gt;Other mitigation that
can be considered will be to deploy Intrusion Prevention Systems (IPS) in front
of your device. There are IPS signatures available for this vulnerability
(CVE-2014-9222 and CVE-2014-9223).&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;EN&quot; style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.0pt; line-height: 115%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: SimSun; mso-fareast-language: ZH-CN; mso-fareast-theme-font: minor-fareast;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span lang=&quot;EN&quot; style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.0pt; line-height: 115%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: SimSun; mso-fareast-language: ZH-CN; mso-fareast-theme-font: minor-fareast;&quot;&gt;Reference:&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;EN&quot; style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.0pt; line-height: 115%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: SimSun; mso-fareast-language: ZH-CN; mso-fareast-theme-font: minor-fareast;&quot;&gt;&lt;a href=&quot;http://sc1.checkpoint.com/misfortune-cookie/index.html&quot; target=&quot;_blank&quot;&gt;Misfortune Cookie&lt;/a&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/5588756749289722369/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/5588756749289722369' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/5588756749289722369'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/5588756749289722369'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2014/12/misfortune-cookies-vulnerability.html' title='Misfortune Cookies Vulnerability'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj59onF8-QImfTIUkFXOfK2Y3-JF5RRvWgyu330GXxb3qrpcyNQZCZ4NcKiD1Q_KFvN_rte-Zj3ed6W8dkkudMQdQCxo1F2fLTzHcgKUh-RyUmm9t8M1IHnf79sErr8zuhpYZ9ihjnNBK4/s72-c/misfortune-cookie.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-4110640901064828905</id><published>2013-10-19T15:00:00.000+08:00</published><updated>2013-10-19T15:23:46.653+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>Information Leakage and Improper Error Handling</title><content type='html'>Information leakage and improper error handling used to be in the OWASP Top 10 2004 and 2007. But they have rename to &quot;&lt;a href=&quot;https://www.owasp.org/index.php/Top_10_2013-A5-Security_Misconfiguration&quot; target=&quot;_blank&quot;&gt;Security Misconfiguration&lt;/a&gt;&quot; since 2010 and with a wider scope.&lt;br /&gt;
&lt;br /&gt;
While doing my online shopping today, I accidentally triggered an SQL query timeout error. The error page review quite a number of information, which can be useful for the programmer to carry out troubleshooting. But best of all, it also provide the hacker with information to carry out the next level of &quot;attack&quot; to the server.&lt;br /&gt;
&lt;br /&gt;
The error page provides table information, file paths that helps in launching SQL injections and XSS attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFW9vs8zqaA1rk6EZ2aFlKR3BHtTVY7JVLUarO7_1M0ioGcHySec5vlbHtSPDM7nxXzD_FMK2lTVo-wMAgCPYeo5i6v0WN9BTOwFMJD5t-hRxvXXPXAclA4Le2S5rJKoRGHyvuj56Tk-4/s1600/apps+error-edit.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;268&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFW9vs8zqaA1rk6EZ2aFlKR3BHtTVY7JVLUarO7_1M0ioGcHySec5vlbHtSPDM7nxXzD_FMK2lTVo-wMAgCPYeo5i6v0WN9BTOwFMJD5t-hRxvXXPXAclA4Le2S5rJKoRGHyvuj56Tk-4/s400/apps+error-edit.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The error page also shows the application that the server is using and its version number. Based on the information, the Microsoft .NET framework version is not the latest. It may contains critical vulnerability that allows elevation of privileges and remote code execution. 
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEmsLrB6ib_HUhgLnG39fnLp3Hu3k-5U39NioE-nSHmHlZmO8XXzDai_m0IZqhtbDXoaznKKK6uRz0WxyveTKi8keg4F1zvpvxJTzKL9kOW-xjwwD8jH6_58cwScydwG7mycXJNLIODvo/s1600/apps+error1.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;58&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEmsLrB6ib_HUhgLnG39fnLp3Hu3k-5U39NioE-nSHmHlZmO8XXzDai_m0IZqhtbDXoaznKKK6uRz0WxyveTKi8keg4F1zvpvxJTzKL9kOW-xjwwD8jH6_58cwScydwG7mycXJNLIODvo/s400/apps+error1.JPG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Planning to inform the Site administrator on this issues and nobody hacked it yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/4110640901064828905/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/4110640901064828905' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/4110640901064828905'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/4110640901064828905'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2013/10/information-leakage-and-improper-error.html' title='Information Leakage and Improper Error Handling'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFW9vs8zqaA1rk6EZ2aFlKR3BHtTVY7JVLUarO7_1M0ioGcHySec5vlbHtSPDM7nxXzD_FMK2lTVo-wMAgCPYeo5i6v0WN9BTOwFMJD5t-hRxvXXPXAclA4Le2S5rJKoRGHyvuj56Tk-4/s72-c/apps+error-edit.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-4377529778512017003</id><published>2012-10-25T01:00:00.000+08:00</published><updated>2012-10-25T13:15:27.206+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Advisory"/><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="Network"/><title type='text'>IPv6 InSecurity. Is your company ready for IPv6?</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwwuGOMd2ic7EpJyLp_TFuvq65Lbmm-YVr0HHZkmEDII74UPRr330qUHtibPWpL8YlQ78HjimyJojO_Yl0ihYH2OYqDoA1n_a3t8RcnSl9S3YxPMO1FWu21kP6R3MnaQJsCAxBOinbQI0/s1600/vanheuser-HITB.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwwuGOMd2ic7EpJyLp_TFuvq65Lbmm-YVr0HHZkmEDII74UPRr330qUHtibPWpL8YlQ78HjimyJojO_Yl0ihYH2OYqDoA1n_a3t8RcnSl9S3YxPMO1FWu21kP6R3MnaQJsCAxBOinbQI0/s200/vanheuser-HITB.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Everybody is announcing that IPv4 addresses are running out. Countries and major IT companies (such as Google) are encouraging others to move into IPv6. IPv6 have always been portrayed to be more secured than IPv4.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgD3jLJ-lnTSwoSlzQ5vOnRBzIZ9nNEfsJeez-6G8gRwZ6jcYd9k1rRvm4PrOAYiUaB09Mz2xJWdGsblcCpraK-BRn5KqO4CjozznhXf5RSCud7H2QuRNjti_ysnPI4yCUHbuobgSkZL_Q/s1600/graph.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;163&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgD3jLJ-lnTSwoSlzQ5vOnRBzIZ9nNEfsJeez-6G8gRwZ6jcYd9k1rRvm4PrOAYiUaB09Mz2xJWdGsblcCpraK-BRn5KqO4CjozznhXf5RSCud7H2QuRNjti_ysnPI4yCUHbuobgSkZL_Q/s400/graph.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;Image from Google
&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
But in the recent talk by van Hauser on &quot;IPv6 Insecurity&quot; in HITB, he share that there are huge grow in the number of vulnerabilities found related to IPv6 in recent years. Several times more than IPv4.&lt;br /&gt;
&lt;br /&gt;
So is IPv6 mature/stable enough? Do you think companies are ready for the change to IPv6? Should we be encouraging our companies to make the change now? These are the questions that I think we need to ask ourselves as&amp;nbsp;a security professional.&lt;br /&gt;
&lt;br /&gt;
Beside worrying about the readiness of IPv6, van Hauser also highlighted the importance for companies (even those in pure IPv4 environment) to be aware and understand the threats from IPv6. Desktop and network devices these days may already support IPv6 and may enabled by default. Attackers may use these &quot;channel&quot; to target companies in IPv4 environment and bypass their network protection (e.g IPS), which is not IPv6 aware.&lt;br /&gt;
&lt;br /&gt;
Related articles:&lt;br /&gt;
- &lt;a href=&quot;http://conference.hitb.org/hitbsecconf2012kul/materials/D1T2%20-%20Marc%20Heuse%20-%20IPv6%20Insecurity%20Revolutions.pdf&quot; target=&quot;_blank&quot;&gt;HITB slides: Marc Heuse - IPv6 Insecurity Revolutions.pdf&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/4377529778512017003/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/4377529778512017003' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/4377529778512017003'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/4377529778512017003'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2012/10/ipv6-insecurity-is-your-company-ready.html' title='IPv6 InSecurity. Is your company ready for IPv6?'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwwuGOMd2ic7EpJyLp_TFuvq65Lbmm-YVr0HHZkmEDII74UPRr330qUHtibPWpL8YlQ78HjimyJojO_Yl0ihYH2OYqDoA1n_a3t8RcnSl9S3YxPMO1FWu21kP6R3MnaQJsCAxBOinbQI0/s72-c/vanheuser-HITB.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-2685957933530197839</id><published>2012-10-16T22:28:00.002+08:00</published><updated>2012-10-16T22:28:39.665+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><title type='text'>HITB playing AC/DC concert</title><content type='html'>While waiting for the next speaker during the HITB (Hack In The Box) Conference in Kuala Lumpur, the screen in the conference hall starts to play the song &quot;ThunderStruck&quot; by AC/DC (shown in the video below).&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;allowfullscreen&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;http://www.youtube.com/embed/aijdeW61i3k?rel=0&quot; width=&quot;420&quot;&gt;&lt;/iframe&gt;

&lt;br /&gt;
&lt;br /&gt;
The music video is actually part of the introduction for the presentation titled &quot;Behind Enemy Lines&quot; by Mikko Hypponen of F-Secure. His speech talks about the various cyber &quot;enemy&quot; (Types of hackers) and their motives. He also share with us some of the ways to defend against this &quot;enemy&quot; and avoid being the target.

&lt;br /&gt;
&lt;br /&gt;
You can download the slides from HITB website &lt;a href=&quot;http://conference.hitb.org/hitbsecconf2012kul/materials/D2T3%20-%20Mikko%20Hypponen%20-%20Behind%20Enemy%20Lines.pdf&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizp_37BpOyBVOKQouxoy78_dfsh7Hf545Z17_2cpHkS8ZTMz9PaUzvccy3derBBLVi6tJyBYZ6gbG6L8JGHmCGcJlg3buINKx16t1T6iz52z4c8ZUxYScmikWdDpiRN2YFTPMhF1qeAGI/s1600/Behind+Enemy+Lines.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;224&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizp_37BpOyBVOKQouxoy78_dfsh7Hf545Z17_2cpHkS8ZTMz9PaUzvccy3derBBLVi6tJyBYZ6gbG6L8JGHmCGcJlg3buINKx16t1T6iz52z4c8ZUxYScmikWdDpiRN2YFTPMhF1qeAGI/s400/Behind+Enemy+Lines.JPG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvIt9v1ZH0eAlSgp2xDw9NZ_DDxLX8J5SLIot46utUoMqaIJawT5VoRLEkv48D9PWyhyphenhyphenvxetnsDWX5d8Mc7v42moNBboAhXyUoqjrPk7X0nuYnWyFF9Wm4Wqob1VMHvZJCRitcLK_MqaQ/s1600/Mikko.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvIt9v1ZH0eAlSgp2xDw9NZ_DDxLX8J5SLIot46utUoMqaIJawT5VoRLEkv48D9PWyhyphenhyphenvxetnsDWX5d8Mc7v42moNBboAhXyUoqjrPk7X0nuYnWyFF9Wm4Wqob1VMHvZJCRitcLK_MqaQ/s400/Mikko.JPG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/2685957933530197839/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/2685957933530197839' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/2685957933530197839'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/2685957933530197839'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2012/10/hitb-playing-acdc-concert.html' title='HITB playing AC/DC concert'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/aijdeW61i3k/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-3111734292778295425</id><published>2012-09-23T11:51:00.000+08:00</published><updated>2012-09-23T12:13:30.366+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Video"/><title type='text'>USB hacking obsolete?</title><content type='html'>With Windows autorun feature disabled by default, USB hacking method such as Pod slurping and tronjanized flash drive no longer possible? &lt;br /&gt;
&lt;br /&gt;
I have recently wrote an article &quot;&lt;a href=&quot;http://werew01f.blogspot.com/2012/08/pentesting-with-teensy.html&quot;&gt;Pentesting with Teensy&lt;/a&gt;&quot; for PenTest Magazine that describes how you can emulate a device as a HID (Human Interface Device) and inject attack codes and execute commands in the system. &lt;br /&gt;
&lt;br /&gt;
For those who have not read the article, I have make a short video to demostrate how you can still carry out the USB hacking using Teensy. &lt;iframe allowfullscreen=&quot;allowfullscreen&quot; frameborder=&quot;0&quot; height=&quot;372&quot; src=&quot;http://www.youtube.com/embed/KClRgRzteCE&quot; width=&quot;460&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;br /&gt;
Besides using teensy as a pentesting or hacking tool, it can also be useful for auditors to verify system hardening and configuration with system commands pre-set into the device.&lt;br /&gt;
&lt;br /&gt;
More information about my article, refer to my previous post &quot;&lt;a href=&quot;http://werew01f.blogspot.com/2012/08/pentesting-with-teensy.html&quot;&gt;Pentesting with Teensy&lt;/a&gt;&quot;. &lt;br /&gt;
&lt;div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/3111734292778295425/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/3111734292778295425' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/3111734292778295425'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/3111734292778295425'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2012/09/usb-hacking-obsolete.html' title='USB hacking obsolete?'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/KClRgRzteCE/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-141494118387531764</id><published>2012-09-04T22:46:00.001+08:00</published><updated>2013-03-12T09:13:14.904+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>Command Your Windows</title><content type='html'>System these days does not really require users to use command line. Windows, Mac, Linux and even traditionally command-based UNIX also come with GUI (Graphical User Interface) such as KDE.  Command line may seem to be obsolete for many. But it is still very useful to hackers and pen-testers when GUI is not available such as using remote shell.&lt;br /&gt;
&lt;br /&gt;
I have wrote an article titled &quot;Command your Windows&quot;, which is published in this month PenTest magazine (September). In this article, I will be sharing on some of the useful windows commands that a hacker or pen-tester can use when obtaining a remote shell to the system. &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEils7jWAG671NTjGVWIyF1aFimySWK3-SstLTRZbbU-11zsGRdukkMnABV2BpphM4W9L-xQ5XMug2xS5n0Ak-As3lR9VfYslmLK0JFrspyTNHzyIl8GQvDYn_X581y2qO-HiAaZ_VN3e64/s1600/PenTest+Sep-1.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEils7jWAG671NTjGVWIyF1aFimySWK3-SstLTRZbbU-11zsGRdukkMnABV2BpphM4W9L-xQ5XMug2xS5n0Ak-As3lR9VfYslmLK0JFrspyTNHzyIl8GQvDYn_X581y2qO-HiAaZ_VN3e64/s200/PenTest+Sep-1.JPG&quot; width=&quot;138&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhalfFlwo8l4imGsNkzTVfLI6X38LoZay-cAlIl9oZyvk4kofUd3rdGx0M0NNxcg9rnKgxjneV6uIPiUnlFtfgCFWJHZP6SuG2hXkV3M_cF_8USgYTSZvpyPCEjekYjc0h-5CCI58LXS6M/s1600/PenTest+Sep-2.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; display: inline !important; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhalfFlwo8l4imGsNkzTVfLI6X38LoZay-cAlIl9oZyvk4kofUd3rdGx0M0NNxcg9rnKgxjneV6uIPiUnlFtfgCFWJHZP6SuG2hXkV3M_cF_8USgYTSZvpyPCEjekYjc0h-5CCI58LXS6M/s200/PenTest+Sep-2.JPG&quot; width=&quot;141&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
This magazine can be purchase&amp;nbsp;on-line&amp;nbsp;from &lt;a href=&quot;http://pentestmag.com/pentest-regular-0912/&quot; target=&quot;_blank&quot;&gt;PenTest Magazine&lt;/a&gt; website.&lt;br /&gt;
&lt;br /&gt;
Please post your comments regarding this article here.&lt;br /&gt;
If you are interested in this article, I will happy to share it with you. Just drop me an email.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/141494118387531764/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/141494118387531764' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/141494118387531764'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/141494118387531764'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2012/09/command-your-windows.html' title='Command Your Windows'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEils7jWAG671NTjGVWIyF1aFimySWK3-SstLTRZbbU-11zsGRdukkMnABV2BpphM4W9L-xQ5XMug2xS5n0Ak-As3lR9VfYslmLK0JFrspyTNHzyIl8GQvDYn_X581y2qO-HiAaZ_VN3e64/s72-c/PenTest+Sep-1.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-8153698256110145316</id><published>2012-08-03T23:24:00.001+08:00</published><updated>2013-03-12T09:12:27.221+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>Pentesting with Teensy</title><content type='html'>Windows autorun feature is disabled by default these days. Is it still possible to launch code automatically from a USB drive? What if there is a USB drive that could execute code automatically when plugged in and yet not able to be identify as USB drive by the system?&lt;br /&gt;
&lt;br /&gt;
Teensy, USB-based micro-controller development board, which can be programmed to emulate as any device and store programming code. I have wrote an article that describes how you can emulate the device as a HID (Human Interface Device) and inject attack codes and execute commands in the system.&lt;br /&gt;
&lt;br /&gt;
This article titled &quot;Pentesting with Teensy&quot; can be found in the July issue of PenTest (Web App) Magazine.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIrvwYmlqFa2QJ-xVpPpSCRDAT_u-EYoa8hgD41UK2lh4jTwvXucBVRLtcPmnjJ_haFxQeuZ7kajGSbNZQm9P2U6Ds4dJraKdlYNFNoI0O8oQMYrXIwzqjMYL4xuNTrAV4ReBlm0vFh6U/s1600/PenTest-1.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIrvwYmlqFa2QJ-xVpPpSCRDAT_u-EYoa8hgD41UK2lh4jTwvXucBVRLtcPmnjJ_haFxQeuZ7kajGSbNZQm9P2U6Ds4dJraKdlYNFNoI0O8oQMYrXIwzqjMYL4xuNTrAV4ReBlm0vFh6U/s200/PenTest-1.JPG&quot; width=&quot;141&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAwSaMGZ0Kvq08CnG0uX3a-NYj6XOI2YjKyzLY7tJwRFJIbFcG9GKvJwAb6rm_gdrx3UnYYQVY0BnoICQqIyOoXU69Uy8ZPju0wSYB3NaQvo_zbL6EouDhJ1EkVEjnfZaJUXKtHCT4njs/s1600/PenTest-2.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; display: inline !important; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAwSaMGZ0Kvq08CnG0uX3a-NYj6XOI2YjKyzLY7tJwRFJIbFcG9GKvJwAb6rm_gdrx3UnYYQVY0BnoICQqIyOoXU69Uy8ZPju0wSYB3NaQvo_zbL6EouDhJ1EkVEjnfZaJUXKtHCT4njs/s200/PenTest-2.JPG&quot; width=&quot;138&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
This magazine can be purchase&amp;nbsp;on-line&amp;nbsp;from &lt;a href=&quot;http://pentestmag.com/web-applications-for-pentesters-webapp/&quot; target=&quot;_blank&quot;&gt;PenTest Magazine&lt;/a&gt; website.&lt;br /&gt;
&lt;br /&gt;
Please post your comments regarding this article here.&lt;br /&gt;
If you are interested in this article, I will happy to share it with you. Just drop me an email.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/8153698256110145316/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/8153698256110145316' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/8153698256110145316'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/8153698256110145316'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2012/08/pentesting-with-teensy.html' title='Pentesting with Teensy'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIrvwYmlqFa2QJ-xVpPpSCRDAT_u-EYoa8hgD41UK2lh4jTwvXucBVRLtcPmnjJ_haFxQeuZ7kajGSbNZQm9P2U6Ds4dJraKdlYNFNoI0O8oQMYrXIwzqjMYL4xuNTrAV4ReBlm0vFh6U/s72-c/PenTest-1.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-7948928047289550332</id><published>2012-08-02T22:16:00.000+08:00</published><updated>2013-03-12T09:13:57.264+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>WhatsApp InSecurity</title><content type='html'>The ownership of smartphones and tablets has grown enormously over the past few years. WhatsApp has gained popularity as the cross-platform application to replace traditional messaging services such as Instant Messaging and SMS. How safe is it to use for personal communication?
&lt;br /&gt;
&lt;br /&gt;
I have written an article that talks about how you can extract the message and photo that were send via WhatsApp.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghydSDOQJIUo78aza2MERBH3PQleU_deLIGsJsyZ5AwT4u-AfI01An-ibUf4P0mG6pV_aAFIcNNlgtqjFUcEoL1y9ZJuLzUNsqaDjlkQa90iWV6s6lPpVf7KUuRYFlE_FTFY3Nb8vRr4I/s1600/Hakin9-1.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghydSDOQJIUo78aza2MERBH3PQleU_deLIGsJsyZ5AwT4u-AfI01An-ibUf4P0mG6pV_aAFIcNNlgtqjFUcEoL1y9ZJuLzUNsqaDjlkQa90iWV6s6lPpVf7KUuRYFlE_FTFY3Nb8vRr4I/s200/Hakin9-1.JPG&quot; width=&quot;139&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM1s8hW_fIpH84_rqK8byO6Vi8_-5Id-btqW8-e6OKDUEGawFrtTBD0on9bmSE_tZ0mJWZyY_lj742CUj6m9HdSDRmJdCePsnNZ6Dju_avmcaVhIEk3lXEfVuYwBC_sR445zs8FZ-Kr9I/s1600/Hakin9-2.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; display: inline !important; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM1s8hW_fIpH84_rqK8byO6Vi8_-5Id-btqW8-e6OKDUEGawFrtTBD0on9bmSE_tZ0mJWZyY_lj742CUj6m9HdSDRmJdCePsnNZ6Dju_avmcaVhIEk3lXEfVuYwBC_sR445zs8FZ-Kr9I/s200/Hakin9-2.JPG&quot; width=&quot;138&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This magazine can be purchase on-line from &lt;a href=&quot;http://hakin9.org/hakin9-0812-57-malware/&quot; target=&quot;_blank&quot;&gt;Hakin9 Magazine&lt;/a&gt; website.&lt;br /&gt;
&lt;br /&gt;
Please post your comments regarding this article here.&lt;br /&gt;
If you are interested in this article, I will happy to share it with you. Just drop me an email.&lt;br /&gt;
&lt;br /&gt;
There is a video on the related demonstration, which I previously posted in &quot;&lt;a href=&quot;http://werew01f.blogspot.sg/2012/05/can-you-extract-message-and-photo-from.html&quot; target=&quot;_blank&quot;&gt;Can you extract message and photo from WhatsApp&lt;/a&gt;&quot;
&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/7948928047289550332/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/7948928047289550332' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/7948928047289550332'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/7948928047289550332'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2012/08/whatsapp-insecurity.html' title='WhatsApp InSecurity'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghydSDOQJIUo78aza2MERBH3PQleU_deLIGsJsyZ5AwT4u-AfI01An-ibUf4P0mG6pV_aAFIcNNlgtqjFUcEoL1y9ZJuLzUNsqaDjlkQa90iWV6s6lPpVf7KUuRYFlE_FTFY3Nb8vRr4I/s72-c/Hakin9-1.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-7245163539866581561</id><published>2012-07-13T14:57:00.000+08:00</published><updated>2012-07-14T15:02:03.294+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Advisory"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>Security Guideline for Mobile Devices in Enterprise</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtvhcozv8RJocwqOh1I3Z9OnGSEHdDpZUcwyaQWjr3yVbSDTMObPXQoWB2e7BpnBO6Y8tdqieF18_2sqMkdQjTy_0d71aBEKgKN_IEU2zQzTEAeQeUlf_-HwztPipjYWp0OlGGSkeuJ1w/s1600/NISTbanner.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;57&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtvhcozv8RJocwqOh1I3Z9OnGSEHdDpZUcwyaQWjr3yVbSDTMObPXQoWB2e7BpnBO6Y8tdqieF18_2sqMkdQjTy_0d71aBEKgKN_IEU2zQzTEAeQeUlf_-HwztPipjYWp0OlGGSkeuJ1w/s400/NISTbanner.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
This week, NIST (National Institute of Standards and Technology) has release the guidelines for managing and securing of mobile devices in the enterprise (&lt;a href=&quot;http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf&quot;&gt;Guidelines for Managing and Securing Mobile Devices in the Enterprise - SP 800-124 Revision 1&lt;/a&gt;).  The purpose of this publication is to provide recommendation to help organizations centrally manage and secure their mobile devices against various threats.&lt;br /&gt;
&lt;br /&gt;
This document is intended for technical staffs such as security engineers and those who are responsible in planning, implementing and maintaining the security of the mobile devices.&lt;br /&gt;
&lt;br /&gt;
It covers the type of mobile devices that are applicable such as smart phone and tablets. Basic cell phones and laptops are out of scope as their threat level and security control options are different.&lt;br /&gt;
&lt;br /&gt;
It also talks about the different high-level threats and vulnerabilities related to these devices, as they are generally higher risk exposure that other client devices such as desktop and laptop. These threats are,&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Lack of physical security controls&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Use of untrusted mobile devices&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Use of untrusted networks&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Use of applications created by unknown parties&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Interaction with other systems&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Use of untrusted content&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Use of location services&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;The next section of the document provides an overview of the current state of the MDM (Mobile Device Management) technologies, which mainly comprise of the components, the architectures and the capabilities. For components, it talks about the type of MDM solution between the solution from same vendor of the mobile device and using third party product that can manage one or more types of mobile devices. The architectures deal with the different consideration and the use of other enterprise services based on business requirement. As for the capabilities of the MDM, it should provide the following security services,&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;General policy that can enforce enterprise security policies on the mobile device.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Data communication and storage that provide strong data encryption during communication and on storage. It should also have the ability to remotely wipe the device.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;User and device authentication, which includes account and device lockout and remotely locking of the device.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Application. It should be able to restrict the installing and removal of applications. Prevent access to enterprise resources based on devices OS (Operating System) version and status (rooted or jailbroken).&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Lastly, it talks about the security for the life cycle of the enterprise mobile device solution, which covers from policy down to operations. This life cycle consist of 5 main phases.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Phase 1: Initiation. This phase include identifying needs for mobile devices, creating a high-level strategy for implementing mobile device solutions, developing a mobile device security policy, and specifying business and functional requirements for the solution.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Phase 2: Development. In this phase, it covers technical characteristics of the mobile device solution and related components. These include the type of authentication methods, cryptographic mechanisms and the type of mobile device clients to be used.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Phase 3: Implementation. This phase involve equipment configuration to meet operational and security requirements. Ensuring the integration with other security controls such as security event logging and authentication servers.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Phase 4: Operations and Maintenance. This phase will cover security related tasks that should be performed on an on-going basis such as log review and attack detection.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Phase 5: Disposal. This phase will cover the tasks for retiring of components and the mobile device solutions, including preserving of information to meet legal requirements, sanitizing and disposing of equipment properly.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;For more details on this NIST publication, visit the following link:&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://www.nist.gov/itl/csd/mobile-071112.cfm&quot;&gt;NIST Updates Guidelines for Mobile Device Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf&quot;&gt;Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Revision 1)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
This post is also available in Seczine, an online &lt;b&gt;Sec&lt;/b&gt;urity maga&lt;b&gt;zine&lt;/b&gt;.&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://www.seczine.com/article/information-security-news/130712/NIST-Security-Guidelines-for-Mobile-Devices.php&quot;&gt;Seczine.com: NIST Guidelines for Mobile Devices&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/7245163539866581561/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/7245163539866581561' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/7245163539866581561'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/7245163539866581561'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2012/07/security-guideline-for-mobile-devices.html' title='Security Guideline for Mobile Devices in Enterprise'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtvhcozv8RJocwqOh1I3Z9OnGSEHdDpZUcwyaQWjr3yVbSDTMObPXQoWB2e7BpnBO6Y8tdqieF18_2sqMkdQjTy_0d71aBEKgKN_IEU2zQzTEAeQeUlf_-HwztPipjYWp0OlGGSkeuJ1w/s72-c/NISTbanner.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-334308024046217753</id><published>2012-05-01T23:34:00.002+08:00</published><updated>2016-06-07T22:23:40.138+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Video"/><title type='text'>Can you extract message and photo from Whatsapp?</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVynmX0q_qG8EzzhTeT_TeC7sPoPx8vgOoyd7GiXi4h3f2QZgoaZcDAtEmS2L_pSdX3DZNgDZG5vdNHXLZACp9tkxoPq8136OkzzleAeLRblOnjpszIEP1tLPLuJ15uwY-UtpOuZ5Lwfw/s1600/WhatsApp_logo.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; mea=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVynmX0q_qG8EzzhTeT_TeC7sPoPx8vgOoyd7GiXi4h3f2QZgoaZcDAtEmS2L_pSdX3DZNgDZG5vdNHXLZACp9tkxoPq8136OkzzleAeLRblOnjpszIEP1tLPLuJ15uwY-UtpOuZ5Lwfw/s1600/WhatsApp_logo.png&quot; /&gt;&lt;/a&gt;
One day while messaging to my friend using Whatsapp, he ask me if the traffic is secure? I did a bit of read up and found out that Whatsapp message was actually not encrypted unlike iMessage.&lt;br /&gt;
&lt;br /&gt;
So I decided to do a simple video to show how you can extract message and photo that were send via Whatsapp.&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;372&quot; src=&quot;http://www.youtube.com/embed/QQ7vqRW6dlY?rel=0&quot; width=&quot;460&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;Update!&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
New post on hijacking and impersonate Whatsapp account in &quot;&lt;a href=&quot;http://werew01f.blogspot.com/2016/06/hijack-and-impersonate-whatsapp-account.html&quot;&gt;Hijack and Impersonate Whatsapp account&lt;/a&gt;&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/334308024046217753/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/334308024046217753' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/334308024046217753'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/334308024046217753'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2012/05/can-you-extract-message-and-photo-from.html' title='Can you extract message and photo from Whatsapp?'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVynmX0q_qG8EzzhTeT_TeC7sPoPx8vgOoyd7GiXi4h3f2QZgoaZcDAtEmS2L_pSdX3DZNgDZG5vdNHXLZACp9tkxoPq8136OkzzleAeLRblOnjpszIEP1tLPLuJ15uwY-UtpOuZ5Lwfw/s72-c/WhatsApp_logo.png" height="72" width="72"/><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-7990482934909711186</id><published>2012-04-11T11:38:00.007+08:00</published><updated>2012-04-14T13:22:16.980+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Advisory"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><title type='text'>HP ProCurve Switch comes with FREE malware</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEha00GmV28I3265NC1_kRRBCrRvCOLYNpynqnMPRjs7I71n7ExFnFkkDUzid28u9cqGmhgvcKyYlNyclqWsg7b5jbn_fu7JXm9bkCy4mztX1gx7yY-7zKSLWCU-xxFh3zFDDmGBoco2Pqc/s1600/HP_malware.jpg&quot;&gt;&lt;img style=&quot;float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 225px; height: 198px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEha00GmV28I3265NC1_kRRBCrRvCOLYNpynqnMPRjs7I71n7ExFnFkkDUzid28u9cqGmhgvcKyYlNyclqWsg7b5jbn_fu7JXm9bkCy4mztX1gx7yY-7zKSLWCU-xxFh3zFDDmGBoco2Pqc/s320/HP_malware.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5731116462844713474&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 100%; font-style: normal; &quot;&gt;HP had announced in their Security bulletin yesterday (10 Apr) that they have shipped malware-infected compact flash card with their HP ProCurve switches.&lt;br /&gt;&lt;br /&gt;In their &lt;a href=&quot;http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03249176&quot;&gt;official bulletin&lt;/a&gt;, &quot;&lt;/span&gt;&lt;i style=&quot;font-size: 100%; &quot;&gt;A potential security vulnerability has been identified with certain HP ProCurve 5400 zl switches containing compact flash cards which may be infected with a virus. Reuse of an infected compact flash card in a personal computer could result in a compromise of that system&#39;s integrity&lt;/i&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;.&quot; &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;They have not disclosed how those malware managed to infected the Flash cards but it is likely that it had infected the systems of the third-party manufacturer that supply those flash cards.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;It is not the first time that renown companies are shipping malware in their products. Seagate and Apple also have reported cases. (See my previous blog &quot;&lt;a href=&quot;http://werew01f.blogspot.com/2008/01/battery-not-included-but-malware-is.html&quot;&gt;Battery not included ... but Malware is...&lt;/a&gt;)&lt;br /&gt;&lt;br /&gt;Related Reports:&lt;br /&gt;- &lt;a href=&quot;http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03249176&quot;&gt;&lt;span style=&quot;font-style: italic; &quot; &gt;HP SUPPORT COMMUNICATION - SECURITY BULLETIN&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt; &lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/7990482934909711186/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/7990482934909711186' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/7990482934909711186'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/7990482934909711186'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2012/04/hp-procurve-switch-comes-with-free.html' title='HP ProCurve Switch comes with FREE malware'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEha00GmV28I3265NC1_kRRBCrRvCOLYNpynqnMPRjs7I71n7ExFnFkkDUzid28u9cqGmhgvcKyYlNyclqWsg7b5jbn_fu7JXm9bkCy4mztX1gx7yY-7zKSLWCU-xxFh3zFDDmGBoco2Pqc/s72-c/HP_malware.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-7511688970168680790</id><published>2011-10-24T15:00:00.000+08:00</published><updated>2011-10-24T15:06:25.442+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Video"/><title type='text'>Android vs iOS security</title><content type='html'>A interesting video on well-known security researcher Dr Charlie Miller, which discuss the security postures of Android and iOS&lt;br /&gt;&lt;br /&gt;&lt;object style=&quot;WIDTH: 440px; HEIGHT: 268px&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/KsbOxT268bc?version=3&amp;amp;feature=player_detailpage&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;embed src=&quot;http://www.youtube.com/v/KsbOxT268bc?version=3&amp;feature=player_detailpage&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowscriptaccess=&quot;always&quot; width=&quot;440&quot; height=&quot;268&quot;&gt;&lt;/embed&gt;&lt;/object&gt;</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/7511688970168680790/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/7511688970168680790' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/7511688970168680790'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/7511688970168680790'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2011/10/android-vs-ios-security.html' title='Android vs iOS security'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-5462601301639091395</id><published>2011-10-23T12:49:00.007+08:00</published><updated>2011-10-23T14:29:00.287+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="SPAM"/><title type='text'>My Million dollar ATM is ready for delivery??</title><content type='html'>I have just received an interesting Scam mail. Think it will be useful to share with all my readers.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj69rY__yvSLs0c4JeNn5m1ESs9_TFyCR5JGSNAb5kLQx-RZslzbeyN_g_dB0gyXLkjo_9UbLHl6y3xL4KOgpWWCtDV-UT9DkgcnlIaJ3NawdsTl6e4WWo5jgu7ID_QBctF2mpj3Yy9URc/s1600/scam3.JPG&quot;&gt;&lt;img style=&quot;WIDTH: 400px; HEIGHT: 264px; CURSOR: hand&quot; id=&quot;BLOGGER_PHOTO_ID_5666560161391220162&quot; border=&quot;0&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj69rY__yvSLs0c4JeNn5m1ESs9_TFyCR5JGSNAb5kLQx-RZslzbeyN_g_dB0gyXLkjo_9UbLHl6y3xL4KOgpWWCtDV-UT9DkgcnlIaJ3NawdsTl6e4WWo5jgu7ID_QBctF2mpj3Yy9URc/s400/scam3.JPG&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The email claims to be from FedEx. They are ready to deliver &quot;my&quot; million dollar ATM card in GHANA.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;FONT-STYLE: italic;font-size:85%;&quot; &gt;-Below are the extract-&lt;br /&gt;&lt;br /&gt;Dear Valued Customer.&lt;br /&gt;&lt;br /&gt;The office of the FedEx Managements in the capital city of ACCRA GHANA do hereby wish to inform you that your ATM card package is ready for delivery.&lt;br /&gt;&lt;br /&gt;The issuing bank of this ATM card has instructed us to inform you that your card has been credited with the total sum of US$4,750,000.00 (Four Million-Seven Hundred &amp;amp; Fifty Thousand Dollars) which is now accessible and you can make your withdrawal from any ATM machine worldwide.&lt;br /&gt;&lt;br /&gt;This ATM card with the PIN code and other vital documents has peen packaged into an Envelop which has been assigned for immediately delivery but unfortunately, the issuing bank has cleared (PAID) the delivery fee, insurance fee, custom duty fee, delivery permit fee but they were not allowed to pay the security bonded keeping fee because we have not been told when you will be coming for your claim not until the bank instructed us to contact you and inform you of the security bonded keeping fee which is only the sum of US$98 dollars, this is the only fee that you has to pay.&lt;br /&gt;&lt;br /&gt;We further request you to kindly clear security bonded keeping fee of US$98 Dollars to enable us effect the delivery of your ATM card to you as soon as possible. At the meantime, you have to get back to us with your address where your package would be delivered to you within the nest 48hrs.&lt;br /&gt;&lt;br /&gt;Your complete Name:…………………………&lt;br /&gt;Your Complete Address:………………………&lt;br /&gt;Your Mobile Number:…………………………..&lt;br /&gt;&lt;br /&gt;Upon your swift response, we shall instruct you on how you will make the payment to the security office before we would be allowed to move your package. Our delivery duration is only 48hrs starting from the time when your package was picked up and dispatched out from our office here in Ghana.&lt;br /&gt;&lt;br /&gt;We anticipate your response.&lt;br /&gt;&lt;br /&gt;Thank you.&lt;br /&gt;&lt;br /&gt;Mr. Mac Moses&lt;br /&gt;FedEx Delivery Officer&lt;br /&gt;Tel: 233- 247630112&lt;br /&gt;&lt;br /&gt;-End of email-&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;From the email header, you will able to see some useful information:&lt;br /&gt;1&amp;gt; Source email address.&lt;br /&gt;2&amp;gt; Source mail server&lt;br /&gt;3&amp;gt; Source IP address connected to mail server&lt;br /&gt;4&amp;gt; Reply to address&lt;br /&gt;&lt;br /&gt;&lt;img style=&quot;WIDTH: 450px; HEIGHT: 217px; CURSOR: hand&quot; id=&quot;BLOGGER_PHOTO_ID_5666563582259047122&quot; border=&quot;0&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiG_aXNl_qUbRt7EjGx5jKlKVhPQVqj4_JSFxrffBEawssYOXCQrRLYzd-QLwxNsNqqg_NfRWKM8GY4R1CoEMHy-uvL5HTICBBgbmd8mfiWCnGQDDTZLj-dX9Go04QH-UWTNONpSwDRoeU/s400/Scam-1.JPG&quot; /&gt;&lt;br /&gt;&lt;br /&gt;From the &quot;1&amp;gt; Source email address&quot;, you know that the email is coming from &quot;chinkyeyes@rogers.com&quot;. Rogers.com is exactly a Canadian ISP, which uses Yahoo mail gateway (as shown below). So it has verified the &quot;2&amp;gt; Source mail server&quot; in the mail header.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjD-LO6wdXPGb7VH7WQje3kTKsY6WmudUJDtf1kehTqCiiU5VU2tvDKfBmKsu9ikpvSidklEDhrAnaILS80ovyptgm1-H1XZLpTxb5PM_TaDUYbra6QDySYnYekgs1vYYS7P21zZ8xxgZc/s1600/scam2.JPG&quot;&gt;&lt;img style=&quot;WIDTH: 400px; HEIGHT: 123px; CURSOR: hand&quot; id=&quot;BLOGGER_PHOTO_ID_5666560160751006146&quot; border=&quot;0&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjD-LO6wdXPGb7VH7WQje3kTKsY6WmudUJDtf1kehTqCiiU5VU2tvDKfBmKsu9ikpvSidklEDhrAnaILS80ovyptgm1-H1XZLpTxb5PM_TaDUYbra6QDySYnYekgs1vYYS7P21zZ8xxgZc/s400/scam2.JPG&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;From the &quot;3&amp;gt; Source IP Address&quot; (41.218.192.255), it was from Ghana. So it is likely that the user &quot;chinkyeyes&quot; account was compromised by the scammer.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwsDu_gIx5q9SKgNIJsNdx_EA5xkd4kxm9d7IqtJbVHVklrK_oN6i8XJpaFUrhShR2CPuKMUty2RdKI1N78_l3lStS3qeRZk-YHtMWMPPYcU_JhtkW6oZJ1f3_1vOR-cTKQo5_FrdINNo/s1600/scam4.JPG&quot;&gt;&lt;img style=&quot;WIDTH: 400px; HEIGHT: 165px; CURSOR: hand&quot; id=&quot;BLOGGER_PHOTO_ID_5666560167032556690&quot; border=&quot;0&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwsDu_gIx5q9SKgNIJsNdx_EA5xkd4kxm9d7IqtJbVHVklrK_oN6i8XJpaFUrhShR2CPuKMUty2RdKI1N78_l3lStS3qeRZk-YHtMWMPPYcU_JhtkW6oZJ1f3_1vOR-cTKQo5_FrdINNo/s400/scam4.JPG&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Scam mail tends to show tell-tale sign such as spelling error.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLmCI83EYjuqjenn1osr5l2GaZcm8n4NyIfEhHDxyrqlIeNoSt3vlhZQxDU7d6yMi1MnbnmjHJRcx3Q6YODekT3NtoNHSKP-Yo0yHuiZlRKSF5GaCjgxhlALBaU7oDfDhyTRkQ9Q7LoLQ/s1600/scam5.JPG&quot;&gt;&lt;img style=&quot;WIDTH: 400px; HEIGHT: 54px; CURSOR: hand&quot; id=&quot;BLOGGER_PHOTO_ID_5666569394726204834&quot; border=&quot;0&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLmCI83EYjuqjenn1osr5l2GaZcm8n4NyIfEhHDxyrqlIeNoSt3vlhZQxDU7d6yMi1MnbnmjHJRcx3Q6YODekT3NtoNHSKP-Yo0yHuiZlRKSF5GaCjgxhlALBaU7oDfDhyTRkQ9Q7LoLQ/s400/scam5.JPG&quot; /&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/5462601301639091395/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/5462601301639091395' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/5462601301639091395'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/5462601301639091395'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2011/10/my-million-dollar-atm-is-ready-for.html' title='My Million dollar ATM is ready for delivery??'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj69rY__yvSLs0c4JeNn5m1ESs9_TFyCR5JGSNAb5kLQx-RZslzbeyN_g_dB0gyXLkjo_9UbLHl6y3xL4KOgpWWCtDV-UT9DkgcnlIaJ3NawdsTl6e4WWo5jgu7ID_QBctF2mpj3Yy9URc/s72-c/scam3.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-294912324771715523</id><published>2011-09-30T18:06:00.006+08:00</published><updated>2011-09-30T19:12:24.150+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Advisory"/><category scheme="http://www.blogger.com/atom/ns#" term="SPAM"/><title type='text'>I won $10,000 worth of shopping voucher??</title><content type='html'>I received an email informing me that i have won $10,000 worth of shopping voucher coming from HardwareZone&#39;s newsletter.&lt;br /&gt;&lt;br /&gt;The email format really give me the impression that i am the lucky winner, with two other &quot;winners&quot; listed in the email.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjolzwwoSaH1eIIQ0EiMReF06nIzyeDrrobx4UF7U1CQKB3TLlJfpmFp2A8BS5S6v1j3YskW0K0_7QudkF8SH8-iQ-paClVOVOqyxRX4MIr81F__7qgLrBKP9p6ugWhoK0sLRY63CATydA/s1600/Winner-1.JPG&quot;&gt;&lt;img style=&quot;WIDTH: 443px; HEIGHT: 441px; CURSOR: hand&quot; id=&quot;BLOGGER_PHOTO_ID_5658093105899247906&quot; border=&quot;0&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjolzwwoSaH1eIIQ0EiMReF06nIzyeDrrobx4UF7U1CQKB3TLlJfpmFp2A8BS5S6v1j3YskW0K0_7QudkF8SH8-iQ-paClVOVOqyxRX4MIr81F__7qgLrBKP9p6ugWhoK0sLRY63CATydA/s400/Winner-1.JPG&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;But after reading through the emails, it start to show tell-tale sign that it is just an advertisment and i did not really won a prize. They skillfully claims that &quot;you may be a possible winner&quot; as not to be accused as fraud later.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJiNRitocZAwq7yKIphrNEvG1HltgJZQNIZ6keZbZu4e9zKM8igaVTDCKBEdHVlFEf6tX6HLss1Iu6sNonK2Afj0xFgd5XWjNcEpyGMZ1UMfh_z1CZHluiQIc4gmqChvTkmkBHXdCftDI/s1600/Winner-2.JPG&quot;&gt;&lt;img style=&quot;WIDTH: 438px; HEIGHT: 153px; CURSOR: hand&quot; id=&quot;BLOGGER_PHOTO_ID_5658093109382737314&quot; border=&quot;0&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJiNRitocZAwq7yKIphrNEvG1HltgJZQNIZ6keZbZu4e9zKM8igaVTDCKBEdHVlFEf6tX6HLss1Iu6sNonK2Afj0xFgd5XWjNcEpyGMZ1UMfh_z1CZHluiQIc4gmqChvTkmkBHXdCftDI/s400/Winner-2.JPG&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;After clicking the link &quot;&lt;em&gt;www.greatsingaporevoucher.com.sg&lt;/em&gt;&quot; to &quot;verify&quot; your details, it was obvious that the email is actually a legal &quot;spam&quot;.&lt;br /&gt;&lt;br /&gt;By &quot;verifying&quot; your details, you are actually joining the lucky draw instead. It also allow them to collect your information so to legally &quot;spam&quot; you further via Handphone, email, and mailing address.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqBR6NjCCbq9KiypvnuC2zkGnE29m30ohtwf71FI-JGQP2_LMtnTF2NvNDxyPI7yT57_q_1PJZKEESfIZEA7Hvj_RKLRAgoVg4eeyriUqGpnRK7uoCyQCAQ_YuitA5gfO5hu-b2lI66rY/s1600/Winner-3.JPG&quot;&gt;&lt;img style=&quot;WIDTH: 443px; HEIGHT: 284px; CURSOR: hand&quot; id=&quot;BLOGGER_PHOTO_ID_5658093109255701746&quot; border=&quot;0&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqBR6NjCCbq9KiypvnuC2zkGnE29m30ohtwf71FI-JGQP2_LMtnTF2NvNDxyPI7yT57_q_1PJZKEESfIZEA7Hvj_RKLRAgoVg4eeyriUqGpnRK7uoCyQCAQ_YuitA5gfO5hu-b2lI66rY/s400/Winner-3.JPG&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;em&gt;&lt;strong&gt;w01f advise: If anyone still interested to join this lucky draw (or any similar online contest) and to be &quot;spam&quot; further, make sure you read and understand their &quot;Terms and Conditions&quot; and &quot;Privacy Policy&quot; before releasing your personal information to them.&lt;/strong&gt;&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/294912324771715523/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/294912324771715523' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/294912324771715523'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/294912324771715523'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2011/09/i-won-10000-worth-of-shopping-voucher.html' title='I won $10,000 worth of shopping voucher??'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjolzwwoSaH1eIIQ0EiMReF06nIzyeDrrobx4UF7U1CQKB3TLlJfpmFp2A8BS5S6v1j3YskW0K0_7QudkF8SH8-iQ-paClVOVOqyxRX4MIr81F__7qgLrBKP9p6ugWhoK0sLRY63CATydA/s72-c/Winner-1.JPG" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-1560299785820196130</id><published>2011-09-29T20:44:00.001+08:00</published><updated>2011-09-30T19:18:34.614+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>Default again?</title><content type='html'>Another device found to be using default password. This time is a home router in Korea. It is a DAVOLINK DVW-2000N router.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPvMze_ppduUWdXxY4YJXtnsqo8UQFFIACiJPgMvaz2dBxF2dxNe9zDVue9uHTM9Pn6cvNirJ0_2FZ_ugK4j6DndVs0lseY-OcLZJRi39CdPYI8y0IW6_Io-0DXB6v3-k7N_cLA40dqxg/s1600/wireless-1.jpg&quot;&gt;&lt;img style=&quot;WIDTH: 437px; HEIGHT: 273px; CURSOR: hand&quot; id=&quot;BLOGGER_PHOTO_ID_5657780948461612370&quot; border=&quot;0&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPvMze_ppduUWdXxY4YJXtnsqo8UQFFIACiJPgMvaz2dBxF2dxNe9zDVue9uHTM9Pn6cvNirJ0_2FZ_ugK4j6DndVs0lseY-OcLZJRi39CdPYI8y0IW6_Io-0DXB6v3-k7N_cLA40dqxg/s400/wireless-1.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;w01f advise: Home router console should not be accessible from the Internet. The account should also be properly secured with strong password.&lt;br /&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/1560299785820196130/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/1560299785820196130' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/1560299785820196130'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/1560299785820196130'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2011/09/default-again.html' title='Default again?'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPvMze_ppduUWdXxY4YJXtnsqo8UQFFIACiJPgMvaz2dBxF2dxNe9zDVue9uHTM9Pn6cvNirJ0_2FZ_ugK4j6DndVs0lseY-OcLZJRi39CdPYI8y0IW6_Io-0DXB6v3-k7N_cLA40dqxg/s72-c/wireless-1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-1983648786609221307</id><published>2011-09-27T22:18:00.002+08:00</published><updated>2011-09-28T00:00:07.894+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>&quot;Easy&quot; access to exam questions?</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNYb5QmQ4WWWeSRf1fH-GyrS3ATMCz7jxpcQ71Iw0a0vNb_21qdKtKkmSXqlPlgP7DFWW2ZAuezu-d3CrEKLFrJ36LC1YamaYRy1QwUAdK8_Hfi0lzOkJQwnbX28MIDuLdmCKHavLMbI4/s1600/shanghai-1.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;width: 400px; height: 271px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNYb5QmQ4WWWeSRf1fH-GyrS3ATMCz7jxpcQ71Iw0a0vNb_21qdKtKkmSXqlPlgP7DFWW2ZAuezu-d3CrEKLFrJ36LC1YamaYRy1QwUAdK8_Hfi0lzOkJQwnbX28MIDuLdmCKHavLMbI4/s400/shanghai-1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5657061768646697154&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;While doing my &quot;googling&quot; and security analysis, i happen to come across a Shanghai school portal and manage to easily &quot;gain access&quot; into the &lt;span style=&quot;font-weight:bold;&quot;&gt;&quot;admin&quot;&lt;/span&gt; account.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_UoNduUMcKXSss9RE0pY_GtulSQ4fOj9P9cWAu2GTOtKcGyeziRscN26U_Zbc133ApX6wYtqgWxDGuygQRNxs-Cy5lNsTZJwQfgMWUR3kfRZjD5ckc_XmHs6NkseBjYI5SBP36CQK5-Y/s1600/shanghai-2.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 465px; height: 315px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_UoNduUMcKXSss9RE0pY_GtulSQ4fOj9P9cWAu2GTOtKcGyeziRscN26U_Zbc133ApX6wYtqgWxDGuygQRNxs-Cy5lNsTZJwQfgMWUR3kfRZjD5ckc_XmHs6NkseBjYI5SBP36CQK5-Y/s400/shanghai-2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5657061770870573922&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;With the admin access, i am able to access to all the documents in the portal. Wondering if there are any exam questions in there?&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEIEkOhIGWwuRH7yuCXOkiWJCXXJgfHx6SyJrPs_U_eSKSt0mjv-wo83Ir6XcBGtMGKJN8hfG5chpMwDopWyiDQS_UQQT2F5kiY8L9SZSWcGfvJ6JychCRb8JMjf2_mFg6TDcm53tTfJE/s1600/shanghai-3.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 466px; height: 314px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEIEkOhIGWwuRH7yuCXOkiWJCXXJgfHx6SyJrPs_U_eSKSt0mjv-wo83Ir6XcBGtMGKJN8hfG5chpMwDopWyiDQS_UQQT2F5kiY8L9SZSWcGfvJ6JychCRb8JMjf2_mFg6TDcm53tTfJE/s400/shanghai-3.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5657061769642454018&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;I can do a listing of all the user account, which i can edit or delete.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;w01f advise: Web portal should be proper secured, especially the administrative account. Strong password should also be used by all users.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style:italic;font-size:60%;&quot; &gt;Disclaimer:&lt;/span&gt;&lt;span style=&quot;font-size:60%;&quot;&gt; Only access to the &quot;main&quot; and &quot;user account&quot; page, &lt;span style=&quot;font-weight: bold;&quot;&gt;no&lt;/span&gt; modification to the portal  and &lt;span style=&quot;font-weight: bold;&quot;&gt;no&lt;/span&gt; download of any files from this portal. It is purely for security awareness purpose with no malicious intent. &lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/1983648786609221307/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/1983648786609221307' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/1983648786609221307'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/1983648786609221307'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2011/09/easy-access-to-exam-questions.html' title='&quot;Easy&quot; access to exam questions?'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNYb5QmQ4WWWeSRf1fH-GyrS3ATMCz7jxpcQ71Iw0a0vNb_21qdKtKkmSXqlPlgP7DFWW2ZAuezu-d3CrEKLFrJ36LC1YamaYRy1QwUAdK8_Hfi0lzOkJQwnbX28MIDuLdmCKHavLMbI4/s72-c/shanghai-1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-6411635085476028510</id><published>2011-09-25T20:28:00.006+08:00</published><updated>2011-09-28T00:20:29.817+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>Should print server be secured?</title><content type='html'>Recently, there are many news on data lost of customer information, product designs and algorithms from big corporation. WikiLeaks that exposed sensitive communication. Printers can be one of the good source of data leakage.&lt;br /&gt;&lt;br /&gt;When surfing and &quot;googling&quot; around the Internet, we still see many print servers accessible from Internet. Some of these print servers were even configured with &lt;span style=&quot;font-weight:bold;&quot;&gt;default login&lt;/span&gt; credential.&lt;br /&gt;&lt;br /&gt;Beside data leakage, you can also create some disruptions to their business by making unauthorized changes.&lt;br /&gt;&lt;br /&gt;Below are some examples, which i manage to gain access.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSWV9Nt0RYihYYZ55IsfEeV68GXwa8sHsD0rdcOgIj5Vho8NkQeayRuD8iNRrvb1-PF0oPUB8KRlW57FNCQ6Os3TL_g70x1Wx2uNnXsqfpYlHpFKNsqHA23-7x8OK-A1fkDVUXx-n1GmY/s1600/printer-1.jpg&quot;&gt;&lt;img style=&quot;float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 453px; height: 273px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSWV9Nt0RYihYYZ55IsfEeV68GXwa8sHsD0rdcOgIj5Vho8NkQeayRuD8iNRrvb1-PF0oPUB8KRlW57FNCQ6Os3TL_g70x1Wx2uNnXsqfpYlHpFKNsqHA23-7x8OK-A1fkDVUXx-n1GmY/s400/printer-1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5657050750944073154&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;From the Admin console, we can access the &quot;System Tools&quot;.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp4RSYOHMBk96jraJbsiKl47oIwN0KJTNMgp0HQBncEpvtOHkqVPFf1B3YiBGbPmh1G6gXmHwMpVIc0QHxYHuvlf34uL1udja2BOb7oG4fT_R_iz5IeEjVukoiAenz4RvHYg1GajNX2Y8/s1600/printer-2.jpg&quot;&gt;&lt;img style=&quot;float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 455px; height: 274px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp4RSYOHMBk96jraJbsiKl47oIwN0KJTNMgp0HQBncEpvtOHkqVPFf1B3YiBGbPmh1G6gXmHwMpVIc0QHxYHuvlf34uL1udja2BOb7oG4fT_R_iz5IeEjVukoiAenz4RvHYg1GajNX2Y8/s400/printer-2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5657050755548093010&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;We can also make changes in &quot;Advanced Setting&quot;.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUTHlohuZpipIrr_T4aX9laLUjLjXMABvJwYTALc2sCr8peQ61bZqAiTNAFromkckHVuDedXMd-CnPZo0ouiQV_c5ENb3MwRIwl-yXgHLfIOop6R0AGE6VBTpBowpbTf1dipIXBTgwNus/s1600/Pserver-1.jpg&quot;&gt;&lt;img style=&quot;float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 460px; height: 344px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUTHlohuZpipIrr_T4aX9laLUjLjXMABvJwYTALc2sCr8peQ61bZqAiTNAFromkckHVuDedXMd-CnPZo0ouiQV_c5ENb3MwRIwl-yXgHLfIOop6R0AGE6VBTpBowpbTf1dipIXBTgwNus/s400/Pserver-1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5657050761117022914&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;w01f advise: Print server should not be accessible from the Internet. If access from the Internet is required, make sure it is properly secured and change all default login.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt; &lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/6411635085476028510/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/6411635085476028510' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/6411635085476028510'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/6411635085476028510'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2011/09/should-print-server-be-secured.html' title='Should print server be secured?'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSWV9Nt0RYihYYZ55IsfEeV68GXwa8sHsD0rdcOgIj5Vho8NkQeayRuD8iNRrvb1-PF0oPUB8KRlW57FNCQ6Os3TL_g70x1Wx2uNnXsqfpYlHpFKNsqHA23-7x8OK-A1fkDVUXx-n1GmY/s72-c/printer-1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8593126747356640914.post-8563001970002857997</id><published>2011-07-01T14:04:00.001+08:00</published><updated>2011-07-03T14:22:18.852+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Video"/><category scheme="http://www.blogger.com/atom/ns#" term="Wireless"/><title type='text'>Test Drive OmniPeek 6.6</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSvHbcMXn2P73VkLlzfMEVYEtwZz4oGJl5H2SiXKeV9WTCR1qSnmsQFIAM3HCDhF3Z74ucG9_haV1cjMPgb2W4px-LaBXKIfcEnNRYJQy3g8vKmRP_cE9CM5ctvgsMYxIXtaH9VMXXmrw/s1600/WildPackets_header.jpg&quot;&gt;&lt;img style=&quot;WIDTH: 400px; HEIGHT: 87px; CURSOR: hand&quot; id=&quot;BLOGGER_PHOTO_ID_5625005660908894786&quot; border=&quot;0&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSvHbcMXn2P73VkLlzfMEVYEtwZz4oGJl5H2SiXKeV9WTCR1qSnmsQFIAM3HCDhF3Z74ucG9_haV1cjMPgb2W4px-LaBXKIfcEnNRYJQy3g8vKmRP_cE9CM5ctvgsMYxIXtaH9VMXXmrw/s400/WildPackets_header.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;Last week, WildPackets released OmniPeek 6.6, the first network analyzer with 802.11n 3-stream wireless support. You can test it out but downloading the&lt;a href=&quot;http://www.elabs6.com/c.html?rtr=on&amp;amp;s=7cmme,p0em,iho,k5hi,7g65,j2td,hd6q&quot;&gt; Wireless Essentials Pack&lt;/a&gt;. The pack includes the OmniPeek Enterprise 6.6 demo software as well as three popular wireless add-ons: Wireless Signal Stats, Wireless Channel Aggregator, and Roaming Latency Analyzer.&lt;br /&gt;&lt;br /&gt;The video below with &lt;em&gt;Jay Botelho&lt;/em&gt;, Director, Product Management, and &lt;em&gt;Chris Bloom&lt;/em&gt;, developer and evangelist of WildPackets will tell you all about OmniPeek&#39;s wireless capabilities. &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;object style=&quot;height: 268px; width: 440px&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/Ol4D7Vn_DsE?version=3&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://www.youtube.com/v/Ol4D7Vn_DsE?version=3&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowScriptAccess=&quot;always&quot; width=&quot;440&quot; height=&quot;268&quot;&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://werew01f.blogspot.com/feeds/8563001970002857997/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8593126747356640914/8563001970002857997' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/8563001970002857997'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8593126747356640914/posts/default/8563001970002857997'/><link rel='alternate' type='text/html' href='http://werew01f.blogspot.com/2011/07/test-drive-omnipeek-66.html' title='Test Drive OmniPeek 6.6'/><author><name>w01f</name><uri>http://www.blogger.com/profile/14456027514360790829</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RXxqEeRzd1_DLdWxjT-qvc02owXppW9iStPF7ED3AA6TKXm2rzqad9cfticj1UiE90dftXpbINBnhN_DJlqlpO7kGePPsQGtYaOgP3ZAt6M0ORBLsRmy1_81v1gaHQ/s220/Bert-closeup.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSvHbcMXn2P73VkLlzfMEVYEtwZz4oGJl5H2SiXKeV9WTCR1qSnmsQFIAM3HCDhF3Z74ucG9_haV1cjMPgb2W4px-LaBXKIfcEnNRYJQy3g8vKmRP_cE9CM5ctvgsMYxIXtaH9VMXXmrw/s72-c/WildPackets_header.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>