<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-6875971858454394582</atom:id><lastBuildDate>Fri, 01 Nov 2024 10:34:42 +0000</lastBuildDate><category>Tool</category><category>Whitepaper</category><category>Zero Day</category><category>Advisory</category><category>Hack.lu</category><title>G-SEC - Blog</title><description>Where facts are few, experts are many.</description><link>http://blog.g-sec.lu/</link><managingEditor>noreply@blogger.com (Thierry Zoller)</managingEditor><generator>Blogger</generator><openSearch:totalResults>12</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6875971858454394582.post-381045342491191923</guid><pubDate>Sun, 16 Feb 2020 11:20:00 +0000</pubDate><atom:updated>2020-02-16T12:28:20.719+01:00</atom:updated><title>A few new Advisories (Post will be updated regularly)</title><description>&lt;div style=&quot;text-align: right;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;Subscribe to the &lt;a href=&quot;http://feeds.feedburner.com/g-sec?format=xml&quot;&gt;RSS&lt;/a&gt; feed in case you are interested in updates&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-size: 12.348px; margin: 0px; padding: 0px;&quot;&gt;
&lt;div style=&quot;font-family: arial, helvetica; text-align: left;&quot;&gt;
This is a living post, that will be updated as I release Advisories.&lt;/div&gt;
&lt;div style=&quot;font-family: arial, helvetica; text-align: left;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: arial, helvetica; text-align: left;&quot;&gt;
Updates:&lt;/div&gt;
&lt;div style=&quot;font-family: arial, helvetica; text-align: left;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;ul style=&quot;font-family: arial, helvetica; margin: 0px 0px 15px; padding: 0px;&quot;&gt;
&lt;li style=&quot;list-style: square; margin: 0px 0px 0px 30px; padding: 0px; text-align: left;&quot;&gt;02.01.2020 - Added Initial List of Advisories&lt;/li&gt;
&lt;li style=&quot;list-style: square; margin: 0px 0px 0px 30px; padding: 0px; text-align: left;&quot;&gt;09.01.2020 - Added Bitdefender and Kaspersky Advisories&lt;/li&gt;
&lt;li style=&quot;list-style: square; margin: 0px 0px 0px 30px; padding: 0px; text-align: left;&quot;&gt;12.01.2020 - Added Bitdefender Advisories&lt;/li&gt;
&lt;li style=&quot;list-style: square; margin: 0px 0px 0px 30px; padding: 0px; text-align: left;&quot;&gt;13.02.2020 - Added TZO-011/012 ESET and AVIRA Advisories&lt;/li&gt;
&lt;li style=&quot;list-style: square; margin: 0px 0px 0px 30px; padding: 0px; text-align: left;&quot;&gt;14.02.2020 - Added TZO-15 F-Secure Advisory&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;font-family: arial, helvetica; text-align: left;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: arial, helvetica; text-align: left;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;List of advisories:&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style=&quot;background-color: white; margin: 0px 0px 15px; padding: 0px;&quot;&gt;
&lt;li style=&quot;color: #333333; font-size: 12.348px; list-style: square; margin: 0px 0px 0px 30px; padding: 0px; text-align: left;&quot;&gt;&lt;a href=&quot;https://www.zoller.lu/[TZO-01-2020]%20AVIRA%20Generic%20Bypass%20ISO.pdf&quot; style=&quot;color: #3c78a7; margin: 0px; padding: 0px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[TZO-001-2020] - AVIRA Generic Bypass (ISO)&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;color: #333333; font-size: 12.348px; list-style: square; margin: 0px 0px 0px 30px; padding: 0px; text-align: left;&quot;&gt;&lt;a href=&quot;https://www.zoller.lu/[TZO-02-2020]%20Kaspersly%20Generic%20Bypass%20ZIP.pdf&quot; style=&quot;color: #3c78a7; margin: 0px; padding: 0px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[TZO-002-2020] - Kaspersky Generic Bypass (ZIP)&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;color: #333333; font-size: 12.348px; list-style: square; margin: 0px 0px 0px 30px; padding: 0px; text-align: left;&quot;&gt;&lt;a href=&quot;https://www.zoller.lu/[TZO-03-2020]%20ESET%20Generic%20bypass%20ZIP.pdf&quot; style=&quot;color: #3c78a7; margin: 0px; padding: 0px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[TZO-003-2020] - ESET Generic Bypass (ZIP)&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;color: #333333; font-size: 12.348px; list-style: square; margin: 0px 0px 0px 30px; padding: 0px; text-align: left;&quot;&gt;&lt;a href=&quot;https://blog.zoller.lu/p/tzo-04-2019-bitdefender-malformed.html&quot; style=&quot;color: #3c78a7; margin: 0px; padding: 0px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[TZO-004-2020] - Bitdefender Generic Archive Bypass (GZ2)&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;color: #333333; font-size: 12.348px; list-style: square; margin: 0px 0px 0px 30px; padding: 0px; text-align: left;&quot;&gt;&lt;a href=&quot;https://blog.zoller.lu/p/tzo-05-2020-kaspersky-generic-archive.html&quot; style=&quot;color: #3c78a7; margin: 0px; padding: 0px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[TZO-005-2020] - Kaspersky Generic Bypass II (ZIP)&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;color: #333333; font-size: 12.348px; list-style: square; margin: 0px 0px 0px 30px; padding: 0px; text-align: left;&quot;&gt;&lt;a href=&quot;https://blog.zoller.lu/p/tzo-07-2019-bitdefender-malformed.html&quot; style=&quot;color: #3c78a7; margin: 0px; padding: 0px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[TZO-007-2020] - Bitdefender Generic Archive Bypass (ZIP)&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;color: #333333; font-size: 12.348px; list-style: square; margin: 0px 0px 0px 30px; padding: 0px; text-align: left;&quot;&gt;&lt;a href=&quot;https://blog.zoller.lu/p/advisory-tzo-08-2020-bitdefender.html&quot; style=&quot;color: #3c78a7; margin: 0px; padding: 0px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[TZO-008-2020] - Bitdefender Generic Archive Bypass (ZIP II)&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;color: #333333; font-size: 12.348px; list-style: square; margin: 0px 0px 0px 30px; padding: 0px; text-align: left;&quot;&gt;&lt;a href=&quot;https://blog.zoller.lu/p/advisory-tzo-09-2020-bitdefender.html&quot; style=&quot;color: #3c78a7; margin: 0px; padding: 0px; text-decoration-line: none;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[TZO-009-2020] - Bitdefender Generic Archive Bypass (RAR I)&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;color: #333333; font-size: 12.348px; list-style: square; margin: 0px 0px 0px 30px; padding: 0px; text-align: left;&quot;&gt;&lt;a href=&quot;https://blog.zoller.lu/p/from-low-hanging-fruit-department.html&quot; style=&quot;color: #3c78a7; margin: 0px; padding: 0px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[TZO-010-2020] - Bitdefender Generic Archive Bypass (RAR II)&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;color: #333333; font-size: 12.348px; list-style: square; margin: 0px 0px 0px 30px; padding: 0px; text-align: left;&quot;&gt;&lt;a href=&quot;https://blog.zoller.lu/p/tzo-11-2020-eset-generic-malformed.html&quot; style=&quot;color: #3c78a7; margin: 0px; padding: 0px; text-decoration-line: none;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[TZO-011-2020] - ESET Generic Bypass (GZIP)&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;color: #333333; font-size: 12.348px; list-style: square; margin: 0px 0px 0px 30px; padding: 0px; text-align: left;&quot;&gt;&lt;a href=&quot;https://blog.zoller.lu/p/tzo-13-2020-avira-generic-av-bypass-zip.html&quot; style=&quot;color: #3c78a7; margin: 0px; padding: 0px; text-decoration-line: none;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[TZO-012-2020] - AVIRA Generic Bypass (ZIP)&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;color: #333333; list-style: square; margin: 0px 0px 0px 30px; padding: 0px; text-align: left;&quot;&gt;&lt;pre style=&quot;color: black; margin: 0em;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: x-small;&quot;&gt;&lt;a href=&quot;https://blog.zoller.lu/p/tzo-13-2020-avira-generic-av-bypass-zip.html&quot;&gt;[TZO-13-2020] - AVIRA Generic AV Bypass (ZIP GPFLAG)&lt;/a&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;/li&gt;
&lt;li style=&quot;list-style: square; margin: 0px 0px 0px 30px; padding: 0px; text-align: left;&quot;&gt;&lt;pre style=&quot;margin: 0em;&quot;&gt;&lt;a href=&quot;https://blog.zoller.lu/p/tzo-15-2020-f-secure-generic-malformed.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: x-small;&quot;&gt;[TZO-15-2020] - F-SECURE Generic Malformed Container bypass (RAR)&lt;/span&gt;&lt;/a&gt;&lt;/pre&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-size: 12.348px; margin: 0px; padding: 0px;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica; font-size: 12.348px; margin: 0px; padding: 0px; text-align: start;&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-size: small; margin: 0px; padding: 0px;&quot;&gt;Where can I find more information about this bug class ?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica; font-size: 12.348px; margin: 0px; padding: 0px; text-align: start;&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
I wrote a post about this bug class in 2009 and in essence, it still holds true. The threat landscape has shifted and so have the technical capabilities :&amp;nbsp;&lt;a href=&quot;https://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html&quot; style=&quot;color: #3c78a7; margin: 0px; padding: 0px; text-decoration-line: none;&quot;&gt;https://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;b style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica; font-size: 12.348px; margin: 0px; padding: 0px; text-align: start;&quot;&gt;&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot;; font-size: 12.348px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica; font-size: 12.348px; margin: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-size: medium; margin: 0px; padding: 0px;&quot;&gt;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-size: small; margin: 0px; padding: 0px;&quot;&gt;Why now ?&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica; font-size: 12.348px; margin: 0px; padding: 0px; text-align: start;&quot; /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; color: #333333; display: inline !important; font-family: Arial, Helvetica; font-size: 12.348px; margin: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;div style=&quot;display: inline !important; margin: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; margin: 0px; padding: 0px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi47WoiKIWq0raloHzW7pQBo9sTcjbHl3Sk_xPYLrrk1F8IgOgwJXMWj4uJsZI0oHNnuCo_5LGhoVpkkwI1vRdV8zcHwbGI0yBqv6Fa_giAEiU7M6MvU9aYzPw_g9A9Mx-ZcRZDZSF_33w/s1600/av-bypass.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; color: #3c78a7; float: right; margin: 0px 0px 1em 1em; padding: 0px; text-decoration-line: none;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;461&quot; data-original-width=&quot;608&quot; height=&quot;242&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi47WoiKIWq0raloHzW7pQBo9sTcjbHl3Sk_xPYLrrk1F8IgOgwJXMWj4uJsZI0oHNnuCo_5LGhoVpkkwI1vRdV8zcHwbGI0yBqv6Fa_giAEiU7M6MvU9aYzPw_g9A9Mx-ZcRZDZSF_33w/s320/av-bypass.png&quot; style=&quot;border: 1px solid rgb(187, 187, 187); margin: 5px 10px 5px 0px; padding: 2px;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
10 years ago I took a look at ways to evade AV/DLP Engine detection by using various techniques and released a metric ton of Advisories. 10 years later after multiple CISO type roles, I wanted to deep dive again and see how far (or not) the AV&amp;nbsp; industry has reacted to this class of vulnerabilities. [1,2]&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica; font-size: 12.348px; margin: 0px; padding: 0px; text-align: left;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica; font-size: 12.348px; margin: 0px; padding: 0px; text-align: left;&quot;&gt;
These types of evasions are now actively being used in offensive operations [3]. To my surprise with a few exceptions most AV Vendors haven&#39;t appropriately reacted and in some cases I even found the very same vulnerabilities that were patched and disclosed years ago.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica; font-size: 12.348px; margin: 0px; padding: 0px; text-align: left;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica; font-size: 12.348px; margin: 0px; padding: 0px; text-align: left;&quot;&gt;
Worse than that is the fact that some vendors that were very collaborative in 2008/2009 have now started to ignore submissions (until I threaten disclosure) or are trying to argue that generically evading AV detection is not a vulnerability although they patched and released advisories before. Go figure.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica; font-size: 12.348px; margin: 0px; padding: 0px; text-align: left;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica; font-size: 12.348px; margin: 0px; padding: 0px; text-align: justify;&quot;&gt;
I had a lot of back and forth on this matter, for instance, one vendor argued that this could not be called a vulnerability because it would not impact Integrity,&amp;nbsp; Availability or Confidentiality. Another Vendor argued that this cannot pose a &quot;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;risk&quot;&lt;/b&gt;&amp;nbsp;to their customers because of XYZ (assumptions).&lt;br /&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;
Well, I am reporting vulnerabilities within products,&amp;nbsp;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;not risks&lt;/b&gt;. Furthermore, the impact on the customer is highly dependant on how the customer contextually uses the product. Something the vendor has rarely any insight into. Trying to calculate the expected loss for a hundred thousand customers is something we shouldn&#39;t be doing when handling vulnerability notifications, however, a shocking amount of vendors are unable to understand the difference between a vulnerability and a risk.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica; font-size: 12.348px; margin: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica; font-size: 12.348px; margin: 0px; padding: 0px; text-align: justify;&quot;&gt;
Even more bothersome to me is how the bug bounty platforms have created a distorted Reporter/Vendor relationship and mostly are executed to the detriment of the customers. I am collecting my experiences and plan to write a blog post about this phenomenon in the future.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica; font-size: 12.348px; margin: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica; font-size: 12.348px; margin: 0px; padding: 0px; text-align: justify;&quot;&gt;
I am hoping that I can finally help to eradicate this bug class and I don&#39;t have to come back to this 10 years from now.&lt;br /&gt;
&lt;span style=&quot;text-align: start;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica; font-size: 12.348px; margin: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;text-align: start;&quot;&gt;[1] Our presentation at Hack.lu and CansecWest entitled &quot;&lt;/span&gt;&lt;a href=&quot;https://www.slideshare.net/ThierryZoller/cansecwest-the-death-of-av-defence-in-depth&quot; style=&quot;color: #3c78a7; margin: 0px; padding: 0px; text-align: start; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;The Death of AV Defence in Depth?&lt;/a&gt;&lt;span style=&quot;text-align: start;&quot;&gt;&quot;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot;; font-size: 12.348px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot;; font-size: 12.348px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot;; font-size: 12.348px;&quot;&gt;[2] It didn&#39;t go unnoticed - Past Press Coverage:&amp;nbsp;&lt;a href=&quot;https://www.washingtonpost.com/wp-dyn/content/article/2007/11/26/AR2007112600015.html?&quot; style=&quot;color: #3c78a7; margin: 0px; padding: 0px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;Washington Post&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.infoworld.com/article/2642813/is-security-software-becoming-a-security-risk-.html&quot; style=&quot;color: #3c78a7; margin: 0px; padding: 0px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;Infoworld&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://web.archive.org/web/20071229061502/http://www.heise-security.co.uk/articles/100965&quot; style=&quot;color: #3c78a7; margin: 0px; padding: 0px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;Heise&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.securityfocus.com/brief/632&quot; style=&quot;color: #3c78a7; margin: 0px; padding: 0px; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;Security Focus&lt;/a&gt;&amp;nbsp;... etc.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot;; font-size: 12.348px;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot;; font-size: 12.348px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot;; font-size: 12.348px;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;
[3]&amp;nbsp;&lt;a href=&quot;https://www.bleepingcomputer.com/news/security/specially-crafted-zip-files-used-to-bypass-secure-email-gateways/&quot; style=&quot;color: #3c78a7; margin: 0px; padding: 0px; text-decoration-line: none;&quot;&gt;https://www.bleepingcomputer.com/news/security/specially-crafted-zip-files-used-to-bypass-secure-email-gateways/&lt;/a&gt;&amp;nbsp;|&amp;nbsp;&lt;a href=&quot;https://www.techradar.com/news/zip-files-are-being-used-to-bypass-security-gateways&quot; style=&quot;color: #3c78a7; margin: 0px; padding: 0px; text-decoration-line: none;&quot;&gt;https://www.techradar.com/news/zip-files-are-being-used-to-bypass-security-gateways&lt;/a&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica; font-size: 12.348px; margin: 0px; padding: 0px; text-align: left;&quot;&gt;
&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica; font-size: 12.348px; margin: 0px; padding: 0px; text-align: left;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica; font-size: 12.348px; margin: 0px; padding: 0px; text-align: left;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: #333333; font-family: Arial, Helvetica; font-size: 12.348px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; margin: 0px; orphans: 2; padding: 0px; text-align: start; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;G-SEC
Sécurité informatique Luxembourg
IT Security Luxembourg
IT Sicherheit Luxemburg&lt;/div&gt;</description><link>http://blog.g-sec.lu/2020/02/a-few-new-advisories-post-will-be.html</link><author>noreply@blogger.com (Thierry Zoller)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi47WoiKIWq0raloHzW7pQBo9sTcjbHl3Sk_xPYLrrk1F8IgOgwJXMWj4uJsZI0oHNnuCo_5LGhoVpkkwI1vRdV8zcHwbGI0yBqv6Fa_giAEiU7M6MvU9aYzPw_g9A9Mx-ZcRZDZSF_33w/s72-c/av-bypass.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6875971858454394582.post-4280732858005542004</guid><pubDate>Mon, 26 Sep 2011 14:38:00 +0000</pubDate><atom:updated>2011-09-28T22:02:26.728+02:00</atom:updated><title>An Overview of the BEAST - TLS, CBC, countermeasures (Update 3)</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;Lots of good information floating on the internet on the &lt;a href=&quot;http://www.insecure.cl/Beast-SSL.rar&quot;&gt;Proof of Concept (dubbed &#39;BEAST)&lt;/a&gt; against TLS 1.0 by Juliano Rizzo and Thai Duong at the &lt;a href=&quot;http://www.ekoparty.org/&quot;&gt;Ekoparty&lt;/a&gt;. This Post summaries the credible information available.&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;This blog post will be continuously updated as new items and possible mitigation emerge.&lt;/b&gt;&lt;i&gt;&lt;b&gt; &lt;/b&gt;&lt;a href=&quot;http://feeds.feedburner.com/ThierryZoller&quot;&gt;Subscribe to the RSS&lt;/a&gt; feed in case you are interested in updates.&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Updates&lt;/b&gt;&lt;i&gt; &lt;/i&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;i&gt;27.09.2011 : Added Thai blog post and POC Video&amp;nbsp;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;27.09.2011: Added&amp;nbsp;&lt;/i&gt;&lt;span id=&quot;summary_alias_container&quot;&gt;&lt;span id=&quot;alias_nonedit_display&quot;&gt;&lt;i&gt;&lt;a href=&quot;http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389&quot;&gt;CVE-2011-3389&lt;/a&gt; &lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;span id=&quot;summary_alias_container&quot;&gt;&lt;span id=&quot;alias_nonedit_display&quot;&gt;&lt;i&gt;,&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;i&gt; &lt;a href=&quot;https://bugzilla.mozilla.org/show_bug.cgi?id=665814&quot;&gt;Bugzilla entry&amp;nbsp;&lt;/a&gt; , Microsoft Advisory &lt;a href=&quot;http://technet.microsoft.com/en-us/security/advisory/2588513&quot;&gt;2588513&lt;/a&gt;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Added BID, Secunia and Opera Advisory&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;28.09.2011: &lt;a href=&quot;http://phiral.net/Beast-SSL.rar&quot;&gt;Added Whitepaper and Proof of Concept Code &lt;/a&gt;&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;TOC&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Introduction to BEAST, TLS and CBC&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Relevant Papers&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Proposed countermeasures&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Introduction to BEAST, TLS and CBC&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Juliano and Thai&lt;/span&gt; presented a Proof of Concept of an attack against &lt;a href=&quot;http://en.wikipedia.org/wiki/Transport_Layer_Security&quot;&gt;TLS&lt;/a&gt; 1.0 is first documented in &lt;a href=&quot;http://www.mail-archive.com/openssl-dev@openssl.org/msg10664.html&quot;&gt;2001&lt;/a&gt; and discussed in papers in &lt;a href=&quot;http://eprint.iacr.org/2004/111.pdf&quot;&gt;2005&lt;/a&gt; and &lt;a href=&quot;http://eprint.iacr.org/2006/136.pdf&quot;&gt;2006&lt;/a&gt;. It was thought to be an impractical attack back then and solved by adding empty fragments into the IV.&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;This issue &lt;b&gt;was addressed &lt;/b&gt;in &lt;a href=&quot;http://en.wikipedia.org/wiki/Transport_Layer_Security&quot;&gt;TLS&lt;/a&gt; 1.1 (2005-6) and OpenSSL by inserting&amp;nbsp; Empty Fragments into the message.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
So why is this still and issue today ?&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;First and foremost, &lt;a href=&quot;http://en.wikipedia.org/wiki/Transport_Layer_Security&quot;&gt;TLS &lt;/a&gt;1.1 is &lt;a href=&quot;http://blog.g-sec.lu/2011/09/ssltls-hardening-and-compatibility.html&quot;&gt;not supported by many SSL stacks&lt;/a&gt;,
 server or client side. Although the protocol exists there was no real 
incentives to move over to TLS 1.1 (or 1.2). Attacks were documented, 
some &lt;a href=&quot;http://www.openssl.org/%7Ebodo/tls-cbc.txt&quot;&gt;countermeasures implemented in some SSL stacks&lt;/a&gt;, but deemed impractical and forgotten.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;Secondly the OpenSSL option &quot;&lt;a href=&quot;http://www.openssl.org/docs/ssl/SSL_CTX_set_options.html#NOTES&quot;&gt;SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS&lt;/a&gt;&quot;
 is activated by default as it caused incompatibilities with certain SSL
 stacks. Activating here means removing the mitigation against this 
attack. It is known that&lt;span style=&quot;font-size: small;&quot;&gt; &lt;a href=&quot;http://svn.apache.org/repos/asf/tomcat/trunk/java/org/apache/tomcat/jni/SSL.java&quot;&gt;Tomcat&lt;/a&gt;, &lt;a href=&quot;http://www.opensource.apple.com/source/apache_mod_ssl/apache_mod_ssl-4/mod_ssl/pkg.sslmod/ssl_engine_init.c&quot;&gt;Apache mod_ssl&lt;/a&gt;, and &lt;a href=&quot;http://lists.pcre.org/lurker/message/20110322.131702.b0cd375d.it.html&quot;&gt;Exim&lt;/a&gt; disable this feature in OpenSSL by default&lt;/span&gt;. Note : The proposed NSS patch (see countermeasures) adds empty application data records, which appears to be more compatible.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
To quote &lt;span class=&quot;bz_comment_user&quot;&gt;&lt;span class=&quot;vcard&quot;&gt;&lt;span class=&quot;fn&quot;&gt;Nelson Bolyard&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; on why TLS 1.1 was not introduced sooner in the NSS stack (Currently used by Chrome, Firefox and various servers) :&lt;/div&gt;
&lt;blockquote&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;pre class=&quot;bz_comment_text&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&quot;There is no significant market demand for TLS 1.1, so we&#39;ve been working on improvements in 
other areas,such as sharable DBs and full RFC 3280 compliance.  Once TLS 1.2 finally becomes 
an RFC, we will work on that some time thereafter. We believe there will be a demand for 
TLS 1.2 and some of the new cipher suites that require TLS 1.2 as a prerequisite.&quot; &lt;/span&gt;&lt;a href=&quot;https://bugzilla.mozilla.org/show_bug.cgi?id=422232&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;Source&lt;/a&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9_1Uu3oBlqElL6FZUPR-442HVwxc32SkcIq1pnQKjcdMxW7OkcUPTpgUc_QSqg-G-wC2YfZ0pdJjLBkdJo0iKf3fNuU0TKOyyg9kg_QKc39KFM-oJWf9Q_X-OyPsdwZWEU-_S7o9LjdI/s1600/aaaaa2.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;350&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9_1Uu3oBlqElL6FZUPR-442HVwxc32SkcIq1pnQKjcdMxW7OkcUPTpgUc_QSqg-G-wC2YfZ0pdJjLBkdJo0iKf3fNuU0TKOyyg9kg_QKc39KFM-oJWf9Q_X-OyPsdwZWEU-_S7o9LjdI/s400/aaaaa2.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt; &lt;/div&gt;
&lt;br /&gt;
&amp;nbsp;&lt;span style=&quot;font-size: large;&quot;&gt;What is TLS ? What is CBC ?&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Putting
 it in layman terms, TLS is the new name for SSL. SSL was developed by 
Netscape and was renamed and reworked into TLS when handed over to the 
IETF.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
More details are available on &lt;a href=&quot;http://en.wikipedia.org/wiki/Transport_Layer_Security&quot;&gt;Wikipedia&lt;/a&gt; - The post by the TOR team does an excellent job of explaining TLS, CBC and the attack itself, &lt;a href=&quot;https://blog.torproject.org/blog/tor-and-beast-ssl-attack&quot;&gt;I highly recommend reading it especially if you are interested in the details&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;How does the Attack work ?&lt;/span&gt;&lt;br /&gt;
The attack has the CVE number &lt;span id=&quot;summary_alias_container&quot;&gt;&lt;span id=&quot;alias_nonedit_display&quot;&gt;&lt;i&gt;&lt;a href=&quot;http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389&quot;&gt;CVE-2011-3389&lt;/a&gt; &lt;/i&gt;&lt;/span&gt;&lt;/span&gt;- Thai himself explains the attack and how it was discovered in his blog post &lt;a href=&quot;http://vnhacker.blogspot.com/2011/09/beast.html&quot;&gt;&quot;Beast&quot;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/BTqAIDVUvrU?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Proposed Countermeasures&lt;/span&gt;&amp;nbsp;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Generic Server Recommendations :&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Short-Term : &lt;/span&gt;&lt;/span&gt;&lt;b style=&quot;font-weight: normal;&quot;&gt;Prioritize the RC4 Algorithm over CBC based ciphers (AES, DES). See the &lt;/b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;a href=&quot;http://www.phonefactor.com/blog/slaying-beast-mitigating-the-latest-ssltls-vulnerability.php&quot;&gt;recommendations by PhoneFactor&lt;/a&gt; .&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;b style=&quot;font-weight: normal;&quot;&gt;Short to Mid-Term : &lt;/b&gt;Enable and 
Offer TLS1.1 or TLS1.2 (Note: Firefox and chrome do not support TLS 1.1 
and will fallback). For a compatibility overview look &lt;a href=&quot;http://www.g-sec.lu/sslharden/SSL_comp_report2011.pdf&quot;&gt;here &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
In the works :&amp;nbsp; &lt;br /&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;The publication by Juliano and Thai 
should create the necessary incentive for Vendors to implement and use 
TLS1.1 and/or TLS 1.2. I will keep an eye on the usual suspects and 
collect all relevant support in the &quot;&lt;a href=&quot;http://blog.g-sec.lu/2011/09/ssltls-hardening-and-compatibility.html&quot;&gt;TLS/SSL compatibility Report&lt;/a&gt;&quot;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;The Phone Factor (the guys behind the TLS session renegotiation vulnerability) &lt;a href=&quot;http://www.phonefactor.com/blog/slaying-beast-mitigating-the-latest-ssltls-vulnerability.php%20&quot;&gt;propose prioritizing&lt;/a&gt; RC4 over AES or DES as a short term mitigation. &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;The chrome team has created &lt;a href=&quot;http://src.chromium.org/viewvc/chrome?view=rev&amp;amp;revision=97269&quot;&gt;patches to NSS fixing the issue client-side&lt;/a&gt;. (Empty Application Data Records) - it is currently pushes to Chromium Beta channels for testing&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Various vendor discuss countermeasures in this&lt;a href=&quot;https://bugzilla.mozilla.org/show_bug.cgi?id=665814&quot;&gt; Bugzilla entry&amp;nbsp;&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Literature&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;a href=&quot;http://www.insecure.cl/Beast-SSL.rar&quot;&gt;The BEAST Paper by Julian and Thai &lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://vnhacker.blogspot.com/2011/09/beast.html&quot;&gt;Thais&#39;&lt;/a&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; blog post with a full recap &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Attacks first documented in &lt;a href=&quot;http://www.mail-archive.com/openssl-dev@openssl.org/msg10664.html&quot;&gt;2001&lt;/a&gt; and discussed in papers in &lt;a href=&quot;http://eprint.iacr.org/2004/111.pdf&quot;&gt;2005&lt;/a&gt; and &lt;a href=&quot;http://eprint.iacr.org/2006/136.pdf&quot;&gt;2006&lt;/a&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Recap by the &lt;a href=&quot;https://blog.torproject.org/blog/tor-and-beast-ssl-attack&quot;&gt;TOR Team&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;a href=&quot;http://www.phonefactor.com/blog/slaying-beast-mitigating-the-latest-ssltls-vulnerability.php&quot;&gt;Recommendations by the PhoneFactor&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Chrome Team has an &lt;a href=&quot;http://src.chromium.org/viewvc/chrome?view=rev&amp;amp;revision=97269&quot;&gt;interesting write up&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;font-size: large;&quot;&gt; Advisories&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://bugzilla.mozilla.org/show_bug.cgi?id=665814&quot;&gt;&lt;i&gt;Microsoft Advisory &lt;/i&gt;&lt;/a&gt;&lt;i&gt;&lt;a href=&quot;http://technet.microsoft.com/en-us/security/advisory/2588513&quot;&gt;2588513&lt;/a&gt;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;&lt;a href=&quot;http://technet.microsoft.com/en-us/security/advisory/2588513&quot;&gt;&amp;nbsp;&lt;/a&gt;&lt;/i&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;a href=&quot;https://bugzilla.mozilla.org/show_bug.cgi?id=665814&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Bugzilla Entry&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt; &lt;span id=&quot;summary_alias_container&quot;&gt;&lt;span id=&quot;alias_nonedit_display&quot;&gt;&lt;a href=&quot;http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389&quot;&gt;CVE-2011-3389&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://osvdb.org/74829&quot;&gt;OSVDB&amp;nbsp;  74829&lt;/a&gt;&lt;br /&gt;
  &lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.securityfocus.com/bid/49388&quot;&gt;BID 49388&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;G-SEC
Sécurité informatique Luxembourg
IT Security Luxembourg
IT Sicherheit Luxemburg&lt;/div&gt;</description><link>http://blog.g-sec.lu/2011/09/overview-of-beast-tls-cbc.html</link><author>noreply@blogger.com (Thierry Zoller)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9_1Uu3oBlqElL6FZUPR-442HVwxc32SkcIq1pnQKjcdMxW7OkcUPTpgUc_QSqg-G-wC2YfZ0pdJjLBkdJo0iKf3fNuU0TKOyyg9kg_QKc39KFM-oJWf9Q_X-OyPsdwZWEU-_S7o9LjdI/s72-c/aaaaa2.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6875971858454394582.post-2208169947965430364</guid><pubDate>Tue, 20 Sep 2011 15:05:00 +0000</pubDate><atom:updated>2011-09-25T17:34:59.659+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Whitepaper</category><title>SSL/TLS Hardening and compatibility report 2011 (updated)</title><description>&lt;div style=&quot;text-align: right;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;Subscribe to the &lt;a href=&quot;http://feeds.feedburner.com/g-sec?format=xml&quot;&gt;RSS&lt;/a&gt; feed in case you are interested in updates&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
My professional and private commitments made it difficult to maintain a healthly blogging style, I am trying to get back to some blogging on a more regular basis.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;Quick Update:&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;G-SEC does &lt;b&gt;no longer operate on a commercial basis&lt;/b&gt;, for those that want to join the G-SEC Team and blogging platform drop me (Thierry) a mail.&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;I updated the &quot;TLS/SSL hardening and compatibility Report&quot; to 2011&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;TLS/SSL hardening and compatibility Report 2011&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Notable Changes:&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Chrome moved from SCHANNEL to NSS, this move enhances the ciphersuites available to XP systems considerably (compared to IE)&amp;nbsp;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Added OPERA ciphersuites&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Updated: Restructured Tables to reflect usage of NSS by Firefox and Chrome&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Updated: Fixed typos&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQDtokzMPK-MRMIW4dRghv2uiAg2CWU7JwMCVCpXfbppf74aow6FcdyUL_y5_1tXIwiOFOwVKikOSbUWQc6xk-6kNnESkQShJArnwqo9gshcZOeqe1Fsof4tyN4A2anFKxRhjI1aXXt5E/s1600/aaaaa2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;350&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQDtokzMPK-MRMIW4dRghv2uiAg2CWU7JwMCVCpXfbppf74aow6FcdyUL_y5_1tXIwiOFOwVKikOSbUWQc6xk-6kNnESkQShJArnwqo9gshcZOeqe1Fsof4tyN4A2anFKxRhjI1aXXt5E/s400/aaaaa2.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Note: I have not re-tested all browsers completely, if you find errors please let me know.&amp;nbsp;The report is can be downloaded &lt;a href=&quot;http://www.g-sec.lu/sslharden/SSL_comp_report2011.pdf&quot;&gt;here&lt;/a&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: right;&quot;&gt;
Signed - Thierry Zoller&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;G-SEC
Sécurité informatique Luxembourg
IT Security Luxembourg
IT Sicherheit Luxemburg&lt;/div&gt;</description><link>http://blog.g-sec.lu/2011/09/ssltls-hardening-and-compatibility.html</link><author>noreply@blogger.com (Thierry Zoller)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQDtokzMPK-MRMIW4dRghv2uiAg2CWU7JwMCVCpXfbppf74aow6FcdyUL_y5_1tXIwiOFOwVKikOSbUWQc6xk-6kNnESkQShJArnwqo9gshcZOeqe1Fsof4tyN4A2anFKxRhjI1aXXt5E/s72-c/aaaaa2.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6875971858454394582.post-5090618459139771638</guid><pubDate>Thu, 18 Feb 2010 14:20:00 +0000</pubDate><atom:updated>2010-02-18T15:42:48.021+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tool</category><category domain="http://www.blogger.com/atom/ns#">Whitepaper</category><title>New Paper: SSL/TLS Hardening and Compatibility report 2010</title><description>&lt;div style=&quot;text-align: right;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Subscribe to the &lt;a href=&quot;http://feeds.feedburner.com/g-sec?format=xml&quot;&gt;RSS&lt;/a&gt; feed in case you are interested in updates&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black; font-family: inherit;&quot;&gt;At last. What started as an &quot;I need an overview of best practise in SSL/TLS configuration&quot; type of idea, ended in a 3 month code, reverse engineer and writing effort. I really hope this comes in handy for you and was worth the effort. This is the &quot;Release candidate&quot; version of the paper, should no errors be found it will be the final version.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black; font-family: inherit;&quot;&gt;This paper aims at answering the following questions :&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black; font-family: inherit;&quot;&gt;What SSL/TLS configuration is state of the art and considered secure (enough) for the next years?&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black; font-family: inherit;&quot;&gt;What SSL/TLS ciphers do modern browsers support ?&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black; font-family: inherit;&quot;&gt;What SSL/TLS settings do server and common SSL providers support ?&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black; font-family: inherit;&quot;&gt;What are the cipher suites offering most compatibility and security ?&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black; font-family: inherit;&quot;&gt;Should we really disable SSLv2 ? What about legacy browsers ?&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black; font-family: inherit;&quot;&gt;How long does RSA still stand a chance ? &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black; font-family: inherit;&quot;&gt;What are the recommended hashes,ciphers for the next years to come&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black; font-family: inherit;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black; font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;/span&gt;The paper includes two tools :&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;ul&gt;&lt;li&gt;SSL Audit (alpha) :&amp;nbsp; SSL scanner scanning remote hosts for SSL/TLS support (&lt;a href=&quot;http://www.g-sec.lu/sslaudit/ssl_audit_take2.swf&quot;&gt;Video&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt; Harden SSL/TLS (beta) : Windows server and client SSL/TLS hardening tool (&lt;a href=&quot;http://www.g-sec.lu/sslharden/harde_ssl.swf&quot;&gt;Video&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Without further ado here is the &lt;a href=&quot;http://www.g-sec.lu/sslharden/TLS%20SSL%20hardening%20and%20compatibliy%20report%202010.zip&quot;&gt;complete package&lt;/a&gt; &lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;b&gt;PS: In order to know whether this type of publication is useful to some and whether I should spend time on such publications in the future, I would appreciate a heads-up if you find this to be interesting. Thierry&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;G-SEC
Sécurité informatique Luxembourg
IT Security Luxembourg
IT Sicherheit Luxemburg&lt;/div&gt;</description><link>http://blog.g-sec.lu/2010/02/new-paper-ssltls-hardening-and.html</link><author>noreply@blogger.com (Thierry Zoller)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6875971858454394582.post-8110470940060474819</guid><pubDate>Tue, 16 Feb 2010 17:43:00 +0000</pubDate><atom:updated>2010-02-16T18:43:46.261+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tool</category><title>Harden SSL/TLS  - Tool release</title><description>&lt;div style=&quot;text-align: right;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Subscribe to the &lt;a href=&quot;http://feeds.feedburner.com/g-sec?format=xml&quot;&gt;RSS&lt;/a&gt; feed in case you are interested in updates&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;style3&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;“Harden SSL/TLS” allows hardening the SSL/TLS  settings of  Windows 2000,2003,2008,2008R2, XP,Vista,7. It allows locally and   remotely set SSL policies allowing or denying certain ciphers/hashes or   complete ciphersuites. &lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbjoFuW8f-tDGEYdXJ1yc7465moTK7wUkiOY8Rpa1wf6wrkseRrXywnckm4DrWPfrr6iqvajnh_YDuAaVqMFzcnH94waNdMUo12AHL9HGabE6t-bjRKQ1lnwzbCswPF-0_MZLh4u0Zp2k/s1600-h/ssl_harden_f.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;133&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbjoFuW8f-tDGEYdXJ1yc7465moTK7wUkiOY8Rpa1wf6wrkseRrXywnckm4DrWPfrr6iqvajnh_YDuAaVqMFzcnH94waNdMUo12AHL9HGabE6t-bjRKQ1lnwzbCswPF-0_MZLh4u0Zp2k/s200/ssl_harden_f.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;style3&quot;&gt;^This tool specifically allows setting policies with regards to what ciphers  and protocols are available to applications that use SCHANNEL crypto  interface.  A lot of windows applications do use this interface, for  instance Google Chrome as well as Apple Safari are a few of these. By  changing the settings you can indirectly control what ciphers these  applications are allowed to use.            &lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;style3&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;style3&quot;&gt;           &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;style3&quot;&gt;&lt;strong&gt;Advanced mode &lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;style3&quot;&gt;           · re-enable ECC P521 mode on Windows7 and 2008R2&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;style3&quot;&gt;           · Set TLS Cache size and timeout&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;style3&quot;&gt;           &lt;/span&gt;&lt;span class=&quot;style3&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;style3&quot;&gt;             &lt;strong&gt;Known issues:&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;style3&quot;&gt;             · none&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;style3&quot;&gt;             &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;style3&quot;&gt;             &lt;strong&gt;Author :&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;style3&quot;&gt;             Thierry ZOLLER for G-SEC &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;style3&quot;&gt;             Download: &lt;a href=&quot;http://www.g-sec.lu/sslharden/HardenSSL.zip&quot;&gt;Harden TLS/SSL &lt;/a&gt;(beta)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;style3&quot;&gt;             Download: &lt;a href=&quot;http://www.g-sec.lu/sslharden/documentation.pdf&quot;&gt;Documentation&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;http://www.g-sec.lu/sslharden/harde_ssl.swf&quot;&gt;Video Preview&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;style3&quot;&gt;           &lt;/span&gt; &lt;br /&gt;
&lt;div class=&quot;block3&quot; style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;G-SEC
Sécurité informatique Luxembourg
IT Security Luxembourg
IT Sicherheit Luxemburg&lt;/div&gt;</description><link>http://blog.g-sec.lu/2010/02/harden-ssltls-tool-release.html</link><author>noreply@blogger.com (Thierry Zoller)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbjoFuW8f-tDGEYdXJ1yc7465moTK7wUkiOY8Rpa1wf6wrkseRrXywnckm4DrWPfrr6iqvajnh_YDuAaVqMFzcnH94waNdMUo12AHL9HGabE6t-bjRKQ1lnwzbCswPF-0_MZLh4u0Zp2k/s72-c/ssl_harden_f.png" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6875971858454394582.post-8931305765972206288</guid><pubDate>Wed, 10 Feb 2010 15:33:00 +0000</pubDate><atom:updated>2010-02-10T16:55:30.228+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tool</category><title>SSL/TLS Audit (alpha) - Tool Release</title><description>&lt;div style=&quot;text-align: right;&quot;&gt;&lt;div style=&quot;text-align: right;&quot;&gt;&lt;span style=&quot;color:#999999;&quot;&gt;Subscribe to the &lt;a href=&quot;http://feeds.feedburner.com/g-sec?format=xml&quot;&gt;RSS&lt;/a&gt; feed in case you are interested in updates&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: right;&quot;&gt;&lt;span style=&quot;color:#999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:black;&quot;&gt;Developed as part of G-SEC&#39;s investigation into the &quot;Secure SSL/TLS configuration Report 2010&quot; (to be published) we developed this little tool called SSL Audit. (More to follow in the next days - stay tuned).&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:black;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:black;&quot;&gt;SSL Audit scans web servers for SSL support, unlike other tools it is not limited to ciphers supported by SSL engines such as OpenSSL or NSS and can detect all known cipher suites over all SSL and TLS versions.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:black;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:black;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhU0V3j8VElpL4zEukqe9wtdJjHZdT6MPpZoOBqAWvBj0F8wBrfn3rXqaLOB27M69ylv8q1w5Ukf6An0aeb4tPA1xQ_P8NPKY5opppAtSb8KGa_ttXNVnw579D9tP7hazq-QaSTtNzTas8/s1600-h/ssl_scanner.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;129&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhU0V3j8VElpL4zEukqe9wtdJjHZdT6MPpZoOBqAWvBj0F8wBrfn3rXqaLOB27M69ylv8q1w5Ukf6An0aeb4tPA1xQ_P8NPKY5opppAtSb8KGa_ttXNVnw579D9tP7hazq-QaSTtNzTas8/s200/ssl_scanner.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;Apart from scanning available ciphersuites it has an interesting tidbit : &lt;b&gt;The Fingerprint mode (Experimental). &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;Included is an experimental fingerprint engine that tries to determine the SSL Engine used server side. It does so by sending normal and malformed SSL packets that can be interpreted in different ways. &lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;SSL Audit is able to fingerprint :&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;· IIS7.5 (Schannel) &lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;· IIS7.0 (Schannel) &lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;· IIS 6.0 (Schannel) &lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;· Apache (Openssl) &lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;· Apache (NSS) &lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;· Certicom &lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;· RSA BSAFE &lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;embed src=&quot;http://www.g-sec.lu/sslaudit/ssl_audit_take2.swf&quot; width=&quot;500&quot; height=&quot;300&quot; loop=&quot;False&quot; allowfullscreen=&quot;true&quot; quality=&quot;high&quot; bgcolor=&quot;#FFFFFF&quot; type=&quot;application/x-shockwave-flash&quot; pluginspage=&quot;http://www.macromedia.com/shockwave/download/index.cgi?P1_Prod_Version=ShockwaveFlash&quot; play=&quot;false&quot;&gt;&lt;/embed&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;http://www.g-sec.lu/products.html&quot;&gt;Download available on the product page&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;G-SEC
Sécurité informatique Luxembourg
IT Security Luxembourg
IT Sicherheit Luxemburg&lt;/div&gt;</description><link>http://blog.g-sec.lu/2010/02/ssltls-audit-alpha-tool-release.html</link><author>noreply@blogger.com (Thierry Zoller)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhU0V3j8VElpL4zEukqe9wtdJjHZdT6MPpZoOBqAWvBj0F8wBrfn3rXqaLOB27M69ylv8q1w5Ukf6An0aeb4tPA1xQ_P8NPKY5opppAtSb8KGa_ttXNVnw579D9tP7hazq-QaSTtNzTas8/s72-c/ssl_scanner.png" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6875971858454394582.post-1196369082456336674</guid><pubDate>Fri, 13 Nov 2009 11:52:00 +0000</pubDate><atom:updated>2009-12-09T21:26:59.721+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Whitepaper</category><title>TLS / SSLv3 renegotiation vulnerability explained (Update #2)(</title><description>&lt;div style=&quot;text-align: right;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Subscribe to the &lt;a href=&quot;http://feeds.feedburner.com/g-sec?format=xml&quot;&gt;RSS&lt;/a&gt; feed in case you are interested in updates&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;This paper explains the vulnerability for a broader audience and summarizes the information that is currently available. The document is prone to updates and is believed to be accurate by the time of writing. &lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;Updated 18.11.2009 : Added SMTP over TLS attack scenario, added s_client testcase&lt;/li&gt;
&lt;li&gt;Updated 30.11.2009 : Added FTPS analysis, new attacks against HTTPS (injecting responses and downgrading to HTTP)&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Updated 09.12.2009 : &lt;a href=&quot;http://www.g-sec.lu/tls-ssl-proof-of-concept.html&quot;&gt;Proof of concept&lt;/a&gt; files for TRACE and 302 redirect using TLS rengotiation flaw&lt;br /&gt;
&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
Download &quot;&lt;a href=&quot;http://clicky.me/tlsvuln&quot;&gt;TLS / SSLv3 renegotiation vulnerability explained&lt;/a&gt;&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: right;&quot;&gt;posted by Thierry Zoller&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
Related post: &lt;a href=&quot;http://blog.g-sec.lu/2009/11/sslv3-tls-man-in-middle-vulnerability.html&quot;&gt;Vulnerabilities like it&#39;s 1999 SSLv3 / TLS Man in the Middle vulnerability - update #8 &lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;G-SEC
Sécurité informatique Luxembourg
IT Security Luxembourg
IT Sicherheit Luxemburg&lt;/div&gt;</description><link>http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html</link><author>noreply@blogger.com (Thierry Zoller)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6875971858454394582.post-4823321018305808908</guid><pubDate>Thu, 05 Nov 2009 12:00:00 +0000</pubDate><atom:updated>2009-12-09T21:22:06.087+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Zero Day</category><title>SSLv3 / TLS Man in the Middle vulnerability - update #9</title><description>&lt;div style=&quot;background-color: white; color: black; text-align: right;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Subscribe to the &lt;/span&gt;&lt;a href=&quot;http://feeds.feedburner.com/g-sec?format=xml&quot;&gt;RSS&lt;/a&gt;&lt;span style=&quot;background-color: #ffe599;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt; feed in case you are interested in updates&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;b&gt;Updated 17:50 GMT+1 / 05.2009 - added Mitigation / Impact&lt;/b&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Updated 16:40 GMT+1 / 06.2009 - added IETF draft&lt;/b&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Updated 14:35 GMT+1 / 07.2009 - added SSLTLS Test Tool&lt;/b&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Updated 16:34 GMT+1 / 07.2009 - added OpenSSL patch&lt;/b&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Updated 13:00 GMT+1 / 09.2009 - added GNUTLS patch&lt;/b&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Updated 19:40 GMT+1 / 09.2009 - added Mikestoolbox.net testing  TLS renegotiation support&lt;/b&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Updated 21:29 GMT+1 / 09.2009 - added Apache patch, Mozilla Bug ID, Redhat Bug ID, Mozilla patch disabling tls renegotiation, Tomcat mitigation&lt;/b&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Updated 21:00 &lt;/b&gt;&lt;b&gt;GMT+1 &lt;/b&gt;&lt;b&gt;/ 12.2009 - added a &lt;a href=&quot;http://clicky.me/tlsvuln&quot;&gt;whitepaper&lt;/a&gt; trying to explain the vulnerability and it&#39;s implications to a broader audience&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;After some in-house tests, we can confirm that the vulnerability presented at &lt;a href=&quot;http://www.extendedsubset.com/&quot;&gt;http://www.extendedsubset.com/&lt;/a&gt;  indeed real and should pose a significant threat to most. The  vulnerability has been discovered by &lt;/span&gt;&lt;/span&gt;&lt;i&gt;Marsh Ray, Steve Dispensa and Martin Rex.&lt;/i&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;
We are currently looking into possible mitigations and will update this blog post regularly with more information regarding said vulnerability. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;
Details&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html&quot;&gt;TLS/SSL vulnerability explained : G-SEC Whitepaper (DRAFT)&lt;/a&gt;&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.g-sec.lu/tls_protocol_diagrams.pdf&quot;&gt;Protocol and attack flow graph (Author: Marsh Ray)&lt;/a&gt;&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.g-sec.lu/Renegotiating%20TLS.pdf&quot;&gt;Original paper about the vulnerability&amp;nbsp;(Author: Marsh Ray)&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://extendedsubset.com/renegotiating_tls_20091104_pub.zip&quot;&gt;Network data captures (Author: Marsh Ray)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://blog.ivanristic.com/2009/11/ssl-and-tls-authentication-gap-vulnerability-discovered.html&quot;&gt;Explanation by Ivan Ristic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://svn.resiprocate.org/rep/ietf-drafts/ekr/draft-rescorla-tls-renegotiate.txt&quot;&gt;IETF TLS renegotiation extension Draft&lt;/a&gt;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.leviathansecurity.com/pdf/ssltlstest.zip&quot;&gt;SSLTLS Test tool&lt;/a&gt; (Leviathan Security)&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.mikestoolbox.net/&quot;&gt;Mikestoolbox.net&lt;/a&gt; - Test client implementation for TLS renegotiation extension&lt;/li&gt;
&lt;/ul&gt;&lt;b&gt;Patches&lt;/b&gt; &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://www.openssl.org/source/openssl-0.9.8l.tar.gz&quot;&gt;OpenSSL 0.9.81&lt;/a&gt;&lt;b&gt;  &lt;/b&gt;( Attention: OpenSSL removed the TLS/SSL renegotiation feature from this package - you need to test application before/after updating to this version ) (via &lt;a href=&quot;http://isc.sans.org/diary.html?storyid=7543&quot;&gt;ISC&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://lists.gnu.org/archive/html/gnutls-devel/2009-11/msg00014.html&quot;&gt;GnuTLS patch&lt;/a&gt; (implements a new TLS extension proposed in the IETF Draft) (via &lt;a href=&quot;http://sid.rstack.org/blog/index.php/373-tls-tout-le-monde-en-parle-pourquoi-pas-moi&quot;&gt;SID&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.apache.org/dist/httpd/patches/apply_to_2.2.14/CVE-2009-3555-2.2.patch&quot;&gt;Apache patch  &lt;/a&gt;(patches renegogtiation prefix attacks at the application layer, still need openssl fixes for other attacks)&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://bugzilla.mozilla.org/show_bug.cgi?id=526689&quot;&gt;Mozilla bug id 526689&lt;/a&gt; | &lt;a href=&quot;https://bugzilla.redhat.com/attachment.cgi?id=367773&quot;&gt;Proposed Mozilla patch&lt;/a&gt;&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://bugzilla.redhat.com/show_bug.cgi?id=533125&quot;&gt;Redhat bug tracking 533125&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.mail-archive.com/users@tomcat.apache.org/msg69335.html&quot;&gt;Tomcat&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;b&gt;Advisories&amp;nbsp;&lt;/b&gt; &lt;br /&gt;
&lt;ul&gt;&lt;li&gt; &lt;a href=&quot;http://www.cisco.com/en/US/products/products_security_advisory09186a0080b01d1d.shtml&quot;&gt;Cisco - cisco-sa-20091109-tls&lt;/a&gt;&lt;br /&gt;
&lt;/li&gt;
&lt;/ul&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Impacts   :&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;Currently known to exist &lt;br /&gt;
&lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;In general an attacker positioned in the middle of a connection may inject arbritary content into the beginning of an authenticated stream it will be interesting to see what potential impact this vulnerability has within each of the applications / protocols supporting it. IMAPS, FTPSSL, POP3 etc &lt;/li&gt;
&lt;li&gt;For web servers  - Attackers (if in the middle) can &lt;span style=&quot;font-weight: bold;&quot;&gt;inject&lt;/span&gt; data into a segment that is authenticated to the web server, the web server will merge those requests and process them. (GET requests are trivially exploitable, POST are not known to be) &amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;text-align: right;&quot;&gt;Posted by Thierry Zoller &lt;br /&gt;
&lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;/ul&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;G-SEC
Sécurité informatique Luxembourg
IT Security Luxembourg
IT Sicherheit Luxemburg&lt;/div&gt;</description><link>http://blog.g-sec.lu/2009/11/sslv3-tls-man-in-middle-vulnerability.html</link><author>noreply@blogger.com (Thierry Zoller)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6875971858454394582.post-7392523790534714028</guid><pubDate>Mon, 02 Nov 2009 20:15:00 +0000</pubDate><atom:updated>2009-11-12T22:28:31.164+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack.lu</category><title>Solving the HACK.LU 2009 reversing challenge like it&#39;s 1998</title><description>&lt;div style=&quot;text-align: right;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Subscribe to the &lt;a href=&quot;http://feeds.feedburner.com/g-sec?format=xml&quot;&gt;RSS&lt;/a&gt; feed in case you are interested in updates&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;
Here is quick overview of one possible way to solve the Hack.lu 2009 crackme&amp;nbsp; (reversing challenge) with the classical JZ/JNZ method (hence the 1998 reference).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;i&gt;Disclaimer : If you are used to reversing software, you can skip this post, there is nothing new for you to glimpse here. &amp;nbsp;This is one way to solve this crackme, of course you could try to reverse engineer the serial generation algorithm. In&amp;nbsp;reality, if you&#39;d &amp;nbsp;use a serial system like this in a shareware type of application nobody would bother to do so.&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt; Target&amp;nbsp;: &lt;a href=&quot;http://2009.hack.lu/archive/2009/ReverseChallenge/crackme.exe&quot;&gt;http://2009.hack.lu/archive/2009/ReverseChallenge/crackme.exe&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Although there are no classical packer signatures to be detected (PEid, ExeInfoPE), looking at the results of entropy tests it is clear that the sample is compressed/crypted in some way or another.&amp;nbsp; Entropy being the measure for randomness/chaos. &lt;br /&gt;
&lt;br /&gt;
Examples :&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA has an entropy of 0&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;A&lt;/span&gt;BCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwx has an entropy of 96,04%&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt; &lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjToRMHBUT_lS2vEh6y7VmOQOjQgo69u9VGM_g4eUzPifcwwJOWpSYwwp_ROJ37HAClv8zmOUPswmAn1uYQ56kwqMYGfvB1JHbJfFrHYpTexj6JL5sYW32pUy4M_xwBNr8Q_AMtphSk37s/s1600-h/crackme.exe.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjToRMHBUT_lS2vEh6y7VmOQOjQgo69u9VGM_g4eUzPifcwwJOWpSYwwp_ROJ37HAClv8zmOUPswmAn1uYQ56kwqMYGfvB1JHbJfFrHYpTexj6JL5sYW32pUy4M_xwBNr8Q_AMtphSk37s/s400/crackme.exe.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;i&gt;&amp;nbsp;Entropy measurement of crackme.exe&lt;/i&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;There are several ways to measure whether a binary (or parts of it) are compressed/encrypted, I happen to use &lt;a href=&quot;http://gynvael.coldwind.pl/&quot;&gt;gynvaels&lt;/a&gt;&#39; excellent tool ENT (not to be confused by a similar &lt;a href=&quot;http://www.fourmilab.ch/random/&quot;&gt;entropy measurement tool&lt;/a&gt;) as it offers several advantages such as mapping to .code and .data section of a PE file. As we can see above the entropy of the code section (Green) is that of normal code, the data section is high on entropy at the very end of it.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Luckily for us it doesn&#39;t use stolen bytes or more advanced methods to hinder dumping from memory while the sample decrypted/decompressed itself. &lt;br /&gt;
&lt;br /&gt;
So we proceed with&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Loading the sample in Ollydbg -&amp;nbsp;&lt;/span&gt;&lt;/span&gt;Wait until it hits OEP&lt;/li&gt;
&lt;li&gt;Dump the process using Ollydump&amp;nbsp;&lt;/li&gt;
&lt;li&gt;fix import table&lt;/li&gt;
&lt;li&gt;Search for &quot;serial&quot;&lt;/li&gt;
&lt;li&gt;Look for branching code&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Patch branching code from JZ to JNZ&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn5bnOkdbHsZUy7i-Pr15YPYFtXuVUsLRByNSCag7sSWxHJxxvMjMHGLVGFwpw7WVGalpWeINH-OWcac59YkuhspaRdfEZVHHoklgo-TnLpBVxEDvRvcNYImfTQjKo7UARgA2coR8Rxt0/s1600-h/crackme2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn5bnOkdbHsZUy7i-Pr15YPYFtXuVUsLRByNSCag7sSWxHJxxvMjMHGLVGFwpw7WVGalpWeINH-OWcac59YkuhspaRdfEZVHHoklgo-TnLpBVxEDvRvcNYImfTQjKo7UARgA2coR8Rxt0/s400/crackme2.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;i&gt;Patching the Jump Zero to a Jump Not Zero instruction&lt;/i&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;This is it&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyIqlk7DI4rDmMM_RHtcpMSS47cDcMt9EaeEQR0gEmfgtozQHtDWRdwf0UabRNZK4YtpQVtvbw88j6STDuFxWxCRGL7C1Evde4YaNTiC5FVxszcFEVifl41qZSvSBPGwLMCX4IM3yoJaI/s1600-h/crcked.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyIqlk7DI4rDmMM_RHtcpMSS47cDcMt9EaeEQR0gEmfgtozQHtDWRdwf0UabRNZK4YtpQVtvbw88j6STDuFxWxCRGL7C1Evde4YaNTiC5FVxszcFEVifl41qZSvSBPGwLMCX4IM3yoJaI/s400/crcked.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: right;&quot;&gt;Posted by Thierry Zoller&lt;br /&gt;
&lt;/div&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt; &lt;/span&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;G-SEC
Sécurité informatique Luxembourg
IT Security Luxembourg
IT Sicherheit Luxemburg&lt;/div&gt;</description><link>http://blog.g-sec.lu/2009/11/solving-hacklu-2009-reversing-challenge.html</link><author>noreply@blogger.com (Thierry Zoller)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjToRMHBUT_lS2vEh6y7VmOQOjQgo69u9VGM_g4eUzPifcwwJOWpSYwwp_ROJ37HAClv8zmOUPswmAn1uYQ56kwqMYGfvB1JHbJfFrHYpTexj6JL5sYW32pUy4M_xwBNr8Q_AMtphSk37s/s72-c/crackme.exe.png" height="72" width="72"/><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6875971858454394582.post-3797049063907374708</guid><pubDate>Tue, 13 Oct 2009 14:46:00 +0000</pubDate><atom:updated>2009-10-15T18:34:59.989+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Advisory</category><title>Advisory : Computer Associates multiple products - arbritary remote code execution</title><description>&lt;div style=&quot;text-align: right;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Subscribe to the &lt;a href=&quot;http://feeds.feedburner.com/g-sec?format=xml&quot;&gt;RSS&lt;/a&gt; feed in case you are interested in updates&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZ_ypVyWYqEO-N7ViiM-uD2gZ0sr7fzKFnyH_YsMQ5HD9J5ixeWI3bRhtlpUXCkJr6msfGAKtb6ni0XAFXJZ-1pF2uOPqbRQS8_nEViKZ0Y2A0_k4bAAcBOo-hLCClHJ5oC-5V_LpYMQE/s1600-h/pwned+by+av.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZ_ypVyWYqEO-N7ViiM-uD2gZ0sr7fzKFnyH_YsMQ5HD9J5ixeWI3bRhtlpUXCkJr6msfGAKtb6ni0XAFXJZ-1pF2uOPqbRQS8_nEViKZ0Y2A0_k4bAAcBOo-hLCClHJ5oC-5V_LpYMQE/s320/pwned+by+av.jpg&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;G-SEC released an advisory today that affects various Computer Associates products. The most interesting part is the multitude of ways this vulnerability can be triggered, if you skim through the list of affected products you can draw your own picture. Network, USB, Email, CD, DVD, OLE2 (DOC, XLS) and more.&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: right;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: #666666;&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt; Picture courtesy of Norton AV Gaming edition&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;http://www.g-sec.lu/computer.associates.rce.html&quot;&gt;You can find the advisory in our advisory section&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;&quot; style=&quot;clear: both; text-align: left;&quot;&gt;List of affected products :&lt;br /&gt;
&lt;/div&gt;&lt;ul&gt;&lt;li style=&quot;text-align: left;&quot;&gt;CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) r8&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) r8.1&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Anti-Virus 2007 (v8)&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Anti-Virus 2008&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Anti-Virus 2009&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Anti-Virus Plus 2009&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;eTrust EZ Antivirus r7.1&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Internet Security Suite 2007 (v3)&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Internet Security Suite 2008&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Internet Security Suite Plus 2008&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Internet Security Suite Plus 2009&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Threat Manager for the Enterprise (formerly eTrust Integrated Threat Management) r8&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Threat Manager for the Enterprise (formerly eTrust Integrated Threat Management) 8.1&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Threat Manager Total Defense&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Gateway Security r8.1&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Protection Suites r2&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Protection Suites r3&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Protection Suites r3.1&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Secure Content Manager (formerly eTrust Secure Content Manager) 1.1&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Secure Content Manager (formerly eTrust Secure Content Manager) 8.0&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Network and Systems Management (NSM) (formerly Unicenter Network and Systems Management) r3.0&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Network and Systems Management (NSM) (formerly Unicenter Network and Systems Management) r3.1&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Network and Systems Management (NSM) (formerly Unicenter Network and Systems Management) r11&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Network and Systems Management (NSM) (formerly Unicenter Network and Systems Management) r11.1&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA ARCserve Backup r11.5 on Windows&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA ARCserve Backup r12 on Windows&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA ARCserve Backup r12.0 SP1 on Windows&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA ARCserve Backup r12.0 SP 2 on Windows&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA ARCserve Backup r12.5 on Windows&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA ARCserve Backup r11.1 Linux&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA ARCserve Backup r11.5 Linux&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA ARCserve for Windows Client Agent&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA ARCserve for Windows Server component&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA eTrust Intrusion Detection 2.0 SP1&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA eTrust Intrusion Detection 3.0&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA eTrust Intrusion Detection 3.0 SP1&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Common Services (CCS) r3.1&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Common Services (CCS) r11CA Common Services (CCS) r11.1&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Anti-Virus SDK (formerly eTrust Anti-Virus SDK)&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;CA Anti-Virus Gateway (formerly eTrust Antivirus Gateway) 7.1&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;div style=&quot;text-align: right;&quot;&gt;posted by Thierry Zoller on the 13/10/2009&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;G-SEC
Sécurité informatique Luxembourg
IT Security Luxembourg
IT Sicherheit Luxemburg&lt;/div&gt;</description><link>http://blog.g-sec.lu/2009/10/computer-associates-multiple-products.html</link><author>noreply@blogger.com (Thierry Zoller)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZ_ypVyWYqEO-N7ViiM-uD2gZ0sr7fzKFnyH_YsMQ5HD9J5ixeWI3bRhtlpUXCkJr6msfGAKtb6ni0XAFXJZ-1pF2uOPqbRQS8_nEViKZ0Y2A0_k4bAAcBOo-hLCClHJ5oC-5V_LpYMQE/s72-c/pwned+by+av.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6875971858454394582.post-2667318485100048149</guid><pubDate>Tue, 01 Sep 2009 12:06:00 +0000</pubDate><atom:updated>2009-09-07T15:20:50.531+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Zero Day</category><title>IIS 5 &amp; IIS 6 &amp; IIS7 FTP vulnerability - information and tools (updated)</title><description>&lt;div style=&quot;text-align: right;&quot;&gt;&lt;span style=&quot;background-color: #ffe599;&quot;&gt;Subscribe to our &lt;/span&gt;&lt;a href=&quot;http://feeds.feedburner.com/g-sec?format=xml&quot; style=&quot;background-color: #ffe599;&quot;&gt;&lt;span style=&quot;background-color: #f3f3f3;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;RSS&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;background-color: #f3f3f3;&quot;&gt;&lt;span style=&quot;background-color: #ffe599;&quot;&gt; feed for regular updates&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;Renowed security researcher &quot;Kingcope&quot; published a recent zero day vulnerability (i.e no patch and unkown at the time of publication)  affecting Microsoft IIS 5 and IIS 6. Functional exploit code exists for IIS 5 / 5.1 no functional code execution exploit code is known to exist for IIS 6. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Update: &lt;/b&gt;Kingcope released another exploit against IIS5/IIS6/IIS7 that performs a Denial of Service attack against IIS5/IIS6/IIS7 using unsecure globbing mechanism. This attacks works with standard user accounts (doesn&#39;t required write access). The second exploit is tracked under&lt;span style=&quot;font-family: inherit;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2521&quot; style=&quot;color: #2e7bbe; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;u&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;CVE-2009-2521&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;b&gt;Updates :&lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Kingcope publishes a new attack against IIS5/IIS6/IIS7 - &lt;b&gt;Denial of service only -&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2521&quot; style=&quot;color: #2e7bbe; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;u&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;CVE-2009-2521&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Microsoft published &lt;a href=&quot;http://www.microsoft.com/technet/security/advisory/975191.mspx&quot;&gt;KB975191&lt;/a&gt; with more information&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;VDB IDS are : &lt;/span&gt;&lt;span style=&quot;border-collapse: collapse; line-height: 14px;&quot;&gt;&lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3023&quot; style=&quot;color: #0033cc;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;CVE-2009-3023&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt; , &lt;/span&gt;&lt;a href=&quot;http://www.kb.cert.org/vuls/id/276653&quot; style=&quot;color: #0033cc;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;VU#276653&lt;br /&gt;
&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;border-collapse: collapse; line-height: 14px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;To perform a DoS attack write access is not required - this is also the case for  IIS6 &lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Summary: &lt;/b&gt;Code execution possible on IIS5/5.1 &lt;i&gt;if write access granted&lt;/i&gt;, DoS is possible on both IIS5 and IIS6. Note - there is a improbable condition that may allow code execution on IIS5/5.1 even if write access is &lt;b&gt;not&lt;/b&gt; granted, the condition is that a directory is present that has certain characters in it. It&#39;s improbable but possible. Thanks to Guido Landi for the insight.&lt;/li&gt;
&lt;/ul&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Fast facts IIS5/6 Code execution &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: collapse; font-weight: normal; line-height: 14px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3023&quot; style=&quot;color: #0033cc;&quot;&gt;CVE-2009-3023&lt;/a&gt;)&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-weight: bold; line-height: normal;&quot;&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Affects  IIS5 /5.1 and IIS6 - currently only a functional code execution exploit for IIS 5/Win2k exists, DoS attacks is possible against all versions.&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;The attacker must use an FTP account that is allowed to create directories (anon or known user) for the exploit to work&lt;/li&gt;
&lt;li&gt;The FTP service is not enabled by default&lt;/li&gt;
&lt;li&gt;Anonymous access is not enabled by default&lt;/li&gt;
&lt;/ul&gt;&lt;b&gt;Current vulnerability requirements (code execution):&lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;IIS 5 (5.1) or IIS 6 installed &lt;b&gt;and&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;FTP service enabled &lt;b&gt;and&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;u&gt;Code exec only requirement&lt;/u&gt; : NTFS write permissions given to anonymous or known users&lt;br /&gt;
(IIS5 and IIS6 run on Windows XP, Windows 2000, Windows 2003)&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;/ul&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Current mitigations :&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggWQK-STr3kFr3oBZVP8LAIxXaqM52PUKyrTgCgUk5MOcTKMvrdUdAxGbj6DIEkR_eB07U5rsn6liP7yEQN05un1vwIlyr2ySRRxVd9sR6IBqlhLg8gXaJn-brqBOeYP5OJSeXq_an_c0/s1600-h/ftpWrite.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggWQK-STr3kFr3oBZVP8LAIxXaqM52PUKyrTgCgUk5MOcTKMvrdUdAxGbj6DIEkR_eB07U5rsn6liP7yEQN05un1vwIlyr2ySRRxVd9sR6IBqlhLg8gXaJn-brqBOeYP5OJSeXq_an_c0/s200/ftpWrite.gif&quot; /&gt;&lt;/a&gt;
&lt;li&gt;Disable FTP service on IIS5 and IIS6 if not required &lt;b&gt;or&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;If  FTP is required, disable create directory permissions (see KB975191)  or disable write access all together (pic) &lt;i&gt;Note: this will not protect against Denial of Service attacks&lt;br /&gt;
&lt;/i&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;numberedList&quot; style=&quot;margin-bottom: -1px;&quot;&gt;&lt;tbody&gt;
&lt;tr valign=&quot;top&quot;&gt;&lt;td align=&quot;right&quot; class=&quot;listNumber&quot; nowrap=&quot;nowrap&quot; style=&quot;padding-left: 2.1ex; padding-right: 1.5ex;&quot;&gt;&lt;div style=&quot;line-height: 14px; margin: 0px; padding: 0px 0px 1.1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;1.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td&gt;&lt;div style=&quot;line-height: 14px; margin: 0px; padding: 0px 0px 1.1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Browse to the root directory of your FTP site. By default this is in %systemroot%\inetpub\ftproot.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr valign=&quot;top&quot;&gt;&lt;td align=&quot;right&quot; class=&quot;listNumber&quot; nowrap=&quot;nowrap&quot; style=&quot;padding-left: 2.1ex; padding-right: 1.5ex;&quot;&gt;&lt;div style=&quot;line-height: 14px; margin: 0px; padding: 0px 0px 1.1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;2.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td&gt;&lt;div style=&quot;line-height: 14px; margin: 0px; padding: 0px 0px 1.1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Right-click on the directory and select &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Properties&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr valign=&quot;top&quot;&gt;&lt;td align=&quot;right&quot; class=&quot;listNumber&quot; nowrap=&quot;nowrap&quot; style=&quot;padding-left: 2.1ex; padding-right: 1.5ex;&quot;&gt;&lt;div style=&quot;line-height: 14px; margin: 0px; padding: 0px 0px 1.1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;3.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td&gt;&lt;div style=&quot;line-height: 14px; margin: 0px; padding: 0px 0px 1.1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Click the &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Security&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; tab and click &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Advanced&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr valign=&quot;top&quot;&gt;&lt;td align=&quot;right&quot; class=&quot;listNumber&quot; nowrap=&quot;nowrap&quot; style=&quot;padding-left: 2.1ex; padding-right: 1.5ex;&quot;&gt;&lt;div style=&quot;line-height: 14px; margin: 0px; padding: 0px 0px 1.1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;4.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td&gt;&lt;div style=&quot;line-height: 14px; margin: 0px; padding: 0px 0px 1.1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Click &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Change Permissions&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr valign=&quot;top&quot;&gt;&lt;td align=&quot;right&quot; class=&quot;listNumber&quot; nowrap=&quot;nowrap&quot; style=&quot;padding-left: 2.1ex; padding-right: 1.5ex;&quot;&gt;&lt;div style=&quot;line-height: 14px; margin: 0px; padding: 0px 0px 1.1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;5.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td&gt;&lt;div style=&quot;line-height: 14px; margin: 0px; padding: 0px 0px 1.1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Select the Users group and click &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Edit&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr valign=&quot;top&quot;&gt;&lt;td align=&quot;right&quot; class=&quot;listNumber&quot; nowrap=&quot;nowrap&quot; style=&quot;padding-left: 2.1ex; padding-right: 1.5ex;&quot;&gt;&lt;div style=&quot;line-height: 14px; margin: 0px; padding: 0px 0px 1.1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;6.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td&gt;&lt;div style=&quot;line-height: 14px; margin: 0px; padding: 0px 0px 1.1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Deselect &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Create Folders/Append Data&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div&gt;&lt;b&gt;Comments :&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;Successfull&amp;nbsp; code execution might be possible without the need to be able to create directories (more research required). Note: For a successful&amp;nbsp; Denial of Service attack the creation of a directory is not required.&lt;br /&gt;
&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;The reason there is no functional exploit against IIS6 (Windows 2003) is that the exploit mitigations that ship with Windows2003 make it harder to reliably exploit (if at all)&lt;br /&gt;
&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;It&#39;s possible that the vulnerable part of the IIS code can be reached by other means, if other methods are known we will update this blog.&lt;/li&gt;
&lt;/ul&gt;&lt;div&gt;&lt;b&gt;Tools :&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://blog.rootshell.be/2009/09/01/detecting-vulnerable-iis-ftp-hosts-using-nmap/&quot;&gt;Nmap script&lt;/a&gt; to scan network for IIS FTP with write permissions (Credit: Xavier Mertens)&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.openvas.org/&quot;&gt;OpenVas&lt;/a&gt; is able to scan for this flaw&lt;/li&gt;
&lt;/ul&gt;&lt;div&gt;&lt;b&gt;Links : &lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;US-CERT - &lt;a href=&quot;http://www.kb.cert.org/vuls/id/276653&quot;&gt;http://www.kb.cert.org/vuls/id/276653&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Microsoft - &lt;a href=&quot;http://www.microsoft.com/technet/security/advisory/975191.mspx&quot;&gt;http://www.microsoft.com/technet/security/advisory/975191.mspx&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Exploit code - &lt;a href=&quot;http://milw0rm.com/exploits/9541&quot;&gt;http://milw0rm.com/exploits/9541&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;SNORT signature update -&amp;nbsp;&lt;a href=&quot;http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2009-09-01.html&quot;&gt;http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2009-09-01.html&lt;/a&gt; &lt;br /&gt;
&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: right;&quot;&gt;Posted by Thierry Zoller, Luxembourg&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;G-SEC
Sécurité informatique Luxembourg
IT Security Luxembourg
IT Sicherheit Luxemburg&lt;/div&gt;</description><link>http://blog.g-sec.lu/2009/09/iis-5-iis-6-ftp-vulnerability.html</link><author>noreply@blogger.com (Thierry Zoller)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggWQK-STr3kFr3oBZVP8LAIxXaqM52PUKyrTgCgUk5MOcTKMvrdUdAxGbj6DIEkR_eB07U5rsn6liP7yEQN05un1vwIlyr2ySRRxVd9sR6IBqlhLg8gXaJn-brqBOeYP5OJSeXq_an_c0/s72-c/ftpWrite.gif" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6875971858454394582.post-1901884639979337979</guid><pubDate>Thu, 30 Jul 2009 22:20:00 +0000</pubDate><atom:updated>2009-08-01T03:38:43.992+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tool</category><title>New advances in Office/Excel/Powerpoint Malware detection and analysis</title><description>&lt;div style=&quot;text-align: right;&quot;&gt;&lt;span style=&quot;color: rgb(153, 153, 153);&quot;&gt;Subscribe to the &lt;a href=&quot;http://feeds.feedburner.com/g-sec?format=xml&quot;&gt;RSS&lt;/a&gt; feed in case you are interested in updates&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;As you may or may not know there is massive client-side exploitation movement going on since last year (there has been before but on a less massive scale). There seems to be an ongoing competition between different nations (government orgs.) , revolving around who is able to order chinese servers, deploy client side exploits and run with the false flag the fastest.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;Those that  had to look into client-side attacks surely feel the pain of doing so, apart from run-time analysis, it takes some in-depth knowledge of the format and common exploitation techniques (recognise shellcode patterns ) to spot and dissect them.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The office file format is a file format on steroids, has it&#39;s on MFT and own structure - hell the &lt;b&gt;file&lt;/b&gt; format can even fragment - that kind of steroid.  One can only imaging how this format came to live, did Microsoft launch  an internal competition of who comes up with the most complicated and most difficult file format ever ? Compatibility was surely not the goal [1].  Anyway enough ramblings...&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px; text-align: justify;&quot;&gt;Luckily there has been good progress on the Office fileformat analysis front, there was Officecat [2] and STG Docfileviewer [3] but honestly in terms of supporting analysts, these didn&#39;t cut it. &lt;/div&gt;&lt;div style=&quot;margin: 0px; text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px; text-align: justify;&quot;&gt;&lt;br /&gt;This week Microsoft released &quot;Offvis&quot;, basically DOC/XLS/PPT/OLE parser with added bonus of detecting existing attacks. It&#39;s main goal is to help researchers and vendors to facilitate the parsing and dissection of the awfully complicated office file format. &lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;On another front, &lt;a href=&quot;http://www.reconstructer.org/&quot;&gt;Frank Boldewin&lt;/a&gt; releases an awesome automatic and generic doc/ppt/xls dissection tool. The tool extracts macros and information about the structure of the file, and searches for common shellcode patterns, has it&#39;s own small disassembly logic and, as an added bonus, brute forces possible XOR and ADD obfuscation loops.&lt;/div&gt;&lt;br /&gt;&lt;hr height=&quot;1&quot;&gt;&lt;br /&gt;&lt;b&gt;Offvis&lt;/b&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgr4qJrWqU98_td4RR4o_2OyOYCqnKHktf7EWXiHMWrJbvPwGYPauGCspi3GfPYdiEOT16OEjj1UpOQn5g210kTuZ2j2aV7pc08U_v-PtMiUiSQ-9oZByi5ZONp8HTLdBqT4tiOiMVwrbs/s1600-h/offviz.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgr4qJrWqU98_td4RR4o_2OyOYCqnKHktf7EWXiHMWrJbvPwGYPauGCspi3GfPYdiEOT16OEjj1UpOQn5g210kTuZ2j2aV7pc08U_v-PtMiUiSQ-9oZByi5ZONp8HTLdBqT4tiOiMVwrbs/s320/offviz.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;As input Offvis takes Office file format files, such as DOC,XLS and so forth. On the left hand it displays raw content of the file, on the upper right it displays the result of the parsing attempt. The display is interactive allowing you to select a field and see the raw content displayed.&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;If the file exploits includes a commonly and known vulnerability, it will display and warn you. It does not detect any other attempts, including the commonly used method of dropping malicious code using macros.&lt;br /&gt;&lt;br /&gt;There seems to be no generic detection of shellcode or malware. In essence Offviss&#39; goal  appears to be to help developers and vendors at better understanding the format itself and test the implementations of their parsers. The added CVE recognition of known exploits is a bonus at best, although it has one nifty feature that comes in handy during analysis - defragementation.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;» Download Offviz : &lt;a class=&quot;url&quot; href=&quot;http://go.microsoft.com/fwlink/?LinkId=158791&quot; style=&quot;color: rgb(17, 17, 255);&quot;&gt;http://go.microsoft.com/fwlink/?LinkId=158791&lt;/a&gt;&lt;br /&gt;» Download &lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?displaylang=en&amp;amp;FamilyID=19a1a252-c3af-4474-b33c-158c6e85115e&quot;&gt;Fact sheet&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr height=&quot;1&quot;&gt;&lt;br /&gt;&lt;b&gt;Office Malscanner&lt;/b&gt;&lt;br /&gt;Office Malscanner is a new suite of tools from Frank Boldewin&lt;br /&gt;&lt;ul&gt;&lt;li&gt;OfficeMalscanner  - Scans, parses the format, searches for shellcode patterns, extracts macros, bruteforces all possible XOR and ADD obfuscation keys and searches for executable magic bytes.&lt;br /&gt;&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Disview - Takes an offset as an argument and tries to disassemble the input&lt;/li&gt;&lt;br /&gt;&lt;li&gt;MalHost-Setup - Patches the shellcode as to halt on execution to allow debugging of the shellcode &lt;/li&gt;&lt;br /&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The results we had with the tool were great, it is the first (to our knowledge) &lt;b&gt;generic&lt;/b&gt; utility to detect malicious code within office file formats, by that we mean that it doesn&#39;t look for specific patterns of known exploits, but uses generic means to detect possible malicious code with the possibility of false positives (as in all generic methods).&lt;/div&gt;&lt;br /&gt;&lt;hr height=&quot;1&quot;&gt;&lt;br /&gt;&lt;b&gt;OfficeMalScanner in action analysing a malicious PPT file&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiYCHPm3P3vxpvarnIPcnjS2en1qSEaJ-spUP9D2EKM54puUGPVH0qxwlb31lAAbZEWOJr7k47d7ewTDN0nujnSm243Edv2v7lg197zyI1cLr8kRb2IZIni0IYUxYOgGCV4DAz5KA0f5g/s1600-h/malscan.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiYCHPm3P3vxpvarnIPcnjS2en1qSEaJ-spUP9D2EKM54puUGPVH0qxwlb31lAAbZEWOJr7k47d7ewTDN0nujnSm243Edv2v7lg197zyI1cLr8kRb2IZIni0IYUxYOgGCV4DAz5KA0f5g/s400/malscan.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;It detects the api hashing method commonly used in shellcode at offsets that are located nearby, it then brute forces all possibly XOR keys and matches MZ,PE signatures indicating binary executables, and extracts them to disk. Additionally it rates the different findings in a metric called &quot;Malicious Index&quot;, one might imagine this index to be used&lt;b&gt; &lt;/b&gt;to filter out malicious documents at the border setting a minimum &quot;malicious index&quot; to reach.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;hr height=&quot;1&quot;&gt;&lt;br /&gt;&lt;b&gt;Video of the extraction and analysis of a macro based Word dropper&lt;/b&gt;&lt;br /&gt;&lt;center&gt;&lt;embed autoplay=&quot;false&quot; loop=&quot;false&quot; src=&quot;http://www.g-sec.lu/maldemo.swf&quot; height=&quot;400&quot; width=&quot;450&quot;&gt;&lt;/embed&gt;&lt;br /&gt;&lt;a href=&quot;http://www.g-sec.lu/maldemo.swf&quot;&gt;Click here&lt;/a&gt; to see the video in full screen&lt;br /&gt;&lt;/center&gt;&lt;br /&gt;The video shows the extraction of a malicious VBA macro included in a Word document and the modifications done to the vba file to drop the exe without executing it.&lt;br /&gt;&lt;br /&gt;&lt;hr height=&quot;1&quot;&gt;&lt;br /&gt;&lt;b&gt;Malhost-Setup - disassembling shellcode (here exploit targeting office)&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPCTFamsoQ0otGIrMIbU47OUPgIYZGPXFMl_3MuYWBoQ-eIWgnVKHXqDqZyjguDyGAaHXu0O9IQ2UyXKzxHCr10Z48-9deVTerYR5MvvtPwuaw_nG6B8z-kXAcrWEhxOgZaVNnOSGcY-k/s1600-h/malscan_debug.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPCTFamsoQ0otGIrMIbU47OUPgIYZGPXFMl_3MuYWBoQ-eIWgnVKHXqDqZyjguDyGAaHXu0O9IQ2UyXKzxHCr10Z48-9deVTerYR5MvvtPwuaw_nG6B8z-kXAcrWEhxOgZaVNnOSGcY-k/s400/malscan_debug.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Malhost-setup can be used to analyse malicious code that directly exploits office - Malhost-setup takes the malicious file as input and the address of the start of the shell code as hexadecimal offset. It then extracts the shellcode and embeds it into an executable allowing to proceed with analysis in your debugger of choice.&lt;/div&gt;&lt;br /&gt;» Download : &lt;a href=&quot;http://reconstructer.org/code/OfficeMalScanner.zip&quot;&gt;OfficeMalScanner&lt;/a&gt;&lt;br /&gt;» Paper and malicious samples : &lt;a href=&quot;http://www.reconstructer.org/papers/Analyzing%20MSOffice%20malware%20with%20OfficeMalScanner.zip&quot;&gt;Analyzing MSOffice malware with OfficeMalScanner&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: right;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Posted by Thierry&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Links:&lt;/span&gt;&lt;br /&gt;[1] &lt;a href=&quot;http://www.microsoft.com/interop/docs/OfficeBinaryFormats.mspx&quot;&gt;http://www.microsoft.com/interop/docs/OfficeBinaryFormats.mspx&lt;/a&gt;&lt;br /&gt;[2] &lt;a href=&quot;http://www.snort.org/vrt/vrt-resources/officecat&quot;&gt;http://www.snort.org/vrt/vrt-resources/officecat&lt;/a&gt;&lt;br /&gt;[3] &lt;a href=&quot;http://support.microsoft.com/kb/139545/de&quot;&gt;http://support.microsoft.com/kb/139545/de&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;G-SEC
Sécurité informatique Luxembourg
IT Security Luxembourg
IT Sicherheit Luxemburg&lt;/div&gt;</description><link>http://blog.g-sec.lu/2009/07/new-advances-in-officeexcelpowerpoint.html</link><author>noreply@blogger.com (Thierry Zoller)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgr4qJrWqU98_td4RR4o_2OyOYCqnKHktf7EWXiHMWrJbvPwGYPauGCspi3GfPYdiEOT16OEjj1UpOQn5g210kTuZ2j2aV7pc08U_v-PtMiUiSQ-9oZByi5ZONp8HTLdBqT4tiOiMVwrbs/s72-c/offviz.png" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>