Saturday, July 9, 2011

Vega – Open Source Cross Platform Web-Application Security Assessment Platform

Vega is an open source platform to test the security of web applications. Vega can help you find and validate SQL Injections, Cross-Site Scripting (XSS), inadvertently disclosed sensitive information, and other vulnerabilities. It is written in Java, GUI based, and runs on Linux, OS X, and Windows.
Vega includes an automated scanner for quick tests and an intercepting proxy for tactical inspection. Vega can be extended using a powerful API in the language of the web: Javascript.




Features
  • Automated Crawler and Vulnerability Scanner
  • Consistent UI
  • Website Crawler
  • Intercepting Proxy
  • SSL MITM
  • Content Analysis
  • Extensibility through a Powerful Javascript Module API
  • Customizable alerts
  • Database and Shared Data Model
There are also modules for:
  • Cross Site Scripting (XSS)
  • SQL Injection
  • Directory Traversal
  • URL Injection
  • Error Detection
  • File Uploads
  • Sensitive Data Discovery
There is documentation for getting started here or check out the intro to the Vega Proxy here.

You can download Vega here:
Windows – 32-bit/64-bit

Linux – 32-bit/64-bit
Or read more here.

Tuesday, July 5, 2011

Faster password hashes cracking based on the DES algorithm on CPUs

Openwall released an updated version of John the Ripper, a password security auditing tool and open source project, providing the community with improvements in the performance of cracking password hashes based on the DES algorithm on CPUs.



In an effort led by Roman Rusakov and Alexander Peslyak, the Openwall team’s breakthrough for more optimal DES S-box expressions provides a 17 percent improvement over the previous best results.


The S-box expressions generated under this effort are being made publicly available, are not copyrighted and are free for reuse by anyone.


Since 1998, numerous attempts have been made to arrive at more optimal DES S-box expressions. During the past year, Openwall researchers developed an idea to approach the optimization problem differently and, as a result, were able to design and successfully implement a new algorithm that significantly improves upon the corresponding prior results.


This new approach is easily adaptable to arbitrary sets of "logic gates." The team has generated different S-box expressions targeting both typical CPUs with only basic instructions and CPUs/GPUs that have "bit select" instructions. The mentioned improvement over the corresponding previous best results is achieved in both cases.


Besides generating simpler S-box expressions in terms of gate count, efficiency of the corresponding program code was considered and thousands of different same-gate-count expressions were created to generate the best possible code for specific CPU and GPU architectures.


Further, the Openwall researchers implemented and ran special-purpose CPU register allocation and code generation algorithms with intertwined S-box expression and code generation stages, allowing for a further performance boost of the resulting program code.


“The researchers at Openwall deserve significant recognition for discovering and providing a new approach to addressing performance-critical S-box expressions. By providing this new approach free-of-charge through John the Ripper, Openwall is making another major impact on the open source and security communities,” said HD Moore, Rapid7 CSO and Metasploit chief architect.

June 2011: four Cisco vulnerabilities

The Cisco Product Security Incident Response Team (PSIRT) has published four important vulnerability advisories:
  • Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client
  • Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series
  • Default Credentials Vulnerability in Cisco Network Registrar
  • Default Credentials for root Account on the Cisco Media Experience Engine 5600
Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client


The Cisco AnyConnect Secure Mobility Client, previously known as the Cisco AnyConnect VPN Client, is affected by the following vulnerabilities:
  • Arbitrary Program Execution Vulnerability
  • Local Privilege Escalation Vulnerability
Vulnerable Products

The vulnerabilities described in this document apply to the Cisco AnyConnect Secure Mobility Client. The affected versions are included in the following table:
  • Arbitrary Program Execution Vulnerability
    • Microsoft Windows: All versions prior to 2.3.185
    • Linux, Apple MacOS X: All versions in major releases other than 2.5.x and 3.0.x. /2.5.x releases prior to 2.5.3041 / 3.0.x releases prior to 3.0.629
  • Local Privilege Escalation Vulnerability
    • Microsoft Windows: All versions prior to 2.3.254
    • Linux, Apple MacOS X: Not affected
Details

The Cisco AnyConnect Secure Mobility Client is the Cisco next-generation VPN client, which provides remote users with secure IPsec (IKEv2) or SSL Virtual Private Network (VPN) connections to Cisco 5500 Series Adaptive Security Appliances (ASA) and devices that are running Cisco IOS Software.

The Cisco AnyConnect Secure Mobility Client is affected by the following vulnerabilities:
  • Arbitrary Program Execution Vulnerability
  • Additional Considerations for the Arbitrary Program Execution Vulnerability
  • Local Privilege Escalation Vulnerability
Impact
  • Arbitrary Program Execution Vulnerability: Exploitation of this vulnerability may allow an attacker to execute arbitrary programs on the computer of a Cisco AnyConnect Secure Mobility Client user with the privileges of the user who is establishing the VPN connection.
  • Local Privilege Escalation Vulnerability: Successful exploitation of this vulnerability may allow users with physical access to a computer that is running the Cisco AnyConnect Secure Mobility Client to elevate their privileges and gain full control of the system.
Link: http://www.cisco.com/…/advisory09186a0080b80123.shtml
Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series

Cisco Unified IP Phones 7900 Series devices, also known as TNP phones, are affected by three vulnerabilities that could allow an attacker to elevate privileges, change phone configurations, disclose sensitive information, or load unsigned software. These three vulnerabilities are classified as two privilege escalation vulnerabilities and one signature bypass vulnerability.
Vulnerable Products

Refer to the following link to determine what product upgrade and substitution options are available: http://www.cisco.com/…/prod_eol_notices_list.html
Details

Cisco Unified IP Phones 7900 Series devices are affected by two privilege escalation vulnerabilities and a signature bypass vulnerability. The following sections provide the details of each vulnerability addressed in this security advisory.

  • Privilege Escalation Vulnerabilities: Cisco Unified IP Phones 7900 Series devices are affected by two privilege escalation vulnerabilities that could allow an authenticated attacker to make unauthorized phone configuration changes or obtain potentially sensitive information.
  • Signature Verification Bypass Vulnerability: Cisco Unified IP Phones 7900 Series devices are affected by a signature verification bypass vulnerability that could allow an authenticated attacker to load a software image without verification of its signature.
Impact

Successful exploitation of the two privilege escalation vulnerabilities could allow an authenticated attacker to change phone configuration and obtain system information. Successful exploitation of the signature verification bypass vulnerability that could allow an authenticated attacker to load and execute a software image without verification of its signature.
Link: http://www.cisco.com/…/advisory09186a0080b80111.shtml
Default Credentials Vulnerability in Cisco Network Registrar

Cisco Network Registrar Software Releases prior to 7.2 contain a default password for the administrative account. During the initial installation, users are not forced to change this password, allowing it to persist after the installation. An attacker who is aware of this vulnerability could authenticate with administrative privileges and arbitrarily change the configuration of Cisco Network Registrar.

Vulnerable Products

This vulnerability affects all releases of Cisco Network Registrar prior to Software Release 7.2. The vulnerability is present in the affected releases on all platforms.
Details

Cisco Network Registrar provides highly scalable and reliable DNS, DHCP, and TFTP services. The central management capabilities of Cisco Network Registrar simplify administrative tasks associated with network and device configuration.
Impact

Successful exploitation of the vulnerability may allow an attacker to make arbitrary changes to the configuration of Cisco Network Registrar.
Link: http://www.cisco.com/…/advisory09186a0080b80121.shtml
Default Credentials for root Account on the Cisco Media Experience Engine 5600


Cisco Media Experience Engine (MXE) 5600 devices that are running Cisco Media Processing Software releases prior to 1.2 ship with a root administrator account that is enabled by default with a default password. An unauthorized user could use this account to modify the software configuration and operating system settings or gain complete administrative control of the device. A software upgrade is not required to resolve this vulnerability. Customers can change the root account password by issuing a configuration command on affected engines. The workarounds detailed in this document provide instructions for changing the root account password.
Vulnerable Products

This vulnerability affects Cisco MXE 5600 units that are running Cisco Media Processing Software releases prior to 1.2. To determine the software release that is running on a Cisco MXE unit, log in to the device and issue the show version command-line interface (CLI) command to display the system banner
Details

The Cisco Media Experience Engine (MXE) 5600 is a modular media-processing platform that provides advanced media-processing and media-transformation services.
Impact

Successful exploitation of the vulnerability may allow an unauthorized user to modify the software configuration and the operating system settings or gain complete administrative control of the device.
Link: http://www.cisco.com/…/advisory09186a0080b80122.shtml

Ayam Goreng Kunyit

Ayam Goreng Kunyit

Salah satu menu kegemaran ku........!!!




Ramuannya....

1) Ayam - dipotong kecil (50 gram)
2) Bawang Besar - dihiris nipis (1 biji)
3) Bawang Putih - dihiris nipis (4 ulas)
4) Cili Padi (6 biji)
5) Lobak Merah (1/2 batang)
6) Kacang Panjang - dipotong memanjang (2 batang)
7) Kubis Bunga (10 gram)8) Kunyit (1 sudu kecil)
9) Daun Limau Purut (jika mahu) (beberapa helai)
10) Garam (secukup rasa)
11) Minyak (untuk menggoreng)


Langkah-langkah:-

Gaul ayam bersama kunyit dan sedikit garam. Perap seketika.

Goreng ayam hingga sedikit garing. Selepas beberapa ketika toskan minyaknya. Biar ayam dalam kuali.

Guna kuali sama, masukkan lobak, kacang panjang, bawang putih, bawang besar, cili padi, kobis, daun limau purut dan sedikit garam.

Goreng dan gaul semua bahan sebati.

HAPPY EATING and Hunting..!!