Jul 16 06

Router der Marke FRITZ!Box verfügen über einen mehr oder weniger versteckten Modus in dem sich sehr einfach und schnell Paketmitschnitte auf den einzelnen Schnittstellen erstellen und im pcap (packet capture) Format speichern lassen.

Aufrufen lässt sich das Menü über die Webschnittstelle indem die Unterseite /html/capture.html aufgerufen wird. Eine valide Benutzerkennung ist von Nöten.


written by d45id \\ tags: , , , ,

Feb 16 11

Engineers from exodus intelligence demonstrated an awesome undocumented feature in Cisco Adaptive Security Appliance (ASA), remote code execution via UDP. This feature is implemented in the Cisco IKE feature set. The algorithm for re-assembling IKE payloads fragmented with the Cisco fragmentation protocol contains a bounds-checking flaw that allows a heap buffer to be overflowed with attacker-controlled data.

Find out more:

written by d45id \\ tags: , , , , , , ,

Mai 15 20

alertCrypto researcher discovered a new ancient bug in Diffie-Hellman crytography. The problem is thatservers that support 512-key “export-grade” Diffie-Hellman (DH) can be forced to downgrade a connection to that weak level. The server – and therefore the client – will both still believe they’re using stronger keys such as 768-bit or 1024-bit.

Matthew Green – one of the researcher – has hosted a site discussing what’s being called „#Logjam„, Weakdh.org, with a detailed paper – Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice (PDF) – that explain the bug in a academic way.

written by d45id \\ tags: , , , , , , , ,

Feb 15 09

whatsspyEveryone knows it, WhatsApp sux and is broken in terms of privacy, but no one cares it. I’ve found an very interesting article and a Proof of Concept published by Maikel Zweerink who explains how you can track WhatsApp-Users activities like Online/Offline status, profile pictures, privacy settings and status messages in an very easy way.

Take a look on it and build your own WhatsAppSpyBot ;-)

written by d45id \\ tags: , , ,

Feb 14 25

Ebola_virus_emForscher der School of Electrical Engineering, Electronics and Computer Science (Liverpool) entwickelten in ihrem Labor einen Computerwurm mit dem Namen Chameleon, welcher sich selbstständig über WLAN verbreitet und Router bzw. Accesspoints als Wirtssysteme befällt.
In ihrem Labor simulierten die Wissenschaftler teile der WLAN-Netze der Städte London und Belfast und ließen Chameleon auf diese los, mit einem interessanten Ergebniss …

Weitere Informationen:

written by d45id \\ tags: , , , ,

Jan 14 20

tux_guardDie neue Kernelversion 3.13 hat nun einen neuen Paketfilter mit an Bord, Nftables.
Nftables entwickelt vom Netfilter-Projekt hat sich zum Ziel gesetzt die existierenden Frameworks wie {ip,ip6,arp,eb}tables – die u.a. auch von ihnen stammen – zu ersetzen …

Siehe hierzu auch:

Talk about nftables at Kernel Recipes 2013
Nftables quick howto

written by d45id \\ tags: , , ,

Aug 13 05

sourcecodeThe security consultant company from Vienna SEC Consult reported about a vulnerability in WPS implementation of routers manufactured by Arcadyan/Astoria Networks and are rebranded for Vodafone Germany (EasyBox 802 and EasyBox 803).
The problem of their implementation is that the algorithm that generates the default WPS-PIN is entirely based on the MAC address (=BSSID) and serial number of the device. So an attacker within the range of this access point can capture the BSSID (eg. from 802.11 Beacon Frames) and calculate the default WPS PIN for it…
Continue reading »

written by d45id \\ tags: , , , , ,

Jan 13 02

A new full animated film about Tor made by Tactical Technology Collective

written by d45id \\ tags: , , , , ,