h1

What’s My Password?

October 1, 2009

Since personal information is so crucial these days to big companies for targeted marketing I thought I would put together a weekly thread dedicated to keeping yourself safe while on your computers and surfing the net.

This week’s topic is Password Management:

Now we are on a forum here and I am sure you have signed up for many other online (cloud) style services like Gmail, Hotmail, etc. Some of you might be using the same password for every site you log in to because of convenience. Also some of you might have 2-5 different ones you use and use your browser’s “Save this password” feature so you don’t have to remember it.

Well if you are using the same password for every site this is an accident waiting to happen. Forums are a haven of buggy code that is easily exploited by not just experienced hackers but script kiddies alike. There are even full software programs (I won’t mention their names in this thread but you can PM for details) that have known vulnerabilities for such forum programs like the ones we use here. Now the passwords in the database holding your information is hashed (encrypted) but once a hacker has control over the system a man in the middle attack can be put into place. Or even easier is to change the email address in your account info, have it email the hacker your password or a new temporary password and take control of your account. While on this board it probably doesn’t mean much but think on a site that it might. Again if you use the same password for all sites and they get a copy from a hacked forum they now have access to your other online services that you do care about.

Same thing goes with passwords saved in browsers, but let’s say you are at a convention and your laptop is stolen, it’s quite easy to get into the machine and get your stored passwords from your browser. This can also mean personal information or worse banking information.

If you have read this so far this is the part where I suggest the best way to fix this from not happening to you. Hence the topic “Password Management”, I am going to suggest that you get a password management program. What this will allow you to do is store passwords for all your sites with different passwords for each one in a centralized location. Well you ask if my computer is stolen wont they have all that anyway? No, when you use a password manager you have to open a database file that stores your passwords in it that is encrypted with a master password you choose. This will free up your brain to again only have to remember 1 password to remember. Now when you go to a site and have to login, you simply open up your password manager, select the sites password you have stored and copy it to clipboard and paste the information into the login page.

The great thing about password managers is they usually come with a built in password generator that you can set the length and types of characters you wish to use. This will create a random password that will probably never generate again so if someone ever does get your password for any forum or site that’s all they will get.

Here are some links to good password managers

Windows (FREE): http://keepass.info/

Windows/Mac/Linux (FREE): http://www.keepassx.org/

Mac ($30): http://1passwd.com/screen_shots

h1

Social Networks Securely

May 10, 2009

The fact that social networks like Facebook, Twitter and LinkedIn are increasing at an alarming rate is not surprising.  We are a social species and try to interact with others as much as possible.  But do not forget that these internet services are designed with the “can we, not should we” attitude.  What I mean by this is that the web developers have security as an afterthought when making websites.  They are so engrossed in making new functions that expand the user base and coolness factor of their respective sites that they forget that hackers are out there counting on these oversights.

Not only are they themselves writing new features for the web services but they have implemented their own frameworks (API’s) that allow individuals to write add-ons to the network.  A great example was Scabbalicious with Facebook that allowed subscribers of Facebook to play games of Scrabble against other subscribers.  This is a great feature that a lot of people took advantage of and still do (except the name has changed).

By some control over to others for implementing their own 3rd party add-ons you have taken away the Quality Control factor.  People can make malicious add-ons that might not be detected as such until it has stolen information from thousands if not millions of subscriber’s pages.

Just by putting information online about yourself you are assuming that the services you use are secure and can keep that data away from prying eyes.  People are getting more and more liberal about sharing photos, personal information and tell tale data about themselves every day.  I caution this not because I am paranoid or wear tin foils hats, but because Cyberstalking is here already and becoming more and more prevalent with each coming day.  If you want to get a greater idea of how a photo can increase your chances of identity theft you should take the time and watch Johnny Long’s presentation “No Tech Hacking” here (http://video.google.com/videoplay?docid=-2160824376898701015) and also buy his book “No Tech Hacking” from Syngress Publishing here (http://www.amazon.com/No-Tech-Hacking-Engineering-Dumpster/dp/1597492159).

I will give just an example about social networks not being secure.  The first is about the website Twitter.  Now there have been a few Twitter worms that you can read about here (http://mashable.com/2009/04/11/stalkdaily-twitter/) and here (http://mashable.com/2009/04/12/mikeyy-another-twitter-worm-on-the-loose/) but what I am going to address is the program TweetDeck.  This flaw was brought to my attention by Larry Pesce from PaulDotCom Security Weekly and consists of your Twitter account authentications (username and password) being sent back to Twitter in Base64 encoding.  Why that is relevant is because Base64 can be reversed within a matter of seconds if a person sniffs your internet traffic.  If you are at an airport and you check your Twitter account via TweetDeck and you decide to look at a profile of a friend because he added a new picture. Your username and password can be gleaned by anyone connected to the same wireless network you are.

Now you say ok so they can get into my Twitter account big deal.  Well according to studies (http://www.pcworld.com/article/161078/one_third_use_same_password.html) and (http://www.darkreading.com/blog/archives/2009/02/phpbb_password.html) one third use the same password for everything.  So using the same password for ease of use as your bank website is an extremely scary thing.  But it’s not just about using the same password you should be using extremely hard to guess passwords.  You can read a post I’ve made about passwords and there security uses you can view it here (http://www.606studios.com/bendisboard/showthread.php?t=144301).

So after my long winded rant here are some good tips about staying secure on social networks.

  1. When you sign up use an internet handle that isn’t your real name.
  2. ONLY friend and befriend people you actually know in real life
  3. Try not to add any add-on applications on sites like Facebook
  4. Use Firefox Browser with No Script & AdBlock Plus Plugins. Lots of sites out there have nasty javascript and flash that can play havoc with your system. NoScript allows you to use whitelisting techniques for the sites you trust and block those who you don’t. It’s an internet condom in software form. With AdBlock Plus you can get rid of those nasty ads you see on every site. Also some of those ads can have hidden vulnerabilities in them to attack your machine.
  5. Use Strong & Unique Passwords. Passwords are a MUST, but what I also want to add is that you should use a separate password for each and every site you join. By doing so, if ANY of the sites get hacked, you are safe from them getting into any other site you use. I have seen this far too often, where a user uses the same password for some random forum site as they do for their banking site. If the forum site is hacked (and quite often is a main avenue for hacking) then they have your banking password as well.
  6. Use Multiple Email Addresses. This is something everyone should do. At least use two. One for your family, friends and one for signing up to internet sites. The 2nd email should be a GMail, HotMail, YahooMail, etc account and any of the information you signed up with should be FAKE. DO NOT use any of your real information when signing up for sites that you aren’t going to purchase from, and even then possibly use a third email account (gmail, etc) that doesn’t have your real info.
h1

Twitter Bot thoughts

April 19, 2009

Robin (digininja) made a PoC C&C for a Twitter bot network  (http://www.digininja.org/twitterbot/). He did some excellent work and again a PoC so I can understand why he didn’t go too in-depth into making it a more complex code. So I figured I would throw something together really quickly just to show how easy it would be to make the commands on Twitter (or any social networking site for that matter) work in a bit different way.

A couple things I would suggest to add to what Robin did is to have in the code a cycling values of Twitter names that it would follow and move to the next if that account it was following was deleted. I would also put in that other than the header bytes and CRC bytes of the post, should be encrypted. Not only would they be encrypted, but that it is updatable so that the decryption key would be stored on any number of machines that could be polled over SSL. Yes this does make it a bit noisier, but makes for some modifiable code. Also you could make the payloads much longer, so that you could span Twitter posts (as long as they were say no more than 2 mins apart) with a count byte.

1. First Byte is for multiple command count

2. Second Byte – PK Selection

3. Third Byte – MSB of Total length

4. Fourth Byte – LSB of Total Length following (minus 4 header bytes)

5. Fifth Byte – Command Byte – Bit Structure (MSB -> LSB)

5.1. Bit set to execute the attached payload (Bit 7)

5.2. Bit set for a reverse connection established (Bit 6)

5.3. Bit set to perform a PING to a specific address (Bit 5)

5.4. Bit set to download a file (Bit 4)

5.5. Bit set to grab and send password sniffed (Bit 3)

5.6. Bit set to grab hashes and send (Bit 2)

5.7. Bit set to change Key Server(Bit 1)

5.8. Bit set to update code from some site(Bit 0)

6. Command Start (FF)

7. Command Length

8. Bytes – Payloads

9. Last 2 Bytes – CRC-16

Examples of a packet (after decryption) Single Command

00 02 00 0B 20 FF 08 31 30 2E 30 2E 30 2E 31 28 7E

This would translate to ping 10.0.0.1

00 02 00 0B – Single Twitter Post command, Use value 02h to select decryption key, lenth of total command is 0Bh (11 bytes)

20 – Bit 5 set so PING

FF – Start Command Payload

08 – 8 Bytes of Command Payload

31 30 2E 30 2E 30 2E 31 – 10.0.0.1 in ascii

28 7E – CRC-16

h1

3G/EVDO Router works

April 4, 2009

While out doing presentations to clients we always have 2 laptops for certain parts of the presentation. While it was fine if there was WiFi access or 2 Ethernet drops, but if there weren’t we would each have to have a combination of GSM or CDMA products. In Canada we have a couple choices, 1 being the Rocket Stick from Rogers Wireless (which you can get in USB or CardBus) and 2 being a cardbus EVDO card from Telus/Bell. Well that is great but those makes 2 devices with 1-3 year contracts on each. This can get a bit pricey and cumbersome.

Enter in the CradlePoint MBR1000 (http://www.cradlepoint.com/products/mbr1000-failsafe-broadband-n-router) . This router allows us to share a GSM based internet connection or an EVDO internet connection. I just got the unit this morning and tried it out with my Rocket Stick and it delivers on its claims. 3G routing for those that need it in the field. No more bridging connections on a Linux based machine, it just works.

So if you have the need for something like this and have an extra $300 (CAD) lying around, you might want to take a look at it as it just might help you out in the field.

h1

2 Google Voice Fails

March 21, 2009

My friend Bob got his notice to upgrade to Google Voice last night and so Bob did.  After it had finished the upgrade Bob started playing with it a bit to test this new fangled feature out.  What Bob found was 1 verified FAIL on Google’s part and another one Bob is 90% sure is a second fail but no one Bob knew had a GrandCentral account that they hadn’t already upgraded to verify my test.

Anyway enough rambling on to the fails.

Fail #1:  This fail was inspired by a post by ChrisAM on the Securabit website.  Google Voice by default when you have a cell/mobile number as one of your forwarded phones will allow access to go directly into your Google Voice voicemail without entering a PIN if you call from a phone that has the callerid of your cell phone.  Now you might be saying “OK thats great, no big deal” but what happens is when you go directly to your Google Voice voicemail you can choose Option 2, which is to make an outgoing call.   Ah  now there is a FAIL.

If a malicious person spoofed the callerID of your cell phone and called your Google Voice number, they get right into your Google Voice voicemail.  Now they choose Option 2, and if you have any credit for making outgoing calls (they give you $1.00 to start with) they can now make international calls and dwindle your Google Voice credit down till you have none left.

Fix #1: Go into your settings, then phone tab and edit your cell number.  Choose the advanced options and select YES to “Require pressing star and entering PIN to check voicemails from this phone?”

Fail #2:  Please understand that this is for people NOT in USA.  Before upgrading your account from GrandCentral to Google Voice, add a forwarding number.  It will allow you to enter in a number (In my case Canada).  Then once you have added the number, upgrade to Google Voice.  It will transfer that number to your new Google Voice account without issue.  Why this is a FAIL on Google’s part is because if you try to add an international number as a forwarded phone in Google Voice it won’t allow you to.  Also the forward works (Bob has tested this) and it doesn’t charge your account for making an international call.  Bob is still at my $1.00 credit

Fix #2: Bob has emailed Google to fix their upgrade process.

Design a site like this with WordPress.com
Get started