Hackin9
U.S. Marine Corps Cpl. Chester Nez recieves an American flag from Pfc. Tiffany Boyd, at Code Talker Hall, Marine Corps Base Quantico, Va., April 4, 2014. The flag was flown over the Marine Corps War Memorial, on the first day of spring in honor of Cpl. Nez's attendace at the Platoon 382 Hall rededication. Cpl. Nez is the last of the original 29 Navajo Code Talkers of World War II.

On Wednesday Chester Nez, one of the 29 original Navajo code talkers who worked for the US during WWII sending secret messages in their native language, died in his home in Alburquerque, NM. Nez was 93 and his death was confirmed by Judy Avila, who helped him write his memoirs, according to the Los Angeles Times.

Nez was one of the first code talkers recruited for the job in 1942, while the US was seeing its codes broken over and over again by Japanese code breakers. According to AZCentral, he was in 10th grade when he was recruited by US Marines, who came to his boarding school in Arizona looking for native Navajo speakers.

Navajo has a complex grammar, and at the time there were few, if any, written records of the language. CNN notes that Nez and his peers were forbidden to speak Navajo growing up—until, of course, they were needed to devise a code based on the language. The 29 Navajo men attended boot camp at Camp Pendelton in California and there devised a dictionary with special words for military terms that did not exist in Navajo. They then memorized that dictionary, as the Naval History and Heritage Command recounts:

Read 4 remaining paragraphs | Comments

 
Cheaper smartphones running Microsoft's Windows Phone operating system are on the way, a Microsoft executive said Wednesday.
 
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
In an effort to fundamentally change the way it will communicate with future deep space missions, NASA will use a laser beam to send a video from the International Space Station to Earth on Thursday.
 

Inforisk 360° Gathers Top Security Specialist to Train Infosec Professional
Virtual-Strategy Magazine (press release)
Petaling Jaya, Malaysia, June 04, 2014 --(PR.com)-- Condition Zebra (www.condition-zebra.com), a global IT security risk management solution provider headquartered in Australia, is gathering elites in the industry to share their expertise with InfoSec ...

and more »
 
 
Sprint has reached a deal to buy T-Mobile US for about US$50 billion, according to news reports on Wednesday.
 
The PCI technology that's served PCs and servers well for decades is learning to get by on less power so it can play in mobile devices and the Internet of Things.
 
The U.S. Congress must pass legislation to ban mobile spying apps in order to protect victims of domestic violence, a senator said Wednesday.
 
Google has redesigned the reports section of the Apps admin console, giving IT staff a lot more details about who's been using the online apps suite and how.
 
Amazon took to social media and YouTube Wednesday with a cagey promotion for an upcoming launch event, setting off rampant Internet speculation that its long-rumored smartphone is about to be announced.
 
Blackberry released an infotainment system interface for digital instrument clusters and a platform for vehicle active and passive safety features.
 
A couple of things became clear during SAP co-founder Hasso Plattner's keynote at the Sapphire conference Wednesday: SAP remains fully committed to the Hana in-memory computing platform, as well as its push into SaaS (software as a service).
 
Visitors don't have to walk far to find wearables at Computex, the big IT trade show taking place in Taipei this week. Dozens of companies from Taiwan and China are showcasing first-generation products -- a big change from last year when they got almost no attention.
 
China's state-run television today took new shots at Microsoft's Windows 8, using a two-and-a-half-minute segment on a national show to blast the OS as a data thief.
 
Cloudera will incorporate technology from its acquisition of encryption software provider Gazzang into Apache Hadoop so that industries with stringent security regulations can use the big-data processing platform.
 

p0f has been discussed from time to time in our diary posts [1],[2] and I thought it good to bring that tool up again. There is a fully updated version [3] that has some additional features and seems to be maintained again (hoooray!). In that, there are some great things we can re-visit with the new and improved tool.

In the interest of the 'power' of sharing, to the "Inter-Tubes" for data. "Data, Data, Data" .... Here at the Internet Storm Center we have a saying "Got Packets?" well, in the interest of giving back check out http://www.netresec.com/?page=PcapFiles as a jumping off point for GiGs and GiGs worth of packets. Your mileage on the links may vary as some pcaps are no longer available. Be careful as always, some of that stuff may hurt :)

Checking what version is loaded, 3.06b and to the command line "Batman", let us first take a look at some simple protocol traffic. Mine is a capture from a ... location ... *hint_35K_feet*. If you want to take a look at other PCAPS that can be run through the tool for output check out references [4], [5], [6] (And I am sure there are others out there, please add in the comments).

We run p0f -r ./ and some results. Lets go over the normal stuff, then get to the good stuff.

 

If you notice in Figure 1., we see that we can tell a lot about this host, up-time, FREQ of the host, probably a Wifi, iType Device, likely a MacBook Pro (I have the inside scoop on that, it's me :).

For the more interesting part, we have to scroll back up a bit and we find?

According to the readme found at http://lcamtuf.coredump.cx/p0f3/README this is available via API. Just another tool in the belt of the analyst.

For fun, I downloaded a CTF PCAP from ICTF and ran it to see what p0f could find. 

 

[8]

 

Richard Porter

--- ISC Handler on Duty

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Comcast plans to work with Google to encrypt email exchanged between its own servers and Gmail, a Comcast spokesman said.
 
Cloudera will incorporate technology from its acquisition of encryption software provider Gazzang into Apache Hadoop so that industries with stringent security regulations can use the big-data processing platform.
 
A coalition of digital rights groups and Internet companies has launched a campaign, called Reset the Net, to encourage Web users and Internet companies to take measures to use surveillance-resistant privacy tools.
 
Within two years, a tech bigwig like Google, Apple or Samsung will be offering a car packed with the latest mobile connectivity features, according to a Gartner official who spoke at the Telematics Detroit 2014 Conference.
 
Xen 'HVM MSI injection' CVE-2014-3967 Denial of Service Vulnerability
 
PulseAudio 'pa_rtp_recv()' Function Remote Denial of Service Vulnerability
 
SAP CCMS Agent Code Injection Vulnerability
 
Google has already received around 41,000 requests to delete links to personal information from its search results in the three weeks since a key ruling by the European Court of Justice about the so-called right to be forgotten.
 
Talk to IT personnel, or study what they look up on Google, and you may think they're done with cloud computing. Talk to analysts, though -- or, more importantly, end users -- and you'll hear a different story.
 

An educational website that bills itself as the UK's top source for "unbiased, factual and easy-to-understand information on online safety" isn't living up to its promise. Not only is the password strength meter for Get Safe Online completely unreliable, it also transmits user-supplied candidates in address URLs, where they are vulnerable to hackers and shoulder surfers alike.

The sole exhibit in making this case is the above screenshot, showing how the Get Safe Online password checker graded the choice "Julia1984." As Ars chronicled two years ago, the password will typically fall in the first minute or so of a standard offline cracking session, because it contains an extremely common name followed by four digits, in a futile attempt to add randomness. Even worse, the digits are the year many people were born, making it more likely to be chosen than other numbers. All of that makes "Julia1984" among the worst passwords a user can choose. Despite this, Get Safe Online rates it "exceptional" and even goes on to say: "Flex those pecs, you're a Password Strongman (or woman)!" The password checker became unavailable sometime after the screenshot was captured on Wednesday morning.

In fairness, Get Safe Online isn't the only site that struggles to provide useful guidance about how susceptible a given password is to real-world cracking techniques. As Ars has reported in the past, similar services provided by both Intel and eBay have similar flaws. People who want to evaluate the strength of a password should rely on the advice provided by a reputable password manager such as 1Password or LastPass. In addition to being unreliable, online password checkers may also harvest passwords behind the scenes, making them unsuitable unless users have the skills needed to closely scrutinize the way the service works.

Read 3 remaining paragraphs | Comments

 
The best defense is a good offense and savvy CISOs are searching for security professionals such as certified ethical hackers. However, the demand for these highly skilled workers is skyrocketing.
 
Xen 'HVM MSI injection' Local Denial of Service Vulnerability
 
After a comedic video about net neutrality became a YouTube hit, more than 22,000 comments about proposed net neutrality rules flooded the website of the U.S. Federal Communications Commission, and the traffic locked up the agency's Web-based comments form for parts of Monday and Tuesday.
 
Enterprises can now run Windows Server 2012 R2 on Amazon's cloud, taking advantage of features such as tiered storage, and they can also combine the OS with SQL Server 2014.
 
LinuxSecurity.com: Security Report Summary
 
Sendmail File Descriptor Security Vulnerability
 
Long the purview of deep-pocketed enterprises, business intelligence software is increasingly making its way into small-and medium-sized businesses. These firms credit cloud technology, which tends to be both cheaper and easier to manage than on-premises BI systems.
 
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Smartwatch applications can be customized for devices with round displays by tweaking the user interface, Google said as it ramps up efforts to get developers ready for the launch of Android Wear.
 
Thin-and-light laptops have so far had to compromise on graphics to extend battery life, but Advanced Micro Devices wants to change that with its new laptop processors called Kaveri.
 
Hewlett-Packard considers its Pro Tablet 612 tablet to be a more feature-packed, albeit heavier replacement for a laptop than Microsoft's Surface Pro 3.
 
As more companies embrace shared services, staffers with cloud computing chops are watching their fortunes rise. Insider (registration required)
 
We've all learned that we're no safer than our least safe partner on our networks.
 
Apache Tomcat CVE-2014-0096 XML External Entity Information Disclosure Vulnerability
 
[SECURITY] [DSA 2945-1] chkrootkit security update
 
[CVE-2014-2577] XSS on Transform Foundation Server 4.3.1 and 5.2 from Bottomline Technologies
 
FreeBSD Security Advisory FreeBSD-SA-14:13.pam
 
The price of 4K monitors could fall to under $400 by the end of the this year, according to Intel.
 
Walk around the halls of Computex, the massive regional trade show taking place in Taipei this week, and you'll quickly realize that Microsoft's business is under attack like never before. In portable and mobile electronics, companies are increasingly choosing Google's Android operating system rather than Windows.
 
Apple has returned to public beta testing of its Mac operating system after a 14-year absence, just as rival Microsoft has begun backing away from the practice.
 
Without 3D printing, the Ford Motor Co. would not be able to meet new model vehicle build deadlines. Here's a look at how Ford is using the technology.
 
Re: [oss-security] Bug in bash <= 4.3 [security feature bypassed]
 
Bug in bash <= 4.3 [security feature bypassed]
 
CVE-2014-1226 s3dvt Root shell (still)
 
CVE-2013-6825 DCMTK Root Privilege escalation
 

Posted by InfoSec News on Jun 04

http://www.eweek.com/security/darpa-contest-aims-to-create-self-defending-networks.html

By Robert Lemos
eWEEK.com
2014-06-03

Thirty teams will participate in the Cyber Grand Challenge, aiming to make
networks smart enough to detect and repair vulnerabilities before
attackers can exploit them.

Aiming to make computer networks and systems self-defending, more than 30
teams will compete in the U.S. government's first-ever Cyber Grand...
 

Posted by InfoSec News on Jun 04

http://www.chicagotribune.com/news/local/suburbs/naperville_lisle/chi-police-pair-lied-in-attempt-to-enter-naperville-banks-back-room-20140603,0,1899443.story

By Adam Sege
Tribune reporter
June 3, 2014

Police in Naperville are investigating after a man and woman falsely
claimed they worked for a telephone carrier as they asked to be let into a
back room of a local bank, authorities said.

Officials in the west suburb said the pair walked into...
 

Posted by InfoSec News on Jun 04

http://features.techworld.com/sme/3523085/why-did-microsoft-choose-to-put-its-cybersecurity-accelerator-in-israel/

By Sam Shead
Techworld
03 June 2014

Microsoft is looking to make friends and partner with innovative tech
start-ups across the world through designated spaces known as
accelerators.

Accelerators usually offer a fixed-term, cohort-based programme, that
includes mentorship and educational components and culminates in a public...
 
Intel wants to completely eliminate wires from computers, and is working on a series of wireless technologies to make that a reality in the coming years.
 

Inforisk 360° Gathers Top Security Specialist to Train Infosec Professional
PR.com (press release)
Petaling Jaya, Malaysia, June 04, 2014 --(PR.com)-- Condition Zebra (www.condition-zebra.com), a global IT security risk management solution provider headquartered in Australia, is gathering elites in the industry to share their expertise with InfoSec ...

and more »
 
Hewlett-Packard considers its Pro Tablet 612 tablet to be a more feature-packed, albeit heavier replacement for a laptop than Microsoft's Surface Pro 3.
 
Internet Storm Center Infocon Status