Yahoo service SQL injection vuln leads to account exposure
We're a bit slow on the uptake given SANSFIRE, but as you are likely well aware, a SQL injection vulnerability was leveraged to gain access to the Yahoo Voice service which was utilized by attackers to acquire then post login credentials for more than 453,000 user accounts that they said they retrieved in plaintext.
2 for 1: SANSFIRE & MSRA presentations
It's been a busy week for me having presented OWASP Top 10 Tools and Tactics at SANSFIRE in Washington, DC Tuesday evening 10 July, followed by Evil Through The Lens of Web Logs at the Microsoft Security Response Alliance Summit in Redmond (the other Washington) Thursday morning 12 July.
VMWare Security Advisory 12 JUL 2012
VMSA-2012-0012 is an advisory specific to a VMware ESXi update that addresses several security issues.
This includes an ESXi update to third party component libxml2. The libxml2 third party library has been updated which addresses multiple security issues.
All the details are available here: http://www.vmware.com/security/advisories/VMSA-2012-0012.html
Yesterday (not as on the ball as Rob) at SANSFire
Last night I presented a series of tips and gotchas whilst setting up a home lab for Malware and Packet collection.
Packet and Malware Collection for the Home Network, Research Starts at Home!
- Richard Porter, ISC Handler
- Wednesday, July 11 * 8:15pm - 9:15pmIf you are just getting started in the Information Security Field, or want to practice your packetFu or MalwareFu? A place to start is on the home network! Often at a SANS Conference you will hear the Instructors, Faculty or even the Handlers reply with "Get Written Permission!" With that, you have permission on a network you own. This talk will go over setup, tools, pit-falls and things to be aware of for the home network. This discussion is a useful addition to both Security 503: Intrusion Detection In-Depth and Forensics 610: Reverse Engineering Malware.
It was well attended, and thanks for all the kind words. There were so many requests for my presentation and tips that when we recover from SANSFire, I will write another diary on more hints and tips but here are a couple:
1 - Roomate/Spouse/KId Alerting: Let them know you will be capturing traffic (Or not )
2 - Power: Check power where your lab is, your home wiring may be in series [1]
[1] http://en.wikipedia.org/wiki/Electrical_wiring
@packetalien - Twitter
And thanks again for all those who attended. Check back for more tips about running a lab at home (along with the Dionaea Virtual machine, when it is more stable.)
From SANSfire 2012, signing off!
Signing back on for an UPDATE: @karl thanks!
Tip 2, power, don't overload your circuit. I have dedicated drops at points in my home. As he pointed out, my tip is to not add to much load to one circuit and plan how much you are going to draw.
Comments