Resources

Blog

How to Detect the GHOST glibc Vulnerability

Image The GHOST vulnerability (CVE-2015-0235), which was discovered by researchers in the GNU C Library (glibc), allows local and remote access to the gethostbyname*() functions in certain cases. Although the vulnerability was just recently disclosed, the vulnerability was introduced in glibx-2.2 on November 10, 2000. Fortunately,...
Blog

Don’t be Shellshocked by GHOST

Image If you’re following threat feeds, you’ve probably heard about GHOST (CVE 2015-0235), the new critical vulnerability that Qualys disclosed yesterday. This vulnerability has been found in glibc, the GNU C library, and it affects all Linux systems dating back to 2000. Redhat listed it on their CVE database as ‘critical’ with a CVSS...
Blog

GHOST Vulnerability and Its Patch History

Image   There’s a lot of chatter going on right now related to the GHOST vulnerability that was announced yesterday. Lots of folks are talking about the vulnerability, particularly focused on the threat advisory published by Qualys. However, I thought I would spend a little time looking at the history of this vulnerability and how its...
Blog

GHOST in the Linux Machine – CVE-2015-0235

Image Researchers have discovered a critical vulnerability (CVE-2015-0235) in the Linux GNU C Library (glibc) that could potentially allow attackers to execute code on servers and gain remote control of Linux machines, without the necessary system credentials. This flaw is found in most versions of Linux, in which a buffer overflow...
Blog

VERT Alert: GHOST - glibc overflow

Image Vulnerability Description A heap-based buffer overflow was found in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the...
Blog

Marriott Customers' Personal Details Exposed by Simple Web Flaw

Image Here's a piece of advice for anyone responsible for securing a corporation's data: If you discover security researcher Randy Westergren is using your app, you had best take a long hard look at whether you are protecting your users' information properly. Because, if you're not, there's a good chance that he might be about to tell...
Blog

10 Notorious Cyber Criminals Brought to Justice – No. 5

Image Five cyber criminals down; five to go. Last week, we learned about Lin Mun Poo, a Malaysian hacker who at one time infiltrated a prominent U.S. financial institution as well as a contractor for the Department of Defense. Tripwire now continues its series on some of the most notorious cyber criminals brought to justice with...
Blog

Vulnerability Scoring 103

Image   We’ve looked at the Tripwire IP360 Scoring System and how risk is commonly used in two different scenarios, so I figured it was worthwhile to dive into the other complex element of Tripwire’s scoring: skill. Skill is a term that, even within the IP360 Scoring System, has evolved over the years and it’s worth looking at the...
Blog

Seven-Year-Old Hacks Public WiFi in Under 11 Minutes

Image As part of a security awareness campaign, a seven-year-old girl was able to successfully hack a public WiFi hotspot in 10 minutes and 54 seconds. Seven-year-old Betsy Davis entered into the ethical hacking demo, meaning that a security expert supervised the entirety of the experiment, with only her laptop. She was then able to...
Blog

Why We Should Care About STIX & TAXII

Image I started getting involved in learning about the STIX (more here) and TAXII standards in earnest last year. These emerging standards enable effective sharing of cyber threat data in automated ways between different products, people and organizations. In many ways, that makes me a newcomer to these emerging standards; by that...
Blog

VERT Vuln School: XSS versus XSRF

Image Cross-site scripting, commonly referred to as XSS, is listed third in the OWASP Top 10 for 2013 Web Application Security risks. Unlike SQL injection attacks, which target data on the server, XSS provides a vector for attacking the users of a vulnerable web site. At a general level, XSS is when an attacker can cause a web site to...
Blog

Hacker Halted... What Is It?

Image Hacker Halted is an IT security conference with the intention of educating the attendees in security and ethics. Last year, the conference was held in Atlanta on October 16-17. What VERT Presented at Hacker Halted VERT presented an implementation of a protocol independent fuzzer, which was built using python. We developed a...
Blog

ComRAT Spyware Still Evolving, Confirm Researchers

Image Security researchers have found that the developers of ComRAT, a complex remote administration tool, are still hard at work. Per an article published on its blog, G Data Software was able to successfully identify 46 different samples of the spyware and trace it to as far back as 2007. Some believe that the malware, otherwise...