Recon-ng ssl_san Reconnaissance Module
During the reconnaissance phase of a penetration test, a common task is to enumerate out the entire set of domain names owned and related to a target. This is most commonly performed using search engine queries, domain transfer attempts and domain name brute forcing.
I Hate When Conspiracy Theorists are Right
Edward Snowden told us the National Security Agency (NSA) was spying on us. If you were surprised by that, I have a bridge for sale that you may be interested in. However, one of the newest revelations from Snowden is the kind of stuff you usually only hear from people in tinfoil hats.
403 Labs Adds Jano Kray to Manage Higher Education Vertical
Brookfield, WI – September 4, 2013 – 403 Labs has added Jano Kray as a manager to oversee their specialized higher education compliance vertical.
Jano’s extensive compliance and technology experience includes leading the payment card industry (PCI) compliance team of a prestigious university as well as working in corporate information technology development and management. She also brings with her strategy and development background in the areas of ecommerce, financial systems, regulatory compliance, fundraising, database design, user experience and capacity planning.
Jacob Ansari Talks PCI DSS Version 3.0 Change Highlights
Last week, the Payment Card Industry Security Standards Council (PCI SSC) released its Version 3.0 Change Highlights document for the PCI Data Security Standard (PCI DSS) and the Payment Application Data Security Standard (PA-DSS). As Ericka Chickowski from Dark Reading points out in her article, “Is PCI Growing Up?”, the release “set tongues wagging once again about the direction of the ever-evolving state of the payment card compliance standards.”
Revealing XenServer Storage Repository Secrets
During some recent penetration testing, I managed to gain root access to a Citrix XenServer. One of the post-exploitation tasks I performed was to understand what storage repositories were connected to the server. Storage repositories are typically shares on which you host the media used to build the virtual machines or the virtual hard disks.
PCI SSC Announces Keynote Speakers for 2013 Community Meetings
This morning, the Payment Card Industry Security Standards Council (PCI SSC) announced the keynote speakers for its 2013 Community Meetings for North America, Europe and Asia-Pacific. Jacob Ansari, our very own Director of Technical Services here at 403 Labs, will be giving a keynote talk on forensics at both the North American and European Community Meetings.
Windows XP Lifecycle Sunset: It’s The Final Countdown
Our friend and colleague, Walt Conway, posted a great column on the Windows XP sunset over at StorefrontBacktalk in February. For those of you who aren’t aware, the support lifecycle for Windows XP comes to an end one year from today. Twelve months may seem far off, but if you depend on these systems within a secure environment, or one subject to any sort of regulatory compliance, you’d better have had a transition plan in place yesterday.
We hope to make enough noise about this issue that nobody can ignore it. There are a few particular points regarding this looming date that we’d like to raise a clamor about:
How to Decompress an LZMA-Compressed Squashfs on BackTrack 5
If you’re trying to extract a Squashfs and get a
zlib::uncompress failed, unknown error -3 error, you may be running into an unsupported compression type as I did recently. Ultimately, I discovered the compression used on my Squashfs was LZMA. I wanted to share just how I was able to decompress the LZMA-compressed Squashfs.
Exynos Vulnerability on Samsung Devices
I recently purchased a Samsung Galaxy Note II and have been thoroughly enjoying it. The number of diverse applications is pretty amazing.
Unfortunately, a few days ago, a colleague passed an article along detailing an exploit associated with my brand of phone. The exploit is connected to the Exynos processor and the capability to obtain access to all physical memory.