Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

The Perils of Deep Packet Inspection

Posted on January 11, 2005December 30, 2021 by admini

Microsoft, Cisco, Checkpoint, Symantec, Nortel, SonicWall, NAI, Juniper/Netscreen, and others, have, in the past eighteen months started manufacturing firewall appliances that implement Deep Packet Inspection (DPI). In general, the DPI engine scrutinizes each packet (including the data payload) as it traverses the firewall, and rejects or allows the packet based upon a ruleset that is implemented by the firewall administrator. The inspection engine implements the ruleset based upon signature-based comparisons, heuristic, statistical, or anomaly-based techniques, or some combination of these.

Deep Packet Inspection promises to enhance firewall capabilities by adding the ability to analyze and filter SOAP and other XML messages, dynamically open and close ports for VoIP application traffic, perform in-line AV and spam screening, dynamically proxy IM traffic, eliminate the bevy of attacks against NetBIOS-based services, traffic-shape or do away with the many flavors of P2P traffic (recently shown to account for ~35% of internet traffic), and perform SSL session inspection.

Deep Packet Inspection essentially collapses Intrusion Detection (IDS) functionality into the firewall appliance so that both a firewall and an in-line IDS are implemented on the same device. Many of these products have recently been shown to be vulnerable to exploitation of software defects in their DPI inspection engines, however. The data suggest that the addition of these enhanced functions to firewalls may, in fact, weaken, rather that strengthen network perimeter security.

Traditionally, firewalls have provided a physical and logical demarcation between the inside and the outside of a network. The first firewalls were basically just gateways between two networks with IP forwarding disabled. It fails closed – that is, if the firewall crashes in some way, no traffic is forwarded between interfaces. One of these, the Gate, or packet-screening device, relied upon the kernel to pass packet headers to a user-space program, screend, which informed the kernel whether or not to forward the packet. IP packet filtering firewalls all share the same basic mechanism: As an IP packet traverses the firewall, the headers are parsed, and the results are compared to a ruleset defined by a system administrator.

A stateful inspection firewall registers connection data and compiles this information in a kernel-based state table.

Several firewall vendors, including Check Point, Cisco, Symantec, Netscreen, and NAI have integrated additional application-level data analysis into the firewall. Checkpoint, for example, initially added application proxies for TELNET, FTP, and HTTP to the FW-1 product. Cisco’s PIX fixup protocol initially provided for limited application parsing of FTP, HTTP, H.323, RSH, SMTP, and SQLNET.

DPI engines parse the entire IP packet, and make forwarding decisions by means of a rule-based logic that is based upon signature or regular expression matching. Promising approaches to these problems include a software-based approach (Snort implementing the Boyer-Moore algorithm), and a hardware-based approach (FPGA’s running a Bloom filter algorithm). DPI technology can be effective against buffer overflow attacks, denial of service (DoS) attacks, sophisticated intrusions, and a small percentage of worms that fit within a single packet.

Researchers at Internet Security Systems (ISS) discovered a remotely exploitable buffer overflow in the Snort stream4 preprocessor module. Remote attackers may exploit the buffer overflow condition to run arbitrary code on a Snort sensor with the privileges of the Snort IDS process, which typically runs as the superuser.

Due to an implementation fault in VirusWall’s handling of a UUencoded file name, it is possible for a remote attacker to specify an arbitrarily long string, overwriting the stack with user defined data, and allowing a remote attacker to execute arbitrary code.

Multiple Cisco products contain vulnerabilities in the processing of H.323 messages, which are typically used in Voice over Internet Protocol (VoIP) or multimedia applications.

The bottom line is that in order to exercise sound bandwidth and security controls, organizations and service providers must be able to differentiate traffic types based upon the contents of the application payload.

http://www.securityfocus.com/infocus/1817

Read more

Securing data from the threat within

Posted on January 10, 2005December 30, 2021 by admini

Just ask Apple Computer, which filed two lawsuits in December accusing insiders and partners of leaking proprietary information. In one case, Apple is suing two men it says distributed prerelease versions of Tiger, the next iteration of Mac OS X. In a separate action, it is suing unnamed individuals who leaked details about a forthcoming music device code-named Asteroid.

Apple’s not the only company that’s found sensitive internal information leaked to the public. Big names such as America Online, Microsoft and Cisco Systems have also been victims.

Research indicates that most security breaches are inside jobs. A recent Ponemon Institute survey of 163 Fortune 1000 companies found that roughly 70 percent of all reported security breaches were due to insiders.

“It’s much more glamorous to think of the hacker who works for some large cyber-crime ring,” said Larry Ponemon, head of the Tuscon, Ariz., think tank. “But in reality, those characters only make up a small percent of the problem.”

For more than a decade, corporations have erected digital perimeters to keep outsiders off their networks. But now discontented, reckless and greedy employees, and disgruntled former workers, can all be bigger threats than the mysterious hacker. And as more companies outsource portions of their business, vital company information can easily fall into the wrong hands.

Securing information from the inside has been largely overlooked by many companies. But headline-grabbing incidents such as the one at Apple, along with new federal and state regulations for protecting private information, are causing many companies to rethink their security strategies from the inside out. As a result, a whole new class of products has sprung up aimed at keeping employees and other insiders from sending confidential information outside the company. Developing new techniques In addition to products that control who gets access to what information, a slew of new start-ups focus on securing digital content and watching where it goes. Products in this category vary in their approach.

Some focus solely on protecting intellectual property from being leaked, while others also perform forensics analysis, digital rights management and security policy management. Some products from companies like Vontu and Vericept act as gateways in the network to track sensitive information that is being sent outside of the network. They monitor e-mail, instant messages, FTP files, and other electronic communications on corporate networks, sniffing for leaks of Social Security numbers and other sensitive information. They only prevent information from being electronically sent over the network. They do nothing to prevent people from downloading files or printing documents.

Jon Oltsik, senior analyst with Enterprise Strategy Group, says technology must also exist on PCs and other devices not only to monitor what data is traversing the network, but to establish and enforce policies regarding printing and downloading information onto disks or USB devices. Companies such as Authentica and Liquid Machines sit on the client machine tracking and limiting how recipients handle certain information.

“There isn’t one technology that will solve this problem,” Oltsik said. “You really need to take a combination of approaches.”

The no-tech Trojan horse Once inside a company or one of its partners, a trusted employee can do enormous damage. Often such leaks disclose the most sensitive of data. “Insiders know where the information is located and how the security systems work,” Oltsik said. “They know what information is valuable and what’s not.”

http://news.zdnet.com/2100-1009_22-5520016.html

Read more

Mcafee – Google hacking tool looks for security gaps

Posted on January 10, 2005December 30, 2021 by admini

SiteDigger 2.0, delivered on Monday, looks for information about a Web site’s security by sending specific queries to Google’s Web database. Known as Google hacking, such searches can turn up easily exploitable flaws and sensitive information, including credit card numbers and user account information. The free service should help Webmasters stay informed about what information is out there regarding their sites, said Chris Prosise, vice-president of worldwide professional services for security technology company McAfee.

“We built this tool really as an awareness tool,” Prosise said, adding that SiteDigger highlights problems that Webmasters might otherwise not know about. “As a victim, you would never really know that someone was using this information.”

SiteDigger does not discern whether the person using it is an authorised administrator of the site or a potential attacker looking for weaknesses.

Prosise agreed that this means the tool could be used against a site, but pointed out that Google requires that any user of an automated service sign up with its Web services development programme.

Recently, the Santy worm used Google queries to find potentially vulnerable computers, which the program would then try to infect with its code.

Several other tools have been created by other research groups to comb for flaws using Google’s database.

Google could not immediately be reached for comment on SiteDigger.

Johnny Long, a senior engineer at Computer Sciences Corp. and author of the book Google Hacking for Penetration Testers, said such tools are necessary for Web administrators to keep their sites safe. “There is no way for a security team to stay on top of Google without automation,” he said. “They can’t spend all the time trolling through Google.” Long maintains a site of more than 800 signatures of common security problems that can be searched for with Google.

SiteDigger and other tools use the signatures to query the search engine for the problems. While stressing that SiteDigger benefits Web sites with knowledgeable security personnel — usually the larger sites — Long acknowledged that smaller, less security-conscious sites would likely be at a disadvantage against potential attackers. Such sites typically aren’t aware of the threats posed by Google hacking. “The little guys are going to lose whenever a new tool comes out,” he said. “The smaller site you are, the more you have to worry about.”

http://news.zdnet.co.uk/communications/networks/0,39020345,39183591,00.htm

Read more

The 2038 date bug… Y2k again!

Posted on January 6, 2005December 30, 2021 by admini

Of course we now know that the prevalence of computers that would fail because of this error was greatly exaggerated by the media.

Most programs use Coordinated Universal Time (UTC) to work out their dates.

At this time, a machine prone to this bug will show the time Fri Dec 13 20:45:52 1901, hence it is possible that the media will call this The Friday 13th Bug.

http://www.2038bug.com/

Read more

Microsoft hurries antispyware, holds Exchange updates

Posted on January 6, 2005December 30, 2021 by admini

Microsoft is on target to release a public beta of antispyware software by Jan. 16, one month after the company acquired the software by purchasing Giant Company Software Inc., a company spokeswoman said.

Simultaneously, Microsoft is delaying elements of Exchange Edge Services, a package of e-mail security technologies, until the next major release of Exchange Server, according to a statement sent to reporters in December.

Microsoft plans to release a free evaluation version of Giant AntiSpyware software within a month of its Dec. 16 purchase of Giant, but a spokeswoman declined to comment on an exact release date, or the functionality that will be in the release program. Microsoft would not comment on information published on Microsoft enthusiast Web site Neowin.net that a beta version of the software, code named “Atlanta,” has already been distributed to internal testers. Neowin.net also posted screenshots supposedly taken from a product called “Microsoft AntiSpyware.”

Microsoft commonly tests products internally first, a process it calls “dogfooding,” but the company spokesman would not say whether the AntiSpyware software had been distributed to employees.

At the time of the Giant purchase, Microsoft said that the beta would run on Windows 2000, Windows XP and Windows Server 2003 systems and that it would use that public beta release to collect and evaluate customer feedback on the product, and make decisions about how it wants to distribute the AntiSpyware product in the future.

The future is more cloudy for Exchange Edge Services, an add-on for Exchange Server announced by Chairman and Chief Software Architect Bill Gates in February 2004 at the RSA Security (Profile, Products, Articles) Conference in San Francisco.

The company last month axed Edge Services, saying it will not be released this year as an addition to Exchange, but will instead be rolled into the next version of the Exchange Server product.

With many customers still in the process of upgrading their Exchange e-mail servers to Exchange Server 2003, released in 2003, the change in timing for Edge Services will have little impact on customers, according to Microsoft. “The new (Exchange) road map means there will be no major upgrades for customers who bought upgrade rights on Exchange in late 2001 and early 2002,” Rob Helm, director of research at Directions on Microsoft Inc., wrote in a research note.

Microsoft plans to release some elements of Edge Services with Exchange Server 2003 Service Pack 2, due in the second half of 2005. However, it needs more time to build a product that meets customer requests for broader capabilities such as support for messaging policies to help meet regulatory compliance requirements, the company said.

http://www.infoworld.com/article/05/01/05/HNmicrosoftrushesantispyware_1.html

Read more

US court allows work PC to be seized without warrant

Posted on January 6, 2005December 30, 2021 by admini

All that is necessary is the permission of the business that owns the computer, the appeals court said in a 3-0 decision last week.

In April 2003, when Jack Leck briefly worked at a not-for-profit organisation called the World Peace Ambassadors, he allegedly used an office computer to do Web searches for pre-teen boys and girls and participate in related mailing lists from his Hotmail account.

When police showed up with some questions, the not-for-profit group permitted that computer to be seized without a warrant.

Leck was charged with 50 counts of possessing child pornography and sentenced to four years in prison.

He claimed the Washington State Patrol Crime Lab’s seizure and search of the computer without a warrant was illegal because it violated his Fourth Amendment right to privacy.

The Washington state Supreme Court has authorised searches without a warrant as long as the lawful owner of the property gives consent voluntarily, the court noted.

“Leck did not share equal authority with [the nonprofit’s director] over the WPA office or computer, thus, Leck’s consent to the state’s search was not necessary,” wrote Judge Marywave Van Deren.

The court upheld Leck’s conviction and sentence.

http://news.zdnet.co.uk/business/employment/0,39020648,39183217,00.htm

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • …
  • 421
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme