housekeeping – decompression

I apologize if you’ve submitted any recent comments. I’ve been swamped the past few months with work, and my free time has been spent decompressing with things like beer, pocasts, hookers, StarCraft 2, and so on. I just dumped about 10k comments which I quickly skimmed through, so I’m sure I dumped some legitimate ones on accident.

Keeping up on the latest security happenings, comments being submitted, and my own postings has been spotty at best. Things are looking to settle down just a little bit here, so hopefully I can get my own news-reading caught up as well. My RSS feeds are utterly out of control!

kidney punches from the windows dll hijacking vuln

There’s been a surprising amount of discussion about the recent Windows DLL hijacking vulnerability, often focusing on whether this is a Big Deal or something stupid. I won’t bother linking to anything or even joining in any further except to expound on my post earlier.

The DLL hijacking is interesting because, well…it’s like walking up to someone you have no reason to mistrust. You shake his hand, but while you do so, someone (maybe his evil twin who was following him) wings a hook beyond your peripheral vision and WHAM! kidney punch. Now, good twin had no idea evil twin was around, and was sincere in his greeting and handshake. But you left yourself open by shaking that hand, and evil twin dropped you to a knee for it.

We can often curse ourselves for shaking hands with the app/guy/file that throws the hook. You run an exe and that’s your problem. You run a streamed media file with malicious code, and that’s still mostly your problem (and partly the fault of the vulnerable app you used to open it). But in this case, you could open a completely innocent file, and get kidney punched.

That’s the important gist of the hijacking vuln, to me. That and the importance this places on patching 3rd-party Windows apps that are vulnerable to this method.

moaub has begun

The Month of Abysssec Undisclosed Bugs (MOAUB) has begun. Since this includes (or maybe fully encompasses) the people behind exploit-db and offensive security, we can probably expect plenty of explanation on the bugs, especially the planned binary analyses.

Seeing things like this and the people behind it, it makes me a little annoyed to be in operations for an SMB. Ops means knowing a bit about a lot of things, but rarely having the time to go into the deep dives often necessary for real security knowledge. I envy and support anyone who has that ability and time! /whine

unprotecting excel sheets

Ever solve a problem, then 6 months later need to solve it again but don’t recall how you solved it previously? That is the sort of housekeeping I’m doing with this post. I make no guarantee that the site or tool mentioned below is safe/secure for your use. Always take necessary precautions.

Have an Excel file that has password protected sheets or workbooks? I found a handy set of macros to facilitate unprotecting such files over at straxx.com. To be safe, I’d suggest unlocking the files, copying the contents out to a new file, and make sure no strange macros get carried over. I didn’t witness any, but better to be safe. And do this all on an expendable system. [excel password crack unprotect]

the wide impact of windows dll hijacking issue

How can the recent Windows DLL hijacking issue affect me? Or rather, can it be used to specifically target vulnerable applications?

A disclosure this afternoon involving KeePass certainly does show you can target specific applications. For instance, if you can get someone with KeePass to attempt to open a KeePass file and load your malicious DLL, you can execute code…such as installing a keylogger/filemon to track what your victim uses to open that super-secret KeePass database.

Note an important issue here: While this vulnerability was announced by Microsoft, Microsoft may not be able to fix this underlying issue. Which really breaks many vulnerability management practices in enterprises that don’t do a good job keeping inventory of installed applications and their own updates/patches/vuln announcements.

reading up on malware-serving widgets

As if there isn’t already enough uncertainty about browsing the web in general, take a read on recent posts from Armorize about some (to put it lightly) malware being served via widgets…with a large exposure base on Network Solutions’ parked domains. Part 1: the infection delivery; part 2: more on the malware; part 3: follow-up.

As the years go by, I have become less interested in the workings of malware on the desktop (call me jaded, but I consider it a total loss once it starts) and more interested in the delivery mechanisms and how malware gets injected into servers; or how servers get popped either directly or as unwitting facilitators (I work more with servers than desktops, so maybe this interest is natural). These reports by Armorize are a bit confusing to read in this regard, but from the sounds of it, either a widget server is being subverted or Network Solutions still has problems with someone owning (to some degree) their systems (or both). NetSol has been beleaguered this year with attacks.

Hosting someone else’s code. Including widgets from other people that consume content from other sites. Reduced budgets and increased cost-cutting. These are the sorts of things that demonstrate our unintended expansion of the trust we need to have in others and other code for our own security. Complexity doesn’t make things easier!

sort of a security identity crisis?

It’s impossible to ignore shrdlu’s posts; they’re entertaining and truthful. For instance:

They assume that security staff actually have CONTROL over their systems.

Most products are predicated on this assumption—here, just install this agent and you’re done. Put this on the single choke point in your network and you’re done. Just whitelist what users can install and you’re done.

I’ve always been unable to explain how larger organizations can implement some of these things (I’ve worked in SMBs). You have one choke point? Hell, even I have at least 4, let alone other networks I have to eat up span ports for. That’s either costly or a gigantic mess. You have the ability to install and/or configure things? I do, but I know if one mistake digs into Availability then I get reamed. When you work in both operations and security roles, you learn quickly which one is more important! My guess is enterprises don’t do it very well at all like I expect; they just have the budgets to throw money at the issues and enough mgmt layers to spread the pain and BS.

As shrdlu mentions, it’s not at all surprising that the more “successful” security products are the ones that watch the network or require the least pain (read: involvement by anyone else) overall. This is why I’m a very, very, very strong believer in Network Security Monitoring and perimeter control as always being a very important thing for security.

Oh, the title of this post alludes to the thought of what role should security have. Should it just be a SOC where they have no control or administration rights? Or should they be veritable corporate gods? In my opinion, it should be far towards the latter. They may not always get their way, but they should be able to be empowered to straighten crooked paths.

is pci compliance in demand? or just a gun to our heads?

(Look out, the cynical bus is driving by!)

The big elephant in the PCI room is simply how fucking expensive truly meeting the requirements is (for SMBs and others). Between capital costs and process changes and slowing down business and staff knowledge/training and manhours…it’s not nearly as small a pill to swallow as ya might think. And even if you get it done, the people behind it have a few more grey hairs, have burned plenty of political credit, and have new drinking problems! (Or you work in a large enterprise so it’s slightly easier to swallow.) More than likely they also now have dire staffing issues.

Mike Richardson has a great blog post about implementing PCI DSS standards in a web hosting environment. The end result? It’s dishearteningly expensive and not in demand.

What really sucks about admitting PCI is expensive? I’m also saying *security* is expensive. And it is! Then again, pressing 150lbs is tough, too, but you’ll get there if you start at 75lbs and work at it. (Don’t mock me in regards to my analogy!)

Compliance is still just part of what I call the big gamble in security (and enterprises). You know you should do more, you know you should look at that log today, you know your staff should be properly checking their controls, you know you’re not allowing your QSA to see the whole picture…but you gamble that things will be fine and continue on as you otherwise do, following the path of least resistance that you can get away with. Entire organizations operate that way, let alone executives, managers, and employees.

new windows dll hijacking vuln announced

Quick note about a new Windows DLL vulnerability whose details have been announced. The best place to start investigating this is from HD Moore’s Metasploit blog post. It is worthwhile to note that most organizations block outbound SMB ports at the firewall. Internal attack is still quite possible, and so is being redirected to an external WebDAV instance. Thankfully WebDAV is not common out in the wild, so that scenario is slightly less of a risk, but still it might be useful to block unnecessary http methods like PROPFIND on your web filters. Unlike my shop which is a heavy Windows .NET dev shop, it might be useful to include all .dll files in your network share content scans. You should prefer to know what’s out there and what’s new if that isn’t too much of a burden (it is when my devs have innumerable dll files out on my network).

While we don’t have a huge plethora of worms and remote attacks these days, the number of attacks available, e.g. to pen testers, attacking users directly and actively is crazy high. Convince a user to do/go/open x and you’re in.

skills for work and skills for getting work

Chuvakin has a great post over at his blog where he talks about what skills you should be focusing on, such as skills that help land you jobs or skills that help you do jobs. I think I agree with all the points made.

Getting past an HR filter to land a job is a sort of small-time thing. You can apply for 20 jobs and you just need to get through and hired once. After that, you have, usually, several years to either prove your worth or get booted out for not being able to do the work. The bottomline is you need to be able to do the work.

I also believe that the deeper and more versed one becomes with the “skills that help you do your job” the easier it is to demonstrate those skills to someone else. For instance, it might seem hard to demonstrate a web app weakness to a manager…unless you’ve done it so much you can pretty much spot them on sight (insert some allusion to MagicEye pictures that often take a lot of work to see the first time, but once you get it, you can get it faster and faster).

You know you’re good with a router or firewall or load balancer when someone throws you a strange question and you figure out some interesting way to do it that wouldn’t have been obvious without a few years of experience. That skill might not get you a new job, but it will certainly cement your place in a current job!

possible issues with windows handling lnk files

Just read (and had to re-read several times) a quick vulnerability announcement over on US-CERT for how Windows handles LNK files. From the sounds of this, all you need to do is view the location of the malicious LNK file to have it execute code. It’s still not entirely clear if this means viewing the containing folder in Windows Explorer, clicking the LNK file (duh), or something else.

This might be interesting, as it is not uncommon for users to mistakenly attempt sending .LNK files via email, rather than attaching the actual target file of their silly shortcut. And LNK files litter corporate network shares…

If this is just viewing the file sitting in a folder is enough to trigger this, it’s kinda reminiscent of older issues with Windows Explorer displaying certain files like DLL files on network shares. Just the act looking in the direction of the file was enough to cause issues!