>From bag-o-news at seclabs.eu Thu Mar 1 15:00:17 2012 From: bag-o-news at seclabs.eu (Infosec bag-o-news) Date: Thu, 1 Mar 2012 15:00:17 +0000 Subject: [bag-o-news] Too much news for one day... Message-ID: Hello again I didn't plan this one to hit the wire so soon but there is some good info that you may want to know about. If you have any feedback you would like to share, please reply to this email - it will go back to me, not to the list. Space station control codes on stolen NASA laptop -------------------------------------------------------------------------------- An unencrypted laptop stolen from NASA in March 2011 contained algorithms and commands used to control the International Space Station. Keeping track of data movements can be extremely hard in most environments, especially when portable devices (laptops, smart phones, etc) come into play. If we still can't properly handle devices we (organizations) own then we shouldn't even consider BYOD (Bring Your Own Device) concept... * CNET News - http://is.gd/5FLvRL Windows Azure Service Disruption -------------------------------------------------------------------------------- As MSDN Blogs report, Azure Computer service (Microsoft's cloud offering) had some disruption affecting multiple regions. The issue was a software bug... that appears to be (drum roll please) an issue with incorrect time calculation on a leap year. Well, we all make mistakes, even though one would say we had about 30 yeras to learn and get such things right. * MSDN Blogs: Windows Azure - http://is.gd/RnlF7o Verisign seizes .com domain registered via foreign Registrar on behalf of US Authorities -------------------------------------------------------------------------------- After US law banned on-line gaming/gambling in 2006 and domain seizures last year, we shouldn't be surprised that bodog.com was seized yesterday, right? The only trick is, that the domain was registered with non-US based registrar, yet Verisign who is the root of all .com domains executed the warrant issued by the State of Maryland and handed the domain over to DHS. This puts all .com, .net, .org, .biz and possibly .info domains at risk. Combine that with PIPA, SOPA and ACTA - all of which were introduced/created and lobbied for by US based groups - and we get a scary image that just gets worse as we go along. I'm not a fan of conspiracy theories, but is this a new way to implement the 'Internet kill- switch'? We'll see quite soon I guess :-( * EasyDNS Blog post - http://is.gd/DaMyzX RSA 2012: Cloud Service Provider Gets Caught In LulzSec Crossfire -------------------------------------------------------------------------------- Ever heard of CloudFlare? It is a content delivery and security service that was used also by LulzSec during their activity period. This blog entry describes how CloudFlare was attacked by people trying to bring down LulzSec website - this is a pentest you just can't buy... * CRN article - http://is.gd/cD0Pec Thought leadership -------------------------------------------------------------------------------- This excellent clip was recommended to me by J4vv4d (more info coming soon) - worth watching! * Thought leadership - http://is.gd/Cauer1 Dave (ReL1K) Kennedy: Egress Buster - Find outbound ports -------------------------------------------------------------------------------- This would be especially useful to pentester that that try to call home from compromised host but are blocked by egress filters. * Egress Buster - http://is.gd/ExnUIy Demystifying iPhone Forensics on iOS 5 -------------------------------------------------------------------------------- If you are a 'forensicator' but never done any mobile device forensics, this technical post will help getting your feet wet, at least on Apple iOS devices. * Demystifying iPhone Forensics on iOS 5 - http://is.gd/RpkW8V How to sneak into a security conference -------------------------------------------------------------------------------- A social engineering expert deails how he managed to go anywhere he wanted at RSA 2012 - light reading really and yet again proves that humans are the weakest element of te whole securit chain. * CSO Online article - http://is.gd/ELyaDl Raspberry Pi - launched yesterday... -------------------------------------------------------------------------------- The 6am news was that the first 10k devices can be ordered via Premier Farnell and RS Components that will be manufacturing and distributing all of the devices. Launch was very succesfull and #raspberrypi hashtag was trending worldwide on Twitter, BBC's top storries on the day were 1) Raspberry Pi, 2) Windows 8 Customer Preview, 3) iPad 3 release next week - says it all. Sadly Farnell and RS got successfully DDoS'ed by over 100k people trying to buy Raspbery Pi. I managed to finall put my order in with Farnell, but that was at 8:30 when the site finally started responding and order confirmation stated estimated delivery date of 26 March - ok, I'll wait... just to receive update today saying delivery date has changed to 23 April :-( Bottom line is, that two biggest electronic parts suppliers in the world couldn't keep up with the demand, were totally not prepared for this (even though they were warned that this will happen) and they 'ruined' the launch in their own way. One lesson learned - if you expect that much traffic to one page, please provide direct link to it. 100k people trying to use your internal search engine to find exactly one URL is proven to be a suicude. * Raspberry Pi home page - http://www.raspberrypi.org/ Tomasz