Web Site is Alive Again

Our web server has temporarily succumbed to bit rot. Now it is migrated to a sparkling new virtual machine, DNS updated and everything seems to be ticking along as it should. Sorry for any inconvenience this might have caused.

(Really) Testing for SSL/TLS Re-negotiation

SSL/TLS Re-negotiation vulnerability (CVE-2009-3555) allows a man-in-the-middle to insert plain text in the beginning of an encrypted stream. It used to be possible to check if the server supports re-negotiation using OpenSSL s_client (see here). However, recent versions of OpenSSL disable insecure re-negotiation completely, so if you run s_client against a vulnerable target and request re-negotiation, it exits, same as if the target does not support re-negotiation:

Exploiting SQL Injection in ORDER BY on Oracle

Consider the following piece of code:

$sql = "SELECT something FROM some_table WHERE id=? ORDER BY $column_name";

The WHERE clause is parametrized, but the ORDER BY isn't. This happens often enough. Assuming that $column_name comes from user input, this code is vulnerable to SQL injection.

Building libvirt with ESXi driver

Libvirt is a toolkit to manage virtual infrastructures. It is supposed to support VMWare ESXi hypervisor, but the package in Ubuntu 10 repository is compiled without necessary drivers (as of time of writing). One can find libvirt compilation instructions here, but they are not Ubuntu-specific nor mention ESXi.

Why Investing in IT Security is Bad for Your Business: A Model

Consider a simple economic model. There are N companies that make doodahs. I am going to make two assumptions about the doodah market.

1. The market for doodahs is very competitive, so the profit margins are thin - a doodah maker that has a higher cost of production quickly goes out of business. This is not a very strong assumption - most modern markets are like this.

MagicTree FAQ and Build 1487

We have started a FAQ page for MagicTree. If you have a questions that should be added, please comment.

We have also posted MagicTree build 1487 for download. It contains various bug fixes, in particular in XML parsing, and minor UI improvements.


MagicTree vs. Dradis

Note: this post is unfinished - two videos are missing
Correction: Dradis can do reports in Word format

Several people have noted that MagicTree is similar to Dradis. In this post I will try to make a point by point comparison, outlining out both similarities and differences. Obviously, I have a bias - being MagicTree developer, I know MagicTree a lot better than Dradis. Feel free to correct me or point out the features that I have missed.


Video: Using MagicTree for Analysing Data

This video was going to be the first in a series of three. However I got stuck with the second one, so instead of waiting for the inspiration to hit me, I thought I'll publish this one anyway. Enjoy.

JNetBridge: Java Library to Send/Receive Network Packets

I am releasing jnetbridge, which will be responsible for receiving and sending network packets in Marvin 0.92 (the current version, 0.91, still uses jpcap). It is based on JNetPcap (JNI adapter to libpcap/winpcap + protocol analyzer in Java). JNetBridge is a small piece of code on top of the massive JNetPcap library.

To cut the long story short, below is a bunch of files you may want to have a look at, if you are Java developer trying to implement some sort of a network bridge or a router.

    Self-encrypting (FDE) Hard Disks & Linux

    Recently I have upgraded to Dell Latitude E6510 with 4 cores / 8 threads processor, plenty of RAM, and a fast hard disk. Nevertheless, the interactive performance of Ubuntu becomes sloppy beyond any measure when a virtual machine or two start trashing the disks.

    There seems to be known performance problems in Linux kernel, like Bug 12309. And full disk encryption makes things even worse. It appears that new FDE technology will give laptop users a chance to move the burden of encryption to hard drives.


    Subscribe to RSS - blogs