For a cool R32mil (approx $4.5millon), what a bargain. I give them 6 months before they all start wearing suits and start using terms like "governance maturity model" ;)
But seriously, congratulations to the SensePost team. They have done spectacularly well in a short time and with a small team (this works out to over a million or two per employee I think).
A few weeks ago a post on our internal list pointed me at a tool called Evolution put together buy some company named Paterva. I've been playing with it quite a bit, and have even used it to demo some stuff to germalists.
Then today I say that there will be a 27dinner in Pretoria tomorrow. To my surprise Roelof Temmingh (previously of Sensepost) will be speaking, and what's more he is the founder of Paterva and one of the authors of Evolution!
I have high hopes this may be one of the best 27dinners yet (no offense to the marketing types) and if you will be in the Pta region tomorrow, come check it out.
If you won't be in the Pta region, then go check out Evolution anyway. The second beta of the standalone GUI was released last week and I am about to start playing with it. If it's anything like the last one, the web version is more functional (unless you decompile the java classes and modify the static search terms, but I would *never* do that), but the GUI gives you a good idea of it's functionality. A company and a tool to keep your eye on.
(P.S. Is it just me, or is South Africa rocking the information security party?)
Continue reading "Security and the Media"
All sorts of hype has been made about the big talks at Blackhat, but for those of us that weren't there, check out the side-channell coolness from the SensePost guys (straight out of SA). They have released a tool called Squeeza which provides a nice functional shell-like overlay for your SQL injections. Additionally, the demo'ed some very cool DXSRT which takes the JavaScript 'logged on' timing attacks to a new level.
However, what I thought was awesome were the side channel data leaks via DNS. Basically, by getting a machine behind a firewall to do a DNS lookup to <encoded data>.attackersdomain.com you can leak data out from behind a firewall. Simple and very cool.
While I'm at it, check out their blog, it's shaping up to be a great regular read.
Continue reading "Side Channel Coolness"
Continue reading "Secunia releases Security Patch tool for Windows Applications"
I've had several discussions of late where people have wrestled with the problem of how best to secure their applications to a reasonable level of security, given that applications are increasingly integrated. Here's my take.
Continue reading "How do you measure the criticality of an interconnected system?"
Continue reading "Security as a positive architectural investment"
Continue reading "ACSA puts on bigger pants"
Browsers and JavaScript use something called the 'same origin policy' to sandbox which elements are accessible to which sites. This prevents JavaScript on one site from accessing JavaScript from another. This is done by combining three elements into a unique key:
- Protocol (e.g. http)
- Domain (e.g. singe.za.net)
- Port (e.g. 80)
Some more detail on this is available here. Anyone familiar with AJAX hacking would be quite familiar with this, but for those who aren't, imagine if JS in one of your tabs could mess with the JS in another. Porn sites would take the opportunity to redirect all of your tabs to something obscene, and AJAX keyloggers could be attached to your internet banking window.
Continue reading "Bypassing SoP"
This is an interesting finding from Finjan. This could demonstrate how interrelated security and privacy really are. Especially, since browser vulnerabilities can lead to a host of juicy information about a user.
However, I suspect there is more to this than an advertiser's need to make the world an ugly place. Without the privacy twist, this isn't really a surprise. Ad servers are prime malware targets because of their penetration across the web. Infecting one server allows someone to punt their malware to hundreds of thousands of sites.
The implication of this is that ad server's are getting hacked left right and centre. If this is true, then blocking advertising moves from being a convenience to a security feature.
Continue reading "27 Dinner v1.3"