Another Word For It Patrick Durusau on Topic Maps and Semantic Diversity

March 31, 2019

Ghidra quickstart & tutorial: Solving a simple crackme

Filed under: Cybersecurity,Hacking — Patrick Durusau @ 6:52 pm

Ghidra quickstart & tutorial: Solving a simple crackme

In this introduction to Ghidra we will solve a simple crackme – without reading any assembly!

The first of several Ghidra tutorials by Ghidra Ninja. Be sure to follow on Twitter!

March 30, 2019

ARM Assembly Basics

Filed under: ARM,Assembly,Cybersecurity,Hacking,Security — Patrick Durusau @ 8:51 pm

ARM Assembly Basics by Azeria.

Why ARM?:

This tutorial is generally for people who want to learn the basics of ARM assembly. Especially for those of you who are interested in exploit writing on the ARM platform. You might have already noticed that ARM processors are everywhere around you. When I look around me, I can count far more devices that feature an ARM processor in my house than Intel processors. This includes phones, routers, and not to forget the IoT devices that seem to explode in sales these days. That said, the ARM processor has become one of the most widespread CPU cores in the world. Which brings us to the fact that like PCs, IoT devices are susceptible to improper input validation abuse such as buffer overflows. Given the widespread usage of ARM based devices and the potential for misuse, attacks on these devices have become much more common.
Yet, we have more experts specialized in x86 security research than we have for ARM, although ARM assembly language is perhaps the easiest assembly language in widespread use. So, why aren’t more people focusing on ARM? Perhaps because there are more learning resources out there covering exploitation on Intel than there are for ARM. Just think about the great tutorials on Intel x86 Exploit writing by Fuzzy Security or the Corelan Team – Guidelines like these help people interested in this specific area to get practical knowledge and the inspiration to learn beyond what is covered in those tutorials. If you are interested in x86 exploit writing, the Corelan and Fuzzysec tutorials are your perfect starting point. In this tutorial series here, we will focus on assembly basics and exploit writing on ARM.

Written in the best tradition of sharing technical knowledge and skill, this is your ticket to over 100 billion ARM powered devices. Not all of them of interest and/or vulnerable, but out of 100 billion (higher now) you will be kept busy.

Enjoy!

March 29, 2019

Pentagon Adopts Hostile Adoption Strategy

Filed under: Cybersecurity,FBI,Government,Hacking,Security — Patrick Durusau @ 10:44 am

Pentagon’s Multibillion-Dollar DEOS Contract is Guaranteed for Microsoft

High-five traffic saturated networks between groups of North Korean, Chinese and Russian hackers when they read:

In the coming weeks, the Pentagon—through its partner, the General Services Administration—will bid out a cloud-based contract for enterprisewide email, calendar and other collaboration tools potentially worth as much as $8 billion over the next decade.


Yet former defense officials, contracting analysts and industry experts tell Nextgov the Defense Enterprise Office Solutions contract is one that tech giant Microsoft—with its Office 365 Suite—simply cannot lose.

Yes, the Pentagon, through a variety of bidders, all of who offer Microsoft based solutions, is adopting a hostile adoption strategy, described as:

According to Defense Department spokeswoman Elissa Smith, the intent is for DEOS to replace all the disparate, duplicative collaboration tools Defense Department agencies use around the world. Components, including the Army, Navy and Air Force, “will be required” to use the same cloud-based business tools.

“It is expected that DEOS will be designated as an enterprise solution for DOD-wide adoption and organizations,” Smith told Nextgov. “Components that have already implemented different solutions with similar functionality will be required to migrate to DEOS.”

You may remember how successful the FBI Virtual Case File project was, $170 million in the toilet, where local FBI offices were to be “forced” to migrate to a new system. Complete and utter failure.

Undeterred by previous government IT failures, the Pentagon is upping the stakes 47 X the losses in the FBI Virtual Case File project and, even more importantly, risking national security on hostile adoption of an unwanted product.

If that weren’t bad enough, the Office 365 Suite offers a security single point of failure (SPOF). Once the system is breached for one instance, it has been breached for all. Hackers can now abandon their work on other systems and concentrate on Microsoft alone. (A thanks on their behalf to the Pentagon.)

Hackers are unlikely to take up my suggestion because an eight year slog to complete failure leaves non-Microsoft systems in operation during and past the project’s failure date. Not to mention that a hostile transition to an unwanted system is likely to leave openings for exploitation. Happy hunting!

March 28, 2019

Terrorist Usage of Twitter and Social Media (AKA Advertising)

Filed under: Advertising,Censorship,Social Media,Terrorism — Patrick Durusau @ 8:29 pm

Primer: Terrorist Usage of Twitter and Social Media

I mention this as an example of a catchy title for what is otherwise an “advertising on social media” post. Consider this re-write of the lead paragraph:

In recent years the Internet and social media has rapidly grown and become a part of everyday life for many people.  For example, YouTube alone has nearly two billion active users each month, has one billion hours of content watched every day, and over 300 hours of new video uploaded every minute (Aslam, 2019).  Other social media platforms also generate huge amounts of users and views.  The wide reach of these and other platforms has given many people and groups the opportunity to be heard when they otherwise would not have a voice.  While in many cases this opportunity is celebrated for supporting free speech, advertisers can take advantage of this access to reach and entice people that would otherwise be outside their influence.  Advertisers are becoming increasingly aware of, and taking advantage of, the global access the Internet and social media gives them.  These advertisers are no longer limited to recruiting new buyers in their physical sphere of influence; they can entice and recruit new buyers from anywhere around the world.  Advertisers are also using the Internet to encourage and carry out sales (physical and cyber) around the world…

The bolded text replaces text in the original.

For all of the bleeting and whining about terrorists on social media, what is being discussed is advertising. Any decent introduction to advertising is more useful to terrorists and their opponents than all of the literature on terrorist use of social media.

Critics of terrorist advertising miss the validity of terrorist ads in the eyes of their target populations. Twenty to thirty year old males in most cultures know they lack of ability to make a difference. For their families and communities. Structural inequalities guarantee that lack of ability. Those have been the “facts” all their lives. Terrorists offer the chance to perhaps not make a difference, but to at least not grow bent and old under the weight of oppression.

Your counter ad? …. There’s the problem with countering terrorist advertising. The facts underlying those ads are well known and have no persuasive refutation. Change the underlying facts as experienced by terrorists and their families and terrorist ads will die of their own accord. Keep the underlying facts and …, well, you know how that turns out.


March 27, 2019

GHIDRA 9.0.1 has been posted

Filed under: Cybersecurity,NSA — Patrick Durusau @ 7:56 pm

GHIDRA 9.0.1 has been posted

That was quick! Version 9.0.1 of GHIDRA is available for downloading. Release notes.

March 7, 2019

Nearest Neighbor/Fire Hydrant?

Filed under: Dataset,Insurance — Patrick Durusau @ 5:37 pm

HazardHub’s HydrantHub Passes 10 Million Fire Hydrant Locations Nationwide

From the post:

Distance to a fire hydrant is one of the most critical components to properly priced homeowners and property insurance. Yet – too often – hydrant data is simply missing from existing fire protection algorithms. HydrantHub’s aim is to break that data blockage by collecting and standardizing hydrant data, then making that data available to consumers, insurers, inspectors, and municipalities across the country. Not only can HydrantHub tell you the closest hydrant, it can also tell you the number within perimeter 1,000-foot radius of a location, giving insurers unique insight as to how well a community can provide critical water assets to a fire. The hydrant locations in HydrantHub cover over 80% of the US population with hydrants.

HydrantHub is available via HazardHub’s free “Where’s My Closest Hydrant” tool on http://www.hazardhub.com, as well as HazardHub’s powerful API.

Exploring the placement and number of fire hydrants by race and social class is one re-use of this data. Another re-use includes determining when different fires would place conflicting demands on fire hydrants.

Does every data set that admits to a benign use, have one or more non-benign uses? I suspect that to be the case. Counter-examples anyone?

Powered by WordPress