Sunday, April 20, 2014

ETOPS range on MH 370 flight

 The single-engine speeds for the aircraft listed in the menu came fromthe following sources:  
Boeing 777 (410 kts): Estimated based on Boeing 757 speed.
One knot is 1.852 kilometers per hour.  So 410 x 1.852 = 759.32 km/h. 
99% BAD HARDWARE WEEK:  Place where are the supposed remnants of flight MH370  is excluded ETOPS flight zone for MH 370. Pilots should know that. Or the remnants are NOT THERE at all.
Why out of ETOPS range is not obligatory to be alarmed by Inmarsat, without any legal possibility to avoid that ?

One engine failure and  Boeing 777 can no fly faster than 760 km/h.
The 777 fleet has flown more than 2 million ETOPS flights since its debut in June 1995. Fifty-three 777 operators fly more than 22,000 ETOPS flights per month in 2012. 

Debbie Heathers

Apple's SSL/TLS bug (22 Feb 2014)

Lastly, there was a lot of discussion yesterday that Apple missed checking the hostname in the certificate. It's true that curl on the OS X command line oddly accepts HTTPS connections to IP addresses when the IP address isn't in the certificate, but I can't find that there's anything more than that and Safari doesn't have that problem.
The researchers who discovered Heartbleed said the bug could exist inside hundreds of millions of websites, based on the market share of the open-source software that uses OpenSSL. The number is closer to 500,000, because only a fraction of sites had the vulnerable functionality turned on, according to Netcraft, a cyber-security firm.
 ADAM LANGLEY from Google is mysterious person who discovered Heartbleed bug effects in Apple's OSs after it was patched on February 21st. 

From the point of view of a browser, Langley has seen many HTTPS sites getting it dreadfully wrong and, from the point of view of a server, he’s part of what is probably the largest HTTPS serving system in the world.

Heartbleed exploit using Python script

The deepest threats to online security are the weaknesses in the fundamental  Internet protocols.
Now add these 3 lines of code (use the lib) and dump this file in the same folder to make it work behind a corporate proxy:
import socks

socks.setdefaultproxy(socks.PROXY_TYPE_HTTP, "proxy.server", 8080, True)
socket.socket = socks.socksocket
Quick and dirty batch script to dump Heartbleed memory leak at regular interval
The Heartbleed bug (CVE-2014-0160) can be used to attack clients as well as servers. Many organizations have hosts which initiate outbound SSL connections (pulling updates, fetching images, or pinging webhook URLs). These hosts are often on a separate infrastructure (with different SSL dependencies) within the organization firewall.
These hosts may be vulnerable to the reverse Heartbleed attack.

Use this tool to generate a URL for your host to make an outbound request to and check the generated results page to see whether you're vulnerable. We do not store anything about your clients on this server.
99% BAD HARDWARE WEEK: Apple patched Hearthbleed weakness in OS X and Maverics in February !
On unpatched systems, the bug affects the signature verification process in such a way that a server could send a valid certificate chain to the client and not have to sign the handshake at all, allowing an attacker with a privileged network position to capture or modify data in sessions that should otherwise be protected by TLS/SSL protocols.

Saturday, April 19, 2014

Heartbleed broke into vir(t)ual private network !

But this time Hearthbleed it used exploit on firmware that has to be replaced, not updated, and was used to break into a virtual private network (VPN), bypassing the network's multifactor authentication entirely. 
An unspecified attacker exploited the bug on an unnamed company's VPN concentrator, an appliance that provides secure remote connectivity to a private network such as one a company might use in its office. Washington D.C.-based security company Mandiant discovered the attack, which began on Apr. 8, just a day after the Heartbleed bug became public knowledge.
99% BAD HARDWARE WEEK: Just as BAD HARDWARE alarmed for Cisco network devices. But for Juniper and some others too ! WHat you can do about VPN 3000 Concentrator ? Nothing. Simply buy the latest model. If such exists at all now.
Here is some of Cisco VPN bad hardware 

  • Cisco RV325 VPN Router
  • Cisco RV320 VPN Router
  • Cisco RV180 VPN Router
  • Cisco RV082 VPN Router
  • Cisco RV042 VPN Router
  • Cisco RV016 VPN Router

  • Friday, April 18, 2014

    Who is anonymous Heartbleed informer ?

    The 2-year-old bug is thought to have affected nearly two-thirds of the Web. If attackers were aware of the bug, which is still unclear, they could have stolen a frightening number of users’ login information from sites ranging from social networks to financial institutions.
    Friday, March 21 or before - Neel Mehta of Google Security discovers Heartbleed vulnerability.
    Friday, March 21 10.23 -  Bodo Moeller and Adam Langley of Google commit a patch for the flaw (This is according to the timestamp on the patch file Google created and later sent to OpenSSL, which OpenSSL forwarded to Red Hat and others). The patch is then progressively applied to Google services/servers across the globe.
     99% BAD HARDWARE WEEK: Here are some new security kids on the block. 
    Snowden used TAILS.

    Thursday, April 17, 2014

    Internet sites by size

    99% BAD HARDWARE WEEK: There are only a few supernovas: Google, Facebook, Yahoo

    Wednesday, April 16, 2014

    Internet of NSA things: Open SSL is not the only case

    Polar SSL still uses weakened Intel's random generator.
    99% BAD HARDWARE WEEK: And it is used in some 25 system files.
    CTR_DRBG based on AES-256 (NIST SP 800-90). As you know Polar SSL is intended for embeded and IoT connected things !, with the minimum complete TLS stack requiring under 60KB of program space and under 64KB of RAM

    LATEST: Heartbleed exploits have begun Even 19 years old could do it, why not NSA ?
    Luckily latest impact report from National Cyber Awareness System finds that thanks gods, clay tablets are not impacted at all !

    CVSS Severity (version 2.0):  CVSS v2 Base Score: 5.0 (MEDIUM) (AV:N/AC:L/AU:N/C:P/I:N/A:N) (legend)
    Impact Subscore: 2.9
    Exploitability Subscore: 10.0
    CVSS Version 2 Metrics:
    Access Vector: Network exploitable
    Access Complexity (Required attack complexity): Low
    Authentication: Not required to exploit
    Impact Type: Allows unauthorized disclosure of information


    Open SSL spring cleaning

    Changes so far to OpenSSL 1.0.1g since the 11th include:
    • Splitting up libcrypto and libssl build directories
    • Fixing a use-after-free bug
    • Removal of ancient MacOS, Netware, OS/2, VMS and Windows build junk
    • Removal of “bugs” directory, benchmarks, INSTALL files, and shared library goo for lame platforms
    • Removal of most (all?) backend engines, some of which didn’t even have appropriate licensing
    • Ripping out some windows-specific cruft
    • Removal of various wrappers for things like sockets, snprintf, opendir, etc. to actually expose real return values
    • KNF of most C files
    • Removal of weak entropy additions
    • Removal of all heartbeat functionality which resulted in Heartbleed SINCE MARCH 2012
    99% BAD HARDWARE WEEK: No problem if you change your Open SSL passwords now. All remained stored in OUR servers. Hehehe. What about added entropy and opened passwords at open SSL ? Well, nice confidence catch.
     Here is a brief history of Intel's randomness.

     The EFF SSL Observatory is a project to investigate the certificates used to secure all of the sites encrypted with HTTPS on the Web.

    Friday, April 11, 2014

    Facebook's Heartbleed security hole affected Cisco Mobile Experiences

      Cisco Connected Mobile Experiences

    Connected Mobile Experiences (CMX) is a Wi-Fi platform that can help organizations deliver customized, location-based mobile services to end users. The CMX license on the Cisco MSE includes:
    Here is complete list for all companies and services.
    99% BAD HARDWARE WEEK: That is why Facebook was informed before anyone else ! WHo might be behind ? Let me guess. Open SSL with Heartbleed security hole was applied at Cisco without any control ?? YES, NSA used it !
    Currently, the NSA has a trove of thousands of such vulnerabilities that can be used to breach some of the world’s most sensitive computers, according to a person briefed on the matter.  
    See below Yahoo login and password, easily extracted though being heavily SSL encrypted !


    Thursday, April 10, 2014

    Hot entertainment: Boeing 747 catched fire (again)

    Staff on the flight to Heathrow from Dallas/Fort Worth with 274 passengers on board smelt an “acrid, electrical burning smell” about two hours from London

    Last year frightened passengers on board a British Airways flight told how they heard their pilot making a Mayday distress call 36,000ft above the Atlantic on November 14
    The captain radioed for help when smoke filled the cockpit of the Boeing 777 plane carrying 220 passengers - and accidentally turned on the public address system. 
    After putting on oxygen masks the crew immediately contacted air traffic control. They switched on the cabin address system, and the start of their Mayday call was heard by passengers.
    Passengers were told there had been an electrical fault. It is believed the smoke was caused by a fan in the cockpit which overheated.
    99% BAD HARDWARE WEEK: Fire after two hours ! Malaysian airlines could catch it in 20 minutes. Imagine driving airplane with only one working engine trying to return home
    in complete darkness, and you are in MH 370. What if closed engine had on power generator ? Then even your radio will not funtion.

    US Exaflops supercomputer in year 2023

    99% BAD HARDWARE WEEK: Probably immersed in cooling fluid. It will draw no less than 20 MW of power. Applications will run only in 2024.

    This page is powered by Blogger. Isn't yours?