It’s about time to call the end on the last poll with 70 votes gathered so far and draw the conclusion:

The most useful skills in a pentester's arsenal?

  • Out of the box, unconventional thinking (hacker mindset) (22%, 24 Votes)
  • Constant curiosity (also hacker mindset) (19%, 21 Votes)
  • Social engineering (15%, 16 Votes)
  • Programming and scripting (13%, 14 Votes)
  • Exploit development (8%, 9 Votes)
  • Vulnerability discovery and Fuzzing (7%, 8 Votes)
  • Tool knowledge (6%, 7 Votes)
  • Domain specific knowledge (like Networking, Operating Systems or Scada apps) (6%, 7 Votes)
  • Forensics (2%, 2 Votes)

Total Voters: 70

Loading ... Loading ...

As it turns out, the 3 leading ones are soft skills, the ones that can’t really be learned and have much to do with personality and character. I assume this is only natural, there’s no point in having or going for the hard skills(the ones that can be learned) if there’s no motivation or direction underneath to put things in motion and more important, to keep them in motion.

 

 

Tagged with:
 

It’s about time to call the end on the current poll with 412 votes, Which OS do you currently use the most? , and draw the results:

The best pentesting distribution is?

  • Backtrack (62%, 252 Votes)
  • Other (18%, 74 Votes)
  • nUbuntu (9%, 36 Votes)
  • Network Security Toolkit (2%, 9 Votes)
  • General Knoppix (2%, 8 Votes)
  • Pentoo (2%, 7 Votes)
  • Samurai (2%, 7 Votes)
  • Helix (1%, 4 Votes)
  • STD (1%, 4 Votes)
  • INSERT (1%, 3 Votes)
  • Operator (1%, 3 Votes)

Total Voters: 412

Loading ... Loading ...

The new poll is:

The most useful skills in a pentester's arsenal?

  • Out of the box, unconventional thinking (hacker mindset) (22%, 24 Votes)
  • Constant curiosity (also hacker mindset) (19%, 21 Votes)
  • Social engineering (15%, 16 Votes)
  • Programming and scripting (13%, 14 Votes)
  • Exploit development (8%, 9 Votes)
  • Vulnerability discovery and Fuzzing (7%, 8 Votes)
  • Tool knowledge (6%, 7 Votes)
  • Domain specific knowledge (like Networking, Operating Systems or Scada apps) (6%, 7 Votes)
  • Forensics (2%, 2 Votes)

Total Voters: 70

Loading ... Loading ...

This new poll is multi-choice, with a maximum of 3 selections allowed. So go ahead, and pick the three most useful skills you think a pentester should posses.

I’ve been running this poll in the sidebar for several months now, Which OS do you currently use the most? and now it’s time to close it and draw the results:

Which OS do you currently use the most?

  • Windows (51%, 57 Votes)
  • Linux (39%, 43 Votes)
  • BSD (5%, 6 Votes)
  • Mac (5%, 5 Votes)

Total Voters: 111

Loading ... Loading ...

The new poll:

The best pentesting distribution is?

  • Backtrack (62%, 252 Votes)
  • Other (18%, 74 Votes)
  • nUbuntu (9%, 36 Votes)
  • Network Security Toolkit (2%, 9 Votes)
  • General Knoppix (2%, 8 Votes)
  • Pentoo (2%, 7 Votes)
  • Samurai (2%, 7 Votes)
  • Helix (1%, 4 Votes)
  • STD (1%, 4 Votes)
  • INSERT (1%, 3 Votes)
  • Operator (1%, 3 Votes)

Total Voters: 412

Loading ... Loading ...

I only included distributions that are currently at least available for download, since many of them have been discontinued and distros like PHLAK or Auditor don’t even have a homepage anymore.

Tagged with:
 

According to an e-mail from Theo de Raadt(founder and current leader of the OpenBSD project) to the openbsd-tech mailing list, the IPSEC stack could have been backdoored by some open source developers(on the FBI payroll) taking part in the project in its early days. The supposition comes out of an e-mail he received from an old friend or so. Here goes the original e-mail:

List: openbsd-tech

Subject: Allegations regarding OpenBSD IPSEC

From: Theo de Raadt <deraadt () cvs ! openbsd ! org>

Date: 2010-12-14 22:24:39

Message-ID: 201012142224.oBEMOdWM031222 () cvs ! openbsd ! org

I have received a mail regarding the early development of the OpenBSD
IPSEC stack.  It is alleged that some ex-developers (and the company
they worked for) accepted US government money to put backdoors into
our network stack, in particular the IPSEC stack.  Around 2000-2001.

Since we had the first IPSEC stack available for free, large parts of
the code are now found in many other projects/products.  Over 10
years, the IPSEC code has gone through many changes and fixes, so it
is unclear what the true impact of these allegations are.

The mail came in privately from a person I have not talked to for
nearly 10 years.  I refuse to become part of such a conspiracy, and
will not be talking to Gregory Perry about this.  Therefore I am
making it public so that
    (a) those who use the code can audit it for these problems,
    (b) those that are angry at the story can take other actions,
    (c) if it is not true, those who are being accused can defend
        themselves.

Of course I don't like it when my private mail is forwarded.  However
the "little ethic" of a private mail being forwarded is much smaller
than the "big ethic" of government paying companies to pay open source
developers (a member of a community-of-friends) to insert
privacy-invading holes in software.

----

From: Gregory Perry <Gregory.Perry@GoVirtual.tv>
To: "deraadt@openbsd.org" <deraadt@openbsd.org>
Subject: OpenBSD Crypto Framework
Thread-Topic: OpenBSD Crypto Framework
Thread-Index: AcuZjuF6cT4gcSmqQv+Fo3/+2m80eg==
Date: Sat, 11 Dec 2010 23:55:25 +0000
Message-ID: <8D3222F9EB68474DA381831A120B1023019AC034@mbx021-e2-nj-5.
exch021.domain.local>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Status: RO

Hello Theo,

Long time no talk.  If you will recall, a while back I was the CTO at
NETSEC and arranged funding and donations for the OpenBSD Crypto
Framework.  At that same time I also did some consulting for the FBI,
for their GSA Technical Support Center, which was a cryptologic
reverse engineering project aimed at backdooring and implementing key
escrow mechanisms for smart card and other hardware-based computing
technologies.

My NDA with the FBI has recently expired, and I wanted to make you
aware of the fact that the FBI implemented a number of backdoors and
side channel key leaking mechanisms into the OCF, for the express
purpose of monitoring the site to site VPN encryption system
implemented by EOUSA, the parent organization to the FBI.  Jason
Wright and several other developers were responsible for those
backdoors, and you would be well advised to review any and all code
commits by Wright as well as the other developers he worked with
originating from NETSEC.

This is also probably the reason why you lost your DARPA funding, they
more than likely caught wind of the fact that those backdoors were
present and didn't want to create any derivative products based upon
the same.

This is also why several inside FBI folks have been recently
advocating the use of OpenBSD for VPN and firewalling implementations
in virtualized environments, for example Scott Lowe is a well
respected author in virtualization circles who also happens top be on
the FBI payroll, and who has also recently published several tutorials
for the use of OpenBSD VMs in enterprise VMware vSphere deployments.

Merry Christmas...

Gregory Perry
Chief Executive Officer
GoVirtual Education

"VMware Training Products & Services"

540-645-6955 x111 (local)
866-354-7369 x111 (toll free)
540-931-9099 (mobile)
877-648-0555 (fax)

https://www.facebook.com/GregoryVPerry
https://www.facebook.com/GoVirtual

(archived e-mail at marc.info)

 

If this turns out to be true then…that’s really insane.

Tagged with:
 

ProFTPD pwned and backdoored

On 29 Novemeber the server at ftp.proftpd.org which is hosting the official ProFTPD download packages and source for all other mirrors was compromised and a backdoor has been planted into the source. This seems to be the case only for the 1.3.3c version of ProFTPD.

Original quote from protfpd.org:

ftp.proftpd.org compromised

[01/Dec/2010]The ProFTPD Project team is sorry to announce that the Project’s main FTP server, as well as all of the mirror servers, have carried compromised versions of the ProFTPD 1.3.3c source code, from the November 28 2010 to December 2 2010. All users who run versions of ProFTPD which have been downloaded and compiled in this time window are strongly advised to check their systems for security compromises and install unmodified versions of ProFTPD.

To verify the integrity of your source files, use the PGP signatures which can be found here as well as on the FTP servers.

The source code in CVS was not affected.

Thus, if you grabbed 1.3.3c lately and set it up on your system you’d better act upon it. More info on the subject and pointers on what too look for can be find here.

Tagged with:
 

“Searching the Internet to create relevant word lists.”

That is the moto of the website, it already says a lot, but i’ll give a quick description in case you might need more:

AWLG allows you to build a wordlist, for your various password cracking needs and not only, formed out of words found in relation with specific keywords of your choice that are searched for on the web using search engines(i don’t know which one(s), i suspect google only though :)). You can add exclusion keywords also to narrow down your search in case you know of such bloat keywords that might interfere with the effective search of your target keywords. A number of additional options for further narrowing of the results are offered also, like , leetspeak or capitalization. Read more on the about page or roll your eyes over the example use cases.

www.awlg.org

Tagged with:
 

Albert Gonzalez at the 2001 DefCon hackers' convention in Las Vegas

Twenty years at least for now, because there’s a second conviction on a second trial to be made on which he could get up to 25 years. The court has agreed to serving his sentences concurrently, though, which means if he gets more then 20 year in the second case then he will serve that one if not he will serve the first one, sort of to speak.

Read more here.

Tagged with: