Infosec Weekly Radar, December 26 – January 1, 2012

Efficient Denial of service attacks on web application platform

Web applications technologies including PHP, ASP.NET,Java, ColdFusion, Perl,  Ruby, JavaScript and more are currently vulnerable to denial of service attack and in order to fix it you need to use a randomized hash function which CRuby 1.9 and Perl already do. As a workaround you can reduce POST size, for PHP reduce max_input_time while for IIS shutdown time limit for processes. You can have a full list of security requirements on the following document.

Brute forcing Wi-Fi Protected Setup

Most wireless network devices are vulnerable to a new type of attack , the tool used in this attack is called Reaver and it will start a brute force attack against Wi-Fi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases. Here you can find the tool and pdf file that describe way of work. To protect your access point it is important to disable the Wi-Fi Protected Setup (WPS).

The Hacker News Hacking Awards: Best of Year 2011

Here you can find the 15 top of the year according to hacker news, so you find DuQu as the malware of the year and Sony the top victim for 2011, just if you missed some news you can take a look at this post as it cover the most important online attack of 2011.

Identity Finder Releases Detailed Analysis of Personal Information ‘Anonymous’ Attack on Stratfor

Identity Finder have issued a report with information posted by hacking group Anonymous, the attack is very sirous as it posted very sensitive information.

Credit card fraud has already been well-documented in this incident, said Identity Finder’s CEO, Todd Feinman said. “This is the latest data leak by ‘breachers’ who not only hack into corporations but also breach their data privacy by posting the information online”

jQuery powered malware

AVG published a blog post about how to spread malwares on social networks websites, the attack demonstrated can be used by cyber criminals to infect as much as possible of users. The case is an API in twirtter but the same technique can be used at any other social network.

Notify of
Inline Feedbacks
View all comments