Site Review – Twitter
- At September 11, 2009
- By Josh More
- In Business Security
- 0
I think that everyone knows about Twitter by now. At first blush, one wouldn’t think that you could cram much information into just 140 characters… and one would probably be right. The signal to noise ratio on Twitter is exceptionally low.
However, despite it’s obvious flaws, people persist in using the site. Some use it keep in contact with friends. Some use it to communicate with business associates. Others just tie third-party systems into twitter and use it as a variant of an RSS feed.
However you use it, though, you should be aware of the security ramifications of the system. At it’s core, Twitter has two modes of operation. Everything you post is either fully public or protected (sorta private). So, the first question you have to ask yourself is whether you trust Twitter’s protection mechanism to keep your private data private. If you do, and you intend to broadcast private information, go ahead and use the protected mode. If, however, you wish to use the system for business, keeping it set to public makes the most sense. After all, you can’t promote a brand if you can’t be seen.
So, assuming that you are using Twitter publicly, you have to assume that anyone and everyone will be able to see your tweets. Thus, you should be careful with what you post. Keep in mind that, as with everything you put on the Internet, it will be there forever. Since you will change (like, both as a person and with regards to your company and career affiliation), your best bet is to just stay honest and polite. It’s pretty much inevitable that you will wind up looking stupid at some point, but you should probably be careful not to say anything that could come back to directly harm you.
So, the basic rules are the same as with most Internet sites.
- Be aware that everything you do is public.
- Try not to anything too unredemingly stupid.
Then you’re just left with the challenge of saying something useful in just 140 characters.
Small Business Defense – Network Exploration
- At September 10, 2009
- By Josh More
- In Business Security
- 0
Really, once they’re in, there is little you can do. If the attacker gets in too far, you’ll never know where the attacks are originating so unless you’re willing to build a completely new network with all new systems and applications, they’re there to stay.
One thing you can do is to segment your network ruthlessly. If sensitive traffic doesn’t traverse the weaker zones, an attacker will have a much harder time getting to the parts that matter. Another is to eliminate all the systems you can. A simpler network is easier to both maintain and to defend. If you know each and every system on the network and what it should be doing, it is easier to identify when odd things occur. You should also encrypt everything you can. Now, this isn’t a perfect solution, as in order to be useful the traffic has to be decryptable, but it does limit the number of targets that the attacker can find useful.
Lastly, you should familiarize yourself with the tools mentioned yesterday: Ettercap, DSniff and p0f. While it’s not about the tools, it is useful to understand what attackers can do. All three are available on the Backtrack LiveCD so you don’t even have to worry about installing them yourself (which can be tricky, depending on your OS).
Small Business Attack – Initial Exploitation
- At September 09, 2009
- By Josh More
- In Business Security
- 0
Thus far, I’ve talked about ways that attackers get in to your computers or network. I’ve not talked much about what they do once they’re there. Though there are a great many things that can happen once they get in, one of the first things done is to make sure that they can stay in. They may put backdoors into systems, set up secondary VPNs or modems or they may even sneak other systems onto your network.
Given that many networks aren’t fully mapped or even have tightly controlled access, there are many places on a network that a system can hide. One common trick is to walk into a business with a pre-programmed netbook or wall wart. This machine can then conduct passive network scanning and man in the middle attacks.
With tools like Ettercap, DSniff, p0f, an attacker can alter network traffic in transit while convincing both sides that things are fine. They can identify systems on the network while evading detection and check for important data crossing the network.
Yes, given time (a decreasing amount, sadly), they can do almost anything, but to start, they’ll explore the network and try to identify targets for future exploitation. The question is, what can you do about it?
Security Lessons from Nature – Elephants
- At September 08, 2009
- By Josh More
- In Natural History
- 0
As I write this, I am sitting in my living room watching Tomb Raider: The Cradle of Life. Which, when you think about it tells you several things. First of all, modern technology is pretty neat. Second, if you believe the movie, the technology of the ancient Romans was even cooler. Third, my taste in movies could stand some improvement. However, one thing is certain… the movie has elephants in it, even if only by reference. Since elephants are profoundly more interesting than firing guns and shattering glass, I think I’ll talk about them instead.
Elephants are big. Really big. They’ve also been around for a long long time. (Despite the fact that the Wikipedia entry on their evolution is the most pathetic I’ve ever seen.) They’ve lived this long by staking their survival on their size and the fact that they’re big enough and strong enough to handle anything that comes their way. This strategy, of course, has it’s own costs.
- They have to eat hundreds of pounds of food each day.
- It takes them almost two years to gestate their young, and even then, it’s only one at a time.
- Babies require a significant amount of care, monopolizing the attention of several adults.
- It takes a lot of time to move… or to stop.
In exchange for all of this, they get to be the biggest, baddest, floppy earsyest animal on the savanna. They get to rip up trees with their noses… which is useful when they need to smack lions around. And on top of all of this, they have two spears sticking out of their faces for when they are in a stabby mood (and those pesky lions just won’t take a hint).
And there in lies the problem. The ivory in the tusks and the fact that they make “good” trophies caused a hunting spree that dropped their population to 1,300,000 by 1981 and to around 50,000 today. Though they were well adapted for life before humans invented guns, they’re not faring so well now (along with many others, actually).
The business lesson here is, I suppose, to not take anything for granted. A business model could work perfectly well for years and then one small change can come along and reduce your profit to 1/26th of what it once was. It’s happened before.
Just as, over time, elephants can develop new strategies, so can we. If something isn’t working, or a strength becomes a weakness, it can be changed. Who knows, if they survive, maybe elephants will eventually evolve shootable tusks or bulletproof skin. Maybe I will learn that sequels to action movies are never good. Perhaps your business can change and adapt to new conditions.
The good news is that you’re not an elephant, and businesses can adapt faster than genomes can. You just have to keep your eyes open.
Mythic Monday – Stables of Augeas
- At September 07, 2009
- By Josh More
- In Mythology
- 0
Cleaning the stables of Augeas, for those that do not recall, was the fifth labor of Heracles. His task, as one of many to gain the forgiveness of the gods for accidentally killing his wife and children, was to remove all the dung that was produced by the immortal cattle of King Augeas’s. Unlike most of his other labors, this one was deemed to be impossible, not due to the inherent danger but for the shear amount of work. On the positive side, if Heracles did it, he would get one tenth of the cattle.
Heracles managed the task by thinking outside of the box. Instead of cleaning the stables in the traditional manner, he rerouted two rivers to wash it all out (and, presumably, causing a fish kill somewhere downstream).I n one day’s work, Heracles managed to make the stables more efficient and eliminate many of the legacy problems equated with an unclean stable – bacteria, fungus, pests, misplaced pitchforks. Then, King Augeas was perfectly positioned to make improvements and run his stable better than ever before. Of course, he doesn’t do this… preferring instead to try to steal from Heracles and got killed.
But our security lesson today isn’t about Augeas (though “don’t tick off demigods” isn’t a bad general rule). Instead it’s about cleaning things up. Just as various threats lurk in manure and compound over time, the same applies to source code. If you develop software, I’m sure that your developers have come to you at various times and suggested that the code base be wiped clean and they be allowed to start over. Odds are that you’ve said “no”. Odds are that you were right.
It usually doesn’t make sense to throw work away and start over. Doing so would give your competitors a time advantage and while you’re making the newest whizz-bangiest system out there, you’re losing marketshare. However, if you let the bad code pile up too deeply, the internal threats will grow and you may not be able to handle them. Then, like King Augeas, you may choose to ignore the problem and hope for a hero to come by. In the meantime, other systems will be getting whizz-bangier and you’ll be losing marketshare.
So where’s there to do?
You basically have two options. You can hire yourself a hero (consultant) to throw away what you have and start over, which could cost you one tenth of your profits, or you could just get better at cleaning your own stable in the conventional manner. When your developers come to you, you know that it is impossible to clean the entire stable (code base), but you could allow them to clean a few stalls (modules). By taking such an approach, you can prevent pests (vulnerabilities) from mounting up without needing to worry about losing your stable entirely or even one tenth of your cattle.
So, your stables may never be completely clean, but they might be able to be kept “clean enough” so that the vulnerabilities don’t mount up and cause you problems.
Review Review – ComputerWorld's Free AV Wrapup
- At September 04, 2009
- By Josh More
- In Business Security
- 0
This week, ComputerWorld released a review of free anti-malware systems. The conclusions were much as one would expect, mostly that the free stuff works OK but the pay stuff is probably better. The free systems are ranked here, if you are so inclined.
So, really, there’s nothing new here. However, I do want to point out a few things:
- Only one system has phone support, and that costs $50 per instance.
- Many of them fund themselves with advertisements.
- Heuristic detection was pretty poor across the board.
- None of them update very frequently.
- Most of these companies have a for-pay version available as well.
I know that most of us are always looking to cut costs, but the sheer number of times that I have removed expired or non-functional anti-malware systems indicates to me that this is very important. Do not scrimp when it comes to security software. The good stuff costs real money for a reason.
If there is a problem, a reliable company will take care of you. The goal of a business in this space should be to help you maximize your profits. Sure, they have to cover their costs and make a bit of profit themselves, but attitude is extremely important. If they approach the problem of “people don’t want to pay for anti-malware” with “let’s constantly distract the users with popup ads”, do you think that they have your interests at heart? If they charge as much for one support instance as it does to buy a license with unlimited support, do they really want to help you? (And, do you think that they have an incentive to have you not experience problems?) If they make no distinction between “I am unable to login to World of Warcraft” and “I am unable to make payroll”, do you really want to work with them?
I mean no disrespect to ComputerWorld here. I know that they serve both the consumer and business markets. I know that there is a place for free anti-malware systems in the consumer space (though I think it’s quite small). However, to answer the question “Can You Trust Free Antivirus Software?”, I’d have to answer unequivocally “no”. If you are in business, you should use a business-quality anti-malware suite. Even if you’re at home, if your business requires you to use your home system, it should also be protected by a business-class anti-malware suite.
Odds are that you know the cost of your time, and if you are unable to work because you get sick, you know what it’s worth to protect against that, that’s why we have health insurance (however it winds up being paid for in the U.S.). Similarly, if your computer gets sick, how will that impact you? Does your computer need health insurance too?
Small Business Defense – Steganography
- At September 03, 2009
- By Josh More
- In Business Security
- 0
First of all, I have to stress that this is a good news / bad news situation. The good news is that the vast majority of you have nothing to worry about from steganography. The bad news is that the reason steganography isn’t a threat is that you probably have a great many more holes that are easier for an attacker to exploit.
If an attacker can email out random files, that’s much simpler. If they can burn CDs or write to USB drives (remember that many MP3 players are also USB drives), they could do that. Some data could simply be printed out can carried off. Attackers could also transfer files away directly via many protocols such as HTTP, FTP and SCP.
So, realistically, you only have to worry about steganography if you’ve managed to close off all these other leak vectors. Most businesses haven’t, so the rest of this is probably not of much use to you. If you haven’t, start identifying valid outbound traffic and blocking everything else. That alone will likely take several months. Then come back and read the rest.
The easiest way to prevent steganography is to prevent the sharing out outbound files. This means blocking attachments in email, and severely limiting access to all other websites. This means no eBay, no Flickr, no Facebook. No external websites of any kind. Any site that allows users to post content should be off limit.
This leaves one major vector – public-facing web sites. Luckily, you have control over these, so you can directly manipulate the files. There are tools that can help you identify files that might contain hidden data. They work by mathematically analyzing the files and seeing if they are altered from a “normal” distribution. Another method would be to collect hash signatures for each file, and check for alteration. This does, however, require that you have absolute trust in the person creating the files and depends on the hash algorithms being secure. These days, that may not be such a safe bet.
So, as cool as this technology is, it’s important not to rely entirely upon it. There may be file types it cannot identify or new techniques to hide data. It may be better to configure the web server to only allow certain types of files (such as .jpg and .png files) and then attack the data source directly. Simply alter each image file and randomize the lower order bits. This way, it doesn’t matter if there was steganography in them or not. It’s removed before it goes online.
So, in conclusion, steganography is a real threat, but it is also more difficult to use than many other commonly existing holes in infrastructure. It’s not easy to deal with, and if you have other holes open, it’s probably not worth going after. However, if you can manage to deal with all the other threats, it’s worth considering.
Small Business Attack – Steganography
- At September 02, 2009
- By Josh More
- In Business Security
- 0
Steganography is talked about a lot in the security field, but not much outside of it. Though there are many forms of varying complexity, at it’s core all you need to know that steganography incolves hiding data inside of other data. It is commonly used with pictures, but it can be applied to pretty much any file. Any file that you may need to use in your business could be used as a conduit for other data.
Take, for example, this photo, which is on your website (maybe you sell bone adhesives, I don’t know):
Suppose that you had some top secret data that you wanted to hide (clearly highly confidential):
An attacker could use one of many tools to embed the highly confidential image within the safe one, and most people would be none the wiser. For example:
(For the technically inclined, I used stegotools and the last 2 bits to hide the image. Try it out if you like.)
It’s important to realize that this example is highly contrived. In the real world, attackers can use any file at all and any transport mechanism:
- Logos on a web site
- Press releases emailed out
- Financial documents on CD
If you have any confidential data at all, and any way to communicating with the public, the data can be leaked. How can you protect yourself?
(A thank you goes out to kordite and The Metro Library and Archive for making their images available on under the Creative Commons, and allowing me to make some really bad puns.)
Security Lessons from Nature – Prairie Dogs
- At September 01, 2009
- By Josh More
- In Natural History
- 0
It must have been quite the surprise as American settlers moved Westward and encountered their first prairie dog town. As they traveled, they would have seen first one strange little rodent, then another, then a few more, then maybe thousands. They would have observed that they live in a large subterranean community and work together to protect the colony. Lewis and Clark themselves observed that they could pour five barrels of water into a hole without filling it.
While this may seem somewhat cruel by modern standards, one has to note that it’s not like prairie dog colonies never encounter rain. In fact, that’s the point of today’s post. Prairie dogs work together to build a massive underground complex. They will raise their children below ground and forage for food above ground. Over the millions of years that they have been honing this system, they have learned to maximize their security infrastructure.
In the prairie dog’s world, there are many threats. For a subterranean colony, the threat of rain is pretty significant. If insufficiently reinforced, the tunnels could collapse and crush the little critters. If improperly designed, water could flow into the nursery areas and drown the pups. Simply being underground protects the prairie dogs against predators like hawks and coyotes. However, other predators like snakes and weasels have managed to adapt. To defend against incursions from predators such as these, the colonies have a very complex array of tunnels that only the prairie dogs know how to navigate. (Though this has proven less effective against some.) Prairie dogs supplement their security with a complex warning system of alarm calls where the sentries will stand on a high outlook and issue a shrill “eep” when danger approaches.
So, while all of this is useful if you happen to be one of many communal rodents, what does it mean for those of us who happen to work in the business world instead? The first thing to remember is that infrastructure planning is important. Consider building in excess capacity. Your network may be able to handle ordinary traffic, but could it handle the torrential downpour of traffic that would result from sudden Internet popularity? That said, it’s important to realize that not even prairie dogs built infinite capacity. They withstood the attempted denial of service attack by Lewis and Clark, but they wouldn’t have survived a distributed attack by thousands of Lewises and Clarkses (sorry). So, while capacity planning is important, it’s not everything… your infrastructure also has to be adaptable.
Instead, it would be wise to build a slight excess of capacity to handle the peaks of usage and then invest in some sentries. Just as prairie dogs monitor for specific dangers and issue alarms for birds of prey, snakes and canines (and, at the zoo, monorails), you could monitor your network for malware, DDOS attacks and internal intrusions.
I would, however, recommend that the alarms not involve standing atop your building and “eep”ing. Email or SNMP might make better sense.
Mythic Monday – Tricksters
- At August 31, 2009
- By Josh More
- In Mythology
- 0
Most cultures have a trickster figure of some sort. Though they go by many names: Coyote in North America, Anansee in Africa, Puck in Britian, Loki in the Germanic regions… and many others. In the stories, there is usually not much if any justification for the actions of the trickers… though their tricks usually fail in the end and they learn an valuable lesson along the way.
No matter what the story may be, the point often seems to be less the story itself and more about the learning. There are stories about ethics, significant social changes, developing new skills and personal growth. In almost every one, though, the lesson is learned by either the trickster character itself making a mistake or leading someone else into making a mistake. Then, inevitably, significant learning occurs.
In many ways, it’s all about attitude. Tricksters tend not to care much about others, being lead instead by their own desires and intuitions. They get an idea and run with it, ignoring all else, until their actions bring about their own downfall. In short, they are driven by curiosity, creativity and intelligence.
Tricksters break everything they touch, and sow discord everywhere they go, but they do make things happen. You probably know people like this in your own organization. They may be a bit narrowly-focused and their projects may have a significant number of… unintended consequences, but they manage to complete more projects in less time than anyone else.
Just as tricksters benefit a story, these personalities benefit an organization. In a developer, these traits create new products. In an administrator, they can produce significant efficiencies. In a security professional, they can protect an organization in ways never before though possible. Of course, they also cause a significant amount of chaos as they implement these changes without really thinking things through.
There are many organizations… especially in I.T… that have the occasional local trickster. Called “cowboys” or “lone wolves”, they are often thought of immature or unready for the business world. In many cases, this is right. It is extremely easy to look merely at the negatives, and as a result, these people are often the first on the firing lines.
However, just as security is all about balance, so is business. It is worth considering the long-term value of trickster-types. Maybe they won’t fit into the business over-time, and it’s best to let them go. However, maybe they can learn (possibly through a mythic journey of growth and pain). Maybe they can learn to temper their own erratic tendencies and put their creativity and curiosity towards the benefit of the business. Perhaps all they need is a bit of guidance. You’ll never know if you don’t try.
But remember, most cultures can only tolerate one or two tricksters. Fewer than that, and they would stagnate, but more than that and they would be destroyed by chaos.