The BBC Honeypot with WinXp

The BBC thought it would create a Windows XP Honeypot to see what would happen.
36 warnings that pop-up via Windows Messenger
11 separate visits by Blaster worm
3 separate attacks by Slammer worm
1 attack aimed at Microsoft IIS Server
2-3 “port scans” seeking weak spots in Windows software

Not surprising really, I’ve heard of other stories whereby someone has installed a plain vanilla box without a firewall onto the internet and was it was owned within 20 minutes. Even if that story was not true it would most likely be owned within a few hours or at least on the same day.

Full details of story here at the BBC website.

Web 2.0 is great right?

Web 2.0 best described by the guys that coined it, O’Reilly and “What Is Web 2.0
Design Patterns and Business Models for the Next Generation of Software”
website should provide you with some insight into what exactly it is.

However as with everything these days, the more cooler stuff you add, the more vulnerable it is. Which is highlighted in this article over at Help Net-Security “Top 10 Web 2.0 Attack Vectors“.

So when the powers to be come running into your office with we need to have this Web 2.0 stuff because everyone else has it! Remember the attack vectors associated with it and ensure you provide a risk assessment and if possible business case to either justify it’s usefulness vs security risk… in plain English do we really need this stuff?

No doubt in just about all cases there are going to be some components of Web 2.0 that will benefit the organisation. You probably really do need some of them and/or have no choice in the matter and you may already be using some of them.

Just don’t forget to apply the security principles to Web 2.0 that you are using on your network.

Yes I’m using Web 2.0 here by blogging 🙂 for searching code

Google now has a new search tool

I’m sure this may be of use to some coders and I’m also sure it’s of even greater use for the bad guys!! Many Security experts are warning about the ease of obtaining code and other information.

A great book by Johnny Long “Google Hacking for Penetration Testers” highlights the current dangers of Google. I think he might be adding a new chapter for the next edition!

How to Expand a VM Disk with VMWare

How to Expand a VM Disk and merge it into the existing partition.

If you have created a VM with VMWare Workstation/Server and have since discovered you need more disk space within the VM, use the vmware-viskmanager command utility together with a partition tool, here is how I do it!!

Use the vmware-vdiskmanager command line tool to expand the current VMware disk file. Your virtual disk file may look something like this “ws2003.vmdk”. Let’s say that the current disk size is 8GB and you want to make it 15GB, run the following command:
“vmware-vidiskmanager.exe -x 15GB ws2003.vmdk”
See the syntax switches from the Administration Manual or issue vmware-vdiskmanager.exe /? for more.

Once you have expanded the disk file you will need to use a disk partition tool to merge the partitions or if you are happy with a second partition simply use the Disk Manager tool from the Administration Tools in Windows XP or Windows 2000/2003.

To Merge the parition I recommend BootIT from Terrabyte – see for more details.

With VMWare you may be unable to see the screen once booting into BootIT, this problem can occur when the video adapter chipset is not supported.

To work around this issue:

  • First try reversing the VESA Video option when you create the installation diskette (that is, if you had it enabled before, try leaving it disabled, or vice versa).
  • If it still does not work, try doing the same with the Standard VGA option.
  • You may need to upgrade your system BIOS and/or graphics card firmware.

Network Security Toolkit (NST v1.4.0)

Network Security Toolkit (NST v1.4.0)

This release is based on Fedora Core 4 using the Linux Kernel: 2.6.15-1.1831_FC4 or 2.6.15-1.1831_FC4smp. Many new NST WUI features and capabilities have been included with this distribution:

* Time Management – NTP, hardware clock and system clock management.
* Network Packet Capture – An enhanced NST WUI web-based front-end to the tethereal network protocol anaylzer.
* Network Packet Capture Manager – Provides a means to manage network packet capture files on a NST probe.
* An enhanced NST WUI web-based file system mounting page.
* PDF rendering for most output including network packet capture decoding.
* Enhanced directory and file viewing pages with auto refresh.
* Introduced browser session saving for many NST WUI pages.
* Add a simpilfied front-end to the NST WUI for beginner users.
* Network Monitoring – integrated the Nagios networking tool into the NST WUI.
* Better navigation and flow when using the NST WUI pages.

Most networking and security applications have been updated to their latest version.

Download it from their Website and sourceforge

Applying the Principle of LUA on Windows XP

Microsoft have released a white paper on “Applying the Principle of Least Privilege to User Accounts on Windows XP” which I assisted in reviewing.

Running Windows or any OS for that matter with only the level of access required is a Defense in Depth strategy, which means taking a layered approach. However it’s not easy as an IT Administrator or Developer to run in LUA mode and get your job or tasks done, this paper will assist in running Windows in a LUA mode.

In addition and as mentioned before, I highly recommend Aaron Margosis excellent Blog on running with LUA, if you can’t find a solution to something regarding LUA the answer or reason will be over at Aaron’s Blog.

View the Whitepaper or download a Word version now!!

More patching & ISO Image from MS

More patching from the usual Microsoft monthly patch updates. All are critical, so get patching again!! Details of the January Bulletin also incorporate the WMF update, more info here.

Microsoft has also made available an ISO image of this months updates for Windows Update only, which means the office, Exchange and other updates are not included. Still, this is a handy download and I’ve found it useful already. Details and download from here.

You are running with LUA (Non-Admin).. right?

In my previous post about “More on the WMF vulnerability” and what can you do, I assumed everyone is running with a LUA (Least-Privileged User Account) aka an account without Admin rights, member of the user group only or domain users only.

I should have stated as Point 1. Run with a LUA account!!

So just in case you are still running an admin account to do your email and surf the web, now might be a very good time to change this BAD habit!!

For more info see Aaron Margosis excellent Blog… it’s the best resource around on running LUA with Windows.