Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x

Vulnerabilities

A vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness, known as the attack surface. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Other vulnerabilities include security risks, security defects and constructs in programming languages that are difficult to use properly.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hello all,

What are the pros and cons for enabling mixed content?
If we enable that, Does that impact anything.
Are there any vulnerabilities?

Thanks
0
Put Machine Learning to Work--Protect Your Clients
Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

Hi,
I'm in the process of setting up SSO for users so we can control our internet access. We only want domain users to access internet and none domain users such (visitors) need to be blocked.

I have read a couple of articles but am still a little unsure which method to use, so here I am asking experts for guidance. I would also appreciate if someone can write step-by-step setup guide or an article that I can follow with some screen prints?

Please also point out any "gotcha"

This article says that "Event Log Monitor” has to be installed on all domain controllers, but later its talks about pushing out SSO client to machines which is also used for authentication, so am a bit confused if this is needed or not? Please clarify
http://www.skype4badmin.com/watchguard-sso-part-1/


and then this video also talks about "Exchange Monitor" for authentication.. do I need all of these options or will one suffice?
https://www.youtube.com/watch?v=qw8e85hXVcg

much appreciated!

Thanks
0
My colleague has managed to configure one of the PC as Super-Agent ie
other PCs could get the McaFee AV signature updates from it or

Q1:
is this a 'push' update ie from Super Agent, it pushes to the slave PCs
or it's a pull ie Slave PCs pull signature updates from it?

Q2:
How do we configure the slave PC portion (screen by screen will be good)?
0
I need to look at a website. It is not a pentest itself. Just a vulnerability scan. What tools could I use to generate a complete report?
I also need to generate a less technical report.
0
Need more best practices & governance on mobile codes (eg: Flash player,
Pdf reader, JavaScript, Java Applets, ActiveX) as we have a few cases of
malicious codes being run when opening Pdf & 1 case of ransomware:

a) attachmt 1 is a screen of IE setting: mostly what to set in IE to stop ActiveX
    & to set to  Med-High (guess this is also to mitigate against ActiveX ?)

b) I wud say patch the various Adobe products (we use Adobe Flash &
     Shockwave) within 1 week upon release of patches ?

c) attachmt 2 has some suggestions on ActiveX & Java only: not much

d) Does AV mitigate against mobile codes vulnerabilities?  If so, keep
    AV signatures updated   is another mitigation

e) I'm sure IPS (NIDS & HIPS) have signatures for mobile codes but in
    McAfee's case, by default, they are rolled out in Detect & not Block
    mode?  Should they be in Block mode?

f) any other best practices & governances for mobile code?
IEmedhigh_ActiveXctrls.jpg
SANS_malicious-mobile-code-security-.pdf
0
Hey Experts,

We are looking at Qualys as an external (for now) and internal (in the future) vulnerability scanner.  I have used Qualys in the past and have overall been pretty happy with the results.

In order to do some due diligence however, I wanted to take a look at their competitors just to see what else is out there.  Price is not a driving factor here.  I just want to make sure we get the best solution moving forward.

Has anyone used and can recommend any other vendors?

Thanks
0
Hello,

I am looking for a patch management solution that has the following features:

1. Works with Windows Operating systems
2. Works with Linux operating Systems (e.g. UBUNTU, CentOS)
3. Works with 3rd party applications (a good example would be JAVA)
4. Works in the cloud
5. Preferably Agentless
6. Can detect new nodes that are added (on the fly) to the network infrastructure and patch as necessary (according to patch management rules configured)

Any suggestions would be greatly appreciated
0
In Bluecoat proxy, there's about 38 categories that it blocks:
1.      Adult/Mature Content
2.      Chat (IM)/SMS
3.      Child Pornography
4.      Controlled Substances
5.      Dynamic DNS Host  
6.      Email
7.      Entertainment
8.      Extreme
9.      File Storage/Sharing    
10.      Gambling
11.      Games    
12.      Hacking    
13.      Internet Telephony    
14.      Malicious Outbound Data/Botnets
15.      Malicious Sources/Malnets
16.      Marijuana
17.      Media Sharing    
18.      Nudity
19.      Peer-to-Peer (P2P)
20.      Personal Sites
21.      Personals/Dating
22.      Phishing
23.      Piracy/Copyright Concerns
24.      Placeholders    
25.      Pornography
26.      Potentially Unwanted Software
27.      Proxy Avoidance    
28.      Remote Access Tools    
29.      Scam/Questionable/Illegal
30.      Sexual Expression  
31.      Social Networking    
32.      Software Downloads
33.      Spam
34.      Suspicious    
35.      Tobacco    
36.      Violence/Hate/Racism
37.      Weapons    
38.      Web Hosting


a) does Steganography come under any of the categories?
b) if not, can we request Bluecoat to add one or to park it under
     one of the above categories?
c) what's the industry practice to handle it?  Block it at email filtering
    device, Network IPS, proxy or ??   Googling around, shows "Traffic
    Warden" is used but if we don't want to invest in it, what can be done?
0
We have a P4515 that is showing the vulnerability below. I could not find anything related online. Any help would be great.

HP printer
Description      Integer based SQL injection vulnerability in enableAS parameter to /hp/device/this.LCDispatcher?nav=hp.AutoSend
Confirmed      Yes
Severity Level      Critical
Severity      user file read access
Tutorial      SQL injection
Service      443:TCP
Technical Details      Normal Request:
POST /hp/device/this.LCDispatcher?nav=hp.AutoSend HTTP/1.0
Host: 10.91.2.62
User-Agent: Mozilla/5.0
Content-length: 447
Content-Type: application/x-www-form-urlencoded
Connection: Keep-Alive
Cookie: MFPSESSIONID=010044D3A0E5EAC6706FBFCDE3B6884CAD189BF8917D1CD7FFA22017072703064703C1
bar=yes,location=
0
We have an Idrac that is vulnerable to this. Have any of you guys updated to the latest FW and resolve this?
0
When ransomware hits your clients, what do you do?
When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Hello All,

I need your help to fix CVE-2016-2183 vulnerability in my CentOS release 6.9 (Final) instance.
I have checked for the various solution to fix this like to make the changes in apache/ngnix configuration. But, i dont have apache/ngnix install in my instance.

The openssl version installed in my instance is OpenSSL 1.0.1e-fips 11 Feb 2013.
When I'm trying to update the openssl package using yum, it did not identify any new version of the package available for installation.

Regards
Rukender
0
Hello.
I need an advise of Kaspersky Security Center expert.

We have bought the SELECT licence so Kaspersky is unable to patch software vulnerabilities automatically. We need to do it manually. No problem. For example when I see Adobe Flash NPAPI/ActiveX vulnerabilities than I download the newest versions from official websites and deploy them to the computers containing vulnerabilities. Updates are successfully installed to the newest version BUT Kaspersky keeps saying that vulnerabilities for Adobe Flash NPAPI/ActiveX still exist there.

I do not think it is problem of Kaspersky software. Updates are often successful and solve vulnerability issues. But sometimes (it's usually problem of Adobe software) vulnerabilities persist. I would like to get rid of them but it's impossible even with the updated software.

Can someone explain me why?

I thought it could be problem of OS version (we use Win7 + 15PCs with WinXP) but after testing I found there is no difference.

So if you know the way how to update the software with removing vulnerabilities, please let me know.
0
I need to email bank account details for the transfer of a large sum of money from the U.K. to the U.S.
I would never provide the details in an open email.
But for the sake of accuracy and as a matter of record I was wondering if i sent a .pdf attachment with the details whether this would be
100% secure.
Alternatively there is the possibility of using the private messaging system of the organisation of which I am a client.

Can the experts give me their views please on the  relative merits of each option.
Thank you.
0
I have a web site the consistently get DDos attacks , I've changed several of hosting provider with no success.

Only one in Canada seems to block the DDoS attacks , but I'm looking for some hosting in the US. that can deal with it, and block it.

Any suggestions?
0
Hi

guys any review, expirence with this SIEM software http://www.gfi.com/ 

thank you
0
I have been trying for a few days to create a media restore point - one that won't be used on this system but I thought I should get it.  I have been getting a couple of errors (I wrote them down but I can only find the one piece of paper: Page_Fault_in_Non_Page_Area

I tried a few different USB drives but none of them worked.  I have ran a sfc / chkdsk on everything - even ran it when it rebooted and rebooted in safe mode.

I did a HiJackThis Analyzer - seems OK - ignore the hosts file, that's mine
Reource MonitorCPU Monitor
Windows 10 64G
0
Please could you explain for me how does a method
public void doItMulti()

Open in new window

works.
May be you could draw for me  some action UML or sequence or any other behavior UML. May be you could provide for this methods some useful and detail comments for each line of code. Thx for your help in advance !

package bfpasswrd;

import java.util.ArrayList;
import java.util.concurrent.ExecutorService;
import java.util.concurrent.Executors;
import java.util.concurrent.Future;

public class PasswordCracker
{

String passwordToCrack;
public boolean passwordFound;
int min;
int max;
StringBuilder crackedPassword;

public void prepare(String text)
{
    passwordToCrack = text;

    passwordFound = false;
    min = 32;
    max = 126;
    crackedPassword = new StringBuilder();
    crackedPassword.append((char) (min - 1));
}

public void result()
{
    System.out.println("Cracked Password is: " + crackedPassword.toString());
}

public void incrementString(StringBuilder text, int min, int max)
{
    text.setCharAt(0, (char) ((int) text.charAt(0) + 1));
    for (int i = 0; i < text.length(); i++)
    {
        if (text.charAt(i) > (char) max)
        {
            text.setCharAt(i, (char) min);
            if (text.length() == i + 1)
            {
                text.append((char) min);
            }
            else
            {
                text.setCharAt(i + 1, (char) ((int) text.charAt(i + 1) + 1));
            }
        }
    }
}

public void runMulti(String text)
{
    

Open in new window

0
Hi, i need to do a penetration test for a web application. I was wonder who would be the best company to ask to perform such a test?
Any recommendations?
I am based in Melbourne..
0
Hello Experts,

I was trying to find information about below rpcbind issue and how can I fix it so that, it wont happen again.
Below is the one of the vulnerability which was caught in scanning, reported by a team.


RPC
service name: portmapper
service protocal: udp
Portmapper found at: 3277x
service port: 3277x

Vulnerability ID: rpc-portmapper-0001
vulnerability title: Rpcbind Listening on a Non-Standard Port


 Vulnerability Description: 

 The rpcbind program converts RPC program numbers into universal addresses.
 When a client makes an RPC call to a given program number, it first connects to rpcbind on the target system to determine the address where the RPC request should be sent. Rpcbind has been detected listening on a non-standard port (above 32770) instead of the standard TCP / UDP port 111. 

 This configuration flaw has been confirmed on some operating systems such as Solaris 2.x. The exact high port number rpcbind listens on is dependent on the OS release and architecture. Thus, packet filtering devices that are configured to block access to rpcbind / portmapper, may be subverted by sending UDP requests to rpcbind listening above port 32770. This vulnerability may allow an unauthorized user to obtain remote RPC information from a remote system even if port 111 is being blocked.
  
Solution:
=======
 
Fix Solaris rpcbind filter evasion
Download and apply the patch from:  http://ftp.porcupine.org/pub/security/ 


 For Solaris, the newest version of 

Open in new window

0
Concerto Cloud for Software Providers & ISVs
LVL 4
Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

When trying to login to my wordpress site (http://www.elegantaffairca.com/wplogin) nothing happens and just goes back to the login page.

A brief of background, my site was hacked a few months back but I manage to take it back and installed some security plugins like ithemes security pro and Wordfence (free). Everything seems to fine until yesterday, I could not login anymore.

Any help would be appreciated. Thanks you.
0
In the past 6 months or so, my bankcard or ATM card has been compromised.  I do tend to eat out once or two a day and do use my card for these type of transactions; however, I believe that one or two places might be the culprit to my issues.  I go to a neighborhood gas station one a week because the gas prices are usually cheaper and lately, I've started purchasing merchandise online.  I did noticed that they were even able to withdraw $200 from an ATM machine as well.  

Just curious as to how they are doing this?  Is someone taping into my wifi connection at home?  How the heck are they doing this?  I lately got a new card and now have to go to the local 7-11 machine to withdraw money since I don't want to use my card.
0
I'm currently running --

-W2k8r2 service pack1
-IIS 7.0

How can I resolve this CVE-2000-0649?
0

Vulnerabilities

A vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness, known as the attack surface. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Other vulnerabilities include security risks, security defects and constructs in programming languages that are difficult to use properly.