Friday, October 3, 2014

How long would it take to crack my password


http://www.itworld.com/security/280486/how-long-would-it-take-crack-my-password?page=0,1
How long would it take to crack my password: (Includes letters and numbers, no upper- or lower-case and no symbols)

6 characters: 2.25 billion possible combinations
  • Cracking online using web app hitting a target site with one thousand guesses per second: 3.7 weeks.
  • Cracking offline using high-powered servers or desktops (one hundred billion guesses/second): 0.0224 seconds
  • Cracking offline, using massively parallel multiprocessing clusters or grid (one hundred trillion guesses per second: 0.0000224 seconds
10 characters: 3.76 quadrillion possible combinations
  • Cracking online using web app hitting a target site with one thousand guesses per second: 3.7 weeks.
  • Cracking offline using high-powered servers or desktops (one hundred billion guesses/second): 10.45 hours
  • Cracking offline, using massively parallel multiprocessing clusters or grid (one hundred trillion guesses per second: 37.61 seconds.
Add a symbol, make the crack several orders of magnitude more difficult:
6 characters: 7.6 trillion possible combinations
  • Cracking online using web app hitting a target site with one thousand guesses per second: 2.4 centuries.
  • Cracking offline using high-powered servers or desktops (one hundred billion guesses/second): 1.26 minutes
  • Cracking offline, using massively parallel multiprocessing clusters or grid (one hundred trillion guesses per second: 0.0756 seconds
10 characters: Possible combinations: 171.3 sextillion (171,269,557,687,901,638,419; 1.71 x 1020)
  • Cracking online using web app hitting a target site with one thousand guesses per second: 54.46 million centuries.
  • Cracking offline using high-powered servers or desktops (one hundred billion guesses/second) 54.46 years
  • Cracking offline, using massively parallel multiprocessing clusters or grid (one hundred trillion guesses per second: 2.83 weeks.

Thursday, October 2, 2014

OpenVAS

Some tools I have used, pretty cool.
The world's most advanced Open Source vulnerability scanner and manager
OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution.
Greenbone Networks delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management.

Wednesday, October 1, 2014

Posters

http://mindfulsecurity.com/2009/09/19/free-threats-security-awareness-posters/


What are Patches

The word Patch is defined as, “a piece of cloth or other material used to mend or strengthen a torn or weak point.” So it makes sense that a Software patch would is a piece of code added to software to strengthen its weak points. These weak points are usually were Virus’s, Malware and other attacks are focused on, and the patches remedy the method for a computer system to be vulnerable.

Software updates whether big or small are important. Much like with changing the oil in your car, brushing your teeth daily or going to a doctor for annual checkups, updates are necessary. Computers and the software they use require regular updates to ensure they continue to run safely and efficiently.

Viruses are ever-evolving and your operating system, antivirus and other applications should continuously evolve as well. It’s quite easy to ignore system updates for a while and fall behind the times, becoming vulnerable to new threats.

Updates serve a number of different functions as listed below:
  • ·         Fix security holes
  • ·         Optimize the utilization of resources on the operating system
  • ·         Add newer and more secure features
  • ·         Remove old and unprotected features
  • ·         Update drivers to increase software efficiency


Cool Desktop?



What is #shellshock?


Shellshock (CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, CVE-2014-6278) is a vulnerability in GNU's bash shell that gives attackers access to run remote commands on a vulnerable system. If your system has not updated bash in since Tue Sep 30 2014: 1:32PM EST you're most definitely vulnerable and have been since first boot. This security vulnerability affects versions 1.14 (released in 1994) to the most recent version 4.3 according to NVD.




The following can be found at:

Shellshock, also known as Bashdoor, is a family of security bugs in the widely used Unix Bash shell, the first of which was disclosed on 24 September 2014. Many Internet daemons, such as web servers, use Bash to process certain commands, allowing an attacker to cause vulnerable versions of Bash to execute arbitrary commands. This can allow an attacker to gain unauthorized access to a computer system.
The bugs cause Bash to unintentionally execute commands when they are stored in specially crafted environment variables. Within days of the initial vulnerability, a series of further related vulnerabilities in Bash were found, leading to the need for further patches.
By 25 September 2014, botnets based on computers compromised with the bug were being used by attackers for distributed denial-of-service attacks and vulnerability scanning. Millions of attacks and probes related to the bug were recorded by security companies in the days following the disclosure.[7][8] The bug could potentially be used to compromise millions of servers and other systems, and it has been compared to the Heartbleed bug in its severity.
Stéphane Chazelas discovered the original bug on 12 September 2014 and suggested the name "bashdoor". The bug was assigned the CVE identifier CVE-2014-6271. Analysis of the sourcecode history of Bash shows that the vulnerabilities had existed since approximately 1992.
Apple Inc. commented that most Mac users were likely not affected, unless they were advanced users. Although notified of the vulnerability before it was made public, the company did not release a corresponding OS X update until 29 September, but it did not fix all known vulnerabilities.
Background
The Shellshock vulnerabilities affect Bash, a program that various Unix-based systems use to execute command lines and command scripts. It is often installed as the system's default command line interface. Bash is free software developed collaboratively and overseen since 1992 on a volunteer basis by Chet Ramey, a professional software architect. Analysis of the sourcecode history of Bash shows that the vulnerabilities had existed undiscovered since approximately version 1.13 in 1992. The maintainers of the Bash sourcecode have difficulty pinpointing the time of introduction due to the lack of comprehensive changelogs.

In Unix-based operating systems, and other operating systems that Bash supports, each running program has its own list of name/value pairs called environment variables. When one program starts another program, it provides an initial list of environment variables for the new program. Separately from these, Bash also maintains an internal list of functions, which are named scripts that can be executed from within Bash. Since Bash is both a command interpreter and a command, it is possible to execute Bash from within Bash. When this happens, the original instance can export environment variables and function definitions into the new instance. Function definitions are exported by encoding them within the environment variable list as variables whose values begin with parentheses ("()") followed by a function definition. The new instance of Bash, upon starting, scans its environment variable list for values in this format and converts them back into internal functions. It performs this conversion by creating a fragment of code from the value and executing it, thereby creating the function 'on-the-fly', but affected versions do not verify that the fragment is a valid function definition. Therefore, given the opportunity to execute Bash with a chosen value in its environment variable list, an attacker can execute arbitrary commands or exploit other bugs that may exist in Bash's command interpreter.
Impact
Within an hour of the announcement of the Bash vulnerability, there were reports of machines being compromised by the bug. By 25 September 2014, botnets based on computers compromised with this exploit were being used by attackers for distributed denial-of-service attacks and vulnerability scanning. Kaspersky Labs reported that machines compromised in an attack, dubbed "Thanks-Rob", were conducting DDoSes against three targets, which they did not identify. On 26 September 2014, a botnet based on computers compromised with this exploit was reported. Dubbed "wopbot", the botnet was being used for a distributed denial-of-service (DDoS) attack against Akamai Technologies and to scan the United States Department of Defense.

On 26 September, the security firm Incapsula noted 17,400 attacks on more than 1,800 web domains, originating from 400 unique IP addresses, in the previous 24 hours; 55% of the attacks were coming from China and the United States. By 30 September, Cloudflare said it was tracking approximately 1.5 million attacks and probes per day related to the bug.