Category Archives: Security Programs

Latest Security programs

Malwarebytes – Bites Malware Back!

Filed under Downloads, Security Programs
Tagged as , , , , ,

Let’s face it! The same tools you used to remove malware/spyware/adware in 2006, are out of date and completely ineffective in battling malware/spyware/adware that actually has a purpose. That’s right! I said it, AdAware, Spy Bot Search and Destroy are no more than basic registry and cache cleaners. These days that can be accomplished with a simply application called, CCleaner.

So you ask, “Oh sweet nectar! What can I do to protect myself?” Well, rather than going on and on with a list of tools longer than your to-do list around the house, I’ll simply list a new one for you to add to your collection.

Malwarebytes’ Anti-Malware, This bad boy you should have already been using for some time now, so if that’s not the case, START NOW! It’s free, or for the 24.95 you can get automated scanning and automatic updates with real time protection. If you have a tidy system and stay on top of your computer cleansing and play nice around the web, the free version will do just fine. However, if your a click happy user who clicks on any link sent to you, please do yourself a favor and anyone else whom uses your high risk computer and purchase the full version.

Malwarebytes Free Version:

Malwarebytes Full Version:

Note: I’ll be adding this program into my future post, “Your Computer : A Fresh Start” This will be a complete guide from a clean install, into completely securing your Windows desktop (The best you can!).

Icesword 1.16 English & Darkspy 1.0.4 (1.0.2 English)

Filed under Downloads, Security Programs, Windows

IceSword 1.2

Anti-Rootkit programs are becoming a necessity in keeping your computer secure. I know Anti-Virus vendors are trying to implement rootkit detection. Personally I never believed in an “all-in-one” product for security. To be successful in preventing rootkits, you have to stay current with the latest leaders of this task. As of now, the leaders seem to be IceSword & Darkspy. Both of which just released new versions this month. My advice to anyone trying to get a handle on rootkits, would be to test them all. See which ones you feel comfortable with and which ones give you the best results.

IceSword 1.16 EN

DarkSpy 1.0.2 EN (Test Evaluation)

DarkSpy 1.0.4 CN

DarkSpy Author CardMagic says,
“sorry,i havent made a English version of DarkSpy 1.0.4.because this is a temporary version and will be updated soon.The new Engish version of DarkSpy will be pubished when some new functionalities are added.”

So We’ll be keeping an eye out for the latest version of DarkSpy as it’s released to the public. Just because these are the only two rootkit solutions I mention in this article, please don’t assume these are the only two out.

Other Anti-Rootkit Solutions:
Rootkit Revealer by Sysinternals
Blacklight by F-Secure

Secure Instant Messaging, File Transfers, and Chat Sessions

Filed under Security Programs, Windows

Secure Instant Messaging, File Transfers, and Chat Sessions…

Something thats sounds so nice, who would have thought safe messaging… Having said the words ‘safe messaging’ is going to give a lot of readers the sense of false security. Please note, setting up a secure certificate isn’t going to protect you from IM worms or even exploits. This is to encrypt the traffic between you and your destination assuming both parties are using a secure certificate. Personally, I use this as a layer of my security in protecting myself against phishing attempts, or if somebody was trying to impersonate someone on my buddylist. This is extremly important to businesses and people that share private information over the internet.

Let me describe one perfect example of how having an secure certificate would have prevented a security threat; A few years ago, my brother recieved a message from one of his friends (we’ll name the friend Newbert), “Hey Tyler check out this program,” claiming to be a limited edition version. Tyler assuming it was from Newbert, downloaded the file without hesitation, extracted the zip file and ran the install. To his surprised he was prompted with an error and no installation began. What he didn’t know is the person he thought was his friend Newbert was actually some cyber script kiddie that just infected innocent Tyler with a trojan or password stealer. A few minutes later his screen name was signed off, and someone has changed his password. When he tried to request his password to his email address, his email password was already changed too. See if Tyler and Newbert would have had a secure certificate, tyler would have been able to verify that Newbert really was Newbert. Even if cyber script kiddie stole Newberts AIM password, locally on Newberts computer, he has to input another password to access AIM using the SSL cerificate. I’m not stating that a secure certificate will protect you against virus and worms. However, it adds a nice layer to your security.

It’s very easy to tell the difference between a secure user and the average user. If a user on your buddylist is using a secure certifcate you’ll notice a grey lock next to their screen name. if they are not you’ll notice nothing.

Aim Secure

So, now that you understand the importance of secure communications, I’ll leave you with a few choices. You can get a certificate for FREE from a few sources, however I would have to accept your certificate before communicating with you (I personally wouldn’t accept). Or you can make your own certificate. Last you can pay to issue you one. This is the route I went, for I trust verisign more than some random source as well as myself. So for the 15.00 a year, it was worth it to me. However, they offer a free 60 day trial, so atleast check it out!

- Whitsoft Dev : – Very Simple to setup.

- Verisign : ( 19.95 1 yr. / 60 day free trial)

Once you’ve requested your certificate in either .p12 or .pfx format we can move forward with adding importing the SSL certificate into AIM.

Note: AIM Trinton doesn’t offer support for the SSL certificate. On a personal level you don’t want AIM Trinton.

1) Copy the .p12/.pfx file to your desktop.
2) From your buddy list, go to ‘My AIM’ > ‘Edit Options’ > ‘Edit Preferences’
3) On the left side, select ‘Security’
4) Click the Advanced button.
5) Click the Import button under “Import a certificate.”
6) Browse to where you saved your SSL certificate and select the .p12/.pfx file listed and click Open.
7) When it asks for a “security” password, enter one. (This is the password you’ll be asked for everytime you sign on AIM for the first time)
8) When it asks for the password of the certificate, enter the same as above.
9) Make sure the box is checked next to “This certificate can identify mail users.” and press OK.
10) Click OK on all dialogs that come up, until you see one that says Certificate successfully imported, click OK on that one too.
11) Exit and re-start AIM.
12) Enjoy your SSL certificate and piece of mind while chatting with your online friends.

Ending Notes: Please let us know if you have trouble with creating or setting up your secure communication. Other than that, any feed back or different methods you might use for secure communications is welcome!

0-Day : IE 6.0 SP2 (mshtml.dll) DoS exploit (PoC)

Filed under Security News, Security Programs, Windows

Another exicting day for Internet Explorer surfer!

This morning we’re going to list a DoS exploit released in the wild early this morning. This exploit isn’t as serious as the one we went over yesterday regarding WMF. I concider this DoS exploit more of an annoyance than a threat. Not to mention this only effects IE users, however it affects all of you at this point. First we’re going to list the code for this exploit, discovered by rgod and then we’ll go over recommended solutions and followup with the PoC.


< .head.>
< .style.>< .!-- #page div p:first-child:first-letter { border-bottom: 2px ridge #F5DEB3; } //-->
< ./style.>
< ./head.>
< .body.>< .div id="page">

< .strong.>suntzu< ./strong.>< ./p.>< ./div.>< ./p.>< ./div.>

As you can see this is a very simple attack and very easy to create. The good news is, I don’t see many people using this exploit for any benefits at most and annoyance, but who knows this could escalate into something bigger. However, since the WMF exploit is public now, I think the malicious users will be focusing on that bad boy.

Recommended Solution:
Mozilla Firefox 1.5 Final [ download ] w/ NoScript [ info] [download]

I know this isn’t a solution for die hard Internet Explorer users. However regardless the reason, we recommend using multiple browsers for different browsing habits. If your extra patanoid you can even go as far as running VMWARE Workstation 5.5.

Proof Of Concept:
Crash Internet Explorer 6.0

Note: clicking this link using Internet Explorer is pointless unless you actually want to crash you browser. We are unaware of any way around this using Internet Explorer as of now. If you know otherwise, please advise…

0-Day Exploit : MS/IE – WMF Remote Code – Fix!

Filed under Downloads, Security News, Security Programs, Windows

A little spice to the end of 2005… Christmas was nice spending it with family, securing their computers, the usual for holidays with the family. Only if it was that easy this year, as of this morning a new exciting exploit was released. The good news is my current configuration wasn’t affected by this annoyance. So, we’re going to list the advisory released by FrSIRT and let you review that, then we’ll move forward to steps to take for protecting yourself. Also, look at the end for references.

Rated as : Critical
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 2005-12-28

Technical Description

A vulnerability has been identified in Microsoft Windows, which could be exploited by remote attackers to execute arbitrary commands. This flaw is due to an error in the rendering of Windows Metafile (WMF) image formats, which could be exploited by attackers to remotely take complete control of an affected system by convincing a user to open a malicious WMF file using a vulnerable application (e.g. Windows Picture and Fax Viewer), or visit a specially crafted Web page that is designed to automatically exploit this vulnerability through Internet Explorer.

Note : This unpatched vulnerability is currently being exploited in the wild.


Affected Products

Microsoft Windows XP Service Pack 1
Microsoft Windows XP Service Pack 2
Microsoft Windows XP Professional x64 Edition
Microsoft Windows Server 2003
Microsoft Windows Server 2003 Service Pack 1
Microsoft Windows Server 2003 for Itanium-based Systems
Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
Microsoft Windows Server 2003 x64 Edition


The FrSIRT is not aware of any official supplied patch for this issue.



Vulnerability reported in the wild by noemailpls


2005-12-28 : Original Advisory

Tech-Security Explains:
As shown by FrSIRT, there is no real solution for this until we receive a patch to fully resolve the issue. However, there are steps you can take in protection yourself. I’m running Firefox 1.5 Final w/ NoScript extension and configured browser settings (mentioned in an early thread) and when I went to one of the infected site, I wasn’t hit by the exploit.

Want to start thinking about secure browsing?? Good it’s about time…

Update your anti-virus software 1-3 times a day, this way if you do get infected by this exploit, you’ll have protection shortly afterwards. not good enough? I agree…

Tech-Security Recommended Fix:
For safe browser…I would recommend installed VMWARE and install a fresh copy of Windows. This enables you to browser within the VMWARE isntance of Windows, allowing nothing to enter into your production OS version. This is a great idea for browsing and testing exploits/infected programs. Just be sure you keep your VMWARE Workstation updated too.

Protect yourself:
VMWARE Workstation 5.5
[ more info ] . [ download ]

Easiest Fix:
Windows Media File Viewer | [disable] . [enable]

This is more of a temp solution, which is why we recommend VMWARE, it might seem like a hassle at first, but no more than if you get infected with a serious virus. Atlease VMWARE is a one-time deal.

IceSword…The Best Rootkit Defender?

Filed under Downloads, Security News, Security Programs, Windows

IceSword 1.2

Look out people! Over the past few months people have heard more and more about rootikits. I’ve been dealing with rootkits for some time now and after having numerous friends infected by Sony’s rootkit, I decided it’s time to help educate the prey. Now, hopefully you’re not sitting there saying, “Prey?? I use Norton Internet Security and if your suggestion that a rootkit can bypass that, I have news for you!” My response would be a standard “laugh out loud” followed by blocking your IP from my website. No, seriously regardless of your current protection, it’s not enough. Rootkits change on a regular basis to bypass AntiVirus software along with the popular antirootkit software.

I recommend using 3 useful rootkit utilties in your hunt for the invisable rootkit. I do not recommend only using one of the three, or even two of the three. I say three, for the fact that incase the nifty rootkit infecting your system was updated to bypass one or two of my recommendation, you would have a 3rd opinion. Now that I’ve explained myself and hopefully conveinced you to install, update, and run these utilties on a weekly basis we’ll move forward with testing.

Note: Click links below to download software.

Our Test Enviornment:
- Windows XP SP2 (fully updated)
- Sygate Personal Firewall Professional (.dll injection detection)
- Kaspersky AntiVirus Professional (script detection)
- All-Seeing Eye (Best system monioring tool around)
- Spyware and other tools not listed.

Programs under the spotlight:
- Rootkit Revealer [info] | [download]
- BlackLight [info] | [download]
- IceSword English [info] | [download]

Rootkit under oath:
Lil Rob’s album “Twelve Eighteen” released by Upstairs Records.

All 3 softare programs detect the rootkit, however none of them removed it. Blacklight allows you to rename the files, but the junk is still there. Rootkit Revealer lets you know where all the files are so you can manually remove the files in DOS and the registry entries using PSEXEC. Finally my personal favorite IceSword, this program displays a lot more information than the other two, however it’s for more advance users. On this note, exactly why I recommend using ALL three for detection and IceSword for advance removal.

I’m interested to hear what others think about IceSword and your techniques for battling rootkits!

Ophcrack 2.1 – LiveCD (Linux) & 2.1 Install (Win)

Filed under Downloads, Security Programs

Ophcrack LIVE CD & Ophcrack 2.1

Rainbow Table

A Windows password cracker based on the faster time-memory trade-off using rainbow tables. This is an evolution of the original Ophcrack 1.0 developed at EPFL. Ophrack 2.0 comes with a GTK+ Graphical User Interface and runs on Windows as well as on Linux.

Brute Force a windows password… forget it, that’s based on a list of possible passwords and can take forever. Use NT Offline Reset to reset the password… sure that’s great and all, except what if you just want to know the current password w/o erasing the original?

I tested both the LIVECD version and the Windows installer. Both of them have benefits; LiveCD is a must if the computer is offline or shutdown when you want to test your password security. However, the LiveCD is version 0.9a so it’s a little outdated. The Windows installed was just updated to 2.1 and released on 12/06/05, so it’s really nice to have the latest. If you’re truly testing your password security the Windows Installer is the way to go, however if you can’t get into your computer and need to crack that password, the LIVE CD is the way to go. Either way, it cracked a random password within 5 minutes.

Live CD: This is a great option, it’s a linux bootable cd on Ubuntu distro. All you have to do is burn this ISO image to a CD reboot your computer, go into BIOS and make sure you have your computer to check for CDROM before HD. Now, it will load the distro and if a SAM file is found start cracking right away. When I tested this way it took less than 5 minutes to crack my brothers administrator password.

Download: Ophcrack 0.9a – Live CD ISO

Windows Installer Version: This is nice if you have a fast windows box around the house or office. Installer is 3MB however you have to select which tables you want to download. The larger table is around 700 MB download, so it takes a few minutes. Once it’s done you have options;

* encrypted SAM: dumps the hashes from the SAM and SYSTEM files retrieved from a Windows machine while booting on another disk. Note that in this case you do not need to know a Windows administrator password to get the hashes.
* local SAM (only for the Windows version of Ophcrack 2.0): dumps the hashes from the Windows machine the program is running on. You need to be administrator of your local machine for this to work.
* remote SAM (only for the Windows version of Ophcrack 2.0): dumps the hashes of a remote Windows machine, provided you know the username and password of an administrator and the name of a share.

Download: Ophcrack 2.1 – Windows Installer

Firefox 1.5 Final – Exploit & PoC : Easy Fix!

Filed under Security News, Security Programs, Windows

Today, a minor DoS (Denial of Service) exploit was released. Showing how even Firefox 1.5 Final, which was just released 11/29/05 is vulnerable to attacks. I say, “minor” for the fact that you have a choice whether or not you’re affected by this type of DoS atack or not.

PacketStorm and their research has paid off again!

Basically firefox logs all kinda of URL data in it’s history.dat file,
this little script will set a really large topic and Firefox will then
save that topic into it’s history.dat.. The next time that firefox is
opened, it will instantly crash due to a buffer overflow — this will
happen everytime until you manually delete the history.dat file — which
most users won’t figure out.

this proof of concept will only prevent someone from reopening
their browser after being exploited. DoS if you will. however, code
execution is possible with some modifcations.

Okay, so you would have to click a link or try and access a vulnerable website for this to take affect. Now, with the default installation of Firefox 1.5 Final, your browser would crash on you and when attempting to open your browser again you would experience another browser crash. Are you being hacked? No, this is an annoyance… Enough with the small talk, lets go over what needs to be done to prevent this attack and future attacks like this from affecting you! Put an end to the abuse!

Technically you have 2 options to resolve this issue:

1) You can simply open Firefox click ‘Tools’ > ‘Options’ > Select the ‘Privacy’ button and check everything (The only two that have to be checked are, ‘Browser History’ & ‘Clear private data when closing Firefox’).

Firefox Privacy

- This will clear the browser history everytime Fixfox closes. So, if you did run across this DoS attack while browsing, your browser will crash, but the data was cleared upon crashing. This isn’t the best option because you’re still losing your current searches and have been annoyed by the exploit. This is why step 2 is the only way to go…

2) A great firefox extension called, No Script offers protection over Javascripts from running on your system from untrusted sites. What this program use, is when you access a website that wants to run javascript on your system it blocks it and prompts you, giving you the option to “always allow from the site” or to “temporarily allow from the site.” So when this exploit tried to run against me, I knew I didn’t want to allow this javascript to run and continued browsing without being affected at all. Now, before you go out and get all browser happy read up on this program and get this extension installed on your computer!

No Script Logo

Download: Install this bad boy now!
More Information: What is it?

Manual removal: (example:) C:\Documents and Settings\techsec\Application Data\Mozilla\Firefox\Profiles\4rbeef38.default\history.dat

The history.dat file is 10,153 KB once code is successful ran, deleting it clears it as well.

This seems to affect previous version of Firefox also, so please be sure to protect yourself before testing the PoC on your computer!

Test Yourself: Think you’re secure? (modified script of the original from ZipLock)

0-Day Exploit & Security Tips

Filed under Security News, Security Programs, Windows

Today is just another day to the security experts, but another painful day to the Internets novice. Over 6 months ago an exploit was released that gave hackers the capability to view files and folders on a user’s computer… Well this morning an updated exploit was released that let people run code on the attacked computer as well. Usually when we hear about exploits like these, the vendor has already released a patch for the exploit. However, it’s not the same this time, as of now even a fully patched Windows 2000 / XP computer is still at risk. Below is the information regarding the exploit, followed by a few programs I use to help monitor and prevent these issues from happening again.

Rated as : Critical
Remotely Exploitable: Yes
Locally Exploitable: Yes
Release Date: 2005-11-21

Technical Description

A critical vulnerability has been identified in Microsoft Internet Explorer, which could be exploited by remote attackers to execute arbitrary commands. This flaw is due to a memory corruption error when processing malformed HTML pages containing specially crafted calls to JavaScript "window()" objects and "onload" events, which could be exploited remote attackers to take complete control of an affected system by convincing a user to visit a malicious Web page.

This vulnerability has been confirmed on Windows XP SP2 with Internet Explorer 6 (fully patched).


Proof of Concept

Affected Products

Microsoft Internet Explorer 6 for Microsoft Windows XP SP2
Microsoft Internet Explorer 6 SP1 on Microsoft Windows XP SP1
Microsoft Internet Explorer 6 SP1 on Microsoft Windows 2000 SP4
Microsoft Internet Explorer 5.01 SP4 on Microsoft Windows 2000 SP4


Disable Active Scripting in Internet Explorer:

1. Start Internet Explorer.
2. On the Tools menu, click Internet Options.
3. On the Security tab, click Custom Level.
4. In the Settings box, click Disable under Active scripting.
5. Click OK, and then click OK.



Vulnerability originally reported by Benjamin Tobias Franz and exploited by Stuart Pearson

Now let’s take a look at a few of the programs I use to monitor internet attacks, provide alternate browsing, and monitor and prevent system changes.

Internet Storm Center handler Tom Liston created a systray application to monitor the status of the infocon. Basically if you see this application flashing yellow, orange, or even red then you know it’s time to come back here and see whats going on!

Download: ISC Alert

Mozilla Firefox is an alternate browser you may use to bypass this exploit. I do recommend using Firefox, but not only firefox. I use both for different things, Internet Explorer I use for trusted sites, and firefox for normal web browsing.

Download: Firefox

The wonderful people at Fortego Security have created a program called All-Seeing Eye. This program gives you full monitoring control of all system changes. This is a little extreme for some, but a must for others.

Download: All-Seeing Eye