Sony Z133GX/B SAN DIEGO--From &quot

SAN DIEGO–From “weaponized” ,Sony Z133GX/B[color=#0066a0]iPhone [/color]software to hacked toys and leaked cookies,[url=]Samsung AQ100, researchers at the ToorCon security conference here this weekend showed how easy it can be to poke holes in software and hardware with the right tools, know-how, and curiosity.One researcher demonstrated how to take control of an iPhone using an exploit that targets a hole in [color=#0066a0]Safari[/color], which has been patched. The iPhone had an app installed that allowed it to process credit card numbers, which could then be stolen if this were an attack in the wild.Eric Monti, a senior security researcher at Trustwave, “weaponized” an exploit that was launched as the program [color=#0066a0]this summer[/color], designed to allow iPhone owners to use unauthorized apps.For the demo, he directed the “victim” iPhone to a Web address that opened a PDF file that contained the exploit code. Then a rootkit was downloaded giving him complete control of the iPhone. Once a rootkit is downloaded an attacker has access to all data, e-mails, voicemails, and text messages, as well as the microphone and speaker. “You can easily eavesdrop on someone if you’re on their iPhone remotely,” Monti said.If the iPhone has the free Square app installed,[url=]Toshiba S20, which is used for processing credit card numbers, the attacker could also steal those numbers, he said, adding that there is not a security issue with the Square app. “We will see people processing credit cards in stores using iPhone apps,” transactions using highly sensitive data that should be on only secured devices, Monti told CNET in an interview after his talk.Two researchers gave a light-hearted talk,[url=]Kodak M530, titled “Real Men Carry Pink Pagers,[url=]Apple iPhone 16GB,” about how they turned a toy into a wireless tool that could be used to open garage doors and clone RFID tags used for inventory control on shipping docks and RFID-based passports,[url=]Samsung S8500, among other uses. The pink plastic [color=#0066a0]IM-Me device[/color], with a “Girl Tech” brand on it, was designed to allow young girls to send instant messages with friends on a private network.The IM-Me device also uses the same wireless chip that some smart meters use and could be turned into a diagnostic tool to test the security of those devices, said wireless researcher Michael Ossman. He worked on the project with Travis Goodspeed, who wrote software that gives the IM-Me functionality that most teen girls can’t fathom.“We took old hardware and repurposed it…It’s fun to turn it into something useful and to learn about it,” Ossman said, summing up a core element of the true hacker spirit.This isn’t the first toy Ossman has worked his hack magic on. During Defcon in August, he used the hackable badge from the event to try to turn a toy guitar into an electric instrument. The guitar, which he played for a select audience this weekend,[url=]Nokia N85 copper, remains acoustic at this point, but Ossman did manage to create a very cool electronic light oscillator for tuning the strings using RGB (red,[url=]Nokia N97 Black Mini Smartphone with Car Kit, green, and blue) LEDs.Two other presenters showed how limited encryption used on many popular sites on the Web–like Facebook, Twitter, Hotmail, and Flickr (but [color=#0066a0]not Google[/color])–can put user accounts at risk of compromise by someone snooping on session traffic between the user’s computer and the site’s server. Sites typically encrypt the username and password as they are transmitted, but unless the entire Web session is encrypted with “https,” or secure hypertext transfer protocol,[url=]Nokia 5800 Xpress Music, someone sniffing the network could capture the cookie information and use that to access the accounts, according to security researchers Eric Butler and Ian Gallagher.Web surfers don’t even have to be on one of the sites to have their cookie data exposed. Any site that even just hosts a Facebook or Twitter widget or has a Flickr image embedded can leak a user’s cookie data if the user is logged into the relevant host site, they said. “The cookie allows you to do everything you can with a password,” Butler said. "It is hard for users to protect themselves."So-called HTTP session hijacking, or “sidejacking,” is not new; another researcher released a tool [color=#0066a0]last year[/color] to enable this on Facebook. But Butler and Gallagher said users will be vulnerable to such attacks until Web sites move to full session, end-to-end encryption and configure sites to indicate that browsers only should send data over encrypted channels. They are releasing a tool that automates an attack and said that they hope that doing so will bring attention to the problem and motivate Web site owners to use encryption more broadly.“Any motivated attacker could do this without this tool,” Butler said. “We think this will shine light on the issue.” Eric Monti demonstrates how he is able to surreptitiously take control of an iPhone during a ToorCon presentation.(Credit: Elinor Mills/CNET) Another researcher talked about the security problems with the Absolute Manage (formerly LANrev) software, which was designed to remotely update software and which was used to secretly take photos of high school students in Philadelphia [color=#0066a0]earlier this year[/color]. Joel Voss, security consultant at Leviathan, said it took him only 48 hours to develop a proof of concept and another dozen hours to create a working exploit to break the encryption on the software.Voss’ exploit renders all computers with the Absolute Manage client software installed vulnerable to compromise by an attacker who could not only spy on the computers, but even run malware on them. Voss informed the company about the problem in July but the current release of the software does not resolve the issue, he said. “It’s bad for anyone to be running software that is that insecure,” he said,[url=]Sony TX1/L Blue, adding that he is not releasing the exploit. Absolute Manage could not be reached for comment on Sunday.Developers need to be aware of the privacy implications of the software they create, said David Kane-Parry,[url=]Toshiba A665, a principal security consultant at Leviathan Security Group. His talk focused on potential unintended privacy issues related to location-based mobile apps,[url=]Nikon SB-600 Speedlight Flash, like Google Maps, in which the data is not encrypted between the consumer’s device and the app server. He also noted, for example, that mobile photos uploaded to sites like Facebook can be geo-tagged to reveal the coordinates of where the photo was taken, unbeknownst to the picture taker.And in a keynote at the event, Dan Kaminsky,[url=]Verizon Wireless XV6900, who discovered a security flaw with authentication in the Internet’s Domain Name System [color=#0066a0]last year[/color] and an even more serious problem [color=#0066a0]the year before[/color],[url=]Nokia N900, talked about the need for the industry to adopt [color=#0066a0]DNSSEC[/color],[url=]Nikon S4000 Red, which stands for Domain Name System Security Extensions. DNSSEC deployment has been slow because it’s not easy to do, he said.To solve that problem Kaminsky has developed software he jokingly dubbed “Phreebird” that allows DNSSEC to be deployed as an upgrade to the existing infrastructure without having to “massively change their processes,[url=]Canon A3100 IS Blue,” he said. A test version of the software will be released at Black Hat Abu Dhabi in November. Meanwhile, a member of the Google Chrome team has developed an “unofficial, unsanctioned” build of Chrome that uses DNSSEC to validate Web sites, he said.“There’s a huge bug in one of the core concepts of the Internet,” Kaminsky said in an interview. “DNSSEC is a fix, but we need to deploy it.” 相关的主题文章: [url=]JVC GZ-MS120 blue Adobe [url=]JVC MS110BUS [url=]posted a story