Linux Network Security - Page 48

Discover Network Security News

Network Protocol Stack & TCP hacking

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The network protocol stack, which forms the carrier and pipeline of data from one host to another is designed in such a way that we can interact with different layers at desired level. This article is a small attempt to describe the movement of data through these stacked layers and at the end we will try to implement a linux kernel module which helps us to capture the data flowing out to TCP layer and display it. . . .

What are they thinking?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Hackers, crackers, carders and thieves are putting the squeeze on your network security. But what do you really know about them? What draws them to your network, and why do they do the things they do? Knowing the motivations of digital intruders helps you understand their behaviors, says Dr. Max Kilger, a social psychologist for the Honeynet Project. And understanding those behaviors can help you better protect your networks. . . .

Protect Your Wireless Network

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you have a wireless network set up in your home, you might be inviting criminals to steal from you without even having to break in. Wireless internet or Wi-Fi is becoming big business and computer users are lining up to buy the equipment that will allow them to use their laptop computers just about anywhere. . . .

With Bagle, Netsky, March comes in like a worm

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Conventional wisdom claims March comes in like a lion and goes out like a lamb. But with new versions of the Bagle e-mail worm and a virulent new form of Netsky virus, March's arrival is looking more wormy than leonine. As of Monday, five new versions of Bagle appeared over the weekend as well as a new version of Netsky that is spreading rapidly on the Internet and generating a huge volume of virus-infected e-mail messages. The new virus versions use a variety of so-called "social engineering" techniques to fool users. Some new variants also hide in ZIP files to slip past anti-virus filters and into users' e-mail boxes, said Graham Cluley, a senior technology consultant at Sophos. . . .

Network security doesn’t stop at the perimeter

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"Firewalls don't stop everything," said Greg Stock, vice president of sales and marketing for Mirage Networks Inc. of Austin, Texas. And insiders are recognized as the largest source of security headaches. "In most cases, it is not malicious intent" that produces insider threats, it is carelessness, Stock said. . . .

Wireless Linux: Linux Driver Now Available for Centrino

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

You need to first install any major Linux distribution based on the 2.4 or 2.6 Linux kernel, then you can go right ahead and install DriverLoader 1.6, followed by a Windows NDIS driver, provided by your hardware vendor. Driver Loader 1.6 supports Intel's PRO/Wireless 2200BG card with 54Mbps 802.11g technology and the Wi-Fi Protected Access security protocol. . . .

A Bio Approach to Network Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Active Countermeasures models the human body's immune reaction to invasion by microbes. It runs a periodic vulnerability analysis based on the latest advisories from security monitoring organizations such as CERT, prioritizes the threats, scans the network for vulnerable machines, then automatically deploys a payload of prevention. . . .

The Anti-Virus Industry Scam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

One has to wonder how the anti-virus industry sleeps well at night. On one hand, it purports to serve the world by defending our computers and networks from any number of electronic critters and malicious code. On the other hand, sometimes its "cure" is worse than the problem its companies and products allegedly treat. Add to that a decades-old concern over business, market share, and publicity, and you have all the ingredients for a confused industry, product, and service. This situation regularly benefits the antivirus software industry and victimizes its customers. . . .

Cisco develops WLAN security protocol to defeat password attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Cisco Systems Inc. has developed a new wireless LAN security protocol designed to defeat brute force dictionary attacks that capture a user's passwords, and it submitted a draft of the protocol to the Internet Engineering Task Force (IETF) on Monday. Cisco developed the new WLAN Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST) to defeat dictionary attacks against unencrypted passwords in its earlier, proprietary Lightweight Extensible Authentication Protocol (LEAP). Cisco posted a security bulletin last August warning users that LEAP is vulnerable to such attacks. . . .

Sniffing Switched Networks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

You are probably familiar with how easy it is to sniff traffic on a shared network and how traffic is sent. But I will explain a bit about how a hub works on a shared network as an introduction anyway. The way that traffic is handled on a shared network may be compared to the way mail is distributed during a mail call at military boot camp. One person stands at the middle of the room and shouts out the names on the letters as everybody stands around and listens for their own name to be called. . . .

Cracks appear in Bluetooth security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"We have developed a tool that allows us to connect to a number of Bluetooth-enabled phones and download all sorts of confidential information, such as address books, calendars and other attachments without going through the normal pairing, or handshaking, process between devices," said Adam Laurie, technical director and co-founder of A.L. Digital Ltd. in London. "In fact, we have been able to obtain this confidential data without giving users any indication whatsoever that an intrusion is taking place." . . .

MyDoom dies today

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

MyDoom-A is programmed to stop spreading today, marking the end of arguably the worst email-borne viral epidemic to date. MessageLabs, the email filtering firm, blocked the virus 43,979,281 times in the two weeks since its first appearance in late January. At the height of the epidemic, one in 12 emails the firm scanned were viral. . . .

Preventive measures

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Unless you've been tinkering with the rovers on Mars and are just now returning to this planet, you've likely had your fill of the stories of the latest worm. And unless you're running SCO's Web site, you probably have had little more than inconvenience as a result of that fast spreading worm.Sure, it slowed down the Internet and generated prodigious quantities of e-mail traffic, but if you had already protected your enterprise properly, the biggest impact you felt was the constant stream of news stories in the mainstream media. We don't want to inflict any more of that on you, so I'm not going to write about the recent worm. It's already history, and you've got the satisfaction of knowing that your enterprise got through the epidemic just fine. That's important, because it's easy to focus on the issue of the moment, and lose sight of the fact that in spite of the worm, other security threats are more important. . . .

Wireless Network Security for the Home

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The problem with having the signal broadcast though is that it is difficult to contain where that signal may travel. If it can get from upstairs to your office in the basement then it can also go that same 100 feet to your neighbors living room. Or, a hacker searching for insecure wireless connections can get into your systems from a car parked on the street. . . .

SSL VPNs - You Can't Afford to Ignore Them

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Amidst the cacophony about VPNs and whether IPsec or SSL is the better solution, and which vendor has done the most to satisfy the journalists and analysts, one "minor" issue seems to be falling by the wayside - You the user - Irrelevant maybe to most vendors, but nevertheless a problem they need to resolve in order to achieve those quarterlies! . . .

Free-For-All Access To Wireless LANs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The convenience of wireless access typically comes with a high price tag. But that's changing. Some airports and hotels have begun installing 802.11 Wi-Fi networks and letting travelers use them for free. Pittsburgh International Airport, which recently completed deployment of a free wireless LAN in its food court, is expanding it to all gates. "We are the only airport in the country, and one of two in the world, to offer this as a free service to the traveling public," says Tony Gialloreto, the airport's IT manager. "It's a real asset." . . .

Network security specialists seek seamless defense

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Day and night, the war of attrition rages in the beleaguered world of network security. Defenders throw up firewalls, download patches, and scramble to fend off the hundreds of thousands of attempted intrusions into worldwide enterprise data. . . .

Wi-Fi Alliance Announces a List of WPA Certified Products

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Wi-Fi Alliance announced that over 175 wireless products from more than 40 leading manufacturers received the long awaited Wi-Fi Protected Access (WPA) security certification. The infamous Wired Equivalent Privacy (WEP) was proved to be fundamentally insecure and this finding caused a really negative "marketing" campaign for WLAN adoption. WPA comes to the rescue as a security replacement for WEP. It is recommended that WPA be enabled in wireless LAN applications where data security is a concern, as it has been proven to be a very secure and easily implemented security solution. . . .