Category Archives: Technical

Category for technical content.

How SHA-1 Is Broken

(This gets very esoteric very quickly) Those of you paying attention may have realised that very recently (January this year), browsers started complaining about security when connecting to sites whose SSL certificates used the SHA-1 hashing algorithm within the certificate. … Continue reading

Posted in Technical | Tagged , , | Comments Off on How SHA-1 Is Broken

Friday’s DDoS Attack And The Mirai IoT Worm

It may have reached your attention that there was a significant denial of service attack against a widely used DNS provider – the service provider for organisations such as Twitter, Github, and Amazon. The effect was to make certain services … Continue reading

Posted in Active Attacks, Technical | Tagged , | Comments Off on Friday’s DDoS Attack And The Mirai IoT Worm

TeamViewer: People Being Hacked

There are many reports that those using the TeamViewer application are being subjected to hacks with their bank accounts being emptied and similar problems. The details of how the attackers are breaking in are not available, but it seems likely that … Continue reading

Posted in Active Attacks, Technical | Tagged | Comments Off on TeamViewer: People Being Hacked

Apache: Using X-Frame-Options To Evade Click-Jacking

Click-Jacking. It tells you all about it on the Wikipedia article. This posting is about how to avoid security scans telling you to disable click-jacking, if you are using the Apache web server software. If you’re using IIS, you are … Continue reading

Posted in Technical | Tagged , , | Comments Off on Apache: Using X-Frame-Options To Evade Click-Jacking

The Xcode Ghost In Your Apps

We are seeing a number of instances where people have installed legitimate applications from the Apple App store, and their phone is communicating with the Xcode Ghost malware infrastructure across the network. This sort of malware infection is a bit unusual … Continue reading

Posted in Malware, Technical | Tagged , , , , , | Comments Off on The Xcode Ghost In Your Apps

Windows Server Updates: Use The Proxy

This is a more technical note than usual because I happened to have a Windows 2012 server that was refusing to see any Microsoft updates. And as someone who goes around telling people to patch their servers, it is somewhat … Continue reading

Posted in Technical | Tagged , | Comments Off on Windows Server Updates: Use The Proxy

How Effective Is Anti-Virus Detection?

Out of amusement I decided to take one of those strange email spams telling me about an order that I never made (“Order no. 7160668120”), and see if the attachment was detected as a virus. To make things interesting, the … Continue reading

Posted in Malware, Technical | Comments Off on How Effective Is Anti-Virus Detection?

Enhancing SSH Server Security

Every so often after I run security scans, I think about investigating making ssh more secure. Normally I don’t have the time to do it, but this time I have made the time. It turns out that whilst the ssh protocol … Continue reading

Posted in Technical | Comments Off on Enhancing SSH Server Security

Security Conference: 30C3

The content pointed to here is a bit more technical than is usually posted here, but this blog is not just for introductory material. Basically I’ve been through many of the 30C3 videos and picked out some of the more … Continue reading

Posted in Technical | Comments Off on Security Conference: 30C3

Password Audit Procedure

This blog entry is intended to document a technical procedure used to perform a password audit. This is mostly intended for future use by security analysts who may be called on to perform a password audit, but is published here for … Continue reading

Posted in Passwords, Technical | Comments Off on Password Audit Procedure