* Posts by strings

5 publicly visible posts • joined 11 Nov 2014

Linux software nasty slithers out of online watering holes

strings
Childcatcher

Fingerprint

it would be interesting to see how this "new WINDOWS BASED malware " will fingerprint the *nix based system and decide "which" cve to exploit ,considering there are multiple *nix vendors ?.

Sounds like another method /vector to attack the hypervisor host,not exactly new if you look at the large citrix clients base servering up web applications and the flow of cve's for this area,although more arm based issues than x86.

It makes my heart bleed and i'am shell shocked by these new discoveries!.

Serve those patches up! with no desert.

BlackEnergy crimeware coursing through US control systems

strings
FAIL

Re: lockit

You obviously dont understand scada systems ! and what they actually do.

Simplified ver ;

The cpu ( usually arm or other) in a nuclear or oil plant is a SIL rated plc or controller,the executing code is self checked and cannot exceed the rated set points and algorithms currently in memory and cpu.

The scada system is the driving (window) or operating platform for the system you are controlling ,with the overarching control of the process in this isntance governed ' completely by the CPU on the plant controllers.

If the cpu coding programme is installed on the scada ( win) machine ,which is a big mistake and often done by plant engineers who dont have any process security then the code could be changed if the running code is not passworded and physically locked,the physical lock on the plant processor stops and write functions to the cpu or memory ,except for the static code that is in operation.

In laymens terms its like you driving a car,you can only push the pedal so far and no more fuel will be injected into the car enginer than what the ecu allows for the air /fuel ratio set by the m/f,for you to push the pedal and extract or inject more fuel you would need to either have a piggy back system ( to emulate false conditions) or have the access code for the existing ecu /cpu so you can recode the m/f setpoints to allow a richer or leaner a/f ratio.

Aussie feds consider job offer to 'LulzSec leader' who wasn't

strings
Mushroom

tool

Dont you read /view the news !, largest terror raid in AU history occurred just a few months ago.

Writing about an Australian Snowden would land Vulture South in the clink

strings
Flame

Steng Verboten

El Reg , its now Streng Verboten !! ....

Feeling safe in your executive hotel suite, Mr CEO? Well, DON'T

strings
Black Helicopters

Information

Information gleening for future sale of said information.

The comprimised motel networks are often used for relays and the like,and common for years.

Most decent corp systems dont allow wiresless access to any old network ,they have chosen access points in each major city and if outside its done via UMTS .

The user has no choice in this.