About Brent Huston

I am the CEO of MicroSolved, Inc. and a security evangelist. I have spent the last 20+ years working to make the Internet safer for everyone on a global scale. I believe the Internet has the capability to contribute to the next great leap for mankind, and I want to help make that happen!

VMWare Guest Security Problems

A few more problems seem to have been identified in VMWare and the potential isolation of the Guest systems. This article discusses how malicious code can be spread to Guest hosts via the scripting API of VMWare products.

This is especially dangerous given that many security researchers use VMWare and other virtualization mechanisms to study malware, attack code and other less-than-friendly mechanisms, but it has ramifications for everyone else too. VMWare claims, according the author of the article, to stick to their design decision that allows the issues to exist. They believe that the good of the feature outweighs the risk of compromise. I am not so sure they are right.

VMWare and other solutions are quickly moving into the core of most organizations and their IT spectrum. They have long evolved from geek-centric tool to mainstream deployment. As such, a vulnerability of this magnitude should be treated as severe. Guest OS isolation has always been a deep value to be maintained if virtualization is to reach even higher market penetration. Organizations simply can not afford, in today’s regulatory environment, to not be able to depend on isolation in their virtual systems. Without it, they will be back to deploying multiple physical systems to manage compliance – and we have already seen that this is not the way we want to go.

While work-arounds for fixing this specific issue exist (read the article for details), I think all IT folks should make it very clear to VMWare and other virtualization vendors that we can not accept issues with host isolation, no matter the cost to features and shortcuts. The risk is simply too high. Please, if you are a user of VMWare, let them know your thoughts. Drop them, or us, a line.

Oh, and don’t forget to modify your config files to disable the feature that makes this vulnerability possible!

More People Supporting Honeypots for Corporate Use

Got this off of the wire today. Pretty cool that other folks are beginning to weigh in on the power of honeypots in the corporate world.

Too bad this article doesn’t cover HoneyPoint. Hopefully, more folks will come to see the power of our solution. We just seem to need more marketing around our particular flavor of honey… ย  ๐Ÿ˜‰

Read the article here.

How Can We Get It Right?

The job of the venerable TSA agent seems to be nearly impossible to me. I am just back in the office from a couple of weeks of travel and man, there are just so many issues with airport security I am just amazed that there have been no repeat airline attacks.

In Charlotte, a man made it through the security screening a couple of weeks ago and got on board an aircraft! To make matters worse, the TSA response was to create a process of “Reverse Screening” where the passengers would be screened as they came OFF of the aircraft. Huh? What? Off of the aircraft? Isn’t it likely to be a little too late by then?

Meanwhile, it also came to light while I was traveling that another US airport shut down their security posts at night and that anyone with an official badge was allowed through unscreened. Apparently this had been going on for years, but had only become an issue when a local newsperson penetrated the area in this manner on video. I guess this security team had never heard of social engineering or counterfeiting of badges. Hey, it’s only airline security, right?

The problem is just so large, and the variables so very complex. Add to that the pressure from the American public to get it right – but without inconvenience or delays and you have a patented recipe for failure. I truly believe that the TSA issues are so bad and that the system is so broken that we may need to step back and rethink the entire approach to the solution. What we have now clearly is not working and it seems to me that we have been very “lucky” that there have been no further incidents. The problem with luck though, is that it often runs out…

What do you think about airline security? How much are you willing to tolerate in the name of safety? What do you think we should do to make it better? Drop us a line and let us know your thoughts!

New Attack Tools Getting More Sophisticated

Yesterday I followed up on some HoneyPoint traffic signatures that have been floating around for a while. I have been seeing a pretty steady increase in various scans for several types of PHP vulnerabilities over the last few months, so I started looking around at some of the script kiddie PHP scanners that were out there.

Interestingly, I found a couple of scanners on a forum that were pretty advanced. They each include 250 – 300 signatures for PHP vulnerabilities, several modes of “IDS evasion” that are minimally successful, at best, but do have options to adjust scanning speeds, manage scan target lists and other useful stuff. Overall, I was actually impressed with the depth, stability and capabilities that these script kiddy style tools possessed.

I will continue to troll through some more lower end tools and check them out for how their coding has improved. I think it is likely that compared with the many of the script kiddy tools of yesteryear, I will find that even the basic development and coding skills in the lower end of the attacker pool has improved. The attackers who develop basic tools and feed the script kiddy crowd seem to be becoming more and more capable of in-depth coding and development. While far from a shock to infosec folks, it does represent a phase shift that we should be aware of. Likely, their tools will continue to grow in stability and sophistication – all of which makes for more formidable opponents.

Just something to think about….

The Ups and Downs of Security Research

So, here I am working on a vulnerability I discovered in OS X. I am deep into doing the final work of making sure it is exploitable and writing proof of concept code. My fuzzers had identified the issue a week or so ago, but with my busy schedule I just had not had time to pursue what was looking to be a local exploit with a little capability for malicious activity – like perhaps exposing the contents of file vault or other things that are based on user context.

But, low and behold, along comes an update from Apple that patches the vulnerability. Upon deeper research, it appears that they also discovered the issue (or blindly mitigated the hole) while they were repairing another problem included in this patch cycle! Congrats to Apple for fixing what appears to have been an unrelated issue and for seeming to actually be doing the right thing of performing additional testing or mitigation on code they are working on. To me it looks like they may actually have implemented a process where as one issue is found with a piece of code and addressed, the whole piece of code is more deeply inspected, tested and assessed. That’s FANTASTIC news!

So, while I am doing the “poor me” shuffle for spending cycles on an issue that has become NOT AN ISSUE, I am also bouncing around with joy that the right approach to securing code seems to be spreading. That alone, is worth a smile. I really like it when the right thing happens and some part of the world gets a little more secure!

That’s just another part of life as a security researcher. Things continue to break in new and exciting ways, but sometimes, even while you are working on the rabbit hole, someone comes along and fills it in….

CNet Gives HoneyPoint Personal Edition 4 Stars!

CNet reviewers gave HPPE four out of five stars!

They loved the useability of the product, the interface and the idea surrounding it.

You can read more about it here.

Apparently, it would have gotten 5 stars, but they did not like the fact that connections from 127.0.0.1 (localhost) are ignored and that this feature is not in the documentation. We will add it into the docs in the future, but 4 out 5 stars is a wonderful response. Thanks CNet!

HoneyPoint Helps Identify Misconfigurations

One of the unexpected side effects of HoneyPoint deployments has been the discovery of misconfigured applications and hardware in the network. Many customers have identified several applications and devices that were either not configured properly or were acting in unexpected and undocumented ways. HoneyPoint clients have been giving us great feedback that this has helped them reign in this wrongful behavior and that they would likely have never known about it if they had not deployed HoneyPoint.

Some of the items they have discovered have included web-applications that open return sessions to port 80 or 443 on the host – often for no apparent reason, illicit web-requests to domain servers due to misconfigured SQL and LDAP controls and even a couple of applications that performed simplistic host port scans in odd attempts to identify the originating host or use as a “host fingerprint” – neither of which are effective mechanisms for access control.

Clients have also told us that HoneyPoint has helped them find hosts that are not obeying the standard rules of their environment. For example, one client moved their DNS server from the DNS location assigned by DHCP and then changed the DHCP server. A few days later, he stood up a port 53 HoneyPoint to capture hosts that had set their DNS as static instead of using the established DHCP method. Doing so helped him clean up some hosts that remained in older configurations and even identify a help desk technician that was not configuring systems accordance with their standards. They claim that HoneyPoint was an incredible tool in helping them find the hosts that were just not up to par.

As the product matures, we continually get more and more feedback from clients about innovative uses for the tools. If your organization has leveraged HoneyPoint in new ways, please let us know so we can share them with others who may be able to benefit from the idea. As always, thanks for the attention to the product, we truly love the feedback and the incredibly warm response it continues to receive from people and organizations around the world!

MSI Becomes a PCI Approved Scanning Vendor

MicroSolved, Inc. is pleased to announce that its SecureAssure vulnerability assessment solution has successfully completed the PCI Scanning Vendor Compliance Testing. This process allows MicroSolved to serve as an ASV for organizations concerned with PCI compliance.

โ€œMore organizations can now benefit from working with MicroSolved as their information security partner. Companies with compliance needs centering on payment cards can now leverage our exceptional methodologies and world class reporting. In addition, our process of manual vulner- ability verification eliminates much of the overhead and complexity of compliance by removing false positives and keeping your resources focused on the real problems.โ€ stated Brent Huston, CEO of MicroSolved.

For more information, or to schedule assessments of your organization, please contact your account executive via phone or click here for email.

Another Great CUISPA Event

MSI attended the latest CUISPA event in Boston last week and it was a fantastic show. Credit union security folks were in attendance from all around the US and the speakers did a fine job of knowledge transfer.

Many thanks to all who stopped by the booth and showed their appreciation for our State of the Threat updates to CUISPA members. We have made arrangements with CUISPA to keep them coming each quarter!

I am not allowed to “spill the beans”, but in appreciation of our warm reception, we will soon be making a very special offer to all CUISPA members. Stay tuned to both CUISPA and our site to learn about this special offer that just might make your future workload quite a bit lighter! ย ย  ๐Ÿ˜‰

Thanks again for the warm welcome in Boston. Special thanks to Kelly at CUISPA for the awesome event!

Book Review: Code Craft

Code Craft

By: Pete Goodliffe

Publisher: No Starch Press

Price: $44.95

Rating (out of 5): *****

This is an excellent book about moving from average software development to professional-grade software development. The book basically covers the topics needed to teach developers how to make better software in a more effective manner than may be happening in many organizations today. Topics covered include: effective commenting and documentation, industry standards for software testing (including security), interface design standards, group development practices, mechanisms for spec development and code review and even insights into managing programmers more effectively.

If you are a developer or manage a group of developers, this book will teach you the softer skills to complement the technical skills you have already mastered. Given the complexity of today’s software, it is these softer skills that often make all the difference between career success and remaining “one of the code jockeys”.

My favorite thing about this book is the insightful tone it uses to get its point across. It truly reflects wisdom and experience from the author without getting the “preachy tone” some technical books seem to take on. Be prepared though, the book is big, some 500+ pages of actual content – so if you just finished that huge Harry Potter book everyone is reading, this may seem a little longer than you like for reading in your easy chair. But, unlike Harry Potter, this book’s payoff is long term career growth and skills improvement!