Oct 30 2009

Origami – Parse, Analyze, Forge PDF Documents

Origami is a Ruby framework designed to parse, analyze, and forge PDF documents. This is NOT a PDF rendering library. It aims at providing a scripting tool to generate and analyze malicious PDF files. As well, it can be used to create on-the-fly customized PDFs, or to inject (evil) code into already existing documents.

PDF Origami

Features:

  • Create PDF documents from scratch.
  • Parse existing documents, modify them and recompile them.
  • Explore documents at the object level, going deep into the document structure, uncompressing PDF object streams and desobfuscating names and strings.
  • High-level operations, such as encryption/decryption, signature, file attachments…
  • A GTK interface to quickly browse into the document contents.

Full Scripts:
Some scripts are provided to help in performing common actions on PDF files. You can contribute more by sending your own scripts to origami(at)security-labs.org.

  • detectjs.rb: search for all JavaScript objects.
  • embed.rb: add an attachment to a PDF file.
  • create-jspdf.rb: add a JavaScript to a PDF file, executed when the document is opened.
  • moebius.rb: transform a PDF to a moebius strip.
  • encrypt.rb: encrypt a PDF file.

Download: origami-1.0.0-beta1.tar.gz

Oct 10 2009

Computer/Network Security Consultant Ranked 8th Best Job in US

Security Professional
8. Computer/Network Security Consultant
Median salary (experienced): $99,700
Top pay: $152,000
Job growth (10-year forecast): 27%
Sector: Information Technology

What they do: Protect computer systems and networks against hackers, spyware, and viruses. “I consider myself a cybercrime fighter,” says Gregory Evans, an independent computer security consultant in Atlanta.

Why it’s great: No company or government agency can afford to have a serious breach in the security of its computer system. New technologies and an unending supply of creative hackers around the world keep the field challenging. Consultants can often work from home. And top-level pros command big paychecks.

Drawbacks: Talk about stress. If a system is infiltrated by a virus or hacker, it could mean lights out for the security consultant’s career. “This is a job you can’t afford to ever fail in,” says Evans.

Pre-reqs: Mostly major geekdom, since the skills can be self-taught. Still, a computer science degree comes in handy. An information systems security professional certification (CISSP) is increasingly favored. Experience is key for better-paying positions: Most companies won’t hire a consultant with less than five years of experience.

Source: Yahoo! Finance

Oct 09 2009

Botnet caught red handed stealing from Google, Yahoo! and Bing

A recently discovered botnet has been caught siphoning ad revenue away from Google, Yahoo! and Bing and funneling it to smaller networks.

According to researchers at Click Forensics, computers that are part of the so-called Bahama Botnet are infected with malware that sends them to counterfeit search pages instead of the real thing. They look authentic, and with the help of DNS poisoning routines, they even display google.com yahoo.com or bing.com in the address bar.

But the search results returned by these bogus sites have been ginned in some significant ways. While links contained in the organic results ultimately lead to a real site, browsers are first redirected to a series of ad networks that receive a small referral fee. Sponsored links, which typically pay the real search engine each time they are clicked, have also been jury rigged so a smaller ad network gets paid instead.

“The idea is to make money through click fraud,” said Matt Graham, a risk analyst at Click Forensics that provides auditing services to advertisers. “When those people actually do searches, that’s when these guys can display these ads hidden in the organic search results.”

Source: The Register

Oct 09 2009

Samhain – Host-Based Intrusion Detection System

The Samhain open source host-based intrusion detection system (HIDS) provides file integrity checking and logfile monitoring/analysis, as well as rootkit detection, port monitoring, detection of rogue SUID executables, and hidden processes.

It has been designed to monitor multiple hosts with potentially different operating systems, providing centralized logging and maintenance, although it can also be used as standalone application on a single host.

Samhain is a multiplatform application for POSIX systems (Unix, Linux, Cygwin/Windows).

Features:

  • PCI DSS Compliance
  • File integrity checks
  • Host integrity monitoring
  • Logfile monitoring/analysis
  • Log facilities
  • Integration with other systems / Active response

Download: Samhain Version 2.5.9c