Tuesday, November 30, 2010

Telecom Working Capital !

Working Capital 2010, Rome(Italy). I will be there ! Live Streaming From here.

Friday, November 26, 2010

David Bismark: E-voting without fraud

Brilliant Talk on E-voting "without frauds".
It seems is talking about scantegrity or any other Software Independent voting system (great article from NIST).

But there are many different ways to attack a system like that (Verifiable). For example a great way to attack the system is to attack the feedback chain back to the voter. Let me try with an example:
Voter A votes for OBM. Pol-worker P scans A's ballot and destroys it. A keeps the "receip" and later he will be able to verify it through an apposite service (Check Phase in the following image).

Assuming that everything goes well: the real vote goes to the tally servers and is really counted (with anonymity properties). The attacker may attack the feedback services showing up a wrong feedback to the A. Now A believes that something went wrong since the code he has does not match to the one saw in the feedback service. Everything went well, but the A believes that something went wrong. This is a reputation attack. The attacker modifying the feedback chain makes the voters believe wrong.

Making the voters believe that the voting process has been compromised is the same than really compromise the system. Results and causes are the same.

Wednesday, November 24, 2010

Spoofing Geolocations on Facebook Places

this easy trick is really funny :). I can imagine a lot of frauds thanks to such a trick. Don't forget that in some countries facebook helps police to investigate on crimes. Being able to prove your presence on another place rather the place you have been, it's really dangerous.

I definitely like Facebook company, but I think they need a little of "security reinforcement" :).

BlackBerry simulator allows you to tweak the GPS to any location on the planet, and the applications on the device respond as such. Of course this is just to test out applications, but why nobody has used it on Facebook Places before is beyond me. But then again, Facebook Places has only been out for the BlackBerry this past week, so it's not much time to really click on to this sort of thing.By editing the GPS location through Simulate > Add > then editing the Name, Latitude and Longitude, which you can get by enabling the LatLong tool on Google Maps Labs, you can spoof your Facebook Places into thinking you're in one place when you're not. Always add more than 7 satellites though as this makes the device think you are in a more accurate location than it is.

Monday, November 22, 2010

Stuxnet Malware.

Folks, one of the most interesting malware I've ever seen: the Stuxnet, reprogramming industrial control systems. Its final goal is to reprogram industrial control systems (ICS) by modifying code on programmable logic controllers (PLCs) to make them work in a manner the attacker intended and to hide those changes from the operator of the equipment. In order to achieve this goal the creators amassed a vast array of components to increase their chances of success. Thanks to Symantec great report on it !

Good Job guys !

Wednesday, November 17, 2010

Body Scanner Pic Gallery

Sooner or later this would happen: Federals accidentally saved body scan images. I didn't speak with Bruce Schneier, but I am pretty sure he would laughed. This seems so obvious to me... but anyway, lets see what happened.

TSA has said over and over again that body imagers used for security purposes are unable to store, export or print images of passengers.But this week, The U.S. Marshals Service admitted that it had accidentally saved tens of thousands of images recorded on a machine used at a security checkpoint in a Florida courthouse. According to this article on CNET :

"William Bordley, an associate general counsel with the Marshals Service, acknowledged in the letter that 'approximately 35,314 images...have been stored on the Brijot Gen2 machine' used in the Orlando, Fla. federal courthouse. In addition, Bordley wrote, a Millivision machine was tested in the Washington, D.C. federal courthouse but it was sent back to the manufacturer, which now apparently possesses the image database."

Here please find the original article and the original video made by GIZMODO crew. For more information Discovery and NPR.

Sunday, November 14, 2010


Hi folks,
this month is going to be very very busy for me, a lot of writing reviewing and teaching. Today founding 5 free minutes I wanna point out a really useful tool called text2bib. Text2Bib converts a plain text list of references in any style to BibTeX ... well, in almost any style. Minimal requirements:

1) Either references are separated by blank lines or each line is a separate reference or each reference starts with \bibitem{}, \bibitem{

Friday, November 5, 2010

Iphone V.S Android V.S BlackBerry

Folks, I believe this is a self-explanatory brochure... (click on the pic to zooming)

Thursday, November 4, 2010

Windows AutoPWN a sweet first step

Hi folks,
today I wanna point out Windows AutoPWN. The goal of the tool is pretty clear:
Autohack your targets with least possible interaction.

Window AutoPWN born to take automatic the way of exploiting windows platforms. It works pretty well, you just need to enter the target IP (or host name) and the local IP (or host name); after that only some optional field such as: CMS path, PHP remote shell, FTP username and proxy. By clicking on the WINAUTOPWN button and everything is done.

The basic concept behind this tool is the same of metasploit auto-exploit plugin. Basically it performs a port scanning within enabled queries, this techniques allows the program to discover what service is hid behind such a port number. Once the program knows what services have been installed on the machine it tries all the possible exploits over the specific ports; one by one. Of course this procedure is not smart at all, it is time and resource consuming, but it is totally automatic. If the launched exploit goes right the program (automatically) spawn a back-tcp-shell to the attacker giving shell control over the victim.

Again, this is not clever, in fact if you try to use this technique in a real hacking scenario you probably will catched from IDS/IPS or Anti-malware behavior analysis tools. On the other hand this is perfect as the first step of penetration testing.

Monday, November 1, 2010