Wilford  Pagac

Wilford Pagac

1600362000

Bluetooth Bug Opens Devices to Man-in-the-Middle Attacks

A high-severity Bluetooth vulnerability has been uncovered, which could enable an unauthenticated attacker within wireless range to eavesdrop or alter communications between paired devices.

The flaw (CVE-2020-15802), discovered independently by researchers at the École Polytechnique Fédérale de Lausanne (EPFL) and Purdue University, is being referred to as “BLURtooth.” The issue exists in the pairing process for Bluetooth 4.0 through 5.0 implementations. This pairing process is called Cross-Transport Key Derivation (CTKD).

“Devices… using [CTKD] for pairing are vulnerable to key overwrite, which enables an attacker to gain additional access to profiles or services that are not restricted, by reducing the encryption key strength or overwriting an authenticated key with an unauthenticated key,” according to a security advisory on Wednesday by the Carnegie Mellon CERT Coordination Center.

#vulnerabilities #web security #authentication keys #bluetooth #bluetooth 4.0 #bluetooth 5.0 #bluetooth classic #bluetooth low energy #blurtooth #cross-transport key derivation #cve-2020-15802 #man-in-the-middle attacks #mitm

What is GEEK

Buddha Community

Bluetooth Bug Opens Devices to Man-in-the-Middle Attacks
Wilford  Pagac

Wilford Pagac

1600362000

Bluetooth Bug Opens Devices to Man-in-the-Middle Attacks

A high-severity Bluetooth vulnerability has been uncovered, which could enable an unauthenticated attacker within wireless range to eavesdrop or alter communications between paired devices.

The flaw (CVE-2020-15802), discovered independently by researchers at the École Polytechnique Fédérale de Lausanne (EPFL) and Purdue University, is being referred to as “BLURtooth.” The issue exists in the pairing process for Bluetooth 4.0 through 5.0 implementations. This pairing process is called Cross-Transport Key Derivation (CTKD).

“Devices… using [CTKD] for pairing are vulnerable to key overwrite, which enables an attacker to gain additional access to profiles or services that are not restricted, by reducing the encryption key strength or overwriting an authenticated key with an unauthenticated key,” according to a security advisory on Wednesday by the Carnegie Mellon CERT Coordination Center.

#vulnerabilities #web security #authentication keys #bluetooth #bluetooth 4.0 #bluetooth 5.0 #bluetooth classic #bluetooth low energy #blurtooth #cross-transport key derivation #cve-2020-15802 #man-in-the-middle attacks #mitm

Houston  Sipes

Houston Sipes

1596886380

ASUS Home Router Bugs Open Consumers to Snooping Attacks

The two flaws allow man-in-the-middle attacks that would give an attacker access to all data flowing through the router.

A pair of flaws in ASUS routers for the home could allow an attacker to compromise the devices – and eavesdrop on all of the traffic and data that flows through them.

The bugs are specifically found in the RT-AC1900P whole-home Wi-Fi model, within the router’s firmware update functionality. Originally uncovered by Trustwave, ASUS has issued patches for the bugs, and owners are urged to apply the updates as soon as they can.

The first issue (CVE-2020-15498) stems from a lack of certificate checking.

The router uses GNU Wget to fetch firmware updates from ASUS servers. It’s possible to log in via SSH and use the Linux/Unix “grep” command to search through the filesystem for a specific string that indicates that the vulnerability is present: “–no-check-certificate.”

In vulnerable versions of the router, the files containing that string are shell scripts that perform downloads from the ASUS update servers, according to Trustwave’s advisory, issued on Thursday. This string indicates that there’s no certificate checking, so an attacker could use untrusted (forged) certificates to force the install of malicious files on the targeted device.

An attacker would need to be connected to the vulnerable router to perform a man in the middle attack (MITM), which would allow that person complete access to all traffic going through the device.

The latest firmware eliminates the bug by not using the Wget option anymore.

The second bug (CVE-2020-15499) is a cross-site scripting (XSS) vulnerability in the Web Management interface related to firmware updates, according to Trustwave.

“The release notes page did not properly escape the contents of the page before rendering it to the user,” explained the firm. “This means that a legitimate administrator could be attacked by a malicious party using the first MITM finding and chaining it with arbitrary JavaScript code execution.”

ASUS fixed this in the latest firmware so that the release notes page no longer renders arbitrary contents verbatim.

“Since routers like this one typically define the full perimeter of a network, attacks targeting them can potentially affect all traffic in and out of your network,” warned Trustwave.

ASUS patched the issues in firmware version 3.0.0.4.385_20253.

The bug disclosure comes less than two weeks after a bombshell security review of 127 popular home routers found most contained at least one critical security flaw, according to researchers. Not only did all of the routers the researchers examined have flaws, many “are affected by hundreds of known vulnerabilities,” the researchers said.

On average, the routers analyzed–—by vendors such as D-Link, Netgear, ASUS, Linksys, TP-Link and Zyxel—were affected by 53 critical-rated vulnerabilities (CVE), with even the most “secure” device of the bunch having 21 CVEs, according to the report. Researchers did not list the specific vulnerabilities.

#iot #vulnerabilities #web security #asus #bug #cve-2020-15498 #cve-2020-15499 #firmware update #home router #man in the middle #mitm #patch #rt-ac1900p #security vulnerability #total compromise #trustwave

Gloria magee

Gloria magee

1618472877

Cannot start Microsoft Office Outlook

On this site, you’ll see working methods to repair the “can’t start Microsoft Outlook” issue. Additionally, these methods can enable you to get up your Outlook and running again without any mistakes.

Now, let us see how it is possible to fix and prevent a much worse situation when you can’t start Outlook. But first, we’re beginning from the reason and symptoms of the mistake.

Recover your Outlook with Outlook PST Recovery.

Which are the causes and symptom of the “Don’t start Microsoft Outlook” mistake?

The most important symptom of the matter is quite clear and readily identifiable. After you click on Outlook you’ll discover a dialogue box appears and can be hanging for a little while, then you receive the “can’t start Microsoft view. cannot open the outlook window. The set of connections can’t be opened” error.

Can’t start Microsoft Outlook

In case the file has corrupted then you are going to discover that its dimensions become kb.

Additionally, there’s absolutely no specific cause for this mistake, but all versions of MS Outlook from 2003 into Outlook 2019 might be impacted. Anyhow, whatever the motive is, the result is the same – you can’t start Outlook. . And the answers for this query are given below.

Workarounds to Solve “Don’t start Microsoft Outlook” problem

Now you understand the reasons why causes “can’t start Microsoft outlook. Cannot open the view window. The collection of folders cannot be opened” problem. Therefore, let us see how to have them repaired. Below there are 2 workarounds that fix this situation.

1. Recover the Navigation Pane configuration file

Typically it’s the corrupt Navigation Pane settings file that limits Microsoft Outlook from the beginning, so the first thing you have to do would be to regain it. Here is how you can do this task:

Click on the Start button.

Following that, Compose the"outlook.exe /resetnavpane" control and click on OK.

If you discover any difficulty and unable to recoup the Navigation pane settings document, then attempt to manually delete the XML file which stores the navigation pane configurations. To do this, go using the next measures:

It’ll open the folder in which MS Outlook Setup files are saved.

Cannot start Microsoft Outlook

2. Repair your Outlook data files with the help of Scanpst.exe.

Then default Outlook data file PST may be damaged or deleted, that’s the reason you can’t start Outlook. The document Outlook.pst isn’t a personal folders file"

To do so, do the Actions listed below:

Below you’ll discover Scanpst.exe from the listing. Double click it.

Additionally, you can go via Start and kind scanpst.exe from the Search box.

Following that, you’ll discover a window click the Browse button to choose your default Outlook.pst file.

After a couple of minutes, your document is going to be fixed.

Hopefully, your document got fixed. If not Then You Need to attempt the alternative provided below:

The majority of the time it fixes the documents. However, if the corruption is intense then this instrument fails. In these situations, you want to utilize PST File Retrieval designed by Mailconvertertools. A novice user can utilize this tool and fix their own Outlook PST files. It’s the very best way to recuperate and fix Outlook PST files and it simplifies all the constraints of the Inbox Repair Tool.

Conclusion

This technical manual is all about how to resolve “can’t start Microsoft outlook. Cannot open the view window. The collection of folders cannot be opened” I am hoping that your issue has been solved. When there’s any difficulty regarding any measure then don’t hesitate to contact.

#cannot open the outlook window #the set of folders cannot be opened outlook #outlook the set of folders cannot be opened #the set of folders cannot be opened outlook 2016 #outlook the information store cannot be opened #outlook information store could not be opened

Lenora  Hauck

Lenora Hauck

1597496340

Man In The Middle Attack (MITM) Part 2 

Building a packet sniffer using Python 🐍 that extracts visited URLs and user credentials.

Image for post


This is part 2 of Man In The Middle (MITM) attack. If you haven’t read part 1 then I strongly suggest you read that before reading part 2. You can find the link to Part 1 in the next section.


What is a Packet Sniffer?

A packet sniffer is a tool that is used to monitor networks and to diagnose any network problems. It is commonly used by network technicians. Hackers often use this to spy on user’s network traffic and for extracting passwords.

Packet sniffers log network traffic on a network interface that they have access to. It can see every packet that flows to and from an interface.

You’d be wondering that we are designing a packet sniffer but the title says Man In The Middle Attack. This is because in Part 1 we wrote a Python script (ARP Spoofing) that allows us to become a Man In The Middle. The purpose of the packet sniffer is to capture the victim’s (the user which has been attacked using ARP Spoofing) network traffic and extract visited URLs and credentials.

#python #programming #packet-sniffing #cybersecurity #man-in-the-middle-attack

Elton  Bogan

Elton Bogan

1596742860

Man In The Middle Attack (MITM) Part 1 — ARP Spoofing

What is Address Resolution Protocol (ARP)?

In a network, computers use the IP Address to communicate with other devices, however, in reality, the communication happens over the MAC Address. ARP is used to find out the MAC Address of a particular device whose IP address is known. For instance, a device wants to communicate with the other device on the network, then the sending device uses ARP to find the MAC Address of the device that it wants to communicate with. ARP involves two steps to find the MAC address:

  1. The sending device sends an ARP Request containing the IP Address of the device it wants to communicate with. This request is broadcasted meaning every device in the network will receive this but only the device with the intended IP address will respond.
  2. After receiving the broadcast message, the device with the IP address equal to the IP address in the message will send an ARP Response containing its MAC Adress to the sender.

If it is still not clear what ARP is and how it works then refer to the images below.

Image for post

Fig 1. ARP Request

Image for post

Fig 2. ARP Response


What is ARP Spoofing?

ARP spoofing is a Man In The Middle (MITM) attack in which the attacker (hacker) sends forged ARP Messages. This allows the attacker to pretend as a legitimate user as it links the attacker machine’s MAC Address to the legitimate IP Address. Once the MAC Address has been linked the attacker will now receive the messages intended for the legitimate IP Address. Furthermore, ARP Spoofing allows the attacker can intercept, modify, and drop the incoming messages.

ARP Spoofing is only possible on 32-bit IP Addresses (IPv4) and not on IPv6.However, it is widely used because most of the internet still works on IPv4.

Let’s understand ARP Spoofing more clearly with the help of diagrams 😃.

Image for post

Fig 3. Normal Network

Fig 3. demonstrates the working of a normal network (no malicious activity) and how a device (hacker or victim) access the Internet with the help of an access point. All the messages pass through the access point. For instance, a device (hacker or victim) sends requests to access the resources on the Internet and in turn, receives responses. These **requests **and **responses **always pass through the access point and therefore the access point is called the Gateway to the Internet.

Note: In this article, the words **“Gateway”_, _“Access Point”, “Router”_ and _“Default Gateway” _are used interchangeably. Also the words _“attacker”_ and _“hacker” _are used similarly. The words _“target”_ and _“victim”**_ means the same._

Image for post

#python #arp-spoofing #cybersecurity #man-in-the-middle-attack #security