Yesterday, I posted an article about a Nmap script to detect potentially vulnerable Microsoft IIS FTP servers. I updated the script which now allows an alternative FTP user and password pair to be passed via the command line (thanks to Chris for the comment). If no arguments are provided, an
Category: OS
Detecting Vulnerable IIS-FTP Hosts Using Nmap
A new 0-day exploit for the FTP server included within the Microsoft IIS suite has been released today. Check the post on the Full Disclosure mailing list for more details. Based on an existing Nmap script, I quickly wrote a new one which performs the following actions: Check if anonymous
UNIX Turns 40!
The very first version of the UNIX operating system was born in Augustus 1969! Its early name was Multics (“Multiplexed Information and Computing Service“). Years after years new branches started to build a huge family of different operating systems, all of them descending from the same origin. It has always
Unix OS Security Audit/Assurance Program
I’m just back from the last ISACA Belgian Chapter meeting. Topic of today was about the UNIX OS security audit process. A very large topic! The speaker was Sanjay Vaid. For years now, Linux is deployed in business environment. Linux systems can take several forms: applications servers (print, files, web,
Change Management Using CVS
All administrators already face the following nightmare: It’s 01:00am and you changed a parameter in an application. A few days later, due to instability, you need to rollback. What the hell did you change?”. Of course, changes “on the go” must be avoided like the plague but sometimes, they’re mandatory.
Just Switched to Ubuntu “Jaunty”
A lot has been written about Ubuntu “Jaunty” 9.04 since it has been released. My corporate laptop runs Ubuntu very smoothly. Unfortunately, since the last Nvidia drivers upgrade, I faced a nasty bug. I was running version ‘180-11’ but ‘180-44’ is officially available by default in the latest release. No
Strong Authentication with Linux
Next step in my investigations to implement a strong authentication process on my Linux laptop using the Yubikey. In a previous post, I explained how to use a Yubikey to authenticate on Linux with a PAM module. It works very well but, like I said in the previous article conclusion,
Yubikey Authentication on Linux
In a previous article, I presented the Yubikey product. I also explained why, for security reasons, the usage of two separate Yubikeys could be a plus. One converted to provide a static password and the second left as is (to provide one-time passwords). I received my 2nd Yubikey a few
Fsck’ing OpenBSD File Systems on a Dedibox
Dedibox is a French collocation service part of the Iliad group. They rent dedicated servers at a very good price. In the standard offer, servers can be installed with standard operating systems: UNIX or Windows. “UNIX” includes all major distributions like Ubuntu, CentOS, Fedora, Slackware or Gentoo). I maintain my
New Corporate Laptop Setup
I got my new corporate laptop today, a Dell Latitude E6500, very nice computer. Working as a security consultant, I’m always on the road, connecting my laptop on customers or evil (free Wi-Fi access point or conference) networks . Fortunately, my company allows consultants, if they want, to manage their