Tuesday, September 10, 2013

Vulnerability bureaucracy: Unchanged after 12 years

By Cesar Cerrudo @cesarcer

One of my tasks at IOActive Labs is to deal with vulnerabilities; report them, try to get them fixed, publish advisories, etc. This isn't new to me. I started to report vulnerabilities something like 12 years ago and over that time I have reported hundreds of vulnerabilities - many of them found by me and by other people too.

Since the early 2000's I have encountered several problems when reporting vulnerabilities:
  • Vendor not responding
  • Vendor responding aggressively
  • Vendor responding but choosing not to fix the vulnerability
  • Vendor releasing flawed patches or didn't patch some vulnerabilities at all
  • Vendor failing to meet deadlines agreed by themselves

Tuesday, September 3, 2013

Emulating binaries to discover vulnerabilities in industrial devices

By Ruben Santamarta @Reversemode

Emulating an industrial device in a controlled environment is a really helpful security tool. You can gain a better knowledge of how it works, identify potential attack vectors, and verify the vulnerabilities you discovered using static methods.

This post provides step-by-step instructions on how to emulate an industrial router with publicly available firmware. This is a pretty common case, so you should be able to apply this methodology to other scenarios.