X
Settings
Language

Country

Framework language
Choose the country,language and framework settings
Privacy
HTTPS + POST : An encrypted SSL(HTTPS) connection ensuring your privacy. The search variables like keywords, etc. are encrypted and masked.
HTTPS + GET : The data transfer is enrypted but search variables displayed in the URL.
HTTP + GET : Non encrypted datatransfer
SSL key exchange / Cipher
Chromium based browsers might not work with the STRONG+ cipher set! You need to delete your settings cookie if you cannot build up an SSL connection. Try the STRONG cipher set instead.
The FAST cipher set is only recommended for outdated browser which are still using SSL3 or do only support weak ciphers for the key exchange. Do not use this cipher set if you are using software which is up to date!
Session key extension

Bind Session to IP
These two settings will improve the security of your session. By giving an additional session salt and/or binding your session to your current IP address your new session will be secured individually making it almost 100% unbreakable for any random hacking attempt and man in the middle attacks! If you change one of those values your current session will be reinitiated! This means you will be logged out if you are logged in right now. Check your session security settings (user details), if you want to kill remaining sessions. It is not recommended to bind your IP to your session if you are using a VPN/PROXY/ISP Network with altering outbound IPs since you will be logged out everytime your IP changes.
World Wide Web:
primary
secondary
Images:
primary
secondary
Thumbnails
Show external thumbnails and images.
Count of search results per page
Content filter

Violence
Filter adult material


Parental lock: with setting a password you are activating the parental lock. You are able to reset it by typing in the correct password clicking reset and saving the settings. To use the child protection properly you need to create a separate system account for your child with no write access to cookies

Length of descriptions
Activate social platform plugins
With activating this option social plugins embed to this website will get loaded automatically. You will automatically accept all terms of used social plugin hosters by setting activated. Please reconsider our terms and links to related terms and datasecurity for more information
Advertisements
Color style
MENU:
INPUT/SELECT BG:
INPUT/SELECT TEXT-COLOR:
HEADINGS:
LINK TEXT-COLOR:
CONTENT TEXT-COLOR:
Background Image
Save Settings
Close Settings
🗙

Blog

  • Whussup.net
  • Blog
TOR Network: Modified Binaries While Downloading
Translations: de

Tor is originally supposed to aid journalists and activists to gain more anonymity on the net. But being more anonymous does not imply more security using the Tor Network for downloading binary data(executables like EXE, etc.), if you are, there is no encryption and transfer validation (MD5 Checksum, PGP Signature, etc.) available. The possibility of altering downloaded binaries was demonstrated by Leviathansecurity : http://www.youtube.com/watch?v=LjUN9MACaTs

The attacker is using a binary patch framework like BDF and a proxy server(e.g. BDFPoxy) to alter any unencrypted binary on the fly by inserting a precompiled rootkit code into code caves(areas filled with 0 in the binary). This practice seems to have become more common than expected, that's why many mainstream Linux distributors were most of the time/always using checksums for binaries and others at least started doing the same. You should be cautious using proxy servers and services like Tor.

To prevent this kind of attacks always use a strong SSL encryption, if you are downloading a file and validate it with a MD5-Checksum or PGP Signature if possible.

Wintendo users are lucky this time : Leviathansecurity tells Windows PE Updatefiles were getting now recognized as modified by the verification process. This does not apply to other binaries which are downloaded manually or by any other automated user-defined UpdateTool. You should always check, if your download is valid, by using a provided MD5 Checksum.

Since the common Linux user will compile any binaries from source, he/she should not come across this kind of problems (e.c.: crosscompilers, etc.) . The common procedure should look like this : dl source -> patch -> configure -> compile . Always check compressed data with a MD5 Checksum or PGP Signature. If you are using distributions with precompiled binaries you should not be afraid since those files get commonly validated during the update process(using apt, yum, etc.).

Because most apps are not available as source code on Mac, users are could get a more common target for those forms of attack using non-official packages, for instance. As in the Unix Universe it is standardized to check downloads with a MD5-Checksum or PGP Signature, the update process of an OSX system should not be harmed at all. If possible, you should always validate your manually downloaded binaries.

Source: http://www.leviathansecurity.com/blog/the-case-of-the-modified-binaries/

 

How to protect yourself :

Windows: - a Firewall with execution/mem system hook support; means you can control if a process is allowed to do different things just like SELinux for example.

- An antivirus software which checks and updates frequently.

- Manage the rights for users and processes

- Validate your downloads.

 

Linux:

- Use PaX/Grsec Kernel + UBAC + SELinux. You need to follow the guidelines of your Linux distributor. I would recommend to start off with a Fedora/Debian/Ubuntu and switch to Gentoo or vanilla if you gained enough knowledge to handle a Linux system on your own.

- Do not compile source and execute it's binaries if you are not aware of what it is doing.

- Validate your downloads.

 

OSX:

- Configure your environment : OSX comes with an implementation of SELinux(MLS) and other security fixes. Compared to Linux it is easy to set up having a graphical user interface.

- Manage process, user, file system, etc. rights and directives for any application/process which could be critical for your system security.

- Validate your downloads.

 

 

Posted at 2014-10-28 12:29:10
( updated at 2018-09-17 22:26:06 - n4sh )
in securityn3m

Tags:
Tor Networkpatched binariesanonymitysecurity
  • all entries
  • Messages
  • Manuals
  • security

  • Whussup.net
    • Home
    • General Information
    • Contact
    • Blog
    • Campaigns
    • Data Protection & Terms Of Use

  • Donations
Paypal

    • Tools
      • Github
      • Check IP Address
    0
    Guest
    • Whussup.net
      • Home
      • General Information
      • Contact
      • Blog
      • Campaigns
      • Data Protection & Terms Of Use
      • Login
      • Logout
      • User Details
      • Create User Account
      • Settings
    • GAMES
    gear
    Language:
    Sort:
    Filter:
    Geolocation:
    Country:
    Google Domain:
    Simplified Chinese:
    AND search query:
    Search in URL:
    Search in URL - Filter:
    Contained search queries:
    Excluded search queries:
    OR search queries:
    related URL:
    Date:
    File type (Extension):
    Image size:
    Image type:
    Color:
    Dominant color:
    Copyright:



    Filter:
    Alternative Search Query
    Show All Indexes
    HD 3D game language-Filter country-Filter
    minimal length
    Maximal Length
    Free shippingSorting
    Condition
    Min.:

    Max.:
    Sorting:
    Title:Original Title:Description:Year: - Release Date:Genre:Language:Spoken Languages:Country:Duration: - Colour Mode:Dimensions:Soundtrack:Production Companies:Production Countries:
    ----------------------------------------
    Actors:Thanks:Literary:Art:Camera:Casting:Cinematography:Costume:Decoration:Directing:Directing (art):Directing (assistant):Editing:Lighting:Location:Makeup:Music:Other:Producing:Producing (design):Producing (management):Sound Technology And Electrics:Special Effects:Stunts:Logistics:Visual Effects:Literary:
    Suggestions
    Manual
    Plugin Name:generate
    >>
    *: