October 5, 2008


Filed under: Code, Computers, Programming, Software — omsarti @ 9:34 pm

I recently got pretty sick and tired of sending across source via httpd, if I wanted advice on it and so on. I did a quick search, and discovered on Windows32 there are some implementations of source code uploading applications.

The one I prefer on Windows, is Paster, it was made by Comrade. Take a look at it here at the sourceforge download page, if you're interested in it. It was released under the BSD lisence, thus it's free and open sourced. 😉

I'd highly recommend this, if you program or draw up configurations to



Snake Bytes: New DOS Attack Is a Killer

Filed under: Computers, Hack, Security, Software — omsarti @ 8:57 pm

With thanks to Darkreading

SEPTEMBER 30, 2008 | 2:45 PM — Things are a-brewin’ in Sweden. Sweden is not just home of the infamous bikini team, it is also the home of Outpost 24, an equally sexy software-as-a-service network scanning service, and the employer of my friend Robert E. Lee and his colleague Jack C. Louis. These guys are the inventors of UnicornScan, a user-land TCP stack turned into a port scanner. Never heard of it? Use Nmap exclusively? Well if you run Linux, I suggest checking it out, especially if missed ports in your portscan is inexcusable. But I digress.

Robert and Jack are smart dudes. I’ve known them for years, and they’ve always been one step ahead of the game. A couple of years ago, Jack found some anomalies in which machines would stop working in some very specific circumstances while being scanned. A few experiments, tons of reading through documentation, and one mysteriously named tool called “sockstress” later, and the two are now touting a nearly universal denial-of-service (DoS) attack that can be performed on almost any normal broadband Internet connection — in just a few seconds.

How bad is it? Well, in an interview — (fast-forward five minutes in to hear it in English), the two were asked if they could take out a data center. While they’ve never tried, it appears to be a totally plausible attack. Worse yet, unlike most DoS attacks, the machines often do not come back online once the attack is over. The victim system just doesn’t respond any more. Great, huh?

Robert and I talk a lot, and I asked him if he’d be willing to DoS us, and he flatly said, “Unfortunately, it may affect other devices between here and there so it’s not really a good idea.” Got an idea of what we’re talking about now? This appears not to be a single bug, but in fact at least five, and maybe as many as 30 different potential problems. They just haven’t dug far enough into it to really know how bad it can get. The results range from complete shutdown of the vulnerable machine, to dropping legitimate traffic.

The two researchers have already contacted multiple vendors since the beginning of September (I’ve had a small hand in getting them in contact with one of the vendors). Robert and Jack are waiting with no specific timeline to hear back from the affected TCP stack vendors. Think firewalls, OSes, Web-enabled devices, and so on. Yup, they’ll all need to be hardened, if the vendors can come up with a good solution to the problem. IPv6 services appear to be more affected by the fact that they require more resources and are no more secure since they still reside on top of an unhardened TCP stack.

Jack and Robert are both trying to be as forthcoming as possible with the affected vendors without giving any specific information on how the attack works to the public at large — openly acknowledging how dangerous the attack really is. Their hope is that the vendors appreciate the problem and come up with fixes that may not be initially obvious to them. I asked Robert when they planned to release their tool, to which he said he wasn’t sure he would “ever release sockstress.” The details, however, will be forthcoming once vendor patches are available. There are no mitigating short-term fixes, folks.

I feel winter slowly coming, and it would be a shame if entire power grids could be taken offline with a few keystrokes, or if supply chains could be interrupted. I hear it gets awfully cold in Scandinavia.

Blog at