ECL Labs ECL Labs security releases directly to your bloodstream http://www.ecl-labs.org MetaBreaking MetaTrader (and FCXM Trading Station too!) <p>Security in proprietary financial application stacks is something the security community rarely talks about. Either due to the fact its difficult to obtain access to such setups, or because they are not in widespread use, basic security issues in such platforms have mostly flown under the radar.</p> <p>Today, we would like to announce the slides from our <a href="http://pacsec.jp/agenda.html">PacSec 2013</a> talk on the state of affairs in proprietary FOREX trading platforms. In our research, we discovered several vulnerabilities and design issues in the way MetaQuotes MetaTrader 4 and FXCM’s Trading Station (and SDK) communicate over the internet, transmit credentials and authenticate to their respective services.</p> <p>The slides can be downloaded from <a href="/papers/metabreaking-mt4-v6.pdf">here</a>. Thanks to everyone who attended, gave us feedback and bought us beer!</p> http://www.ecl-labs.org/2013/11/13/metabreaking-metatrader.html Roboo - HTTP Robot Mitigator released! <p>We’re happy to announce the release of Roboo - the first and most advanced open-source HTTP Robot mitigator of its kind!</p> <p>Roboo uses advanced non-interactive HTTP challenge/response mechanisms to detect and subsequently mitigate HTTP robots, by verifying the existence of HTTP, HTML, DOM, Javascript and Flash stacks at the client side.</p> <p>Such deep level of verification weeds out the larger percentage of HTTP robots which do not use real browsers or implement full browser stacks, resulting in the mitigation of various web threats:</p> <ul> <li>HTTP Denial of Service tools - e.g. Low Orbit Ion Cannon</li> <li>Vulnerability Scanning - e.g. Acunetix Web Vulnerability Scanner, Metasploit Pro, Nessus</li> <li>Web exploits</li> <li>Automatic comment posters/comment spam as a replacement of conventional CAPTCHA methods</li> <li>Spiders, Crawlers and other robotic evil</li> </ul> <p>You can find the first public version <a href="/code/Roboo-0.50-BH.tar.gz">here</a> - for more information, refer to the presentation “Building Floodgates: Cutting-Edge Denial of Service Mitigation” given at <a href="http://blackhat.com/html/bh-eu-11/bh-eu-11-briefings.html">Black Hat Europe 2011</a> (<a href="/papers/yg-ab-building_floodgates.pptx">slides</a>) and the <a href="https://github.com/yuri-gushin/Roboo">Roboo source code repository</a>.</p> http://www.ecl-labs.org/2011/03/17/roboo-http-mitigator.html A tool for creating IDS/IPS signatures for SMTP based worms <p><strong>Worminator</strong> (<a href="/code/Worminator-src.tgz">source</a> &amp; <a href="/code/Worminator-bin.tgz">binary</a>) - A Win32 tool for easing/automating the process of creating IDS/IPS signatures for SMTP based worms, providing a comfortable GUI, including raw base64 variants and Snort signatures support. Written in Delphi.</p> http://www.ecl-labs.org/2006/11/29/a-tool-for-creating-signatures-for-smtp-worms.html PoC exploit for the NetFilter SNMP ALG helper DoS vulnerability <p>Proof of concept <a href="/code/ecl-nf-snmpwn.c">exploit code</a> for the double-free vulnerability in NetFilter’s <code class="language-plaintext highlighter-rouge">snmp_trap_decode()</code> function in Linux kernels 2.6.16.17 and older, causing a kernel panic (CVE-2006-2444)</p> http://www.ecl-labs.org/2006/06/30/dos-exploit-for-netfilter-snmp-alg.html NIDS polymorphic evasion - The End? <p>Today’s Network Intrusion Detection Systems, alarmed of the dangers brought by polymorphic shellcodes, try to detect them using desperate methods that eat up CPU cycles. This is done so the claim can be made that such NIDS foil even the most devious crackers. The truth of the matter is, they don’t.</p> <p><a href="/papers/ecl-poly.txt">This paper</a> demonstrates the weaknesses in today’s polymorphism detection methods, and explores techniques to exploit them. The accompanying ECL-Polynop tool can be obtained from <a href="/code/ecl-poly.tar.gz">here</a>.</p> http://www.ecl-labs.org/2005/07/25/nids-polymorphic-evasion-the-end.html Exploit for a stack-based buffer overflow in MySQL MaxDB <p>An <a href="/code/ecl-maxdb.c">exploit</a> for the HTTP GET request with long file parameter after a percent (“%”) character vulnerability in MySQL MaxDB 7.5.00.26 and earlier (CVE-2005-0684)</p> http://www.ecl-labs.org/2005/04/29/exploit-for-a-buffer-overflow-in-mysql-maxdb.html PoC remote DoS code for MS05-019 <p>Proof of concept <a href="/code/ecl-winipdos.c">exploit code</a> for the IP options parsing off-by-one vulnerability in Microsoft Windows: Vulnerabilities in TCP/IP Could Allow Remote Code Execution and Denial of Service <a href="http://www.microsoft.com/technet/security/bulletin/ms05-019.mspx">MS05-019</a> (CVE-2005-0048)</p> http://www.ecl-labs.org/2005/04/16/poc-remote-dos-code-for-ms05-019.html Exploit code for Exim's SPA vulnerability <p>Release of <a href="/code/ecl-eximspa.c">exploit code</a> for a buffer bounds checking vulnerability in <a href="http://www.exim.org/">Exim</a>’s SPA authentication routines (CVE-2005-0022)</p> http://www.ecl-labs.org/2005/02/05/exploit-code-for-exims-spa-vulnerability.html Advisory for privilege escalation vulnerabilities in W-Channel embedded Linux <p>TC-IDE’s W-Channel embedded Linux contains multiple local vulnerabilities in versions prior to v1.54. The advisory is <a href="/advisories/ecl-channel.adv">here</a></p> http://www.ecl-labs.org/2004/11/20/privilege-escalation-vulnerabilities-in-w-channel-linux.html