May 022016
 

So here it is, PCI SSC has officially released the final version of PCI DSS v3.2 standard document. PCI DSS v3.1 will retire after six months from now and organizations are required to use PCI DSS v3.2 for assessments during this period. The newly added requirements will be considered best practices till 31st January 2018. Post this date they will be effective as requirements. So, What’s New In PCI DSS V3.2? The major requirements are Read More…

Apr 192016
 

Spam-blasting malware infects thousands of Linux and FreeBSD servers. – Ars Technica, Apr 30, 2015. Mumblehard Malware: Linux-Based Spam Generator Went Unnoticed for Five Years. – Security Intelligence, May 5, 2015. One of the longest living email-spam botnets is dead.   – The daily dot, Apr 7, 2016. Why is this malware so hyped? What is Mumblehard? Mumblehard, is a sophisticated malware that affected a huge number of Linux and FreeBSD operating systems and is Read More…

Mar 222016
 

Introduction Device binding is commonly used in android application for tracking a user’s device and ensure accountability. Some android application developers use this device id binding technique to uniquely identify users. When an application offers the discount promo code for user’s benefits, application acquires device attribute to track users against that specific promo code. In some case, the developer uses IMEI number to validate the user’s applied promo code whether it is valid or not. Read More…

Mar 072016
 

Compliance to the PCI DSS standard is mandatory for all entities which store, process or transmit card-holder data associated with Visa, Mastercard, American Express, Discover and JCB. As part of this compliance the council requires organizations to undergo periodic assessments and evaluations. Vulnerability Assessments and Penetration Testing (VAPT) is a vital part of this requirement. Network Intelligence India provides VAPT services specially directed towards such requirements. Below is our summarized methodology, enumerating the list of activities Read More…

Mar 022016
 

Enabling Auditing in Oracle To enable auditing and direct audit records to the database audit trail, we need to do the following. Login as a sys user and execute the below mentioned SQL command and then restart the database. SQL> ALTER SYSTEM SET audit_trail=db SCOPE=SPFILE; System altered. SQL> SHUTDOWN Database closed. Database dismounted. ORACLE instance shut down. SQL> STARTUP ORACLE instance started. Total System Global Area 289406976 bytes Fixed Size 1248600 bytes Variable Size 71303848 Read More…

Mar 012016
 

Introduction When an attacker compromises an end-point system in an organization, he needs some sort of confirmation that: his code was executed on the targeted system he is able to send data out of the organization without raising any alarm with the SOC Simple innocuous data from the compromised host to the attacker’s controlled system – sometimes known as the beacon – helps the attacker fulfill the two goals mentioned above. The channel the beacon Read More…

Feb 262016
 

Introduction: By default, all windows operating systems have a built-in Administrator account which has local administrator rights for the particular system.  Windows active directory provides centralized management for windows system and as per compliance requirements, built-in administrator name and passwords can be changed from there. This can be achieved by any of the following approaches: Manually setting password to each system (This may become tedious when the number of systems increase, thus complicating password management) Read More…