I just learned about a cool little utility called ‘reFind’ that ships with Delphi XE2 and newer:
reFind is a command-line utility for search and replacement of Perl RegEx text patterns in a text file.
- Replace all “TQuery” with “TFDQuery” in pas files:
refind *.pas /I /W /P:TQuery /R:TFDQuery
- Replace all “TxxxQuery” with “TFDQuery” in pas and dfm files:
refind *.pas *.dfm /I /W "/P:T[A-Za-z]+Query" /R:TFDQuery
- Replace all “TxxxQuery” with “TQueryxxx” in pas and dfm files:
refind *.pas *.dfm /I /W "/P:T([A-Za-z]+)Query" /R:TQuery\1
- Remove all “Origin = xxxx” from DFM files:
refind *.dfm /L "/P:\n +Origin =.+$" "/R:"
- Migrate application from BDE to FireDAC:
reFind *.pas *.dfm /X:FireDAC_Migrate_BDE.txt
Always great information annually from WhiteHat Security: http://blog.whitehatsec.com/top-10-web-hacking-techniques-2013/
Every year the security community produces a stunning number of new Web hacking techniques that are published in various white papers, blog posts, magazine articles, mailing list emails, conference presentations, etc. Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and their mobile platform equivalents. Beyond individual vulnerabilities with CVE numbers or system compromises, we are solely focused on new and creative methods of Web-based attack. Now in its eighth year, the Top 10 Web Hacking Techniques list encourages information sharing, provides a centralized knowledge base, and recognizes researchers who contribute excellent work.
Over at SecurityLearn.net, there is an excellent write-up and explanation of the BREACH attack against TLS/SSL.
Back in 2012, when Juliano Rizzo and Thai Duong announced the CRIME attack, TLS / SSL Compression attack against HTTPS, the ability to recover selected parts of the traffic through side channel attacks has been proved. This attack was mitigated by disabling the TLS / SSL level compression by most of the browsers. This year at Black Hat, a new attack called BREACH (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) was announced which commanded the attention of entire industry. This presentation which came up with the title “SSL Gone in 30 seconds” is something that is not properly understood and hence there seems to be some confusion about how to mitigate this. So I felt this article would give some detailed insight into how notorious the attack is, how it works, how practical it is and what needs to be done to mitigate it. So let’s proceed and have a look at the same.
You can view the original BlackHat 2013 ‘SSL: Gone in 30 seconds‘ presentation on YouTube. The slides are here [PDF].
Some great security presentations are available online, from BlueHat 2012.
The goal of the BlueHat Redmond conference is to educate Microsoft engineers and executives on current and emerging security threats, to help them address security issues in Microsoft products and services and protect customers. The BlueHat Redmond conference often serves as a great opportunity for invited security researchers to informally connect with Microsoft engineers who are passionate about security, furthering a bidirectional exchange of ideas at the event.
I love a good RE contest! This one closes Monday, Dec 9, 2013.
So here’s what we’ve cooked up for all of you EH-Netters out there. Just like you, eLS is also driven by passion, so they prepared a small challenge for their future students. Below is an executable just begging to be broken. You’ll have until Monday Dec 9 to break it. If you do, you’ll be entered into a pool of candidates where one of you will win the entire ARES course + Certification Exam for free! Then tune in to our Webcast with eLS’s Armando Romeo and Kyriakos Economou on Tuesday Dec 10 at 11:00 AM CT (GMT-6) for an Intro to RE, the solution to the challenge and the announcement of the winner. Good Luck.
OS X security is evolving: defenses are improving with each OS release but the days of “Macs don’t get malware” are gone. Recent attacks against the Java Web plugin have kindled a lot of interest in hardening and managing Macs. So how does Google go about defending a large global Mac fleet? Greg will discuss various hardening tweaks and a range of OS X defensive technologies including XProtect, Gatekeeper, Filevault 2, sandboxing, auditd, and mitigations for Java and Flash vulns.
A former pentester, incident responder, and forensic analyst, Greg Castle has been responsible for the security of Google’s OS X fleet for a couple of years, working closely with the Google MacOps team to harden and protect Google’s global Mac fleet. He is now working in Google’s incident response team on the GRR Rapid Response project: Google’s open source incident response framework.