Category Archives: InfoSec

Ironkey S200 Enterprise Review

I am a probably a little biased, as I have been using a personal Ironkey 1GB S100 for some time now, and have recently got myself an 8GB S200 thanks to Don at The Ethical Hacker Network, so its clear I think they rock, and in my opinion I really do think they are the best secure USB Pen Drive on the market.

However I have never had any exposure to their enterprise offering, and with lots of companies now looking to adopt secure portable / removable media I think if Ironkey could be a good solution from a device perspective to help with data loss prevention. Ironkey have been kind enough to set me up with a temporary enterprise account, and sent me a couple of enterprise S200 1GB sticks to have a look how it all hangs together.

Before I get started, if you have never heard of Ironkey, let me just give you a little bit of info on what they are all about, and why in my opinion they are the 007 secure usb stick of choice, did I mention they look the business to 🙂

Enterprise Version Specs:
Rugged Metal Casing
Waterproof
Tamper-Resistant
AES 256BIT Hardware Encryption
FIPS Validated 140-2 Level 3
Strong Authentication
RSA SecureID / Verisign ID Protection
Secure Browser / Portable Apps
Self Destruction
Anti-Malware Protection

So on with the review. First we need an Ironkey Enterprise Account, and an Enterprise Ironkey, I was provided with both of these. When you get an Ironkey it comes in a little black box, once you have opened it up and plugged in the Enterprise Ironkey and the launcher is run, you are informed that you need to activate your Ironkey. (*Setup on a Mac)

To progress past this stage you will need an activation code that your Ironkey Enterprise would have setup for you through the console. This will result in you having received an email with your activation code.

So with that in mind we will go to the Enterprise Web Interface and get things setup (policies, preferences and accounts).
First we log in with our Enterprise Account number.

Now as its our first login we need to go through the 10 steps of getting our configuration setup that we are going to apply to all the Ironkeys in our enterprise.

Step 1 – Make sure we are the right man for the job…. Check 🙂

Step 2 – Now we need to define how many failed password attempts before the Ironkey self destructs. (Default is 10)
Its important to remember once destruction occurs, thats it. No undo or try again.

Step 3 – Now we define our password settings, complexity, and recovery settings.

Step 4 – Now we setup the default applications available from the Ironkeys, Firefox, RSA, etc

Step 5 – Its all about the Lost & Found. We can configure a message that will seen by anyone who inserts the Ironkey

Step 6 – Now we setup the Enterprise Administrator Account, with a strong password.

Step 7 – Time for some challenge response info, for when we forget ourselves.

Step 8 – Now to create your secret identification image to ensure your at the REAL Ironkey admin page.

Step 9 – Creating your backup sys admin account.

Step 10 – Confirming everything is just how you wanted it.

So now we have our admin account setup and our admin Ironkey associated. So lets take a look at what we can do at the web interface. Its important to understand that logging into your management interface requires two factor authentication, so not only your username and password, but your Ironkey also. If you dont have your Ironkey you just get into the Safe Mode option.

So when we login with the Ironkey we get all the good stuff, user management, policy creation alteration, alerts, log information and more. Things are pretty self explanatory, so here is a screen shot montage.

Now we can continue to activate our Ironkey, as we have created an account, and associate policy.

Now we setup a name for our Ironkey and a strong passphrase.

The key is then initialised and encrypted.

Then then if the user doesnt already have an online account, they are prompted to create one.

Now the user is good to go, the policy will have been applied, applications made available and secure storage created.

If the user is also an administrator they get access to admin tools from their Ironkey also, allowing them to recover data from other Ironkey, reauthorise, etc.


Below are also some screen shots of an Ironkey that has been assigned a Silver Bullet Policy meaning it cannot be used unless it is connected to the Internet for authentication, and a device that has been disabled.

Here is the control panel a user see’s on a Mac and PC, do control panel is currently available to Linux users.

Its pretty clear that PC users currently get better percs from the Ironkey, but regardless of the plaform your getting some awesome secure storage. I am really impressed with the simple yet appropriate level of control the Ironkey Enterprise solution gives, and I dont think I would hesitate to recommend this to a customer. I will say that I had one device get stuck in some sort of authentication loop, but Ironkey support where extremely helpful, and the few things we tried didn’t work so they sent out a replacement by Fedex.
Ironkey also offer pretty much the same offering but for personal users, and I will be putting up a similar mini review of this offering later in the month.

For more information on the Ironkey offerings, and to locate your local reseller visit the Ironkey website.

I will leave you with a short video clip I made, testing the waterproof theory of the Ironkey S200.

Waterproof Testing

Data Protection Act related breach… £500,000 fine!!

I have spoken before about the Information Commissioners Office getting new powers from April 2010. Well now it has been confirmed that they will now have the power to issue fines upto £500,000 to organisations suffering a security breach in relation to the Data Protection Act 1998.

Personally I think its good they are getting some more teeth that they can use to hopefully get organisations to start taking the DPA a little more seriously. I wonder how soon we will here about this happening with current disclosure laws.

I think we will see similar trends coming in relation to regulation and compliance in 2010, this could be an interesting year.

BackTrack 4 Final Released … woop woop

Its official, on the 9th Jan 2010 BackTrack 4 Final has been released, which is excellent news for everyone who knows just how good the BackTrack distro’s are.

With this release includes a new kernel, a larger and expanded toolset repository, custom tools that you can only find on BackTrack, and more importantly, fixes to all (well, most..) major bugs that we knew of. This release we received an overwhelming support from the community and we are grateful to everyone that has contributed to the success of this release.

So what are you waiting for, download it now.

Get your Windows 7 God Mode Groove On

Some of you may or may not have heard about the Windows 7 God Mode Feature.

I thought I would make a quick post so people could check it out for themselves. It basically presents you with an additional control panel type interface that gives you access to a few more goodies and controls.

So all you need to do is create a new folder (you can place this anywhere).

Then rename the folder with the following – GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

The folder will now change to the GodMode Icon, and your good to go.

I have not had time to have a proper look through, so let me know if you find anything interesting.

Happy New Year – 2010 Security Crystal Ball

Happy New Year to everyone, and all the best to all of you and your families in 2010. 2009 has been a busy year of ups and downs in the Infosec community and I am sure we will all have more fun and frolics as we roll into 2010.

With this in mind I thought I would share some predictions for 2010 as I look into my Security Crystal Ball 🙂 Its all very mystic meg I know…

  • The buzz that is cloud security will continue to grow, and as more organisations look to realise the possible savings we find out how some of the early adopters didn’t do security right.
  • Increased focus on compliance and regulation. Organisations failing to meet PCI:DSS compliance to be met with stricter penalties, I think we are going to see more action less talk. The Information Commissioner and his team are going to be more proactive with identifying organisation not meeting their data protection obligations. Finally the FSA’s new task force are going to uncover more insecure goings on in the financial institutions as they start lifting the carpets to find whats been swept under there for years.
  • With increasing threats from various governments to impose restrictions on Internet access, and deep packet inspection, the growth in knowledge and usage of darknets will increase.
  • Continued adoption of full disk, endpoint encryption technologies and data loss prevention solutions as organisations attempt to get more control of their data and where it flows.
  • Increased disclosure laws in Europe. I have said this before but I think as the consumer becomes more aware about the regulations that exist, pressure is going to come to have a better understanding of breaches and data loss, similar to what exists in the US.
  • People will continue to do things insecurely, so called hackers will break things, get caught and claim some form of illness, the fairies made me do it.
  • Increased security awareness around the use and adoption of social networking sites. This may lead to more organisations restricting the usage, and hopefully increased consumer awareness to share less information.
  • Windows 7 to be bashed about increasing number of found security vulnerabilities, and the time taken to patch.
  • Increasing PDF related security issues and Adobe fail. Exploit writers will become more creative and not rely on the simple Java stuff.
  • A slight growth in awareness of security threats to mobile platforms. I don’t think we are going to suddenly see loads of exploits targeted as mobiles as I still don’t think the value is there, but there will be some more talk and research as we continue to rely and do more whilst mobile.
  • More exploits targeting virtualised environments. I think there is going to be a greater push for virtulisation in 2010, Googles OS is a perfect example, so researchers will start looking at this more.

So basically alot of the same really 🙂 I am sure if I could think of more, but its all just guessing really, no one really knows for sure.

What does 2010 hold for me, well……. I am looking forward to some great interviews we have coming up on the Eurotrash Security Podcast, I will also hopefully be setting up a couple of UK based Security Bloggers Meet Ups in 2010, and I also hopefully have some reviews of the IronKey S200 Personal and Enterprise coming in Jan, along with DESLock.

I am hoping for a year of more Infosec challenges and learning opportunities to fuel my passion for the industry. Also time and funds available I am looking forward to seeing more of my Infosec buddies and conferences, and meeting new people also. Oh and I also still need to work out to use my new Mac properly, its a learning curve 🙂

So all the best to all of you, and I hope 2010 brings you more ups than downs.

Dale

Hackers prefer DECAF COFEE

Most people will have heard of Microsoft COFEE (Computer Online Forensics Evidence Extractor), the free forensics tool that has been handed out to law enforcement to aid in investigations. This tool was leaked online a month or so ago, and has been met with varying opinions in the security community.

A couple of hackers released (for a short period of time) a counter tool DECAF, this tool apparently provided various countermeasures to detect and impact the presence of COFEE.

Decaf boasts a huge variety of user-driven countermeasures against COFEE. In addition to nuking temporary files within seconds of detecting files or processes associated with the investigative tool, Decaf can also clear all COFEE logs, disable USB drives, and contaminate or spoof a variety of MAC addresses

I personally never saw this tool, and have not done any searching to find a copy, but the developers have now removed the tool.

DECAF wasn’t fake. It did what it was set out to do and did it well, we just respect authority and experts in the field and would rather promote a positive move then a negative one.

Some will understand, some will not. We did not remove the tool because of Microsoft. In fact, they did not even release a statement until after the tool was pulled offline. Going after major corporations like Microsoft is no easy task. Just understand we did what we feel is best for the safety and well being of our nation and other governments.
The forums are up, come check us out: www.cruxt.org

This may have been short lived, but its certainly interesting.