SIP Brute Force Attacks Escalate Over Halloween Weekend.

Monday, 1. November 2010

SIP brute force attacks escalate over Halloween weekend.

Looks like the bad guys were up to no good again this weekend. SIP based PBX operators reported a huge increase in bogus registration attempts against their systems over the Halloween weekend. Our hosted PBX farm experienced this increase first hand. Logs showed an attack from a new and unique IP address about every minute. At the end of the weekend, over 1300 unique IP addresses were logged.

Read more »

Share

Setting Up Native IPv6 Connectivity, A Network Operators Overview.

Friday, 2. July 2010

Setting up IPv6 connectivity.

Back in December `09, my company ACT USA, began testing IPv6. These tests quickly advanced to our production environment. Over the last six months, I have been in the process of setting up native IPv6 connectivity for all our data centers. This connectivity is based on the dual stack model. This article attempts to cover the technology available, and the choices I made based on that technology.

Read more »

Share

Exploit Against Adobe Flash, Acrobat and Adobe Reader

Thursday, 10. June 2010

Exploit Against Adobe Flash and Adobe Reader.

I thought I got this posted the beginning of the week, but I guess it slipped through the cracks… June 4, 2010, Adobe confirmed that a zero day exploit exists in it’s Flash Player,  Acrobat and Adobe Reader software. This bug effects all of it’s supported platforms, and has been found in the wild.

So, you all know the drill, if your computer has the software listed in the Adobe Security Bulletin, then follow the instructions and get yourself safe!

— Stu

Share

Ubuntu 10.04 – A Quick Review

Tuesday, 8. June 2010

Ubuntu 10.04 – A quick review.

The latest Ubuntu release has brought both praise and controversy to the boards and email lists. The debate regarding some of the visual changes, as well as the new services tied to Canonical, has caused a minor tremor through the open source community. But even with all the controversy, it’s still worthwhile to load up 10.04 and see what all the buzz is about!

Read more »

Share

Building Redundant Networks in Data Centers

Monday, 7. June 2010

Building Redundant Networks in Data Centers.

I recently was asked to put together a brief web presentation on the different methods of creating redundant networks. I couldn’t think of a better place to put it, then right here on my blog. After all, I was overdue for a post anyways…

What do I mean by redundant networks?

A redundant network is two or more distinct paths for data to travel to and from an upstream network. In it’s simplest form, it can be a piece of equipment that can be manually placed into service easily upon a failure. More often though it is set up so that any single device or connection can fail, and without user intervention, a backup system or connection will automatically step in and take over the job of the failed device, or connection. A redundant network does not mean that no mater what happens, your data will still be reachable. There are many factors that need to be considered, ranging anywhere from your providers, to your applications, that can cause a failure.

Read more »

Share

Amazon Brute Force SIP Attacks – Dave Michels Interviews Me

Monday, 19. April 2010

Amazon Brute Force SIP Attacks – Dave Michels Interviews Me.

Shortly After my “SIP Brute Force Attack Originating From Amazon EC2 Hosts” post, Dave Michels interviewed me for an article Dark Side of the Cloud. This is that interview:

Dave:   What do you believe the intent was of the attacks? Free long distance?

Stu: Certainly free long distance would be one reason… But there are many other reasons to hijack a SIP account. I’m sure that organized crime would pay for a block of active SIP logins. They could use them to circumvent surveillance, or possibly use them for fraudulent boiler room calls about extended warranties and such.

Remember, most folks still believe that the Telephone System is secure… They tend to believe someone who is calling them.

Read more »

Share

SIP Brute Force Attack Originating From Amazon EC2 Hosts

Sunday, 11. April 2010

SIP Brute Force Attack Originating From Amazon EC2 Hosts.

I woke up Saturday morning to find strangely high network activity on some of our inbound connections. After a quick review, it turned out that most of the traffic was going into several of our hosted PBX systems. After a little more digging, I discovered that several systems on the Amazon EC2 network were preforming brute force attacks, against our VoIP servers. They were attempting to guess user names and passwords for our SIP clients. I immediately blocked all traffic from the attacking IPs and examined the logs. Thankfully, I found that non of the attacks had succeeded in guessing passwords.

Read more »

Share

A Microsoft Free Workplace in Six Months. Part 3

Monday, 22. March 2010

A Microsoft Free Workplace in Six Months. Part 3

Well, I’ve been putting off updates on this for a few months, hoping that this project would begin moving forward again. It hasn’t, and for the life of me, I can not figure out why. The client has postponed the project due to a sudden surge in business. Their reasoning is that it would require too much retraining at a time where they don’t have time to retrain.

The confusing thing to me is that when asked what their findings were up to this point, they listed the following:

  • Ubuntu systems operate faster then Windows systems.
  • Ubuntu systems have better stability then Windows systems.
  • Ubuntu is able to do all tasks we currently require to perform company related computing tasks.
  • Ubuntu desktop can be tailored to incorporate shortcuts that end users can easily use.

The only negatives were:

  • Ubuntu requires a rethinking regarding finding and installing software.
  • Most end users will not be able to modify their own desktop without training

The second thing I would think would be a plus, but that’s the system administrator in me coming out.

So, for now, the project is stalled. So for now, so is this series of articles… ðŸ™

— Stu

Share

The Technology of SCALE8x – A Post Event Review. PART – 2

Friday, 12. March 2010

The Technology of SCALE8x – A Post Event Review. PART – 2

This is the second installment all about the technologies used for SCALE8x. The first installment dealt with the services that the technology group has setup and maintains for the event year round. This installment will cover the pre-show setup that went into the technologies that were used at the show.

Read more »

Share

The Technology of SCALE8x – A Post Event Review. PART – 1

Monday, 22. February 2010

The Technology of SCALE8x – A Post Event Review. PART – 1

Every February in Los Angeles CA, a group of dedicated volunteers get together to put on what many believe to be the largest all volunteer organized open source technology conventions in the US. This three day event features talks and exhibits specifically targeted at Open Source users, programmers, and system administrators.

Read more »

Share