lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CALCvwp69oQN2pGrWCHabFBYkh19YXzNtULCi-iXa1GCFTikp=A@mail.gmail.com>
Date: Mon, 7 Nov 2011 11:20:01 +1100
From: xD 0x41 <secn3t@...il.com>
To: noloader@...il.com
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: Researchers Uncover 'Massive Security Flaws'
 In Amazon Cloud

I know for my Access, i use a key ... i do not keep my cloud active,
thats about the only thing disabled actually... service with them on
EC2 is great to, VPS has no plain text pass, all of those have
keyfile, then you have to convert the keyfile using putty , i guess
the key could maybe be grabbed and ofcourse if they can access account
and download the file, if the user is *still* using that.... i know my
cloud service is off by default, so i wonder how this affects users on
the amazon-management console ec2/free service.. i assume that cloud
has to be active to be exploited... right?


On 7 November 2011 10:32, Jeffrey Walton <noloader@...il.com> wrote:
> On Sun, Nov 6, 2011 at 6:27 PM, Ivan . <ivanhec@...il.com> wrote:
>> http://www.crn.com/news/cloud/231901911/researchers-uncover-massive-security-flaws-in-amazon-cloud.htm;jsessionid=kT0u8aBKblF5Y14-kIidtA**.ecappj03
>>
> "We had free access to all customer data, including authentication
> data, tokens, and even plain text passwords," said RUB researcher
> Mario Heiderich. "It's a chain reaction. A security gap in the complex
> Amazon shop always also directly causes a gap in the Amazon cloud."
>
> Its very alarming that the passwords are stored in the plain text. It
> speaks volumes to their security posture and [lack of] abilities.
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ