InvestorsHub Logo
icon url

Mr Allan

11/04/07 11:38 PM

#92979 RE: justfrank #92975

"Guess you have to ignore this summarry to find that summary interesting, LOL"

No, don't ignore anything justfrank. The other is the final conclusion.

The trial, for some strange reason, was moved before the product testing was complete. The final, and most important test, the Information Assurance Assessment, which would have run the hotzone product through many tests in a controlled attempt to attack the integrity of the product, was not performed. Thus the final conclusion, from the CWID trial stated-

Executive Summary
Coalition Warrior Interoperability Demonstration’s (CWID) Assessments Working Group (AWG), Information Assurance (IA) Team performed a high-level assessment Trial 6.42, HotZone 4010/4020 (HZ4010). This trial implemented mechanisms to provide assurance that the information processed by the vendor’s product was secure.

This is the standard protocol,
Except we see that the IA was not performed-

OVERVIEW
This report is the results of an IA Assessment the AWG-IA Team performed on Trial 6.42, HotZone 4010/4020 (HZ4010).


IA Capabilities Description
No Threat Mitigation Survey was completed for this trial, which would contain a listing of possible vulnerabilities and mitigation for this product.
This trial changed sites before execution week, not allowing the IA team to perform an IA assessment on this trial.

conclusions
This trial changed sites before execution week, not allowing the IA team to perform an IA assessment on this trial.


These are some of the rigid tests that were not performed nor completed-

Based upon the TMS and the constraints of the CWID 2007 Execution environment, the AWG-IA team identified functions that were feasible to test. During CWID 2007 Execution, the AWG-IA Team used one or more of the following tools to perform the IA Assessment:

Cain & Abel - This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

Core Impact* - widely considered to be the most powerful exploitation tool available. It sports a large, regularly updated database of professional exploits, and can do neat tricks like exploiting one machine and then establishing an encrypted tunnel through that machine to reach and exploit other boxes. Other products are Canvas or Metasploit Framework. Metasploit Framework is available as freeware.

John The Ripper - is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches.

Kismet - is a console (ncurses) based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing (as opposed to more active tools such as NetStumbler), and can even decloak hidden (non-beaconing) networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps.

Nessus - Nessus is a free network vulnerability scanner available. It is constantly updated, with more than 11,000 plugins for the free feed (registration and EULA-acceptance required). Key features include remote and local (authenticated) security checks, a client/server architecture with a GTK graphical interface, and an embedded scripting language for writing your own plugins or understanding the existing ones.

NMAP- (Network Mapper) is a free, opensource utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it is also effective for single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.

Retina* - The function of this tool is to scan all the hosts on a network and report on any vulnerabilities found. It is the DoD Enterprise tool for vulnerability assessments on Windows bases systems.

WireShark - (known as Ethereal until a trademark dispute in Summer 2006) is an open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several features, including a display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types. A tcpdump-like console version named tethereal is included. One word of caution is that Ethereal has suffered from dozens of remotely exploitable security holes, so stay up-to-date and be wary of running it on untrusted or hostile networks (such as security conferences).
* Core Impact and Retina are licensed copies. The remaining tools are freely available and can be used by product vendors to assess their systems at their discretion.

https://www.cwid.js.mil/public/CWID07FR/htmlfiles/642ia.html




icon url

eqbeck

11/05/07 3:04 AM

#92994 RE: justfrank #92975

especially this...

WARFIGHTER/Operator COMMENTS

“Very useful technology.”

“Very interesting system with a variety of uses.”

“Mobile technology that is easily transportable.”

“This IT could be very useful in both Civilian and Military applications.”

“Very innovative technology.”



Ignore the positive...find the negative spin
20 trading days remaining on t+35
icon url

lithiumtech

11/05/07 3:10 PM

#93054 RE: justfrank #92975

WOW. The company still has a lot of life. That assessment was stellar and the reason No Mas Cables will move forward.