Rss

    Archives for : Corporate

    No need to bypass security with a boot disk – 17 year old Windows exploit found

    The problem has been discovered in the Virtual DOS Machine (VDM) introduced in 1993 to support 16-bit applications (real mode applications for 8086). VDM is based on the Virtual 8086 Mode (VM86) in 80386 processors and, among other things, intercepts hardware routines such as BIOS calls. Google security team member Tavis Ormandy has found several vulnerabilities in this implementation that allow an unprivileged 16-bit program to manipulate the kernel stack of each process via a number of tricks. This potentially enables attackers to execute code at system privilege level.

    In addition to the unpatched hole in Internet Explorer, a now published hole in Windows allows users with restricted access to escalate their privileges to system level – and this is believed to be possible on all 32-bit versions of Windows from Windows NT 3.1 up to, and including Windows 7. While the vulnerability is likely to affect home users in only a minor way, the administrators of corporate networks will probably have their hands full this week.

    The problem is caused by flaws in the Virtual DOS Machine (VDM) introduced in 1993 to support 16-bit applications (real mode applications for 8086). VDM is based on the Virtual 8086 Mode (VM86) in 80386 processors and, among other things, intercepts hardware routines such as BIOS calls. Google security team member Tavis Ormandy has found several vulnerabilities in this implementation that allow an unprivileged 16-bit program to manipulate the kernel stack of each process via a number of tricks. This potentially enables attackers to execute code at system privilege level.

    Ormandy has also published a suitable exploit which functions under Windows XP, Windows Server 2003 and 2008, Windows Vista and Windows 7. When tested by the The H’s associates at heise Security, the exploit opened a command prompt in the system context, which has the highest privilege level, under Windows XP and Windows 7. No patch has become available, although Ormandy reports that Microsoft was already informed of the hole in mid 2009. The developer decided to publish the information regardless because, in his opinion, there is a simple workaround: to disable the MS-DOS subsystem.

    The workaround requires users to start the group policy editor and enable the “Prevent access to 16-bit applications” option in the Computer ConfigurationAdministrative TemplatesWindows ComponentsApplication Compatibility section. When tested with these settings by the heise Security team, the exploit no longer functioned. The settings reportedly don’t cause any major compatibility problems for most users while no 16-bit applications are being used.

    Update – The above option is only available through the group policy editor on Windows 2003 systems. Some versions of Windows do not include a group policy editor. As an alternative, users can also create a registry key under HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindowsAppCompat with a D-Word value of VDMDissallowed = 1. Under Windows XP, to prevent the system from being vulnerable to the exploit, users can place the following text:

    Windows Registry Editor Version 5.00

    [HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindowsAppCompat]

    “VDMDisallowed”=dword:00000001

    into a file called vdmdisallow.reg and double click the file. Windows will then automatically import the key (admin rights are required to perform this action).

    Update 2 - Microsoft has now confirmed the privilege escalation hole in Windows. The company says that it wants to complete its investigation of the vulnerability and will then decide whether, how and when to close it.

    See Also:

    REDMOND — When it rains, it pours. Especially in the Seattle area. Tavis Ormandy has published full details on a privilege escalation hack of all versions of Windows including Windows 7.

    The exploit takes advantage of a bug in the Windows implementation of the ‘virtual DOS machine’ used to run legacy 16-bit programs. The exploit can be avoided by turning the VDM ‘feature’ off but the danger of course is that enough Windows lusers won’t know about the bug and/or bother turning the ‘feature’ off.

    16-bit applications need BIOS support; the Windows kernel supports virtual BIOS interrupts in its ‘Virtual-8086’ mode monitor code. The code is implemented in two stages. The #GP trap handler transitions to the second stage when CS:EIP faults with specific ‘magic’ values.

    The transition requires (subsequent to authentication) restoring the context and the call stack from the faulting trap frame. But the authentication process is flawed, relying as it does on three incorrect assumptions.

    • Setting up a VDM context requires SeTcbPrivilege.The barrier to getting a VDM context can be subverted by requesting the NT VDM subsystem and then using CreateRemoteThread() to run code in the context of the VDM subsystem. The VDM subsystem already has the necessary flag set.
    • Ring 3 (unprivileged) code cannot install arbitrary code segment selectors.Using the two least significant bits of CS/SS to calculate the privilege of a task doesn’t work when it comes to Virtual-8086 mode. The 20-bit addressing (by adding CS << 4 to the 16-bit IP) is also used to map onto the protected linear Virtual-8086 address space. If CS can be set to an arbitrary value, then the privilege calculation can be circumvented.
    • Ring 3 (unprivileged) code cannot forge a trap frame.Returns to user mode are through IRET. An invalid context can cause IRET to fail pre-commit, which in turn forges a trap frame. And even with address randomisation it’s trivial to use NtQuerySystemInformation() to obtain the address of the second stage BIOS handler.

    Affected Systems

    This bug dates back 17 years and affects all systems released since 27 July 1993 – Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, and Windows 7. See the links below for further details.

    See Also
    MITRE: CVE-2010-0232
    Windows plagued by 17-year-old privilege escalation bug
    NEOPHASIS: Trap Handler Allows Users to Switch Kernel Stack

    Ham Radio Links

    Amateur Packet Radio Australian

    Aussiewide Packet Radio Network http://www.ampr.org.au/

    AAPRA  http://members.optusnet.com.au/aapra

    Queensland APRS Users Group http://www.tech-software.net/

    VK2KFJ’s Packet Radio Links page http://www.qsl.net/vk2kfj/pacradio.html

    VK4ZU http://www.users.on.net/~trevorb/

    VK5 AX25 Packet Network Map (VK5AH) http://homepages.picknowl.com.au/wavetel/vk5pack.htm

    Winlink

    Winpack

    International

    Amateur Packet Radio Gateways http://www.ampr-gates.net/frame_e.htm

    Amateur Packet Radio, net 44, and AMPR.ORG `http://www.ampr.org/

    American Febo Enterprises http://www.febo.com/index.html

    BayCom http://www.baycom.org/

    FUNET http://www.funet.fi/pub/ham/packet/

    FUNET ftp://ftp.funet.fi/pub/ham/packet/

    F4DAY http://perso.wanadoo.fr/jf.fourcadier/index_e.htm

    F6FBB http://www.f6fbb.org/

    GB7DIP TNOS/PBBS http://www.qsl.net/gb7dip/access.html

    G4JKQ TCP/IP Telnet listing http://www.qsl.net/g4jkq/tcp.htm

    G7JJF TNC Driver Support (WINTNC) http://www.g7jjf.demon.co.uk/

    High speed packet http://hydra.carleton.ca/articles/hispeed.html

    High Speed Packet radio http://www.lmrgroup.com/ke3ht/hspr.html

    High-speed Packet Radio http://cacofonix.nt.tuwien.ac.at/~oe1kib/Radio/

    KE5FX http://www.qsl.net/ke5fx/

    K4ABT (home page) http://www.packetradio.com/

    Linux® / Amateur Radio Information http://delbert.matlock.com/linux-radio.htm

    Linux AX25-HOWTO http://tldp.org/HOWTO/AX25-HOWTO/

    PA3CGO http://www.qsl.net/pa3gco/

    Packet Info and Downloads http://www.packetradio.com/

    Packet Links http://www.stack.serpukhov.su/~victor/hamradio/packet/packet.html

    Packet Net (VK5 packet map) http://www.packetnet.org/

    Packet Net (FBB software) http://www.packetnet.org/fbb.htm

    PAcket Digital Amateur Network (PADAN) http://www.weaksignals.com/

    Radio-TNC Wiring Diagrams http://users3.ev1.net/~medcalf/ztx/wire/

    RST http://www.qsl.net/on1blu/

    Slovenian ATV/Packet http://lea.hamradio.si/~s51kq/

    Sound Card Packet http://www.qsl.net/soundcardpacket/index.html

    TAPR http://www.tapr.org/

    TNC-X http://www.tnc-x.com/

    TPK http://www.f6fbb.org/f1ebn/index.htm

    TNOS Central http://www.lantz.com/tnos/

    TVIPUG http://www.tvipug.org

    WA4DSY 56k RF Modem http://www.wa4dsy.net/

    Yet Another 9k6 Modem http://www.microlet.com/yam/

     

    Sound Card Packet

    ILINKBOARDS.com http://www.ilinkboards.com/

    Sound Card Buddy http://www.sparetimegizmos.com/Hardware/SoundBuddy.htm

    Soundcard Interfacing http://www.qsl.net/wm2u/interface.html

    Sound Card Packet AGWPE (KC2RLM) http://www.patmedia.net/ralphmilnes/soundcardpacket/

    Sound Card Interface with Tone Keyer (WA8LMF) http://members.aol.com/wa8lmf/ham/tonekeyer.htm

    QDG sound card interface

    Return to Top


    Winlink

    Winlink! 2000 http://winlink.org/

    Aussie Winlink http://www.aussiewinlink.org

    Pactor Communications Australia http://www.pca.cc/


    Winpack

    Winpack home page http://www.peaksys.co.uk/

    Winpack info http://www2.tpg.com.au/users/peteglo/winpack.htm

     

    TNC information

    General

    Setting Your TNC’s Audio Drive Level http://www.febo.com/packet/layer-one/transmit.html

    TNC and Radio mods http://www.johnmather.free-online.co.uk/tnc.htm

    MFJ

    MFJ-1278B Care and maintenance http://www.qsl.net/ke4mob/

    AEA

    AEA radio and TNC mods http://www.k7on.com/mods/aea/mods/aeamod.txt

    Other suppliers

    BYONICS http://byonics.com/

    Fox Delta http://www.foxdelta.com/

    Kantronics http://www.kantronics.com/

    PacComm http://www.paccomm.com/

    The DXZone Digital and Packet Radio http://www.dxzone.com/catalog/Manufacturers/Digital_and_Packet_Radio/

    Tigertronics http://www.tigertronics.com/

    Timewave http://www.timewave.com/amprods.html

    TNC-X – The Expandable TNC  http://www.tnc-x.com/


    Gateways

    Amateur Packet Radio Gateways http://www.ampr-gates.net

    G4JKQ http://www.g4jkq.co.uk/

    The Gateways Home Page http://www.ampr-gateways.org/

     

    High-Speed Digital Networks and Multimedia (Amateur)

    North Texas High Speed MultiMedia group http://groups.yahoo.com/group/ntms-hsmm/

    Also take a look at the wireless LAN pages


    APRS

    Aus APRS http://www.radio-active.net.au/vk2_aprs.html

    APRS http://www.radio-active.net.au/web/gpsaprs/aprsrept.html

    APRS http://aprs.rutgers.edu/

    APRS http://www.cave.org/aprs/

    APRS in Adelaide http://vk5.aprs.net.au/

    AVR-Microcontroller http://www.qsl.net/dk5jg/aprs_karten/index.html

    APRS in the UK http://www.aprsuk.net/

    aprsworld http://www.aprsworld.net

    APRS.DE http://www.aprs.de/

    APRS-Berlin http://www.aprs-berlin.de/

    APRS-Frankfurt http://www.aprs-frankfurt.de/

    BYONICS (Electronics Projects for Amateur Radio) http://www.byonics.com/

    CanAPRS http://www.canaprs.net/

    Dansk APRS Gruppe http://www.aprs.dk/

    findU.com http://www.findu.com/

    France APRS http://www.franceaprs.net/

    Kansas City APRS Working Group http://www.kcaprs.org/

    KD4RDB http://wes.johnston.net/aprs/

    Live Australian APRS data maps http://www.aprs.net.au/japrs_live.html

    NIAN http://nian.aprs.org/

    Queensland APRS Users Group http://www.tech-software.net/

    Tri-State APRS Working Group http://www.tawg.org/


    Other Digital Modes

    General

    HF-FAX http://www.hffax.de/index.html

    ZL1BPU http://www.qsl.net/zl1bpu/

    Morse Code

    CW Operators’ QRP Club Inc. http://www.users.on.net/~zietz/qrp/club.htm

    Fists Down Under http://fistsdownunder.morsekeys.com

    LEARN MORSE CODE in one minute ! http://www.learnmorsecode.com/

    MRX morse code http://www.mrx.com.au/

    Not Morse Code, Slow Scan , Packet or APRS

    HamDream by HB9TLK (digital radio) http://www.qslnet.de/member/hb9tlk/

    JE3HHT, Makoto (Mako) Mori http://www.qsl.net/mmhamsoft/

    PSK31 and other PC Magic http://www.psk31.com/

    WSJT ACTIVITY IN AU (follow link) http://www.tased.edu.au/tasonline/vk7wia/


    Amateur Digital Radio

    AR Digital Voice Communications http://www.hamradio-dv.org/

    Australian National D-Star http://www.dstar.org.au/

    Ham Radio digital info http://www.hamradio.com/pdf/dstar.pdf

    ICOM America digital http://www.icomamerica.com/amateur/dstar/

    Temple University Digital Voice Project http://www.temple.edu/k3tu/digital_voice.htm

    Temple University Vocoder Redux http://www.temple.edu/k3tu/VocoderRedux.pdf

    WinDRM – HF Digital Radio Mondiale http://n1su.com/windrm/

     

    D-Star

    Australian D-Star information http://www.dstar.org.au/

    D-Star wikipedia http://en.wikipedia.org/wiki/D-STAR

    ICOM America D-Star Forums http://www.icomamerica.com/en/support/forums/tt.asp?forumid=2

     

    Software Defined Radio

    FlexRadio Systems Software Defined Radios http://www.flex-radio.com/

    Rocky software for SoftRock-40 hardware http://www.dxatlas.com/rocky/

    SDRadio – a Software Defined Radio http://digilander.libero.it/i2phd/sdradio/

    SoftRock-40 Software Defined Radio http://www.amqrp.org/kits/softrock40/index.html

    The Weaksignals pages og Alberto I2PHD (software)  http://www.weaksignals.com/


    Digital Radio

    BBC digital Radio http://www.bbc.co.uk/digitalradio/

    Digital Audio Broadcasting http://www.digitalradio.ca/

    Digital Radio Broadcasting http://happy.emu.id.au/lab/info/digradio/index.html

    Digital Radio http://www.magi.com/~moted/dr/

    DRDB http://www.drdb.org/

    DRM – Digitaler Rundfunk unter 30 MHz http://www.b-kainka.de/drm.htm#dritte

     

    Amateur Radio Direction Finding

    Amateur Radio Direction Finding and Orienteering http://vkradio.com/ardf.html

    Amateur Radio Direction Finding Webring http://www.qsl.net/vk3zpf/webring1.htm

    Homing In http://members.aol.com/homingin/

    RON GRAHAM ELECTRONICS (ARDF and more) http://users.mackay.net.au/~ron/

    Victorian ARDF Group Inc. http://www.ardf.org.au/


    Repeater Linking

    There are currently There are 5 internet linking projects that I know of :-

    IRLP,  iPHONE, iLINK, eCHOLINK and WIN SYSTEM (May 2005)

    EchoLink http://www.echolink.org/

    Hamlink (K1RFD) http://www.hamlink.net/

    KWARC (live audio) http://www.kwarc.org/listen/

    Internet Linking http://www.qsl.net/g3zhi/index2.html

    IRLP http://www.irlp.net/

    IRLP status http://status.irlp.net

    WIN SYSTEM http://www.winsystem.org/

    iLINK

    G4CDY-L Internet Gateway http://www.g4cdy.co.uk/

    iLink http://www.aacnet.net./

    VA3TO iLINK INTERFACE http://www.ilinkca.com/

    VK2JTP iLINK gateway http://www.qsl.net/vk2jtp/

    WB2REM & G4CDY’S  iLINK boards http://www.ilinkboards.com/

    WB4FAY http://www.wb4fay.com/ilink_FAQ.html

    INTERFACES

    ILINKBOARDS.com http://www.ilinkboards.com/


    laser diodes

    A R Laser Communications http://www.qsl.net/wb9ajz/laser/laser.htm

    Australian Optical DX Group http://groups.yahoo.com/group/Optical_DX/

    Driver Enhancements http://www.misty.com/people/don/laserdps.htm#dpsdepm

    European Laser Communications http://www.emn.org.uk/laser.htm

    Ronja http://atrey.karlin.mff.cuni.cz/~clock/twibright/ronja/


    Amateur Radio Licence

    radiofun http://www.alphalink.com.au/~parkerp/gateway.htm

    Worldwide Information on Licensing for Radio Amateurs by OH2MCN http://www.qsl.net/oh2mcn/license.htm


    Amateur Radio Clubs and Organisations

    Also see ATV link page

    and VHF link page

    Australian

    Adelaide Hills Amateur Radio Society http://www.qsl.net/vk5bar/

    Amateur Radio Victoria http://www.amateurradio.com.au/

    Barossa Amateur Radio Club VK5BRC http://www.qsl.net/vk5brc/

    Brisbane Amateur Radio Club http://www.qsl.net/vk4ba/index.html

    Brisbane VHF Group

    Central Coast Amateur Radio Club http://www.ccarc.org.au/

    Central Goldfields A R Club http://www.cgfar.com/

    CHIFLEY A R CLUB http://chifley.radiocorner.net/

    Coffs Harbour & District Amateur Radio Club http://www.qsl.net/vk2ep/index.html

    CW Operators’ QRP Club Inc. http://www.users.on.net/~zietz/qrp/club.htm

    Eastern and Mountain District Radio Club http://www.emdrc.com.au

    Gold Coast AR Society http://www.gcars.com.au/

    Healesville Amateur Radio Group http://www.harg.org.au/

    Historical Wireless Society of South East Queensland http://www.hws.org.au/

    Ipswich Metro Radio Group http://imrg.ips-mesh.net/

    Lockyer Valley Radio and Electronic Club Inc http://www.qsl.net/vk4wil/

    Manly-Warringah Radio Society http://www.qsl.net/vk2mb/

    NWTARIG http://vk7ax.tassie.net.au/nwtarig/

    QRP Amateur Radio Club International http://www.qrparci.org/

    Queensland APRS Users Group http://www.tech-software.net/

    RADAR Club Inc http://radarclub.tripod.com

    Radio Amateurs Old Timers Club Australia Inc http://www.raotc.org.au/

    Radio Sport http://www.uq.net.au/radiosport/

    Radio and Electronics Association of Southern Tasmania http://reast.asn.au/

    Riverland Amateur Radio Club http://www.rrc.org.au/

    South Australian Packet User Group Inc. (SAPUG) http://www.sapug.ampr.org/

    SERG http://serg.mountgambier.org

    South Coast AMATEUR RADIO Club http://www.scarc.org.au/

    SOUTHSIDE AMATEUR RADIO SOCIETY http://www.qsl.net/vk4wss/

    Sunshine Coast Amateur Radio Club http://vk4wis.org/

    VK Young Amateur Radio Operator’s Net http://www.geocities.com/vk_ya/

    VK3APC http://www.mdrc.org.au/

    VK3BEZ (WIA Eastern Zone Amateur Radio Club) http://www.qsl.net/vk3bez/

    VK4WIL http://www.qsl.net/vk4wil/

    West Australia Repeater Group http://www.warg.org.au

    WESTLAKES AR Club http://www.westlakesarc.org.au/

    WIA VK4 Qld http://www.wiaq.com/

    WIA VK4 QNEWS NEWSROOM http://www.wiaq.com/qnews/upload/qnews.htm

    WIA http://www.wia.org.au/

    WICEN Australia http://www.wicen.org.au/

    WICEN Brisbane Qld

    New Zealand

    NZART http://www.nzart.org.nz/nzart/

    Papakura Radio Club http://www.qsl.net/zl1vk/

    Wanganui Amateur Radio Society Inc. http://www.zl2ja.org.nz/

    Wellington VHF Group http://www.vhf.org.nz/

    International

    American QRP Club http://www.amqrp.org/index.html

    ARRL http://www.arrl.org/

    Clear Lake Amateur Radio Club http://www.clarc.org/

    FRARS http://www.frars.org.uk/

    HKAR http://www.hkra.org/

    HRDXA http://www.qsl.net/vr2dxa/

    KIDSHAMRADIO http://www.kidshamradio.com/

    K2MFF Amateur Radio club http://www-ec.njit.edu/~k2mff/

    North TeXas Repeater Association http://www.ntxra.com/main_page.htm

    N0WGE http://www.sckans.edu/~sireland/radio/

    The Repeater Builders Technical Information Page http://www.repeater-builder.com/rbtip/index.html#main-index

    Richardson Wireless Klub http://www.k5rwk.org/

    RADARS http://www.mbc.co.uk/RADARS/

    RSGB http://www.rsgb.org/

    SARL http://www.sarl.org.za/

    Submarine Veterans Amateur Radio http://w0oog.50megs.com/

    Southgate AR club http://www.southgatearc.org/index.htm

    TEARA http://www.teara.org/

    The 500 KC Experimental Group for Amateur Radio http://www.500kc.com/

    Tucson Amateur Packet Radio http://www.tapr.org/

    W6DEK 435 Los Angeles http://www.w6dek.com/


    Amateur Radio

    Australian

    Australian AR Repeater Map http://vkham.com/australimaps.html

    AMATEUR RADIO WIKI http://www.amateur-radio-wiki.net

    HAM SHACK COMPUTERS http://www4.tpgi.com.au/users/vk6pg/

    Ham Radio in Australia with VK1DA http://members.ozemail.com.au/~andrewd/hamradio/

    HF Radio Antenna Tuners http://www.users.bigpond.net.au/eagle33/elect/ant_tuner.htm

    Queensland AR Repeater listings http://vkham.com/Repeater/vk4map.html

    Radioactive Networks: Ham http://www.radio-active.net.au/web/ham/

    Tony Hunt VK5AH (Home of Adelaides 10m Repeater) http://homepages.picknowl.com.au/wavetel/default.htm

    VK1DA’s Amateur Radio Web Directory vk1da.net/radlink.html

    VK1KEP http://www.pcug.org.au/~prellis/amateur/

    VK1OD owenduffy.net

    VK2BA (AM radio) http://www.macnaughtonart.com/default.htm

    VK3PA http://www.vk3pa.com/home.asp

    VK3UKF http://members.fortunecity.co.uk/vk3ukf/index.html

    VK3XPD http://www.users.bigpond.com/alandevlin/index.html

    VK3YE’s Gateway to AR http://www.alphalink.com.au/~parkerp/gateway.htm

    VK3ZQB http://members.datafast.net.au/vk3zqb/

    VK4CEJ http://www.hfradio.org/vk4cej/hamlinks.html

    VK4TEC http://www.tech-software.net/

    VK4TUB http://www.vk4tub.org/

    VK4ZGB http://members.optusnet.com.au/jamieb/index.html

    VK4ZU http://www.users.on.net/~trevorb/

    VK5BR http://users.tpg.com.au/users/ldbutler/

    VK5KK http://www.ozemail.com.au/~tecknolt/index.html

    VK8JJ http://www.qsl.net/vk8jj/

    New Zealand

    Micro Controller Projects for Radio Amateurs and Hobbyists http://www.qsl.net/zl1bpu/micro/index.htm

    Precision Frequency Transmission and Reception http://www.qsl.net/zl1bpu/micro/Precision/index.htm

    ZL3TMB http://www.hamradio.co.nz/

    International

    AC6V’s AR & DX Reference http://www.ac6v.com/

    Amateur radio with Knoppix http://www.afu-knoppix.de/

    Amateur Radio Soundblaster Software Collection http://www.muenster.de/~welp/sb.htm

    AM fone.net http://www.amfone.net

    AMRAD Low Frequency Web Page http://www.amrad.org/projects/lf/index.html

    DL4YHF http://www.qsl.net/dl4yhf/

    Direction finding http://members.aol.com/homingin/

    DSP Links http://users.iafrica.com/k/ku/kurient/dsp/links.html

    Electric-web.org www.electric-web.org

    EI4HQ http://www.4c.ucc.ie/~cjgebruers/index.htm

    EI8IC http://www.qsl.net/ei8ic/

    EHAM http://www.eham.net/

    eQSL (electronic QSL) http://www.eqsl.cc/qslcard/

    HamInfoBar http://www.haminfobar.co.uk/

    Felix Meyer http://home.datacomm.ch/hb9abx/

    FUNET http://www.funet.fi/pub/ham/

    F4DAY http://perso.wanadoo.fr/jf.fourcadier/index_e.htm

    Gateway to Amateur Radio http://www.alphalink.net.au/~parkerp/gabra.htm

    Grid Square Locator http://www.arrl.org/locate/grid.html

    G3PTO http://www.qsl.net/g3pto/

    G4KLX (The [ON/]G4KLX Page) http://www.qslnet.de/member/g4klx/

    HAM RADIO EQUIPMENT & ACCESSORIES http://www.area-ham.org/library/equip/equip.htm

    Ham-Links http://www.k1dwu.net/ham-links/

    HAMUNIVERSE.COM http://www.hamuniverse.com/

    Hamview DSP software http://www.qsl.net/k3pgp/Hamview/hamview.htm

    Homebrew RF Test Equipment And Software http://www.qsl.net/n9zia/wireless/appendixF.html#10

    KB4VOL   link site http://pages.prodigy.com/kb4vol/

    KE5FX http://www.qsl.net/ke5fx/

    KF6VTA & KG4TBJ http://www.geocities.com/silensiosham/index.html

    KU4AY ham radio directory http://www.ku4ay.net/

    K1DWU http://www.k1dwu.net/

    K1TTT http://www.k1ttt.net/

    K1TTT Technical Reference http://www.k1ttt.net/technote/techref.html

    K3PGP http://www.k3pgp.org/

    K3TZ Ham Radio Experimentation http://www.qsl.net/k3tz/

    K6XC (links) http://home.earthlink.net/~rluttringer/

    Lighthouses (International Lighthouse/ Lightship Weekend) http://illw.net

    Links2go http://www.links2go.net/more/www.ampr.org/

    Mels AMATEUR RADIO LINK’S http://www.users.zetnet.co.uk/melspage/amlinks.htm

    Michael Todd Computers & Communications http://www.arcompanion.com/

    MoDTS http://www.m0dts.co.uk/

    NT8N http://www.qsl.net/nt8n

    NW7US   (Amateur and Shortwave Radio) http://hfradio.org/

    N3EYR’s Radio Links http://www.isrv.com/~joel/radio.html

    PD0RKC http://www.qsl.net/pd0rkc/

    PI6ATV (ATV, Antenna, software, info) http://members.tripod.lycos.nl/PI6ATV/software.htm

    Radio Links http://www.angelfire.com/ri/theboss1/

    Radio Corner (forum) http://www.radiocorner.net

    Ray Vaughan http://rayvaughan.com/

    Reference http://www.panix.com/~clay/ham/

    streaming radio programs http://live365.com/home/index.live

    The Elmer HAMlet (information) http://www.qth.com/antenna/index.htm

    VE1XYL and VE1ALQ http://www.qsl.net/ve1alq/downloads/tetrode-ps/pwrsup.htm

    WB6VUB (links) http://www.mpicomputers.com/ham/

    WL7LP http://www.geocities.com/TimesSquare/Castle/3782/wl7lp.html

    W2XO http://www.w2xo.pgh.pa.us/

    XE1BEF  (DX, mods, links and more) http://www.geocities.com/xe1bef/


    Communications Equipment

    Australian

    Andrews Communication Systems http://www.andrewscom.com.au/

    AUSTRALIAN ENTERPRISE INDUSTRIAL http://www.spin.net.au/~aeitower/

    BENELEC www.benelec.com.au

    Bushcomm www.bushcomm.com.au

    G. & C. COMMUNICATIONS www.gccomm.com.au

    Hamak (RM Products Italy) http://www.hamak.com.au/

    Hamshack http://www.hamshack.com.au

    KENWOOD Australia http://www.kenwood.com.au/

    Kyle Communications http://www.kyle.com.au/

    ICOM Australia http://www.icom.net.au

    Mini-kits http://www.minikits.com.au/

    OZGEAR http://www.ozgear.com.au/

    Radio-Data (links) http://www.radio-data.net/

    Radio Specialists (equipment connectors and antenna) http://www.radiospecialists.com.au

    STRICTLY HAM http://www.strictlyham.com.au/

    TET-EMTRON www.tet-emtron.com

    Townsville CB& Communications http://www.vk4tub.org/tcb/tcb.html

    TTS Systems http://www.ttssystems.com.au/

    VK4-ICE Communications http://www.vk4ice.com

    WiNRADiO (PC based receivers) http://www.winradio.com.au

    International

    MFJ http://www.mfjenterprises.com/index.php

    Vertex Standard http://www.vxstd.com/en/index.html

    W7FG VINTAGE MANUALS CATALOGUE http://www.w7fg.com/index.html

    Z Communications Company (repair of old radio equipment) http://home.comcast.net/~zcomco/

    See also Kits and components


    Radio mods, cables, connection info

    batlabs (Motorola radio connection, cable info) http://www.batlabs.com/

    Hall Electronics http://www.hallelectronics.com/getech/proglink.htm

    Radio Mods http://www.mods.dk/

    WWW.ham.dmz.ro (mods info and more) http://www.ham.dmz.ro/

    W4RP IC-2720H Page http://www.w4rp.com/ic2720/

    XE1BEF  (DX, mods, links and more) http://www.geocities.com/xe1bef/

    Please also look at manufacture’s sites


    Lightning Protection

    www.DaStrike.com (video and links) http://www.dastrike.com/

    K9WK Amateur Radio http://www.k9wk.com/litenin.html

    Lightning Protection Institute http://www.lightning.org/

    Marine Grounding Systems http://www.sailmail.com/grounds.htm

    Moonraker boat lightning information http://www.moonraker.com.au/techni/lightning-marine.htm

    NLSI http://www.lightningsafety.com/nlsi_lhm/effect.html

    PolyPhaser http://www.polyphaser.com/

    RFI Lightning protection http://www.rfindustries.com.au/rfiproducts/lightning/lightning.htm

     

    Amateur Spread Spectrum

    Spread Spectrum Scene http://www.sss-mag.com/map.html

    Spread spectrum http://www.amrad.org/projects/ss/

    SS Info http://www.ictp.trieste.it/~radionet/1997_workshop/wireless/notes/index.htm


    Call-sign finders

    The DX Notebook http://www.dxer.org/callbook.html

    QRZ http://www.qrz.com/

    QSL.NET http://www.qsl.net/


    Equipment suppliers and manufacturers

    Easy-radio (your DNS server may have problems finding this site) http://www.easy-radio.co.uk/


    Kits and Components

    Australian and selected international suppliers

    ACRES ELECTRONICS http://www.acreselectronics.co.nz/product.htm

    Allthings http://www.allthings.com.au/

    Altronics http://www.altronics.com.au/

    Antique Electronic Supply http://www.tubesandmore.com/

    Antenna Systems and Supplies Inc. (sm) http://www.antennasystems.com/

    Av-COMM http://www.avcomm.com.au/

    BYONICS http://www.byonics.com/

    Clarke & Severn Electronics http://www.clarke.com.au

    Cliff Electronics (Aus) Pty. Ltd http://www.cliff.com.au/

    Computronics http://www.computronics.com.au/tools/

    David Hall Electronics http://www.dhe.com.au

    Dick Smith Electronics http://www.dse.com.au/cgi-bin/dse.storefront

    Digi-Key http://www.digikey.com/

    Dominion Electronics http://www.dominion.net.au/

    Electronics http://www.michelletroutman.com/index.htm

    Elliott Sound Products http://sound.westhost.com/index2.html

    Farnell http://www.farnell.com/

    Fox Delta http://www.foxdelta.com/

    G1MFG.com (ATV and more) http://www.g1mfg.com/index.html

    Hammond Mfg http://www.hammondmfg.com/

    Hy-Q International http://www.hy-q.com.au

    IRH Components http://www.irh.com.au/index.htm

    Jaycar http://www.jaycar.com.au/

    Microwave Dynamics http://www.microwave-dynamics.com/

    MicroZed Computers http://www.microzed.com.au/

    Mini-Circuits http://www.minicircuits.com/

    Mini-kits http://www.minikits.com.au/

    Mouser Electronics http://www.mouser.com/

    NEWTEK ELECTRONICS http://www.newtek.com.au/

    Oatley electronics http://www.oatleyelectronics.com/

    Ocean State Electronics http://www.oselectronics.com/

    Ozitronics http://www.ozitronics.com/

    pacific DATACOM http://www.pacificdatacom.com.au

    Picaxe http://www.Picaxe.com.au

    Prime Electronics http://www.prime-electronics.com.au/

    Radio Parts http://www.radioparts.com.au/

    R.C.S. Radio (circuit boards) http://www.rcsradio.com.au/

    RF Modules Australia (ZigBee) http:\www.rfmodules.com.au

    RFShop (Brisbane) http://www.rfshop.com.au/

    Rockby Electronics and Computers http://www.rockby.com.au/

    RS Components http://www.rsaustralia.com/

    Semtronics http://www.semtronics.com.au/

    Sicom http://www.sircom.co.nz

    Silvertone Electronics http://www.silvertone.com.au/

    South Island Component Centre (New Zealand) http://www.sicom.co.nz/

    Surplus Sales of Nebraska http://www.surplussales.com/

    Surplustronics (New Zealand) http://www.surplustronics.co.nz/

    Tandy (Australia) http://www.tandy.com.au/

    Teckics http://www.techniks.com/

    TTS Systems http://www.ttssystems.com.au/

    WB9ANQ’s Surplus Store http://www.qsl.net/wb9anq/

    Wiltronics http://www.wiltronics.com.au/

    Worldwide Electronic Components http:/www.iinet.net.au/~worcom

    13cm.co.uk http://www.13cm.co.uk/

    Also look at the ATV links



    PCB layout and schematic programs baas electronics LAYo1 PCB http://www.baas.nl/layo1pcb/uk/index.html

    Easytrax http://www.cia.com.au/rcsradio/

    Electronics WORKBENCH http://www.ewbeurope.com/Franklin Industries http://www.franklin-industries.com/Eagle/starteagle.html McCAD http://www.mccad.com/ OrCAD http://www.orcad.com/downloads.aspx TARGET 3001! http://www.ibfriedrich.com/english/engl_vordownload.htm Tech5 http://www.tech5.nl/eda/pcblayout TinyCAD http://tinycad.sourceforge.net/ VEGO ABACOM http://www.vego.nl/abacom/download/download.htm


    Amateur Satellites and space

    AMSAT http://www.amsat.org/

    AMSAT-DL http://www.amsat-dl.org/

    AMSAT-ZL (kiwisat) http://www.amsat-zl.org.nz/

    CSXT Civilian Space eXploration Team http://www.civilianspace.com/

    electric-web.org http://www.electric-web.org

    esa http://www.esa.int/esaCP

    Heavens-above http://www.heavens-above.com/

    ISS fan club http://www.issfanclub.com

    SATSCAPE   (free satellite tracking program) http://www.satscape.co.uk/

    Satellite tracking software http://perso.club-internet.fr/f1orl/index.html

    Satsignal http://www.satsignal.net/

    Space.com http://www.space.com/

    UHF-Satcom.com http://www.uhf-satcom.com

     

    Propagation

    NOAA http://www.sec.noaa.gov/

    IPS Radio and Space Services http://www.ips.gov.au/

    ITS http://www.its.bldrdoc.gov/

    Near-Real-Time MUF Map http://www.spacew.com/www/realtime.php

    Radio Mobile (path prediction) http://www.cplus.org/rmw/english1.html

    VK4ZU (Propagation) http://www.users.on.net/~trevorb/

     

    Satellite TV

    AV-COMM http://www.avcomm.com.au/

    KANSAT http://www.kansat.com.au/

    KRISTAL electronics http://www.kristal.com.au/index.html

    Lyngsat http://lyngsat.com/

    Nationwide Antenna Systems http://www.uq.net.au/~zznation/index.html

    Satcure http://www.satcure.com/

    SAT TV http://www.sattv.com.au/


     

    Radio and Scanning

    Australian

    Brisbane Radio Scanner http://www.angelfire.com/id/samjohnson/

    Extreme Worldwide Scanner Radio http://members.optushome.com.au/extremescan/scanning.html

    Newcastle Area Radio Frequency Guide http://scanhunter.tripod.com/index.html

    RADIO FREQUENCIES AND INFORMATION http://www.qsl.net/vk1zmc/information.html

    New Zealand

    Kiwi Radio http://kiwiradio.blakjak.net/

    NZscanners http://www.nzscanners.org.nz/

    Wellington Scanner Frequencies http://wsf2003.tripod.com/

    ZLScanner http://homepages.paradise.net.nz/lovegrov/

    ZL3TMB (Christchurch NZ) http://www.hamradio.co.nz/

    International

    Frequency guide http://www.panix.com/~clay/scanning/

    Incident Broadcast Network (including Australian feeds) http://www.incidentbroadcast.com

    Radio H.F.  (some ham stuff) http://www3.sympatico.ca/radiohf/

    RadioReference.com http://www.radioreference.com/index.php


    Amateur Radio DX and Contest

    DX Cluster

    AA1V’s DX Info-Page http://www.goldtel.net/aa1v/

    AC6V’s AR & DX Reference http://www.ac6v.com/

    Australian contesting http://www.vkham.com/index.html

    Buckmaster callsign database http://www.buck.com/cgi-bin/do_hamcall

    DX Greyline http://www.fourmilab.ch/cgi-bin/uncgi/Earth/action?opt=-p

    DX Summit http://oh2aq.kolumbus.com/dxs/

    DX 425 News http://www.425dxn.org/

    EHAM http://www.eham.net/

    EI8IC Global Overlay Mapper http://www.mapability.com/ei8ic/

    eQSL (electronic QSL) http://www.eqsl.cc/qslcard/

    German DX Foundation-GDXF http://www.gdxf.de/

    GlobalTuners (provides access to remotely controlled radio receivers all over the world) http://www.globaltuners.com/

    Ham Atlas by SP6NVK http://www.hamatlas.eu/

    Kiwi DX List http://groups.yahoo.com/group/kiwidxlist/

    Oceania Amateur Radio DX Group Incorporated http://odxg.org/

    Oceania DX Contest http://www.oceaniadxcontest.com/

    QRZ.COM http://www.qrz.com/site.html

    The AM Window http://www.amwindow.org/index.htm

    The Daily DX http://www.dailydx.com

    IARU QSL Bureaus http://www.iaru.org/iaruqsl.html

    International DX Association http://www.indexa.org/

    Internet Ham Atlas http://www.hamatlas.eu/

    IOTA http://www.425dxn.org/iota/

    IOTA groups and Reference http://www.logiciel.co.uk/iota/shtlist.html

    IOTA RSGB http://rsgbiota.org

    IOTA 425 http://www.425dxn.org/iota

    Island Radio Expedition Fondation http://www.islandradio.org/

    LA9HW HF Contest page http://home.online.no/~janalme/hammain.html

    NG3K Contest/DX Page http://www.cpcug.org/user/wfeidt/

    Northern California DX Foundation http://www.ncdxf.org

    Simple phrases in European Languages http://web.onetel.com/~stephenseabrook/

    SUMMITS on the AIR http://www.sota.org.uk/

    Telnet Access to DX Packet Clusters http://cpcug.org/user/wfeidt/Misc/cluster.html

    The DX Notebook http://www.dxer.org/

    VE6OA’s DX Links http://www.compusmart.ab.ca/agirard/dxlinks.htmVK Contest Club http://www.vkcc.com

    World of DK4KQ http://www.dl4kq.de/

    XE1BEF  DX and links http://www.geocities.com/xe1bef/

    Logging Software

    VK Contest Log (VKCL) http://web.aanet.com.au/mnds/

    VK/ZL Logger http://www.vklogger.com

    WinRD+ logging program http://www.rjmb.net/rd/index.htm


    Cluster

    AR-Technology AB5K.net http://www.ab5k.net/Home.aspx

    Clusse http://he.fi/clusse/

    CLX Home page http://clx.muc.de/

    DX CLUSTER programs http://pages.cthome.net/n1mm/html/English/DXClusters.htm

    DXCluster http://www.dxcluster.org/

    DXCluster.Info http://www.dxcluster.info/

    DxNet http://www.dxnet.free.fr/

    DX PacketCluster Sites on the Internet http://www.n4gn.com/cluster.html

    DXSpider – DX cluster system is written in perl http://linux.maruhn.com/sec/dxspider.html

    Packet Cluster user manual http://www.yccc.org/Resources/ysa/manual/

    The DXSpider User Manual http://www.dxcluster.org/main/usermanual_en.html

    VE7CC-1 Dx Spider Cluster http://www.ve7cc.net/

     

    Short Wave DX

    AUSTRALIAN RADIO DX CLUB http://www.ardxc.info/

    Electronic DX Press (HF, MW and VHF) http://members.tripod.com/~bpadula/edxp.html

    Contesting.com http://www.contesting.com/

    CQ World Wide DX Contest http://www.cqww.com/

    K6XX http://www.k6xx.com/

    Longwave Club of America (also Ham) http://www.lwca.org

    NIST time stations http://www.boulder.nist.gov/timefreq/stations/wwvb.htm

    OK1RR DX & Contesting Page http://www.qsl.net/ok1rr/

    Prime Time Shortwave http://www.primetimeshortwave.com/

    Radio Interval Signals http://www.intervalsignals.org/

    shortWWWave http://swww.dwerryhouse.com.au/

    SM3CER Contest Service http://www.sk3bg.se/contest/index.htm

    The British DX Club http://www.bdxc.org.uk/

    Yankee Clipper Contest Club http://www.yccc.org/

     

    Radio Scouting

    Scouts Australia JOTA/JOTI http://www.international.scouts.com.au/main.asp?iMenuID=9071085

    The history of the Jamboree On The Air http://home.tiscali.nl/worldscout/Jota/jota history.htm

    World Organization of the Scout Movement http://www.scout.org/jota/


    Australian Regulator

    ACMA http://www.acma.gov.au/

    International Regulator

    ITU http://www.itu.int/home/index.html



    Electronic Information and technical reference

    AC6V’s Technical Reference http://www.ac6v.com/techref.htm

    Chip directory http://www.embeddedlinks.com/chipdir/abc/s.htm#simm

    Circuit Sage http://www.circuitsage.com/

    CommLinx Solutions Pty Ltd http://www.commlinx.com.au/default.htm

    Computer Power Supply Mods http://www.qsl.net/vk4ba/projects/index.html

    Discover Circuits http://www.discovercircuits.com/

    Electronic Information http://www.beyondlogic.org/

    Electronics Links and Resources http://yallara.cs.rmit.edu.au/~pleelave/electronics1.html

    Epanorama (lots of links) http://www.epanorama.net/

    Electronics Tutorials http://www.electronics-tutorials.com/

    Electronic Theory http://www.electronicstheory.com/

    Fox Delta http://www.foxdelta.com/

    GREG’S DOWNLOAD PAGE http://www.rfcascade.com/index.html

    Hobby Projects (electronic resource) http://www.hobbyprojects.com/tutorial.html

    Hittite http://www.hittite.com

    Information site http://www.epanorama.net/

    ISO Date / Time http://wwp.greenwichmeantime.com/info/iso.htm

    Latitude/Longitude Conversion utility – 3 formats http://www.directionsmag.com/latlong.php

    New Wave Instruments (check out SS Resources) http://www.newwaveinstruments.com/index.htm

    Paul Falstad (how electronic circuits work) http://www.falstad.com/circuit/

    PINOUTS.RU (Handbook of hardware pinouts) http://pinouts.ru/

    PUFF http://www.cco.caltech.edu/~mmic/puffindex/puffE/puffE.htm

    RadioReference http://www.radioreference.com/

    RF Cafe http://www.rfcafe.com/

    RF Globalnet http://www.rfglobalnet.com

    RHR Laboratories http://www.rhrlaboratories.com/#Software

    rfshop http://www.rfshop.com.au/page7.htm

    RS232 Connections, and wiring up serial devices http://www.airborn.com.au/rs232.html

    RF Power Table

    Science Lobby (electronic links) http://www.sciencelobby.com/

    Tech FAQ http://www.tech-faq.com/

    The12volt.com (technical information for mobile electronics installers) http://www.the12volt.com/

    Electronic service

    Repair of TV Sets http://www.repairfaq.org/sam/tvfaq.htm

    Sci.Electrinic.Repair FAQ http://www.repairfaq.org/sam/tvfaq.htm

    Service engineers Forum http://www.e-repair.co.uk/index.htm

     

    Cable Data

    Andrews http://www.andrew.com/default.aspx

    Belden http://www.belden.com/

    CO-AX CABLE DATA http://www.electric-web.org/coax.htm

    Coaxial cable data http://www.qsl.net/kc6uut/coax.html

    Coaxial Cable Page http://www.cdi2.com/build_it/coaxloss.htm

    HB9ABX http://home.datacomm.ch/hb9abx/coaxdat.htm

    HB9HD http://www.hb9hd.ch/PDF/coaxcable.pdf

    KC6UUT http://www.qsl.net/kc6uut/coax.html

    NESS Engineering http://www.nessengr.com/techdata/coaxdata.html

    RF Industries cables http://www.rfindustries.com.au/rfiproducts/cablesConnectors/coaxialCables.htm

    THERFC http://www.therfc.com/coax.htm

    Times Microwave http://www.timesmicrowave.com/

    VK3KHB http://www.gak.net.au/vk3khb/atv/coaxchrt.html

    W4ZT http://w4zt.com/coax.html

    X.net Antenna cable chart http://www.x.net.au/antenna_cable.html

    50 W Coaxial Cable Information http://www.dma.org/~millersg/coax50.html

    75 W Coaxial Cable Information http://www.dma.org/~millersg/coax75.html



    Antique Radio

    Antique Electronic Supply http://www.tubesandmore.com/

    Alan Lord http://www.dundeecoll.ac.uk/sections/cs/staff/al_radio/

    Antique Radio http://antiqueradios.com/

    Apex Jr http://www.apexjr.com/

    Archives of Boatanchors http://www.tempe.gov/archives/boatanchors.html

    Australian Vintage Radio MK II http://www.southcom.com.au/~pauledgr/

    Australian Wireless (OZ-Wireless) Email List http://www.clarion.org.au/wireless/

    AWA and Fisk Radiola http://203.44.53.131/Radiola/AWA1b.htm

    Crystal Radio http://www.crystalradio.net/

    Glowbugs http://www.mines.uidaho.edu/~glowbugs/

    Hammond Museum of Radio http://www.hammondmuseumofradio.org/

    Historical Radio Society of Australia Inc. http://www.hrsa.asn.au/

    JMH’s Virtual Valve Museum http://www.tubecollector.org/numbers.htm

    John Rose’s Vintage Radio Home http://personal.nbnet.nb.ca/jrose/radios/radiomain.htm

    Klausmobile Russian Tube Directory http://klausmobile.narod.ru/td/indexe.htm

    KK7TV http://www.kk7tv.com/kk7tv.html

    Kurrajong Radio Museum http://www.vk2bv.org/museum/

    Links to Vintage Radios (Amateur) http://www.qsl.net/ka4pnv/vrlinks.htm

    Mike’s Electric Stuff http://www.netcomuk.co.uk/~wwl/electric.html

    Nostalgiar Air http://www.nostalgiaair.org/

    Phil’s Old Radios http://antiqueradio.org/

    Radio A’s Vintage Radio Page http://www.mnsi.net/~radioa/radioa.htm

    Radio Era http://www.radioera.com/

    Rap ‘n Tap http://www.midnightscience.com/rapntap/

    Replacing Capacitors http://antiqueradio.org/recap.htm

    Savoy Hill Publications http://www.valvesunlimited.demon.co.uk/Noframes/savoy_hill_publications.htm

    South East Qld Group of the HRSA http://seqg.tripod.com

    SEQG of the HRSA Crystal comp http://www.clarion.org.au/crystalset/

    SEQG One Tube Radio comp http://seqg.tripod.com/onetube/onetube.html

    TEARA’S VINTAGE RADIO LINK PAGE http://www.ipass.net/~teara/vin.html

    The Vintage Radio Emporium http://www.vintageradio.info/

    The Wireless Works http://www.wirelessworks.co.uk/

    Triode Tube Data http://www.triodeel.com/tubedata.htm Tubesworld  (Valve Audio and Valve data) http://www.tubesworld.com/

    Vintage Radio http://www.vintage-radio.com/index.shtml

    Vintage Radio Times http://www.vintageradiotimes.com/Page_1x.html

    Vintage Radios and programs http://www.compusmart.ab.ca/agirard/VINTAGE.HTM

    Vintage Radios UK http://www.valve.demon.co.uk/

    Vintage Radio and Test Equipment Site http://www.geocities.com/eb5agv/

    Vintage Radio World http://www.burdaleclose.freeserve.co.uk/

    Vintage Radio and Audio Pages http://www.mcallister.simplenet.com/

    VMARS http://www.vmars.org.uk/

    W7FG VINTAGE MANUALS CATALOGUE http://www.w7fg.com/index.html

    Ye Olde Hurdy Gurdy Museum of Vintage Radio http://ei5em.110mb.com/museum.html



    Valve Audio and Valve data Ake’e Tube Data http://w1.871.telia.com/~u87127076/index.htm CVC http://www.chelmervalve.com/index.html

    Data Sheet Locator http://www.duncanamps.co.uk/cgi-bin/tdsl3.exe/

    Eimac http://www.cpii.com/eimac/index.html

    Frank’s Electron tube Pages http://home.wxs.nl/~frank.philipse/frank/frank.html

    Hammond  Manufacturing http://www.hammondmfg.com/

    House of Tubes http://www.house-of-tubes.com/home/Library.asp

    High Voltage Tube Archive http://www.funet.fi/pub/sci/electrical/tesla/tubes/

    Kiewavly http://home.mira.net/~kiewavly/audio1.html

    Industrial Valve Data http://www.netcomuk.co.uk/~wwl/data.html

    Machmat http://www.machmat.com/

    NJ7P Tube Data Search http://hereford.ampr.org/cgi-bin/tube?index=1

    RCA-R10 Data http://www.nmr.mgh.harvard.edu/~reese/RC10/

    SAS Audio Labs http://www.sasaudiolabs.com/

    Sowter Audio Transformers http://www.sowter.co.uk/

    Spice Valves http://www.duncanamps.com/spicevalves.html

    Tubetec http://www.tubetec.freeserve.co.uk/

    TUBEWORLD INC. http://www.tubeworld.com/

    Tube datasheets http://www.wps.com/archives/tube-datasheets/index.html

    Vacuum Tube Links http://www.michelletroutman.com/tubes.htm

    Valves and Tubes http://www.euramcom.freeserve.co.uk/tubes.html

    Valve Data Links http://www.thevalvepage.com/links/valvdata.htm

    Valve Data http://www.arrakis.es/~igapop/referenc.htm

    Valves Unlimited http://www.valvesunlimited.demon.co.uk/Noframes/links.htm

    Valve and Tube Supplies http://www.valves.uk.com/

    Valveamps.com http://www.valveamps.com/



    Audio

    Audio Calculators and Links http://www.audioscientific.com/Audio Calculators & References Links.htm

    BKC GROUP http://www.bkcgroup.fsnet.co.uk/

    Car Audio Australia http://www.caraudioaustralia.com/

    DIY Audio http://www.diyaudio.com/

    Duncan’s Amp Pages http://www.duncanamps.com/

    Elliott Sound Products http://sound.westhost.com/audiolink.htm

    GM ARTS http://users.chariot.net.au/~gmarts/

    Norman Koren http://www.normankoren.com/Audio/

    Rane http://www.rane.com/

    The Self Site http://www.dself.demon.co.uk/

    The Class-A Amplifier Site http://www.gmweb.btinternet.co.uk/



    Magazines

    DUBUS (VHF magazine) http://www.dubus.org/

    Elektor Electronics http://www.elektor-electronics.co.uk/

    Harlan Technologies (Amateur Television Quarterly) http://www.hampubs.com/

    Radio & Communications Monitoring Monthly http://www.monitoringmonthly.co.uk/

    SILICON CHIP http://www.siliconchip.com.au/

    VHF Communications Mag http://www.vhfcomm.co.uk/



    SETI

    SETI http://www.setileague.org/homepg.htm

    SETI Australia http://www.seti.org.au/

    SCADA considerations

    Procedures

    • Corporate Information Protection
    • Security Management
    • Information Classification
    • Physical (and Environmental) Security
    • Personnel Security
    • Security Awareness Training
    • Security Incident Response
    • Security Monitoring
    • Network Security
    • PC/Workstation Security
    • Support and Operational Security Related
    • Encryption and Information Confidentiality
    • Authorization Controls
    • Identification and Authentication Mechanisms
    • Systems Life Cycle Security
    • Business Continuity Planning
    • Media Security
    • Third Party Services

    Typical concerns and points discussion:

    • Inbound and out Bound FTP
    • Suggest use of DMZ
    • Suggest use of Secure FTP
    • Suggest use of restricted secure IP addresses / tunnelling
    • Suggest use of private feeds

    Modem issues used with dial in services

    • No dial back
    • No Authentication
    • No Secure ID
    • Possibly automated scripts used, so hard coded usernames and passwords used.
    • Internet sharing may be turned on, allowing routing via workstations.

    Increased data security and integrity considerations

    • Data backups
    • System redundancy
    • Site and content filtering
    • Virus protection
    • Standard system procurement (discounts and spares)
    • Network and services redundancy
    • Network monitoring
    • Service availability monitoring
    • Internal controls
    • Vendor / external service supplier
    • Capacity management
    • Change management system
    • Asset management system
    • Telecommunication and telephony bulk cost discounting
    • Etc.

    Use and support for corporate application considerations

    • Email
    • Intranet
    • Internet
    • Corporate virus protection
    • Asset management
    • Change management
    • Project management
    • Performance / capacity management
    • Reduction of Cost
    • Use of corporate applications
    • Reduction of manual processes

    Other things to keep in mind:

    • SCADA monitoring system must be isolated from network errors and systems events. This will prevent SCADA operational systems being effected by network or corporate system issues / outages.
    • Review Network topology to ensure internal and external vulnerabilities are not currently being and cannot be abused.
    • Review of router configurations
    • Use of change management system
    • Review remote dial in systems
    • Firewall SCADA systems off from corporate applications
    • Uncontrolled networks and systems within the SCADA environment will compromise the corporate environments integrity and security.
    • Determine if systems used within SCADA are built to a standard operating environment.

    The EDinburgh Great Shiraz Challenge

    Kerry and I went along to the EDinburgh Cellars Great Shiraz Challenge.

    Between Kerry and I we tasted more than 25 great wines over a harrowing 2.5 hours of hustle and bustle in a huge tent in the ED’s carpark. It was great, we both thought that it was well worth the $30/head entry fee.

    One of the great things was the amount of large and small wine companies presenting their spoils. Refreshingly many of the tasting areas were manned by the wine maker, winery owner or someone of similar stature. This made for great conversations and allowed us to find other great non-mainstream wineries on the day.

    As Kerry (Wine group – 9yrs) and I (Corporate) both worked for SouthCorp (Prior to Fosters), we agreed that we would be looking for the special wines of the day. Well we did grab an RWT on the way out as the last tasting for the day – we are not stupid.

    We had a great day overall and purchased and ordered some great wins at the Cellars after the event.

    It was great catching up with Barb and Karel from Lengs and Cooter Wines and taste some of their great wines. Barb used to work at SouthCorp for many years and Karl worked at Telstra, but Kerry and I agree that they make great wines.

    Of the wines in the winning list below our favourites are:

    2006 Woodstock “The Stocks” Shiraz

    2004 Bullers Caliope Shiraz

    2006 Hentley Farm “The Beast” Shiraz

    2005 d’Arenberg Dead Arm Shiraz

    2006 Glaetzer ‘Bishop’ Shiraz

    Other top votes from us for the day are:

    2008 Mike Press Adelaide Hills Shiraz (It’s been a long time since we’ve tasted such a good cheap wine)

    2007 Honey MoonVineyard Adelaide Hills Shiraz

    2004 Lengs & Cooter Old Vines Shiraz

    2004 Lengs & Cooter Reserve Shiraz

    2005 Artful Dodger Barossa Shiraz

    2007 Veronique Regions Shiraz

    2006 Cape Jaffa La Lune Biodynamic Shiraz

    2006 Ceravolo Sparkling Shiraz

    2007 Yelland & Papps Greenock Shiraz

    Results – Shiraz Challenge

    Shiraz Day 2008 was a massive hit, with a record crowd of over 900 slurping through a field of just over 300 Shiraz. As always, we ask attendees to vote for their favourite wine of the day, and congratulations goes to Clarendon Hills for their superbly compelling 2006 Liandra Shiraz. Here’s the full list of the Top 20:

    2006 Clarendon Hills Liandra Syrah

    2005 Torbreck Factor Shiraz

    2005 Langmeil Freedom 1843 Shiraz

    2006 Hentley Farm ‘The Beast’ Shiraz

    2005 Whistler Reserve Shiraz

    2006 Penfolds RWT Shiraz

    2005 Wild Witch Shiraz

    2005 d’Arenberg Dead Arm Shiraz

    2005 Dutschke St Jakobi Shiraz

    2006 Woodstock ‘The Stocks’ Shiraz

    2006 Brick Kiln Shiraz

    2004 Bullers Caliope Shiraz

    2006 Hentley Farm ‘The Beauty’

    2005 Pikes ‘The E.W.P’ Shiraz

    2004 Paracombe Somerville Shiraz

    2006 Kalleske Greenock Shiraz

    2005 Bendbrook Goat Track Shiraz

    2004 Penfolds St Henri Shiraz

    2004 Bethany Wines GR9 Reserve

    2005 Paxton EJ Shiraz

    TOP 20 UNDER $30:

    2005 Tin Shed Melting Pot Shiraz

    2004 Carlei Estate ‘Green Vineyard’

    2004 Majella Shiraz

    2007 Torbreck Woodcutters Shiraz

    2005 Hugo Shiraz

    2006 Tar & Roses Shiraz

    2004 Whistler Shiraz

    2005 2 Mates Shiraz McLaren Vale

    2005 d’Arenberg Footbolt Shiraz

    2006 Mitolo Jester Shiraz

    2006 Guichen Bay Vineyards Reserve

    2006 Pirathon Shiraz by Kalleske

    2006 Scarpantoni Block 3 Shiraz

    2006 Naked Run Barossa Shiraz

    2006 Bird in Hand Shiraz

    2006 O’Leary Walker Shiraz

    2006 Glaetzer ‘Bishop’ Shiraz

    2007 Paxton Quandong Shiraz

    2006 Trevor Jones ‘Boots’ Shiraz

    2005 Dutschke Gods Hill Road Shiraz

    d’Arenberg

    Corporate Phone Lockdown Links

    Hi,

    I’m looking at some of the techniques used to lockdown the Iphone, Samsung, Sony and HDC mobile phones. I hope others find the links useful.

    Iphone

    Lock down the information on your iPhone and iPod touch
    http://www.touchtip.com/iphone-and-ipod-touch/lock-down-the-information-on-your-iphone-and-ipod-touch/

    iPhone’s PIM lockdown
    http://forum.brighthand.com/showthread.php?t=264166&page=2

    Apple ‘wise’ to lock down iPhone software
    http://www.itnews.com.au/News/44505,apple-wise-to-lock-down-iphone-software.aspx

    iPhone lockdown to boost on-demand services
    http://www.pcmag.co.uk/vnunet/news/2194973/iphone-lockdown-benefits-firms

    Wired’s Easy-Peasy iPhone Lockdown Checklist
    http://www.tuaw.com/2007/09/28/wireds-easy-peasy-iphone-lockdown-checklist/

    Gartner: iPhone 2.0 cuts business mustard
    http://news.cnet.com/8301-1001_3-10016270-92.html

    3G iPhone: The business perspective
    http://news.cnet.com/3G-iPhone-The-business-perspective/2100-1041_3-6243471.html

    What IT staff can do if the CEO gets an iPhone
    http://www.infoworld.com/article/07/07/24/What-to-do-if-the-CEO-gets-an-iPhone_1.html

    Iphone Hacking
    http://www.9to5mac.com/hacked-iphoneOS-beats-Apple%27s-Updated-OS-hands-down-23459856

    Iphone Enterprise
    http://www.apple.com/iphone/enterprise/
    http://www.apple.com/iphone/enterprise/integration.html

    New Specification to Lock Down Mobile Phones
    http://www.cio.com/article/24369/New_Specification_to_Lock_Down_Mobile_Phones

    Samsung

    Sony

    HDC

    ———– Advertisement ———-
    RapidRepair.com RapidRepair.com is dedicated to the service, repair, and modification of ALL iPod, iPhone, Zune, and other small electronic devices.

    EFT Syetms and Device Considerations

    EFT devices and systems differ depending on hardware vendor, country and bank / payment aggregator.
    Below is a list of things you may like to consider. This list is off the top of my head so it is probably not complete.

    Looking at the products and relationships us usually a good start.

    Things to consider:

    • Card skimming methods
    • Some EFT POS devices restrict the connection of a skimmer
    • Review levels of associated fraud
    • Review devices and EFT methods
    • Review terminal identification (merchant and customer)
    • Manual processing. (internal and external)
    • eCommerce products
    • PC based software
    • Dedicated server services (Nobil, etc.)
    • Web based engine (Custom objects, Web pop-ups, etc)
    • Authorisation / identification methods (Merchant and customer)
    • TCPIP session hijacking / session spoofing
    • Direct Debit as well as Credit Cards.
    • Swift (methods and controls)
    • Telegraphic transfer (methods and controls)
    • Payment aggregator relationships (eg. Payment Tech, manual processing, cheque scanning, etc.)
    • Internet banking facilities (attack / penetration,  Certificate registration / management, ISP SLA’s, etc.)
    • Implementation of Smart Card and / or alternative customer recognition devices.
    • Outsourcing and associated risks / service level agreements
    • Payment processing
    • Payment clearance
    • Payment switching
    • Reporting (segregation of merchant / customers / aggregators / partners / local / international)
    • Fraud detection and reporting
    • 3rd party acquiring risks
    • Single merchant ID many businesses
    • Allows moneys to be laundered if the payment aggregator does not place appropriate controls on the merchant.
    • Encryption used
    • Internet / trusted partner / inter-bank / extranet
    • Private and / or public certificates
    • Single use certificates
    • Client side certificates
    • Remittance advice processes and controls.
    • EFT disaster recovery and manual fall back procedures (associated security and reconciliation risks)
    • Trusted partner relationships, SLA’s, liabilities and risks.
    • EFT regulatory / legal requirements (inter-bank and government)
    • Refund processing / authorisation. (policies, procedures, controls, etc.)
    • CVV, CVV-2 / CVC-2 processing and management. (http://www.atlanticpayment.com/CVV.htm)
    • Fraud detection mechanism (neural networks, inter-bank / department customer checks, etc)
    • Supported card schemes (AMEX/Visa/Mastercard/Discover/etc )
    • Review EFT floor limits (corporate and SME merchants)
    • Review the ability to withhold merchant settlement until the presence of fraud has been determined.
    • Review customer identification details. Such as (This varies around the world depending on local regulations / privacy laws)
    • Review real-time and batched processing methods and controls (sequence numbers, access to raw data, etc.)
    • Review processing with and without expiry dates. (exception controls and policies)
    • Review exception / fraud reports.
    • Review payment store and forward policies and procedures.
    • Review Pre-Auth and Completion controls.
    • Token based payment (eCash, etc)
    • Merchant reconciliation, reporting methods and controls (paper, Internet, email, PDF, Fax, etc.) and associated security.
    • Real time gross settlement policies, procedures and controls. (IT and amounts)
    • Card issuing policies and procedures. (customer ID checks, etc)
    • Banking infrastructure (ingress / egress) controls and security. (Web, partner, payment switches, outsourced infrastructure, monitoring / reporting.)
    • Use of Internet technologies for inter-bank transfers and remote equipment.
    • Physical security and controls of devices, ATM,s, line encryptors, etc.

    Bluetooth – Security

    Redirected from Bluetooth

     

    Source

    1 Bluetooth
    2 Wireless- History
    3 Wireless- Technologies
    4 Bluetooth- Technical Introduction
    5 Bluetooth- Advantages
    6 Bluetooth- Applications
    7 Bluetooth- Security Issues
    7.1 The SNARF attack
    7.2 The BACKDOOR attack
    7.3 The BLUEBUG attack
    7.4 Bluejacking
    7.5 Warnibbling
    8 Future of Bluetooth
    9 See also:
    10 Reference List

    Bluetooth

    Bluetooth is a new technology that utilises radio frequency waves as a way to communicate wirelessly between digital devices. It sets up personal area networks that incorporate all of a persons digital devices into one system for both convergence and convenience.

    Wireless- History

    Many people put the invention of [wireless] radio down to Guglielmo Marconi, who in 1895 sent the first radio telegraph transmission across the English Channel. Only twelve years later radio began being used in the public sphere. [Mathias, p.2] Up until then however, many wireless pioneers conducted trials across lakes where the antenna used to transmit the signal was longer than the distance across the lake. [Brodsky, p. 3] After its introduction the main use of wireless radio was for military communications where its first use was for the Boer War. [Flichy, p. 103] The invention of broadcast radio ensured the feasibility of wireless technologies. [Morrow, p. 2] By the 1920s, radio had become a well-recognised mass medium. [Flichy, p. 111] From the 1980s until now, wireless communications have been through several stages, from 1G (analogue signal), 2G (digital signal) and 3G (always on, faster data rate). [Lightman and Rojas, p. 3] The history of Bluetooth is a much more recent one, with the first Bluetooth-enabled products coming into existence in 2000. Named after Harald Blatand the first, king of Denmark around twelve hundred years ago, who joined the Danish and Norwegian kingdoms, Bluetooth technology is founded on this same unifying principle of being able to unite the computer and telecommunication industr[ies]. [Ganguli, p. 5] In 1994 the Ericsson Company began looking into the idea of replacing cables connecting accessories to mobile phones and computers with wireless links, and this became the main inspiration behind Bluetooth. [Morrow, p. 10]

    Wireless- Technologies

    Bluetooth is not the only wireless technology currently being developed and utilised. Other wireless technologies, including 802.11b, otherwise known as Wi-Fi, Infrared Data Association (IrDA), Ultra- Wideband Radio (UWB), and Home RF are being applied to similar technologies that Bluetooth use with mixed results. 802.11 is the most well known technology, excluding Bluetooth, and uses the same radio frequency, meaning that they are not compatible as they cause interference with each other. 802.11 is being implemented into universities in the US, Japan and China, as well as food and beverage shops where they are being used to identify students and customers. Even airports have taken up the 802.11 technology, with airports all over America, and three of Americas most prominent airlines promoting the use of it. [Lightman and Rojas, p. 202-3] Infrared Data Association is extremely inferior to that of Bluetooth. Its limitations include only being able to communicate point-to-point, needing a line of sight, and it has a speed of fifty- six kilobytes per second, whereas Bluetooth is one megabyte per second. [Ganguli, p. 17] The Ultra- Wideband Radio is superior to that of Bluetooth in that it can transmit at greater lengths (up to 70 metres), with only half of the power that Bluetooth uses. [Ganguli, p.17] HomeRF is a technology that is not very well known. It is used for data and voice communication and targeted for the residential market segment and does not serve enterprise- class WLANs, public access systems or fixed wireless Internet access. [Ganguli, p.17-18]

    Bluetooth- Technical Introduction

    Bluetooth is a short- range radio device that replaces cables with low power radio waves to connect electronic devices, whether they are portable or fixed. The Bluetooth device also uses frequency hopping to ensure a secure, quality link, and it uses ad hoc networks, meaning that it connects peer-to-peer. It can be operated worldwide and without a network because it uses the unlicensed Industrial- Scientific Medical (ISM) band for transmission that varies with a change in location. [Ganguli, p. 25-6] The Bluetooth user has the choice of point-to-point or point-to-multipoint links whereby communication can be held between two devices, or up to eight. [Ganguli, p. 96] When devices are communicating with each other they are known as piconets, and each device is designated as a master unit or slave unit, usually depending on who initiates the connection. However, both devices have the potential to be either a master or a slave. [Swaminatha and Elden, p. 49]

    Bluetooth- Advantages

    There are many advantages to using Bluetooth wireless technologies including the use of a radio frequency, the inexpensive cost of the device, replacing tedious cable connections, the low power use and implemented security measures. The use of an unlicensed radio frequency ensures that users do not need to gain a license in order to use it. Unlike Infrared which needs to have a line of sight in order to work, Bluetooth radio waves are omnidirectional and do not need a clear path. The device itself is relatively cheap and easy to use, one can be bought for around ten American dollars, and this price is currently decreasing. Compare this to the expensive cost of implementing hundreds of cables and wires into an office and there is no competition. Of course, this is the main reason for the take -up in Bluetooth -enabled devices; it does away with cables. Another of Bluetooths advantages is its low power use, ensuring that battery operated devices such as mobile phones and personal digital assistants wont have their battery life drained with the use of it. This low power consumption also guarantees minimal interruption from other radio operated and wireless devices that operate at a higher power. Bluetooth has several enabled security measures that ensures a level of privacy and security, including frequency hopping, whereby the device changes radio frequency sixteen hundred times per second. Also within the security tools are encryption and authentification mechanisms that guarantee little interference by unauthorised hackers. [Ganguli, p. 330] One of the best advantages of Bluetooth devices, especially the hands free device that connects to a mobile phone, is that it removes radiation from the brain region. [Tsang, p.1]

    Bluetooth- Applications

    The applications that are in development or current use for the Bluetooth technology include such areas as automotive, medical, industrial equipment, output equipment, digital -still cameras, computers, and communications systems. [Lightman and Rojas, p. 201] Bluetooth is an ad hoc network user, and therefore it may be used for social networking, i.e. people can meet and share files or link their Bluetooth devices together to play games or other such activities. [Smyth, p. 70] Using Bluetooth, a mobile phone can become a three- way phone, where at home it connects to a landline for cheaper calls, on the move it acts as a mobile phone and when it comes in contact with another Bluetooth-enabled phone it acts as a walkie- talkie. This walkie- talkie option allows for free interaction and communication, as Bluetooth is not connected to any telecommunications network. [Gupta, p.1] Bluetooth also allows automatic synchronization of your desktop, mobile computer, notebook and your mobile phone for the user to have all of their data managed as one. [Gupta, p.1]

    Bluetooth- Security Issues

    Bluetooth has several threats which range in level of risk and how widespread the action is. These threats have the ability to provide criminals with sensitive information on both corporate and personal levels. The only way to avoid such threats is for manufacturers, distributors, and consumers to be provided with more information on how they are committed, current attack activity and how to combat them. This information can be used on a technical level for manufacturers, it can be used by distributors at retail levels to teach consumers the risks and it can be used directly by consumers to be aware of the threats. The outcome of such research will allow end users of Bluetooth products to have an upper hand in this wireless warfare. Bluetooth security is in early stages with regards to both the attackers, their techniques and consumers understanding of these attacks. Some research has been conducted into what the attackers are doing and how they do it. Adam Laurie of A.L Digital Ltd http://www.thebunker.net/release-bluestumbler.htm is leading the research race in Bluetooth security and is often linked to academic resources. Laurie’s research has uncovered the following capabilities of Bluetooth attacks:

    • Confidential data such as the entire phone book, calender and the phone’s IMEI.
    • Complete memory contents of some mobile phones can be accessed by a previously trusted (“paired”) device that has since been removed from the trusted list.
    • Access can be gained to the AT command set of the device, giving full access to the higher level commands and channels, such as data, voice and messaging.

    Attacks on Bluetooth devices at this stage are relatively new to consumers, and therefore are not widely seen as a real threat. Attacks such as the Bluejack attack are probably more recognised by consumers due to its perceived humorous and novelty nature as well as the ease to Bluejack someone. Users who allow their phone to be Bluejacked open the door to more serious attacks, such as the Backdoor attack which have a low level of awareness amongst consumers as attackers can attach to the device with out the users knowledge. Corporations are starting to understand the risks Bluetooth devices pose, Michael Ciarochi (in Brewin 2004) stated that ‘Bluetooth radios were included in laptop PCs that were being configured by an IT Engineer. It raises the possibility of opening a wireless back door into data stored on the PCs. Such a security weakness would be extremely attractive to hackers. Although Bluetooth invites hackers to such attacks; Bluetooth Venders are playing down the risks, Brewin (2004) said that ‘Bluetooth advocates last week dismissed growing security fears about the short-range wireless technology, saying any flaws are limited to a few mobile-phone models. They also detailed steps that users can take to secure Bluetooth devices’. There are many methods of Bluetooth attacks, the Snarf, the Backdoor, Bluebug, Bluejack and Warnibbling attack are the only recognised attacks at this early stage. Below are explanations of such attacks.

    The SNARF attack

    It is possible for attackers to connect to the device without alerting the user, once in the system sensitive data can be retrieved, such as the phone book, business cards, images, messages and voice messages.

    http://www.salzburgresearch.at/research/gfx/bluesnarf_cebit2004.pdf

    Local Copy: BlueSnarf_CeBIT2004.pdf

    The BACKDOOR attack

    The backdoor attack is a higher concern for Bluetooth users; it allows attackers to establishing a trust relationship through the “pairing” mechanism, but ensuring that the user can not see the target’s register of paired devices. In doing this attackers have access to all the data on the device, as well as access to use the modem or internet; WAP and GPRS gateways may be accessed without the owner’s knowledge or consent.

    The BLUEBUG attack

    This attack gives access to the AT command set, in other words it allows the attacker to make premium priced phone calls, allows the use of SMS, or connection the internet. Attackers can not only use the device for such fraudulent exercises it also allows identity theft to impersonate the user.

    Bluejacking

    Dibble (2004) explained that ‘Just as SMS was spawned, there’s a new craze that’s spreading across parts of Europe. Reportedly, it’s more prominent in the UK, but popular elsewhere too’. Bluejacking allows attackers to send messages to strangers in public via Bluetooth. When the phones ‘pair’ the attacked can write a message to the user. Although it may seem harmless at first, there is a downside. Once connected the attacker may then have access to any data on the users Bluetooth device, which has obvious concerns. Powell (2004: 22) explained that ‘Users can refuse any incoming message or data, so Bluejackers change their username to a short barb or compliment to beat you to the punch. For example, you might receive something along the lines of “Incoming message from: Dude, you’ve been Bluejacked.” Or, “Incoming message from: ROI is overrated.” Bluejacking is regarded as a smaller threat to Bluetooth as users being attacked are aware they have been Bluejacked. This does not mean however that they are aware that sensitive information is being accessed and used in a malicious manner.

    http://www.bluejackq.com/

    Warnibbling

    Warnibbling is a hacking technique using Redfang, or similar software that allows hackers to reveal corporate or personal sensitive information. Redfang allows hackers to find Bluetooth devices in the area, once found, the software takes you through the process of accessing any data that is stored on that device. Redfang also allows non-discoverable devices to be found. Whitehouse explains when testing Redfang ‘One of the first obstacles we had to overcome was the discovery of non-discoverable devices (it was surprising to see the number of devices that dont by default implement this security measure)’. http://www.atstake.com/research/reports/acrobat/atstake_war_nibbling.pdf

    Future of Bluetooth

    Further information, and somewhat speculation is required for consumers and Bluetooth stakeholders on the future of Bluetooth. Such information will provide a clearer understanding of why security of Bluetooth must be improved. Luo and Lee (2004) provide a short term prediction of where Bluetooth is heading, Europe and Asian countries already offer electronic newspapers, subway tickets, and car parking fees via wireless devices. Collins (2003) says that Bluetooth devices ‘appear to be more secure than 802.11 wireless LANs. However, this situation may not last, as the Bluetooth technology becomes more widespread and attracts greater interest from the hacking community’.

    http://www.arraydev.com/commerce/jibc/0402-10.htm

    See also:

    Reference List

    • Brodsky, I. (1995) Wireless: The Revolution in Personal Telecommunications, Massachussetts, USA: Artech House Inc, ISBN 0890067171 (Erin Watson)
    • Collins, G. (2003) Bluetooth Security. Byte.com [Online], Available: Academic Search Elite, ISSN:0360-5280 [Accessed 6/9/04]. (Ben Henzell)
    • Dibble, T (2003) ‘Bluejack city: a new wireless craze is spreading through Europe’ [Online]. Available: http://www.sys-con.com/Wireless/article.cfm?id=710 [Accessed 4/8/04. (Ben Henzell)
    • Finn, E. (2004) Be carefull when you cut the cord. Popular Science [Online], vol. 264, issue. 5, p30. Available: Ebsco Host: Academic Search Elite, ISSN:0161-7370 [Accessed 6/9/04]. (Ben Henzell)
    • Flichy, P. (1995) Dynamics of Modern Communication, London: Sage Publications, ISBN 0803978502 (Erin Watson)
    • Ganguli, M. (2002) Getting Started with Bluetooth, Ohio: Premier Press, ISBN 1931841837 (Erin Watson)
    • Gupta, P. 1999. Bluetooth Technology: What are the Applications?. http://www.mobileinfo.com/Bluetooth/applic.htm (accessed August 23, 2004). (Erin Watson)
    • Laurie, B & L (2003) Serious flaws in Bluetooth security lead to disclosure of personal data [Online]. Available: http://www.thebunker.net/release-bluestumbler.htm [Accessed 4th Aug 2004]. (Ben Henzell)
    • Lightman, A. and Rojas, W. (2002) Brave New Unwired World, New York, USA: John Wiley and Sons, Inc., ISBN 0471441104 (Erin Watson)
    • Luo, X. Lee, C. (2004). Micropayments in Wireless M-Commerce: Issues, Security, and Trend[Online]. Available: http://www.arraydev.com/commerce/jibc/0402-10.htm [Accessed 4/8/2004] (Ben Henzell)
    • Morrow, R. (2002) Bluetooth Operation and Use, New York, USA: The McGraw- Hill Companies, ISBN 007138779X (Erin Watson)
    • Powell, W. (2004) The Wild Wild Web T+D [Online], Vol. 58, issue. 1, p22. Available: Academic Search Elite, ISSN:1535-7740 [Accessed 6/9/04]. (Ben Henzell)
    • Smyth, P. (ed.)(2004) Mobile and Wireless Communications: Key Technologies and Future Applications, London, UK: The Institute of Electrical Engineers, ISBN 0863413684 (Erin Watson)
    • Swaminatha, T. and Elden, C. (2003) Wireless Security and Privacy: Best Practices and Design Techniques, Massachussetts, USA: Pearson Education, Inc., ISBN 0201760347 (Erin Watson)
    • Tsang, W. et al. Date unknown. Bluetooth Applications. http://ntrg.cs.tcd.ie/undergrad/4ba2.01/group3/applications.html (accessed August 23, 2004). (Erin Watson)
    • Whitehouse, O. (2003).’War Nibbling: Bluetooth Insecurity’ [Online]. Available: http://www.atstake.com/research/reports/acrobat/atstake_war_nibbling.pdf [Accessed 9/8/04] (Ben Henzell)

    Erin Watson 08:47, 8 Sep 2004 (EST) –nhenzell 12:30, 8 Sep 2004 (EST)

    Serious flaws in bluetooth security lead to disclosure of personal data

    source

     

     

    Summary
    In November 2003, Adam Laurie of A.L. Digital Ltd. discovered that there are serious flaws in the authentication and/or data transfer mechanisms on some bluetooth enabled devices. Specifically, three vulnerabilities have been found:

    Firstly, confidential data can be obtained, anonymously, and without the owner’s knowledge or consent, from some bluetooth enabled mobile phones. This data includes, at least, the entire phone book and calendar, and the phone’s IMEI.

    Secondly, it has been found that the complete memory contents of some mobile phones can be accessed by a previously trusted (“paired”) device that has since been removed from the trusted list. This data includes not only the phonebook and calendar, but media files such as pictures and text messages. In essence, the entire device can be “backed up” to an attacker’s own system.

    Thirdly, access can be gained to the AT command set of the device, giving full access to the higher level commands and channels, such as data, voice and messaging. This third vulnerability was identified by Martin Herfurt, and they have since started working together on finding additional possible exploits resulting from this vulnerability.

    Finally, the current trend for “Bluejacking” is promoting an environment which puts consumer devices at greater risk from the above attacks.
    Vulnerabilities

    The SNARF attack:
    It is possible, on some makes of device, to connect to the device without alerting the owner of the target device of the request, and gain access to restricted portions of the stored data therein, including the entire phonebook (and any images or other data associated with the entries), calendar, real-time clock, business card, properties, change log, IMEI (International Mobile Equipment Identity [6], which uniquely identifies the phone to the mobile network, and is used in illegal phone ‘cloning’). This is normally only possible if the device is in “discoverable” or “visible” mode, but there are tools available on the Internet that allow even this safety net to be bypassed[4]. Further details will not be released at this time (see below for more on this), but the attack can and will be demonstrated to manufacturers and press if required.

    The BACKDOOR attack:
    The backdoor attack involves establishing a trust relationship through the “pairing” mechanism, but ensuring that it no longer appears in the target’s register of paired devices. In this way, unless the owner is actually observing their device at the precise moment a connection is established, they are unlikely to notice anything untoward, and the attacker may be free to continue to use any resource that a trusted relationship with that device grants access to (but note that so far we have only tested file transfers). This means that not only can data be retrieved from the phone, but other services, such as modems or Internet, WAP and GPRS gateways may be accessed without the owner’s knowledge or consent. Indications are that once the backdoor is installed, the above SNARF attack will function on devices that previously denied access, and without the restrictions of a plain SNARF attack, so we strongly suspect that the other services will prove to be available also.

    The BLUEBUG attack:
    The bluebug attack creates a serial profile connection to the device, thereby giving full access to the AT command set, which can then be exploited using standard off the shelf tools, such as PPP for networking and gnokii for messaging, contact management, diverts and initiating calls. With this facility, it is possible to use the phone to initiate calls to premium rate numbers, send sms messages, read sms messages, connect to data services such as the Internet, and even monitor conversations in the vicinity of the phone. This latter is done via a voice call over the GSM network, so the listening post can be anywhere in the world. Bluetooth access is only required for a few seconds in order to set up the call. Call forwarding diverts can be set up, allowing the owner’s incoming calls to be intercepted, either to provide a channel for calls to more expensive destinations, or for identity theft by impersonation of the victim.

    Bluejacking:
    Although known to the technical community and early adopters for some time, the process now known as “Bluejacking”[1] has recently come to the fore in the consumer arena, and is becoming a popular mechanism for exchanging anonymous messages in public places. The technique involves abusing the bluetooth “pairing”[2] protocol, the system by which bluetooth devices authenticate each other, to pass a message during the initial “handshake” phase. This is possible because the “name” of the initiating bluetooth device is displayed on the target device as part of the handshake exchange, and, as the protocal allows a large user defined name field – up to 248 characters – the field itself can be used to pass the message. This is all well and good, and, on the face of it, fairly harmless, but, unfortunately, there is a down side. There is a potential security problem with this, and the more the practice grows and is accepted by the user community, and leveraged as a marketing tool by the vendors, the worse it will get. The problem lies in the fact that the protocol being abused is designed for information exchange. The ability to interface with other devices and exchange, update and synchronise data, is the raison d’être of bluetooth. The bluejacking technique is using the first part of a process that allows that exchange to take place, and is therefore open to further abuse if the handshake completes and the “bluejacker” successfully pairs with the target device. If such an event occurs, then all data on the target device becomes available to the initiator, including such things as phone books, calendars, pictures and text messages. As the current wave of PDA and telephony integration progresses, the volume and quality of such data will increase with the devices’ capabilities, leading to far more serious potential compromise. Given the furore that irrupted when a second-hand Blackberry PDA was sold without the previous owner’s data having been wiped[3], it is alarming to think of the consequences of a single bluejacker gathering an entire corporate staff’s contact details by simply attending a conference or camping outside their building or in their foyer with a bluetooth capable device and evil intent. Of course, corporates are not the only potential targets – a bluejacking expedition to, say, The House of Commons, or The US Senate, could provide some interesting, valuable and, who’s to say, potentially damaging or compromising data.<<<

     

    The above may sound alarmist and far fetched, and the general reaction would probably be that most users would not be duped into allowing the connection to complete, so the risk is small. However, in today’s society of instant messaging, the average consumer is under a constant barrage of unsolicited messages in one form or another, whether it be by SPAM email, or “You have won!” style SMS text messages, and do not tend to treat them with much suspicion (although they may well be sceptical about the veracity of the offers). Another message popping up on their ‘phone saying something along the lines of “You have won 10,000 pounds! Enter this 4 digit PIN number and then dial 0900-SUCKER to collect your prize!” is unlikely to cause much alarm, and is more than likely to succeed in many cases.

    Workarounds and fixes
    We are not aware of any workarounds for the SNARF or BLUEBUG attacks at this time, other than to switch off bluetooth. For permanent fixes, see the ‘Fixes’ section at the bottom of the page.

    To permanently remove a pairing, and protect against future BACKDOOR attacks, it seems you must perform a factory reset, but this will, of course, erase all your personal data.

    To avoid Bluejacking, “just say no”. :)

    The above methods work to the best of our knowledge, but, as the devices affected are running closed-source proprietary software, it not possible to verify that without the collaboration of the manufacturers. We therefore make no claims as to the level of protection they provide, and you must continue to use bluetooth at your own risk.

    Who’s Vulnerable
    To date the quantity of devices tested is not great. However, due to the fact that they are amongst the most popular brands, we still consider the affected group to be large. It is also assumed that there are shared implementations of the bluetooth stack, so what affects one model is likely to affect others. This table is accurate to the best of our knowledge, but without the cooperation of the manufacturers (which we currently do not have), it is not possible to conduct more extensive validation.

    The devices known to be vulnerable at this time are:

    Vulnerability Matrix (* = NOT Vulnerable)
    MakeModelFirmware RevBACKDOORSNARF when VisibleSNARF when NOT VisibleBUG
    EricssonT6820R1B
    20R2A013
    20R2B013
    20R2F004
    20R5C001
    ?YesNoNo
    Sony EricssonR520m20R2G?YesNo?
    Sony EricssonT68i20R1B
    20R2A013
    20R2B013
    20R2F004
    20R5C001
    ?Yes??
    Sony EricssonT61020R1A081
    20R1L013
    20R3C002
    20R4C003
    20R4D001
    ?YesNo?
    Sony EricssonT61020R1A081???Yes
    Sony EricssonZ1010??Yes??
    Sony EricssonZ60020R2C007
    20R2F002
    20R5B001
    ?Yes??
    Nokia631004.10
    04.20
    4.07
    4.80
    5.22
    5.50
    ?YesYes?
    Nokia6310i4.06
    4.07
    4.80
    5.10
    5.22
    5.50
    5.51
    NoYesYesYes
    Nokia7650?YesNo (+)?No
    Nokia8910??YesYes?
    Nokia8910i??YesYes?
    * SiemensS55?NoNoNoNo
    * SiemensSX1?NoNoNoNo
    MotorolaV600 (++)?NoNoNoYes
    MotorolaV80 (++)?NoNoNoYes

    + We now believe the 7650 is only vulnerable to SNARF if it has already been BACKDOORed.
    ++ The V600 and V80 are discoverable for only 60 seconds, when first powered on or when this feature is user selected, and the window for BDADDR discovery is therefore very small. Motorola have stated that they will correct the vulnerability in current firmware.

    Disclosure
    What is the Philosophy of Full Disclosure, and why are we providing the tools and detailing the methods that allow this to be done? The reasoning is simple – by exposing the problem we are achieving two goals: firstly, to alert users that the dangers exist, in order that they can take their own precautions against compromise, and secondly, to put pressure on manufacturers to rectify the situation. Consumers have a right to expect that their confidential data is treated as such, and is not subject to simple compromise by poorly implemented protocols on consumer devices. Manufacturers have a duty of care to ensure that such protection is provided, but, in practice, commercial considerations will often take precedence, and, given the choice, they may choose to simply supress or hide the problem, or, even worse, push for laws that prevent the discovery and/or disclosure of such flaws[5]. In our humble opinion, laws provide scant consumer protection against the lawless.

    After 13 months, and in consideration of the fact that affected manufacturers had acknowledged the issues and made updated firmware available, Full Disclosure took place at the Chaos Computer Club’s annual congress – 21C3, in Berlin, 2004.

    Slides from the disclosure talk can be found here: http://trifinite.org/Downloads/21c3_Bluetooth_Hacking.pdf

    Tools
    Proof of concept utilities have been developed, but are not yet available in the wild. They are:

    • bluestumbler – Monitor and log all visible bluetooth devices (name, MAC, signal strength, capabilities), and identify manufacturer from MAC address lookup.
    • bluebrowse – Display available services on a selected device (FAX, Voice, OBEX etc).
    • bluejack – Send anoymous message to a target device (and optionally broadcast to all visible devices).
    • bluesnarf – Copy data from target device (everything if pairing succeeds, or a subset in other cases, including phonebook and calendar. In the latter case, user will not be alerted by any bluejack message).
    • bluebug – Set up covert serial channel to device.
      Tools will not be released at this time, so please do not ask. However, if you are a bona-fide manufacturer of bluetooth devices that we have been otherwise unable to contact, please feel free to get in touch for more details on how you can identify your device status.

    Credits
    The above vulnerabilities were discovered by Adam Laurie, during the course of his work with A.L. Digital, in November 2003, and this announcement was prepared thereafter by Adam and Ben Laurie for immediate release.

    Adam Laurie is Managing Director and Chief Security Officer of A.L. Digital Ltd.

    Ben Laurie is Technical Director of A.L. Digital, and author of Apache-SSL and contributor to many other open source projects, too numerous to expand on here.

    A.L. Digital Ltd. are the owner operators of The Bunker, the world’s most secure data centre(s).
    e: adam@algroup.co.uk
    w: http://www.aldigital.co.uk

    e: ben@algroup.co.uk
    w: http://www.apache-ssl.org/ben.html

    Further information relating to this disclosure will be updated at http://www.bluestumbler.org

    References:
    [1]

    [2]

    [3]

    • www.outlaw.com

    [4]

    • bluesniff
    • btscanner
    • redfang

    [5]

    [6]