15 March 2017

170314 Social network VKontakte backdoor giving access to any personal files of any user without login

Never used VKontakte, but being curious of Russian representant to Eurovision 2017- Юлия САМОЙЛОВА  Julia SAMOYLOVA - I "visited" VKontakte.
So I discovered a "way" to access any file of any user, without login.
BURP Suite was used for traffic analysis.

14 February 2017

Critical security flaws with router ASUS RT-AC68U

Just tested a brand new router ASUS RT-AC68U with latest firmware, here in Sweden.
Looking inside the log, discovered interesting things, which ASUS must answer.
A lot of unknown IP-addresses appeared during booting of router.
IP's addressed  by router firmware.
I tested them.
Seems that router.asus.com leads to unauthorised access to other owners of Asus routerswho authorised WAN access to their routers.
I attach more screendumps.

Something is for sure WRONG!

And ASUS engineers must answer and correct these critical security flaws.
Not naming that trying to connect a network printer via LAN, it gets an IP address for about 20 seconds, then gets disconnected.

Waiting for ASUS to address these problems!

16 November 2016

161116 Major security hole at Swedish mobile operator Comviq

Major security hole at Swedish mobile operator Comviq may reveal personal data of any subscriber.
The backdoor was discovered today 161116.
Despite logging in with a certain subscriber identity, you can access under certain conditions the personal data of any other subscriber.
Comviq company and its mother company Tele2 have been informed.
The backdoor was documented with screenshots sent to Comviq/Tele2.
For obvious security reasons no details are given here.

23 September 2016

Byepass login security and total scan on Swedish State Railways SJ WiFi

On 2016-09-22 I was travelling with a fast train X2000 belonging Swedish State Railways SJ from Linköping to Stockholm.
What I discovered... no need to authenticate or login for accessing the SJ WiFi network used by most passengers.
I atach a screendump.

All devices belonging to travellers: laptops, tablets, smartphones, became totally accessible.
No services or ports were blocked.
SSH, RDP, Telnet, Samba Shares, SMB, all were open and I could do anything on any remote device.
Over 50 devices were vulnerable.

I informed the responsible at SJ for my discovery.
No technical details will be disclosed for obvious security reasons.

30 July 2016

How secure are in fact VPN or Red Phone

How secure are in fact VPN or Red Phone
Article inspired by a PM received on XDA forum.

Hello there! Finally someone who cares about security.
Originally Posted by iunlock

Greetings, I've been reading some of your posts and all that info is right up my alley. It's hard to find someone who actually cares about this stuff like I do. Anyhow, I have some questions that you may be able to answer for me. A lot of people I've tried to run this by doesn't have any passion for security so I've only received half "" answers, which is not what I'm seeking.
What do you think about this set up.
1. I use a VPN that claims they don't keep logs on my phone. But who knows...better than nothing? Or are these companies compromised? See if I was the big bad wolf, I'd either create VPN companies to give people options to trick them into thinking they have security with a VPN (illusions) and/or pay VPN companies a dollar amount that they can't refuse for a backdoor...ie...easy access any time to the traffic and data. So what if VPN companies lie about their claims...who's going to tell right? $win-$win situation for big bad wolf and the VPN company that couldn't refuse the $ offered. Interesting eh?
2. Tor/Orweb. Hmm....slow as a dead turtle, but does it really work like they claim? I do see some truth to this though with its concept, but going back to what I said above. $ talks?
3. Password managers like last password, 1 Password etc... again if I was the big bad wolf, would I not be able to make $ talk? Make you think.
4. Secure apps...like jitsi, xabber, encrypted stuff...etc. ..
On the flip side of the coin, there are true security nuts who hate the big bad wolf and a lot of these people are the founders of some of these VPN companies and alike. So there's some comfort in knowing that I assume....also open source stuff is good because they are transparent. No messing around there. Anything funny or fishy would be known for any vulnerability in the app etc....
With all that stuff aside, assuming you did trust the VPN, tor etc....what's the best we can do security wise for our phones?
Well I think using a VPN is a must. Next using gpg to encrypt all emails along with encrypted chat clients. Then the use of tor to proxy your connections like mail, chat, fb, twitter etc....
What are your thoughts?
BTW, I don't use Facebook (Cia / prism) buffet....
I think gpg is the only sure way of true security.
In the real world, having the convenience for non important things makes the use of Gmail and other Google apps convenient.
Never do I ever use any real info for any of these accounts lol.
So the question is....will using a VPN, encrypted email, encrypted chat client, and tor do the trick?
How about the use of redphone app with Google voice on VPN since it uses data and not voice tunnel?
A lot of cool stuff....would love to hear your thoughts.

Hi sorry for so late answer.
Please read my posts on my security blog.
As a guide line:
There is no secure VPN or provider, all depends on your "enemies" or whom are you afraid of. It all depends on who "don't care about you".
And what you want to do.
Everything located on US territory will report in case to US authorities. Same goes for Germany, Russia, China.
Also for smaller countries: Canada, New Zealand, Australia - all will report to UK and USA.
Same for Austria, Finland, Sweden - all will report to USA, UK, Germany.
The closed ties in SIGINT cooperation are 100% same in so-called VPN providers/software.
IMHO it's money waste to pay for VPN. If you want to do something against law.
Respect the laws and ignore VPN.
All above is for private persons.
If enterprise, own physically the VPN server and never trust any 3rd part.
With kind regards
Zeno Sloim

Part 2

Red Phone - bogus for naive people
Any product (hardware or software) produced on German territory HAVE backdoor for German state authorities and Germany SIGINT close partners: USA, UK
Any product made on USA territory has back doors for US state authorities.
The whole Apple FBI encryption scandal was bogus for big public, all Apple products have backdoor.
It's a matter of time for how quickly will authorities know and decrypt your private data "travelling on internet".
Best solution is to try to keep it LOCALLY, as much as possible, by controlling anything going out of your phone.
It's not easy for a normal user.
But use only verified by you, apps.

With regards
Zeno Sloim

28 February 2016

IT-services Outsourcing - Between cutting costs and major security risks

Outsourcing is a widespread practice nowadays in major corporations and state organizations.
Most directors and leaders see it only as a marvel key solution for cutting costs.
True, but very naive vision.

The hidden dark other side is often ignored: major security risks.


Outsource is done by another company which has other economical interests and is more preoccupied by own image and prestige than by being a fair partner.
In case of major problems, top priority is hiding to the customer and keeping secret the real scale of events.
If all is solved in reasonable  time, a "filtered" version is presented and billed to the customer.
In case of non-solved events, all remain highly secretive and almost 100% customer will never ever know.

Hence major security risks and headaches for future.

The aspect becomes more critical when outsourcing is done via nested intermediary providers or foreign companies.
The economical and juridical aspects become very diffuse in case of incidents and disputes.
It becomes impossible to control and track high-sensitive internal information.

And when outsourcing is done by a foreign company, it's only one single step to economical/technical espionage and catastrophe.

IMHO it is a fundamental mistake to choose such solutions in critical key sectors of the state or corporations.
In such situations, ISO27000, ITIL and Common Criteria, remain only simple obsolete words.

Solution: think wider in the future, short-term cutting costs via outsourcing might be your next step to disaster.

Want outsourcing? Use only national companies which are easy to control, check and verify.

Ancient expression: "Never trust a stranger" is still very actual in IT-Security.

26 September 2015

Swedish Patient Journal (Svensk Patient Journal)

This letter was addressed to the following swedish authorities:


Swedish text:


Jag har utvecklat en Android databas app: Svensk Patient Journal, som motsvarar en offline patient-sida liknande Cambio Cosmiq.

Dvs man integrerar och lagrar lokalt hela historiken för en viss patient: besök, behandlingar, undersökningar, labbprover, vårdenheter, vårdpersonal som utfört respektive tjänster, tidsmoment.
Man också integrerat läkemedels och recept status sida samt licens status från Läkemedelsverket, liknande Mina Vårdkontakter.
Också finns integrerat en patientanteckningar databas del med historik och beskrivning på olika hälsorelaterade händelser, bieffekter från mediciner, osv.
Likadant för tandvård.
Största skillnaden mot Cambio Cosmic är att man behöver ej online uppkoppling mot en server, allt lagras lokalt i en databas.
Programmet tillåter flera personer (familj) skapa lokala konton med login.
Kryptering finns: AES 128 bitar.

Programmet är utvecklat för Android i dagens läge.
Är modulärt strukturerad och flera moduler kan ihop kopplas.
All information är sökbar via natural syntax querries (ord  och logiska operatorer).
Man kan också direkt skicka via app olika slags information direkt till ansvarige läkare på vårdcentral eller personal på sjukhus.
Nyttigt när man larmar.
Man kan också skicka/lagra GPS position för larm (nyttigt för äldre som går vilse).
Man kan också lokalt skriva ut information.

Programmet är tänkt att bli som en standard inom sjukvård för alla patienter och kan installeras på vilken Android smartphone eller tablett som helst.
Jag skriver till er eftersom jag gärna ser att programmet vidare utvecklas och anpassas efter lokala (regions) behov eller samma stor modulär arkitektur för hela Sverige.

Jag skulle gärna starta som en storskaligt projekt ihop med olika eller alla landsting(regioner) och Socialdepartamentet.
Alternativt med Inera eller Cambio.

Jag också bifogar skärmdumpar för att ni ska få en aning om olika menyer och struktur.

Jag avvaktar gärna era synpunkter och eventuella specifika behov för att inkluderas i programmet.

Det är första Android program av detta slag i Sverige, patient inriktad, som ihop kopplar komplett medicinsk information för en patient.

Med vänliga hälsningar,

Zeno Sloim

English translation:


I have developed an Android app database: Swedish Patient Journal, which corresponds to an offline patient-side alike Cambio Cosmiq.

It integrates and stores locally the whole history of a given patient: visits, treatments, examinations, lab tests, health units, which health professionals performed the respective services, timestamps.
It also integrates pharmaceutical and prescription status page and the license status of the Medical Products Agency, like My Healthcare Contacts.
Also available integrated patient notes database, part of the history and description of the various health-related events, side effects from medications, etc.
Similarly for dental care.
The biggest difference to Cambio Cosmic is that you do not need online access to a server, everything is stored locally in a database.
The program allows multiple people (family) create local accounts to login.
The encryption is: AES 128 bits.

The program was developed for Android at present.
It's modular structured and multiple modules can be connected together.
All information is searchable via the natural syntax querries (words and logic operators).
You can also directly send via app a variety of information directly to the responsible doctor at the health center or hospital personnel.
Useful when alarm.
One can also send / store the GPS position of the alarm (useful for older people who go astray).
You can also locally print information.

The program is intended to become a standard of care for all patients, and can be installed on any Android smartphone or tablet anytime.
I write to you because I would like to see the program further developed and adapted to local (region) needs or the large modular architecture
for the whole of Sweden.

I would love to start a large-scale project together with various or all counties (regions) and Socialdepartamentet.
Alternatively with Inera or Cambio.

I also provide screenshots for you to get an idea about the different menus and structure.

I'm waiting for your comments and any specific requirements to be included in the program.

It is the first Android program of this kind in Sweden, patient-oriented, which together connects complete medical information for a patient.


Zeno Sloim