Episode249

From Paul's Security Weekly
Jump to: navigation, search
Palo Alto Networks
Tenable Network Security
The SANS Institute
Pwnie Express
Black Hills Information Security
BlackSquirrel
Onapsis


Announcements

Security Weekly - Episode 249 for Thursday June 23d, 2011.

Episode Media

MP3 pt 1

MP3 pt 2

Interview: Chris Gates

Media

Watch the live video version of this segment above. For more videos and to subscribe to Security Weekly TV visit http://blip.tv/securityweekly

Download the Audio (MP3) Version of this segment here!

Chris joined the original Titan Team (Lares) in 2011 as a Partner & Principal Security Consultant. Chris is a member of the Metasploit Project, a major contributor to the carnal0wnage attackresearch blog and is known to enjoy business logic flaws, misconfigured databases and the occasional client-side attack.

7:30 PM

Full Bio:

Chris joined Lares in 2011 as a Partner & Principal Security Consultant. Chris has extensive experience in network and web application penetration testing as well as other Information Operations experience working as an operator for a DOD Red Team and other Full Scope penetration testing teams. Chris holds a BS in Computer Science and Geospatial Information Science from the United States Military Academy at West Point and holds his CISSP, CISA, GPEN, GCIH, CEH, and Security+. In the past, he has spoken at the United States Military Academy, BlackHat, DefCon, Toorcon, Brucon, Troopers, SOURCE Boston, OWASP AppSec DC, ChicagoCon, NotaCon, and CSI. He is a regular blogger carnal0wnage.attackresearch.com and is also a regular contributor to the Metasploit and wXf Projects.

  1. How did you get your start in information security?
  2. What's the distinction you make when you say that "repeatable" pentests are really vulnerability assessments (with exploitation) vs. actual pentesting
  3. What do you consider to be a successful penetration test?
  4. What are some of the things organizations typically are missing in their security programs?
  5. Tell us all the ways in which you can do privelege escelation on Windows 7...
  6. Which is better for you on a penetration test: SQL injection or easily guessed password(s)?
  7. How do you get potential customers to sign-on to a "real" penetration test? Social engineering in the pre-engagement phases?
  8. What is the Web Exploitation Framework?
  9. What's the difference between w3af and the wXf framework?
  10. Will wXf ever be part of Metasploit?
  11. Tell us about your research such as the recent Attacking Oracle Web Applications With Metasploit talk
  12. We need to start a drinking game - this time based on how many times Chris says "fuzz" or "fuzzing".

Tech Segment: Catching base64 on the network with Kevin Fiscus of NWN Corportation

8:15 PM

Kevin is a security architect and consultant with 2 decades of experience in information technology and a decade in compliance, which we won't hold against him. He is currently the Director of NWN Corporation's Security Technology, Assessment and Response (STAR) Team

Kevin will be on to discuss work he's been involved with detecting base64 using Snort. Instead of detecting basic web authentication, he'll be going over other malicious uses for base64 encoding including evading DLP systems that don't involve basic web authentication. Specifically, using snort and a variety of regular expressions to catch base64 on the network.

Stories For Discussion

Media

Watch the live video version of this segment above. For more videos and to subscribe to Security Weekly TV visit http://blip.tv/securityweekly

Download the Audio (MP3) Version of this segment here!

Security Weekly Blog Roundup

Larry's Stories

Paul's Stories

  1. Penetration Testing The Insane - Wow, just when I thought we had beat this topic to death, out comes Pete Herzog with a refreshing look at security and testing. The first thing you have to realize is that vulnerability and patch mangement only take you so far. This is sorta like the new firewall, while it provides some protection, it still leaves you feeling vulnerable and awake at night at 3am asking yourself if you're going to be the next RSA or Sony. Pete calls for a return of real penetration testing. The type of testing that is going to look deep into your environment, tie systems together, string up multiple small vulnerabilities, and tell you where your real problems are. The problem is, no one wants this type of testing. I think its two reasons, they know you will find holes, and its cheaper to just run a vulnerability scan and limit scope to finding stuff that in the end, really doesn't matter.
  2. Is your email address worth more than your credit card number? - Sounds silly at first, but what hurts more? Your email address can be used for targeted attacks, and access to your email account is even worse. To expand upon what Rich stated, what is worse having your credit card stolen online or someone gaining access to your email? Email is used as a form of authentication, several service rely on access to email as authentication. Same with your phone. Example: Emailing or Texting your forgotten password. Don't sit here and tell me you've never forgotten your password to something either. Credit card theft has not become your problem, its the merchants and providers. So, I agree, your email is worth more at this point.
  3. ModSecurity Challenge - Are you one of those people who laugh in the face of the al mighty WAF? Then this is for you, a contest to test ModSecurity and try to hack a site protected by it from the Trustwave interior. They have setup Modsecurity to proxy 4 insecure web site demo sites, so hack away!
  4. Dear Vendor, No more "IE only support" - The user, yes the user, has the right to choose the browser. There, I said it. I mean, we should be able to choose our own operating system, right? There are a lot of reasons to give people a choice, personal preference, mobile devices, and more. Its like saying, "You're invited to this great party, but you have to drink Coors Light". Yes, IE is the Coors Light of browsers.
  5. Staples Sells Computer Equipment with User Data - Don't forget to wipe (those of you with toddlers can appreciate this). Its simple to remove the data from your device, so don't leave it up to a place like Staples, because they forgot to wiepe some of the used gear they were selling in Canada, eh. An audit found a good percentage of systems that had not been wiped. Yikes.
  6. Its Not About Protecting Your Crack - So there is a lot of buzz lately about cracking passwords. JTR getting bought, GPUs with enormous crack...ing power, etc... But really, as Carole says, if an attacker gains access to your hashed passwords, thats the real problem, not how long it takes to crack them. Don't get me wrong, in a penetration test, this can be useful, as people re-use passwords. But lets look at why your hashes are getting stolen, and fix that problem. Carole made a good analogy, "Using the time it takes to crack a password as a measure for security is like measuring the speed of bullets coming at your head". Well put.
  7. Open Source Secure Solution to Dropbox - Our good friend Xavier shows up how to use gpgdir to create secure file storage. Nice, I wish more people would use gpg for things like this. Take a poll and ask people if they use encrypted email or file sharing, then cry after you tally the results.