SANS Las Vegas from October 26-27th will debut a new course titled "Embedded Device Security Assessments for the Rest of Us" which will teach students how to assess embedded systems of all varieties on pen tests and in your duties as a security professional. Register Here
Announcements & Shameless Plugs
Security Weekly - Episode 324 for Thursday March 21st, 2013
- Register for "Offensive Countermeasures: The Art Of Active Defense": SANSFIRE Washington, DC June 15-16th with John Strand
- Come to Security BSides Rhode Island One-Day Conference on June 15th tickets are NOW ON SALE at WePay.com. Featured presentations from Josh Wright , Kevin Finisterre, Kati Rodzon and Mike Murray, Bruce Potter, Joe McCray,Ron Gula, Ben Jackson, Dave Maynor and the entire Security Weekly crew!
- The Stogie Geeks Show! - Kick some ash with the Stogie Geeks, Thursday nights at 8:30PM EST. Come have a cigar with us!
Interview: Jason Fossen
Jason Fossen is a principal security consultant at Enclave Consulting LLC, a published author, and a frequent public speaker on Microsoft security issues. He is the sole author of the SANS Institute's week-long Securing Windows course (SEC505), maintains the Windows day of Security Essentials (SEC401.5), and has been involved in numerous other SANS projects since 1998.
- Why do you say that Microsoft is at an historical turning point, for good or worse?
- Should companies with XP upgrade to Windows 7, Windows 8, Windows RT, or wait until Windows Next?
- What about from a purely security point of view, will Windows 8 turn out better than Windows 7?
- What is the most interesting new thing in Server 2012?
- And what about security in Server 2012?
- What about dealing with Advanced Persistent Threat techniques, what should people do?
- We are in the process of archiving and cataloging our technical segments, please visit the Security Weekly Technical Library and we indexed all of the interviews we have conducted. We are also working on updating all of the articles, so check the newsletter or if you want to help in exchange for some free guidance and security training please email me.
- Larry teaching SANS SEC617 all over and coming to a city near you in 2013. It isn't too Late to sign up for my class in San Diego this May!
- We’re All Weev Now!
- Botnet Business Booming - Dark Reading
- 300 UK domains pilfered
- US military boffins seek bulletproof Wi-Fi network - IT News from V3.co.uk
- Would a 3D-printed gun really be legal?
- Killing hackers is justified in cyber warfare, says NATO-commissioned report - [Larry] - O_o *tap* *tap* I'm out! Wow, looks like the intent is to apply the rules of conventional warfare to cyber-combatants…
- Cisco passwords - [Larry] - Cisco decided that they needed to update password storage for configs in order to supplement the weak type 7 and moderate type 5 storage methods. The selected to add a type 4, which was supposed to utilize PBKDF2 and 1000 iterations of SHA-256 (good!), but in implementation the PBKDF2 function was never called, so no salt was used, and the password was only hashed once with SHA-256. Ultimately this makes it weaker than the type 5 implementation that uses 1000 iterations of MD5 and a salt.
- Subway PIN pads hacked - [Larry] - Perfect recipe for crime: Buy Subway franchise and run restaurant. Implement payment terminals. Start business selling terminals to Subway corporate for use in other stores - but be sure they are Pre-pwned. Steal credit cards from other stores. It just goes to show that we need to look at the entire supply chain form issues/backdoors, etc, and not just those that come from areas of concern, such as china…
- Huawei 3G modem update vulns - [Larry] - Poor configuration, outdated server support environments, and some client issues with too many permissions. When will these guys get it?
- Embedded device "botnet" used for research - [Larry] - ….by abusing default passwords all sorts of information was collected. I love some of the quotes:
We hope other researchers will find the data we have collected useful and that this publication will help raise some awareness that, while everybody is talking about high class exploits and cyberwar, four simple stupid default telnet passwords can give you access to hundreds of thousands of consumer as well as tens of thousands of industrial devices all over the world.
Sounds like just about every pentest I've ever been on...
"A lot of devices and services we have seen during our research should never be connected to the public Internet at all. As a rule of thumb, if you believe that "nobody would connect that to the Internet, really nobody", there are at least 1000 people who did. Whenever you think "that shouldn't be on the Internet but will probably be found a few times" it's there a few hundred thousand times. Like half a million printers, or a Million Webcams, or devices that have root as a root password."
Yup, humans are that stupid
- Episode2 of Brian Krebs finding out who swatted him I actually spent the past week assisting on this. I have no other articles to bring up. This one is interesting enough.