- 1 Security Weekly was nominated for the 2015 Best Security Podcast! Please vote for our show here: Security Blogger Awards
- 2 Episode Media
- 3 Announcements & Shameless Plugs
- 4 Guest Technical Segment: Simon Bennetts on OWASP Zed Attack Proxy v 2.0.0
- 5 Announcement
- 6 Stories
- 7 Paul's Stories
- 8 Larry's Stories
- 9 Jack's Stories
- 10 Allison's Stuff
Security Weekly was nominated for the 2015 Best Security Podcast! Please vote for our show here: Security Blogger Awards
Announcements & Shameless Plugs
Security Weekly - Episode 325 for Thursday March 28th, 2013
- Register for "Offensive Countermeasures: The Art Of Active Defense": SANSFIRE Washington, DC June 15-16th with John Strand
- Come to Security BSides Rhode Island One-Day Conference on June 15th tickets are NOW ON SALE at WePay.com. Featured presentations from Josh Wright , Kevin Finisterre, Kati Rodzon and Mike Murray, Bruce Potter, Joe McCray,Ron Gula, Ben Jackson, Dave Maynor and the entire Security Weekly crew!
- The Stogie Geeks Show! - Kick some ash with the Stogie Geeks, Thursday nights at 8:30PM EST. Come have a cigar with us!
Guest Technical Segment: Simon Bennetts on OWASP Zed Attack Proxy v 2.0.0
Simon is a Mozilla Security Automation Engineer and ZAP Project Leader. He is also one of the founders of the OWASP Manchester chapter and the OWASP Data Exchange Format project. Simon is on to discuss OWASP's Zed Attack Proxy v 2.0.0
From the OWASP site:
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.
- What is the Zed Attack Proxy (ZAP)?
- How is it maintained?
- How is it different from other proxies, like Burp?
- Where do you see ZAP going in the future?
- What are ZAP's strengths and limitations?
- Are you working on any other OWASP projects?
- We are in the process of archiving and cataloging our technical segments, please visit the Security Weekly Technical Library and we indexed all of the interviews we have conducted. We are also working on updating all of the articles, so check the newsletter or if you want to help in exchange for some free guidance and security training please email me.
- Register for "DEFENSIVE COUNTERMEASURES: FOUNDATIONS OF BECOMING A DEVIOUS DEFENDER": JULY 27-28 & 29-30 with Paul.
- Larry teaching SANS SEC617 all over and coming to a city near you in 2013. It isn't too Late to sign up for my class in San Diego this May!
- Ubuntu low-mem install for VMs - Nice tip for running Ubuntu VMs. Having
multiple Ubuntu VMs is handy. I mean backtrack is nice. But sometimes you need to run stuff, like firmware analysis tools, vulnerable web applications , or other such software. This allows you to run different versions of Ubuntu as well.
- Passcode lock can be bypassed in iOS 6.1.3 as well - I mean really, come on! They just can't seem to lock this feature down.
- Remember Your Helmet - Great article about keeping security simple.
- Critical Flaw Threatens Millions of BIND Servers - Exploitation i
s easy, ah the memories of easily exploitable Bind vulnerabilities, TSIG anyone?
- Too Scared To Scan - Scan in development, use credential
ed scans, scanning is important, crashes happen.
- Oz states count cars using Bluetooth
- Network security study reveals 26
- Whoops! Tiny Bug In NetBSD 6.0 Code Ruins SSH Crypto Keys
- A Kickstarter for a documentary on Hackers in Uganda, Hackers for Charity. The producer of the hacker documentary "Code2600" has set his sights on documenting Johnny Long's work in Uganda.
- Kids these days Krypt3ia has some thoughts on the security implications of "digital natives".
- A free "intro to computer science" course Free is good, right? A very basic programming class for those who want the basics of coding.
- Most IT admins considering quitting due to stress according to a survey by GFI software. The survey seems a bit questionable, small sample size and self selection bias, etc. But, still a few interesting insights.
- Critical Flaw Threatens Millions of BIND Servers the article at ThreatPost highlights the issues with Bind on *nix systems. This bug "could not only cause a denial-of-service condition on the server but also could potentially compromise other software on the machine". That could be a problem.
- Forget CyberFUD, here's a DoS to worry about Yes, there was the biggest DDoS in history (or not) this week, but this is scarier to me.
- Another "kids hack their school to changes grades" story. Here are a couple little guttersnipes, aka "Digital Natives" getting in trouble.
- Too scared to scan A sad state of affairs, but true in many organizations.
- The first of a new set of posts about better storytelling in business from Michael Santarcangelo, aka Security Catalyst part two is here