- 1 Announcements
- 2 Guest Tech SegmentCon: A Special Night with Trustwave's SpiderLabs!
- 3 Steve Holden, DefCon wrap-up
- 4 Stories For Discussion
PaulDotCom Security Weekly - Episode 254 for Thursday August 11th, 2011.
- Los episodios de PaulDotCom Espanol con Julio Canto, Lorenzo Martinez, Chema Alonso, Ruben Santamarta y Raul Siles esta disponible aqui.
- Don't miss the August 31st Late Breaking Computer Attack Vectors Webcast Sponsored by Core Security Technologies with Larry "Mo' Hawk" Pesce.
- If you couldn't make it to BlackHat, then consider instead the always fabulous SANS Las Vegas for "Advanced Vulnerability Scanning Techniques Using. Nessus" Saturday, September 17 - Sunday, September 18.
- DerbyCon : Louisville, Kentucky – September 30th to October 2nd. Catch Carlos Perez's training session - "Automating Post Exploitation with Metasploit" Friday and Saturday of the Con from 4:00PM to 9:00PM.
- SANS 617 - Wireless Ethical Hacking, Penetration Testing, and Defenses with Larry in the salsa capital of the world: NYC on August 22nd - 27th.
- Jack wants us to pimp Sec Burn Out
- Don't forget to Read our blog, Participate on our mailing list, Visit PaulDotCom Insider, Follow us on Twitter, Join the IRC channel at irc.freenode.net #pauldotcom, and Watch our Videos!
- You can Add us on Facebook where we can be "friends"
Guest Tech SegmentCon: A Special Night with Trustwave's SpiderLabs!
Amazingly True Stories of Real Penetration Tests with Rob Havelt & Wendel Henrique
7:30 PM EDT / 6:30 p.m. CST
Rob Havelt, director of penetration testing, and Wendel Henrique, security consultant, will present Earth vs. The Giant Spider: Amazingly True Stories of Real Penetration Tests.
Rob is Director of SpiderLabs' Penetration Testing Practice, where he oversees all aspects of network and infrastructure security testing and wireless network testing. Formerly a bourbon-fueled absurdist, raconteur, and man about town, Rob is currently a sardonic workaholic occasionally seeking meaning in the finer things in life — Rob is, and will always be, a career hacker.
Wendel is a consultant for pen testing at Trustwave, where he has discovered vulnerabilities across a diverse set of technologies including webmail systems, wireless access points, remote access systems, web application firewalls, IP cameras, and IP telephony applications.
- The unique opportunity to see real, interesting, uncommon and some non- trivial attacks that can't be found by automated tools.
- Culled from the more than 2300 penetration tests delivered last year by SpiderLabs - only the coolest and freakiest were selected to present at DEFCON 19.
- By the end of this presentation, they hope to have the you thinking about systems and applications that organizations use every day, and how they may be used against them.
- Do you want Fries with that Hack?
- One PBX Will Rule Them All Hack.
- The Inside-Out VPN Hack.
- The Island Nation and Port 0 Hack.
- The Caucasian-Asian Love Hack.
- In Soviet Russia Hackers Monitor You Hack.
- Oracle and The New Tool Hack
Traps of Gold by Andrew Wilson & Michael Brooks
Traps of Gold is a study which examines the offenses and defenses of web application security and introduces "maneuverability" - a new strategy for fighting back.
8PM EDT / 7:00 p.m. CST
Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. Andrew is active as a leader of the Phoenix OWASP and is a Microsoft MVP in Windows Azure. He is not a Cabal member.
Michael works for SiteWatch, where he composes exploit code, which he considers a challenging and privileged art form. Michael is on PaulDotCom because he believes secure software is a luxury that should be shared. He's also in the April - June 2011 edition of the Google Security Hall of Fame.
Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. Andrew is active in the developer and security community as a speaker, a trainer, and as a leader of the Phoenix OWASP & Azure user groups. Andrew is recognized as a Microsoft MVP in Windows Azure.
Michael Brooks writes exploit code because it is challenging and a privileged art form. He writes secure software and helps others do the same because secure software is a luxury that should be shared. He is the top answerer of security and cryptography questions on StackOverflow.com (Rook). Exploit Code: http://www.exploit-db.com/author/?a=628 He works for Sitewatch
8:30 PM EDT / 7:30 p.m.
Speaking with Cryptographic Oracles by Dan Crowley
Speaking with Cryptographic Oracles is a discussion of methods for finding and exploiting encryption, decryption, and padding oracles from a black box perspective.
Dan is an Application Security Consultant for Trustwave's SpiderLabs and is particularly focused on vulnerabilities caused by a failure to account for little known or even undocumented properties of the platforms on which applications run. He especially enjoys playing around with Web based technologies and rock climbing, has been known to be a unicorn Furnace, and makes a mean chili quite worthy of a PaulDotCom post-exploitation towel.
Daniel Crowley is an Application Security Consultant for Trustwave's SpiderLabs team. He has been working in the information security industry for over 6 years and has been focused on penetration testing, specifically on Web applications. Daniel is particularly interested in vulnerabilities caused by a failure to account for little known or even undocumented properties of the platforms on which applications run. He especially enjoys playing around with Web based technologies and physical security technologies and techniques. Dan also rock climbs and makes a mean chili.
- What is an Oracle?
- How can people really bad at math translate cihpertext into plaintext?
- How can this help us evade detection and prevention of web app attacks?
Steve Holden, DefCon wrap-up
Steve is a senior systems engineer for a U.S. Navy R&D organization in San Diego. His key research focus areas include: information technology systems, enterprise computing, computer network security, and project management. Steve is on to give us a wrap-up of DefCon 19.