Episode35Script

From Security Weekly Wiki
Jump to navigationJump to search

(15 Seconds of silince)

- Record thinger for Chuck about "Sea Trek"

(15 Seconds of silince)

(Record the Welcome Intro)

(More silence)

FiT Stinger

Theme Music, Episode 35 for July 6, 2006

"Welcome to Security Weekly, Episode 35 for July 6, 2006"

From the PSW studios

This is Security Weekly, where logic bombs aren't just for kids. I am your host, Paul Asadoorian. "And I am your co-host Larry Pesce". And through some magic network/phone vodoo we have Twitchy, live from Washington DC!

Hello to all of our live audience listeners via Skypecast!

Sponsors

This episode is sponsored by Syngress Publishing, helping you master the arts of hacking, cracking, and security-foo for just $19.99.

Larry:Whaaaaaa Soundboard:Gong

Listen to the question at the end of each show, then go to the Security Weekly blog and be the first to post the CORRECT answer to recieve a free copy of any in-stock book on the Syngress web site!

Last week's winner was Jeff who posted:


-Destroy PCMCIA devices by smelting in an EPA-approved furnace at 1,600 degrees Celsius or higher.

From http://csrc.nist.gov/publications/drafts/DRAFT-sp800-88-Feb3_2006.pdf

-Skypecasting lets Larry do the podcasts in his underwear.

-Not sure which video this is from I have watched maybe two of them. Only been listening to Security Weekly for about 2 weeks now and have been playing catchup.

(close enough, the answer was naked, and PSW-24)

You all do a great job with this podcast keep up the good work. I tried to add a itunes comment but they wanted my cc# and I really do not want apple to have my cc# when I do not plan on buying any music from them anytime soon. If I have time to figure out another way to post it I will.


This episode is also sponsored by Core Security Technologies.

"Penetrate your network like its 1999. Wow, I must have been dreaming when I wrote this."


Listen to this podcast and qualify to receive a 10% discount on Core Impact, worlds best penetration testing tool.

We are also sponsored by the SANS Institute, where you can get schooled and like it!. Get hands-on training in intrusion detection, forensics, hacking and exploiting, and drinking beer.... Listen for the discount code at the end of the show for 5% off SANSFIRE, July 5-11th in Washington DC. Almost every SANS track will be offered! ANd twitchy will be there!

Announcements

Announcement: Twitchy at SANS, 504 ed Skoudis, go find.

Annoucenment: Good interviews, tease tease

Annoucenment: iTunes comments! T-shirt winners are:

1) Bobby, AKA "Therottenapple" 2) David, AKA "dbron0000"

On to listener feedback...

Announcement: Icecast next week if all goes well.

1 - 2 - Listener Feedback

Steve Writes in:

Paul, Larry, Twitchy - I found your podcast several weeks ago and while I am not a security profesional I find it very informative and fun even if I am out of my depth sometimes. But if I keep listening, I'm sure it'll get smarter. Keep it up! And how about a segment for those of us without a lot of security skills?

Congrats to Paul on the wedding, and welcome back. Do you suppose you could step into your audio sifu role and give Larry a few lessons? His audio-fu needs some help. (Sorry Larry - but I had a hard time listening to # 32 and #33)

My question: I have some public open wireless I've had to set up for some of my clients. I've tried to make this as secure as I can, by putting all the APs on a separate VLAN, running all the APs through a NetCat access system, restricting access through the NetCat system to a few basic ports such as POP3, HTTP, HTTPS, MS-TS and ICA, and limiting inter-VLAN traffic with ACLs. All traffic also passes through a firewall before it leaves the local network. NetCat authenticates users against LDAP. What do you think of this approach?

Oh - a partial answer to your question of the week is "Destroy PCMCIA devices by smelting in an EPA-approved furnace at 1,600 degrees Celsius or higher." I don't have any idea what Skypecast makes it possible for Larry to wear.... nothing?

Steve

P.S. If Larry is still looking for implantable RFID, you might try writing a letter to the manufacturer and inquiring about evaluation units or an evaulation kit - or Google "rfid evaluation kit". As a security researcher, the manufacturer might even be willing to give you a few samples.


Hey guys,

Love the podcast...and agree with you analysis of Steve Gibson! Seems to be a rabble rouser and dances around a whole lot of information while rarely getting to the point!

Anyway, thought you might like this site I stumbled across... http://grcsucks.com/

Enjoy! --

Michael Faas


Jim writes in:

Second Question:

I have heard you guys say that WPA-PSK is not as secure as WPA-Enterprise. While I understand why this is the case, how vulnerable really is WPA-PSK? If I am using a 63 character WPA key such as the one your buddy Steve Gibson generates on his password page which uses mixed case, numbers, and special characters, is it really conceivable that anyone could brute force this? Does WPA versus WPA2 make a difference? If so, how?


answer other questions via email...


Tadas:

First of all, love your podcast. It's really informative and best of all it's really entertaining (go Twitchy!!!) The main reason i am writing is because i want to make some comments about the "Security Now'" thing. In my opinion you're taking this thing a bit too serious. Yes, they made a mistake and yes, they should have corrected themselves (or at least replied to your email out of politeness) but, i think, this mistake could be ignored because, as Paul said, sometimes (rarely, but still) source port for DNS and Directory Services matches the destination port and since "Security Now" is a podcast for novice users (again in my opinion) they just made it simpler to understand. Oh and just a side note about a phrase related to "Security Now" in episode 31 : "I don't want security professionals to be misinformed". I don't mean to offend anyone but do security professionals listen to "how does internet works?" or "ports" type of podcasts? Well, they could, but not to learn anything new or esseantial (thats whats SANS for :D). As i said, no offence anyone, but that sounded odd to me.

---

Hey all at Security Weekly, thought I'd send you an email. First off, I'd like to thank you for the great info and entertainment you have brought to the community. I enjoy your show and the cast of characters you have assembled. Secondly, I'd like to get to the subject of my email, namely, why Superman needs to listen to your show

(please note, if you haven't seen superman yet, this wont make any sense...)

 If you will recall, in Superman Returns, Lex visits the famous

Antarctic hideout of our great hero, and discovers the, er, holographic projector from the stars (where Clark learns all his funky knowledge from). And what does Lex do? He picks up a crystal, slides it into a slot and then low and behold, ACCESS GRANTED. Soon Clarks' dad is telling him all the secrets of the universe. I have one thing to say to the Man of Steel: TWO FACTOR AUTHENTICATION! Dammit, when will they learn?! Had he listened to your show, maybe he would have added in a voice recognition system, or hell, even some crummy password (something better than Lois's 'superman' I should hope). Point being, listen to Security Weekly or get pwned!

Ok, now onto something that you might find useful. I use Firefox,

and while not being the most secure (that title belongs to Opera), one of the best parts of FF are extensions, and many of these little ad dons deal with security. Here are some of my favorites:

NoScript: https://addons.mozilla.org/firefox/722/previews/

 A very useful extension that disables Javascript unless you

specifically allow a site. You know all those Javascript vulns a while back? I wasn't worried.

Cookie Button in the status bar: https://addons.mozilla.org/firefox/1328/

 A great and simple addon, similar to NoScript, except that you

select which sites can send you cookies. This allows you to disable cookies altogether within the FF prefs, but still allow cookies that you want through (yes, you could allow FF to alert you every time some crappy sites wants to send you a cookie, but I hate popups of any kind)

User Agent Switcher: https://addons.mozilla.org/firefox/59/

 Just what it says, allows you to switch the user agent string that

the browser sends out. Most sites that say "You must be using IE to view this site" are full of it, and once u switch to IE WinXP with this little plugin, you can go about laughing at their crappy site to you hearts content.


!!Warning!! Once u install this extension beaware that your bookmark file will grow exponentially !!Warning!!

StumbleUpon: https://addons.mozilla.org/firefox/138/

 OK, this one has nothing to do with security per say, BUT you can

find awesome sites that deal with security. For instance, YOUR site is on it: http://www.stumbleupon.com/url/www.securityweekly.com/ (I didn't put that review up, donut blame me). This extension basically allows you to select various topics (hundreds are available), and then randomly chooses between them when you click the "Stumble!" button. Sound stupid? Try it for 2 days, you won't uninstall it. It also allow peer reviews and comments of each site, and if you find a new site that is not on the Stumble network, u can add it with one simple click. This is by far my favorite extension

Hope there was at least something new/informative in there. Alright, enough from me. I really enjoy your Podcast, and please keep them coming. Congrats on the marriage btw.

-gaten


[Music] Exploit Of The Week


[MUSIC]


3 - 4 - News

News

Episode35 Show Notes

5

Syngress question of the week: Name the actor who starred in Shaolin Master Killer (aka. 36 Chambers of Shaolin, Masta Killa). What style of Kung Fu does he practice? Bonus: What are his mandarin and cantonese names?

Core discount code impactbsg

SANS discount code is <pauldotcom>.

Thank you for listening, psw@securityweekly.com, http://securityweekly.com Phone number Security Weekly Security Weekly, PO Box 860, Greenville RI, 02828

<outro>