From Security Weekly Wiki
Jump to navigationJump to search

Episode Media

MP3 pt1

MP3 pt2

MP3 pt3


Paul's Security Weekly - Episode 376 for Thursday June 5th, 2014

And now, from the dark corners of the Internet, where exploits run wild, packets aren’t the only things getting sniffed, and the beer flows steady its Paul’s Security Weekly!

  • This segment is sponsored by Palo Alto Networks creators of THE next-generation firewalls, helping you enforce network security policies based on applications, users, and content. Visit them on the web at www.paloaltonetworks.com
  • and by Tenable Network Security, the creators of Nessus, the worlds best vulnerability scanner. Check out Tenable's other cool products such as the passive vulnerability scanner and SecurityCenter Continuous View. Visit them on the web at www.tenable.com

"Now, fire up a packet capture, pour yourself a beer, and give the intern control of your botnet..."

"Here's your host, he has a very small number of cells in his vienna sausage, Paul Asadoorian!"

Guest Interview: Michael Ossman

Five Questions

  1. Three words to describe yourself
  2. If you were a serial killer, what would be your weapon of choice?
  3. If you wrote a book about yourself, what would the title be?
  4. In the popular game of Ass Grabby Grabby do you prefer to go first or second?
  5. If you could have dinner with one celebrity, who would it be?

Ten more questions to ask at random:

  1. If you had super powers, what would they be?
  2. A penguin walks through that door right now wearing a sombrero. What does he say and why is he here?
  3. If we came to your house for dinner, what would you prepare for us?"
  4. Pick two celebrities to be your parents."
  5. What do you think about when you are alone in your car?
  6. What song best describes your life?
  7. If you were a Star Trek® [or Star Wars® ] character, which one would it be?
  8. If you were 80 years old, what would you tell your children?
  9. What is the record amount of time you have gone without a shower?
  10. What is the geekiest thing you've ever done/created/bought/said?

Tech Segment: Dale Luke


  • This segment is brought to you by http://www.blacksquirrel.io/ - Pentest Networks from Your Browser! Exploit the limits of network security through just a browser. Have a Chrome exploit in your toolkit? Good, but for the rest of us there's Black Squirrel. Visit blacksquirrel.io for more information.
  • and by Onapsis the leading provider of solutions to protect ERP systems from cyber-attacks. Customers can secure their SAP and Oracle business-critical platforms from espionage, sabotage and financial fraud risks. Visit them on the web at http://www.onapsis.com/
  • and by Pwnie Express - Check out the community edition and turn your Nexus 7 into a lean and mean pen testing machine. For all those hard to reach places, there's Pwnie Express, visit them on the web at pwnieexpress.com

  • CircleCityCon is Indianapolis's First Hacker Con, Taking place June 13-15, 2014 at the Hyatt Regency Indianapolis. Special promotional code for Security Weekly listeners - Use the code InfoSec2014 for $30 off of each regular priced ticket. Visit circlecitycon.com for tickets and follow @circlecitycon on twitter for more details.

Paul's Stories

  1. They Hack Because They Can
  2. Botnets coming soon to a smart home or automated building near you
  3. Linksys E4200 Vulnerability Enables Authentication Bypass
  4. Vulnerabilities in IPMI Protocol Have Long Shelf Life
  5. gizmodo/full (Gizmodo) How Teen Hackers Were Portrayed In 1980s Family Magazines
  6. "Critical OpenSSL Patch Available. Patch Now!
  7. "New OpenSSL MITM Flaw Affects All Clients
  8. Back To Basics
  9. Hackers Infiltrate Desk Phones For Epic Office Pranks
  10. Coolest Companies: Baltimore
  11. Your car is a giant computer - and it can be hacked
  12. How I Got Here: Joe Grand
  13. "New attack methods can 'brick' systems
  14. 5 lessons from companies that get computer security right
  15. "Security Manager's Journal: We manage our threats
  16. [webapps - D-Link Routers - Multiple Vulnerabilities]
  17. What You Need To Know to Become a Penetration Tester
  18. Mimikatz Against Virtual Machine Memory Part 1
  19. [papers - TP-Link TD-W89 Config File Download / Exploiting the Host]
  20. Nagios and NPRE

Larry's Stories

Jack's Stories

  1. Wendy Nather asks if we want more bad news and she doesn;t wait for us to answer before giving it.
  2. EFF helps score some legal victories in the battles against crazy patent rulings.
  3. NY Times coverage of the new DARPA "Cyber Grand Challenge"
  4. U.S. Marshals Seize Cops’ Spying Records to Keep Them From the ACLU is another in a disturbing trend in law enforcement silence on technology use.
  5. Milton Security is stepping up to help OpenSSL, whay aren't more folks doing this? This is a win-win, company gets good press and OpenSSL gets funding.
  6. Javvad Malik has some great tips on surviving conferences and getting the most from them
  7. Insightful post from Randy Bias on how SDN breaks the "VLAN Contract"
  8. Poor OpenSSL, another ugly bug. At least this one is "only a MITM vuln".

Joff's Stories

  1. http://krebsonsecurity.com/2014/06/they-hack-because-they-can/ - well Paul beat me to it but I am amused by this one.
  1. http://blogs.technet.com/b/srd/archive/2014/06/05/an-overview-of-kb2871997.aspx - this is an interesting new development for Microsoft.