From Security Weekly Wiki
Jump to navigationJump to search

Episode Media



Paul's Security Weekly - Episode 391 for Thursday October 16th, 2014

And now, from the dark corners of the Internet, where exploits run wild, packets aren’t the only things getting sniffed, and the beer flows steady its Paul’s Security Weekly!

  • This segment is sponsored by Palo Alto Networks creators of THE next-generation firewalls, helping you enforce network security policies based on applications, users, and content. Visit them on the web at www.paloaltonetworks.com
  • and by The SANS institute the most trusted source for computer security training, certification and research. visit www.sans.org to learn more

"Now, fire up a packet capture, pour yourself a beer, and give the intern control of your botnet..."

"Here's your host, a man needs to remind Mehreen to WAKE UP, Paul Asadoorian"

  • Announcement - The PVS contest from Tenable! Register Here to enter a contest and win an AR Drone! You must use the PVS to find something cool, details on the registration page.
  • Security Weekly Updates:



  • Stories of the week is sponsored by Pwnie Express - Check out the community edition and turn your Nexus 7 into a lean and mean pen testing machine. For all those hard to reach places, there's Pwnie Express, visit them on the web at http://pwnieexpress.com
  • Black Hills Information Security, the leaders in penetration testing and active defense. Email consulting@blackhillsinfosec.com to request a quote today!
  • Pentest Networks from Your Browser! Exploit the limits of network security through just a browser. Have a Chrome exploit in your toolkit? Good, but for the rest of us there's Black Squirrel. Visit blacksquirrel.io for more information.
  • Onapsis the leading provider of solutions to protect ERP systems from cyber-attacks. Customers can secure their SAP and Oracle business-critical platforms from espionage, sabotage and financial fraud risks. Visit them on the web at http://www.onapsis.com/
  • Tenable Network Security, the creators of Nessus, the worlds best vulnerability scanner. Check out the new Nessus Enterprise and Nessus Enterprise cloud, engage your IT department in the vulnerability management process today!

Paul's Stories

  1. The credit card to replace your credit cards
  2. Portable Tor Router
  3. Meet the NSA’s hacker recruiter
  4. Yahoo Servers Were Owned By Bash Bug Hackers
  5. ▶ nullcon Goa 2014: Pentesting Proprietary RF Communications by Justin Searle @meeas - YouTube
  6. The Best DerbyCon 2014 Talks for Red Teams | Strategic Cyber LLC
  7. Protocol Differential Analysis
  8. Some POODLE notes
  9. "Microsoft Patches Critical Windows
  10. Drupal Fixes Highly Critical SQL Injection Flaw
  11. Russian Hackers Made $2.5B Over The Last 12 Months
  12. "Admins! Never mind POODLE
  13. Man bites dog: HTTPS-menacing POODLE is 'hard to exploit' – unless you're on public Wi-Fi
  14. Anonabox Kickstarter Project Raises Controversy At Reddit
  15. Smart Meters Can Be Hacked To Cut Power Bills
  16. BadUSB Update
  17. OpenSSL Releases Patch for POODLE Attack
  18. "SSLv3 POODLE Vulnerability Official Release

Larry's Stories

  1. A legend CISSP trainer Shon Harris shuffled off this moral coil. Now how will we pass our CISSP exams without her study guides? For many years, I thought Shon was a man based on the name, which I had only seen as the author of the books. Now, there has been all sorts of “issues” with Shon on the past, but that is in the past. Let’s remember her for all of the good that she did.
  2. POODLE MOAR - So, we’re naming and iconifying vulnerabilities now? Crap. Either way, Google has discovered a crypto breaking attack for SSLv3. It is fairly convoluted on how it needs to be attacked, but still possible.
  3. Can you open this PPT for me? - iSight partners finds issues with Office OLE. Pretty big deal, if you can convince someone to open an office document...
  4. The security Con - Rethinking the security con? Dave has issues with the way we do cons now, and I tend to agree a little bit, but only a little.
  5. The anonabox - A Kickstarter campaign to build a TOR router in a box so all of your traffic can be anonymous. There has been some discussion as of late that the project is a scam, and that many don’t understand the implications and how TOR will actually help/not help them. Me, personally, I’d just rather learn how to do TOR on my own.
  6. Blue Team Handbook virtual book tour - The discount code for any sessions purchased until 11:59 on 31 Oct is ‘securityweekly’.

Jack's Stories of Joy and Wonder

Joff's musings from down under

  1. Seeking fertile apocolypse companion