From Security Weekly Wiki
Jump to navigationJump to search

Paul's Security Weekly - Episode 413 - 6:00PM

Episode Media


Intro, Sponsors & Announcements

And now, from the dark corners of the Internet, where exploits run wild, packets aren’t the only things getting sniffed, and the beer flows steady its Paul’s Security Weekly!

  • Brought to you by Onapsis the leading provider of solutions to protect ERP systems from cyber-attacks. Customers can secure their SAP and Oracle business-critical platforms from espionage, sabotage and financial fraud risks. Visit them on the web at http://www.onapsis.com/
  • And by Pwnie Express - Check out the community edition and turn your Nexus 7 into a lean and mean pen testing machine. For all those hard to reach places, there's Pwnie Express, visit them on the web at http://pwnieexpress.com

Now, fire up a packet capture, pour yourself a beer, and give the intern control of your botnet...Here's your host, a man who will gladly tell you about his cock tail.

  • Security Weekly Announcements:
    • Come to Embedded Device Security Assessments, a 2-day hosted class at the Blackhat Las Vegas on August 1-2 and 3-4 Register Here Today!
    • Security Weekly listeners also receive 10% off products in our store with discount code 'IHACKNAKED'
    • Security B-sides Orlando is a community driven event seeking to bring together anyone with a passion for making, breaking, or protecting. We welcome newbies and experts and anyone in between. Even if you don’t work in information security, you will be sure to find topics of interest. Please join us on April 11th and 12th in Orlando, Florida, for the 3rd Annual Security B-Sides Orlando Conference.
    • Larry teaching SANS 617 Wireless Ethical Hacking and Defense coming up in Austin, TX May 18-23, Baltimore, MD (SANSFIRE) June 13-20, and Berlin, Germany June 22-27
    • SOURCE Boston - early bird pricing of $349 is extended to March 31st (full retail is $495/$595 at the door). The CFP also closes tonight at Midnight, but I’m guessing we’re probably not going to see an up-tick on CFP submissions 4 hours before the deadline.
    • Question of the week: Winner receives a free Hack Naked T-shirt! Send us your favorite Linux command line tip or trick! Send the email to psw@securityweekly.com!

"The SOURCE conference is committed to bringing Business, Technology and Security professionals together at one event. Each year we host an amazing group of world-class professionals, and provide an intimate environment for meeting new people, exchanging ideas, and learning about the latest in information security. "

Special Segment: Rob Cheyne - SOURCE Boston - 5:30PM

EmbedVideo received the bad id "RORDIx-epvo"" for the service "youtube".

Rob is responsible for running SOURCE Boston, a really cool conference that everyone should attend! In this segment we will talk to Rob about some of the training he is doing in the areas of user awareness, threat modeling and training the trainer.

  1. Why is user awareness training so important? How do you keep the program updated?
  2. Why do we need to train the trainer? What are the gaps in skills?
  3. How do we need to train managers and C-levels about security?
  4. Tell us about threat modeling training, this is really unique form of training no?
  5. SOURCE Boston, w00t!

Guest Interview: Steve Crocker 6:00PM

EmbedVideo received the bad id "LAZDZHgnJ8c"" for the service "youtube".


  • This segment is brought to you by Black Hills Information Security, the leaders in penetration testing and active defense. Email consulting@blackhillsinfosec.com to request a quote today!
  • and by Tenable Network Security, creators of Nessus, the world's best vulnerability scanner! Jumpstart your security program today and evaluate SecurityCenter CV, THE continuous monitoring solution. learn more at www.tenable.com


Dr. Crocker is CEO and co-founder of Shinkuro, Inc. and Chair of the ICANN Board of Directors.

Dr. Crocker has been involved in the Internet since its inception. In the late 1960s and early 1970s, while he was a graduate student at UCLA, he was part of the team that developed the protocols for the Arpanet and laid the foundation for today's Internet. He organized the Network Working Group, which was the forerunner of the modern Internet Engineering Task Force and initiated the Request for Comment (RFC) series of notes through which protocol designs are documented and shared.

Dr. Crocker was the IETF’s first area director for security, and later served on the Internet Architecture Board. He has been involved with ICANN since 2002 when he chaired the newly formed Security and Stability Advisory Committee (SSAC). He has been on ICANN’s board since 2003 and been chair since 2011.

Dr. Crocker’s honors include the 2002 IEEE Internet Award, an honorary doctorate from the University of San Martin de Porres in Lima, Perú and membership in the Internet Hall of Fame in 2012.


  1. Recap your creation of RFC 1.
  2. Did you have any idea how far ARPA/ARPANET/etc. would go?
  3. Was anyone thinking about global connectivity?
  4. Which protocols did you work on, and were any comparable to the protocols which became internet standards?
  5. Does he remember giving Vint Cerf a boost up to a window on the 2'd floor of UCLA's Computer Lab, to access the locked facility, as a young H.S. Student in 1960? Sounds like something "Hackers" might do! ;-) What's the story?
  6. Do you identify with the term Hacker in it's original & positive sense of the word?
  7. There must have been great excitement among the researchers, when figuring out how to connect the first four nodes of ARPANET! Can you give us a sense of what you felt, & what visions you had for the future of The Network in those early days?
  8. Bring us up to date on the transition of IANA to a more international governance model. What is the timeline, & what are your concerns? How will these changes affect US ability to influence the future of the Internet for the greater benefit of all?
  9. To what does he attribute the mediocre US world ranking, in the measures of cost, speed, & Internet service? Why does the US, who financed & brought about the development of the Internet, not now lead the world in these metrics for it's citizens?
  10. What does he think of the recent FCC decision on Net Neutrality?
  11. In light of the onslaught of security concerns re Internet technologies, is he hopeful that we can overcome the problems, or could the viability of the Network be in jeopardy, as a trusted business/commerce platform?
  12. Any thoughts on people's concerns about the loss of Privacy in today's environment?
  13. Is he hopeful that the Internet can fulfill it's promise as a positive tool for mankind? Or, is the prospect of it splintering, & being usurped by corporations, governments, & the powerful, a more possible outcome?
  14. Does society take the Internet too much for granted? If so, then what advice would you give to help protect it's future development?
  15. What is the implication to ICANN of a fully geo-located Internet ? - Question submitted by Dan Geer!

April 7th happens to be the anniversary of the creation of the RFC series 46 years ago. Below is a message from the current chair of the Internet Engineering Task Force, Jari Arkko, commemorating the anniversary. At the end of his note he points to RFC 2555, written sixteen years on the 30th anniversary of the RFC series, that contains a bit of the history and some reflections. My brief notes are in section 3, The First Pebble.

Five Questions

  1. Three words to describe yourself
  2. If you were a serial killer, what would be your weapon of choice?
  3. If you wrote a book about yourself, what would the title be?
  4. In the proper game of as grabby-grabby, do you prefer to go first or second?
  5. Pick two celebrities to be your parents.


  1. Steve Crocker's Wikipedia Page
  2. Steve Crocker's Current Employment
  3. How the Internet Got its Rules - NYT article by S. Crocker

Segment: Prying Eyes Are Watching You (Watching You!) - 7:00PM

EmbedVideo received the bad id "SqOaoRyC2Vc"" for the service "youtube".


  • This segment is brought to you by Black Squirrel. Pentest Networks from Your Browser! Exploit the limits of network security through just a browser. Have a Chrome exploit in your toolkit? Good, but for the rest of us there's Black Squirrel. Visit blacksquirrel.io for more information.

Segment Discussion

I read this article and lots of things come to mind.

  1. Attackers gain access to network cameras and build web sites, for what purpose the article does not day (There is tons of free porn on the Internet, why you need to see people going about their day is weird).
  2. This is not just a consumer problem, many businesses (Even enterprises) fall victim to weak security on security cameras, which is just baffling
  3. Mainstream media coverage of "Cyber" is just plain bad. The fact they called these "Nanny Cams" is plain wrong, this applies to all network-based cameras
  4. The recommendations are horrible, I would re-write them to say:
  1. Sure, set a good password on your devices. The defaults are, well obvious (insert rant about defaults). Some systems only let you have a 4 character password, how do I know this, I own such device! There is a problem with authentication, we access all these devices in our home and the average user can't keep track of the passwords. There has to be something better.
  2. Keep your firmware up-to-date, and then we have all the problems associated with that
  3. Decide how you will maintain remote access. Most cheap, consumer-level, gear will use uPnP to automatically poke a hole in your firewall, allowing anyone access to the camera (Which is how I think they got access to so many cameras). Consider a, wait for it, cloud solution. Dropcam is nice, the app and the camera talk to the cloud, you access via the cloud. The problem here is that all recordings are stored in the cloud, and many do not accept this level of security. However, this is better than your shower cam being on a Russian web site (unless you are into that sorta thing, but then I am sure there are web sites available for just that sorta thing).
  4. Decide if you even need remote access at all. I evaluated the security of my new home security camera system, and pretty much don't ever want it exposed to the Internet.
  5. Where is the crossroads between security and security monitoring devices? (The fact that I even have to ask...)

Stories - 7:30PM

EmbedVideo received the bad id "pHYUcbb1BwY"" for the service "youtube".


  • Stories of the week is sponsored by The SANS institute the most trusted source for computer security training, certification and research. visit www.sans.org to learn more. Be sure to check out the featured training event SANS Pentest Austin - May 18 - Sat, May 23, 2015. What's special about SANS Pen Test Austin?
    • SANS Top Courses focused on Pen Testing: Learn hands-on skills that you can directly apply the day you get back to your job.
    • NetWars, NetWars, NetWars: Enjoy three exciting nights of NetWars challenges, where you can have some fun while building serious infosec skills.
    • Coin-a-palooza: Earn up to four additional SANS pen test challenge coins (each with an integrated cipher challenge) based on your performance in SANS NetWars!
    • CyberCity Missions: Work through an evening of cyber missions that have a direct kinetic impact on the miniature CyberCity environment that SANS built with a real power grid, water reservoir, military base, and more!

Paul's Stories

  1. http://krebsonsecurity.com/2015/04/fbi-warns-of-fake-govt-sites-isis-defacements/ Feds warn of fake govt websites: Wordpress vulns used
  2. http://www.pcworld.com/article/2899732/at-least-700000-routers-given-to-customers-by-isps-are-vulnerable-to-hacking.html Vulnerable Routers issued by ISP's
  3. http://www.computerworld.com/article/2903714/60-diy-car-hacking-device-is-an-inexpensive-and-easy-way-to-hack-cars.html Car Hack released at Black Hat Asia
  4. Flaw in WordPress caching plug-in could affect over 1 million sites
  5. Snapchat blocks access to all third-party apps in bid to improve security
  6. Researchers: IoT devices are not designed with security in mind
  7. Hacks On Critical Infrastructure Are More Common Than You Think
  8. Long Live the Botnet
  9. Watcher – Passive Web Application Vulnerability Scanner
  10. Court might force US to reveal details of secret WiFi kill switch
  11. FBI warns WordPress users of ISIS threat: Patch and update now
  12. Penetration Testing: You’re Doing it Wrong (?) – Part One

Larry's Stories

  1. Drug Pump flaws - Wow, nothing like buying one on eBay, hacking the crap out of it and finding it is hugeley vulnerable, and could be exploited to kill you, only to be hooked up to one a few weeks later while fighting through an potentially fatal illness illness.
  2. Booting Kali over HTTP - because everyone allows access to the web.
  3. Singtel buys Trustwave - hmmm, chinajsut upped their cyber game?