From Security Weekly Wiki
Jump to navigationJump to search

Episode 420 - Intro, Sponsors & Announcements 6:00PM-6:05PM

Episode Media



"This week is episode 420! We interview Byron Cleary to talk about virtual honeynets, the dreamy Trey Ford joins us in studio, and we'll talk about a whole bunch of security news, so stay tuned!"


Broadcasting live from G Unit Studios in Rhode Island, the show where exploits run wild, packets aren’t the only things getting sniffed, and the cocktails flow steady its Paul’s Security Weekly!

  • Brought to you by Pwnie Express - Check out the community edition and turn your Nexus 7 into a lean and mean pen testing machine. For all those hard to reach places, there's Pwnie Express, visit them on the web at http://pwnieexpress.com
  • And by Onapsis the leading provider of solutions to protect ERP systems from cyber-attacks. Customers can secure their SAP and Oracle business-critical platforms from espionage, sabotage and financial fraud risks. Visit them on the web at http://www.onapsis.com/


Now, fire up a packet capture, pour yourself a beer, and give the intern control of your botnet...

Here's your host, a man who, on the show of all shows asks, "Can this get any higher?", Paul Asadoorian!" 

Paul: Hello everyone and welcome to Paul's Security Weekly - Episode 420 for Thursday May 28th, 2015, I'm your host Paul Asadoorian

  • Introduce hosts and guests


  • Ready to learn Combat Firmware Analysis? Register for my Blackhat course "Embedded Device Security Assessments", a 2-day hosted class at Blackhat Las Vegas. Registration includes breakfast, lunch, and access to the Blackhat Briefings Business Hall, Sponsor Workshops, Sponsor Sessions, and Arsenal! Visit http://securityweekly.com/iot to register today!
  • Santa, Paul and John are doing a webcast series titled Cracking The Code: How Security Nerds Become IT Leaders. Part 1, titled "From Penetration Testing Results To Improvement" will be held on June 10, 2015 at 2PM EST. You can get all the details at http://securityweekly.com/crackingthecode

Interview: Byron Cleary, Attivo Networks 6:05PM-7:00PM


Byron Cleary is a Field Engineering Manager at Attivo Networks. Attivo Networks is a leader in information security with proactive solutions for post-infection breach detection. By using a patented virtual HoneyNet technology, Attivo analyzes network and endpoint information to detect stolen credentials and compromised computers. Attivo solutions provide organizations the ability to detect and analyze zero-day attacks providing an alert system for quick remediation and prevention of targeted threats and cyber attacks. Byron has over 15 years experience in working with security solutions and previously he held senior security engineering titles at Dell, Fortinet, and Lancope.


  1. How did you get your start in information security?
  2. What is a honeypot? How is yours different?
  3. What is BOTsink?

Five Questions

  1. Three words to describe yourself.
  2. If you were a serial killer, what would be your weapon of choice?
  3. If you wrote a book about yourself, what would the title be?
  4. In the popular game of ass grabby-grabby, do you prefer to go first or second?
  5. Choose two celebrities to be your parents.


Attivo Networks

Stories of the Week - 7:00PM-8:00PM

EmbedVideo received the bad id "PJedScw-lco"" for the service "youtube".


  • Brought to you by Black Hills Information Security, the leaders in penetration testing and active defense. Email consulting@blackhillsinfosec.com to request a quote today!
  • This segment is sponsored by The SANS institute the most trusted source for computer security training, certification and research. visit www.sans.org to learn more
    • Be sure to check out Paul and John's new SANS class, SANS 550: Active Defense, Offensive Countermeasures and Cyber Deception!
  • And by Tenable Network Security, creators of Nessus, the world's best vulnerability scanner! Jumpstart your security program today and evaluate SecurityCenter CV, THE continuous monitoring solution. www.tenable.com
  • And by Netsparker, the developers of the ONLY false positive free web application security scanners, enabling you to automatically identify vulnerabilities and security flaws in all your websites, web applications and web services. Netsparker scanners are available in two editions, Netsparker Desktop and Netsparker Cloud, the enterprise level online scanning service. For more information visit their website on https//www.netsparker.com/securityweekly/


  • Security Weekly listeners receive 10% off products in our store with discount code 'IHACKNAKED', which now include Hack Naked Stickers! Visit http://shop.securityweekly.com and get yours today!
  • Larry teaching SANS 617 Wireless Ethical Hacking and Defense coming up in Baltimore, MD (SANSFIRE) June 13-20, and Berlin, Germany June 22-27, and lots more places so be certain to check the SANS web site for more course offerings!

Paul's Stories

  1. Study: Average Cost Of Data Breach Is $6.5 Million
  2. Password reset sites expose crackable PeopleSoft creds
  3. 1 In 20 Android Apps Hit By Apache Cordova Flaw
  4. Trojanized, info-stealing PuTTY version lurking online
  5. Changes to Export Control Arrangement Apply to Computer Exploits and More | Center for Internet and Society
  6. List of SSL Cipher Configurations
  7. Stink Bombs for Riot Control
  8. "Possible Wordpress Botnet C&C: errorcontent.com
  9. Race Condition Exploit in Starbucks Gift Cards
  10. IRS: Crooks Stole Data on 100K Taxpayers Via ‘Get Transcript’ Feature
  11. Phones' accelerometers allow you to be tracked on the metro

Larry's Stories

  1. AFF Leak AdultFriendFinder Leak, and why you should you be concerned. Yes there are personal and family implications, but what if your folks were surfing from work (I believe IP addresses were recorded…)? How about work e-mail addresses. Yuck. Time to refresh on some policies.
  2. [ logjam]
  3. Wassenaar - What is this Wassenaar thing, and why should we care?
  4. Arabic text to iPhone - Hooray language pack fail. sending specific messages to an iPhone featuring some Arabic text (and other stuff too), can “reboot” our device in an endless loop. Details of fixes and affected platforms/configurations still unfolding.
  5. How do you handle disclosures - A great roundup, but I think they may have missed a few things, especially where @Sidragon was concerned.
  6. SAP/PeopleSoft password “recovery” - Oops. Let’s discuss. SAP hacking anyone?

Jack's Stories

Kevin's Stories

Joff's Stories

  1. Please dont put backdoors in my crypto...

Santar-Canned-Jello's Stories

  1. Laptop seized at border isn't like a handbag, judge says; evidence from warrantless search is tossed --> impressive distinction between 'containers' and laptops
  2. U.S. Will Change Stance on Secret Phone Tracking --> more on the use of the Stingray devices
  3. Hacked Firms Could Keep Quiet Under New U.S. Law
  4. Canary box aims to lure hackers into honeypots before they make headlines
  5. Positive signs for the future of cybersecurity --> finally, a positive story.