Episode49Script

From Security Weekly Wiki
Jump to navigationJump to search

(15 Seconds of silince)

(15 Seconds of silince)

(Record the Welcome Intro)

(More silence)


Theme Music, Episode 49 for October 17th, 2006

Sponsors

This episode is sponsored by Syngress Publishing where you can learn how to Hack Kismet, secure RFID and learn how to cheat at information security management.

Listen to the question at the end of each show, then go to the Security Weekly blog and be the first to post the CORRECT answer to the comments section recieve a free copy of any in-stock book on the Syngress web site!

This episode is also sponsored by Core Security Technologies, helping you penetrate your network. Now with version 6.0, put those *ahem* smug OS X users in thier place wth new supported client platforms. Now with AIX support! Listen to this podcast and qualify to receive a 10% discount on Core Impact, worlds best penetration testing tool.

This podcast is also sponsored by Astaro, the makers of the Astaro Security Gateway line of network security appliances offering complete protection from network, web and email security threats. Visit them on the web at www.astaro.com Stay tuned to the end of the podcast for a special offer!


Intro

"Welcome to Security Weekly, Episode 49 for October 17th, 2006"

From the PSW studios

This is Security Weekly I am your host, Paul Asadoorian. "And I am your co-host Larry Pesce". We also have the ever popular Twitchy and Mr. Joe C., director of promotions.

Announcements

- No show next week, as the PDC studios are moving. We will release an AirPWN video instead.

- Plans for Larry's RFId implant are being finalized.

- Frappr, iTunes comments, Cafepress, FiT Forums (which BTW, we are donating our modest profits to charity)

- Response from Cedric Blancher on WiFiTap:

I'd been pleased to hear you guys refering to my Wifitap tool in your last PSW issue. Thx. However, it's not a cover channel ;) Well, it could be, but it was not intented for that.

The idea behind Wifitap is to allow a non-associated station, in monitor mode, to communicate with any associated station on the same WiFi network. At first, I wrote it because I wanted a PoC that could bypass station isolation measures, supposed to prevent hosts to attack each other in a wireless LAN (similar to PVLAN). And so it does, and much more, as it goves you full bidirectional IP communication with any associated station: you can scan, attack, whatever you may think of. One may think of using this tool on a WiFi hotspot for instance.

My last preso at Bellua has a section on this, starting from slide 38 to 49:

http://sid.rstack.org/pres/0608_BCS_OpenWireless.pdf

However, as Python is slow, it does not scale? If network is loaded, then Wifitap will loose packets and your communication will be all the more shaky. In the last versions, I also added standalone tools like airpwn, but acting on ARP, pings and DNS traffic.

[Music] Tool of the Week


[MUSIC]

Story Time with Twitchy

News

News

Episode49 Show Notes

Closing

[Sygress Question of the Week]

(Just a suggestion guys) What is the CVE# of the Debian Kernel do_brk exploit, and how many other do_brk exploits have CVE numbers?

Core discount code impactbsg

Astaro has a special offer for all podcast listeners simply call 1-877-427-8276 or visit www.astaro.com and reference promotional code ‘PDC1006’ to receive 5% off of an Astaro Security Gateway. Visit their website to also request a free demo unit.

Thank you for listening, psw@securityweekly.com, http://securityweekly.com Phone number Security Weekly Security Weekly, PO Box 860, Greenville RI, 02828

<outro>