Changes

From Security Weekly Wiki
Jump to navigationJump to search
5,029 bytes added ,  20:14, 23 May 2017
= Episode Media =
[http://traffic.libsyn.com/pauldotcom/SecurityWeekly-397.mp3 MP3] < Not yet published!
= Announcements =
= Guest Interview: Paul Coggin =
<!--<center>{{#ev:youtube|eGMfR3NfnWg"YUDA2EJGpis}}</center>-->
# Pick two celebrities to be your parents.
= Stories =
= Stories =<center>{{#ev:youtube|V3U-8ZkWgpM"}}</center>
<!--<center>{{#ev:youtube|sy9HWpuORvg"}}</center>-->
== Sponsors ==
== Paul's Stories ==
You can find all of [http://securityweekly.com/pauls-rss-feeds/ Paul's RSS Feeds Here].
== #[https://isc.sans.edu%2Fdiary%2FGuest%2Bdiary%253A%2BDetecting%2BSuspicious%2BDevices%2BOn-The-Fly%2F18993 "Guest diary: Detecting Suspicious Devices On-The-Fly]#[http://seclists.org/bugtraq/2014/Nov/113 Bugtraq: WordPress 3 persistent script injection]#[https://github.com/google/firing-range google/firing-range · GitHub]#[http://blog.c22.cc/2014/11/20/deepsec-2014-trusting-your-cloud-provider-protecting-private-virtual-machines-armin-simma/ [DeepSec 2014] Trusting Your Cloud Provider. Protecting Private Virtual Machines – Armin Simma | Cатсн²² (in)sесuяitу / ChrisJohnRiley]#[https://foxitsecurity.files.wordpress.com/2014/11/cryptophp-whitepaper-foxsrt-v4.pdf ] - Doesn't matter which CMS you run, they all were found with this backdoor.#[http://motherboard.vice.com/read/michael-ossmann-and-the-nsa-playset Let's Play NSA! The Hackers Open-Sourcing Top Secret Spy Tools | Motherboard] - This one is for Larryand Joff...#[http://www.darknet.org.uk/2014/11/critical-xss-flaw-affects-wordpress-3-9-2-earlier/ Critical XSS Flaw Affects WordPress 3.9.2 And Earlier] - Oh, and if you run Wordpress, have lots of people who can do upgrades. Lots of people.#[http://securityvulns.com/news/Apple/TV/1411.html Apple TV multiple security vulnerabilities] - I really want to see an attack against a platform like this. Put some code on it, use it to harvest credentials, even credit card info? Not sure if that's Stories possible, but I always wonder.#[http://threatpost.com/remote-code-execution-in-popular-hikvision-surveillance-dvr/109552 Remote Code Execution in Popular Hikvision Surveillance DVR] - RTSP has some buffer overflows, oh and then there is this: "the devices also ship with a default username (admin) and a default password (‘12345′)". I need a drink. We're all doomed. Its a hacker's playground out there, stock up on booze.#[http://www.darkreading.com/dont-discount-xss-vulnerabilities/d/d-id/1317706 Don't Discount XSS Vulnerabilities] - Great article on XSS, Johannes is quoted as stating that XMLRPC requests are being used to bypass same origin. Great point. And people tend to give a much lower priority to XSS, likely because the attack success depends largely on the context of the vulnerability. Sometimes its not likely to be exploited. Other times it can be used to dive deep into your web site and results in root. The trick is figuring out the difference. From a defense standpoint, apply your patches. Likely a patch for XSS will not blow up your site, it could, but in all the years of maintaining web sites, I still recommend to apply those patches. Unfortunately, this means upgrading the entire application, where you get bug fixes, security fixes, and "features". Which could lead to more vulnerabilities. So, get good at upgrading...#[http://www.spgedwards.com/2014/11/regin-when-did-protection-start.html Regin: When did protection start?]#[http://windowsitpro.com/blog/strength-numbers-why-layered-network-protection-priority Strength in numbers: Why layered network protection is priority] - So A/V, Patch and "web protections". While all those things will help, you need to go so much deeper. Patch and configuration and process go hand-in-hand. Endpoint protection is important, and relying on A/V is so 7 years ago. EMET comes to mind, as does a good strategy for re-imaging. Web applications comes down to educating developers and having a good testing process. And so. much. more.#[http://www.infosecurity.us/blog/2014/11/21/all-your-base-are-encrypted "All Your Base] - Eff makes efforts to encrypt the Internet. "The biggest obstacle to HTTPS deployment has been the complexity, bureaucracy, and cost of the certificates that HTTPS requires." Its true, the barriers to properly implementing and maintaining TLS are huge. The big guys get it right, sometimes. Curious to see what comes next...#[http://reversemode.com/index.php?Itemid=0&id=80&option=com_content&task=view Reversing Industrial firmware for fun and backdoors I] - Some updates posted here, I wonder if everyone has updated their firmware? Likely not... We seem to lack adequate testing tools, given the nature of embedded systems and how each one is unique. How does your enterprise ensure firmware updates across devices?#[http://reversemode.com/index.php?Itemid=0&id=77&option=com_content&task=view Reversing DELL's DRAC firmware] - Turns out, this firmware does not use /etc/shadow. This means the backdoor found is not accessible remotely. Oh well. This happens when you are reverse engineering firmware. You find artifacts, but sometimes they are not used in the production environment. Maybe it was only used in a test environment or another hardware revision. Or sometimes the firmware is copied from a different hardware device and some features are not implemented.
== Jack's Stories ==
Stories? You want stories? I'll tell ya stories. Why, when I was your age one time I... <br>No, wait, that wasn't me.<br><br>== Joff's musings from down under ==Oh, yeah. Have a CISSP or other (ISC)2 cert? VOTE. The Board elections are open. Vote. Just do it.
1,237

edits

Navigation menu