Changes

From Security Weekly Wiki
Jump to navigationJump to search
7,496 bytes added ,  01:20, 11 October 2014
m
Text replacement - " pauldotcom " to " Security Weekly "
=Episode Media=
 
[http://archive.securityweekly.com/pauldotcom-SW-episode75.mp3 mp3]
 
= Wireless Guest Network: Part I =
nvram set wan_hostname="myap1"
nvram set wan_proto="none"
nvram commit
</pre>'''
[Larry] Added the nvram commit.
 
* '''Step 3''' - Create a separate VLAN or physical network, preferably with a separate Internet connection. Put that APs on that subnet.
* '''Step 6''' - Reboot the WRT54GL, make sure all is well. Now, connect the POE adapaters and place the APs where you want them.
* '''Step 7''' - Configure Wireless - Place the access points on their respecitve channels using the command "'''nvram set wl0_channel=1'''". Ideally, you could have 3 APs, one on channel 1, 6, and 11. Now, set all of the SSIDs to the same value using the command "'''nvram set wl0_ssid="guestwireless'''"and "'''nvram commit'''" in order to save the nvram changes. [Larry] Added nvram commit.
You should now be able to associate to the given SSID. Which access point you associate with will depend heavily on the wireless driver that you are using, and other factors that require too much math.
= Listener Feedback = == Steve Gibson Clarification == <pre> I have been listening to your podcast for several months now and News Ifind it fun to listen to but also informative...... alot of the time.I am a little confused about the jibs and jabs at Steve Gibson. I knowSteve has been around for a while, as a matter of fact, I didn't evenknowhe had a podcast. So I went back and gave a listen to one or two ofthem.Granted the subject matter is a little more rudimentary and theres nodoubt that it is directed at less experienced windows users. The fewpodcastsI listen to though seemed like they would benefit those that mightlisten to it. Is this a private joke between Security Weekly and GRC ? Or have Ijust not been listening long enough ? =========================================================================Is linux saying the king has no cloths ?  Gary Keen</pre> [Paul] - So lets clear the air about Steve Gibson. First, he has done much good for the security community, no doubt. Say what you will about him, he has contributed stuff that has helped improve the security of the Internet. However, we pick on him because he's an easy target, shame on us. HOWEVER, he does have tons of listeners and will often say things that are not technically correct (heh, so do we), but will then go uncorrected. We have written them several times to help correct them, with no response. They don't seem to want to collaborate and communicate with us in the same manner that *Every other security podcast in production today* has and continues to. We have a great working relationship with Cyberspeak, Hak.5, Sploitcast, and many others. Security Now! just chooses to ignore us, making them the target of public ridicule because well, they are an easy target and we have no spine (Kidding!!). Another thing, Steve often presents things in a confusing manner, and I think this is because he tries to explain some of the more advanced security topics to an audience with a very low level of computer knowledge. Sometimes, this just doesn't work no matter how hard you try and causes confusion (hence the sweeper). So, we don't dislike Steve or Security Now!, but we have our moments with them. 
''' E-mail added by [Larry] - == Guiding RF (Jim S. writes:''') ==
<pre>In episode 76 when you were discussing the new WiFi distance record, Nick was saying you can't direct a radio wave in flight. We beg to differ. <pictures of waveguide></pre>
[Larry] - So,I went back and read everything I could on Intel's new wireless bending. We were waaaay off the mark. Not in flight, but at transmit, for long range and "moving antennas". Only for slight variations!
==
''' Email added by [Larry] - == Blackholign MySpace (Chris B. writes:''') ==
<pre>Hi Paul,
''' == Email added by [Larry] - (Shlomo D. writes:''') ==
<pre>I was thinking about what you guys said in Episode 72. It seems that
[Larry] Wow, so much seems to be wrong here. Let's discuss - onsite, policies, education, identifiable information....
 
== Zigbee Security (Grimreaper) ==
 
<pre>Guys,
 
Just want to say still enjoying the podcast, it makes the commute easier,
keep up the good work.
 
I'm considering taking a new job and one of the projects I would be working
on deals w/the ZigBee wireless standard. I'm no expert but I've heard it
compared to BlueTooth and that was a bit concerning in light of reading
about hacks for that standard.
 
I was wondering if you know about ZigBee and what your opinions might be
where security is concerned.
 
 
Thx,
 
Grim Reaper</pre>
 
[Paul] - I found this resource: http://www.cs.berkeley.edu/~nks/papers/15.4-wise04.pdf "Secuity Considerations for IEEE 802.15.4 Networks" and if I remember correctly, Josh said that it suffers from many of the problems that bluetooth and 802.11 suffer from in authentication of mgt frames.
 
== Kismet on WRT54G (Jason) ==
 
<pre>Hey guys,
I'm mucking around with kismet on my wrt and can't get the thing to report
the power levels of the networks around. Have you guys run into this? I've
been all over, but so far no luck. Any suggestions?
 
Jason</pre>
 
[Paul] - Broadcom drivers suck and don't give you the RSSI info. However, using Kamikaze and the 2.6 kernel you can get Atheros drivers to work on your platform. No configuration in /etc/config, however you can use the wlanconfig commands to configure. You will then need to compile Kismet drone with atheros support, which I just haven't gotten around to. [Larry] - This requires you to have a device with an Atheros chipset! An ASUS WL500g Premium will work nicely with a swap out on the mini-pci card. On WRT, you are hosed for Signal strenght - which was part of my problems while writing my GAWN Gold Paper (in the SANS RR). The other problem is with multiple Kismet Drones - unable to determine which drone spotted the AP. Allegedly there is a fix in newcore for this one.
 
== WEP & WRT54G Models (Andy) ==
 
<pre>Hey, I "discovered" the Hak5 podcasts and they mentioned your site. I watched episode 66 the other day and had a few questions.
 
Which is the better alternative to WEP, standard stuff available on most routers? The stuff I've seen since I heard the podcast suggests WPA, but even that isn't very strong (coWPAtty, etc).
 
Are there any video postings of the Episodes, besides the TV episodes?
 
You all talked about the WRT54G. I read that only versions 1-4 were usable (linux versions), then linksys switches systems after that. Is that not true or were you guys mostly refering to the WRT54GS? And then the most important question is where to get a WRT54G (v1-4) or WRT54GS at a good price. I expected wardriving.com to have something but they linked to the linksys site.
 
Thank for the help.
 
Andy</pre>
 
[Paul] - <Shameless Book Plug>There is a hack in the book that shows you how to get WPA-Enterprise working on a standalone WRT54G. This is the most secure option, and does not have the vulnerabilities that are contained within WEP or WPA-PSK. The WRT54GL router is the one recommended in the book and is still produced by Linksys for hacking. The WRTSL54GS is great too and used in the book too, its $99 if that fits into your budget. With respects to war driving, the book has an awesome hack, poineered by renderman and improved upon by Larry, called war-driving in a box!</Shameless Book Plug> [Larry] - As a future update, I'm going to port the Wardriving-in-a-Box to the WRTSL54GS. This will make it easier for even n00bs to complete the hack (and by n00bs, I mean those with out soldering skillz).
 
== Secure Web Development (d4ncingd4n) ==
 
<pre>"Twitchy" has mentioned several times how much Java, PHP, AJAX, and
Web 2.0in general suck. Recognizing that programs can be written
insecurely in any
language, what do you guys feel is the best development platform that
balances security, responsiveness, ease of development/deployment, and
scalability for a client-server environment? What are the reasons for your
opinions? I would prefer to use open source to avoid drinking the MS
Kool-aid (and besides my company is cheap...).
 
I have a couple of suggestions for the show: 1) On the website, keep a list
of the beers you mention. Sometimes you mention a really good beer but,
since I don't know how the name is spelled, I can't find the beer so I can
try it also. 2) On the website, keep a list of resources available for
learning such as the SANS reading room, SecurityForest, OWASP project,
especially links to podcasts of the various conferences.
 
Here's some demographics..
First computer: VIC-20 (I still have it along with "Compute Gazattes". I
used to start a program load from cassette and then walk to buy beer at the
corner market.)
Location: Nashville, TN
Job title: Network admin
Newest gadget: Nokia 770 (love it)
 
Keep up the good work!
 
D4ncingD4n </pre>
 
[Paul] - I would suggest using whatever web application platform you are most comfortable with, take SANS Secure coding courses and web application courses, and regularly audit your code and application. [Larry] - Mmmm, beer. Good idea on list of beers, and for a list of education resources.
 
[[Category:Show Notes]]

Navigation menu