= Shameless Plugs & General Announcements =
PaulDotCom Security Weekly - Episode 168 - For Thursday September 17th, 2009
* We're looking for two^h^h^h one interns^h - local to the Rhode Island area, listen to the podcast, into linux, able to lift 30 lbs, and if possible, willing to perform post-production work on the podcast. If that description sounds like you, please send us a note via psw [at]
pauldotcom [dot com]
* [http://louisvilleinfosec.com/ The Louisville Metro InfoSec Conference] in lucky Louisville offers John Strand as Keynote and serves
PaulDotCom Asadoorian as Breakout Speaker. If that were not enough, they will also have a Capture The Flag event and [http://www.irongeek.com/ Irongeek]! All the above for the very low price of $99 on October 8th.
* [http://www.sans.org/info/46903 Community SANS: Sec 542 Web Application Penetration Testing] - SANS is pleased to announce Community SANS Providence, running January 11 - 16. Larry will teach Security 542: Web Application Penetration Testing and Ethical Hacking. The course will be hosted by Brown University. Also coming up, 617 on Calgary sometime in March!
* [http://www.rochestersecurity.org/ Rochester Security Summit] - Larry and Ed Skoudis to give Keynotes. What can get better than that? October 28 - 29 in Rochester NY!
= Interview: Ryan Dewhurst is damn proud of how vulnerable [http://www. ethicalhack3r.co. uk/ damn-vulnerable-web- app/ his web apps are) ] =
Ryan's website: [http:// www. ethicalhack3r. co. uk www.ethicalhack3r.co.uk]
's [http://www. ethicalhack3r.co.uk/category/toolz/ tools]
Ryan on [http://twitter. com/ethicalhack3r twitter]
Ryan is a full(! ) time student at Northumbria University's School of Computing (UK), Engineering and Information Sciences doing a BSc (hons) in Ethical Hacking for Computer Security.
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be light weight, easy to use and full of vulnerabilities to exploit. It is used to learn or teach the art of web application security.
Questions for Ryan:
#How did you get your start in information security? #What made you develop DWVA? #Who do you follow on Twitter? #
= Tech Segment: =
= Stories For Discussion =
#[http://www.hackinthebox.org/index.php?name=News&file=article&sid=33063 Chat-in-the-middle] - [Larry] - Wow, don't believe anything you read, and half of what you see. Now, Phishers are spawning up those nice web chat assistance windows to help you give them the keys to your account. Nice.
#[http://www.social-engineer.org/ Do not go to this site] - [Larry] - I'm really glad these guys are putting this project together, as there aren;t a lot of good resources on teaching/learning social engineering. So far the info and resources are great, and will evolve in time. I wonder if they have plans to include defensive measures…. [
PaulDotCom] - Gave this a quick look today and looks like it has a good chance of becoming THE social engineering resource on the web. I read the page on pre-texting and was delighted to read accurate descriptions and examples that have occured in the real world. I also think that while you can have the technical abilities to execute social engineering, its one of those things that you have to be the kind of person that can execute them successfully, and thats something you can't teach.
#[http://tools.ietf.org/html/draft-oreirdan-mody-bot-remediation-03 Got Bots?] - [Larry] - The IETF has released a document entitled "Recommendations for the Remediation of Bots in ISP Networks". Talks about what to do, and how to notify customers and manage. One might even adopt this for internal practices as well….
#[http://www.xssed.com/mirror/64138/ For the love of all that is holy!] - [Larry] - OK, who spent the time finding XSS at this site? I mean, sometimes security is a dirty job, but for fun?
#[http://www.theregister.co.uk/2009/09/16/power_grid_weakness/ So, are we going to take this SCADA Stuff seriously?] - [Larry] - Ok, so China is speculating that taking out a smaller power operation can have larger effects. Sounds like a parallel to attacking computer systems, and not just the power grid.
# [http://www.cybercrime.gov/gonzalesPlea.pdf Albert Gonzalez pleads guilty to New England attacks] - [MikeP.] - 130 Million credit cards later, the Feds allegedly have their man.
[http://taosecurity.blogspot.com/2009/09/microsoft-updates-ms09-048-to-show-xp.html MS09-048] - [
PaulDotCom] - A DoS condition, patched in Win 7 and Server 2008, leaves all other OSes vulnerable, NICE! It is a true TCPIP exhaustion type attack, so seems to me it will remain a DoS.[http://isc.sans.org/diary.php?storyid=7141&rss DoS -> Local and Remote Exploit SMBv2 vuln] - [ PaulDotCom] - Gotta love the 0day love on this one with Immunity releasing to their customers both a local and remote exploit for Vista and server 2008.
= Other Stories Of Interest =