Changes

From Security Weekly Wiki
Jump to navigationJump to search
1,787 bytes added ,  01:20, 11 October 2014
m
Text replacement - " pauldotcom " to " Security Weekly "
= Shameless Plugs & General Announcements =
PaulDotCom Security Weekly - Episode 168 - For Thursday September 17th, 2009
* We're looking for two^h^h^h one interns^h - local to the Rhode Island area, listen to the podcast, into linux, able to lift 30 lbs, and if possible, willing to perform post-production work on the podcast. If that description sounds like you, please send us a note via psw [at] pauldotcom Security Weekly [dot com]
* [http://louisvilleinfosec.com/ The Louisville Metro InfoSec Conference] in lucky Louisville offers John Strand as Keynote and serves PaulDotCom Security Weekly Asadoorian as Breakout Speaker. If that were not enough, they will also have a Capture The Flag event and [http://www.irongeek.com/ Irongeek]! All the above for the very low price of $99 on October 8th.
* [http://www.sans.org/info/46903 Community SANS: Sec 542 Web Application Penetration Testing] - SANS is pleased to announce Community SANS Providence, running January 11 - 16. Larry will teach Security 542: Web Application Penetration Testing and Ethical Hacking. The course will be hosted by Brown University. Also coming up, 617 on Calgary sometime in March!
* [http://www.rochestersecurity.org/ Rochester Security Summit] - Larry and Ed Skoudis to give Keynotes. What can get better than that? October 28 - 29 in Rochester NY!
= Interview: Ryan Dewhurst is damn proud of how vulnerable * [http://www.ethicalhack3r.cohackfest.ukca/damn-vulnerable-web?lg=en Hackfest Canada!] -appMick will be speaking/ his web apps areranting from the Great White North! November 7th, you'll want to be there! Quebec, Canada (North America's only walled city!)] =
Ryan's website: =Episode Media= [http://wwwmedia.ethicalhack3rlibsyn.cocom/media/pauldotcom/pauldotcom-SW-episode168.uk mp3 mp3] = Interview: Ryan Dewhurst is damn proud (of how vulnerable [http://www.ethicalhack3r.co.uk/damn-vulnerable-web-app/ his web apps are)] = == About ==
Ryan's [http://wwwDewhurt is a student stufying Ethical Hacking for Computer Security at British University.ethicalhack3r.co.uk/category/toolz/ tools]His blog documents his thoughts, findings and experiments related to ethical hacking
Ryan on [http://twitter"I have had a passion for technology since I can remember, information security has always interested me since owning my own Pentium II 200Mhz PC that I conned my mother into buying me back when I was a wee lad.com/ethicalhack3r twitter]"
Ryan is a full(Recently he has started to get involved in Open Source projects including his own, Damn Vulnerable Web App, ScreenStamp!) time student at Northumbria University's School of Computing (UK), Engineering Nikto and Information Sciences doing a BSc (hons) in Ethical Hacking for Computer Securityw3af which I plan to dedicate more time to.
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be light weight, easy to use and full of vulnerabilities to exploit. It is used to learn or teach the art of web application security.== Questions ==
Questions for Ryan:
#* How did you get your start started in information security?#* Why did you decide to write DVWA?* What are some of the vulnerabilities included in DVWA and how do they work? (CSRF, XSS, RFI, LFI, SQLi, upload, command execution?* What made are the differences between 1.0.4 and 1.0.5 of DVWA?* What separates is apart from similar projects? (Cookie values?)* Was there a particular application that inspired DVWA?* Why do you develop DWVAthink PHP is always so damn insecure and vulnerable?#Who * What can we do to write more secure code? Along those lines, was is harder to write insecure code in DVWA or secure code?* Did you get taught how to write secure code in school?* What other projects are you follow working on Twitter?#== Resources == Ryan's website: [http://www.ethicalhack3r.co.uk www.ethicalhack3r.co.uk] Ryan's [http://www.ethicalhack3r.co.uk/category/toolz/ tools] Ryan on [http://twitter.com/ethicalhack3r twitter] 
= Tech Segment: =
= Stories For Discussion =
#[http://www.hackinthebox.org/index.php?name=News&file=article&sid=33063 Chat-in-the-middle] - [Larry] - Wow, don't believe anything you read, and half of what you see. Now, Phishers are spawning up those nice web chat assistance windows to help you give them the keys to your account. Nice.
#[http://www.social-engineer.org/ Do not go to this site] - [Larry] - I'm really glad these guys are putting this project together, as there aren;t a lot of good resources on teaching/learning social engineering. So far the info and resources are great, and will evolve in time. I wonder if they have plans to include defensive measures…. [PaulDotComPaul] - Gave this a quick look today and looks like it has a good chance of becoming THE social engineering resource on the web. I read the page on pre-texting and was delighted to read accurate descriptions and examples that have occured in the real world. I also think that while you can have the technical abilities to execute social engineering, its one of those things that you have to be the kind of person that can execute them successfully, and thats something you can't teach.
#[http://tools.ietf.org/html/draft-oreirdan-mody-bot-remediation-03 Got Bots?] - [Larry] - The IETF has released a document entitled "Recommendations for the Remediation of Bots in ISP Networks". Talks about what to do, and how to notify customers and manage. One might even adopt this for internal practices as well….
#[http://www.xssed.com/mirror/64138/ For the love of all that is holy!] - [Larry] - OK, who spent the time finding XSS at this site? I mean, sometimes security is a dirty job, but for fun?
#[http://www.theregister.co.uk/2009/09/16/power_grid_weakness/ So, are we going to take this SCADA Stuff seriously?] - [Larry] - Ok, so China is speculating that taking out a smaller power operation can have larger effects. Sounds like a parallel to attacking computer systems, and not just the power grid.
# [http://www.cybercrime.gov/gonzalesPlea.pdf Albert Gonzalez pleads guilty to New England attacks] - [MikeP.] - 130 Million credit cards later, the Feds allegedly have their man.
#[http://taosecurity.blogspot.com/2009/09/microsoft-updates-ms09-048-to-show-xp.html MS09-048] - [PaulDotComPaul] - A DoS condition, patched in Win 7 and Server 2008, leaves all other OSes vulnerable, NICE! It is a true TCPIP exhaustion type attack, so seems to me it will remain a DoS.#[http://isc.sans.org/diary.php?storyid=7141&rss DoS -> Local and Remote Exploit SMBv2 vuln] - [PaulDotComPaul] - Gotta love the 0day love on this one with Immunity releasing to their customers both a local and remote exploit for Vista and server 2008.#[http://socialmediasecurity.com/security-guides/facebook/ Facebook security from the experts!] - [Mick] - Tom Eston made this amazing guide. Be sure to check it out and follow the advice! I'm sure you'll be glad you did.#[http://money.cnn.com/2009/09/16/technology/cybercrime/index.htm?postversion=2009091613 Cybercrime underground economics 101] - [Mick] - Hey! Since it's on CNN, it has to be real! I actually like the fact that this brings some exposure to the non-techs.
= Other Stories Of Interest =
#[http://www.nytimes.com/2009/09/16/world/europe/16amsterdam.html?_r=3 lockpicking is a sport!] - [Mick] - So very cool... for those of you who've not tried it yet, I strongly urge you to give it a go. I find lockpicking to be relaxing and quite fun, perhaps you will too!

Navigation menu