= Shameless Plugs & General Announcements =
PaulDotCom Security Weekly - Episode 197 - For Thursday May 6th.
* Sign up for "Advanced Vulnerability Scanning Using Nessus" being offered at [http://blog.brucon.org/2010/03/announcing-brucon-training-5-advanced.html Brucon] and [http://www.blackhat.com/html/bh-us-10/training/bh-us-10-training_TEN-AdvNessus.html Black Hat Las Vegas]!
* [http://www.sans.org/vlive/details.php?nid=20709 Hacker Techniques and Incident Response] with Ed Skoudis and John Strand, in your living room via SANS vLive! Pants are optional. IN504 gets you 25% off. http://www.vergenet.net/~conrad/scripts/pants.html
= Guest Interview: [http://www.emergingthreats.net Matt Jonkman] =
== BACKGROUND ==
Matt is the founder of Emerging Threats, and spent five years in the Army as an Air Traffic Control RADAR and Communications Tech. He currently works for Metaflows under NSF grant funding as well as leading Emerging Threats and the OISF.
[http://www.openinfosecfoundation.org Suricata, the Open Source Intrusion Detection and Prevention engine]
== Questions ==
= Tech Segment: Zone Transfers & Embedded Systems =
The "host" command is great for doing zone transfers. And in this case we found a DDNS provider that happens to allow zone transfers from one of its DNS servers. Carlo's tool is better at finding these as you can point it at one domain and it will try to do a zone transfer for that domain from each DNS server listed. As for the results:
# wc -l ourlinksys.com.out 120815 ourlinksys.com.out
Sweet! Here are some easy ways to find all those DDNS providers:
You can put them in a list and do something like these:
STOP_WLDCRD false yes Stops Brute Force Enumeration if wildcard resolution is detected
WORDLIST /home/paulda/msf3/data/wordlists/namelist.txt no Wordlist file for domain name brute force.</pre>
= Stories For Discussion =
#[http://www.locusmag.com/Perspectives/2010/05/cory-doctorow-persistence-pays-parasites/ Getting phished can happen tot he best of us] - [Larry] - It just goes to show that someone who is savvy can get owned. Of course they were able to realize that they had been phished, and what it meant, AND how to address it. How many of our grandmas would know?
#[http://icanstalku.com/ I can stalk you!] - [Larry] - Hmm, how about stalking through twitter. This project is intended to raise awareness on inadvertent information sharing through social networks by harnessing teh power or metadata.
# [http://www.irongeek.com/i.php?page=videos/whas11-webcam-exploit&mode=print Irongeek on the news!] - [
Pauldotcom] - "I always feel like somebody's watching me!". Pretty neat stuff, trying to figure out what payload he is using to activate the remote payload to snoop on the webcam. I always thought this was a neat payload.# http://carnal0wnage.blogspot.com/2010/01/layer-four-traceroute.html Layer 4 Tracerout] - [ PaulDotCom] - This is a really neat traceroute program because it finds ways to get around filters to make traceroute work. I find it interesting to see which ISP the target is using and be able to gather the IP address of their upstream router. If you can successfully attack the upstream router, its game over for the target.# [http://jvn.jp/en/jp/JVN14313132/index.html Cisco Router and Security Device Manager XSS] - [ PaulDotCom] - Anytime you can get an XSS on the software that manages the entire network, SCORE! This XSS attack lives on the SDM, software used to manage Cisco routers and firewalls. Let me make a guess, it yours called "sdm.yourinternaldomain.com"? Could I try to launch an attack against it by sending email? Sure can...# [http://www.computerworld.com/s/article/9176371/Hacker_develops_multi_platform_rootkit_for_ATMs?source=rss_news Hacking ATMS - You do know Jack] - [ PaulDotCom] - Barnaby Jack does some really awesome research, primariy in embedded systems. This time he's targeting ATMs. His previous employer, Juniper networks, made him pull his talk on ATM security last year because the vendors complained. This year, he's just got a new job at IOActive and will deliver the talk, and talk about two different model ATMs from two different manufacturers and their software vulnerabilities. Jeff Moss is quoted as saying, "Apparently you can make all the money come out". Freaking sweet! And good for Barnaby Jack (BJ for short?) for leaving an doing whats right, rock on man!
= Other Stories =