From Security Weekly Wiki
Jump to navigationJump to search
4,035 bytes added ,  16:28, 29 June 2017
Text replacement - "\{\{\#ev\:bliptv\|(.*)\}" to "\[ Visit The Security Weekly YouTube Channel for all of our latest videos\!\]"
= Announcements =
PaulDotCom Security Weekly - Episode 240 for Thursday April 21st, 2011 - What we learned at Source Boston.
* [ Register now] for Wednesday's Late Breaking Computer Attack Vectors Webcast Sponsored by Core Security - April 27th at 2PM EDT.
* El primer Episodio de PaulDotCom Security Weekly Espanol [ esta disponible aqui]
* [ Born To Run (and Hack)] - Don't forget to sign up for Hacker run! Team Pesce is training in April for [ Purple Stride] on May 15th.
* '''PaulDotCom Security Weekly Blackhat Training Part 1''' [ Sign up] for "Offensive Countermeasures: Making Defense Sexy" as a two-day course at Blackhat July 30-31. Every student gets a FREE "Hack Naked" t-shirt and sticker!
* '''PaulDotCom Security Weekly Blackhat Training Part 2''' [ Sign up] for "Advanced Vulnerability Scanning Techniques Using Nessus" July 30-31 or August 1-2
* Larry is teaching SANS 617 SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses in the only country he is licensed to teach in - Canada! Catch him in Victoria May 9 to May 14th.
* [ Register now for the] 8th Annual Charlotte ISSA Security Summit featuring the 3 buffest people in InfoSec: PaulDotComSecurity Weekly, Ed Skoudis, and Chris Hadnagy, all on May 5th.
* DerbyCon : Louisville, Kentucky – September 30th to October 2, 2011. Catch Carlos Perez's training session - "Automating Post Exploitation with Metasploit".
=Episode Media=
[ MP3]
= Tech Segment: Trapping Attackers in Your WebLabyrinth =
= Tech Segment: Installing & Configuring WebLabyrinth = Media == <center>\[ Visit The Security Weekly YouTube Channel for all of our latest videos\!\]}</center> '''Watch the live video version of this segment above. For more videos and to subscribe to Security Weekly TV visit''' '''Download the [ Audio (MP3)] Version of this segment here!'''
== Step 1: Download it! ==
You can get Ben's awesome code from the [ WebLabyrinth Google Code Site]. I then download it like this:
<pre># wget</pre>
== Step 2: Install it! ==
<pre>tar zxvf weblabyrinth-0.3.0.tar.gz
cp * /var/www/labyrinth/</pre>
I sent Ben some corrections, here's what the commands should be:
I've got a few different ways, the first is re-write rules:
<pre>RewriteRule ^/admin$ [R]RewriteRule ^/secret/$ [R]</pre>
Then use some robots.txt action:
You will now see people getting caught in the trap. This is great data to send to you SEIM. I have yet to play with the alerting, but want to mod it to write to a log, rather than email, so you can include that in your SEIM.
= Stories For Discussion =
== Media ==
<center>\[ Visit The Security Weekly YouTube Channel for all of our latest videos\!\]}</center>
'''Watch the live video version of this segment above. For more videos and to subscribe to Security Weekly TV visit'''
= Stories For Discussion ='''Download the [ Audio (MP3)] Version of this segment here!'''
== Larry's Stories ==
== Paul's Stories ==
#[ Kasperky's Son Kidnapped] - Its scary when the online criminals creep into the real world. I think we are going to see a shift from "cybercriminals" to just criminals. With so much at stake online, "cybercrime" will be just "crime". We've seen evidence of this already, and this is a bad/good example of just how important the crime is to the criminals. Crime is big business, I heard a great story from the CSO of GE. He reported that investigators found criminals using business techniques, like ROI and such, growth charts, to plot their criminal activity. While garbage collection and cigarettes may have kept people in business in the past, the new wave of crime is identity theft and credit cards.
#[ Facebook is more secure! NOT!] - Don't get me wrong, two-factor authentication is great, to help prevent password abuses like weak passwords and brute-forcing. But that's where it ends. Also, SSL does help improve the privacy of your data IN TRANSIT, but thats it and where that ends. The dangers of Facebook are in the app itself. People click on shit, get socialy engineered, and leak their own damn information. That is the real problem with Facebook with respect to privacy and security. How we solve this problem is the real challenge. Funny, its the same for your web applications and your organizations. You can lock one thing down, but it doesn't solve the real problem, which is the cultural perception of security. People who use and develop the applications don't have any skin in the game of security. So what, I get a virus, I clean it up, and move on with life.
#[ DDoS is the Elephant in the Room] - Forsure, downtime sucks. We put a lot of effort into keeping our networks running. So much so that change management prevents us from doing things like upgrading our firewalls and applying patches. Yet, we're hanging out on the Internet where a group of people can eat up our bandwidth and cost us money.
#[ APT is exaggerated] - "Oh, we got hit by an APT" so therefore, its okay, there was nothing we could do. Whaat? If you get some malware, its not APT. In fact, we've lost site of what APT even really means, if the term ever meant anything at all. Here's the thing, its about integrity. If you've lost the integrity of your network and/or systems, you've lost. You can't strive to defend against malware, APT, or viruses, you have to defend your network and your data. Focus internally grasshopper, figure out what is important to your business, keep it running, and enforce integrity.
== The Interns' Stories ==
[ iPhone tracks your iMovements & then syncs to your iTunes!]
[ Michigan pigs errr cops are downloading cell data as part of traffic stops.]
== Carlos' Stories ==

Navigation menu