From Security Weekly Wiki
Revision as of 14:27, 4 September 2008 by Pauldotcom (talk | contribs)
Jump to navigationJump to search


Core Security

This episode is sponsored by Core Security Technologies, helping you penetrate your network. Rock out with your 'sploit out and check out the client side exploit and web application testing modules! Listen to this podcast and qualify to receive a 10% discount on Core Impact, worlds best penetration testing tool.


This podcast is also sponsored by Tenable network security. Tenable is a developer of enterprise vulnerability, compliance and log management software, but most notibly the creators of Nessus, the worlds best vulnerability scanner. Tenable Security Center software extends the power of Nessus through reporting, remediation workflow, IDS event correlation and much more. Tenable also offers a Direct Feed subscription for immediate access to new Nessus plugins, and compliance checks” Tenable – Unified Security Monitoring!


Astaro offers the most complete and easy to use Internet security appliances available. The products combine best of breed applications, the proven quality of Linux and enterprise level performance, providing the latest protection with the best total cost of ownership. All products are available as software, hardware or virtual appliances, which allows users the flexibility to meet a wide variety of deployment scenarios.

One of the best things about Astaro is that it offers its products completely free for home use. All enterprise features and all subscriptions, including virus scanning, web content filtering, email filtering and VPN clients, are available in the home license for no cost. All you have to do is visit www.astaro.com, register, download the software and obtain the key, which protects up to 10 IPs. There are no sales people to talk to, no payment information to enter—it’s just free. Again, visit www.astaro.com for more information or to download the product and free home user license.

Announcements & Shameless Plugs

Live from the PaulDotCom Studios Welcome to PaulDotCom Security Weekly, Episode 120 for August 28st, 2008

Welcome to PaulDotCom Security Weekly, a show for security professionals, by security professionals.

"I met you yesterday at SANS and was wondering if you could help me promote my mentor session of SEC508 starting on September 23rd. If you could forward this invitation onto your network of contacts, that would be awesome." - Evan

Listener Feedback: Listener Scott Is Evil

"Sorry if you spoke about this, but I'm still catching up on your shows. I'm not an expert on how the browser and SSL works, but I worry about this being true. Also, if this works, I'm a little hesitant to mention this because it could be used. I was wondering about using the DNS vulnerability to hijack domains. I hear a lot of people saying people can't hijack SSL secured domain because the certificate wouldn't validate. Well I can see that you can't spoof the root certificate authorities because the certificates are preloaded in the browser. However, can someone get a certificate able to issue other certificates from a trusted root certificate authority and then sign the phony paypal.com web page with it. This way when my browser goes to the phony paypal.com website, it will tell my browser it was signed by "evilCA.com", then my browser should check to see if "evilCA.com" is valid, and it would pass because it was signed by a root CA. So by browser should be happy and not even alert me anything is wrong and give me an SSL pad lock, maybe even an extended certificate, if you can issue those from a normal cert (because I doubt bad people would front a business for an EV cert). Is this how the browser chain of trust works? What did I miss to prevent people from doing this? Thanks and I promise to catch up on all the past shows. Scott"

Stories Of Interest

Hacking Biometric Locks

VMware Releases A TON of Patches - [PaulDotCom] - Patches still pending for VM Fusion, WTF! You should patch, its important, especially because the security of multiple machines is at risk, in a platform independent kind of way.

Chrome is Shiny, but scratches easily - [PaulDotCom] - Oh hey look, a new web browser! And look, vulnerabilities in the new web browser! Who would have thought? All software has vulnerabilities, especially new software. People have been hacking away at Firefox for quite some time, and they do a decent job of keeping things patched. Sure, they implement new features, which then could present software vulnerabilities, but they get fixed in a timely manner, a manner which best fits with my security requirements, so I am sticking with Firefox. Lets not even talk about IE, a browser still plagued with security flaws, and ones that don't get fixed until MS decides to bless us with their holy than thou bi-monthly patches.

"Securing" Your iPhone - [PaulDotCom] - I was excited about this article, until I read it. The first two items are implementing a 4 digit pass code, because that provides security, right. Then make sure your phone locks, well duh. And somehow re-mapping my home button protects my information, at least it prevents people from bypassing the lock and accessing my address book. Is that really security or just a workaround? The best part about the article? The screenshot of the iPhone shows they have 3 apps that need updating, doesn't keeping your software up-to-date apply to your phone as well? Also, none of this protects your information as it flys in clear text over open wireless networks...