Difference between revisions of "Episode263"
|Line 64:||Line 64:|
== Jack's Stories ==
== Jack's Stories ==
Revision as of 18:38, 13 October 2011
Announcements & Shameless Plugs
PaulDotCom Security Weekly - Episode 263 for Thursday October 13th, 2011.
- Check out Hack Naked TV - At some point, Wasted Strand will guest record an episode...
- Friday October 28th is our 12 hour podcast for Hackers for Charity.
- Larry is teaching SEC580 Metasploit Kung Fu for Enterprise Pen Testing in San Antonio, TX December 4-5. Tell them (and us) that we sent you!
- Don't forget to Read our blog, Participate on our mailing list, Visit PaulDotCom Insider, Follow us on Twitter, Join the IRC channel at irc.freenode.net #pauldotcom, Watch our Videos and Add us on Facebook where we can be "friends"
Guest Interview: Dave Porcello, CEO of Pwnie Express
7:30 PM EDT
Building on over 10 years of IT leadership, security, and entrepreneurial experience, Dave Porcello founded Pwnie Express in March 2009 with a clear vision of providing unique hardware and unparalleled expertise to the global security industry. He's on tonight to discuss the full pentesting suite packed into an inconspicuous microserver known as the Pwn Plug.
Pwnie Express bio
Pwnie Express specializes in bleeding edge pentesting hardware, including the industry's first-to-market commercial pentesting drop box, the Pwn Plug. A full pentesting suite packed into an inconspicuous microserver, the Pwn Plug uses covert tunnels, 3G/GSM access, and NAC/802.1x bypass to maintain an encrypted, firewall-busting backdoor into your target network.
- How did you come up with the idea for the Pwnie Express?
- Do I get a free pony with my purchase? Where did the name come from?
- What are the different models of pwnplug? How does it differ from the Wifi Pineapple or the inteceptor project?
- What prevents people from finding a pwnplug on the network?
- What prevents people from detecting the phone home traffic?
- What tools are installed on the pwn plug?
- What are some use cases for the pwn plug?
Guest Tech Segment: Rich Perkins and Mike Tassey on DIY UAVs
Mike Tassey is a security consultant to Wall Street, and the US Intelligence Community. He spent the majority of his 16 year information security career in support of the Dept. of Defense (both in uniform and out) and now does security consulting for global companies and government. His interests include martial arts, lolcats, danger and putting large things in small airplanes.
Rich Perkins is an avid radio control enthusiast and a senior security engineer supporting the U.S. Government. He has had a 20 year Information Technology career including programming, Enterprise Administration, and Information Security. Hobbies include hiking, SCUBA diving, R/C, computers and electronics, as well as a penchant for voiding warranties.
- How did you come up with the idea?
- How much did it costs and how long did it take to build? Could they be mass produced?
- How high can it fly? Could you get it into low orbit?
- Where did the plane come from and what was its original purpose?
- How do you launch and fly the UAV?
- How do you control the wireless systems?
- Can you control the UAV over SSH?
- Can anyone build one?
- What are some evil purposes? Good purposes?
- Could terrorists use this idea? Does the military already use this technology?
- What can you do to defense against this type of attack?
- Can penetration testers use this?
- What's next for you guys?
Stories For Discussion
- Core WebVerify Meets the World « Core Security Technologies - I understand the need to evaluate web application vulnerabilities. However, I'd growing tired of the "show me the risks" mentality that embodies this industry. If you have web applications, and they have vulnerabilities, and you can identify them, why not just fix them? Do we really need to see them in action in order to know that we have to fix them? It boils down to having good code, if you have good code, you have integrity, scalability, and reliability. You should want those things, regardless if you can see an XSRF in action, or not.
- Scanning the Internet - One Word: Jealous! I love scanning the Internet.
- It¿s Wardriving Jim - ROFL, it reads: "A guy broke into my house, but he only took my remote. Now he drives by and changes the channels". Could have saved the trouble and got a TV-BGone or Ninja remote.
- Zero-day bugs overrated - I agree, there are so many ways into systems, that are purely behavior based, that buying an 0day isn't worth the effort. Having said that, if you really want to be effective, get a hold of a reliable 0day, but those are more rare.
- SpyEye banking trojan: now with SMS hijacking capability - I think its time people started looking at their phones as an extension of their computers and security.
- gateway-finder - Just an FYI, Nessus has a plugin for this. Its number 50686
- APT Shaping SIEM - Oh, you mean if you pay attention to what's happening on your systems, you can detect compromise? No shit...
- Key logging virus infects US military drones - A virus sneaked into drone systems, and guess what? They formatted and re-installed. Smart move.
- German researchers crack RFID cards - At first I thought they were putting RFID chips in their crack. Turns out The new hack is carried out using a side channel attack, which bypasses the defensive features intended to prevent attacks on the card. To achieve this, the researchers made repeated measurements of electricity consumption during encryption and decryption. This can be determined by measuring the magnetic field close to the card. Proof that bypassing security will always take the backdoor.
- How geeky am I - This, if nothing else, is a reason to get a new LED 70" panel. Love the geekiness!
- Unmanned Drones are not safe - Now we have unmanned predator and reaper drones infected with a what appears to be a password stealing piece of malware. So begs the question if common malware can affect the ground systems like this... when can the not so friendly and determined nation turn our drones around on us?
- Massive ID theft arrests made - Arrests of 111 individuals in a ID theft ring included bank tellers, waitstaff, and then some real criminals and buying squads. Are we really surprised? You are giving your credit card to someone to pay for dinner they go off god knows where and write all that info down and give the card back. In a given organization you are giving some very valuable information to who are probably the lowest paid / most likely to be disgruntled individuals. I would like to know what the pay was for a given wait staff for a full set of Credit Card data.
- Oh no Sony again! - Maybe not so bad this time. 93,000 user accounts were detected of being compromised and were shut down before anything bad really happend. So did they finally get their game together and be able to detect this before any true malicious activity was discovered?
- Dennis Ritchie passes away - Creator of the C programing language and key contributor to Unix passes away. See this is the passing of a REAL inventor.