Difference between revisions of "Episode265"

From Security Weekly Wiki
Jump to navigationJump to search
Line 76: Line 76:
  
  
Rob Graham Interview  =
+
Robert Graham Interview  =
  
 
3:00 PM
 
3:00 PM
  
 +
# How did you get your start in information security?
 +
# Tell us about what you learned about Occupy Wall Street
 +
# What is your policy on disclosure and what are the merits to Digital Bond's policy?
 +
# What can Apple do to improve the security of its products?
  
 
=  Tech Segment: Ruby honeyports and the new anti-kit for android  =
 
=  Tech Segment: Ruby honeyports and the new anti-kit for android  =

Revision as of 19:26, 27 October 2011

Announcements & Shameless Plugs

PaulDotCom Security Weekly - Episode 265 Hackers for Charity Twelve hour podcast for Friday October 28th, 2011.

Breast Cancer Research Foundation
Breast Cancer Fund

Click the images to donate now!


Watch the show live below or at http://securityweekly.com/live August 31, 2012 10AM-6PM EDT

Error in widget UStreamLive: Unable to load template 'wiki:UStreamLive'

NOTE: The video will play the most recent show up until we are live!


The HFC group:

  • Feeds children through a "food for work" program.
  • Builds computer labs to help students learn skills and land jobs that are key to disrupting poverty's vicious cycle.
  • Provides technical assistance to charities that can't afford IT services.
  • Provides job experience and references to the Ugandan volunteers.

You can donate or get more involved via the Hackers for Charity website.


Kick off with Johnny Long

10 AM EDT

Johnny calls in to update us on his Hackers for Charity project.

Donate!!!

Marcus Ranum Interview

11:00 AM

  1. Marcus, what's the latest on cyberwar? Has stuxnet changed some of your views on Cyberwar?
  2. Speaking of SCADA, what can we do to improve the security of SCADA systems? It seems every month there is a new "SCADA hack" and vendors and organizations that aren't paying attention to security.
  3. Penetration tests are successful, and one of the primary ways in which we are gaining access to systems is through "client-side attacks". Essentially, we are tricking the user into running code, no vulnerabilities or "exploits" required. What can organizations do to protect against this threat?
  4. Speaking of vulnerabilities, there still seems to be a mindset in the community of "become vulnerable, exploit, apply patch, rinse, repeat". What can we do to shift people away from the "patch mindset" to defensive measures that actually work?
  5. Speaking of defensive measures, what are your thoughts on "smart firewalls"? Are they still the stop-gap measure that is masking the real problems?

The Stogie Geeks Podcast

Hosts: Paul Asadoorian & Tim "Bugbear" Mugherini

Noon - 1PM

Paul & Tim will smoke some cigars and tell you all about them, talk about what they's been smoking, and feature a "Stogie How-To" segment titled "The Top Ten Things You Should Not To Do With Your Humidor".

Stogie Geeks Web Site, Show Notes, Cigar Reviews, Cigar Porn.

Ron Gula Interview

1:15 PM

10 Things You Shouldn’t Do For Cyber-Security Awareness Month - According to the Department of Homeland Security, October 2011 is national CyberSecurity Awareness month. With the best intentions, I’ve laid out ten items that you shouldn’t do in an attempt to raise awareness. I’ve seen these items backfire, cause disruption and raise awareness of how security can make our life less convenient and questionably more secure.

Ron's Top Ten List:

10 – Perform a Client Side Penetration Test

9 – Switch to IPv6

8 – Learn Government Compliance Standards

7 – Read Computer Security Related Books of Fiction and Fact

6 – Engage in a religious debate about the most secure OS, phone or Web Browser

5 – Run a Honeypot

4 – Blame any attacks or viruses outbreaks on China

3 - Publish lists of People’s Cracked Passwords

2 – Patch all of those systems that haven’t been patched in a long while

1 - Turn off your Anti-Virus Product

Tech Segment: Concealing Storage in Windows Volume Shadow Copy Service

2:00 PM

Authors: Mark Baggett and Tim "LaNMaSteR53" Tomes


Robert Graham Interview

3:00 PM

  1. How did you get your start in information security?
  2. Tell us about what you learned about Occupy Wall Street
  3. What is your policy on disclosure and what are the merits to Digital Bond's policy?
  4. What can Apple do to improve the security of its products?

Tech Segment: Ruby honeyports and the new anti-kit for android

4:00 PM

Author: John Strand

Tech Segment: Busting Directories: Dirbuster and Alternatives

4:30PM

Author: Larry Pesce

Tech Segment: Practical Password Brute Forcing

5:00 PM

Author: Paul Asadoorian

Learn how to use CeWL and Hydra to password brute force web-based logins.

Tech Segment: New ways to Persist with Metasploit

5:30PM

Author: Carlos "DarkOperator" Perez

HackNaked TV/ PaulDotCom Espanol /Dinner Break

6PM

Tech Segment: Google Hacking Diggity Project

7:00 PM

Author: with Jack "Tenacious" D.aniel

Ancient alien beings, hypervisors and virtualization

7:30 PM

Your host for this journey will be none other than Eric Fitterman!

"Researchers in Central America recently discovered an ancient underground lake containing many new discoveries about the Mayan civilization. Among these discoveries were many mysterious glyphs depicting what appear to be other-worldy beings handing compact disks to Mayan priests. Excavation unearthed some ancient, but usable, compact disks, containing what appeared to be bootable Linux environments designed to reset passwords in VMware's ESX hypervisor. Eric Fiterman, of Rogue Networks, has extensively studied the artifacts from the project, and has learned that ancient alien beings may have given humans knowledge of hypervisors and virtualization long ago.

AncientAlien.jpg

Eric believes that virtualization and computing were ancient technologies used by the Mayans, and that among this lost knowledge were the secrets of how to recover VMware hypervisor systems without a password. Eric will be discussing this recently discovered artifact, and is releasing a bootable ISO that allows users to restore ESX systems without re-installing the hypervisor."

Kevin Mitnick Interview

8:15 PM

Mitnick.jpg

Pen Testing War Stories with Kevin Fiscus

9:00 PM

Drunken Security News

(This segment can go anywhere during the 12 hours, it should last an hour)

Paul's Stories

Larry's Stories

Darren's Stories

Jack's Stories

10PM show over.