Difference between revisions of "Episode268"

From Security Weekly Wiki
Jump to navigationJump to search
(Created page with '{{Advertisements}} = Announcements & Shameless Plugs = PaulDotCom Security Weekly - Episode 268 for Thursday December 1st, 2011. * Check out our new shows: [http://hacknaked....')
 
Line 6: Line 6:
 
PaulDotCom Security Weekly - Episode 268 for Thursday December 1st, 2011.
 
PaulDotCom Security Weekly - Episode 268 for Thursday December 1st, 2011.
  
* Check out our new shows: [http://hacknaked.tv Hack Naked TV] with John Strand, [http://www.hacknakedatnight.tv Hack Naked At Night] with Larry and Darren, [http://pauldotcom.com/wiki/index.php/PaulDotCom_Espanol PaulDotCom Espanol] with Carlos Perez, and our only non-computer security related show dedicated to Cigar Enthusiasts [http://www.stogiegeeks.com Stogie Geeks] with Paul Asadoorian and Tim Mugherini.
+
* Check out our new shows: [http://hacknaked.tv Hack Naked TV] with John Strand, [http://www.hacknakedatnight.tv Hack Naked At Night] with Larry and Darren, [http://pauldotcom.com/wiki/index.php/PaulDotCom_Espanol PaulDotCom Espanol] with Carlos Perez, and our only non-computer security related show dedicated to Cigar Enthusiasts [http://www.stogiegeeks.com Stogie Geeks] with Paul Asadoorian and Tim "BugBear" Mugherini.
  
* Larry is teaching [http://www.sans.org/san-antonio-2011/description.php?tid=4432 SEC580 Metasploit Kung Fu for Enterprise Pen Testing] in San Antonio, TX December 4-5. Tell them that NYC is where Salsa is being made now. Want 10% off of every class in San Antonio?  Use the discount code Larry-SA10.
+
* Larry is teaching [http://www.sans.org/san-antonio-2011/description.php?tid=4432 SEC580 Metasploit Kung Fu for Enterprise Pen Testing] in San Antonio, TX December 4-5. Want 10% off of every class in San Antonio?  Use the discount code Larry-SA10.
  
 
* Don't forget to [http://pauldotcom.com/ Read our blog], [http://mail.pauldotcom.com/listinfo Participate on our mailing list], [http://pauldotcom.com/insider/ Visit PaulDotCom Insider], [http://twitter.com/pauldotcom Follow us on Twitter], [irc://irc.freenode.net/pauldotcom Join the IRC channel at irc.freenode.net #pauldotcom], [http://pauldotcom.blip.tv Watch our Videos] and [http://www.facebook.com/therealpauldotcom Add us on Facebook] where we can be "friends"
 
* Don't forget to [http://pauldotcom.com/ Read our blog], [http://mail.pauldotcom.com/listinfo Participate on our mailing list], [http://pauldotcom.com/insider/ Visit PaulDotCom Insider], [http://twitter.com/pauldotcom Follow us on Twitter], [irc://irc.freenode.net/pauldotcom Join the IRC channel at irc.freenode.net #pauldotcom], [http://pauldotcom.blip.tv Watch our Videos] and [http://www.facebook.com/therealpauldotcom Add us on Facebook] where we can be "friends"

Revision as of 02:53, 28 November 2011


Announcements & Shameless Plugs

PaulDotCom Security Weekly - Episode 268 for Thursday December 1st, 2011.

Guest Interview: Simple Nomad

6:00 PM EDT

Simple Nomad (aka Mark Loveless) is an old school hacker with a varied background that includes a focus in network-based intrusions and defenses. He does not have a security product, book, or service to sell, but at Mitre Corporation, he focuses almost exclusively on what has become known as "the APT", or Advanced Persistent Threat. His background and keen interest in network intrusions and defense, along with such topics as cryptography, reverse engineering, and covert channels have made his day job seem more like a fun hobby than work. When not behind a computer keyboard, he is behind a stack of musical keyboards, playing for the avant-garde metal band Dei Aemeth, and with his own industrial metal band, Cryptonomicon.


SimpleNomad.jpg

Music links:

Cryptonomicon Facebook page

Guest Tech Segment: Chris Pogue

7PM EST

Chris is a Senior Security Consultant for the Trustwave SpiderLabs, a Former US Army Signal Corps Warrant Officer and Member of the United States Secret Service Miami Electronic Crimes Task Force, and is Author of “Unix and Linux Forensic Analysis” by Syngress. Chris is on to give us an overview of his forensic methodology known as Sniper Forensics, whose users include both the FBI and the United States Secret Service.


Pogue Head.jpg

Author of the blog, “The Digital Standard"

  1. Why do you consider digital forensics tougher than other forensics fields?
  2. What's "Shotgun Forensics" and "Sniper Forensics"?
  3. What are the Guiding Principles for Sniper Forensics?
  4. Bring us thru Timeline Analysis - what it is and why its important.
  5. How have attackers changed with respect to memory dumping and other operations?
  6. Tell us what 3 things all malware must do.
  7. What are some good tips for malware that's packed or obfuscated?
  8. Nick indicated there were some interesting cases you were working on. Please share!