From Security Weekly Wiki
Jump to navigationJump to search

Episode Media

Episode 326


Announcements & Shameless Plugs

PaulDotCom Security Weekly - Episode 326 for Thursday April 4th, 2013

  • Register for "Offensive Countermeasures: The Art Of Active Defense": SANSFIRE Washington, DC June 15-16th with John Strand
  • Register for our free webcast Hacking Embedded Systems (No Axe Required) on Tuesday, April 23, 2013 at 2:00 PM EDT to hear Paul talk about hacking embedded systems on the fly, on the cheap no soldering iron required! (we are also looking for sponsors for this webcast so please contact paul -at- hacknaked.tv for details!)
  • Come to Security BSides Rhode Island Two-Day Conference on June 14th and 15th tickets are NOW ON SALE at WePay.com. Featured presentations from Josh Wright , Kevin Finisterre, Kati Rodzon and Mike Murray, Bruce Potter, Joe McCray,Ron Gula, Ben Jackson, Dave Maynor and the entire PaulDotCom crew!
  • The Stogie Geeks Show! - Kick some ash with the Stogie Geeks, Sunday nights at 8:30PM EST. Come have a cigar with us! If you are in the Rhode Island area please visit our sponsor the Havana Cigar Club, its an awesome place to have a drink! Make sure you print out your $5.00 off coupon here!

Interview: Bill Cheswick

Bill Cheswick logged into his first computer in 1968. Seven years later, he was graduated from Lehigh University in 1975 with a degree resembling Computer Science. Ches has worked on (and against) operating system security for over 35 years. He is probably best known for "Firewalls and Internet Security; Repelling the Wily Hacker", co-authored with Steve Bellovin, which help train the first generation of Internet security experts.

  1. How did you get your start in information security?
  2. What are the most significant changes in information security over the years?
  3. What prompted you to write "Firewalls and Internet Security: Repelling the Wiley Hacker"?
  4. Are hackers still "Wiley"?
  5. What things have remained the same that allows the number of breaches to persist?
  6. How can honeypots help defend your networks? is this an academic experiment or a valid defensive measure that can be adopted by most organizations?
  7. Was the nuclear attack submarine accessible from the Internet?
  8. We've talked on this show about info sec burnout, how info sec professionals more often than others will suffer from burnout, why does this problem seem to be worse in our field and what can we do about it?
  9. Some say we should never "hack back" others, such as ourselves, are trying to come up with innovative ways to trap and take the fight back to the attackers, what are your thoughts?
  10. What is your favorite thing to hack with at home?

Five Questions:

  1. If you were a serial killer, what would be your weapon of choice?
  2. Three words to describe yourself?
  3. If you had to write a book about yourself, what would it be?
  4. Stranded on a deserted island, which tablet would you take with you if you could only choose one: iPad, Android or Surface?
  5. In the popular game of ass grabby-grabby would you prefer to go first or second?

Full Bio

He has worked at Lehigh University and the Naval Air Development Center in system software and communications. At the American Newspaper Publishers Association/Research Institute he shared his first patent for a hardware-based spelling checker, a device clearly after its time.

For several years he consulted at a variety of universities doing system management, software development, communications design and installation, PC evaluations, etc.

Ches joined Bell Labs in December 1987, where he became postmaster and firewall administrator and designer. He did early work on packet backscatter, firewall and honeypot design. Early papers gave new meanings the words "proxy" and "jail". He is probably best known for "Firewalls and Internet Security; Repelling the Wily Hacker", co-authored with Steve Bellovin, which help train the first generation of Internet security experts. In 1998, Ches started the Internet Mapping Project with Hal Burch. This work became to core technology of a Bell Labs spin-off, Lumeta Corporation. Ches has pinged a US nuclear attack submarine (distance, 66ms).

He joined AT&T Shannon Lab in April 2007 and worked on security, visualization, and user interfaces. He was particularly innovative at Shannon, producing a number of product and patent ideas, including "slow movies", a new way to see movies, and some new authentication ideas.

Ches is popular public speaker and has given keynote presentations in a couple dozen countries.

Ches has a wide interest in science and medicine. In his spare time he reads technical journals, hacks his home, and develops exhibit software for science museums. He eats very plain food---boring by even American standards.

Guest Technical Segment: Mark Baggett on Python For Pentesters

Mark Baggett is the owner of Indepth Defense, an independent consulting firm that offers incident response and penetration testing services. Mark is the author of SANS Python for Penetration testers course (SEC573) and the pyWars gaming environment. As part of the Pauldotcom Team, Mark generates blog content for the "pauldotcom.com" podcast . In January 2011, Mark assumed a new role as the Technical Advisor to the DoD for SANS.


  • We are in the process of archiving and cataloging our technical segments, please visit the PaulDotCom Technical Library and we indexed all of the interviews we have conducted. We are also working on updating all of the articles, so check the newsletter or if you want to help in exchange for some free guidance and security training please email me.
  • Larry teaching SANS SEC617 all over and coming to a city near you in 2013. It isn't too Late to sign up for my class in San Diego this May!


Paul's Stories

  1. Upgrading a router with impeccable soldering skills - This is a really cool hack. This dude got a router for free, which was almost identical to a Linksys ro

uter support by openwrt. The difference was the flash and RAM chips were underpowered and smaller size. So he de-soldered some chips from another board and re-soldered them, combined some firmware parts, and made a new router! This is super nea t, requires some skill, but opens up some possibilities. Thinking of combining some hardware, one router may have a nice p rocessor, but be underpowered in the flash and RAM department. create your own embedded monster!

  1. How to Dress Like a Cyber Warrior OR Looking Like a Tier-Zero Hero - A tongue-in-cheek look at how to dress as a "Cyberwarrior". I love tactical gear and weapons,

so this post was right up my alley. The pants and shirt are way more expensive than the 5.11 and Blackhawk stuff, but look

really awesome. Great suggestions if you are into tactical gear.#How Attackers Choose Which Vulnerabilities To Exploit - Some interesting statistics: According to Verizon's 2012 Data Breach Investigations Report, 81% of data breaches utilized some form of hacking, and 94% of the attacks were not classified as difficult. Even those attacks that were more complex often used simple techniques to gain an initial foothold. Its interesting because some will go on believing that data breaches are a result of mostly people losing devices or having laptops stolen. At least for Verizon customers, turns out to be good ole' fashioned hacking. And, shocker, attackers are using simple techniques. And why not, if you don't have to try hard, then don't. Use stuff like default passwords, XSS, SQLi and the like. Works for us on pen tests. I've yet to see any hard data, but many

companies will lock things down according to importance. However, this leaves a small percent, lets say 1% of your systems

that are vulnerable to "Stupid Crap" TM. That stupid crap causes your whole security strategy to unravel. Maybe we need a
different take, such as fix all the stupid crap, something I've preached for some time...
  1. 'Arrested Development' to debut on Netflix on May 26 - As a side note, Archer and Arrested Development are two of t

he greatest shows of all time. Daaaaanger Zonnnnnne! Looking forward to seeing the latest seasons of each.

  1. Advanced Persistent Threats get more advanced - Ah yes, kno

wing your attacker is important! For instance, China recently listed healthcare as one of the priorities in its 15-year science and technology development strategy for 2006 to 2020. This led to a surge in cyber-espionage campaigns against healthcare firms, FireEye's Rob Rachwald explains in a blog post on the report. So if you are in healthcare, add this stati stic to your sales pitch to management. While this report may seem like its in FirEye's best interest, its the truth, and the truth hurts because attackers are hurting most organizations.

  1. Report: Nearly 94% Of Endpoints Running Java Are Vulnerable To Exploit | Security Bistro - Looks like no one updates Java. So we talk about Java exploits, but no one is listening. How do you keep Ja

va updated in your environment?

  1. Cisco IOS Patching: Defense and Offense | Didier Stevens - Cool article on IOS security.


Larry's Stories

Jack's Stories

Allison's Stuff