From Security Weekly Wiki
Jump to navigationJump to search

Episode Media

MP3 < Not yet published!


Paul's Security Weekly - Episode 395 for Thursday November 13th, 2014

And now, from the dark corners of the Internet, where exploits run wild, packets aren’t the only things getting sniffed, and the beer flows steady its Paul’s Security Weekly!

  • This interview is sponsored by Palo Alto Networks creators of THE next-generation firewalls, helping you enforce network security policies based on applications, users, and content. Visit them on the web at www.paloaltonetworks.com
  • And by The SANS institute the most trusted source for computer security training, certification and research. visit www.sans.org to learn more
  • And by Tenable Network Security, the creators of Nessus, the worlds best vulnerability scanner. Check out the new Nessus Enterprise and Nessus Enterprise cloud, engage your IT department in the vulnerability management process today!
  • And by Black Squirrel. Pentest Networks from Your Browser! Exploit the limits of network security through just a browser. Have a Chrome exploit in your toolkit? Good, but for the rest of us there's Black Squirrel. Visit blacksquirrel.io for more information.

"Now, fire up a packet capture, pour yourself a beer, and give the intern control of your botnet..."

"Here's your host, a man who's chest hair really isn't on his chest, in a hair length rivaling jack's, Paul Asadoorian"

  • Security Weekly Announcements:
    • Check out the SteelCon competition. Enter to win a SecurityTube Training course. You must write documentation for an open source project. Details can be found on the website. http://www.steelcon.info/competition/documentation-competition/
    • Larry teaching SANS 617 Wireless Ethical Hacking and Defense coming up in Orlando April 11-18 and Berlin, Germany June 22-27

Tech Segment: Elliott Brink on Honeypots


Elliott Brink is an information security consultant based out of Chicago IL. He is an avid security enthusiast with particular interests in honeypots and social engineering tactics. Elliott performs internal and external penetration assessments and social engineering engagements. He likes old tech, (computer history museum!) a well crafted Bloody Mary and seeing new places. Elliott can be found on twitter: @ebrinkster.


Elliott recently gave a talk on HoneyPots at GrrCon 2014 and has agreed to join us this week to talk about his latest discoveries and his new iPhone.

Five Questions

  1. Three words to describe yourself
  2. If you were a serial killer, what would be your weapon of choice?
  3. If you wrote a book about yourself, what would the title be?
  4. In the popular game of ass grabby grabby do you prefer to go first or second?
  5. Pick two celebrities to be your parents.



  • Stories of the week is brought to you by Onapsis the leading provider of solutions to protect ERP systems from cyber-attacks. Customers can secure their SAP and Oracle business-critical platforms from espionage, sabotage and financial fraud risks. Visit them on the web at http://www.onapsis.com/
  • And by Pwnie Express - Check out the community edition and turn your Nexus 7 into a lean and mean pen testing machine. For all those hard to reach places, there's Pwnie Express, visit them on the web at http://pwnieexpress.com
  • And by Black Hills Information Security, the leaders in penetration testing and active defense. Email consulting@blackhillsinfosec.com to request a quote today!

Paul's Stories

  1. Hacking the vote with PDF's
  2. Abusing Samsung KNOX

Larry's Stories

Jack's Stories

  1. Sandworm OLE Zero Day
  2. Dark Net Hackers Steal Seized site back from FBI
  3. The Chinese are (allegedly) hacking the US government! including the US Postal Service and NOAA/National Weather Service. Motives? Attribution accuracy? FWIW, screwing with forecasts can kill people.
  4. [http://www.nextgov.com/cybersecurity/2014/11/federal-judge-says-public-has-right-know-about-fbis-facial-recognition-database/98453/
  5. [http://sourceforge.net/projects/dps8m/
  6. [http://www.veracode.com/blog/2014/11/secure-agile-development-think-developer
  7. [http://newschoolsecurity.com/2014/11/modeling-attackers-and-their-motives/
  8. [http://www.getwestlondon.co.uk/news/local-news/remembering-code-breaking-women-who-fought-8091209

Joff's musings from down under