From Security Weekly Wiki
Revision as of 14:22, 6 February 2015 by Aaron (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigationJump to search

Episode Media



Paul's Security Weekly - Episode 402 for Thursday January 15th, 2015

And now, from the dark corners of the Internet, where exploits run wild, packets aren’t the only things getting sniffed, and the bourbon flow steady its Paul’s Security Weekly!

  • This interview is sponsored by Palo Alto Networks creators of THE next-generation firewalls, helping you enforce network security policies based on applications, users, and content. Visit them on the web at www.paloaltonetworks.com
  • And by The SANS institute the most trusted source for computer security training, certification and research. visit www.sans.org to learn more
  • And by Tenable Network Security, the creators of Nessus, the worlds best vulnerability scanner. Check out the new Nessus Enterprise and Nessus Enterprise cloud, engage your IT department in the vulnerability management process today!
  • And by Black Squirrel. Pentest Networks from Your Browser! Exploit the limits of network security through just a browser. Have a Chrome exploit in your toolkit? Good, but for the rest of us there's Black Squirrel. Visit blacksquirrel.io for more information.

"Now, fire up a packet capture, pour yourself a beer, and give the intern control of your botnet..."

"I'm your host, a man who's chest hair really isn't on his chest, in a hair length rivaling Jack Daniel, Paul Asadoorian"

  • Security Weekly Announcements:
    • Security Weekly listeners receive 10% off products in our store with discount code 'IHACKNAKED'
    • Please join our new discussions mailing list, we've retired the old mailman server and moved over to Google Groups. You can join the new list here.

Guest Interview: Kimberly Crawley

EmbedVideo received the bad id "_ig2F9-goEU"" for the service "youtube".


Kimberly Crawley was involved with computing at a very early age. At age eight, Crawley I managed to edit autoexec.bat on her father's Windows 3.0 machine, after complaining the OS taking too long to boot. She has been on the web since 1993, at age nine. From there, she taught herself web development. Crawley is an information security researcher with InfoSec Institute. She has a special interest in both malware and cyberwarfare.

In her spare time, she loves video games, anime, jazz, and Japanese food. Crawley lives Toronto with her husband Sean Rooney, who used to have his own cyber security firm.

  1. Has malware gotten more popular or have our means to detect it become more ubiquitous?
  2. What is the most effective way for organizations to deal with the malware problem?
  3. Is it a futile effort to run anti-virus because it misses so much?
  4. Cyber war seems to be more like cyber battles and not a full on war? Am I mincing words?
  5. Countries attack each other all the time, why is attribution so hard?
  6. Have there been attacks associated with "cyberwar" that have done real damage? That we can prove?


  1. What are some of your upcoming articles, where are you currently published?

Five Questions

  1. Three words to describe yourself
  2. If you were a serial killer, what would be your weapon of choice?
  3. If you wrote a book about yourself, what would the title be?
  4. In the popular game of ass grabby grabby do you prefer to go first or second?
  5. Pick two celebrities to be your parents.

Tech Segment: Using Regional Internet Registry data to build Country attribution access control

EmbedVideo received the bad id "0c338fZcA5Q"" for the service "youtube".

Our own Joff Thyer has put together an interesting tech segment for us tonight.


EmbedVideo received the bad id "fKRahZe8XQA"" for the service "youtube".


  • Stories of the week is brought to you by Onapsis the leading provider of solutions to protect ERP systems from cyber-attacks. Customers can secure their SAP and Oracle business-critical platforms from espionage, sabotage and financial fraud risks. Visit them on the web at http://www.onapsis.com/
  • And by Pwnie Express - Check out the community edition and turn your Nexus 7 into a lean and mean pen testing machine. For all those hard to reach places, there's Pwnie Express, visit them on the web at http://pwnieexpress.com
  • And by Black Hills Information Security, the leaders in penetration testing and active defense. Email consulting@blackhillsinfosec.com to request a quote today!

Paul's Stories

  1. RadioShack to sell out?
  2. "Meet Reuben Paul: 8 year old CEO - Nice coverage from HITB.
  3. "Had a data breach? Well - Breached? If this new law passes, you will have 30 days to notify your customers. Is this a good thing? Bad thing? Some states have passed similar legislation, has it worked? Does this really protect the consumer? Is it at the expense of the merchant or organization? Clearly hiding the fact you've been breached is not cool, but do we have a right to know?
  4. Lizard Squad’s DDoS-For-Hire Service Built on Hacked Home Routers - If you think home routers can't be used for attacks because they are resource deficient: Hackers have boasted on Twitter the site is built on somewhere between 250,000 to 500,000 infected routers and that at one point last week it had purportedly served 900 million requests. And if you thought routers aren't being hacked because they are not exposed to the Internet on the WAN port, think again.
  5. Router creds admin/admin? Lizard Squad thanks you
  6. Remember Corel? It's just entered .DLL hell - The ability to load a random DLL is no big deal according to Doodleware, the company who makes Corel. I didn't know this was still a thing, but apparently they have 100 million customers. And if you are one of them, you have an 0day. Doh.
  7. "Insert 'Skeleton Key' - This malware gets in-memory on your domain controller and allows attackers to authenticate as any user with a given password. Love it!
  8. Why on Earth Is IBM Still Making Mainframes? - IBM is integrating their mainframe with new buzzords like apps, cloud and embedded devices. What could go wrong?
  9. Instagram Flashed Your Privates To Picture Pervs - Seems this happens to almost every image hosting site: Perverts would still need the precise and obscured URL of targeted sensitive photos but a non-targeted and scatter-gun approach could work by running bash scripts to enumerate URLs and siphon photos off the site.
  10. AMD Plugs Firmware Holes That Allowed Command Injection
  11. 4 Mega-Vulnerabilities Hiding in Plain Sight
  12. "Warning: Using encrypted email in Spain? Do not pass go
  13. It's 2015 and home routers still leave their config web servers wide open
  14. Security? Don't bother until it's needed says RFC
  15. Internet of Things promises analytics boom
  16. Four Disruptive Hacks to Come in 2015
  17. Marriott Agrees to Stop Blocking Guest WiFi Devices
  18. The International Conference on PASSWORDS 2014. - NTNU openVideo
  19. ASUSWRT - LAN Backdoor Command Execution
  20. pwntools – CTF Framework & Exploit Development Library
  21. "Ouch! Home router security ""bypass"" actually means no security AT ALL"
  22. DevOoops: Spoofing GitHub Users
  23. Obama's War on Hackers

Jack's Stories

Joff's stories of his teenage mates of past days

  1. Google spills the beans
  2. Microsoft not so happy with Googles decision....
  3. Keysweeper This gadget is just pretty cool.