From Security Weekly Wiki
Jump to navigationJump to search

Episode Media

MP3 <-- Not yet recorded!


Paul's Security Weekly - Episode 413 for Thursday April 9th, 2015

And now, from the dark corners of the Internet, where exploits run wild, packets aren’t the only things getting sniffed, and the beer flows steady its Paul’s Security Weekly!

  • This episode is sponsored by The SANS institute the most trusted source for computer security training, certification and research. visit www.sans.org to learn more
  • And by Black Hills Information Security, the leaders in penetration testing and active defense. Email consulting@blackhillsinfosec.com to request a quote today!
  • Sponsored by Black Squirrel. Pentest Networks from Your Browser! Exploit the limits of network security through just a browser. Have a Chrome exploit in your toolkit? Good, but for the rest of us there's Black Squirrel. Visit blacksquirrel.io for more information.

"Now, fire up a packet capture, pour yourself a beer, and give the intern control of your botnet..."

"Here's your host, a man who could power a small city with the alcohol in his bloodstream Paul Asadoorian"

  • Security Weekly Announcements:
    • Come to Embedded Device Security Assessments, a 2-day hosted class at the Blackhat Las Vegas on August 1-2 and 3-4 Register Here Today!
    • Security Weekly listeners also receive 10% off products in our store with discount code 'IHACKNAKED'
    • Security B-sides Orlando is a community driven event seeking to bring together anyone with a passion for making, breaking, or protecting. We welcome newbies and experts and anyone in between. Even if you don’t work in information security, you will be sure to find topics of interest. Please join us on April 11th and 12th in Orlando, Florida, for the 3rd Annual Security B-Sides Orlando Conference.
    • Larry teaching SANS 617 Wireless Ethical Hacking and Defense coming up in Austin, TX May 18-23, Baltimore, MD (SANSFIRE) June 13-20, and Berlin, Germany June 22-27
    • SOURCE Boston - early bird pricing of $349 is extended to March 31st (full retail is $495/$595 at the door). The CFP also closes tonight at Midnight, but I’m guessing we’re probably not going to see an up-tick on CFP submissions 4 hours before the deadline.
    • Question of the week: Winner receives a free Hack Naked T-shirt! Send us your favorite cocktail recipe, winner will see their cocktail featured on the show! Send the email to psw@securityweekly.com!

"The SOURCE conference is committed to bringing Business, Technology and Security professionals together at one event. Each year we host an amazing group of world-class professionals, and provide an intimate environment for meeting new people, exchanging ideas, and learning about the latest in information security. "

Guest Interview: Steve Crocker


Dr. Crocker is CEO and co-founder of Shinkuro, Inc. and Chair of the ICANN Board of Directors.

Dr. Crocker has been involved in the Internet since its inception. In the late 1960s and early 1970s, while he was a graduate student at UCLA, he was part of the team that developed the protocols for the Arpanet and laid the foundation for today's Internet. He organized the Network Working Group, which was the forerunner of the modern Internet Engineering Task Force and initiated the Request for Comment (RFC) series of notes through which protocol designs are documented and shared.

Dr. Crocker was the IETF’s first area director for security, and later served on the Internet Architecture Board. He has been involved with ICANN since 2002 when he chaired the newly formed Security and Stability Advisory Committee (SSAC). He has been on ICANN’s board since 2003 and been chair since 2011.

Dr. Crocker’s honors include the 2002 IEEE Internet Award, an honorary doctorate from the University of San Martin de Porres in Lima, Perú and membership in the Internet Hall of Fame in 2012.


  1. Recap your creation of RFC 1.
  2. Did you have any idea how far ARPA/ARPANET/etc. would go?
  3. Was anyone thinking about global connectivity?
  4. Which protocols did you work on, and were any comparable to the protocols which became internet standards?
  5. Does he remember giving Vint Cerf a boost up to a window on the 2'd floor of UCLA's Computer Lab, to access the locked facility, as a young H.S. Student in 1960? Sounds like something "Hackers" might do! ;-) What's the story?
  6. Do you identify with the term Hacker in it's original & positive sense of the word?
  7. There must have been great excitement among the researchers, when figuring out how to connect the first four nodes of ARPANET! Can you give us a sense of what you felt, & what visions you had for the future of The Network in those early days?
  8. Bring us up to date on the transition of IANA to a more international governance model. What is the timeline, & what are your concerns? How will these changes affect US ability to influence the future of the Internet for the greater benefit of all?
  9. To what does he attribute the mediocre US world ranking, in the measures of cost, speed, & Internet service? Why does the US, who financed & brought about the development of the Internet, not now lead the world in these metrics for it's citizens?

Five Questions

  1. Three words to describe yourself
  2. If you were a serial killer, what would be your weapon of choice?
  3. If you wrote a book about yourself, what would the title be?
  4. In the proper game of as grabby-grabby, do you prefer to go first or second?
  5. Pick two celebrities to be your parents.


  1. Steve Crocker's Wikipedia Page
  2. Steve Crocker's Current Employment

Segment: Prying Eyes Are Watching You (Watching You!)

I read this article and lots of things come to mind.

  1. Attackers gain access to network cameras and build web sites, for what purpose the article does not day (There is tons of free porn on the Internet, why you need to see people going about their day is weird).
  2. This is not just a consumer problem, many businesses (Even enterprises) fall victim to weak security on security cameras, which is just baffling
  3. Mainstream media coverage of "Cyber" is just plain bad. The fact they called these "Nanny Cams" is plain wrong, this applies to all network-based cameras
  4. The recommendations are horrible, I would re-write them to say:
  1. Sure, set a good password on your devices. The defaults are, well obvious (insert rant about defaults). Some systems only let you have a 4 character password, how do I know this, I own such device! There is a problem with authentication, we access all these devices in our home and the average user can't keep track of the passwords. There has to be something better.
  2. Keep your firmware up-to-date, and then we have all the problems associated with that
  3. Decide how you will maintain remote access. Most cheap, consumer-level, gear will use uPnP to automatically poke a hole in your firewall, allowing anyone access to the camera (Which is how I think they got access to so many cameras). Consider a, wait for it, cloud solution. Dropcam is nice, the app and the camera talk to the cloud, you access via the cloud. The problem here is that all recordings are stored in the cloud, and many do not accept this level of security. However, this is better than your shower cam being on a Russian web site (unless you are into that sorta thing, but then I am sure there are web sites available for just that sorta thing).
  4. Decide if you even need remote access at all. I evaluated the security of my new home security camera system, and pretty much don't ever want it exposed to the Internet.
  5. Where is the crossroads between security and security monitoring devices? (The fact that I even have to ask...)



  • Stories of the week is brought to you by Onapsis the leading provider of solutions to protect ERP systems from cyber-attacks. Customers can secure their SAP and Oracle business-critical platforms from espionage, sabotage and financial fraud risks. Visit them on the web at http://www.onapsis.com/
  • And by Pwnie Express - Check out the community edition and turn your Nexus 7 into a lean and mean pen testing machine. For all those hard to reach places, there's Pwnie Express, visit them on the web at http://pwnieexpress.com

Paul's Stories

Joff's Stories

Jack's Lack of Stories

Larry's Stories

SANS Pentest Austin - May 18 - Sat, May 23, 2015 What's special about SANS Pen Test Austin?

  • SANS Top Courses focused on Pen Testing: Learn hands-on skills that you can directly apply the day you get back to your job.
  • NetWars, NetWars, NetWars: Enjoy three exciting nights of NetWars challenges, where you can have some fun while building serious infosec skills.
  • Coin-a-palooza: Earn up to four additional SANS pen test challenge coins (each with an integrated cipher challenge) based on your performance in SANS NetWars!
  • CyberCity Missions: Work through an evening of cyber missions that have a direct kinetic impact on the miniature CyberCity environment that SANS built with a real power grid, water reservoir, military base, and more!