Difference between revisions of "Episode425"
|Line 143:||Line 143:|
== Jack's Stories ==
== Jack's Stories ==
#[://..com/----?on of .
#[https://..//a on , and .
== Michael's Stories ==
== Michael's Stories ==
Revision as of 22:04, 2 July 2015
- 1 Paul's Security Weekly - Episode 425 - 6:00PM
- 2 Discussion: Top Ten Reasons to Get Into Information Security- 7:00PM-7:20PM
- 3 Stories of the Week - 7:30PM-8:00PM
Paul's Security Weekly - Episode 425 - 6:00PM
MP3 <-- Not yet recorded!
Intro, Sponsors & Announcements
[Cut to Paul Live Shot]
This week Vulnerability Scanning with Shay Chen. All that and more so stay tuned!
[Cut to Jack Live shot]
Broadcasting live from G Unit Studios in Rhode Island, the show where exploits run wild, packets aren’t the only things getting sniffed, and the cocktails flow steady its Paul’s Security Weekly!
[Cut to sponsor logo]
- And by Netsparker, the developers of the ONLY false positive free web application security scanners, enabling you to automatically identify vulnerabilities and security flaws in all your websites, web applications and web services. Netsparker scanners are available in two editions, Netsparker Desktop and Netsparker Cloud, the enterprise level online scanning service. For more information visit their website on https//www.netsparker.com/securityweekly/
- Brought to you by Pwnie Express - Check out the community edition and turn your Nexus 7 into a lean and mean pen testing machine. For all those hard to reach places, there's Pwnie Express, visit them on the web at http://pwnieexpress.com
- And by Onapsis the leading provider of solutions to protect ERP systems from cyber-attacks. Customers can secure their SAP and Oracle business-critical platforms from espionage, sabotage and financial fraud risks. Visit them on the web at http://www.onapsis.com/
[Cut to security weekly logo]
Now, fire up a packet capture, pour yourself a beer, and give the intern control of your botnet...
[Cut to live shot of Paul]
Larry: Here's your host, who's been voted one of the finest minds in West Warwick, RI, which is a lot like being named to the ten best-dressed list in Russia, its Paul Asadoorian!"
Paul: Hello everyone and welcome to Paul's Security Weekly - Episode 424 for Thursday June 25th, 2015
- Introduce hosts and guests
[Cut to Announcement graphics]
- Ready to learn Combat Firmware Analysis? Register for Paul's Blackhat course "Embedded Device Security Assessments", a 2-day hosted class at Blackhat Las Vegas. Registration includes breakfast, lunch, and access to the Blackhat Briefings Business Hall, Sponsor Workshops, Sponsor Sessions, and Arsenal! Visit http://securityweekly.com/iot to register today!
[Cut to shot on Paul]
Guest Interview: Shay Chen - 6:05PM-6:55PM
Shay Chen is an information security Analyst, Researcher, Consultant and Speaker. He is also a prominent blogger, and in addition to the occasional attack vector publication, currently focuses on publishing frameworks, evaluations and comparisons of information security products.
- How did you get your start in information security?
- What drew you to trolling Ubuntu users?
- What is your level of attraction to wireless security?
- What's your experience as a director of research like? What's a typical day like?
- What are some common misconceptions about wireless that you encounter on a regular basis?
- How important is wireless -- wifi + cellular/LTE/etc -- in the enterprise today?
- In your experience, are organizations paying enough attention to wireless?
- What's one thing most people could do that would dramatically improve their ability to use wireless with more security?
- Let's talk rogue wireless, including stingray: how big a challenge is this for companies? what sort of companies? What should they focus on first?
- Three words to describe yourself.
- If you were a serial killer, what would be your weapon of choice?
- If you wrote a book about yourself, what would the title be?
- In the popular game of ass grabby-grabby, do you prefer to go first or second?
- Choose two celebrities to be your parents.
Discussion: Top Ten Reasons to Get Into Information Security- 7:00PM-7:20PM
Sponsored by Tenable Network Security, with currently 60+ openings in engineering! Some details:
- Vulnerability researchers, requires strong sys admin and scripting skills
- Compliance researchers, aka audit file and plugin writers, knowledge of federal and industry-specific standards
- Reverse Engineering has one opening, working with LOTS of different technologies
- C and C++ SW engineers – especially if you have experience with packet capture, socket programming and protocol development
- And you can’t build all this great stuff without QA engineers – we like our QA teams to know a little about security. Great for a sys or network admin who wants to move over to the software side. Most require some automation experience.
- Positions for SW Engineers and Web Application Devs who dig security:
- Web Backend developers who know about ElasticSearch, data modeling and analytics, as well as Cloud/Amazon Web Services – extra points if you know the Go programming language.
- Software Engineers who can build enterprise applications using PHP.
- EVERYTHING REQUIRES STRONG LINUX EXPERIENCE!!!
- For the fame and glory
- You can apply (or learn) a diverse technical skillset
- There are plenty of jobs
- Emerging industries always need help with security
- You will never be bored
- You get to break things
- You can love hardware, software, or both
- You will get to, most likely have to, create things
- You can help define standards as we are still a relatively young industry
- There is lots of opportunity to create your own startup in security
Bonus: The pay is good....great? better than average? statistic anyone?
Stories of the Week - 7:30PM-8:00PM
[Play music, Cut to sponsor logo, THEN START RECORDING]
- Brought to you by Black Hills Information Security, the leaders in penetration testing and active defense. Email firstname.lastname@example.org to request a quote today!
- This segment is sponsored by The SANS institute the most trusted source for computer security training, certification and research. visit www.sans.org to learn more
- And by Tenable Network Security, creators of Nessus, the world's best vulnerability scanner! Jumpstart your security program today and evaluate SecurityCenter CV, THE continuous monitoring solution. www.tenable.com
- Looking for a career change? Tenable Network Security is hiring! Everything from programmers to researchers, check out all of the available positions at http://securityweekly.com/tenablejobs. If you are listening to this show, check out the following two positions, both technical and both are work from home: Nessus Vulnerability Research Engineer and C Software Engineer
[Cut to announcement Graphics] Larry teaching SANS 617 Wireless Ethical Hacking and Defense coming up in Las Vegas, NV, September 14-19, and lots more places so be certain to check the SANS web site for more course offerings!
- "Amazon just wrote a TLS crypto library in only 6
- Attackers Revive Deprecated RIPv1 Routing Protocol in DDoS Attacks
- Adobe patches zero-day Flash Player flaw used in targeted attacks
- Default SSH Key Found In Many Cisco Appliances
- "Hundreds of Dark Web sites cloned and ""booby trapped"""
- "Apple lets rip with update spate: OS X
- "TV's newest hacker drama ""Mr. Robot"" is technically sound
- Windows 10 Wi-Fi Sense feature shares your Wi-Fi network with your friends
- CyberUL is a dumb idea
- A dissertation on An Evaluation of the Effectiveness of EMET 5.1 sadly notable for this quote: "Some pages are missing or have images blacked out due to the Wassenaar Arrangement..."
- Following up from a prior conversation on Macs, malware, and market share an older post from Haroon Meer at Sensepost.
- Famed Security Researcher Mudge Leaves Google --> a CyberUL | worth paying attention to?
- CyberUL is a dumb idea --> Robert Graham weighs in
- David Cameron is going to try and ban encryption in Britain --> Wait. What?