From Security Weekly Wiki
Jump to navigationJump to search

Paul's Security Weekly - Episode 471 - 6:00PM


Episode Audio

[] Coming Soon

Interview: Mark Baggett

Mark has more than 28 years of commercial and government experience ranging from Software Developer to CISO. He is a Senior Instructor for The SANS Institute and the author of SEC573. He is the founding president of The Greater Augusta ISSA chapter. Course Author and Instructor for SEC573 Python for Penetration Tester. Instructor for SEC504 Incident Handling and Hacker Techniques, SEC560 Penetration Testing, 561 Advanced Hands On Penetration Testing.

CISO, IT Team Lead, Software Developer Senior SANS Instructor Course Author SEC573 Internet Storm Center Handler Penetration Tester/Incident Handler GSE #15 DoD Cleared w/ Gov &Commercial Experience Violent Python - Technical Editor Founding President of Greater Augusta ISSA BSidesAugusta Organizing Committee

1) GIAC now has the GPYC (Giac Python Coder) Certification. So if you know Python you now have a credential you can show to employers that proves you have that skill

2) Joff Thyer is teaching SEC573 at SANS Network Security in Las Vegas Monday Sep 12, 2016. This is the LAST OPPORTUNITY to take this course in its current form at a PUBLIC event (we run this course a lot privately). Today it is "Python for Penetration Tester" and the entire course is focused on developing Penetration Testing tools. Next year the course will be rewritten to reach a broader audience. Next year it will have approximately 1 day of forensics, 1 day of defense and 1 day of penetration testing. So if you want a 100% penetration testing focused class then you want to go see Joff Thyer this September.


I can bring these up and discuss them in context while discussing :

- The current SEC573 and the new SEC573 course, 
- GPYC, 
- how this relates to the LONG list of Python courses that are available on the web
- WHO should take the course?   A beginners or someone who already knows how to code?

Older, but perhaps some of your listeners didn't see these. If you would like we can talk about these two forms of the same defenseive tactic. Deceiving attackers with fake or altered credentials.

 -  LIAM NEESON. https://isc.sans.edu/diary/Offensive+Countermeasures+against+stolen+passswords/20455
 -  Honey hashes:  https://isc.sans.edu/diary/Detecting+Mimikatz+Use+On+Your+Network/19311 
  1. Three words to describe yourself.
  2. If you were a serial killer, what would be your weapon of choice?
  3. If you wrote a book about yourself, what would the title be?
  4. In the popular game of ass grabby-grabby, do you prefer to go first or second?
  5. Choose two celebrities to be your parents.

Tech Segment: Building A PfSense Firewall - Part 1 - The Hardware

About & Why

For your home or small office, everyone needs a firewall! Well, I supposed you don't NEED one, but it helps. More important than just protecting you from curious people on the Internet, there are a ton of added advantages of having a good firewall platform, such as VPN, outbound filtering and more. Now, you can buy commercial off-the-shelf hardware to do this, however there are some issues:

  1. If you are listening to this show, you are a nerd who likes to tinker, and this is a great way to do that. Off-the-shelf stuff doesn't always give you stuff to tinker with.
  2. This is a great learning experience, if you are just getting started building and maintaining your own Linux/BSD firewall will teach you a lot, and its like table stakes (I built my own firewall, check).
  3. You can get a ton more speed and performance from a custom firewall for less money. This also means you can do things like scanning through your firewall without it catching fire.


I used the http://pcpartpicker.com web site to start identifying hardware in use for the build, a few things to note:

  • Low power consumption is key as it will be on all the time
  • Solid networking cards should be used, not using what is built into the Motherboard
  • Cooling, cooling and more cooling - This thing will be on all the time, make sure you have good airflow

Taking all these things into consideration, here is my build:

Here's Larry's build:

  • Motherboard: ASRockJ1900D2Y Mini ITX, 2 gig ethernet, Intel Quad Core J1900 at 2Ghz processor on board. $169.99
  • Memory: I had some 4Gig DDR3 1333 sticks hanging round from some Mac upgrades, so I used what I had on hand. One could likely use this at a total of $17.99
  • Drive: SanDisk 64GB 3.0 Flash Drive I has some issues getting this to boot off of USB 3.0, so it is in the INTERNAL USB 2.0 port with no ill effects. $16.59
  • Case: Habey EMC-800BL - This one appears to have been discontinued, but one could substitute an equally specced mini-itx, fanless case with power supply. $40

Security News - 7:00PM-8:00PM

Paul's Stories

  1. OpenIOC – Sharing Threat Intelligence - Can something like this work?
  2. Facebook Using Physical Location to Suggest Friends- Well Duh, ever wonder why when you search for someone FB tends to suggest the correct person? It did this when I added my fellow Little League coaches, its based on location.
  3. "What is your most unusual User-Agent?
  4. Interview with an NSA Hacker - TLDR, but I plan too.
  5. Google Play Hit with Rash of Auto-Rooting Malware - This app, which claims to be a level, jailbreaks your device and installs malicious apps.
  6. "Planes - For, you guessed it, Ransomeware.
  7. Conficker Used in New Wave of Hospital IoT Device Attacks
  8. Ransomware targets corporate Office 365 users in 0-day campaign - If you guessed Macros as the attack vector, you guessed right. And yes, Macros are still a thing that people use...
  9. A hacker wants to sell 10 million patient records on the black market - MS08-067 is profitable...
  10. One Picture Can Unlock All Your Apps - This sounded really bad, until this: Instead of relying on a computer to figure out if the photo is accurate, LogMeOnce sends the photo to you on another device and asks if it's OK. You say yes, and you're in.
  11. US Hospitals Hacked With Ancient Exploits - Ah yes, some MS08-067 in our healthcare system, what could possibly go wrong?
  12. [https://blog.sucuri.net/2016/06/large-cctv-botnet-leveraged-ddos-attacks.html/ CCTV DVR systems Hacked, Used in DDoS Attack
  13. "The Top 5 Security Threats - TL;DL: XSS, SQLi, social engineering, "APTs", Insider Threat. More fluff from a news site that wants me to disable my ad blocker to read the rest of the article.
  14. Facebook 'Hack' Victim Exposes Passport Scam - Apparently you can fake a photo of a Passport, and use that to gain access to someone's Facebook account. No matter how much OPSEC you got, you are vulnerable to this. This is clearly Facebook's problem, however, I will give shout outs to Facebook's internal security and incident response team for helping us this week.
  15. "Symantec Flaws As Bad As It Gets - Because no interaction is necessary to exploit it, this is a wormable vulnerability with potentially devastating consequences to Norton and Symantec customers. An attacker could easily compromise an entire enterprise fleet using a vulnerability like this. Whoa. Turns out the unpacking of executables is really error prone and vulnerable.
  16. Hackers Note That Most Breaches Just Need Normal Admin Tools - Oh, captain obvious reports that after attackers break into networks they use Nmap, Angry IP scanner, TeamViewer and VNC. Not sure why this is news... Begs the question though, do you blend if you use the same tools as the local admins?
  17. Judge says the FBI can hack your computer without a warrant - Okay, getting the IP address of a computer is NOT hacking, and does not require a warrant according to the judge. This is the same as your phone number, in fact often time law enforcement does not need a warrant to obtain your phone number.
  18. "GitHub - RedBalloonShenanigans/MonitorDarkly: Poc - Hacking monitors, still trying to figure out how this works and what is gained by doing so.

Larry's Stories

  1. Tavis at AV again - This time unpackers in the kernel? always a good idea, right? Only if it is wormable. Oh, it is? GREAT!
  2. Uber Bug bounty submissions - I love this write up on some submissions to Uber’s Bug Bounty program. Not only did they find some interesting things at Uber, the showed us how they did it. great things to think about with any web/mobile app testing, and some good methodology to put in the toolbox.
  3. No more passwords! - It is ok, because studies say they will be gone by 2025, to be replaced by “biometrics “behavioral and otherwise”. To qopte every Star Wars Character ever: “I’ve got a bad feeling about this."
  4. Unofficial count of wiretaps indicate 1% use encryption - Hrm. Dumb.

Joff's Stories

Jack's Stories

Kevin's Stories

Michael's (Santa) Stories