From Security Weekly Wiki
Revision as of 23:07, 23 August 2018 by Jeff (talk | contribs)
Jump to navigationJump to search

Paul's Security Weekly #572

Recorded August 23, 2018 at G-Unit Studios in Rhode Island!


  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • Patrick Laverty
    is a Pentester for Rapid7
  • Jason Wood
    Threat hunter at CrowdStrike, penetration tester, sysadmin, and Founder of Paladin Security.
  • Jeff Man
    Infosec analyst
    Pioneering ex-NSA pen tester
    PCI specialist
    Tribe of Hackers
    InfoSec Curmudgeon
    Currently a Sr. InfoSec Consultant for Online Business Systems.
  • Not Kevin
    Senior Security Engineer at Barkly, Co-Founder of Vermont Hackspaces, definitely Not Kevin.
  • Announcements

    • Make sure you register for our webcast with Javelin Networks entitled "How to Get Attackers to Contain Themselves", which will be airing on August 30th from 12 pm to 1pm EST. Go to securityweekly.com/javelin to sign up today!
    • Check out our On-Demand material! Some of our previously recorded webcasts are now available On-Demand at: securityweekly.com/ondemand.
    • DerbyCon is holding its first-ever Mental Health & Wellness Workshop - to help support their efforts, please go to DerbyCon.com/wellness

    Interview: Tod Beardsley, Rapid7 - 6:00-6:45PM

    Tod Beardsley
    is the Director of Research at Rapid7.

    Tod Beardsley is the Director of Research at Rapid7. He has over twenty five years of hands-on security experience, stretching from in-band telephony switching to modern IoT implementations. He has held IT Ops and IT Security positions in large organizations such as 3Com, Dell, and Westinghouse, as both an offensive and defensive practitioner. Today, Tod directs the myriad security research programs and initiatives at Rapid7, is a frequent speaker at industry conferences, and is a contributing author to a number of research papers produced by Rapid7. He can be uniquely identified at https://keybase.io/todb

    https://opendata.rapid7.com/about/ <-- covers Sonar and Heisenberg, links can be followed from there.

    https://www.rapid7.com/globalassets/_pdfs/research/rapid7-under-the-hoodie-2018-research-report.pdf <-- Under the Hoodie pentest report, I can yammer on that all day.

    20/20/20 split, which will really be more like 40 sonar + heisenberg + national exposure (they all bleed into each other) and 20 on Under the Hoodie and pentesting stuff.

    Tech Segment: Sven Morgenroth, Netsparker - 6:45PM-7:45PM

    Sven Morgenroth, Security Researcher at Netsparker

    Sven Morgenroth is a security researcher at Netsparker. He found filter bypasses for Chrome's XSS auditor and several web application firewalls. He likes to exploit vulnerabilities in creative ways and has hacked his smart TV without even leaving his bed. Sven writes about web application security and documents his research on the Netsparker blog.

    1. explanation of the different data types, like strings, integers, etc. and what they are used for
    2. Show an example of PHP code, where in certain scenarios, 0 == 'apples' returns true in PHP.
    3. Sven will explain why as such happens and also show other similar comparison examples that might lead to security issues., like the one in this article.
    4. This is when the fun starts. He will give a technical demo and show how these issues can lead to authentication bypass or be used for hash algorithm disclosure.

    Security News - 7:45PM-8:30PM

    Paul's Stories

    1. Artificial whiskey is coming, and one company is betting youll drink up
    2. Internet of Things (IoT): Cheat sheet
    3. 14 Of The Best Sex Toys For Treating Yourself (And Also Your Partner)
    4. The Untold Story of NotPetya, the Most Devastating Cyberattack in History
    5. How doorbell cameras are creating dilemmas for police, neighborhoods
    6. Spyware Company Leaves Terabytes of Selfies, Text Messages, and Location Data Exposed Online
    7. New Apache Struts RCE Flaw Lets Hackers Take Over Web Servers
    8. Apple Forces Facebook VPN App Out of iOS Store for Stealing Users' Data
    9. Google sued for tracking you, even when 'location history' is off | ZDNet
    10. New Mirai Variants Leverage Open Source Project
    11. 6 Reasons Security Awareness Programs Go Wrong
    12. ThreatList: $1.1M is Lost to Cybercrime Every Minute of Every Day

    Patrick's Stories

    Jeff's Stories

    1. Verizon Throttled CA Firefighters’ Internet Speeds Amid Blaze (They Were Out of Data)
    2. Microsoft Flaw Allows Full Multi-Factor Authentication Bypass
    3. Study Shows Lax Security Leaves Rise-Sharing Apps Vulnerable to Attack
    4. Smart Kids Thermometer Coughs Up Digital Health Data to Hackers
    5. Malware Targeting Cash Machines Fetches Top Dollar on Dark Web

    Jason's Stories

    1. Burp Suite 2.0 beta now available - And there is much rejoicing!
    2. Coffee delivery drone patented by IBM
    3. Facebook pulls its VPN from the iOS App Store after data-harvesting accusations
    4. Do we really need a CSO?

    Kevin's Stories

    1. The DNC False Alarm Hack Is Good Cybersecurity, Bad PR "The DNC thought it was getting hacked again, but it was just a false alarm set off by a security test. It's a sign that the organization is taking its cybersecurity seriously."
    2. Enumerating registered BlackHat attendees with the BCard API " I simply guessed that those values corresponded to the eventID and badgeID parameters by sending the request in Firefox. To my surprise, I was able to pull my attendee data completely unauthenticated over this API."
    3. Win! Landmark Seventh Circuit Decision Says Fourth Amendment Applies to Smart Meter Data "This is critical precedent. Last year, roughly 65 million smart meters had been installed in the United States in recent years, with 88% of them—over 57 million—in homes of American consumers; more than 40% of American households had a smart meter. Experts predict that number will reach about 80% by 2020. And law enforcement agencies are already trying to get access to data from energy companies without a warrant."
    4. NSA leaker who mailed doc outlining Russian hacking gets 5 years in prison "Reality was a dedicated public servant and veteran who made a poor decision."

    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+