From Security Weekly Wiki
Jump to navigationJump to search

Recorded March 14, 2019 at G-Unit Studios in Rhode Island!

Episode Audio


  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • Larry Pesce
    Senior Managing Consultant and Director of Research at InGuardians, SANS Instructor.
  • Lee Neely
    is a Sr. Cyber Analyst at LLNL,SANS Analyst, SANS NewsBites Editor
  • Jeff Man
    Infosec analyst
    Pioneering ex-NSA pen tester
    PCI specialist
    Tribe of Hackers
    InfoSec Curmudgeon
    Currently a Sr. InfoSec Consultant for Online Business Systems.

  • Announcements

    • Join us April 1-3, at Disney's Contemporary Resort for InfoSec World 2019 where you can connect and network with like-minded individuals in search of actionable information. Visit https://infosecworld.misti.com/ and use the registration code OS19-SECWEEK for 15% off the Main Conference or World Pass. If you are interested in booking an interview or briefing with Security Weekly, please go to securityweekly.com/conferencerequest to submit your request!
    • SecureWorld Boston is hosting their 15th annual conference March 27-28 @ the Hynes Convention Center. Security Weekly Listeners save $100 off a full conference pass by visiting secureworldexpo.com and using the code 'SecurityWeekly'.
    • We just released our 2019 Security Weekly 25 Index Survey. Please go to securityweekly.com and click the Survey link to help us understand who's evaluating, using, or formerly used any of the Security Weekly 25 companies. The results will be summarized and presented back to all responders in a private webcast.
    • Register for our upcoming webcasts with LogRhythm and Recorded Future by going to securityweekly.com/webcasts . If you have missed any of our previously recorded webcasts, you can find our on-demand library at securityweekly.com/ondemand
    • John Strand will be teaching Active Defense and Cyber Deception at Black Hat 2019.  Please register here! https://www.blackhat.com

    Tech Segment: Peter Smith, Edgewise (6:00 - 6:45PM)

    Peter Smith
    is the Founder & CEO at Edgewise.

    Smith, Edgewise Founder and CEO, is a serial entrepreneur who built and deployed Harvard University’s first NAC system before it became a security category. Peter brings a security practitioner’s perspective to Edgewise with more than ten years of expertise as an infrastructure and security architect of data centers and customer-hosting environments for Harvard University, Endeca Technologies (Oracle), American Express, Fidelity UK, Bank of America, and Nike. Most recently, Peter was on the founding team at Infinio Systems where he led product and technology strategy.

    Security News (6:45 - 7:30PM)

    Paul's Stories

    1. New WordPress Flaw Lets Unauthenticated Remote Attackers Hack Sites - Comments in Wordpress are just evil, and not worth it in my opinion for a host of reasons: WordPress doesn't use CSRF validation when a user posts a new comment, allowing attackers to post comments on behalf of an administrator. Comments posted by an administrator account are not sanitization and can include arbitrary HTML tags, even SCRIPT tags. WordPress frontend is not protected by the X-Frame-Options header, allowing attackers to open targeted WordPress site in a hidden iFrame from an attacker-controlled website.
    2. HackInOS: 1 - I did not validate anything about this project, but it sounded neat: HackinOS is a beginner level CTF style vulnerable machine. I created this VM for my university’s cyber security community and all cyber security enthusiasts.
    3. Intel Windows 10 Graphics Drivers Riddled With Flaws - The more serious of these (CVE-2018-12216) has a CVSS score of 8.2 and stems from insufficient input validation in the kernel mode driver within Intel Graphics Driver for Windows. The kernel mode driver of a graphics driver executes any instruction it needs on the CPU without waiting, and can reference any memory address that is available. Could this also open up firmware attacks against the GPU hardware? Though I would believe that any kernel driver can access any hardware directly? I have to read this more carefully: https://docs.microsoft.com/en-us/windows-hardware/drivers/display/driver-protection but it does state that the described driver protection is optional.
    4. DMSniff POS Malware has flown under the radar for at least four years - Sure it had a domain name generation algorythm, but didn't seem especially stealthy to me. How did it evade detection, one could guess: “DMSniff is another name in a growing list of evolving threats for the point-of-sale malware world. During our research we found that this malware was primarily utilized to target small to medium sized businesses such as restaurants and theaters.” concludes the experts. “It also contains a domain generation algorithm, something that is rare to see in point-of-sale malware”
    5. What do sexy selfies, search warrants, tax files have in common? They've all been found on resold USB sticks - While entertaining: Troublingly, the material recovered was often fairly sensitive. There were nude images of a middle-aged man, along with contact details. There were legal documents like a search warrant and risk assessments. There were financial papers dating back years, along with personal data. There were also tax forms, wage slips and the like. Not really news. We covered this with SIM cards back in the day. It seems people like to sell electronics without scrubbing the data.
    6. InfoSec Handlers Diary Blog - Tip: Ghidra & ZIP Files
    7. Facebook and Instagram suffer most severe outage ever - And GMail and YouTube: https://bgr.com/2019/03/13/gmail-google-drive-outage-youtube-down-too/ - Gmail started on Tuesday night and Facebook started on Wed. Coincidence? What are the chances that both Facebook and Google had major outages at the same time and there was no connection?
    8. Tesla allegedly spied on and ran smear campaign on a whistleblower | SC Media - A former security manager told Bloomberg Businessweek that Tesla hacked, spied on, and engaged in a smear campaign against whistleblower Martin Tripp. Sean Gouthro, a former security manager at Tesla’s Nevada Gigafactory, claimed Elon Musk personally hired Tesla investigators to hack into an employee’s phone, spy on his messages, and even mislead police about a potential mass shooting, all in response to whistleblowing.
    9. Proof-of-concept code published for Windows 7 zero-day | ZDNet
    10. Man drives 3,300 miles to talk to YouTube about deleted video - LOL: On Sunday, police in Mountain View, California, where Google is headquartered, arrested a man who drove more than 3,300 miles from Maine to discuss what he thought was the company’s removal of his YouTube account and the one video he’d posted – one about getting rich quick. It was not, in fact, deleted by YouTube. It turns out, his wife deleted it, concerned as she was about her husband’s mental state. She told BuzzFeed News that the video, created by 33-year-old Kyle Long, was “rambling” and “bizarre.”
    11. WordPress Releases Security Update | US-CERT
    12. Cisco Patches Critical Default Password Bug
    13. Code Execution Flaw Found in Sonatype Nexus Repository Manager | SecurityWeek.Com
    14. DARPA Is Developing an Open-Source Voting System - Schneier on Security

    Larry's Stories

    Lee's Stories

    1. Cyberattacks will soon kill people Security expert warns that evolution of Cyber Attacks can lead to attacks designed to kill people.
    2. Android VPN Apps tracking personal information The BestVPN research found several free Android apps have excessive permissions. Premium VPN apps are much cleaner. Revoke the excess permissions under advanced settings, which may break them.
    3. Boost Federal Email Security NIST Releases SP 800-177R1 as a guide to OMB BOD 18-01 regarding the use of SPF, DKIM, DMARC and TLS to enhance email security. Implementing these also helps email security in the private sector.
    4. Box Links are leaking sensitive data. Anonymous access links, as opposed to specific users, to cloud data repositories (Box, OneDrive, Dropbox, Google Drive, etc.) are being indexed and/or shared and used to access sensitive data. mitigation: share with specific users, remove sharing when no longer required.

    Jeff's Stories

    Interview: Carsten Willems, VMRay(7:30PM - 8:30PM)

    Carsten Willemsis the Co-Founder & CEO at VMRay

    Carsten is the original developer of CWSandbox, a commercial malware analysis suite that was later renamed to GFI Sandbox, and now Threat Analyzer by ThreatTrack Security. He is a pioneer in creating commercial software for dynamic malware analysis, and is one of the experts in this field worldwide. He achieved his Ph.D. in computer science / IT-security at the Ruhr-University of Bochum in 2013 and has more than 15 years of experience in malware research and software design. He has founded several companies, assisted many other CyberSecurity startups and regularly presents at academic and industry conferences.