Before It Bytes!

SecuraBit Episode 49:!

SecuraBit Episode 49:!

Podcasters Meetup –
ShmooCon – Saturday Evening @ 8PM

SANS Discount Code SB508 – Free GCFA attempt when using this link.

Philippe Gamache:
Day job is focused on secure programing, developer training and code audit.
-New conference about web technology
-PHP Quebec Conference offshoot
-Get all the user groups in the Monteral area together to share information
-8 Separate tracks at the time

ShmooCon FireTalks

Escaping the clutches of The GOOG -

Anthony Gartner  @anthonygartner
Christopher Mills @thechrisam
Chris Gerling  @chrisgerling
Nicholas Berthaume – @aricon
Andrew Borel @andrew_secbit

Philippe Gamache – – @SecureSymfony

Chat with us on IRC at #securabit

Links: –

SecuraBit Episode 48: Shmoocon (The Big Cheese) and PhoneFactor!

Anthony Gartner  @anthonygartner
Christopher Mills @thechrisam
Jason Mueller – @securabit_jay
Chris Gerling  @chrisgerling

Bruce Potter – Shmoocon – @gdead
Steve Dispensa – CTO and Co-founder of PhoneFactor - @dispensa
Marsh Ray – PhoneFactor – @marshray

Recent goings on:
If you are going to DC3 CyberCrime Conference contact Jason Mueller (@securabit_jay) to meet up!
Sean Hausauer and David Shpritz join the crew!  Check out their blog postings!

First Guest – Bruce Potter – Shmoocon – @gdead

Logistics of putting on a conference.
New events!
Ticket sales process is constantly evolving.

Wardman Park in 1920’s:
ShmooCon 2010 FireTalks:
Podcasters Meetup:

How to fix SSL/TLS in software
The process of working with vendors to get a solution implemented.
Project Mogul

Join us on January 27, 2010 when we speak with Phillipe Gaumeche about the ConFoo.Ca conference.
Chat with us on IRC at #securabit

Shmoocon –
PhoneFactor –

Not on the air:
Andrew Borel @andrew_secbit

SecuraBit Episode 45: More on DOJOCon

SecuraBit Episode 45  More on DOJOCON

Marcus J Carey discusses MetaSponse tool to be released in mid-December. This uses the MetaSploit Framework for Incident Response.

Metasploit Framework 3.3  Released!

Join us in IRC at #securabit

Anthony Gartner – @anthonygartner
Chris Gerling  – @chrisgerling
Christopher Mills – @thechrisam
Jason Mueller – @securabit_jay
Andrew Borel – @andrew_secbit

Marcus Carey – @marcusjcarey


DojoCon –
Hackers for Charity –
hak5 –

NoVA Hackers –

dojosec @ USTREAM
White Wolf Security –
ShmooCon 2010 –
Netwars Competition –
International Spy Museum –
Cyber Forensics: Digital CSI –

SecuraBit Episode 42: Phreaking Sweet Con in TN.

SecuraBit Episode 42 – Phreaking Sweet Con in TN.
Phreaknic 13 – October 30 – November 1 2009
Phreaknic Curse
CCTV throughout hotel, great + for attending the con
Ware Chair Toss
Firing a jet engine in the parking lot.
Four Tracks
1 Cumberland (Main ballroom)
2 9th Floor (Vendor Area)
3 Cafe Area (Gaming)
4 Contest Area
Size of conferences
Running Conferences
#RoachesMustDie from ShmooCon 2009 via Security Justice
Microsoft Security Essentials –
New iTunes Store –
iKeepass –
Metasploit hiring in Austin, TX
Rockstar QA Engineer Needed –
New version of Pocket God for the iPhone
Hacker Consortium –
TechShop –

Join us in IRC at #securabit
Anthony Gartner – @anthonygartner
Chris Gerling  – @chrisgerling
Christopher Mills – @thechrisam
Andrew Borel – @andrew_secbit

SecuraBit Episode 41: Speaking of Cons, and forensics…

SecuraBit Episode 41 – Speaking of Cons, and forensics…
Part 1: Marcus Carey
Dojocon – – @dojocon
November 6 & 7, 2009
Capitol College Maryland

Part 2: Scott Moulton

blackberry stuff:

Chris Gerling  – @chrisgerling
Jason Mueller – @securabit_jay
Andrew Borel – @andrew_secbit
Anthony Gartner – – @anthonygartner
Marcus Carey – – @dojocon
Dojocon – – @dojocon


Secret Entry Form

Congrats, you found a secret i-hacked partner site giving away an additional free Defcon Contest entry!
(there are 4 other secret sites)

All you have to do is enter your twitter handle below, and then tweet the “secret phrase” that is shown to you.


SecuraBit Episode 40: Paul WHO????

SecuraBit Episode 40 – Paul “Pauldotcom” Asadoorian
Renaud script to go from Nmap to Nessus
Interview with Paul Asadoorian (PaulDotCom/Tenable/Nessus)
Intro Questions:
  • Who are you, and what are you doing on THIS podcast?
  • Tell us about the PaulDotCom podcast (I’ve talked to SecuraBit listeners who have never heard of PDC)
  • How long have you been using Nessus?
  • When did you start working for Tenable?
  • What is your role at Tenable?
Nessus Questions:
  • What’s new in this version of Nessus?
  • Are changes driven primarily by Tenable, or the community?
  • What does Nessus use for a scanning engine?
  • How does Nessus interact and work with Nmap?
  • Explain Nessus licensing and what an individual vs a corp is entitled to.
  • How much is a license?
  • Cost of proffesional feed = $1200.00/year
  • Home feed no longer a delay, no SCADA plugins
  • How does Nessus differ from OpenVAS?
  • Can you use the OpenVAS repo with Nessus?
  • Talk about the extensibility of Nessus. (Scripting, etc)
  • How does Nessus work with OVAL definitions? How does this help for FDCC compliance?
  • Does tenable have any dedicated appliances for enterprise scanning and monitoring based on nessus?
Implementation and Operation questions (How Paul Does Things):
  • Do you place scanning servers on each segment of the network, or do you scan through zone-to-zone firewalls? Why?
  • Is there a practical limit to the number of deices that can be scanned by one scanning server? Or is it just a time tradeoff?
  • How often do you scan (and re-scan) a network?
  • How do you handle the results (and avoid dropping a 300 page Nessus report on the server guys and saying FIX IT)
  • Are results parse-able and able to be fed into compliance and risk management tools?
Other Questions:
  • When is the next PaulDotCom episode?
  • What are the topics/guests?
  • What is your favorite beer?
Anthony Gartner @anthonygartner
Christopher Mills @thechrisam
Andrew Borel @andrew_secbit
Ed Smiley – @edsmiley
Paul Asadoorian – @pauldotcom –
Tenable Network Security Blog and Podcast –

SecuraBit Episode 39: Stealing candy from little kids everywhere!!!

SecuraBit Episode 39 – Stealing candy from little kids everywhere!!!

Jay brought up that some government web sites will be switching to an OpenID authentication

What Does DHS Know About You?
How to request your travel records


Seesmic Desktop



Poison Ivy Remote Administration Tool

FRHACK: Pentesting Live DVD

Upcoming Events:

Phreaknic 13 – October 30 – November 1 2009

SANS Cyber Defense Initiative – Washington, DC – December 11 – 18, 2009

ToorCon – San Diego Convention Center -  October 23rd-25th, 2009

See our complete list of upcoming Cons and Webcasts.

Join us in IRC at #securabit

Anthony Gartner – @anthonygartner
Chris Gerling – @chrisgerling
Christopher Mills – @thechrisam
Andrew Borel – @andrew_secbit
Jason Mueller – @securabit_jay

SecuraBit Episode 38: Classic Securabit, Lots of Rambling, Low Content

SecuraBit Episode 38 – Classic Securabit, Lots of Rambling, Low Content

Louisville Metro InfoSec Conference in Louisville, KY
October 8, 2009 8am – 5pm
Sponsored by the local ISSA Chapter
Some of speakers at the event include:

  • John Strand
  • Lee Kushner
  • Scott Moulton
  • Adrian “IronGeek” Crenshaw
Presentations are planed to be posted online afterwards.

If you wish to attend the conference you can use the discount code of “geek seat” to get $20 off registration

Round Table Topic: Who should be responsible for patching? Infrastructure or Security?

There is a conversation about the new Snow Leopard for Mac and Macs mail.

A brief discussion about Helix, Security Onion, and Splunk 4.

Join us in IRC at #securabit

Anthony Gartner – – @anthonygartner
Chris Gerling – – @hak5chris
Christopher Mills – – @thechrisam
Andrew Borel – @andrew_secbit

Brian Blankenship  – chair ( a ) louisvilleinfosec ( dot ) com

Louisville Metro InfoSec Conference –
Security Onion –
Splunk 4 –

SecuraBit Episode 37: Mapping Networks with Fyodor and NMAP

SecuraBit Episode 37 – Mapping Networks with Fyodor and NMAP
NMAP 5 with Gordon “Fyodor” Lyon
* How did Nmap start?
* What’s new in Nmap 5?
* Whe kind of legal issues have you faced in regards to NMAP?
* Where did the handle Fyodor start?
* Will there be a second edition of Nmap book? (below) no second e yet or planned
* Where is NMAP Going?
* Where do you see Nmap Scripts (NSE) going, possibly doing a community repo?
* Will scans for mobile devices in future releases?
* Why lua vs. python or ruby or something else?
Find the answers to these questions and more by listening to the show.

After our interview we cover DEFCON and the Podcasters meetup.

Join us in IRC at #securabit

Anthony Gartner – – @anthonygartner
Chris Gerling – – @hak5chris
Christopher Mills – – @thechrisam
Andrew Borel – @andrew_secbit
Jason Mueller – @securabit_jay
Rob Fuller – Mubix – – @Mubix

Gordon “Fyodor” Lyon –

NMAP 5 –
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning –
New ‘ping sweep’ –
The Programming Language Lua –
WordPress 2.8.4 Security Release –