SecuraBit

Before It Bytes!

SecuraBit Episode 37: Mapping Networks with Fyodor and NMAP

SecuraBit Episode 37 – Mapping Networks with Fyodor and NMAP
NMAP 5 with Gordon “Fyodor” Lyon
* How did Nmap start?
* What’s new in Nmap 5?
* Whe kind of legal issues have you faced in regards to NMAP?
* Where did the handle Fyodor start?
* Will there be a second edition of Nmap book? (below) no second e yet or planned
* Where is NMAP Going?
* Where do you see Nmap Scripts (NSE) going, possibly doing a community repo?
* Will scans for mobile devices in future releases?
* Why lua vs. python or ruby or something else?
Find the answers to these questions and more by listening to the show.

After our interview we cover DEFCON and the Podcasters meetup.

Join us in IRC at irc.freenode.net #securabit

Hosts:
Anthony Gartner – http://www.anthonygartner.com – @anthonygartner
Chris Gerling – http://www.chrisgerling.com – @hak5chris
Christopher Mills – http://www.packetsense.net – @thechrisam
Andrew Borel – @andrew_secbit
Jason Mueller – @securabit_jay
Rob Fuller – Mubix – http://www.room362.com – @Mubix

Guest:
Gordon “Fyodor” Lyon – http://insecure.org/fyodor/

Links:
NMAP 5 – http://nmap.org/5/
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning – http://www.amazon.com/Nmap-Network-Scanning-Official-Discovery/dp/0979958717/ref=sr_1_1?ie=UTF8&qid=1250122655&sr=8-1
New ‘ping sweep’ – http://carnal0wnage.attackresearch.com/node/373
The Programming Language Lua – http://www.lua.org/
WordPress 2.8.4 Security Release – http://wordpress.org/development/2009/08/2-8-4-security-release/

SecuraBit Episode 36: The f0rb1dd3n Network

SecuraBit Episode 36 – The f0rb1dd3n Network

We are joined by Jayson Street to talk about his book, Disecting the Hack: The f0rb1dd3n Network, that is due out soon. All Black Hat bags will have an excerpt from the book in them.

Additionally we get Jayson’s input on the topic of the recent denial of service attacks not coming from North Korea after all.

DJ Great Scott gives us an update on the social events at this years DEFCON.

Finally we cover media destruction policies. How do you decommission old hard disks? Do you retain the ones from your copiers and fax machines? What about thumb drives?

Join us in IRC at irc.freenode.net #securabit

Hosts:

Anthony Gartner – http://www.anthonygartner.com – @anthonygartner
Chris Gerling – http://www.chrisgerling.com – @hak5chris
Christopher Mills – http://www.packetsense.net – @thechrisam
Andrew Borel – @andrew_secbit
Jason Mueller – @securabit_jay

Guest:
Jayson E. Street – http://f0rb1dd3n.com/author.php

Links:
http://f0rb1dd3n.com
Computer attack may not have originated in North Korea after all –

http://blogs.usatoday.com/technologylive/2009/07/evidence-has-surfaced-that-the-denial-of-service-attacks-that-crippled-dozens-of-us-and-south-korean-web-sites-last-week-ma.html
UK, not North Korea, source of DDOS attacks, researcher says –

http://www.pcworld.idg.com.au/article/311070/uk_north_korea_source_ddos_attacks_researcher_says
DEFCON 17 – http://www.defcon.org/html/defcon-17/dc-17-index.html

Podcasters Meetup – http://www.podcastersmeetup.com/