Securabit EP 15 Will the real Joel Esler please step forward!

Sorry for the delay in getting this episode out this time.  Anthony got stuck with doing some actual work and then we all got hit by the holidays.  We do hope you enjoy the show this week.

Mubix attended the CSI Conference and no not CSI on TV, the CSI Anual conference. The topic he found intriguing is Security and Responsibility.  If something happens how and to what extent as security professionals are we responsible and accountable.  This is a topic he brought up on twitter as well and got a lot of replies back.  Some agreeing and some not, Feel free to weigh in on this one.

Some of the references that were brought up in response to this topic were Sandboxie, castlecops, and Web of Trust.

After the break we went into a discussion on DD Images and using live view on them, but since that was a fail, Chris used QEMU.   You can even go get some test images at ProjectHoneypot.org and convert them using a tool dd2vmdk .  The conversation went into WPA is not Busted.  We referenced Steven Gibson’s explantion and Joel Eslers blog posts on the subject.  During the break we discussed a great site as well from Josh Wright about Wireless Vulnerabilities & Exploits

After the Break we were able to bring in the real Joel Esler.  Joel is part time batman as well and Joel has aggred to give us at least one batmobile, but we digress.  He actually works for sourcefire.  This is an organzation that you should take a look at, it is well worth your time.  He also is an avid security blogger and has his own blog at Joel Esler.net  Joel talks about he IPS’s of today are simply not the same as many of the original IPS’s.

We lose Joel a little bit during the break and we cut a little more abruptly to break than we normally do.  Sorry about that!  But we kind of ran out of content and time.

SecuraBit would like to make sure everyone has a Happy Holidays and don’t forget to leave us feedback on Itunes even if you don’t listen via Itunes.  We want to get some of these casts out of there that have not posted in years.

Hosts:

Rob Fuller – Mubix, room362.com
Anthony Gartner – AnthonyGartner.com
Chris Gerling – Hak5Chris, Chrisgerling.com
Chris Mills – ChrisAM
Jason Mueller – SecurabitJay

Special Guest: Joel Esler from sourcefire.com and Joelesler.net

Important links for the show and documents used:

http://www.phishtank.com/
http://projecthoneypot.org/
http://www.sourcefire.com/products/3D/?semg=USSFR2&gclid=CISstozXgpcCFQVKtAodijdxXQ
http://www.joelesler.net/finshake/Blog/Blog.html
http://www.wirelessve.org/news_entries
http://en.wikipedia.org/wiki/Dd_(Unix)
http://en.wikipedia.org/wiki/QEMU
http://isc.sans.org/diary.html?rss
http://isc.sans.org/diary.html?storyid=5300
http://www.clamav.net/
http://sandboxie.com/
http://www.castlecops.com/
http://en.wikipedia.org/wiki/Web_of_trust

Securabit Episode 14 We remind you to not get SWACKED!!!

In this episode we have a special guest Adrian from Irongeek.com.  We conversed about the going’s on at phreaknic. Adrian presented down there and this is where he ended up meeting Bruce and Heidi Potter from the Shmoocon Group.  The discussion covered a little more on the MS08-067 issues, Sans Training, and CEH.  This is the first episode where we experimented and used stickam.com to allow the listeners to see just how messed up we really are.

After the break, Adrian spoke about how one of the guys from binrev.com turned him on to a book for review called Googling Security: How Much Does Google Know About You? written by Greg Conti.  Anthony ended up going into some of new virus / trojan infections.  These were on the lines of antivirus 2009 and others of the type.  Consensus was that a good cleaner tool was called Rougefix (recommendatin from the IRC channel by Tim Krabek).  Adrian recommended a song by Tom Smith about Technical Suport for Dad.

We went into a little more information on the New York School district’s vulnerability. We also went into a little bit on how to lock down a printer as well.  Found a list of the PJL commands for HP.

Securabit wanted to remind everyone that if you have anything to say you are welcome to come on the show and tell us what you think and know.  It is an open invitation. We want to thank those individuals who have donated to the podcast as well.  Check out a couple of our friends podcasts at http://securityjustice.com and the http://SMBminute.com

Hosts:

Chris Mills – ChrisAM

Chris Gerling – Hak5Chris, Chrisgerling.com

Anthony Gartner – AnthonyGartner.com

Jason Mueller – SecurabitJay

Special Guest: Adrian from Irongeek.com

Important links for the show and documents used:

http://irongeek.com
http://www.phreaknic.info/pn12/
http://shmoocon.org
http://www.binrev.com/
Googling Security: How Much Does Google Know About You?
http://www.technibble.com/repair-tool-of-the-week-roguefix/
http://www.tomsmithonline.com/main1.htm
http://timesunion.com/AspStories/story.asp?storyID=732745
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&taskId=120&prodSeriesId=84028&prodTypeId=18972&prodSeriesId=84028&objectID=bpl01965

Episode 14 Recording Tonight!

Hey folks, we’ll be live here in about 15-30 minutes and as soon as we hunt down Irongeek, we’ll kick things off for a post-halloween post-ms08-067 show!

Watch
http://www.stickam.com/packetsense

Listen
http://packetsense.net:8100/listen.m3u

Got tables?:

Rainbow...Tables?

Recording Notice and MS08-067 Worm in the Wild!

We’ll be streaming somewhere around 7:30pm EST on Wed, November 5th and have tentatively scheduled Irongeek to come on the show with us.

Joel Esler has blogged on the SANS Internet Storm Center regarding a new worm in the wild exploiting our current favorite microsoft vulnerability:  MS08-067.  You can read his post here, where he talks about it.