Before It Bytes!

SecuraBit Episode 43: The Academy Pro

SecuraBit Episode 43 The Academy Pro

Guest Interview: Peter Giannoulis of The Academy Pro

Metasploit Rising

WordPress 2.8.5: Hardening Release

Blubrry PowerPress Podcasting Plugin for WordPress

Time Warner Cable Exposes 65,000 Customer Routers to Remote Hacks

Google Voice voicemails appearing in public search results


Porn, CSS History Hacking, User Recon and Blackmail

Windows 7

Magic Mouse

Quick Shell Script to Extract Contents

Join us in IRC at #securabit

Anthony Gartner – @anthonygartner
Chris Gerling  – @chrisgerling
Christopher Mills – @thechrisam
Andrew Borel – @andrew_secbit

Peter Giannoulis

The Academy Pro –
The Academy Home –

Don’t forget to listen to the end of the show for the guest appearances by both Kermit the Frog and Sean Connery

SecuraBit Episode 42: Phreaking Sweet Con in TN.

SecuraBit Episode 42 – Phreaking Sweet Con in TN.
Phreaknic 13 – October 30 – November 1 2009
Phreaknic Curse
CCTV throughout hotel, great + for attending the con
Ware Chair Toss
Firing a jet engine in the parking lot.
Four Tracks
1 Cumberland (Main ballroom)
2 9th Floor (Vendor Area)
3 Cafe Area (Gaming)
4 Contest Area
Size of conferences
Running Conferences
#RoachesMustDie from ShmooCon 2009 via Security Justice
Microsoft Security Essentials –
New iTunes Store –
iKeepass –
Metasploit hiring in Austin, TX
Rockstar QA Engineer Needed –
New version of Pocket God for the iPhone
Hacker Consortium –
TechShop –

Join us in IRC at #securabit
Anthony Gartner – @anthonygartner
Chris Gerling  – @chrisgerling
Christopher Mills – @thechrisam
Andrew Borel – @andrew_secbit

SecuraBit Episode 41: Speaking of Cons, and forensics…

SecuraBit Episode 41 – Speaking of Cons, and forensics…
Part 1: Marcus Carey
Dojocon – – @dojocon
November 6 & 7, 2009
Capitol College Maryland

Part 2: Scott Moulton

blackberry stuff:

Chris Gerling  – @chrisgerling
Jason Mueller – @securabit_jay
Andrew Borel – @andrew_secbit
Anthony Gartner – – @anthonygartner
Marcus Carey – – @dojocon
Dojocon – – @dojocon


Secret Entry Form

Congrats, you found a secret i-hacked partner site giving away an additional free Defcon Contest entry!
(there are 4 other secret sites)

All you have to do is enter your twitter handle below, and then tweet the “secret phrase” that is shown to you.


SecuraBit Episode 40: Paul WHO????

SecuraBit Episode 40 – Paul “Pauldotcom” Asadoorian
Renaud script to go from Nmap to Nessus
Interview with Paul Asadoorian (PaulDotCom/Tenable/Nessus)
Intro Questions:
  • Who are you, and what are you doing on THIS podcast?
  • Tell us about the PaulDotCom podcast (I’ve talked to SecuraBit listeners who have never heard of PDC)
  • How long have you been using Nessus?
  • When did you start working for Tenable?
  • What is your role at Tenable?
Nessus Questions:
  • What’s new in this version of Nessus?
  • Are changes driven primarily by Tenable, or the community?
  • What does Nessus use for a scanning engine?
  • How does Nessus interact and work with Nmap?
  • Explain Nessus licensing and what an individual vs a corp is entitled to.
  • How much is a license?
  • Cost of proffesional feed = $1200.00/year
  • Home feed no longer a delay, no SCADA plugins
  • How does Nessus differ from OpenVAS?
  • Can you use the OpenVAS repo with Nessus?
  • Talk about the extensibility of Nessus. (Scripting, etc)
  • How does Nessus work with OVAL definitions? How does this help for FDCC compliance?
  • Does tenable have any dedicated appliances for enterprise scanning and monitoring based on nessus?
Implementation and Operation questions (How Paul Does Things):
  • Do you place scanning servers on each segment of the network, or do you scan through zone-to-zone firewalls? Why?
  • Is there a practical limit to the number of deices that can be scanned by one scanning server? Or is it just a time tradeoff?
  • How often do you scan (and re-scan) a network?
  • How do you handle the results (and avoid dropping a 300 page Nessus report on the server guys and saying FIX IT)
  • Are results parse-able and able to be fed into compliance and risk management tools?
Other Questions:
  • When is the next PaulDotCom episode?
  • What are the topics/guests?
  • What is your favorite beer?
Anthony Gartner @anthonygartner
Christopher Mills @thechrisam
Andrew Borel @andrew_secbit
Ed Smiley – @edsmiley
Paul Asadoorian – @pauldotcom –
Tenable Network Security Blog and Podcast –

Starting a forensic investigation – what to know?

When you are handed a hard drive or a laptop and management tells you to cast your spell of forensics final report on it, what are some things that you need to know before you begin?  If it’s for a legal case, are there questions you should ask before you get your hands dirty?  Perhaps whether you’re allowed to know specific details, or whether they want you in the dark so you don’t find evidence for the sake of finishing faster and making everyone happy?

I put this out there for open discussion, because sometimes we are given nothing and expected to figure everything out immediately.