Securabit Episode 75:Â Booze over IP
February 9, 2011
Anthony Gartner â€“ @anthonygartner http://anthonygartner.com
Chris GerlingÂ â€“ @chrisgerling
Christopher Mills â€“ @thechrisam
Jason Mueller â€“ @securabit_jay
Andrew Borel â€“Â @andrew_secbit
Tony Â (myne-us)Â â€“ @myne_us
Mike:Bsides origins and other.Â http://chaordicmind.com/blog/
Joe: Open Security Intelligence http://www.opensecurityintelligence.com/
On Monday, February 14th, SIEM and log management vendor SenSage will introduce the Open Security Intelligence forum to the security community to become involved in. The concept of the community is to share best practices in open security analytics to improve our collective security defenses. Specifically, Joe Gottlieb, President and CEO of SenSage would like to discuss:
– Current challenges with todayâ€™s SIEM tools, which are a decade old
– Why security analytics needs to be â€˜openâ€™
– Why integrating business intelligence tools (i.e. Pentaho, Microsoft Exchange, Cognos, etc.) with SIEM tools can create useful dashboards that help security analysts mine huge data stores for the â€˜needle in the haystackâ€™ information they need
– Why â€˜security quantsâ€™ (analysts that can look deep into the data and develop complex yet useful SQL queries) will become the next role in the SOC
– The benefits of joining the community and sharing best practices
The community will be hosted on a web portal â€“ www.opensecurityintelligence.com â€“ that is under development and will be discussed in our Feb. 14 release. Also, Joe is also giving a talk at Security BSidesÂ SF on 2/14 at 3pm PT on this very topic.
attack does not yet have reports of how they where attacked. The comment on the website was for the 1999 attack where someone defaced the nasdaq website.
Quotes from http://www.wallstreetandtech.com/technology-risk-management/229201267
The operator of the Nasdaq Stock Exchange said it found “suspicious files” on its computer servers, in a Web application called Directors Desk which is used by members of corporations’ boards of directors who want to share information and files.
“What seems most likely is that the web servers were compromised in an attempt to use them to inject malicious software into their clients,” commented one reader of the nakedsecurity.sophos.com blog.
to contact: info (at) securitybsides dot org -or- call 415-742-1739
–Exploit developers corner
Looking for exploit developers!
If you have recently published an exploit or have a previously published exploits you would like to talk about contact us at [email protected] or can contact Tony (myne-us) directly on IRC at freenode #securabit to have a small interview about your discovery.
List of common questions.
-How did you find the vulnerability?
-What is your goal in vulnerability research?
-How did you go about disclosing the vulnerability and how did the vendor respond?
!!Caution!!:Â No undisclosed vulnerabilities (0 day)! These vulnerabilities need to be reported to the vendor and patched or exceed a time period where vendor did not patch. If interested in releasing exploit on the show that is fine if can show proof you disclosed to vendor or see the proof of concept already posted on exploit-db or have a CVE.
Us:NetWitness Spectrum at RSA http://www.netwitness.com/products/spectrum.aspx
RSA Conference 2011 (14 -18 Feb 2011)
#BSidesSanFrancisco (14 – 15 Feb 2011)
#BSidesCleveland (18 Feb 2011)
#BSidesHalifax (5 Mar 2011)
#BSidesGSO Greensboro, NC (9 Mar 2011)
CanSecWest2011 (9 – 11 Mar 2011)
#BSidesAustin (11 – 12 March 2011) http://www.keepsecurityweird.org/
BlackHat Europe 2011 (17 – 18 Mar 2011)
#BSidesChicago (16 – 17 Apr 2011)
#BSides London, (20 Apr 2011)
#BSidesROC Rochester, NY (21 May 2011)
#BSidesDetroit (3 – 4 Jun 2011)
Chat with us on IRC at irc.freenode.net #securabit
iTunes Podcast – http://itunes.apple.com/us/podcast/securabit/id280048405
iPhone App Now Available – http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8