Monthly Archives: February 2012

BSides Detroit 12 Interviews 09

This week Wolfgang and Chris talk to John Moore. His talk is about the computer in your pocket, and the data it leaks on a regular basis. Listen for the AD security leak.

He talks about using Shark for Root (Wireshark for Android), to do packet capture around a you, having your phone broadcast as a WiFi access point and seeing what happens. He talks a little about war walking, war dining, stroll trolling and WiFi phaking.

Abstract:  The pervasiveness of mobile devices like smart phones are often overlooked as a valid and effective attack vector in regards to the confidentiality of sensitive data in the general public and IT/Security Enterprise communities. This talk aims to educate both the laymen and professional on how exploitation and social engineering can occur in regards to smart phone attacks against public Wi-Fi networks and what behaviors and technologies can be utilized to minimize the impact of sensitive data loss for both individuals and businesses. This discussion will include an application based presentation and live demonstration on how to sniff data from public wireless hotspots using a smart phone or tablet referred to as “War Walking” or “War Dining”. It will also introduce the social engineering concept called “Wi-Fi Phaking” and “Stroll Trolling” which results from the act of tricking a local device such as a phone or a laptop into joining a smart phone enabled Wi-Fi hotspot with the sole intent of collecting and identifying sensitive information from that connected device. More alarmingly, this can be accomplished by utilizing freely available applications found on the Internet and the Android Market which makes this threat incredibly pervasive and cost effective. The presentation will conclude with discussing security practices and procedures users and businesses can take to help mitigate the risk of these vulnerabilities being exploited both personally and professionally.

This episode is cross-posted at Rats and Rogues.

BSides Detroit 12 Interviews 08

This week we are joined by the Marketing Master of GrrCON, Jaime Payne. One of the things I noticed during her talk, her method for marketing GrrCON sounds a lot like some of the things Social Engineers do to get to the right people in a company. The title of the talk sounds awesome, and it sounds like the talk will span beyond just Cons, and could help any new group starting in the area.

Abstract: So you decided to start up a hacker conference in your town? Awesome! Now how the hell are you going to get money? I’ll tell you how! A little bit of BS (well perhaps a touch more than that) a pinch of social engineering, and a whole lot of patience and spamming! Apply my concepts not only to conferences, but your Hacker Space, local ISSA chapter, or maybe even your school’s cyber defense team. Who knows? Just get that cash! I’ll walk you through how to actually get through to sponsors, milk them for the most ca$h possible, social engineer your way to interviews and most importantly – butts in your seats!

This episode is cross-posted at Rats and Rogues.

BSides Detroit 12 Interviews 07

This week Justin and Wolf talk to Dave French from Qualys, and all the work they did for BSides Detroit last year. It’s a chance for David to talk about tech, what Qualys can do, and how the business can help attendees.

You can find David on the Internet at the following:

This episode is cross-posted at Rats and Rogues.

BSides Detroit 12 Interviews 06

Hey everyone, sorry it’s late. Our guest this week is so awesome that he caused a buffer overload on the website. Ok no not really.

We do refer to this weeks guest as the most interesting man in #misec. He joins us this week to talk about Tough Mudder, training, the #misec Capture The Flag (CTF) team that he heads up. Oh yeah, and about his talk at this year’s BSides Detroit. He’ll be teaching us about Vulnerability scanning.

He IS Derrek Thomas.

Abstract: The vulnerability scan has become a staple in the modern security program.  A single scan can provide a point-in-time snapshot of known vulnerabilities and configuration issues associated with the infrastructure.  I find many organizations perform vulnerability scans but the problem is that the scans are performed merely to satisfy compliance.  An annual scan may check the box in a report but there will also be 11.5 months of little to no visibility into the state of the infrastructure. Have those patches really been applied?  Is change control being followed?  Vulnerability management needs to move beyond the periodic vulnerability scan towards continuous vulnerability discovery.  This process is much more than just technical scanning and requires the security professional to constantly test and improve detection and alerting.  Poor incident response, inadequate security monitoring, and unknown assets can leave a network just as vulnerable as an unpatched server.  Are IDS alerts generated when they should be or has an antivirus alert received adequate response?  I will be discussing my experience with a vulnerability management program from the painful beginning.  In addition to the use of vulnerability scanning tools I will address how to solve these problems through red team testing, security information and event monitoring, and configuration baselines.  A vulnerability management program should be designed around making incremental improvements in current security processes.

This episode is cross-posted at Rats and Rogues.

BSides Detroit 12 Interviews 05

This week we talk with Georgia Weidman. Georgia lets us in on a little bit of Android security permissions.

Abstract: When giving a security talk on the Android platform, one of the most common questions is can the permissions model be bypassed? Can an Android app, short of exploiting the phone and gaining root privileges gain additional permissions? In this talk we will look at ways attackers can bypass the permission model including: taking advantage of insecure storage practices in other installed apps, and piggybacking on other apps with insecurely implemented interfaces. Demos, code snippets and examples of apps from the Android Market with these problems will be shown. We will then discuss resources Android has in place to combat these problems and what developers and users can do to mitigate these risks.

This episode is cross-posted at Rats and Rogues.