SecuraBit
SecuraBit Before It Bytes!
Securabit Episode 17 for xmass Santa gave us an Nmap book to give away!!!

This is a unique episode for SecuraBit, we are teaming up with the Security Justice Podcast to do a double header show.  SecuraBit recorded their show from 8-9 PST, then handed off the reins to Security Justice to finish out the night.  In doing so we had a combine set of prizes.  To win the prize required that you listen and get the correct answer to a trivia question given on SecuraBit.  You also had to listen to the Security Justice Podcast to and know the answer to their question as well.  SecuraBit even manged to start on time as well as hand off on time.  It was a very different type of show due to trying to condense everything in to a single hour.  (Good thing we didn't have any real content, Just kidding)

SecuraBit opened the show but because Jay needed to switch some things out we actually went to a break faster than normal.  When we returned from the break we did indeed have Jay on the line.  We started to go into the new Microsoft Zero Day, and Jay informed us that he had been out of the loop for a week but since the patch only came out 73 minute before he found out about it he figured he was right on time.

The next topic was Chris Gerling going to sans and taking the forensics 508 course.  Chris then told us that he felt like he should never have picked up a helix disk based on the level of knowledge he has now compared to before the course. We also discussed that many states are requiring a Private Investigators license to do forensics.   That none of us on the show agreed that this was a good idea, but yet several lobbyists have been pushing for this very idea.  Jay asked the question about what was thought about the BGP security vulnerability.  Anthony discussed a new site he went to as a security review.

After the break, we went into the trivia question.  The trivia Question was: What are the flags you have to set in order to do an NMAP-style XMAS scan in Unicornscan? We will post the winner soon in conjunction with the Security Justice podcast.  After the trivia question we went into thoughts on what to do about prior employees, handling creditials, voice mails, and emails.  We referenced the guy in San Francisco who was fired from the job, but yet still was able to hold the network he left hostage.

Don't forget to give us a feedback on Itunes so we can bump the old shows off the list.

Thanks again for all the donations for the Tip Jar.

Hosts:

Rob Fuller - Mubix, room362.com
Anthony Gartner - AnthonyGartner.com
Chris Gerling - Hak5Chris, Chrisgerling.com
Chris Mills - ChrisAM
Jason Mueller - SecurabitJay

Important links for the show and documents used:

No links this time!

Direct download: Securabit_EP17.mp3
Category:podcasts -- posted at: 12:42pm EDT

Securabit Episode 16 How many F-Bombs are required for $40

In this episode we talk about Chris Gerling attending the SANS Cyber Defense Initiative 2008 in Washing DC.  He will be taking the Security 508 Computer Forensics, Investigation, and Response course.  If you are at the conference please make sure you look for Chris.  He also plans to take the new GPEN test while there.  We might be bringing the sock monkey to Shmoocon and have him do some interviews.

We also spoke about how few businesses are actually checking a persons signature or id for credit cards.  Most businesses are simply not checking the cards like they should be. Chris is beginning to wonder if they will card his fiancee between now and when they get married.

After the break we came back and mentioned that we were not going going to drop the Fbomb for 40 bucks as was hinted at in the chat room.  Went into the issue of dns forwarding being done on  CheckFree.com The article was actually from The Washington Post by Brian Krebs.  Anthony put a shout out to Ed Smiley for sending both Mubix and Anthony a copy of  1password.  It was a Great hookup.  Then we covered various apps on the IPhone.  We touched on what the encryption is on a 3g network.  We found a great powerpoint slide show explaining it.

After the last break we went into firewall set ups.  Everyone but Anthony is running FIOS so the discussion on how to set up the coax or ethernet wan links ensued.  You will just have to listen to it to see what kind of sense it makes.  We did get lots of comments from our faithfull in the irc channel (irc.freenode.net #Securabit).  From there the show just went down hill with strippers and alcohol.

Don't forget to give us a feedback on Itunes so we can bump the old shows off the list.

Thanks again for all the donations for the Tip Jar.

Hosts:

Rob Fuller - Mubix, room362.com
Anthony Gartner - AnthonyGartner.com
Chris Gerling - Hak5Chris, Chrisgerling.com
Chris Mills - ChrisAM
Jason Mueller - SecurabitJay

Special Guest: Joel Esler from sourcefire.com and Joelesler.net

Important links for the show and documents used:

http://www.sans.org/cdi08/
http://www.sans.org/training/description.php?mid=98
http://www.sans.org/press/giac_pentest_cert.php
http://voices.washingtonpost.com/securityfix/2008/12/hackers_hijacked_large_e-bill.html?nav=rss_blog

Direct download: Securabit_EP16.mp3
Category:podcasts -- posted at: 1:13am EDT

Securabit EP 15 Will the real Joel Esler please step forward!

Sorry for the delay in getting this episode out this time.  Anthony got stuck with doing some actual work and then we all got hit by the holidays.  We do hope you enjoy the show this week.

Mubix attended the CSI Conference and no not CSI on TV, the CSI Anual conference. The topic he found intriguing is Security and Responsibility.  If something happens how and to what extent as security professionals are we responsible and accountable.  This is a topic he brought up on twitter as well and got a lot of replies back.  Some agreeing and some not, Feel free to weigh in on this one.

Some of the references that were brought up in response to this topic were Sandboxie, castlecops, and Web of Trust.

After the break we went into a discussion on DD Images and using live view on them, but since that was a fail, Chris used QEMU.   You can even go get some test images at ProjectHoneypot.org and convert them using a tool dd2vmdk .  The conversation went into WPA is not Busted.  We referenced Steven Gibson's explantion and Joel Eslers blog posts on the subject.  During the break we discussed a great site as well from Josh Wright about Wireless Vulnerabilities & Exploits

After the Break we were able to bring in the real Joel Esler.  Joel is part time batman as well and Joel has aggred to give us at least one batmobile, but we digress.  He actually works for sourcefire.  This is an organzation that you should take a look at, it is well worth your time.  He also is an avid security blogger and has his own blog at Joel Esler.net  Joel talks about he IPS's of today are simply not the same as many of the original IPS's.

We lose Joel a little bit during the break and we cut a little more abruptly to break than we normally do.  Sorry about that!  But we kind of ran out of content and time.

SecuraBit would like to make sure everyone has a Happy Holidays and don't forget to leave us feedback on Itunes even if you don't listen via Itunes.  We want to get some of these casts out of there that have not posted in years.

Hosts:

Rob Fuller - Mubix, room362.com
Anthony Gartner - AnthonyGartner.com
Chris Gerling - Hak5Chris, Chrisgerling.com
Chris Mills - ChrisAM
Jason Mueller - SecurabitJay

Special Guest: Joel Esler from sourcefire.com and Joelesler.net

Important links for the show and documents used:

http://www.phishtank.com/
http://projecthoneypot.org/
http://www.sourcefire.com/products/3D/?semg=USSFR2&gclid=CISstozXgpcCFQVKtAodijdxXQ
http://www.joelesler.net/finshake/Blog/Blog.html
http://www.wirelessve.org/news_entries
http://en.wikipedia.org/wiki/Dd_(Unix)
http://en.wikipedia.org/wiki/QEMU
http://isc.sans.org/diary.html?rss
http://isc.sans.org/diary.html?storyid=5300
http://www.clamav.net/
http://sandboxie.com/
http://www.castlecops.com/
http://en.wikipedia.org/wiki/Web_of_trust

Direct download: Securabit_EP15.mp3
Category:podcasts -- posted at: 7:54pm EDT