GIGO – Garbage In Garbage Out On Firewall

SIEM Security Information Event Management Gartner Magic Quadrant   image from http://www.gartner.com/technology/reprints.do?id=1-2J31FF4&ct=150706&st=sb  Gartner   What is it that we need? To protect our systems and perform functions? Good information from all of our devices.  The above diagram is Gartner’s magic Quadrant  for SIEM – Security Information Event Management, so the top products/companies are IBM Security, Splunk, … Read more

7 Best Black Hat 2015 White Papers

Do you want to get up-to-speed on latest hacker techniques? Snagged this list from reddit: https://www.reddit.com/r/netsec/comments/3fz6z6/blackhat_usa_2015_presentation_slideswhite_papers/cttslpu   Abusing Windows Management Instrumentation (WMI) to Build a Persistent Asynchronous and Fileless Backdoor Crash & Pay: How to Own and Clone Contactless Payment Devices Forging the USB Armory an Open Source Secure Flash-Drive-Sized Computer SMBv2: Sharing More than … Read more

BlackHat Presentation: WMI Architecture Used to Attack

Microsoft’s WMI (Windows Management Infrastructure) presentation by Matt Graeber at BlackHat 2015: https://www.blackhat.com/docs/us-15/materials/us-15-Graeber-Abusing-Windows-Management-Instrumentation-WMI-To-Build-A-Persistent%20Asynchronous-And-Fileless-Backdoor-wp.pdf You can easily see from the diagram that WMI is integral to Windows technologies.  Matt goes on to create PowerShell code which queries all WMI classes and namespaces. Some interesting class paths that i found interesting: CIMV2:Win32_BIOS CIMV2:Win32_AllocatedResource and more PowerShell  seems to … Read more

Tora! Tora! Tora! Pearl Harbor in #Cyberspace

As we prepare for the next attack (also waiting for BlackHat2015) I remember the Pearl harbor movie: TORA!TORA!TORA!  1970 Classic Tora Tora Tora トラ・トラ・トラ means “We have achieved complete surprise” in Japanese codeword. A translation is Tiger.  Tora (Tορα) is translated to  “now” from Greek. Torah is the law in hebrew or better known as the … Read more

How Much $ & Time Focus on Security?

2 Wired articles : http://www.wired.com/2015/07/senate-bill-seeks-standards-cars-defenses-hackers/ http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ The articles discuss  how one industry is using the new Internet connected services and devices to give more functionality to their customers. That’s great right? So what did 2 researchers do 2011? they connected a laptop and controlled the car through the diagnostic connector. The auto industry laughed at … Read more