
Sign up to save your podcasts
Or
On this episode of SecuraBit:
Mubix posted an awesome link on his blog to a Multiboot Security DVD that allows you to choose which common security distros, all on one medium!
Backtrack 3
Damn Small Linux 4.2.5
GeeXBoX 1.1 (not geekbox )
Damn Vulnerable Linux (Strychnine) 1.4
Knoppix 5.1.1
MPentoo 2006.1
Ophcrack 1.2.2 (with 720 mb tables)
Puppy Linux 3.01
Byzantine OS i586-20040404
Some distros the Securabit guys would like to see added:
Helix
As noted on the Securabit website, a Fedora and Red Hat Enterprise Linux servers were compromised.
The ComputerWorld Blog - Linux Security Idiots article explains how the servers were compromised
-Stolen SSH keys are used to gain access to the system
-After that, rootkit "phalanx2" is installed and steals more SSH keys
-Obviously this could be used to install any malware at all
The RHEL offshoot CentOS was not affected by the compromise.
US CERT Joomla! Password Reset Vulnerability
Joomla Core Exploit Announcement - Password Remind Functionality
Joomla user password reset vulnerability being actively exploited
Italy tries to ban PirateBay
Awesome Quote: "Fear makes the wolf look bigger"
Originally Discovered by The Sunday Herald. As many as 8 million accounts compromised
Best Western Response
This exploit of Border Gateway Protocol allows the attacker to
Defcon presentation from Anton Kapela and Alex Pilosov
Border Gateway Protocol
Wired - Revealed: The Internet's Biggest Security Hole
Wired - More on BGP Attacks -- Updated
Jay Beale - Middler - Release it already!
Hiding information by slightly altering the binary sequence of a sound file
From simple algorithms that insert info in the form of signal
LSB coding (least significant bit):  substitute with a binary msg
Parity coding
Phase coding:  #  The original sound signal is broken up into
A Discrete Fourier Transform (DFT) is applied to each segment to create a matrix of the phases and Fourier transform magnitudes.
Phase differences between adjacent segments are calculated.
Phase shifts between consecutive segments are easily detected.
Spread spectrum
Two versions of SS can be used in audio steganography: the
Least Significant Bit
Tom and Dave from Security Justice
-Search for pics of Mubix gets you this
-Shmoocon will have another Podcasters Meetup and Hak5 will be there.
-List of Hacker/Security Con's
SSD Forensics:
- no physical security hooks that prevent them from being removed from enclosures
- ultraviolet laser to wipe out lock bits (encryption) from fuses on chips that secure SSDs
- overall easier to erase data on SSD (with encryption)
vs HDD Forensics:
- Harder to fully erase data 9have to overwrite or physically damage)
- easier to fully encrypt
Jim handy: hacker could easily unsolder NAND chips from an SSD
SSDs are hot, but not without security risks
Scott A. Moulton presentations on data recovery and forensics.
Securabit Website and Forums
IRC: #securabit on irc.feenode.net
Join us on LinkedIn
Skype Number: (469) 277-2248
Follow us on Twitter - Securabit
Delicious Tag: securabit
On this episode of SecuraBit:
Mubix posted an awesome link on his blog to a Multiboot Security DVD that allows you to choose which common security distros, all on one medium!
Backtrack 3
Damn Small Linux 4.2.5
GeeXBoX 1.1 (not geekbox )
Damn Vulnerable Linux (Strychnine) 1.4
Knoppix 5.1.1
MPentoo 2006.1
Ophcrack 1.2.2 (with 720 mb tables)
Puppy Linux 3.01
Byzantine OS i586-20040404
Some distros the Securabit guys would like to see added:
Helix
As noted on the Securabit website, a Fedora and Red Hat Enterprise Linux servers were compromised.
The ComputerWorld Blog - Linux Security Idiots article explains how the servers were compromised
-Stolen SSH keys are used to gain access to the system
-After that, rootkit "phalanx2" is installed and steals more SSH keys
-Obviously this could be used to install any malware at all
The RHEL offshoot CentOS was not affected by the compromise.
US CERT Joomla! Password Reset Vulnerability
Joomla Core Exploit Announcement - Password Remind Functionality
Joomla user password reset vulnerability being actively exploited
Italy tries to ban PirateBay
Awesome Quote: "Fear makes the wolf look bigger"
Originally Discovered by The Sunday Herald. As many as 8 million accounts compromised
Best Western Response
This exploit of Border Gateway Protocol allows the attacker to
Defcon presentation from Anton Kapela and Alex Pilosov
Border Gateway Protocol
Wired - Revealed: The Internet's Biggest Security Hole
Wired - More on BGP Attacks -- Updated
Jay Beale - Middler - Release it already!
Hiding information by slightly altering the binary sequence of a sound file
From simple algorithms that insert info in the form of signal
LSB coding (least significant bit):  substitute with a binary msg
Parity coding
Phase coding:  #  The original sound signal is broken up into
A Discrete Fourier Transform (DFT) is applied to each segment to create a matrix of the phases and Fourier transform magnitudes.
Phase differences between adjacent segments are calculated.
Phase shifts between consecutive segments are easily detected.
Spread spectrum
Two versions of SS can be used in audio steganography: the
Least Significant Bit
Tom and Dave from Security Justice
-Search for pics of Mubix gets you this
-Shmoocon will have another Podcasters Meetup and Hak5 will be there.
-List of Hacker/Security Con's
SSD Forensics:
- no physical security hooks that prevent them from being removed from enclosures
- ultraviolet laser to wipe out lock bits (encryption) from fuses on chips that secure SSDs
- overall easier to erase data on SSD (with encryption)
vs HDD Forensics:
- Harder to fully erase data 9have to overwrite or physically damage)
- easier to fully encrypt
Jim handy: hacker could easily unsolder NAND chips from an SSD
SSDs are hot, but not without security risks
Scott A. Moulton presentations on data recovery and forensics.
Securabit Website and Forums
IRC: #securabit on irc.feenode.net
Join us on LinkedIn
Skype Number: (469) 277-2248
Follow us on Twitter - Securabit
Delicious Tag: securabit