Tenable Network Security Podcast - Episode 53
Welcome to the Tenable Network Security Podcast - Episode 53
Hosts: Paul Asadoorian, Product Evangelist & Kelly Todd, Compliance Analyst
Announcements
- Several new blog posts have been published this week, including:
- Be certain to check out our video channel on YouTube that contains the latest Nessus and SecurityCenter 4 tutorials.
- We're hiring! - Visit the web site for more information about open positions.
- You can subscribe to the Tenable Network Security Podcast on iTunes!
- Tenable Tweets - You can find us on Twitter at http://twitter.com/tenablesecurity where we make various announcements, provide Nessus plugin statistics and more!
Stories
- Netflow Rules - I think the characteristic of NetFlow data I like the best is that it's hard to hide from. Any time you compromise a network you leave a trace inside the NetFlow data. I still think there is interesting research in the area of attacking a network and making your attacks look as much like "normal" traffic as possible. It's sort of like the inmate escaping in the laundry truck.
- Man gets 10 years for VoIP hacking - Sounds like the "hacking" was brute-forcing prefix codes for several different VoIP providers. I find it interesting that we're going back to our roots and hacking phone systems, except look at how we have changed. Instead of just being curious, people are out to make big bucks by stealing services and reselling them. Good thing his girlfriend turned him in, otherwise I think he may have flown under the radar for some time.
- iPad Jailbreak and withholding 0Day - The story goes that there are two different groups looking to release the "jailbreak" for the iPad. One group released a new version that used a new exploit. Another group was scheduled to release yet a different exploit, but pulled back and is re-packaging with the already public exploit. I love it; jailbreakers are hiding the 0day from Apple and likely the rest of the world.
- Nessus XML parsing with awk - I love the command line, and I love quick and dirty ways to parse Nessus output from the command line even more. This is a really cool awk script to do just that.
- Microsoft Patch Tuesday & Oracle Patches - On this sad day, the day of October 12, 2010, Microsoft will release 16 security bulletins that will fix 49 vulnerabilities. Oracle will also release patches to fix 81 vulnerabilities (which now include Solaris and Java).
- MS10-070: Vulnerability in ASP.NET Could Allow Information Disclosure (2418042) (uncredentialed check) - Without logging into the target, this plugin can identify the missing MS10-070 patch.
Related Articles
- Podcast