Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Diva Cupcake
Aug 15, 2005

wyoak posted:

In the US key disclosure is now protected under the fifth amendment, but I don't know about other countries, and I don't know how specific that ruling is either.
Case law on this is actually still unsettled in the US. District Court of Vermont (In re Boucher) and 11th Circuit Court of Appeals (US v Doe) held opposing views with the stipulation that if the contents are "generally known" by the government then revealing the key isn't self-incrimination. The Supreme Court hasn't yet ruled on it.

It'll get interesting when cases involving corporations refusing to comply with eDiscovery subpoenas start popping up.

Adbot
ADBOT LOVES YOU

Diva Cupcake
Aug 15, 2005

sarehu posted:

So the Apple thing is basically that on the iPhone 5C they're getting ordered to provide a signed firmware that'll let unlimited passcode attempts (or just reveal the password, or whatever). And this is something which would be technically impossible on later models. Right?
Correct. The 5C lacks the Secure Enclave of later models. Good rundown here...

https://blog.trailofbits.com/2016/02/17/apple-can-comply-with-the-fbi-court-order/

http://blog.cryptographyengineering.com/2014/10/why-cant-apple-decrypt-your-iphone.html

Diva Cupcake
Aug 15, 2005

How about starting with CIS's 20 Critical Security Controls and researching and understanding why each of them are implemented and how they fit into an enterprise environment?

Probably better to have a base knowledge than mucking around with Kali and Metasploit tutorials.

Diva Cupcake
Aug 15, 2005

Swagger Dagger posted:

For the people asking about learning infosec, I think you could do a whole lot worse than reading through these: https://www.humblebundle.com/books/no-starch-hacking-books

There are some stinkers on there (lol bitcoin, zombies), but a lot of the books are really good and it's hard to beat 15 bucks for the set.
Thanks. Silence on the Wire in particular is worth the price of the bundle alone.

Diva Cupcake
Aug 15, 2005

Mustache Ride posted:

Yeah, in the sit down the Sales Engineer had some intersting things to say about some of the questions I had, including, and I quote "We're not on Virustotal because we would catch everything and then the big 6 would use us as a reputation source and everyone would be using our engine."
I assume VirusTotal's new policy of Contribute or GTFO isn't going to be very good for Cylance.

http://blog.eckelberry.com/a-bomb-just-dropped-in-endpoint-security-and-im-not-sure-anyone-noticed/

Diva Cupcake
Aug 15, 2005

I've been using Eric Conrad's CISSP Study Guide almost exclusively and I think it's well done. Far less dry than the old Shon Harris one.

Diva Cupcake
Aug 15, 2005

Diametunim posted:

Anybody have tips for parsing PST files? I need to grab every email sent or received in an eight month time-span. Once I've done that I need to comb through the emails for certain keywords. I've tried using the built in advanced features in outlook but for some reason Outlook isn't returning all of the results. I'd like to do this programmatically but searching for python libraries that can parse PST files doesn't bring up much. Maybe this is a chance to export the PST and use one of the encase machines in my office.

Combing through peoples emails is really boring.
Are you exporting to PST from Exchange or Outlook? If Exchange you can do so via the shell. Start it off something like...

New-MailboxExportRequest -ContentFilter {((Received -ge "10/01/2015") -and (Received -le "12/31/2015")) -or ((Sent -ge "10/01/2015") -and (Sent -le "12/31/2015"))}

Diva Cupcake
Aug 15, 2005

BangersInMyKnickers posted:

Not sure how long ago you took it, but they gutted the crypto areas where they test you on thing like AES modes, stream ciphers, 2DES vulns, stuff like that. I took it right at the beginning of the new test and the coursework was still teaching to the old one so I got to review all that stuff anyway, but I don't think they asked anything beyond the names of the people in the RSA acronym.

I do agree that its worth doing as a first accreditation in to the field, but something of a bare minimum. The vouching process and experience requirements seems to at least done some good with keeping out the crash-course cert mill stuff.
I took it yesterday and you're right in that there were less than 5 questions on specific characteristics of algorithms (block/key sizing), which disappointed me since I knew that stuff on lock down.

The crypto stuff I got was more in line with how digital signatures work, what type of encryption is used for what, AH/ESP, etc...

Diva Cupcake
Aug 15, 2005

CLAM DOWN posted:

CISSP is quickly becoming a paper tiger cert imo, the material you learn is good but the cert itself is vastly overblown. If there's any way you can afford it, or get your company to pay for it, do a SANS course/cert. They're stupid stupid expensive.
It's been around forever and its usefulness hasn't really changed. Any multiple choice cert's value is always going to be with the opportunity it grants you via HR and recruiter filters, and the CISSP is one hell of an HR checkbox, especially if you work in DoD 8570 industries.

Technical chops (or managerial in the case of CISSP) should always get vetted during the actual interview process.

Diva Cupcake
Aug 15, 2005

CLAM DOWN posted:

I don't know what a "DoD 8570 industry" is, when we interview we do notice if you have a CISSP but it's not a filter in any way, and all it means is that you'd better know what you're fuckin talking about when we ask you security questions.
8570 is a directive that you literally cannot be allowed to work in a certain capacity within the DoD without applicable certifications. It applies to DoD contractors as well. The list itself is arbitrary and mostly worthless and you'll laugh at the groupings. The CISSP covers just about anything decent though.

http://iase.disa.mil/iawip/Pages/iabaseline.aspx

Diva Cupcake
Aug 15, 2005

Latest ShadowBrokers dump is apparently less of a nothingburger than their last one.

https://twitter.com/x0rz/status/852851891285487616

https://twitter.com/hackerfantastic/status/852851946146975744

Diva Cupcake
Aug 15, 2005

MS already released the out of band patch. Nice response.

https://twitter.com/msftsecresponse/status/861734360193552385

Diva Cupcake
Aug 15, 2005

That was certainly not doing the needful.

Diva Cupcake
Aug 15, 2005

Martytoof posted:

Welp, I'll be happy to keep dumping podcasts on there then I guess :3:

Dump away. I put Security Weekly and Risky Business on there all the time and only 1 hour has ever been audited, which was eventually approved after i wrote a recap of the pod.

Diva Cupcake
Aug 15, 2005

https://twitter.com/MabbsSec/status/893166585736724481
No word on charges.

Diva Cupcake
Aug 15, 2005

Here's the indictment.

https://www.documentcloud.org/documents/3912520-Marcus-Hutchinson-Indictment.html

Diva Cupcake
Aug 15, 2005

So this appears to be v bad.

Diva Cupcake
Aug 15, 2005

It's a no-priv RCE with a POC already in existence per the NIST calc. Good thing is that wsearch shouldn't be enabled by default on most servers.

https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?calculator&version=3&vector=(CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)

Diva Cupcake
Aug 15, 2005

Back online.

https://twitter.com/MalwareTechBlog/status/897180606005694464

Diva Cupcake
Aug 15, 2005

I would say the Georgia Weidman book is pretty boss as far as introductory penetration testing skills and methodologies go. It lines up pretty well as a study guide for OSCP as well.

Hacker Playbook 2 is also good.

Diva Cupcake
Aug 15, 2005

Cup Runneth Over posted:

Infinite job security

Diva Cupcake
Aug 15, 2005

The worst part of CISSP study for me was poo poo like knowing what the 2nd to last stage of the software capability maturity model is.

Kill Me. The stage is called Kill Me.

Diva Cupcake
Aug 15, 2005

Like 30 of my 40 CPEs were Security Weekly/Risky Business podcasts and watching SC Vendor Webcasts on lunch break. Shouldn't be too difficult to bang them out.

https://www.scmagazine.com/webcasts/section/6821/

Diva Cupcake
Aug 15, 2005

Is Revo Uninstaller still a thing? Probably that.

Diva Cupcake
Aug 15, 2005

dont touch the poop, etc.

https://twitter.com/GossiTheDog/status/912406976528863232

Diva Cupcake
Aug 15, 2005

I'm not 100% positive as my Exchange architecture is rusty but I'm fairly certain that the ECP virtual directory is necessary for users to set their OOO messages via OWA in Exchange 2013+.

Actual administrative functionality may still be disabled.

Diva Cupcake
Aug 15, 2005

Wait 2 hours. Someone on Twitter will RCE it through VNC or whatnot.

Diva Cupcake
Aug 15, 2005

EVIL Gibson posted:

Look up hackbox . It's like a oscp lab without paying anyone.
For reference...

https://www.hackthebox.eu

New boxes are released every week of varying difficulties. It's a lot of fun.

e:Also, this isn't cert related but you should definitely be playing with the SANS Holiday Hack Challenge.

https://holidayhackchallenge.com/2017/

Diva Cupcake
Aug 15, 2005

EVIL Gibson posted:

I think msfvenom is okay??
msfvenom is fine for the exam.

Diva Cupcake
Aug 15, 2005

Embargo is lifted.

Diva Cupcake
Aug 15, 2005

amazing

Diva Cupcake
Aug 15, 2005

Cylance and Carbon Black have announced compatibility with Microsoft patches but wont be setting the required registry key just in case clients are using multiple endpoint platforms that could be incompatible.

If you're using those you'll have to push out reg keys yourself.

Diva Cupcake
Aug 15, 2005

he/she wrote a manifesto on why swift was chosen.

https://pastebin.com/mSYM5HS4
https://swiftonsecurity.tumblr.com/post/96422201504/do-you-worry-that-reporting-on-the-leaks-from-an

Diva Cupcake
Aug 15, 2005

Docjowles posted:

In unrelated news: remember when everyone (including me) thought they were smart for dumping INTC shared before the embargo on Spectre/Meltdown was lifted?

They just hit a 5 year high today lmao
Equifax is only down 10% since their breach broke in September. Nothing matters.

Diva Cupcake
Aug 15, 2005

So this happened. I’m sure everything is fine.

https://twitter.com/evacide/status/975862319472234496

Diva Cupcake
Aug 15, 2005

Unless it's specifically for a required compliance checkbox don't start looking into penetration testing until you have you have your house in order. That means taking a look at the CIS Top 20 Security Controls and honestly assessing your organization's security maturity level. Take care of the low hanging fruit. Do vulnerability assessments. Remeditate. Do more vulnerability assessments. Fix that poo poo too.

https://learn.cisecurity.org/20-controls-download

You'll also want to read up on threat modelling. The below is a pretty good read as far as 600 page tomes about loving threat modelling go.

https://www.amazon.com/Threat-Modeling-Designing-Adam-Shostack/dp/1118809998

Diva Cupcake fucked around with this message at 14:29 on Apr 10, 2018

Diva Cupcake
Aug 15, 2005

whoops. lost my business model.

Diva Cupcake
Aug 15, 2005

Speaking of incompetent MSSPs and the SIEMs they run, thoughts on AlienVault?

Diva Cupcake
Aug 15, 2005

my bitter bi rival posted:

I just finished Spam Nation and enjoyed reading it. Does anyone have any recommendations for other narrative-based books about hacking or security? Surveillance Valley is also on my list.

Cuckoo’s Egg is obviously the great but if your inner BBS hacker teen didn’t love “Masters of Deception: The Gang That Ruled Cyberspace” then you’re wrong.

Adbot
ADBOT LOVES YOU

Diva Cupcake
Aug 15, 2005

AT&T is buying AlienVault. lol

quote:

AlienVault is excited to announce the intended acquisition by AT&T. This acquisition will bolster AT&T’s and AlienVault’s ability to deliver cybersecurity solutions, including threat intelligence, across all sales channels. AT&T will continue to invest in and build on AlienVault’s foundational technology as the company integrates AlienVault into AT&T’s cybersecurity suite of services.

AT&T will acquire the company, including all assets of AlienVault - the technology, platforms, infrastructure, talent including partner relationships and OTX communities. AT&T understands the value in AlienVault’s channels and expects to continue to work with our partners and MSSPs.

For now, this announcement has no impact on how we engage and support our partners, and it is business as usual and all interaction remains the same. Your account management, marketing and support teams continue to be focused on your success. There are no changes in licensing or delivery - we recognize that you have built service offerings on AlienVault’s USM platform and our commitment to you is unchanged.

This is an exciting time, and I am sure you have some questions. Right now, we’re focused on planning for a smooth transition to AT&T for our customers, partners and employees after close. Should you wish to address anything specific, feel free to reach out to me or your Channel Account Manager. Thank you for your partnership and we look forward to continued mutual success

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply