Blackhat and Defcon Parties 2014

Back for the Blackhat and Defcon Parties 2014...FINALLY! Yet again, sorry I was late getting this published. Here is the list. It is a little short as I didn't take the time to include ones that have already filled up. You can try your hand with the remaining ones. Please note that this sched should work fine in most smart phone browsers. Also, feel free to leave a comment if ...

Continue reading

BH, DefCon, BSidesLV Primer

Many security professionals are making plans for a week in Las Vegas early next month for three big InfoSec conferences: Black Hat, Defcon and BSidesLV. I've been going for years and am familiar with what to expect and how to make the best use of my time there.  If you're a first-time attendee, however, the experience can be overwhelming. For that reason, each year I put together a survival guide ...

Continue reading

Is there a Cuckoo in your control system?

Notice: if you haven't read The Cuckoo's Egg by Cliff Stoll, STOP, go read the book (or at least watch the NOVA special) then come back. You can get a signed hardcover copy from the man himself for $20.  https://www.kleinbottle.com/ExtrasAndMisc.htm tl;dr - Defend your ICS against intruders: You need at least one person solely dedicated to hunting evil, Network Security Monitoring, and an ICS honeypot. ...

Continue reading

Aegis ICS Fuzzing Framework

https://twitter.com/bloerwald/status/448415935926255618 As you may or may not know, Adam Crain @jadamcrain and I have been working on an ICS/SCADA procotol fuzzing framework -Aegis- for a year now.  It is a generational type fuzzer that tests both the server/slave and client/master side of industrial protocols.  Adam originally wrote Aegis to test his openDNP3 protocol stack.  It turned out to be very effective in finding ...

Continue reading

“Cyber”: Critical to security nutrition

A few weeks ago, I sat down next to a friend who happened to be in the middle of a conversation between a lawyer, a hacker, and philosopher and I was just in time for the “I hate the word ‘cyber’. FamousHacker#2138123 and I are trying to get people to stop using it.” Sigh.  At this stage the anti-“cyber” routine is really starting to sound a little bit high ...

Continue reading

Nuggets from S4x14

Digital Bond's S4x14 is the first ICS/SCADA security conference of the year which means it gets the juices flowing again after the holidays.  This year was a little different than previous years as Dale Peterson chose the speakers based upon "New People, New Techniques, and New Process Impact."  Bringing new people and new ideas to tackle the problem of "insecure by design" ICS components.  There were about 50 more ...

Continue reading

Thank you from the Arlen family

Dear friends and strangers who have yet to become friends, When we arrived at R00tz Asylum, the kids’ electronic badges which we had volunteered to design and assemble were not complete. We needed to produce about 50 more badges. We knew we had some to make but we did not anticipate so many to be damaged or broken beyond repair in transit. With help, we pulled together people to pick ...

Continue reading

No security without maturity

Security vulnerabilities are the symptom, lack of IT maturity is the disease; information security is not the cure to security vulnerabilities, IT maturity is. It’s not unusual to see a company with hundreds if not thousands of known security defects, commonly called vulnerabilities, presents in their network, on servers and in applications. The tools to detect these defects are easy to purchase and run, the tools to deploy patches ...

Continue reading

Condoms and castles

We are spending billions on protecting the enterprise from hackers and malware, but we're letting the rest of the world burn around us. Most of what matters on the Internet isn't giant corporations or social networks, it's the average user, the person that doesn't know between a trojan and a sniffer. Whether you call them average joes, consumers, citizens or the unwashed masses, these are people that cannot defend themselves. ...

Continue reading

Vote For YOUR ISC2 Board of Directors

The election for the ISC2 Board of Directors is underway! The election runs from Nov 16 until Nov 30th. I need your votes! For those of you who have already voted, thank you so very much! When you're voting I should point out that there are THREE write in spots on that ballot as well. Oddly enough, there are three other "Horsemen" who didn't make it onto the ballot originally. Coincidence? ...

Continue reading