2015 Black Hat, DEF CON, BSidesLV Survival Guide

A couple weeks ago I wrote a post for veterans of so-called security summer camp, focusing on ways to get the most from it even if the mind has grown jaded. This week, I'm focusing on the newbies. Every year I try to offer some advice for people attending Black Hat, BSidesLV and DEF CON for the first time. As always, it's based on my personal experience. Everyone is different, ...

Continue reading

Data Breach Victims or Enablers?

Back in May,  my good friend Eric Cowperthwaite caused a stir with a blog post about security breach victims getting demonized for failing to prevent break-ins. Other industry friends passionately disagreed. My thinking on the matter continues to evolve. But as is usually the case, my thinking takes me to the middle. Companies that suffer a breach -- Home Depot and Target have been among this year's biggest poster children ...

Continue reading

5 Things a Revere, MA Upbringing Taught Me About Infosec

Growing up in Revere, Mass., taught me some very simple lessons about information security. Note: When people hear the name Revere, they think of these things: Paul Revere's ride, guns, the IROC-Z automobile, lots of gold chains and language that doesn't include the letter r at the end of a word. Information security? You probably think I've lost what little sanity I had. But I'm serious. Revere incident 1: Me and ...

Continue reading

Blackhat and Defcon Parties 2014

Back for the Blackhat and Defcon Parties 2014...FINALLY! Yet again, sorry I was late getting this published. Here is the list. It is a little short as I didn't take the time to include ones that have already filled up. You can try your hand with the remaining ones. Please note that this sched should work fine in most smart phone browsers. Also, feel free to leave a comment if ...

Continue reading

BH, DefCon, BSidesLV Primer

Many security professionals are making plans for a week in Las Vegas early next month for three big InfoSec conferences: Black Hat, Defcon and BSidesLV. I've been going for years and am familiar with what to expect and how to make the best use of my time there.  If you're a first-time attendee, however, the experience can be overwhelming. For that reason, each year I put together a survival guide ...

Continue reading

Is there a Cuckoo in your control system?

Notice: if you haven't read The Cuckoo's Egg by Cliff Stoll, STOP, go read the book (or at least watch the NOVA special) then come back. You can get a signed hardcover copy from the man himself for $20.  https://www.kleinbottle.com/ExtrasAndMisc.htm tl;dr - Defend your ICS against intruders: You need at least one person solely dedicated to hunting evil, Network Security Monitoring, and an ICS honeypot. ...

Continue reading

Aegis ICS Fuzzing Framework

https://twitter.com/bloerwald/status/448415935926255618 As you may or may not know, Adam Crain @jadamcrain and I have been working on an ICS/SCADA procotol fuzzing framework -Aegis- for a year now.  It is a generational type fuzzer that tests both the server/slave and client/master side of industrial protocols.  Adam originally wrote Aegis to test his openDNP3 protocol stack.  It turned out to be very effective in finding ...

Continue reading

“Cyber”: Critical to security nutrition

A few weeks ago, I sat down next to a friend who happened to be in the middle of a conversation between a lawyer, a hacker, and philosopher and I was just in time for the “I hate the word ‘cyber’. FamousHacker#2138123 and I are trying to get people to stop using it.” Sigh.  At this stage the anti-“cyber” routine is really starting to sound a little bit high ...

Continue reading

Nuggets from S4x14

Digital Bond's S4x14 is the first ICS/SCADA security conference of the year which means it gets the juices flowing again after the holidays.  This year was a little different than previous years as Dale Peterson chose the speakers based upon "New People, New Techniques, and New Process Impact."  Bringing new people and new ideas to tackle the problem of "insecure by design" ICS components.  There were about 50 more ...

Continue reading

Thank you from the Arlen family

Dear friends and strangers who have yet to become friends, When we arrived at R00tz Asylum, the kids’ electronic badges which we had volunteered to design and assemble were not complete. We needed to produce about 50 more badges. We knew we had some to make but we did not anticipate so many to be damaged or broken beyond repair in transit. With help, we pulled together people to pick ...

Continue reading