Sunday, December 13, 2009
Holiday wishes:
Monday, November 30, 2009
Whitehouse security breaches and Balloon hoaxes
Thursday, November 19, 2009
Should Windows be Free?
There are different meanings of "free" in this conversation. As the phrase goes "Free as in speech, not as in Beer". In one case free refers to open sourcing the code, and in the other, it means being available free of cost or licencing fee.
I suppose my question could be interpreted either way. In the free of cost point of view, they did with IE back in the Netscape era, and giving away Windows would certainly impact competition with Linux and Apple.
Some argue that Microsoft's own practices propagate much of the security issues we have today for example, if Windows was free this wouldn't happen (http://www.pcmag.com/article2/0,2817,2355982,00.asp). We would also not have to worry about Virtual Machines being considered entirely knew instances of the computer. The world would be such a simpler place if there was no need for hacked copies of Windows operating without security updates. How much of the botnet activity on the Internet can be traced to this? Consequently, I would be out of a job, as would entire research companies.
I won't get into the economic dilema's of solving problems entire industries are built around, but the term "disruptive technology" comes to mind. What would be more disruptive than an Open Source Windows OS? If Windows 7 was believed to be secure, and the average price of a laptop or desktop was nearly a factor of 10 less than Macintosh ($300 vs $3000 after hardware upgrades) how would that impact Apple? If the Open Source community were willing to use Windows would Linux be necessary?
Either way, an alternative revenue model would have to be created. Programmers deserved to be paid too. Whether this would be any better or worse than what we currently deal with would remain to be seen.
Monday, November 16, 2009
CEH Review Guide is Released !!
The process of writing was extremely interesting. Being my first one, I learned alot that will make the next one twice as easy so I definitely hope to do this again. Thanks to Larry, Nick and Barry for their help along the way.
Friday, November 13, 2009
A Reminder About Using Wifi On The Road
Thursday, November 12, 2009
Teaching Abroad - Germany
Thursday, October 29, 2009
Intense School featured on "The Today Show"
http://today.msnbc.msn.com/id/26184891#33530153
Thursday, October 22, 2009
Should practices tests be perfect?
Tuesday, October 20, 2009
Two Tenents of Teaching
Monday, September 28, 2009
Hacker Halted Wrap-up
Friday, September 25, 2009
Hacker Journals - Examples fast and noise free
Sunday, August 16, 2009
Series (2 of n): How practice questions work
- What do you want the tester to prove he understands?
- Is this better asked directly or indirectly?
- Should they answer the right answer or illiminate the from the wrong ones?
- Is this a question where distractin noise is appropriate, or should you just keep it short?
- What objective of the final "real exam" goal is this practice preaparing them for?
Thursday, August 13, 2009
Process Oriented Programming
Friday, August 7, 2009
"How to solve it"
These are probably the best four suggestions I can give a student on how to deal with the CEH/ECSA/LPT materials. Remembering first off that perhaps the most fundamental heuristic is "trial and error".
- If you are having difficulty understanding a problem, try drawing a picture.
- If you can't find a solution, try assuming that you have a solution and seeing what you can derive from that ("working backward").
- If the problem is abstract, try examining a concrete example.
- Try solving a more general problem first (the "inventor's paradox": the more ambitious plan may have more chances of success).
Wednesday, August 5, 2009
Series (1 of n): Using practice exams effectively
Part of the current book project I am doing involves writing practice questions. In doing this I have put a lot of thought into the topic and wanted to share some of that here.
First, just to get the controversial part out of the way, I believe in practice questions. They are ethical and it is fair to try to get them as close to the real thing as possible, at least in terms of scope, style, and difficulty level of the real test. That is my opinion and other instructors might disagree.
A risk of providing practice exams is realized if the student can subconsciously understand them to mean "The instructor is essentially taking this test for me, if I do what these questions say and I will pass." I say subconsciously because I have never heard a student actually say this out loud, but I can tell by the way they ask questions about the exam and their general preparation habits when this perception is taking hold. This is the source of the understandable criticism of practice tests, but it can be managed and handled correctly.
As I write the questions for the book, I am placing in some controls. In the interest of security-open-source-minded full disclosure I don't mind explaining them. The best cryptosystems are well known and understood, but are still hard to solve. That is the good model for practice exams as well. Along the way, discussions about real exams are likely to be brought up as well.
To keep the blog postings reasonable in size, I will address specific topics of practice exams, and how to get the most out of them over the course of several postings. In case you are working on some right now start with this thought:
“Practice exams are extensions of lab, lecture and other learning modes. Not replacements for them, and not shortcuts to avoid them.”
Monday, July 20, 2009
Never forget to enjoy ideas
Friday, July 17, 2009
Students are evolving faster than the courseware changes
Thursday, July 2, 2009
Student or Teacher?
Wednesday, July 1, 2009
Technical writing - "With style"
Friday, June 26, 2009
Don't underestimate a class that is "A mile wide, but an inch deep."
This got me thinking a bit about something that recent trends I have noticed has brought to light about the way students and training programs evolve together.
I often say that "there are entry level info sec classes but info sec is not an entry level topic". I think the reality however is that as IT assignments branch out, security becomes an efficient solution for bridging and broadening a persons understanding of IT no matter what their background. Sometimes people take infosec classes not so directly for security information, but for the unusual point of view. It is very unsanitized, imperfect at times, philosophical, and demands critical thinking.
CEH paired with CISSP is in a sense, a way to be exposed to an encyclopedic knowledge of all of the basics, from techie to management, from data to packets, and from apps to hardware. Being a mile wide is perhaps harder in some ways than being a mile deep. These classes are incredibly challenging for precisely this reason. Every student will find one chapter, module or domain that they think has been simplified into silliness. They will also encounter a portion of the class that is so unfamiliar it may seem the instructor has begun to speak a martian language. Yet to those who work in that area, it is as simple silly as the other aspect of the course was.
The first step is figuring out the difference, the second step is reconnecting the dots.
As any technology advances a compression phenomenon occurs. What once took a career to learn and master eventually becomes required basics just to attend a 5 day bootcamp. "Assumed knowledge" at this point to even enter the discussion of information security is more than many people even care to know in what would be gained in a lifetime of experience in IT.
The goals of technical training therefore needs to adapt to this. Bootcamps such as what we offer are designed to demonstrate key ideas that help the disparate parts of day to day experiences come together. Its like finding the one piece of a jigsaw puzzle that helps connect too other vary large assemblies. Sometimes however, a student grasps this catalyst, but has to wait until some time down the road to realize why it is important.
One thing we can absolutely guarantee is that all of the effort placed toward this goal will become useful at some point. No knowledge in info sec is wasted, no matter how unrelated it might seem to a current assignment.
Monday, June 22, 2009
Putting off the exam (reconsidered).
There was a still pause for a moment. He thought about work, schedule, distractions, other projects. He knew he took the bootcamp specifically to step away from those things for 5 grueling days to knock out this challenge. Then he said "Nothing will change, I see that I should just give it a shot on Friday then"
He realized it was unlikely that he would make time to study, and that once this training was over, the endgame was to be able to move on; not let it linger around for weeks and months. This is something everyone should consider before they attend a bootcamp. It is why it is so important to prepare your schedule to minimize interruptions and get pre-study materials to read up on topics before coming to class. You want to think about the follow through, the idea that the training will start a new process for your career, it is not the end of one.
When the week is over it is important to be able to move on.
Saturday, June 6, 2009
The mobile workforce and hacking (cont...)
On 6/03 I talked about getting a netbook and dual booting both Windows and Ubuntu. I was willing to swap out drives; being in the habit of days of old that meant having the drive bay with the plastic tray thing and the stack of 5.25 drives.
Nowadays that has been replaced with 8g SD cards that can be purchased for a few dollars a piece (I cannot wait for the day when a tube of them costs $4.99) The old is forever new and we are still running OSs from floppies (in essense, USB stick and SD Cards are just higher capacity floppies).
I knew this netbook thing could be done for some time, it is important to say that this technique isn't "news". Maybe it was a professional obligation to buy a netbook just for this reason. My budget manager wasn't buying as she knows I am on a 12 step for gadget problems. Students kept bringing them in with sh!t eating grins on their faces.
In less than 10 minutes I created two OS swap outs using UNetbootin(1). The major problems arose in getting certain OSs to like the Atom processor and the screen resolution of the netbook display. These are all things that will get worked out.
For the Ubuntu task I used "EasyPeasy"(2) which is optimised for netbooks and worked perfectly on the first try. It auto mounted the partitions on the drive with my netbook allowing access to all of the data. Essentially the only thing that would make this a better solution is if the netbook had two SD card slots so I wouldn't have to give up the one. (I like not having a USB key dangling off the side or having yet something else to carry around and keep track of. Mobile form factors should be as all inclusive as possible or they aren't mobile).
I digress; so what does all of this have to do with InfoSec? If you are asking that question keep reading this blog. This topic will be brought up alot mixed in with the other topics we have planned.
Some netbooks have wifi chipsets that support sniffing(3), but not yet packet injection it seems. Operating systems and tools can easily be stored on mini sdcardsg (the size of your fingernail) and carried around ready to boot on the right hardware. Google "wave" will likely change mobile collaboration forever(4). Skype and so on ..... what I am asking is that you take a moment connect the dots and imagine the possible scenarios..
The only thing left is cheap Internet everywhere all the time, and we all know that is coming one way or the other. Thats enoough for now, I need to change a diaper (not mine), but stay tuned for updates.
(1) http://en.wikipedia.org/wiki/UNetbootin
(2) http://www.geteasypeasy.com/index.php?menu=download
(3) http://clipmarks.com/clipmark/AB945FA1-6A1F-48CD-A12A-B962CB229572/
http://forum.eeeuser.com/viewtopic.php?id=13673
(4) http://wave.google.com/
Friday, June 5, 2009
Google operators work in GMail too
http://gmailblog.blogspot.com/2009/06/tip-slice-and-dice-your-mail-with.html
While you are at it, fans of the GTD (Getting Things Done) system who would like to adopt a Zero Inbox" policy might want to take a look at this:
http://www.43folders.com/izero
...and please have that inbox empty before coming to class :)
Wednesday, June 3, 2009
Software addiction is not just about security toys
Security hacking tools are just part of it. There are many other reasons to collect "tool packs" of usefull, simple utilities. Not just because many of these tools are free of cost (easier on the budget) but they can also have a tendancy to do just what you want and no more, install easily, be portable and leave small footprints. It depends on the criteria you select.
I just broke down and got a "netbook". I have been eyeing them for awhile, and always thought as cool as they were it was a gadget I didn't need. Then my eReader quit and left me stranded on a 4 hour flight, that was a mixed blessing because now I had my excuse to purchase a netbook.
Battery life is my single largest criteria for this hardware. I ended up with an Asus model that promises 9 hours. I was tempted to go the Ubuntu route, and I will likely one day pull out the drive and replace it with one I can install Ubuntu on and have an easy way to switch back and forth, but for now its Windows because that is what most of my customers use and will want to know about.
In order to remain within the spirit of portability, and I am going to try to meet as close to 100% of my portable computing needs on strictly USB portable software. This way I really never have to worry about restoring the system and spending a weekend reinstalling and licencing applications. (Yes I know, had I went with a Ubuntu model that capability would already exist simply by using apt)
As I compile the list, and have more experience with the netbook format, I will post updates to this blog. Eventually we will have the "Intense Toolkit" made available. I just don't want 4 different of the same tool, I want one each on a checklist of things that need to be carried.
Given this netbook is about the same size as the daytimer I used to carry around, and that with Skype support is is essentially either a small computer or a very large cellphone (whose battery lasts longer than the G1, sadly) depending on you you see it, So far I am very impressed. The potential for these things as hacking devices is only limited by the Atom processor, but in a year or two that will no longer matter.
In the meanwhile, check these two utility packs that offer a one-stop download for a collection of software you can start using now.
Google Pack
http://pack.google.com/intl/en/pack_installer.html
Lifehacker Pack
http://lifehacker.com/5271828/lifehacker-pack-2009-our-list-of-essential-free-windows-downloads?skyline=true&s=x
Friday, May 29, 2009
Password cracking: Time honored hack
Credentials are a balance between usability, invasivness, risk, and cost. Every time a "perfect" solution is presented there is always a "yeah, but....." that follows.
Being that passwords are the easiest and cheapest way to impliment credentials they are the most popular. In some systems, passwords are tied into asymetric keys that protect the symmetric key that protects the data. In some respects one could argue that having a password be the primary access point defeats the purpose and introduces risk itself (1)
Password cracking is a whole industry(2). DNA attacks (Distributed Networking Attacks), parallel processing and advances in collision detection are ongoing effort with big money behind them.
I ran across this spreadsheet that helps calculate the password cracking time measured against enforced policies.(3)
(1) http://searchwinit.techtarget.com/news/article/0,289142,sid1_gci850470,00.html
(2) http://www.infoworld.com/d/security-central/vendors-release-password-cracking-management-tools-737
(3) http://infoworld.com/d/security-central/test-strength-your-password-policy-437
Friday, May 22, 2009
Botnets succeed with the basics
Although many countries recognize this as a day of pranks, Conficker is a worldwide infection and most of its victims couldn't care less about April fool's day. The prank however is starting to become clear to researchers.
Turns out, some of the major variants of the malware are selling people fake security software.(1). Basic social engineering meets a vulnerability that has a patch (MS08-067). In fairness, the vulnerability was once a 0-day (Day zero of vendor awareness), but as of January 2009 many systems remained unpatched(2). For more information please take a moment to read the links below, and visit CVE(3) and working group(4) pages for the infection.
These are the fundamentals we discuss in the CEH class. The variables of any attack will change; the exploit, the access, and the vulnerability. The fundamentals are like a musician learning to play scales. They are basics, they work, and they are still the tune played in every attack.
To scan for conficker, download the latest version of nmap and run the following command:
nmap -PN -T4 -p139,445 -n -v --script=smb-check-vulns --script-args safe=1 IP
(Where IP is the address of the target being scanned.)
Links:
(1) http://www.darknet.org.uk/2009/04/conficker-finally-awakes-dumps-payload/
(2) http://en.wikipedia.org/wiki/Conficker
(3) http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4250
(4) http://www.confickerworkinggroup.org/wiki/
Wednesday, May 20, 2009
Everyone it seems, is "tweeting".
I am fascinated by this process and wondered if I am being left out.
In the last six months I have been taking informal polls during class and asking students what they think of twitter. About half to be fair have no idea what it is. The other half looks at me with a strange expression.
I pull up the website on the overhead projector and it says "Twitter is a service for friends, family, and co–workers to communicate and stay connected through the exchange of quick, frequent answers to one simple question: What are you doing?"
The class is silent and it is as if I can hear them thinking, "isn't the problem obvious?"
Curious as a hacker, I looked into the topic a bit further. I wondered that if someone wanted to let "followers" know exactly what they were doing how granular this could be. In a tech support forum they state:
What are the limits?
We're starting with a few limits based on various parameters, and we'll be adding more as time goes on. We reveal some limits only when you reach them, and tell you about others in advance. Twitter applies limits to any person who reaches:
- 1,000 total updates per day, on any and all devices
- 250 total direct messages per day, on any and devices
- 70 API requests per hour
- Maximum number of follow attempts in a day
Is twitter narcissism, extreme voyeurism or spam on steroids? Email is a necessity for business, but twittering is not (yet). People will volunteer their junk to extremes on twittter because the 140 character limit invites cleverness. Email can't imagine the ways people will embarrass themselves using the twitter service.
Regretful tweets are searchable by anyone with an account. To err is human. but to err on tweeter is archived forever. A service called Tweleted allows the search of deleted tweets.
On accessing the site (http://tweleted.com) the following error was given:
" Twitter's losing some messages from public view at the minute. It's not our fault! The results here might be temporarily vanished, not deleted. Click "check »" to be sure."
What data are we missing! (sarcasm)