-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.xml
688 lines (439 loc) · 63 KB
/
index.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>CyberSecurity: Essentials</title>
<link>https://medina.github.io/index.xml</link>
<description>Recent content on CyberSecurity: Essentials</description>
<generator>Hugo -- gohugo.io</generator>
<language>en-us</language>
<lastBuildDate>Tue, 07 Mar 2017 23:31:42 -0500</lastBuildDate>
<atom:link href="https://medina.github.io/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Week6 Slides</title>
<link>https://medina.github.io/blog/week6-slides/</link>
<pubDate>Tue, 07 Mar 2017 23:31:42 -0500</pubDate>
<guid>https://medina.github.io/blog/week6-slides/</guid>
<description><p><a href="https://medina.github.io/static/Week06.pdf">Week06</a></p>
</description>
</item>
<item>
<title>Week6 Links</title>
<link>https://medina.github.io/blog/week6-links/</link>
<pubDate>Tue, 07 Mar 2017 21:07:58 -0500</pubDate>
<guid>https://medina.github.io/blog/week6-links/</guid>
<description>
<h3 id="events-and-conferences">Events and Conferences</h3>
<p><a href="https://www.usenix.org/conference/enigma2017/conference-program">Videos from Enigma 2017</a> are posted. I plan on watching <em>Secrets at Scale: Automated Bootstrapping of Secrets &amp; Identity in the Cloud</em>,</p>
<p><img src="https://medina.github.io/static/images/turtles-all-the-way.png" alt="turtles" /></p>
<p>&ldquo;<a href="https://en.wikipedia.org/wiki/Turtles_all_the_way_down">Turtles all the way down</a>&rdquo; as the presentation quips.</p>
<h3 id="application-security">Application Security</h3>
<p><a href="https://wikileaks.org/ciav7p1/">Wikileaks: CIA Hacking Tools Revealed</a> received a strange reception. Top comments on the <a href="https://www.nytimes.com/2017/03/07/world/europe/wikileaks-cia-hacking.html"><em>New York Times</em> coverage</a> seemed to be &ldquo;spies are paid to spy, this is why we have the CIA, why is anyone surprised?&rdquo;</p>
<blockquote>
<p>The documents amount to a detailed, highly technical catalog of tools. They include instructions for compromising a wide range of common computer tools for use in spying: the online calling service Skype; Wi-Fi networks; documents in PDF format; and even commercial antivirus programs of the kind used by millions of people to protect their computers.</p>
<p>In one revelation that may especially trouble the tech world if confirmed, WikiLeaks said that the C.I.A. and allied intelligence services have managed to compromise both Apple and Android smartphones. [&hellip;] By penetrating the user’s phone, the agency can make the encryption irrelevant by intercepting messages and calls before their content is encrypted, or, on the other end, after messages are decrypted.</p>
</blockquote>
<p>A reminder that breaking encryption on the wire may not be the most direct route to discovering &ldquo;clear-text&rdquo; communications.</p>
<p>If anyone here has ever used a &ldquo;web-based jailbreak kit&rdquo; on an older generation iPhone, this was surely leveraging a remote code execution (RCE) vulnerability of the sorts that are suggested here.</p>
<p>The EFF points out that <a href="https://www.eff.org/deeplinks/2017/03/hey-cia-you-held-security-flaw-information-now-its-out-thats-not-how-it-should">vuln-hoarding means software remains insecure</a>:</p>
<blockquote>
<p>The dark side of this story is that the documents confirm that the CIA holds on to security vulnerabilities in software and devices—including Android phones, iPhones, and Samsung televisions—that millions of people around the world rely on. The agency appears to have failed to accurately assess the risk of not disclosing vulnerabilities to responsible vendors and failed to follow even the limited Vulnerabilities Equities Process. As these leaks show, we&rsquo;re all made less safe by the CIA&rsquo;s decision to keep &ndash; rather than ensure the patching of &ndash; vulnerabilities. Even spy agencies like the CIA have a responsibility to protect the security and privacy of Americans.</p>
</blockquote>
<p>EPIC has more about <a href="https://epic.org/privacy/cybersecurity/vep/">VEP</a>.</p>
<hr />
<p><a href="https://openai.com/blog/adversarial-example-research/">Attacking machine learning with adversarial examples</a> is an unsettling survey of techniques that can really screw with machine learning software.</p>
<blockquote>
<p>Adversarial examples have the potential to be dangerous. For example, attackers could target autonomous vehicles by using stickers or paint to create an adversarial stop sign that the vehicle would interpret as a &lsquo;yield&rsquo; or other sign&hellip;</p>
</blockquote>
<p>This was <a href="https://www.usenix.org/conference/enigma2017/conference-program/presentation/papernot">also presented at Enigma</a></p>
<hr />
</description>
</item>
<item>
<title>Week5 Board Notes</title>
<link>https://medina.github.io/blog/week5-content/</link>
<pubDate>Thu, 02 Mar 2017 18:36:34 -0500</pubDate>
<guid>https://medina.github.io/blog/week5-content/</guid>
<description><p><a href="https://en.wikipedia.org/wiki/XcodeGhost">Malware infects apps via developer tools</a></p>
<p>Insider trading <a href="https://www.justice.gov/usao-sdny/pr/manhattan-us-attorney-announces-arrest-macau-resident-and-unsealing-charges-against">by hacking law firms</a></p>
<p>Classmate mentions the <a href="https://en.wikipedia.org/wiki/Ashley_Madison_data_breach">Ashley Madison Breach</a></p>
<p>Bill mentions the RSA Breach: <a href="http://blogs.rsa.com/anatomy-of-an-attack/">RSA Anatomy of an Attack</a></p>
<p>Cyber kill chain:</p>
<ul>
<li><a href="http://www.lockheedmartin.com/us/what-we-do/aerospace-defense/cyber/cyber-kill-chain.html">Glossy marketing</a></li>
<li><a href="http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf">Academic-style paper</a></li>
</ul>
<p><img src="https://medina.github.io/static/images/kill-chain.png" alt="Intrusion Kill Chain" /></p>
<p>&ldquo;Kill chain&rdquo; sounds ominous, &ldquo;<a href="https://en.wikipedia.org/wiki/Kill_chain">originally used as a military concept related to the structure of an attack</a>&rdquo;. Bill mentions others that have been re-purposed for cybersecurity, including <a href="https://en.wikipedia.org/wiki/Demilitarized_zone">DMZ</a>. <a href="https://en.wikipedia.org/wiki/Firewall_(computing)">Firewall</a> came from the barrier between the (dangerous) steam engine and the people in a the locomotive.</p>
<p>Viruses and worms seem to have a more organic origin. We have anti-virus, but no innoculation (or is that what patching is?)</p>
<p>Funny to think what names could have stuck, e.g., &ldquo;web application <a href="https://en.wikipedia.org/wiki/Stockade">stockade</a>&ldquo;</p>
<p>Question from a classmate: How to get into cybersecurity?</p>
<ul>
<li>Knowledge of basics &ndash; take this class :-)</li>
<li>Certifications</li>
<li>Experience from other domains, two popular routes: infrastructure (networking or sysadmin) or application dev</li>
</ul>
<p>Where do Mac addresses come from? Who gives out OUIs? <a href="http://www.iana.org/assignments/ethernet-numbers">IANA</a></p>
<p>What applications that run over HTTP? Lots of things can be tunneled over HTTP, but most common might be things like RDP (which has its own native remote desktop protocol).</p>
<p><img src="https://medina.github.io/static/images/week-5-notes-1.jpg" alt="notes" /></p>
<p><a href="https://en.wikipedia.org/wiki/HTTP_Public_Key_Pinning">HPKP</a> and <a href="https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security">HSTS</a> are trust-on-first-use (TOFU) headers sent by servers to &ldquo;modern&rdquo; web browsers that understand them to signal certain security behaviors. I made some snarky comments about the &ldquo;<a href="https://chromium.googlesource.com/chromium/src/net/+/refs/heads/master/http/transport_security_state_static.json">preload</a>&rdquo; form of this same data that ships with Chrome. More secure perhaps but doesn&rsquo;t seem like a great approach to ship static data like this. <a href="https://hstspreload.org/">Get your own domain listed</a>!</p>
<blockquote>
<p>Be aware that inclusion in the preload list cannot easily be undone. Domains can be removed, but it takes months for a change to reach users with a Chrome update and we cannot make guarantees about other browsers. Don&rsquo;t request inclusion unless you&rsquo;re sure that you can support HTTPS for your entire site and all its subdomains the long term.</p>
</blockquote>
<p>We got to talking about <a href="https://en.wikipedia.org/wiki/WebSocket">WebSockets</a> and whether they played nicely with firewalls. A classmate mentions that WebSockets could be used by advertisers to get around standard ad blockers (<a href="https://bugs.chromium.org/p/chromium/issues/detail?id=129353#c58">thread on Chrome-dev</a>)</p>
<p>Question from a classmate: TCP/IP network handling &ndash; what&rsquo;s handled in user space, what&rsquo;s kernel space?</p>
<p>A good article on the topic is Cloudflare&rsquo;s <a href="https://blog.cloudflare.com/why-we-use-the-linux-kernels-tcp-stack/">Why we use the Linux kernel&rsquo;s TCP stack</a>, which gives an &ldquo;it depends&rdquo; answer,</p>
<blockquote>
<p>The latency is very important for the HFT (high frequency trading) folks. Traders can afford custom hardware and fancy proprietary network stacks.</p>
</blockquote>
<p>In a side discussion, the question was motivated by thinking of attacks that could be triggered via crafted packets that could exploit the kernel directly. I like the way you think! This should be a fairly straight-forward &ldquo;unpacking&rdquo; of ones and zeros from the received network traffic, while keeping a small amount of state off to the side before handling the data off to an application in user-space for heavier processing.</p>
<p>One bit of code that <em>parses</em> network traffic are the packet dissectors we saw in Wireshark in the class. Each year there are <a href="https://www.wireshark.org/security/">dozens of security issues</a> reported in these dissectors, usually resulting in some denial of service (affecting only the Wireshark application) if its run against a payload with a specially crafted packet.</p>
<p><img src="https://medina.github.io/static/images/bookshelf.jpg" alt="bookshelf" /></p>
<p>I like the first four chapters of <a href="https://hpbn.co">High Performance Browser Networking</a> (free online) for &ldquo;Networking 101&rdquo;.</p>
<p><img src="https://medina.github.io/static/images/week-5-notes-2.jpg" alt="notes" /></p>
<p>Flows through a firewall, permitted in one direction (&ldquo;outbound to an HTTP server on port 80/TCP&rdquo;), with the firewall &ldquo;remembering&rdquo; state to permit the response traffic back from the web server to the ephemeral port on the client without needing a static rule.</p>
<p>The <a href="https://en.wikipedia.org/wiki/OSI_model">OSI model</a> vs real-world protocols. Diversity on the top and bottom, TCP/IP in the middle.</p>
<p>Not sure why but we were talking about the <a href="http://web.mit.edu/~simsong/www/ugh.pdf">Unix Haters Handbook</a> (free online) at some point in the back of the class.</p>
<blockquote>
<p>You know the real trouble with Unix? The real trouble is that it became so
popular. It wasn’t meant to be popular. It was meant for a few folks working
away in their labs, using Digital Equipment Corporation’s old PDP-11
computer. I used to have one of those. A comfortable, room-sized machine.</p>
</blockquote>
</description>
</item>
<item>
<title>Week5 Links</title>
<link>https://medina.github.io/blog/week5-links/</link>
<pubDate>Thu, 02 Mar 2017 15:29:31 -0500</pubDate>
<guid>https://medina.github.io/blog/week5-links/</guid>
<description>
<h3 id="cybercrime">Cybercrime</h3>
<p><a href="http://marissamayr.tumblr.com/post/157876672644/update-on-yahoos-security-incident">Update on Yahoo’s security incident</a> (also see <a href="https://investor.yahoo.net/secfiling.cfm?filingID=1193125-17-65791&amp;CIK=1011006">10K filing</a>):</p>
<blockquote>
<p>As those who follow Yahoo know, in late 2014, we were the victim of a state-sponsored attack &hellip; since this incident happened during my tenure, I have agreed to forgo my annual bonus and my annual equity grant this year and have expressed my desire that my bonus be redistributed to our company’s hardworking employees, who contributed so much to Yahoo’s success in 2016.</p>
</blockquote>
<h3 id="cryptography">Cryptography</h3>
<p><a href="http://valerieaurora.org/hash.html">Lifetimes of cryptographic hash functions</a></p>
<h3 id="application-security">Application Security</h3>
<p>Soon after we were playing with cookies and session management in class &ndash; using my Google account! &ndash; <a href="https://www.theregister.co.uk/2017/03/01/google_still_silent_on_mass_logout/">this happened</a>. This definitely affected my mobile GMail app.</p>
<blockquote>
<p>No change to report from the last update. We&rsquo;re still actively working to resolve issues with Identity/Authentication. Future updates will follow when there is significant progress to report.</p>
<p>To summarize; some long-lived OAuth tokens have inadvertently been invalidated. This may affect the following Cloud services and will manifest as authentication errors:</p>
<p>Cloud APIs using OAuth tokens, and related services that use them
gcloud SDK
Cloud Storage gsutil
Cloud Dataflow
Note: not all customers are affected by this.</p>
</blockquote>
<hr />
<p>The CloudFlare incident has caused a lot of back-and-forth between CloudFlare and Google&rsquo;s Project Zero (see Twitter for more)</p>
<ul>
<li><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=1139">Cloudflare Reverse Proxies are Dumping Uninitialized Memory</a></li>
<li><a href="https://blog.cloudflare.com/incident-report-on-memory-leak-caused-by-cloudflare-parser-bug/">Incident report on memory leak caused by Cloudflare parser bug</a></li>
<li><a href="https://blog.cloudflare.com/quantifying-the-impact-of-cloudbleed/">Quantifying the Impact of &ldquo;Cloudbleed&rdquo;</a></li>
</ul>
<hr />
<p>Project Zero also released a <a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=1011">Microsoft browser vulnerability</a> that went unpatched.</p>
<hr />
<p><a href="https://team-sik.org/trent_portfolio/password-manager-apps/">Password Manager Vulnerabilities</a></p>
<blockquote>
<p>At first sight, the requirements for a password manager application seem simple: Storing the passwords of a user centralized in a secure and confidential way. However, how is the reality on mobile, password manger applications, especially on Android? &hellip; Despite the vendors’ claims, is it nevertheless possible to obtain access to the stored credentials?</p>
</blockquote>
<hr />
<p><a href="https://www.troyhunt.com/data-from-connected-cloudpets-teddy-bears-leaked-and-ransomed-exposing-kids-voice-messages/">Data from connected CloudPets teddy bears leaked and ransomed, exposing kids&rsquo; voice messages</a></p>
<p><blockquote class="twitter-tweet" data-cards="hidden" data-lang="en"><p lang="en" dir="ltr">Here it is:<br>- Toy captured kids voices<br>- Data exposed via MongoDB<br>- 2.2m recordings<br>- DB ransom&#39;d<br>- And much more&hellip;<a href="https://t.co/HvePnZleXR">https://t.co/HvePnZleXR</a></p>&mdash; Troy Hunt (@troyhunt) <a href="https://twitter.com/troyhunt/status/836320506127101953">February 27, 2017</a></blockquote>
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<h3 id="other">Other</h3>
<p><a href="https://twitter.com/badthingsdaily">BadThingsDaily</a> &ndash; not so fictional worst-case drills, every day!</p>
<hr />
<p>Via a classmate, <a href="https://www.monster.com/career-advice/article/cybersecurity-suffers-from-talent-shortage">Cybersecurity Suffers from Talent Shortage</a>. Related, there may be some <a href="http://www.reuters.com/article/us-usa-cyber-nsa-idUSKBN1672ML">other cybersecurity folks entering the private job market</a>.</p>
</description>
</item>
<item>
<title>Week4 Board Notes</title>
<link>https://medina.github.io/blog/week4-content/</link>
<pubDate>Wed, 01 Mar 2017 03:28:04 -0500</pubDate>
<guid>https://medina.github.io/blog/week4-content/</guid>
<description><p><img src="https://medina.github.io/static/images/week-4-notes-1.jpg" alt="week-4-notes-1" /></p>
<p>A classmate recommends <a href="http://www.fredkaplan.info/dark-territory.htm">Dark Territory: The Secret History of Cyber War</a>. I&rsquo;ve reserved it at the library :-) Excerpt from the <a href="https://www.nytimes.com/2016/03/06/books/review/dark-territory-the-secret-history-of-cyber-war-by-fred-kaplan.html"><em>New York Times</em> review</a> in which life imitates art:</p>
<blockquote>
<p>Kaplan had access to several of these people, and so the book is peppered with many fascinating behind-the-scenes anecdotes. For example, it opens with the story of Ronald Reagan watching the 1983 Matthew Broderick hacker movie “WarGames,” which led him to ask for the first national security policy directive on information systems security.</p>
</blockquote>
<p>We got to talking about <a href="https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/">Stuxnet</a> when a classmate took us into the nasty details of how it infected embedded systems without leaving a trace.</p>
<p><a href="http://www.zerodaysfilm.com/"><em>Zero Days</em></a> is a movie on the subject that was mentioned (I haven&rsquo;t seen it yet).</p>
<p>We got into biometrics, including voice patterns. I had to mention that <a href="https://www.youtube.com/watch?v=n5GzlOpf3KA">famous plot element</a> from <a href="https://www.youtube.com/watch?v=LlKDkTbUFhU">Sneakers</a> (all-star cast!)</p>
<p><a href="http://www.nuance.com/for-business/customer-service-solutions/voice-biometrics/index.htm">Nuance Voice Biometrics</a> is one product that supports this.</p>
<p><a href="https://blog.fortinet.com/2013/08/14/security-101-smshing">Smshing</a> &ndash; phishing via SMS &ndash; was a new word for me.</p>
<p>We reviewed various password managers just in time for the news of the week for <a href="https://team-sik.org/trent_portfolio/password-manager-apps/">Password Manager Vulnerabilities</a>.</p>
<p>We also talked about different multi-factor authentication mechanisms, including things like <a href="https://www.yubico.com/products/yubikey-hardware/">Yubkey</a> hardware. These are all &ldquo;something you have&rdquo; proof mechanisms (as opposed to your password, which is &ldquo;something you know&rdquo;)</p>
<p>The <a href="https://xkcd.com/936/">XKCD comic</a> I&rsquo;d hinted at:</p>
<p><img src="https://imgs.xkcd.com/comics/password_strength.png" alt="xkcd" /></p>
<p><a href="https://xkcd.com/792/">There</a> <a href="https://xkcd.com/1286/">are</a> <a href="https://xkcd.com/538/">more</a> good ones.</p>
<p><img src="https://imgs.xkcd.com/comics/security.png" alt="xkcd" /></p>
<p>Microsoft explains <a href="https://technet.microsoft.com/en-us/security/dn785092">Pass the Hash</a> attacks.</p>
<p><a href="https://en.wikipedia.org/wiki/Stingray_phone_tracker">Stingrays</a> are fake cellular base stations law enformcent can use for surveillance purposes.</p>
<p><a href="http://www.theverge.com/2017/1/20/14334192/donald-trump-phone-android-security-president">What smartphone does POTUS use?</a></p>
<p><a href="http://www.mobiledit.com/sim-cloning/">SIM card cloning is a thing</a></p>
<blockquote>
<p>SIM Cloning Tool is only for forensic purposes. The cloned SIM will never connect to an operator’s network! The purpose of this tool is to isolate a phone from its network for secure investigations.</p>
</blockquote>
<p><img src="https://medina.github.io/static/images/week-4-notes-2.jpg" alt="week-4-notes-2" /></p>
<p><a href="https://en.wikipedia.org/wiki/Shamir's_Secret_Sharing">Shamir&rsquo;s Secret Sharing</a>, <a href="https://blog.cloudflare.com/red-october-cloudflares-open-source-implementation-of-the-two-man-rule/">Red October</a>, <a href="https://en.wikipedia.org/wiki/Shibboleth">Shibboleth</a>, &hellip;</p>
<p>By coincidence (see above) we mentioned <a href="https://en.wikipedia.org/wiki/WarGames"><em>WarGames</em></a> later, with the <a href="https://www.youtube.com/watch?v=8-T_uhQ0iE4">opening scene</a> having an example of a dual-key or split-key protocol.</p>
</description>
</item>
<item>
<title>Week4 Slides</title>
<link>https://medina.github.io/blog/week4-slides/</link>
<pubDate>Wed, 22 Feb 2017 20:24:55 -0500</pubDate>
<guid>https://medina.github.io/blog/week4-slides/</guid>
<description><p><a href="https://medina.github.io/static/Week04.pdf">Week04</a></p>
<p><img src="https://medina.github.io/static/images/fido-demo.gif" width="100%" /></p>
</description>
</item>
<item>
<title>Week4 Links</title>
<link>https://medina.github.io/blog/week4-links/</link>
<pubDate>Wed, 22 Feb 2017 20:24:50 -0500</pubDate>
<guid>https://medina.github.io/blog/week4-links/</guid>
<description>
<p>Spotted via <a href="https://news.ycombinator.com">HackerNews</a>, <a href="https://slashdot.org">Slashdot</a>, <a href="https://www.reddit.com/r/netsec/">/r/netsec</a>, <a href="http://www.oreilly.com/security/newsletter">O&rsquo;Reilly Security Newsletter</a>, <a href="https://twitter.com">Twitter</a>; via security bloggers including <a href="https://krebsonsecurity.com/">Krebs on Security</a>, <a href="https://www.troyhunt.com/">Troy Hunt</a>; from classmates; and elsewhere.</p>
<h3 id="events-and-conferences">Events and Conferences</h3>
<p><a href="https://www.rsaconference.com/">RSA Conference</a> <a href="https://www.youtube.com/playlist?list=PLeUGLKUYzh_j1Q75yeae8upX-T1FLmZWf">videos are online</a>.</p>
<h3 id="law-and-politics">Law and Politics</h3>
<p><em><a href="https://theintercept.com/2017/02/20/how-to-run-a-rogue-government-twitter-account-with-an-anonymous-email-address-and-a-burner-phone/">How to run a rogue government Twitter account</a></em>, sounds like fun. A good primer on operational security.</p>
<h3 id="cybercrime-stories">Cybercrime Stories</h3>
<p>From classmates.</p>
<p><a href="https://archives.fbi.gov/archives/newhaven/press-releases/2011/nh041311.htm">That time the FBI operated a botnet</a>.</p>
<p>&ldquo;<a href="http://www.independent.ie/business/personal-finance/property-mortgages/home-buyers-stand-to-lose-thousands-in-new-cyberattack-35424312.html">Friday Afternoon Fraud</a>&rdquo; and trying to <a href="https://www.lawsociety.ie/News/News/Stories/Launch-of-Cybersecurity-section/">raise lawyer&rsquo;s awareness of cybersecurity</a>.</p>
<blockquote>
<p>Cybercriminals are hacking the email accounts of Irish solicitors in an attempt to steal tens of thousands of euro from unsuspecting home buyers, the Sunday Independent has learned.</p>
<p>Dubbed &lsquo;Friday Afternoon Fraud&rsquo;, the conveyancing scam has been known to take several forms, but generally occurs when the hackers intercept emails between home buyers or sellers, and their solicitors.</p>
</blockquote>
<p>I had to look up <a href="https://en.wikipedia.org/wiki/Conveyancing">conveyancing</a>; in a real estate closing this is the transaction-clearing stage that often involves an escrow account.</p>
<p>In &ldquo;<a href="http://www.csoonline.com/article/3171937/security/hackers-behind-bank-attack-campaign-use-russian-as-decoy.html">Hackers behind bank attack campaign use Russian as decoy</a>&rdquo;, there seems to be a &ldquo;<a href="https://en.wikipedia.org/wiki/False_flag">false flag operation</a>&rdquo;. There&rsquo;s some nice <a href="https://baesystemsai.blogspot.ro/2017/02/lazarus-false-flag-malware.html">in-depth analysis</a> in the source link. This drives home a point about cyber attacks: <a href="https://twitter.com/thegrugq/status/706545282645757952">attribution is hard</a>. More on this from <em><a href="https://www.wired.com/2016/12/hacker-lexicon-attribution-problem/">Wired</a></em> and <em><a href="https://www.tenable.com/blog/attribution-is-hard-part-1">Tenable</a></em>.</p>
<h3 id="cryptography">Cryptography</h3>
<p><em><a href="https://jhalderm.com/pub/papers/interception-ndss17.pdf">The Security Impact of HTTPS Interception</a></em> is available again.</p>
<blockquote>
<p>[W]e assess the prevalence and impact of HTTPS interception by applying our
heuristics to nearly eight billion connection handshakes. [W]e find differing
rates of interception: 4.0% of Firefox update connections, 6.2% of e-commerce
connections, and 10.9% of U.S. Cloudflare connections were intercepted. While
these rates vary by vantage point, all are more than an order of magnitude
higher than previous estimates.</p>
</blockquote>
<p>There&rsquo;s supposed to be a <a href="https://github.com/zakird/tlsfingerprints">GitHub repo</a> appearing soon.</p>
<p><a href="https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html">SHA1 Collisions</a> were announced by Google and CWI Amsterdam. We know enough crypto to talk about why this is a big deal. The &ldquo;branded&rdquo; attack is <a href="http://shattered.io/">SHAttered</a>. <a href="https://arstechnica.com/security/2017/02/at-deaths-door-for-years-widely-used-sha1-function-is-now-dead/">Arstechnica</a> has more.</p>
<h3 id="application-security">Application Security</h3>
<p>Google&rsquo;s <a href="https://googleprojectzero.blogspot.com/">Project Zero</a> <a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=992">went full disclosure on Microsoft</a>. This is unrelated to the <a href="https://twitter.com/PythonResponder/status/826926681701113861">other vulnerability</a> that may have been actively exploited and were suppose to be fixed in the <a href="https://arstechnica.com/information-technology/2017/02/microsoft-cancels-february-patch-tuesday-despite-0-day-in-wild/">delayed February patches</a>.</p>
<p>We haven&rsquo;t covered CSRF yet, but new browser controls are starting to make an appearance that may ensure that <a href="https://scotthelme.co.uk/csrf-is-dead/">CSRF is dead</a>.</p>
<h3 id="other">Other</h3>
<p><a href="http://techblog.netflix.com/2017/02/introducing-netflix-stethoscope.html">Netflix announced a new security tool</a> that, in part, involves users in the security process.</p>
<p><a href="https://blogs.dropbox.com/tech/2017/02/meet-securitybot-open-sourcing-automated-security-at-scale/">Dropbox also announced a security tool</a> which similarly involves employees in triaging security events (should we talk about the possibility of insider threat here though?)</p>
</description>
</item>
<item>
<title>Week3 Board Notes</title>
<link>https://medina.github.io/blog/week3-content/</link>
<pubDate>Wed, 22 Feb 2017 20:24:21 -0500</pubDate>
<guid>https://medina.github.io/blog/week3-content/</guid>
<description><p><img src="https://medina.github.io/static/images/week-3-notes-1.jpg" alt="week-3-notes-1" /></p>
<p><a href="https://www.schneier.com/">Bruce Schneier</a>, who keeps an excellent blog, wrote <a href="https://www.schneier.com/books/applied_cryptography/">Applied Security</a>, which is an encyclopedia of cryptographic algorithms, but hasn&rsquo;t been updated since 1996.</p>
<p>From the class links, we got to talking about cross-border &ldquo;searches&rdquo; of your personal computing devices (including phones). This is on par with &ldquo;show me what&rsquo;s in your bag&rdquo;, per case law, although you may not be able to be compelled to turn over passwords. Also talked about &ldquo;Magic Lantern&rdquo; (again from links), where FBI could didn&rsquo;t bother going through the effort of brute-forcing the keys for encrypted disks. This segued to an incident following the <a href="https://en.wikipedia.org/wiki/2015_San_Bernardino_attack">San Bernardino</a> case in which the <a href="https://en.wikipedia.org/wiki/FBI%E2%80%93Apple_encryption_dispute">FBI wanted access to an encrypted iPhone</a>.</p>
<p>As a thought exercise we got into how they may have eventually gotten access to the device (latest article suggests an exploit may have been used, rather than the clone-and-brute-force method we got into). Classmate mentions &ldquo;NAN Cloning&rdquo;, and this article about *<a href="https://www.theguardian.com/technology/2016/sep/20/iphone-hacking-passcodes-nand-mirroring-password">$100 store-bought kit can hack into iPhone passcodes, researcher claims</a> is close to what we discussed. There&rsquo;s a take-away: the security of the iPhone is proving to hold up well, even when physical access to the device is compromised.</p>
<p>(I can&rsquo;t find the reference to &ldquo;PIN bot&rdquo;, a manual finger-press method, that was mention.)</p>
<p>At some point we got to talking about <a href="https://en.wikipedia.org/wiki/Edward_Snowden">Snowden</a> and two movies were mentioned, <em><a href="https://en.wikipedia.org/wiki/Snowden_(film)">Snowden</a></em>, the Oliver Stone movie and <em><a href="https://en.wikipedia.org/wiki/Citizenfour">Citizenfour</a></em>, a documentary.</p>
<p>Our media-sector classmate wasn&rsquo;t around so we didn&rsquo;t go too far into <a href="https://www.torproject.org/">Tor</a> and <a href="https://securedrop.org/">SecureDrop</a>. We did hit upon a bunch of ways that Tor users can be de-anonymized by adversaries like&hellip; the FBI. In one example, <a href="https://threatpost.com/fbi-mum-on-how-exactly-it-hacked-tor/117127/">they allegedly hacked browsers</a> from compromised sites they controlled.</p>
<p>Someone mentioned another vuln-for-hire case used by a government, where NSO Group&rsquo;s product was <a href="https://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/">used in the UAE</a>.</p>
<p>The new <a href="http://www.verizonenterprise.com/verizon-insights-lab/dbir/">Verizon Data Breach Investigations Report</a> (VZ DBIR) is coming soon, and in a preview, reports were circulating of a <a href="https://nakedsecurity.sophos.com/2017/02/13/universitys-iot-devices-went-fishing-for-information-how-did-it-happen/">mass IoT hack at a university</a>.</p>
<hr />
<p>We spent some time talking about <a href="https://www.kali.org/">Kali Linux</a>, which will be used in the more hands-on lab classes in the rest of the program. You can download this and try it out to get a head start. Browse the <a href="http://tools.kali.org/tools-listing">bundled tools</a> to find out more about them. We mentioned there&rsquo;s a lot of overlap between them; nobody knows all of them, you use the ones you know best for the job at hand. VMPlayer and <a href="https://www.virtualbox.org/">VirtualBox</a> can be used to run virtual machines.</p>
<hr />
<p>We got into audit, with our guest speaker going into some of the different approaches that can be taken with an &ldquo;audit&rdquo; &ndash; the terminology is all over the place and varies depending on the goals. Is it an &ldquo;audit&rdquo; or an &ldquo;assessment&rdquo;; &ldquo;black box&rdquo; testing vs &ldquo;white box&rdquo; testing (and everything in the middle).</p>
<p>After the Target breach, <a href="http://venturebeat.com/2014/03/26/lawsuit-against-target-and-trustwave-gets-the-security-standard-all-wrong/">Trustwave was sued</a>. They were the <a href="https://en.wikipedia.org/wiki/Qualified_Security_Assessor">Qualified Security Assessor (QSA)</a> who allegedly failed to identify issues during their point-in-time review of <a href="https://www.pcisecuritystandards.org/document_library">PCI DSS</a> compliance.</p>
<p>Talking about what happens when access is not properly managed, the <a href="https://en.wikipedia.org/wiki/2008_Soci%C3%A9t%C3%A9_G%C3%A9n%C3%A9rale_trading_loss">SocGen&rsquo;s rouge trader</a> drove home lessons about segregation of duties.</p>
<p>In an aside we talked about <a href="https://en.wikipedia.org/wiki/Chelsea_Manning">Chelsea Manning</a> who retrieved almost a half-million documents she had authorized access to, but in volumes that exceeded appropriate use of that authorized access.</p>
<p>Side comment about recent Twitter thread re &ldquo;<a href="https://twitter.com/fugueish/status/830638976687960066">pen testing is a lemons market</a>&rdquo; (in a strong <a href="https://en.wikipedia.org/wiki/The_Market_for_Lemons">economic sense</a>).</p>
<p><img src="https://medina.github.io/static/images/week-3-notes-2.jpg" alt="week-3-notes-2" /></p>
<p>Somehow got to talking about Bitcoin, robbing cybercurrency, which led to the <a href="https://medium.com/@pullnews/understanding-the-dao-hack-for-journalists-2312dd43e993">Ethereum / DAO hack</a>, which was a protocool-level attack.</p>
<p>I don&rsquo;t remember <em>how</em>, but we got to talking about <a href="https://en.wikipedia.org/wiki/Aadhaar">Aadhaar/UIDAI</a>, India&rsquo;s country-wide identity-issuance program.</p>
<p>We got into cyberwarefare with mention of <a href="https://arstechnica.com/security/2017/01/the-new-normal-yet-another-hacker-caused-power-outage-hits-ukraine/">hackers targeting Ukraine&rsquo;s power grid</a>. The <a href="https://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia">attacks on Estonia</a> a decade ago were significant and led to the <a href="https://en.wikipedia.org/wiki/Tallinn_Manual">Tallinn Manual</a>, a NATO-led study on the topic.</p>
<p>Microsoft recently shared <em><a href="https://blogs.microsoft.com/on-the-issues/2017/02/14/need-digital-geneva-convention/">The need for a Digital Geneva Convention</a></em> &ndash; as a classmate quips &ldquo;please don&rsquo;t hack Microsoft&rdquo;.</p>
<p><a href="https://haveibeenpwned.com/">Have I Been Pwned</a> (<em><a href="https://en.wikipedia.org/wiki/Pwn">to pwn</a></em>) is Troy Hunt&rsquo;s site to collect information from breaches into a searchable interface so you can know when your accounts are compromised.</p>
<p><a href="https://www.dhs.gov/topic/cybersecurity-information-sharing">ISACs</a> are threat-intelligence sharing groups aligned by sector, for example <a href="https://www.fsisac.com/">FS-ISAC</a> for financial services and <a href="http://www.ren-isac.net/">REN-ISAC</a> for universities. <a href="https://www.us-cert.gov/">US-CERT</a> is funded via DHS to provide data-sharing, incident response, and coordination.</p>
<hr />
<p>We talked about cybercrime laws and looked at <a href="http://cybercrime.gov">Cybercrime.gov</a>.</p>
<p>As an assignment, dig up a case, find some of the court filings, and discuss in the next class.</p>
<p>For example, <a href="https://www.justice.gov/opa/pr/alleged-international-hacker-indicted-massive-attack-us-retail-and-banking-networks">Alleged International Hacker Indicted for Massive Attack on U.S. Retail and Banking Networks</a> is a press release and <a href="https://www.wired.com/images_blogs/threatlevel/2009/08/gonzalez.pdf">USA vs Gonzalez</a> is the indictment filed in court.</p>
</description>
</item>
<item>
<title>Week3 Slides</title>
<link>https://medina.github.io/blog/week3-slides/</link>
<pubDate>Thu, 16 Feb 2017 16:32:12 -0500</pubDate>
<guid>https://medina.github.io/blog/week3-slides/</guid>
<description><p><a href="https://medina.github.io/static/Week03.pdf">Week03</a></p>
</description>
</item>
<item>
<title>Week3 Links</title>
<link>https://medina.github.io/blog/week3-links/</link>
<pubDate>Wed, 15 Feb 2017 23:25:59 -0500</pubDate>
<guid>https://medina.github.io/blog/week3-links/</guid>
<description>
<p>Spotted via <a href="https://news.ycombinator.com">HackerNews</a>, <a href="https://slashdot.org">Slashdot</a>, <a href="https://www.reddit.com/r/netsec/">/r/netsec</a>, <a href="http://www.oreilly.com/security/newsletter">O&rsquo;Reilly Security Newsletter</a>, <a href="https://twitter.com">Twitter</a>; via security bloggers including <a href="https://krebsonsecurity.com/">Krebs on Security</a>, <a href="https://www.troyhunt.com/">Troy Hunt</a>; from classmates; and elsewhere.</p>
<h3 id="events-and-conferences">Events and Conferences</h3>
<p><a href="https://www.rsaconference.com/">RSA Conference</a> is on now.</p>
<h3 id="hey-we-were-just-talking-about-that">Hey-we-were-just-talking-about-that</h3>
<p><a href="https://www.bloomberg.com/news/articles/2017-02-15/verizon-said-to-reach-revised-price-for-yahoo-in-wake-of-hacks">Verizon Said to Near Yahoo Deal at Lower Price After Hacks</a>, $250 million discount on a $5 billion deal.</p>
<h3 id="law-and-politics">Law and Politics</h3>
<p>What are the rules for <a href="http://www.theverge.com/2017/2/12/14583124/nasa-sidd-bikkannavar-detained-cbp-phone-search-trump-travel-ban">cybersearches when crossing broders</a>? Does anyone here take extra precautions, such as using a &ldquo;clean device&rdquo;?</p>
<p>Is <a href="https://securedrop.org/">SecureDrop</a> making it easier for government employees to leak? There are a LOT of leaks coming from the new administration, some of which have already cost the new national security advisor his job.</p>
<p><a href="https://www.us-cert.gov/ncas/current-activity/2017/02/10/Enhanced-Analysis-GRIZZLY-STEPPE">Enhanced Analysis of GRIZZLY STEPPE</a>, a deep-dive into recent attacks carried out by nation-state adversaries.</p>
<h3 id="cryptography">Cryptography</h3>
<p>There <em>was</em> a new paper called &ldquo;The Security Impact of HTTPS Interception&rdquo;, but I think it&rsquo;s been taken offline in advance of presentation at a conference in a few weeks. Abstract:</p>
<blockquote>
<p>As HTTPS deployment grows, middlebox and antivirus products are increasingly intercepting TLS connections to retain visibility into network traffic. In this work, we present a comprehensive study on the prevalence and impact of HTTPS interception. First, we show that web servers can detect interception by identifying a mismatch between the HTTP User-Agent header and TLS client behavior. We characterize the TLS handshakes of major browsers and popular interception products, which we use to build a set of heuristics to detect interception and identify the responsible product. We deploy these heuristics at three large network providers: (1) Mozilla Firefox update servers, (2) a set of popular e-commerce sites, and (3) the Cloudflare content distribution network. We find more than an order of magnitude more interception than previously estimated and with dramatic impact on connection security. To understand why security suffers, we investigate popular middleboxes and client-side
security software, finding that nearly all reduce connection security and many introduce severe vulnerabilities. Drawing on our measurements, we conclude with a discussion on recent proposals to safely monitor HTTPS and recommendations for the security community.</p>
</blockquote>
<h3 id="access-control">Access Control</h3>
<p><a href="https://medium.com/uber-security-privacy/introducing-the-uber-ssh-certificate-authority-4f840839c5cc">Introducing the Uber SSH Certificate Authority</a>, time-bound certificates for SSH authentication.</p>
<h3 id="application-security">Application Security</h3>
<p><a href="https://arstechnica.com/information-technology/2017/02/microsoft-delays-patch-tuesday-as-world-awaits-fix-for-smb-flaw/">If it&rsquo;s Patch Tuesday but there aren&rsquo;t any patches, is it really Patch Tuesday?</a></p>
<p><a href="https://blog.filippo.io/finding-ticketbleed/">Finding Ticketbleed</a>, deeply technical blow-by-blow of discovering a vulnerability in an implementation of a protocol by a vendor. But read the &ldquo;Disclosure&rdquo; section about performing &ldquo;responsible disclosure&rdquo; working with the vendor security team.</p>
<h3 id="other">Other</h3>
<p>What&rsquo;s the <a href="https://krebsonsecurity.com/2017/01/shopping-for-w2s-tax-data-on-the-dark-web/">going rate for W-2 forms</a>? Krebs answers&hellip;</p>
</description>
</item>
<item>
<title>Week2 Board Notes</title>
<link>https://medina.github.io/blog/week2-content/</link>
<pubDate>Wed, 15 Feb 2017 22:44:17 -0500</pubDate>
<guid>https://medina.github.io/blog/week2-content/</guid>
<description><p><img src="https://medina.github.io/static/images/week-2-notes-1.jpg" alt="week-1-notes-1" /></p>
<p><a href="https://www.kali.org/">Kali Linux</a>, LiveCD, VM Images, etc., providing Linux loaded with security testing tools.</p>
<p>Sidebar re: whether all Chip&rsquo;d cards include RFID (I don&rsquo;t believe they do).</p>
<p><a href="https://en.wikipedia.org/wiki/Ransomware">Ransomeware</a>, malicious software that tries to &ldquo;monetize the attack&rdquo; by requesting payment to decrypt hijacked files.</p>
<p><a href="http://export.gov/safeharbor/">Safe Harbor</a>, an agreement which allowed for data to be stored for customers across different countries which had equivalent data protection regimes.</p>
<p>rot13: &ldquo;Secret Decoder Ring&rdquo; with a 13-character shift.</p>
<p>Brute force: we assume an adversary like &ldquo;Eve&rdquo; who has the ability to monitor communications always has an attack such that she can attempt all possible decryptions across the entire key space. This is not efficient or cost-effective for the adversary.</p>
<p>Encode vs Encrypt: URL Encoding, Base64, and more&hellip; how to tell this isn&rsquo;t encryption? There&rsquo;s no &ldquo;key&rdquo;.</p>
<p><a href="https://en.wikipedia.org/wiki/The_Imitation_Game">Imitation Game</a>, recent movie about Alun Turing and the attempts to crack the Enigma machine during WWII.</p>
<p>Apps for encrypted communications: Facebook&rsquo;s WhatsApp, OWS Signal, TOR, Threema (new to me), &hellip;</p>
<p>Data in Transit, Data at Rest: may have different security requirements. Data at rest may be expensive to re-encrypt, and need to remain secure for longer.</p>
<p><em>Don&rsquo;t collect what you can&rsquo;t protect</em>, my advice start-ups trying to figure out what customer data to retain.</p>
<p>Key-wrapping example: There&rsquo;s a key to encrypt the disk of a multi-user system. Where&rsquo;s the key? How does each user get the key when they login? Key wrapping! The key that decrypts the disk can be wrapped separately under a key for each user. That way each of them can decrypt the encryption key, then decrypt the drive.</p>
<p><a href="https://en.wikipedia.org/wiki/Magic_Lantern_(software)">Magic Lantern</a>: how did the FBI deal with getting evidence from suspects who were using strong encryption? Brute-force the key? No, instead they installed a key-logger on the suspect&rsquo;s machine to capture the password / decryption key before seizing the encrypted disks.</p>
<p><a href="https://en.wikipedia.org/wiki/PBKDF2">PBKDF2</a>, a mechanism for converting a user-specified password into something suitable as a strong encryption key.</p>
<p><img src="https://medina.github.io/static/images/week-2-notes-2.jpg" alt="week-2-notes-2" /></p>
<p><a href="https://en.wikipedia.org/wiki/Alice_and_Bob">Alice and Bob</a>, our characters who want to communicate securely, and Eve and Mallory, our adversaries who have capabilities that allow them to eavesdrop on (monitor) and perform malicious modification to traffic between the two, respectively.</p>
<p>3DES is a way to take DES and address the problem of having too small a keyspace by performing multiple rounds. DES has 64-but-really-56-bit keys, but 3DES can be used to provide 112- or 168-bit keys.</p>
<p><img src="https://medina.github.io/static/images/week-2-notes-3.jpg" alt="week-2-notes-3" /></p>
<p><a href="https://www.troyhunt.com/understanding-http-strict-transport/">HSTS, Preload</a>, and <a href="https://en.wikipedia.org/wiki/HTTP_Public_Key_Pinning">HPKP / Pinning</a> are different mechanisms that provide hints from a server to a browser (well, actually that ship with the browser in the case of Preload) to strengthen the guarantees of TLS. Wikipedia helpfully points out that my calling HPKP &ldquo;certificate pinning&rdquo; is a misnomer.</p>
</description>
</item>
<item>
<title>about</title>
<link>https://medina.github.io/about/</link>
<pubDate>Wed, 01 Feb 2017 23:27:33 -0500</pubDate>
<guid>https://medina.github.io/about/</guid>
<description><p>These are course notes for <a href="https://www.sps.nyu.edu/professional-pathways/diplomas/advanced-diploma/cybersecurity/DIPL1-CE3220-cybersecurity-essentials.html">Cybersecurity Essentials</a>, the introductory course for the <a href="https://www.sps.nyu.edu/professional-pathways/diplomas/advanced-diploma/cybersecurity.html">Advanced Diploma in Cybersecurity</a> at <a href="https://www.sps.nyu.edu/">NYU School of Professional Studies</a>.</p>
</description>
</item>
<item>
<title>Week1, Week2 Slides</title>
<link>https://medina.github.io/blog/week2-slides/</link>
<pubDate>Wed, 01 Feb 2017 23:20:10 -0500</pubDate>
<guid>https://medina.github.io/blog/week2-slides/</guid>
<description><p>Goal is to get these up before each class:</p>
<ul>
<li><em><a href="https://medina.github.io/static/Week01.pdf">Week01</a></em></li>
<li><em><a href="https://medina.github.io/static/Week02.pdf">Week02</a></em></li>
</ul>
</description>
</item>
<item>
<title>Week2 Links</title>
<link>https://medina.github.io/blog/week2-links/</link>
<pubDate>Tue, 31 Jan 2017 00:06:26 -0500</pubDate>
<guid>https://medina.github.io/blog/week2-links/</guid>
<description>
<p>Spotted via <a href="https://news.ycombinator.com">HackerNews</a>, <a href="https://slashdot.org">Slashdot</a>, <a href="https://www.reddit.com/r/netsec/">/r/netsec</a>, <a href="http://www.oreilly.com/security/newsletter">O&rsquo;Reilly Security Newsletter</a>, <a href="https://twitter.com">Twitter</a>; via security bloggers including <a href="https://krebsonsecurity.com/">Krebs on Security</a>, <a href="https://www.troyhunt.com/">Troy Hunt</a>; from classmates; and elsewhere.</p>
<h3 id="events-and-conferences">Events and Conferences</h3>
<p><a href="https://www.usenix.org/conference/enigma2017">USENIX Engima 2017</a> is going on now.</p>
<p><a href="https://www.meetup.com/Empire-Hacking/events/234651821/">Empire Hacking</a>: Tuesday, February 7, 2017 @ 6:00PM</p>
<p><a href="https://www.meetup.com/owaspnycnj/events/236399988/">OWASP NY/NJ</a>: Wednesday, February 8, 2017 @ 11:00AM. Legal issues, changes in PCI DSS 3.2, and more.</p>
<h3 id="legal-and-politics">Legal and Politics</h3>
<p><a href="https://lawfareblog.com/assessing-draft-cyber-executive-order">Assessing the Draft Cyber Executive Order</a>: not officially released as scheduled, not sure the status.</p>
<p><a href="http://www.mit.edu/~specter/articles/17/deniability1.html">On Deniability and Duress</a></p>
<h3 id="access-controls">Access Controls</h3>
<p>New Facebook security features: <a href="https://www.facebook.com/notes/facebook-security/security-key-for-safer-logins-with-a-touch/10154125089265766">Security Key for safer logins with a touch</a> and <a href="https://www.facebook.com/notes/protect-the-graph/improving-account-security-with-delegated-recovery/1833022090271267">Improving account security with delegated recovery</a></p>
<h3 id="encryption">Encryption</h3>
<p><a href="https://www.troyhunt.com/https-adoption-has-reached-the-tipping-point/">HTTPS adoption has reached the tipping point</a>: <em>&ldquo;HTTPS adoption has now reached the moment of critical mass where it&rsquo;s gathering enough momentum that it will very shortly become &ldquo;the norm&rdquo; rather than the exception it so frequently was in the past.&rdquo;</em></p>
<p><a href="https://codeascraft.com/2017/01/31/how-etsy-manages-https-and-ssl-certificates-for-custom-domains-on-pattern/">How Etsy Manages HTTPS and SSL Certificates for Custom Domains on Pattern</a></p>
<p><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852751">[cryptkeeper] Sets the same password &ldquo;p&rdquo; for everything independently of user input</a>.</p>
<h3 id="application-security">Application Security</h3>
<p><a href="https://security.googleblog.com/2017/01/vulnerability-rewards-program-2016-year.html">Vulnerability Rewards Program: 2016 Year in Review</a>: $3,000,000 paid out in 2016</p>
<h3 id="other">Other</h3>
<p><a href="https://krebsonsecurity.com/2017/01/atm-shimmers-target-chip-based-cards/">ATM ‘Shimmers’ Target Chip-Based Cards</a>: <em>&ldquo;The reason shimmers exist at all is that some banks have apparently not correctly implemented the chip card standard, known as EMV (short for Europay, Mastercard and Visa).&rdquo;</em> What?! I didn&rsquo;t know this was a thing.</p>
<p><a href="http://robert.ocallahan.org/2017/01/disable-your-antivirus-software-except.html">Disable Your Antivirus Software (Except Microsoft&rsquo;s)</a> - What else to do about all these vulnerabilities in security products?!</p>
<p><a href="http://checkyourbackups.work/">Check Your Backups Day!</a> - an excellent idea.</p>
<h3 id="from-classmates">From Classmates</h3>
<h4 id="russian-central-bank-hack-wider-implications">Russian Central Bank Hack &amp; Wider Implications</h4>
<p>Dec 2016 – Hacker(s) stole more than $31MM from correspondent accounts at the Russian Central Bank, and accounts in commercial banks over the course of 2016</p>
<ul>
<li>Hackers broke into accounts faking client’s credentials</li>
<li>Bank provided few details, but did state they recovered some of the funds (Transfers were frozen.)</li>
<li>N. Korea is a “suspect&rdquo; due to rare piece of code, based on the way it is structured and functions which is similar to code used in previous attacks, e.g. Sony</li>
<li>Latest in a string of high-profile heists</li>
</ul>
<p>Unknown cyber criminals stole over $100MM from Bangladesh’s central bank that it had deposited at the New York Fed in Feb 2016.</p>
<ul>
<li>Law enforcement are hunting for criminals who stole the money using fraudulent wire-transfer request sent over the SWIFT (network that enables financial institutions worldwide to send and receive information about financial transactions in a secure, standardized and reliable environment) bank messaging network.</li>
<li>Symantec researchers have concluded that the global banking systems has been under attack from a sophisticated group dubbed “Lazarus”, which has been linked to N. Korea</li>
</ul>
<p>Banks at a recent meeting of President Obama&rsquo;s Commission on Enhancing Cybersecurity expressed frustrating at fighting hackers.</p>
<ul>
<li>Larger Banks are spending millions on protection, however, hackers are still getting in, often through small Banks, Vendors etc.</li>
<li>Institutions are only as strong as the weakest link, and there is calls for wider industry to strengthen so as to come in line with the large institutions.<br /></li>
<li>Will be a challenge for smaller Banks, Vendors due to cost</li>
<li>Increased need for real-time information sharing (e.g. FS-ISAC); calls to automate sharing with US Intelligence agencies and American corporations</li>
<li>Comes with privacy concerns</li>
<li>New Government to take up the discussion</li>
</ul>
<p>Ref:</p>
<ul>
<li>CNN: <a href="http://money.cnn.com/2016/05/18/technology/hackers-smaller-banks/?iid=EL">http://money.cnn.com/2016/05/18/technology/hackers-smaller-banks/?iid=EL</a></li>
<li>Reuters: <a href="http://www.reuters.com/article/russia-cenbank-cyberattack-idUSL1N1DX18S">http://www.reuters.com/article/russia-cenbank-cyberattack-idUSL1N1DX18S</a></li>
<li>Wall Street Journal: <a href="https://www.wsj.com/articles/hackers-steal-31-million-from-accounts-at-russian-central-bank-1480701080">https://www.wsj.com/articles/hackers-steal-31-million-from-accounts-at-russian-central-bank-1480701080</a></li>
</ul>
</description>
</item>
<item>
<title>Week1 Board Notes, Continued</title>
<link>https://medina.github.io/blog/week1-content-continued/</link>
<pubDate>Mon, 30 Jan 2017 23:36:34 -0500</pubDate>
<guid>https://medina.github.io/blog/week1-content-continued/</guid>
<description><p>Week 1 board notes continued&hellip;</p>
<p><img src="https://medina.github.io/static/images/week-1-notes-2.jpg" alt="week-1-notes-2" /></p>
<ul>
<li>Detection or Prevention: with a finite budget, where do you put your dollars?</li>
<li>DoS / DDoS: Denial of Service or Distributed Denial of Service, an attack against availability of a service.</li>
<li><a href="https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act">HIPAA</a>, <a href="https://en.wikipedia.org/wiki/Family_Educational_Rights_and_Privacy_Act">FERPA</a>, <a href="https://en.wikipedia.org/wiki/Federal_Financial_Institutions_Examination_Council">FFIEC</a> &ndash; different regulations and oversight bodies for different sectors.</li>
<li><a href="https://en.wikipedia.org/wiki/Personally_identifiable_information">PII</a>, <a href="https://www.sec.gov/about/offices/ocie/informationbarriers.pdf">MNPI</a>, <a href="https://www.pcisecuritystandards.org/pci_security/glossary">PCI Data</a>, <a href="https://en.wikipedia.org/wiki/Classified_information_in_the_United_States">NOFORN</a>, &hellip; different classifications of information sensitivity, driving the required protection schemes, sometimes enforced by law.</li>
<li>Retention policies <em>and destruction policies</em> are both important. <a href="https://www.dropboxforum.com/t5/Missing-files-and-folders/deleted-folder-re-appeared-after-a-couple-of-years/m-p/203016/highlight/true#M8819">Dropbox recently had some bad press</a> when a support issue was raised wherein user content was not being deleted as advertised. This privacy policy is now being updated.</li>
</ul>
<blockquote>
<p>Retention. We&rsquo;ll retain information you store on our Services for as long as we
need to do so to provide you the Services. If you delete your account, we&rsquo;ll
also delete this information. But please note there might be some latency in
deleting this information from our servers and backup storage.</p>
</blockquote>
<ul>
<li><a href="https://krebsonsecurity.com/all-about-skimmers/">All About Skimmers</a> from Brian Krebs.</li>
<li>A classmate correctly spots that certain skimmer attacks are an example of a real-world <a href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack">MITM</a>. When we get to <a href="https://en.wikipedia.org/wiki/Alice_and_Bob">Alice and Bob</a>, we&rsquo;ll use &ldquo;Mallory&rdquo; to be this active, malicious adversary.</li>
</ul>
</description>
</item>
</channel>
</rss>