<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>Jaded Security</title>
	<atom:link href="https://jadedsecurity.net/feed/" rel="self" type="application/rss+xml"/>
	<link>https://jadedsecurity.net</link>
	<description>Security commentary and analysis</description>
	<lastBuildDate>Tue, 05 May 2026 12:00:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<itunes:explicit>yes</itunes:explicit><itunes:image href="http://jadedsecurity.net/wp-content/uploads/2011/07/podcastimage.jpg"/><itunes:keywords>infosec,risk,news,rant,ISC2,information,Security,Risk,Policy,Drunks</itunes:keywords><itunes:summary>The Weekly Drunken Information Security Rant. We got the news, we got Hax0rs and don't the forget the Duck..&#13;
&#13;
We hate the CISSP and also are the only security show that has a a female "hax0r"  </itunes:summary><itunes:subtitle>JadedExposure</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Gadgets"/></itunes:category><itunes:owner><itunes:email>boris.sverdlik@jadedsecurity.com</itunes:email></itunes:owner><item>
		<title>Fifteen Years After AntiSec: What That Summer Actually Cost The Industry</title>
		<link>https://jadedsecurity.net/fifteen-years-after-antisec/</link>
		
		
		<pubDate>Tue, 05 May 2026 12:00:00 +0000</pubDate>
				<category><![CDATA[Opinion]]></category>
		<category><![CDATA[antisec]]></category>
		<category><![CDATA[hacktivism]]></category>
		<category><![CDATA[lulz]]></category>
		<guid isPermaLink="false">https://jadedsecurity.net/fifteen-years-after-antisec/</guid>

					<description><![CDATA[It is May 2026, which means it has been roughly fifteen years since a few people on IRC decided that the security industry as it existed deserved to be embarrassed in public, and proceeded to do exactly that, on a daily schedule, for about fifty days. LulzSec ran from early May to late June 2011. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>It is May 2026, which means it has been roughly fifteen years since a few people on IRC decided that the security industry as it existed deserved to be embarrassed in public, and proceeded to do exactly that, on a daily schedule, for about fifty days. <a target="_blank" rel="noopener" href="https://en.wikipedia.org/wiki/LulzSec">LulzSec</a> ran from early May to late June 2011. <a target="_blank" rel="noopener" href="https://en.wikipedia.org/wiki/Operation_AntiSec">Operation AntiSec</a> followed and lasted into 2012. The combined wave hit Sony, the Senate, the CIA&#8217;s public-facing site, the Arizona Department of Public Safety, the FBI&#8217;s <a target="_blank" rel="noopener" href="https://en.wikipedia.org/wiki/Sabu_(hacktivist)">InfraGard</a> contractor network, <a target="_blank" rel="noopener" href="https://en.wikipedia.org/wiki/Stratfor_email_leak">Stratfor</a>, and roughly two-dozen smaller targets I am not going to enumerate because the list is on Wikipedia and that is not what this post is about.</p>
<p>This post is about the bill. Not the criminal cases &#8211; those resolved years ago and they were not the actual cost. The actual cost was paid by the security industry itself, and the industry has been pretending it did not pay it ever since.</p>
<h2>What I wrote in 2011 that aged correctly</h2>
<p>I covered some of this in real time. <a href="/are-the-lulz-officially-over/">&#8220;Are the Lulz Officially Over?&#8221;</a> was published the day LulzSec announced their disbandment. <a href="/who-is-to-blame-for-the-success-of-the-latest-round-of-attacks/">&#8220;Who Is to Blame for the Success of the Latest Round of Attacks?&#8221;</a> was published a few weeks earlier, and the answer it gave then is the same answer that is still correct now: the people responsible for the success of those attacks were not the attackers. The attackers were good at what they did, but what they did was not technically remarkable. They ran SQL injections against unpatched web applications belonging to organisations that had certifications proving the SQL injections should not have been possible. The success of the attacks was a function of how much daylight existed between the certified posture of those organisations and what those organisations actually had running in production. That daylight was the size of a barn door. It is still that size.</p>
<p>The reason <a href="/another-fake-boutique-security-firm/">&#8220;Another Fake Boutique Security Firm&#8221;</a> got reposted by a half-dozen blogs in 2011 is because everyone who was paying attention had spent the previous year watching the same fake boutiques get publicly broken into without anyone noticing the contradiction. That contradiction has now been institutionalised. The fake-boutique class of vendor did not go away. It got bought.</p>
<h2>The through-line nobody wants to draw</h2>
<p>Look, here is the part I am tired of arguing about. The thing that <a target="_blank" rel="noopener" href="https://en.wikipedia.org/wiki/Hector_Monsegur">Sabu</a> and the rest of the AntiSec crew demonstrated in 2011 was not &#8220;look how easy it is to hack a Fortune 500.&#8221; That was already known. What they demonstrated was the response cycle. Specifically:</p>
<ol>
<li>The breach happens.</li>
<li>The victim&#8217;s PR team frames it as &#8220;a sophisticated, targeted attack&#8221; within forty-eight hours, regardless of whether the actual entry vector was a five-year-old SQL injection.</li>
<li>The compliance auditors arrive, scope the problem to the single application that got hit, and certify the rest of the environment as still compliant.</li>
<li>Six months later, a different actor walks in through an adjacent door using a similar primitive, and we redo the whole cycle.</li>
</ol>
<p>That cycle is the one Cl0p ran against MOVEit in <a target="_blank" rel="noopener" href="https://en.wikipedia.org/wiki/2023_MOVEit_data_breach">2023</a>. It is the cycle Cl0p ran against Accellion FTA before that. It is the cycle the people who hacked the Senate&#8217;s webserver in 2011 ran. The technical details have moved upmarket &#8211; file-transfer appliances instead of forum software &#8211; but the response cycle is structurally identical.</p>
<p>I keep waiting for the industry to admit this. It does not.</p>
<h2>The supply-chain narrative was already there in 2011</h2>
<p>Read the <a target="_blank" rel="noopener" href="https://web.archive.org/web/2011/http://lulzsec.com/">LulzSec press releases</a> in order. They make a specific argument, repeatedly, about the targets they picked. The argument is that the entities responsible for protecting consumer data &#8211; InfraGard contractors, security-certified law-enforcement liaisons, the certified-vendor pyramid &#8211; are themselves softer than the consumer-facing targets they are theoretically protecting. The argument is not subtle. It is in the actual press releases. They wrote it down.</p>
<p>What the security industry did with that argument was nothing. The argument was treated as edgelord posturing rather than as the prescient supply-chain warning it actually was. Sabu was indicted, became an FBI cooperator (per <a target="_blank" rel="noopener" href="https://www.justice.gov/">DOJ filings</a>; the timeline is well-documented at this point), and the cooperative phase rolled into the <a target="_blank" rel="noopener" href="https://en.wikipedia.org/wiki/Stratfor_email_leak">Stratfor leak</a>, which itself was a supply-chain compromise: a private intelligence firm whose customers expected confidentiality got its customer database dumped, and the rest of the threat-intelligence ecosystem responded by issuing a couple of press releases and then continuing to sell to the same customers.</p>
<p>The right take in 2011 was: the supply-chain attack is the future, and the security industry is institutionally unable to defend against it because the industry&#8217;s revenue model depends on the customer&#8217;s compliance posture being acceptable, not on the customer&#8217;s security posture being good. Some of us said exactly that. We were ignored.</p>
<h2>The &#8220;sophisticated nation-state&#8221; laundering operation</h2>
<p>The other thing AntiSec demonstrated, which I do not think the industry has internalised, is how fast a breach gets relabelled. Within weeks of LulzSec disbanding, every breach narrative shifted. Compromises that previously would have been blamed on script kiddies or underfunded IT teams started getting blamed on &#8220;sophisticated nation-state attackers.&#8221; The framing shift was not driven by the people doing the breaches changing. It was driven by the legal and insurance incentives changing. &#8220;We got hit by a nation-state&#8221; is a story that boards accept, that insurers underwrite, and that auditors do not have to second-guess. &#8220;We got hit because our patch cadence is six months and our WAF is in monitor-only mode&#8221; is a story that gets the CISO fired.</p>
<p>This is why fifteen years on we still get post-mortems on breaches like MOVEit that lead with &#8220;sophisticated&#8221; before the technical detail (a SQL injection in a file-transfer tool with default config) is even mentioned. The framing is laundering. It started in 2011-2012. It is now the default.</p>
<p>I have written this paragraph in five different posts at this point. I am going to keep writing it. Go ahead, tell me I am wrong.</p>
<h2>What changed for the better (a short list)</h2>
<p>I am cynical, not bitter. Some things did move:</p>
<ul>
<li>Mandatory disclosure regimes are real now. The <a target="_blank" rel="noopener" href="https://krebsonsecurity.com/">2023 SEC cyber-disclosure rule</a> is imperfect (we will get to that in a future post), but it forces public companies to file an 8-K within four business days of a material incident. That four-day window did not exist in 2011. In 2011, the public company in question would just decline to comment for a year.</li>
<li>The criminal-prosecution side caught up to the technical reality. Prosecutors now know what a Tor relay is, what an anonymising VPN is, what a leaked HOSTS file looks like. In 2011 the indictments occasionally read like science fiction. They have improved.</li>
<li>The EFF, Schneier, Krebs, the abuse.ch crew, and a handful of others built a body of public-record analysis that did not exist in 2011. <a target="_blank" rel="noopener" href="https://www.schneier.com/">Schneier was already there</a>, but the rest grew up after.</li>
</ul>
<p>That is the list. The list is not long.</p>
<h2>What did not change, and probably will not</h2>
<p>The industry is still organised around the compliance posture, not the security posture. Vendors still ship default credentials. Auditors still scope around the parts of the environment they do not want to look at. Insurance carriers still write policies that pay out on &#8220;sophisticated nation-state&#8221; but contest &#8220;we did not patch.&#8221; Boards still hire CISOs from the same fifteen-firm consulting pyramid.</p>
<p>Fifteen years after AntiSec, the most accurate single-sentence description of what AntiSec actually accomplished is this: it gave the industry a free preview of the next decade&#8217;s threat model, and the industry filed the preview under &#8220;miscellaneous&#8221; and went back to writing policy documents.</p>
<h2>What I would write in 2011 if I had today&#8217;s hindsight</h2>
<p>I would still write the posts I wrote, with one change. I would have spent more time naming the consulting firms that were certifying the breached environments, by name, in 2011 &#8211; not the AntiSec targets themselves, but the firms that signed off on those targets&#8217; compliance posture. Some of those firms are still in business. Some of them are public companies now. The certifications they sold in 2010-2012 covered the SQL-injectable web applications that AntiSec walked through, and the lawyers for those firms made sure none of the post-incident reporting linked the audit work product to the breach. That is the link that should have been drawn in public, in real time, and was not.</p>
<p>I am going to draw it now. The next post in this series is going to name the auditors. If you were on one of those engagement teams and you would like to push back, my contact form still works.</p>
<h2>For the record</h2>
<p>My older posts on the AntiSec era are still here, at their original URLs:</p>
<ul>
<li><a href="/are-the-lulz-officially-over/">Are the Lulz Officially Over?</a> (June 2011, the disbandment post)</li>
<li><a href="/lulzsec-declaration-of-war/">LulzSec Declaration of War</a> (May 2011)</li>
<li><a href="/antisec-shoot-the-sheriff-saturday/">AntiSec: Shoot the Sheriff Saturday</a> (June 2011)</li>
<li><a href="/who-is-to-blame-for-the-success-of-the-latest-round-of-attacks/">Who Is to Blame for the Success of the Latest Round of Attacks?</a> (June 2011)</li>
<li><a href="/another-fake-boutique-security-firm/">Another Fake Boutique Security Firm</a> (June 2011)</li>
<li><a href="/antisec-initiates-peaceful-protest/">#AntiSec Initiates Peaceful Protest?</a> (July 2011)</li>
<li><a href="/pbs-hacked-a-few-times-today-abhaxas-calls-them-out/">PBS Hacked a Few Times Today</a> (June 2011)</li>
<li><a href="/th3j35t3r-social-engineers-the-lulz/">th3j35t3r Social Engineers the Lulz</a> (June 2011)</li>
</ul>
<p>I am going to leave them alone. They are time capsules and they were correct then. Most of what they argued is still correct, which is the point of the post you just read.</p>
]]></content:encoded>
					
		
		
			<dc:creator>boris.sverdlik@jadedsecurity.com (Boris Sverdlik)</dc:creator></item>
		<item>
		<title>JadedSecurity » ISC2 Board of Directors 2013</title>
		<link>https://jadedsecurity.net/isc2-board-of-directors-2013/</link>
		
		
		<pubDate>Mon, 19 Aug 2013 12:00:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[board-of-directors]]></category>
		<category><![CDATA[isc2]]></category>
		<category><![CDATA[vote]]></category>
		<guid isPermaLink="false">https://jadedsecurity.net/isc2-board-of-directors-2013/</guid>

					<description><![CDATA[So another year and another ISC2 Board Nomination. I know I&#8217;ve been pretty much off the grid the last year, dealing with health and family stuff.. I am still 100% dedicated to the cause and with the new year coming up I&#8217;d like to throw my name in the ring again. We came awfully close last [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>So another year and another ISC2 Board Nomination. I know I&#8217;ve been pretty much off the grid the last year, dealing with health and family stuff.. I am still 100% dedicated to the cause and with the new year coming up I&#8217;d like to throw my name in the ring again. We came awfully close last year, so let&#8217;s see if we can do it again.  My platform is the same and I&#8217;d love to join Wim Remes and Dave Lewis to be your representative on the board.</p>
<p>Boris Sverdlik CISSP# 70063 as of 2/2005</p>
<p><a target="_blank" rel="noopener" title="LinkedIn" href="http://www.linkedin.com/in/bsverdlik">Linkedin Profile</a></p>
<p>&nbsp;</p>
<p>Thank you again for all your support.</p>
<p>&nbsp;</p>
<p><img decoding="async" alt="Screen Shot 2013-08-20 at 10.48.30 AM" src="http://jadedsecurity.net/wp-content/uploads/2013/08/Screen-Shot-2013-08-20-at-10.48.30-AM-300x40.jpg" width="300" height="40" /></p>
<p>To nominate me for the Ballot:</p>
<p>1) Send an email to  <a href="mailto:isc2board@jadedsecurity.com?Subject=ISC2%202012%20Board%20Vote">isc2board@jadedsecurity.com</a> pledging your support! THANKS in advance.</p>
<p>2) Subject: 2013 ISC2 Board of Directors  Petition</p>
<p>3) Message Text: I&#8217;d like to nominate Boris Sverdlik for the 2013 ISC2 Board of Directors. My E-mail address is on file with ISC2 and my CISSP# is $</p>
<p>&nbsp;</p>
<p>Platform:</p>
<p>I&#8217;m not going to promise things that I may or may not be able to deliver on, but I can promise I will stick to what I believe is a shared vision in the community for a value add certifying body. In order to change perception of the certification and the certifying body we need to change. The platform that  I have is relatively straight forward:</p>
<p>1. The current test does not adequately provide any assurance that the candidate has a firm grasp of real world security as a whole. It is geared towards individuals that are good at memorizing text and being able to test well on the subject. It is very reminiscent of the MSCE/CCNA of the 90s. The format needs to change beyond just being updated with the latest technology. I&#8217;d like to see some form of essay driven questions that would truly test the candidates knowledge of real world security problems and identify their logical thinking on how they would address them. This would be akin to the CCIE where candidates are required to actually fix hw/sw problems on Cisco gear to demonstrate aptitude.  This is one of the few ways I feel we can test true knowledge and eliminate the bootcamp mentality.</p>
<p>2. The pre-certification audit process also needs to be updated to provide assurance that the candidate has &#8220;real&#8221; security experience and to do this we must change the current endorsement process. ISACA requires that candidates have former employers and/or colleagues sign off on the attestation. ISC2 should do the same as this is the only way to attest to experience.</p>
<p>3. CPE requirements should be expanded so that they treat content producers and consumers equally. We produce a daily podcast, yet can only submit one hour of CPEs for the production of the content, while individuals who listen to the podcast can submit per episode. This is somewhat biased and puts off individuals from producing content and contributing to the community. We all agree that to be a good security practitioner you need to always stay up to date on the industry and there are many ways this can be done, outside of vendor driven conferences.</p>
<div style="float: right; margin-left: 10px;"><a target="_blank" rel="noopener" href="http://twitter.com/share?url=http://jadedsecurity.net/2013/08/19/isc2-board-of-directors-2013/&#038;via=jadedsecurity&#038;text=ISC2 Board of Directors 2013&#038;related=:&#038;lang=en&#038;count=horizontal" class="twitter-share-button">Tweet</a></div>
<div class="clear"></div>
</p></div>
]]></content:encoded>
					
		
		
			<dc:creator>boris.sverdlik@jadedsecurity.com (Boris Sverdlik)</dc:creator></item>
		<item>
		<title>JadedSecurity » SecZone 2012…</title>
		<link>https://jadedsecurity.net/seczone-2012/</link>
		
		
		<pubDate>Tue, 13 Nov 2012 12:00:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[bsideslv]]></category>
		<category><![CDATA[con]]></category>
		<category><![CDATA[defcon]]></category>
		<category><![CDATA[travel]]></category>
		<guid isPermaLink="false">https://jadedsecurity.net/seczone-2012/</guid>

					<description><![CDATA[Just a few short weeks left until Security Zone 2012 in Cali Colombia and the excitement is just building up. I am honored to of been chosen to present this year and I can&#8217;t wait. Ask anyone wh0 attended last year &#8220;What was your favorite conference of 2011?&#8221; and the overall response has been Security [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Just a few short weeks left until Security Zone 2012 in Cali Colombia and the excitement is just building up. I am honored to of been chosen to present this year and I can&#8217;t wait. Ask anyone wh0 attended last year &#8220;What was your favorite conference of 2011?&#8221; and the overall response has been Security Zone.</p>
<p>Edgar and his crew have done a top notch job of bringing everyone together for a world tour in a truly exotic location to some. The speakers selected are awesome, from Andy Ellis Keynoting to Wim Remes and Ian Amit to David Kennedy and Chris Nickerson just to name a few.  I can&#8217;t wait for what is sure to be a learning opportunity and an overall great time..</p>
<p>Big thanks to <a target="_blank" rel="noopener" href="https://www.twitter.com/seczone">Edgar Rojas</a> and  <a target="_blank" rel="noopener" href="http://www.securityzone.co/indexeng.html">Security Zone </a></p>
<p>Come see me present <a target="_blank" rel="noopener" href="http://www.securityzone.co/conference.html#boris">http://www.securityzone.co/conference.html#boris</a></p>
<div style="float: right; margin-left: 10px;"><a target="_blank" rel="noopener" href="http://twitter.com/share?url=http://jadedsecurity.net/2012/11/13/seczone-2012/&#038;via=jadedsecurity&#038;text=SecZone 2012...&#038;related=:&#038;lang=en&#038;count=horizontal" class="twitter-share-button">Tweet</a></div>
<div class="clear"></div>
</p></div>
]]></content:encoded>
					
		
		
			<dc:creator>boris.sverdlik@jadedsecurity.com (Boris Sverdlik)</dc:creator></item>
		<item>
		<title>Vote for Boris Sverdlik aka Jadedsecurity For ISC2 Board of Directors</title>
		<link>https://jadedsecurity.net/isc2-bod-vote-2012/</link>
		
		
		<pubDate>Wed, 22 Aug 2012 16:00:00 +0000</pubDate>
				<category><![CDATA[Opinion]]></category>
		<category><![CDATA[board-of-directors]]></category>
		<category><![CDATA[isc2]]></category>
		<category><![CDATA[vote]]></category>
		<guid isPermaLink="false">https://jadedsecurity.net/isc2-bod-vote-2012/</guid>

					<description><![CDATA[I know you must be all shocked to see this and frankly so am I. Wim Remes truly believes that bringing fresh blood to the board is working in a positive way to drive change for the better. Seeing that Dave Lewis is running (Vote for Dave) makes me feel that instead of sitting on [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I know you must be all shocked to see this and frankly so am I. <a href="http://twitter.com/wimremes" target="_blank">Wim Remes</a> truly believes that bringing fresh blood to the board is working in a positive way to drive change for the better. Seeing that <a href="http://twitter.com/gattaca" target="_blank">Dave Lewis</a> is running (<a href="http://www.liquidmatrix.org/blog/vote-for-dave/" target="_blank">Vote for Dave</a>) makes me feel that instead of sitting on the sidelines and bitching about it I should join the fight to drive change at ISC2.</p>
<p>I&#8217;m not going to promise things that I may or may not be able to deliver on, but I can promise I will stick to what I believe is a shared vision in the community for a value add certifying body. In order to change perception of the certification and the certifying body we need to change. The platform that  I have is relatively straight forward:</p>
<p>1. The current test does not adequately provide any assurance that the candidate has a firm grasp of real world security as a whole. It is geared towards individuals that are good at memorizing text and being able to test well on the subject. It is very reminiscent of the MSCE/CCNA of the 90s. The format needs to change beyond just being updated with the latest technology. I&#8217;d like to see some form of essay driven questions that would truly test the candidates knowledge of real world security problems and identify their logical thinking on how they would address them. This would be akin to the CCIE where candidates are required to actually fix hw/sw problems on Cisco gear to demonstrate aptitude.  This is one of the few ways I feel we can test true knowledge and eliminate the bootcamp mentality.</p>
<p>2. The pre-certification audit process also needs to be updated to provide assurance that the candidate has &#8220;real&#8221; security experience and to do this we must change the current endorsement process. ISACA requires that candidates have former employers and/or colleagues sign off on the attestation. ISC2 should do the same as this is the only way to attest to experience.</p>
<p>3. CPE requirements should be expanded so that they treat content producers and consumers equally. We produce a daily podcast, yet can only submit one hour of CPEs for the production of the content, while individuals who listen to the podcast can submit per episode. This is somewhat biased and puts off individuals from producing content and contributing to the community. We all agree that to be a good security practitioner you need to always stay up to date on the industry and there are many ways this can be done, outside of vendor driven conferences.</p>
<p>4. Financial Transparency is what we have all been asking for. ISC2 collects annual dues and has a responsibility as every responsible 501(c) to be transparent with accounting.</p>
<p>So Vote for Boris Sverdlik aka JadedSecurity</p>
<p><em>[Original embedded Google Form has expired.]</em></p>
<div class="clear"></div>
</p></div>
]]></content:encoded>
					
		
		
			<dc:creator>boris.sverdlik@jadedsecurity.com (Boris Sverdlik)</dc:creator></item>
		<item>
		<title>JadedSecurity » #FuckCancer</title>
		<link>https://jadedsecurity.net/fuckcancer/</link>
		
		
		<pubDate>Sat, 18 Aug 2012 12:00:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[cancer]]></category>
		<category><![CDATA[change]]></category>
		<category><![CDATA[friends]]></category>
		<category><![CDATA[lymphoma]]></category>
		<guid isPermaLink="false">https://jadedsecurity.net/fuckcancer/</guid>

					<description><![CDATA[So I guess I sort of came out this morning on Twitter about my recently diagnosed cancer.. I know I had shared it with a few people but have mostly limited by bitching about it to friends and family on Facebook. Long story short after my wife had pointed out that i had 2 lumps [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>So I guess I sort of came out this morning on Twitter about my recently diagnosed cancer.. I know I had shared it with a few people but have mostly limited by bitching about it to friends and family on Facebook.</p>
<p>Long story short after my wife had pointed out that i had 2 lumps on the side of my neck that looked &#8220;off&#8221; I had gone to a general practitioner who sent me to a specialist, who sent me for a biopsy. After a few weeks of back and forth I went from it&#8217;s probably nothing to you have a disease that &#8220;can&#8221; be treatable, isn&#8217;t curable, no real survivability stats available for your age because it usually effects older individuals. Yay Me..</p>
<p>It&#8217;s been a rough couple of months for me, more emotionally than anything else.. I&#8217;m not depressed or anything but every so often it hits me that I might not see my kid grow up.. Obviously I&#8217;m not giving up without a fight.. DefCon was hard enough for me trying to keep from breaking down during the fail panel when @mycurial was talking about Cancer. It all became real again after finding the new bumps in my neck this morning.   My wife and daughter are out of town so when the Dr said he wanted to see me ASAP, it freaked me out and I sent the tweet.</p>
<p>Guess the good news is the Oncologist isn&#8217;t too concerned with the new lumps.. He says it&#8217;s still not worth treating with radiation at this point, and I&#8217;m good for now..</p>
<p>I didn&#8217;t mean to put out my personal problems on Twitter, but the response from the community truly brought me to tears&#8230; I honestly can&#8217;t say thank you enough for all the warm wishes that were sent. I absolutely love our little community on Twitter, and I&#8217;m so honored to be a part of it. Many of us have never even met, but the support is overwhelming.  I wish I could thank each and every one of you&#8230; Thank you so much for cheering me up in my freaking out moment.  I love all of you guys!!</p>
<p>I know I definitely missed a few and I&#8217;m sorry in advance.. Special thanks goes out to in no particular order</p>
<p><a href="https://twitter.com/rodsoto" target="_blank">@rodsoto</a><br />
<a href="https://twitter.com/alexhutton" target="_blank">@alexhutton</a><br />
<a href="https://twitter.com/sp0rkbomb" target="_blank">@sp0rkbomb</a><br />
<a href="https://twitter.com/bmkatz" target="_blank">@bmkatz</a><br />
<a href="https://twitter.com/kylecooper" target="_blank">@kylecooper</a><br />
<a href="https://twitter.com/Forensication" target="_blank">@Forensication</a><br />
<a href="https://twitter.com/BillBrenner70" target="_blank">@BillBrenner70</a><br />
<a href="https://twitter.com/selenakyle" target="_blank">@selenakyle</a><br />
<a href="https://twitter.com/banasidhe" target="_blank">@banasidhe</a><br />
<a href="https://twitter.com/gillis57" target="_blank">@gillis57</a><br />
<a href="https://twitter.com/sukotto_san" target="_blank">@sukotto_san</a><br />
<a href="https://twitter.com/pinoles" target="_blank">@pinoles</a><br />
<a href="https://twitter.com/tothehilt" target="_blank">@tothehilt</a><br />
<a href="https://twitter.com/randomlyAnnoyed" target="_blank">@randomlyAnnoyed</a><br />
<a href="https://twitter.com/wimremes" target="_blank">@wimremes</a><br />
<a href="https://twitter.com/rattis" target="_blank">@rattis</a><br />
<a href="https://twitter.com/infosec_rogue" target="_blank">@infosec_rogue</a><br />
<a href="https://twitter.com/fjhackett" target="_blank">@fjhackett</a><br />
<a href="https://twitter.com/gattaca" target="_blank">@gattaca</a><br />
<a href="https://twitter.com/grap3_ap3" target="_blank">@grap3_ap3</a><br />
<a href="https://twitter.com/can0beans" target="_blank">@can0beans</a><br />
<a href="https://twitter.com/crshbsod" target="_blank">@crshbsod</a><br />
<a href="https://twitter.com/itsecurity" target="_blank">@itsecurity</a><br />
<a href="https://twitter.com/erratarob" target="_blank">@erratarob</a><br />
<a href="https://twitter.com/icristerna2" target="_blank">@icristerna2</a><br />
<a href="https://twitter.com/kylemaxwell" target="_blank">@kylemaxwell</a><br />
<a href="https://twitter.com/jack_daniel" target="_blank">@jack_daniel</a><br />
<a href="https://twitter.com/voulnet" target="_blank">@voulnet</a><br />
<a href="https://twitter.com/kittycommando" target="_blank">@kittycommando</a><br />
<a href="https://twitter.com/mccrory" target="_blank">@mccrory</a><br />
<a href="https://twitter.com/jmp_ebp" target="_blank">@jmp_ebp</a><br />
<a href="https://twitter.com/c0ncealed" target="_blank">@c0ncealed</a><br />
<a href="https://twitter.com/encryptedsorrow" target="_blank">@encryptedsorrow</a><br />
<a href="https://twitter.com/hrbrmstr" target="_blank">@hrbrmstr</a><br />
<a href="https://twitter.com/archangelamael" target="_blank">@archangelamael</a><br />
<a href="https://twitter.com/awpii" target="_blank">@awpii</a><br />
<a href="https://twitter.com/facelessloser" target="_blank">@facelessloser</a><br />
<a href="https://twitter.com/stylewar" target="_blank">@stylewar</a><br />
<a href="https://twitter.com/synackpwn" target="_blank">@synackpwn</a><br />
<a href="https://twitter.com/klhay" target="_blank">@klhay</a><br />
<a href="https://twitter.com/sparetimegeek" target="_blank">@sparetimegeek</a><br />
<a href="https://twitter.com/RogueClown" target="_blank">@RogueClown</a><br />
<a href="https://twitter.com/hhopk" target="_blank">@hhopk</a><br />
<a href="https://twitter.com/4DC5" target="_blank">@4DC5</a><br />
<a href="https://twitter.com/russ81" target="_blank">@russ81</a><br />
<a href="https://twitter.com/seczone" target="_blank">@seczone</a><br />
<a href="https://twitter.com/davienthemoose" target="_blank">@davienthemoose</a><br />
<a href="https://twitter.com/kydpror" target="_blank">@kydpror</a><br />
<a href="https://twitter.com/bond_alexander" target="_blank">@bond_alexander</a><br />
<a href="https://twitter.com/hacktalkblog" target="_blank">@hacktalkblog</a><br />
<a href="https://twitter.com/jaredsperli" target="_blank">@jaredsperli</a><br />
<a href="https://twitter.com/dave_rel1k " target="_blank">@dave_rel1k </a><br />
<a href="https://twitter.com/coolacid" target="_blank">@coolacid</a><br />
<a href="https://twitter.com/adamcaudill" target="_blank">@adamcaudill</a><br />
<a href="https://twitter.com/wikidsystems" target="_blank">@wikidsystems</a><br />
<a href="https://twitter.com/gozes" target="_blank">@gozes</a><br />
<a href="https://twitter.com/rmogull" target="_blank">@rmogull</a><br />
<a href="https://twitter.com/Savant42" target="_blank">@Savant42</a><br />
<a href="https://twitter.com/K0nsp1racy" target="_blank">@K0nsp1racy</a><br />
<a href="https://twitter.com/_funtime" target="_blank">@_funtime</a><br />
<a href="https://twitter.com/Josephwshaw" target="_blank">@Josephwshaw</a><br />
<a href="https://twitter.com/wendy451" target="_blank">@wendy451</a><br />
<a href="https://twitter.com/hackerhuntress" target="_blank">@hackerhuntress</a><br />
<a href="https://twitter.com/jackiea" target="_blank">@jackiea</a><br />
<a href="https://twitter.com/revrance" target="_blank">@revrance</a><br />
<a href="https://twitter.com/nafatigar" target="_blank">@nafatigar</a><br />
<a href="https://twitter.com/doocie2000ca " target="_blank">@doocie2000ca </a><br />
<a href="https://twitter.com/hacktress09" target="_blank">@hacktress09</a><br />
<a href="https://twitter.com/sukotta_san" target="_blank">@sukotta_san</a><br />
<a href="https://twitter.com/douglasbrush" target="_blank">@douglasbrush</a><br />
<a href="https://twitter.com/daveshackleford" target="_blank">@daveshackleford</a><br />
<a href="https://twitter.com/grey_area" target="_blank">@grey_area</a><br />
<a href="https://twitter.com/ltawfall" target="_blank">@ltawfall</a><br />
<a href="https://twitter.com/tomryanblog" target="_blank">@tomryanblog</a><br />
<a href="https://twitter.com/willsecurity" target="_blank">@willsecurity</a><br />
<a href="https://twitter.com/virtsean" target="_blank">@virtsean</a><br />
<a href="https://twitter.com/tkrabec" target="_blank">@tkrabec</a><br />
<a href="https://twitter.com/_fmm" target="_blank">@_fmm</a><br />
<a href="https://twitter.com/darr7h" target="_blank">@darr7h</a><br />
<a href="https://twitter.com/glesec" target="_blank">@glesec</a><br />
<a href="https://twitter.com/charleshooper" target="_blank">@charleshooper</a><br />
<a href="https://twitter.com/itsec_machete" target="_blank">@itsec_machete</a><br />
<a href="https://twitter.com/fl1bbl3" target="_blank">@fl1bbl3</a><br />
<a href="https://twitter.com/ammermanb" target="_blank">@ammermanb</a></p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a target="_blank" rel="noopener" href="http://twitter.com/share?url=http://jadedsecurity.net/2012/08/18/fuckcancer/&#038;via=jadedsecurity&#038;text=#FuckCancer&#038;related=:&#038;lang=en&#038;count=horizontal" class="twitter-share-button">Tweet</a></div>
<div class="clear"></div>
</p></div>
]]></content:encoded>
					
		
		
			<dc:creator>boris.sverdlik@jadedsecurity.com (Boris Sverdlik)</dc:creator></item>
		<item>
		<title>JadedSecurity » Blackhat, BSidesLV and DefCon Oh My…</title>
		<link>https://jadedsecurity.net/blackhat-bsideslv-and-defcon-oh-my/</link>
		
		
		<pubDate>Tue, 31 Jul 2012 12:00:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[blackhat]]></category>
		<category><![CDATA[bsideslv]]></category>
		<category><![CDATA[con]]></category>
		<category><![CDATA[defcon]]></category>
		<category><![CDATA[travel]]></category>
		<guid isPermaLink="false">https://jadedsecurity.net/blackhat-bsideslv-and-defcon-oh-my/</guid>

					<description><![CDATA[And just like that Security Summer Camp has come to another end.. We do it every year, a week of Friends, Talks and debauchery among the security industry which can often times outdo a college frat party.  This year was somewhat different for me than in years before in that I had actually managed to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>And just like that Security Summer Camp has come to another end.. We do it every year, a week of Friends, Talks and debauchery among the security industry which can often times outdo a college frat party.  This year was somewhat different for me than in years before in that I had actually managed to get to BlackHat and remember why I have come to loathe the conference more and more than in the past.</p>
<p>I remember when BlackHat meant that it was time to see things that we would only hear about on IRC and other non conventional means. Sadly, this is no more. As others have pointed out BlackHat is now the new <a target="_blank" rel="noopener" href="http://www.darkreading.com/blog/240004519/black-hat-s-graduation.html">RSA</a>. It represented RSA as much as any other corporate sponsored conference.  Vendors were set up with their RFID scanners ready to stalk you post conference with all their wonderful spam&#8230; Good thing for me a certain colleague had allowed me to scan his card with my phone, and even better yet I was able to replay it for all.. Thanks Martin <img src='http://jadedsecurity.net/wp-includes/images/smilies/icon_wink.gif' alt=';)' class='wp-smiley' /> </p>
<p>There were some interesting talks, but nothing like it used to be.  The main problem to me anyway was the ambience of vendors and the proliferation of FUD that we as an industry have been subjected to more and more in recent times. Hallway con was where it was at for the majority of the conference. I had bounced between the Galleria and the SeaHorse for the majority of the event and as usual had nothing but interesting conversation with old friends as well as new ones.</p>
<p>The upside for being in Vegas for BlackHat, is that BsidesLV runs concurrently..  BSidesLV and BSides in general always tend to be much better events. The attendees are rarely the industry vendor mouthpiece types and this alone makes the conference enjoyable. I had attended more talks at BSides than I have at other conferences combined this year.  Johnny Cocaines open discussion forum on ethics was probably the most enjoyable to date.  The room had almost cleared when he had said that this was going to be a discussion as opposed to a talk. The people who stayed got to enjoy a great roundtable type of debate.  Obviously it being in the underground track precludes me from discussing the details, but I can say I hope we see more of these types of talks. I even got to do a last minute lightening talk on my upcoming presentation which I thought went fairly well..</p>
<p>The venue for BsidesLV is small and as such can feel cramped, but @banasidhe worked her magic once again keeping everything in check.. I personally really enjoyed it and would take it over Blackhat any time..</p>
<p>Next up DefCon, well what can I say about DefCon that hasn&#8217;t been said already? Well, let me think.. oh yeah.. You kinda suck! First off WTF is up with wireless village being set up in a closet? Really?? I remember when all of us sat around conference tables tinkering with wep cracking and the likes. With all of the wireless technologies now being researched are we seriously supposed to be able to converse in such a small room? It was smelly and overall pretty bad experience. The SecCTF and other contest rooms had literally 10x the size. Why were we limited? Ok Rant off for now..</p>
<p>Overall it wasn&#8217;t a bad year for DefCon, some really good talks combined with some really shitty ones. Hallway Con Once again takes over for most of the event. I did go to see a bunch of sky talks as well as some others. Dave Kennedy and friends tore the roof off their presentation with Bananas and a video with hundreds of shells popping up thanks to their SCCM hack.  Some other notable talks were around javascript bots which was hilarious from what I had heard. Overall, I would of went to more talks if the lines weren&#8217;t atrocious.  I guess with 15K people, you should expect not to get in to see the talks you want to..</p>
<p>I was also at the last minute asked to wear a mankini during the Comedy Jam/Fail Panel for Charity. While I would rather not post any pictures, I do have to say it was great to be on the panel with such an interesting bunch of characters. @rmogul kicked ass with his TSA talk, Larry Pesce talk on fail was just perfect.. It was a blast serving waffles to the hungry masses with McKeay and Jack Daniel.  I hate to admit it but @myrcurial had almost made me cry on stage when he was talking about how many people are/have been effected by cancer.  I&#8217;m so happy knowing that @Wendy451 @gattaca&#8217;s wife and others have beat their battles and not looking forward to my own..  I&#8217;m so proud of our communities persistence in supporting the causes that plague us all. THANK YOU!</p>
<p>The Elitism that everyone has talked about is apparent, but it&#8217;s apparent in all circles not just ours. As some had said no one wants to flip the bill for 15K people, so there might be some parties you just might not get into. However it&#8217;s not always about the parties.. It&#8217;s about meeting people, learning new things and hanging out with old friends. If it wasn&#8217;t for our podcast, I wouldn&#8217;t of gotten a ninja networks invite despite all of our contributions to the industry. It is a friends and family thing and there isn&#8217;t anything wrong with that. You want in, then as Timay (303) and @jericho had said during their talk on the CISSP. You need to be Bad Ass at what you do and you will get noticed.  Get out of your shell and start meeting people and engaging conversations.</p>
<p>It&#8217;s not just about getting in to the parties it&#8217;s also about mingling once you are there. Keep networking and your invites will come.  To be honest almost every party that I had attended, I ended up just chatting with friends. The best talks I had all weekend were in the smoking area by registration and not in any party wehre the music is way to loud to hear yourself think.</p>
<p>Finally, I&#8217;d like to thank my followers for posting these all over the ATMs at the RIO.. It brought me nothing but laughs&#8230;</p>
<p><a href="http://jadedsecurity.net/wp-content/uploads/2012/07/dontclick.jpeg"><img fetchpriority="high" decoding="async" class="alignleft size-medium wp-image-865" title="dontclick" src="http://jadedsecurity.net/wp-content/uploads/2012/07/dontclick-300x225.jpeg" alt="" width="300" height="225" /></a></p>
<div style="float: right; margin-left: 10px;"><a target="_blank" rel="noopener" href="http://twitter.com/share?url=http://jadedsecurity.net/2012/07/31/blackhat-bsideslv-and-defcon-oh-my/&#038;via=jadedsecurity&#038;text=Blackhat, BSidesLV and DefCon Oh My...&#038;related=:&#038;lang=en&#038;count=horizontal" class="twitter-share-button">Tweet</a></div>
<div class="clear"></div>
</p></div>
]]></content:encoded>
					
		
		
			<dc:creator>boris.sverdlik@jadedsecurity.com (Boris Sverdlik)</dc:creator></item>
		<item>
		<title>DEFCON NinjaTel</title>
		<link>https://jadedsecurity.net/defcon-ninjatel/</link>
		
		
		<pubDate>Mon, 30 Jul 2012 13:00:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[con]]></category>
		<category><![CDATA[defcon]]></category>
		<guid isPermaLink="false">https://jadedsecurity.net/2012/07/30/defcon-ninjatel/</guid>

					<description><![CDATA[DEFCON 20 did not disappoint. Among the many highlights was the NinjaTel operation &#8211; a fully functional mobile phone network set up at the conference. The NinjaTel team distributed custom Android phones to select attendees. These phones were connected to their own private cellular network running inside the conference venue. The phones came pre-loaded with [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>DEFCON 20 did not disappoint. Among the many highlights was the NinjaTel operation &#8211; a fully functional mobile phone network set up at the conference.</p>
<p>The NinjaTel team distributed custom Android phones to select attendees. These phones were connected to their own private cellular network running inside the conference venue. The phones came pre-loaded with custom firmware and the whole setup was designed as both a social experiment and a technical demonstration.</p>
<p>From a technical perspective, setting up a private GSM network at a hacker conference is both brilliant and terrifying. It demonstrated just how accessible the technology for running a cellular network has become, and by extension, how vulnerable cellular communications can be.</p>
<p>The implications for security are significant. If a small team can set up a convincing mobile network at a conference, imagine what a well-resourced adversary could do. Rogue base stations, IMSI catchers, and man-in-the-middle attacks on cellular traffic are not theoretical &#8211; they are practical and increasingly affordable.</p>
<p>DEFCON continues to be the place where the security community pushes boundaries and demonstrates what is possible. NinjaTel was one of the highlights of this year.</p>
]]></content:encoded>
					
		
		
			<dc:creator>boris.sverdlik@jadedsecurity.com</dc:creator></item>
		<item>
		<title>You Shouldn’t Train Employees for Security</title>
		<link>https://jadedsecurity.net/836/</link>
		
		
		<pubDate>Sat, 21 Jul 2012 12:30:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[bsideslv]]></category>
		<guid isPermaLink="false">https://jadedsecurity.net/2012/07/21/836/</guid>

					<description><![CDATA[Controversial opinion time: traditional security awareness training for employees is largely a waste of time and money. Before you reach for the pitchforks, let me explain. I am not saying that employees should be ignorant about security. I am saying that the way most organizations approach security training is fundamentally flawed. The typical approach: once [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Controversial opinion time: traditional security awareness training for employees is largely a waste of time and money.</p>
<p>Before you reach for the pitchforks, let me explain. I am not saying that employees should be ignorant about security. I am saying that the way most organizations approach security training is fundamentally flawed.</p>
<p>The typical approach: once a year, force everyone through a PowerPoint presentation or online module. Check the compliance box. Move on. Then act surprised when someone clicks a phishing link the very next day.</p>
<p>The problem is not the employees. The problem is us. We are asking humans to be perfect security sensors in an environment where the attacks are specifically designed to exploit human psychology. That is not a training problem &#8211; it is a design problem.</p>
<p>Instead of spending millions on awareness training, invest in:</p>
<ul>
<li>Better email filtering and sandboxing</li>
<li>Removing admin rights from end users</li>
<li>Application whitelisting</li>
<li>Network segmentation</li>
<li>Automated patch management</li>
</ul>
<p>Design your systems so that when (not if) an employee makes a mistake, the blast radius is contained. That is a much better investment than another round of &#8220;don&#8217;t click suspicious links&#8221; training.</p>
]]></content:encoded>
					
		
		
			<dc:creator>boris.sverdlik@jadedsecurity.com</dc:creator></item>
		<item>
		<title>JadedSecurity » Go ahead and write down your passwords!</title>
		<link>https://jadedsecurity.net/go-ahead-and-write-down-your-passwords/</link>
		
		
		<pubDate>Sat, 14 Jul 2012 12:00:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://jadedsecurity.net/go-ahead-and-write-down-your-passwords/</guid>

					<description><![CDATA[Another day, another password hack and yet another reason not to reuse passwords..  Here is a simple bash script to generate strong passwords. 1) Install TrueCrypt http://www.truecrypt.org/ 2) Create a hidden volume. Pick a strong passphrase you will not write down and use a keyfile 3) Mount the volume 4) Run the Script I&#8217;ll port it [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Another day, another password hack and yet another reason not to reuse passwords..  Here is a simple bash script to generate strong passwords.</p>
<p>1) Install TrueCrypt <a target="_blank" rel="noopener" href="http://www.truecrypt.org/">http://www.truecrypt.org/</a></p>
<p>2) Create a hidden volume. Pick a strong passphrase you will not write down and use a keyfile</p>
<p>3) Mount the volume</p>
<p>4) Run the Script</p>
<p>I&#8217;ll port it to Python this weekend, or maybe even something more platform independent. Also, don&#8217;t forget to set Auto Dismount to 15 minutes, so you don&#8217;t leave it up and running.</p>
<p>[code]</p>
<p>#!/bin/bash<br />
#<br />
#<br />
# For Resiliency I keep the volume in multiple places, but for ease of use<br />
# of use, I suggest keeping it on dropbox. Set TrueCrypt to unmount after<br />
# 30 minutes of idle.</p>
<p>echo &#8220;Hello, &#8220;$USER&#8221;. This will generate your password. Please make sure you have mounted your truecrypt volume with your password file&#8221;</p>
<p>echo -n &#8220;Please enter the path to your encrypted vault file [ENTER]: &#8220;<br />
read vaultfile</p>
<p>echo -n &#8220;Please enter the patch to your encrypted mount, this will be used for temp files [ENTER]: &#8220;<br />
read encmounts</p>
<p>echo -n &#8220;Enter the website or application that this password is for and press [ENTER]: &#8220;<br />
read site</p>
<p>grep -i $site $vaultfile</p>
<p>if [ $? == 0 ]; then</p>
<p>echo -n &#8220;Do you want to create a new password for this existing account? (yes or no): &#8220;<br />
read update</p>
<p>if [ &#8220;$update&#8221; == &#8220;yes&#8221; ]; then</p>
<p>echo -n &#8220;Enter the user ID you will be using and press [ENTER]: &#8220;<br />
read name</p>
<p>echo -n &#8220;Enter maximum password length characters can the password be [ENTER]: &#8220;<br />
read counts<br />
sed &#8220;/$site/d&#8221; $vaultfile &gt; $encmounts/tmp ; mv $encmounts/tmp $vaultfile</p>
<p>curl -s http://www.bing.com/news?q=$color &gt; $encmounts/temp</p>
<p>newpass=`md5 $encmounts/temp | awk &#8216;{print $4}&#8217; | openssl sha | cut -c 1-$counts|sed -e &#8216;s/[a-z]/A/&#8217; -e &#8216;s/[0-9]/#/&#8217;`<br />
echo $name $newpass $site &gt;&gt; $vaultfile<br />
# rm $encmounts/tmp<br />
exit 1<br />
elif [ &#8220;$update&#8221; == &#8220;no&#8221; ]; then</p>
<p>echo &#8220;Goodbye&#8221;<br />
fi<br />
fi</p>
<p>echo -n &#8220;Enter the user ID you will be using and press [ENTER]: &#8220;<br />
read name</p>
<p>echo -n &#8220;Enter maximum password length characters can the password be [ENTER]: &#8220;<br />
read counts</p>
<p>curl -s http://www.bing.com/news?q=$color &gt; $encmounts/tmp</p>
<p>newpass=`md5 $encmounts/tmp | awk &#8216;{print $4}&#8217; | openssl sha | cut -c 1-$counts |sed -e &#8216;s/[a-z]/A/&#8217; -e &#8216;s/[0-9]/#/&#8217;`<br />
echo $name $newpass $site &gt;&gt; $vaultfile</p>
<p>rm $encmounts/tmp</p>
<p>echo &#8220;Goodbye&#8221;</p>
<p>[/code]</p>
<div style="float: right; margin-left: 10px;"><a target="_blank" rel="noopener" href="http://twitter.com/share?url=http://jadedsecurity.net/2012/07/14/go-ahead-and-write-down-your-passwords/&#038;via=jadedsecurity&#038;text=Go ahead and write down your passwords!&#038;related=:&#038;lang=en&#038;count=horizontal" class="twitter-share-button">Tweet</a></div>
<div class="clear"></div>
</p></div>
]]></content:encoded>
					
		
		
			<dc:creator>boris.sverdlik@jadedsecurity.com (Boris Sverdlik)</dc:creator></item>
		<item>
		<title>JadedSecurity » BYOD… Too Big for Twitter</title>
		<link>https://jadedsecurity.net/byod-too-big-for-twitter/</link>
		
		
		<pubDate>Tue, 10 Jul 2012 12:00:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[byod]]></category>
		<category><![CDATA[twitter]]></category>
		<guid isPermaLink="false">https://jadedsecurity.net/byod-too-big-for-twitter/</guid>

					<description><![CDATA[First I&#8217;d like to say that I&#8217;m really glad that we have Twitter, a place to vent and share our ideas and opinions..However we all know opinions are like assholes and everybody has one..  I&#8217;d like to thank @Wh1t3rabbit @wgragido @mattjezorek @krypt3ia @arch3angel  @grey_area @dewser and I&#8217;m sure there are others that I have missed for the long winded tweets and conversations [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>First I&#8217;d like to say that I&#8217;m really glad that we have Twitter, a place to vent and share our ideas and opinions..However we all know opinions are like assholes and everybody has one..  I&#8217;d like to thank<a target="_blank" rel="noopener" href="http://twitter.com/wh1t3rabbit"> @Wh1t3rabbit </a><a target="_blank" rel="noopener" href="http://twitter.com/wgragido">@wgragido</a> <a target="_blank" rel="noopener" href="http://twitter.com/mattjezorek/">@mattjezorek</a> <a target="_blank" rel="noopener" href="http://twitter.com/krypt3ia">@krypt3ia</a> <a target="_blank" rel="noopener" href="http://en.twitter.com/arch3angel">@arch3angel</a>  <a target="_blank" rel="noopener" href="http://twitter.com/grey_area/">@grey_area</a> <a target="_blank" rel="noopener" href="http://twitter.com/dewser">@dewser</a> and I&#8217;m sure there are others that I have missed for the long winded tweets and conversations we&#8217;ve had over the BYOD topic. So with that let me put my asshole out there on the BYOD topic&#8230;</p>
<p>There has been some confusion in what BYOD is and what it isn&#8217;t according to the tweets I have been able to follow. BYOD (Bring your own device) is the latest in buzzwords that product vendors have introduced over the last few years. It shouldn&#8217;t be any difference than the remote access we have provided to our users for years.  Some argue that productivity will increase if users can use their own &#8220;Insert iDevice&#8221; here to perform their jobs. This may or may not be true, but as security professionals our job is to enable the business to continue being profitable while minimizing risks /cissp_speak_off</p>
<p>So where is the disconnect? Why are some for and some against the concept that essentially has been around for at least the last 15 years? It comes down to the fact that organizations are starting to realize that they aren&#8217;t even in a good position to provide remote access, let alone support new technology. How can you possibly provide remote access when you don&#8217;t implement the basic controls such as data classification, role based access, centralized logging, intrusion detection?? We all complain about introducing new risks? Are we really introducing new risks?</p>
<p>Let&#8217;s look at how most organizations have their corporate network rolled out? Production access is usually granted on blind faith based on the whole &#8220;I trust my Lan&#8221;. How can you put so much faith into equipment that you have purchased? Is it because you have extensive control of those systems? In most cases you do not. Do you know what type of data users have on their workstations? If their is sensitive data in use on the endpoints, do you require two factor authentication and encryption to that endpoint? Why not? It&#8217;s the same data that you are trying to protect in your production environment, why should the endpoint be any different? Oh because you bought the equipment. It&#8217;s because you can control what sites the user accesses, you can control data leakage with that shiny DLP device right? You have that NAC thing rolled out right?</p>
<p>I hope you see the sarcasm in that last paragraph. Most organizations definitely fail at basics, so the introduction of new technology scares them and so it should. What if you started treating the corporate network as hostile? Wouldn&#8217;t life be so much easier from a security perspective if you stopped nitpicking endpoint controls? Call it BYOD, call it endpoint enforcement, call it whatever the hell you want? If it&#8217;s done right it should work across all of your platforms and you&#8217;re shiny iPads.</p>
<p>Imagine for a second everyone has to VPN in to get to production? Regardless of if you bought the equipment or they did? Regardless of it they are at the office or at home? Who cares? All hostile all the time&#8230; In order to do it right you must first get the basics in place. Data classification needs to perfect! Your access control program must also be perfect. If you can&#8217;t say that you&#8217;ve nailed either, than you aren&#8217;t ready for remote access let alone BYOD and/or wireless.. If you have however, then read on. You shouldn&#8217;t be introducing any additional risks if you have already gone through the above.</p>
<p>There are several solutions available that will allow you to quarantine devices that are physically plugged in or connected wirelessly into a DMZ where they have to authenticate. We all know NAC fails because of exceptions and misconfiguration and that&#8217;s not where I&#8217;m going. What if to get production, you have to authenticate to a central enforcement agent such as I dunno VPN??? The VPN solution can then in turn allow you to access only what you need to do your job. If it&#8217;s access to sensitive data, then you have to go through additional levels of control which can also be pushed by the choke point.  The point is that a central enforcement solution is the only way to go.</p>
<p>You can do everything from force software installation to perform a vulnerability assessment prior to allowing access. It&#8217;s not a question of technology, it really isn&#8217;t. The one problem that we keep running into is that user&#8217;s don&#8217;t want us installing things on their personal devices. It&#8217;s the whole entitlement mentality that our users have somehow attained through all of our babying.  That&#8217;s the cost of using our resources and I&#8217;m sorry to say there must be some compromise.  You have to pay to play!</p>
<p>With all that said I&#8217;m not crazy about users replacing corporate owned systems with user owned devices just yet, but depending on the environment it might be a feasible solution. What I am saying is that BYOD is not as big of a deal as everybody is making it out to be.  Get your basics in place and then when your CEO wants to use his new shiny iPad to access the Scada console you can give it to him because you&#8217;ve built your environment with the understanding that the host is hostile!</p>
<p>That&#8217;s my asshole or my .02 Thanks for reading!</p>
<div style="float: right; margin-left: 10px;"><a target="_blank" rel="noopener" href="http://twitter.com/share?url=http://jadedsecurity.net/2012/07/10/byod-too-big-for-twitter/&#038;via=jadedsecurity&#038;text=BYOD... Too Big for Twitter&#038;related=:&#038;lang=en&#038;count=horizontal" class="twitter-share-button">Tweet</a></div>
<div class="clear"></div>
</p></div>
]]></content:encoded>
					
		
		
			<dc:creator>boris.sverdlik@jadedsecurity.com (Boris Sverdlik)</dc:creator></item>
	</channel>
</rss><!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin


Served from: jadedsecurity.net @ 2026-05-05 18:34:05 by W3 Total Cache
-->