tssci security

Day 8: ITSM Vulnerability Assessment techniques

Lesson 8:Two days ago we covered VoIP assessments, and yesterday we covered Intranets and the use of proxies. Most of last week also covered internal network infrastructure assessments, except for some topics such as PDA phones and WiFi devices.

Today I wanted to talk about reconnaissance, which some people refer to as footprinting. Besides the usual sources of trouble (i.e. Google), there are plenty of old school avenues to take when finding information about a company, organization, or person.

Of particular interest is to look at external network connectivity. How does an organization connect to the Internet? I talked about war dialing on Day 6, which has a similar goal and effort. However, war dialing is pure enumeration -- start with a number and increment. Searching for external network information is much different as we will see.

We'll also be covering DOM-based XSS tools in the software assurance section today. I hope you enjoy it.

Part 1: Information assurance vulnerability assessment — Footprinting the perimeter

Whether you know about it or not, your company or organization connects to the Internet the same way that everyone else does. Using the Border Gateway Protocol, version 4. If you don't run it, then your upstream does -- or possibly their upstream.

BGP-4 requires an autonomous system number (ASN) for every organization connecting. Usually these are ISP's and very large Enterprises. Every owned IPv4 prefix is announced from one of these ASN's (some organizations have more than one).

This information leaves a trail of data that anyone can query using a whois client. First of all, a Regional Internet Registry (RIR) must be contacted in order to acquire an ASN. If an upstream provider (an ISP) provides the IP prefix(es), this is known as provider-aggregated IP space (PA). Most RIR's (well, ARIN who is the RIR for North America) loosely require that PA space have additional downstream information placed into their database. There have been two typical ways of doing this: Shared Whois IP (SWIP) and Referral Whois (RWhois). SWIP is in the RIR database, while RWhois is kept in a local ISP database, which can be queried by the RIR to keep information updated.

If an organization goes directly to an RIR to acquire an ASN or IP prefix(es), their IP space is known as provider-independent (PI). Getting PI space usually requires a minimum infrastructure size (a certain number of IP's to be used). Detailed ASN and IP prefix information, along with organization information (such as contacts for billing, technical support, and abuse issues) is available in the RIR database. This is what is queried via whois/RWhois.

Similarly, you may be familiar with network information center type services (NIC) as provided by the original Network Solutions. Today, we call these domain registrars, and their antiquated whois services, which have access to their databases, may one day disappear. Network Solutions whois even still supports querying antiquated role handles, although I have no idea how to get one of these since around 1999.

Recommendation: Find and protect your Whois data. I suggest a service, such as the one from Namecheap, called WhoisGuard, when you setup your domains (or change them to this). Make sure that your modification of this information is protected by passwords (or better yet -- PKI) in the safest manner possible.

Similarly, protect your RIR, RADB, and RWhois data. The RADB is a part of the IRR, with free IRR services available from ALTDB. If this information for your IP prefixes is not secure, then your entire traffic or source could be subverted. This could happen regardless of whether or not your organization runs BGP-4 because it could be a lack of precision by one of your upstream providers that could cause this to happen. Better -- use a new type of service to provide assurance to your routing such as using a commercial service from Renesys or the free service from Packet Clearing House, Prefix Sanity Checker.

Querying live BGP information is best done with a Looking Glass server, PWhois, Network ThinkTank, FixedOrbit, and the Team Cymru Network Monitoring pages. My two favorite projects around this space have been Route Views and MERIT's BGP Inspect, just because of how much data they maintain. Searching through an old BGP table snapshot, or an old copy of the RADB database (or Domain registrar, RIR, and other IRR data) -- even in text format -- can be extremely revealing about an organization's network infrastructure.

Other services such as CompleteWhois maintain information about ASN/IP hijacking (and information on individual/group hijackers, which are often -- but not always -- spammers). The Web Security Authority combines some CompleteWhois information lists to create mod-security rules, which may be an interesting way to protect externally-facing web applications.

I also suggest getting away from the web and using your command line to query this sort of information. You'll never know when an adversary will insert an XSS as whois database information (although one could argue that a client-side attack could also happen with command-line whois).

whois -h com.whois-servers.net tssci-security.com | grep Server:

This command tells us which domain registrar's whois server to query for more information. (Note it is possible to change com.whois-servers.net to net, org, us, edu, and many other possibilities if the default com Whois server does not provide the detailed information you want). Whois-servers.net is basically a referral service for domain information. Let's query the real (i.e. referred) domain registrar now:

whois -h whois.godaddy.com tssci-security.com

Here you can see that TS/SCI uses DomainsByProxy (a similar service as WhoisGuard, but provided by GoDaddy instead of Namecheap).

Try

whois -h whois.arin.net 64.135.2.110

You'll see both the ARIN information, as well as the RWhois information. If we connect to that RWhois server, as seen below, there are other techniques you can use to gain more information about both the ISP and their customers.

nc rwhois.host.net 4321 %rwhois V-1.5:003eff:00 whois.host.net (by Network Solutions, Inc. V-1.5.9.5) -holdconnect on %ok -forward on %ok -limit 600 %ok -status %status limit:600 %status holdconnect:ON %status forward:ON %status objects:682 %status display:DUMP %status contact:hostmaster@host.net %ok host*

-quit

(You'll also want to check out other RWhois commands such as -security and -register from the RWhois specification, RFC 1714)

whois -h whois.radb.net 64.135.0.0/17 route:      64.135.0.0/17 descr:      HOST-64-135-0-0-17-BLOCK origin:     AS13645 notify:     db-admin@host.net mnt-by:     MAINT-HOST changed:    db-admin@host.net 20040621 source:     HOST

whois -h whois.radb.net maint-host mntner: MAINT-HOST descr: HOST/BroadbandONE maintainer object admin-c: HNA-ORG-ARIN tech-c: HNA-ORG-ARIN upd-to: db-admin@host.net mnt-nfy: db-admin@host.net auth: CRYPT-PW IZVSxc8/dvNpk mnt-by: MAINT-HOST changed: db-admin@host.net 20040811 source: HOST

whois -h whois.radb.net as13645 ...

As you can see, there is quite a bit of information available from Whois/RWhois from Domain Registrars (which you can find using Whois-servers.net), RIR's, IRR's, and individually hosted RWhois servers. There is quite a lot to explore, so check out the specifications and also use the server "help or ?" functionality (e.g. `whois -h whois.networksolutions.com \?').

Part 2: Software assurance vulnerability assessment — XSS on the DOM

Best DOM-based XSS attack tools

Web Developer's View Javascript, FireBug, w3af, Burp Intruder, scanajax, ProxMon, OWASP Pantera, cruiser, CSpider.js

Any claims that an automated scanning tool can find all XSS is dead wrong when it comes to DOM-based XSS (or Flash based XSS, et al). There are already unique enough scenarios for finding some reflected or stored XSS, but DOM-based XSS vulnerabilities make this even more troubling. Do the right thing and check the source code in addition to dynamic testing. Commercial tools such as Fortify SCA 5.0 support Javascript and Ajax for just this purpose, but open-source tools Aptana, JSLint, JSONLint, and many of the language-specific static analysis tools mentioned in Day 7's, "Best XSS attack helper tools" section may also be of use.

Day 7: ITSM Vulnerability Assessment techniques

Lesson 7: Today I wanted to bring the real meaning behind these techniques into the spotlight. Learning about how IT groups do real security is only part of this.

I'm also talking about what I've seen that IT security shops don't do. What penetration-testers or auditors don't recommend. What everyone misses. This is my way of shaping the industry in a way. I feel it's extremely important.

You may laugh about some of the ideas or think they are trivial. That's fine -- let me know what you do and don't like! You may also be lost in a sea of acronyms and content. This is why I make sure to recommend additional books you can read that explain the topics well.

I see all of this as a step-up for instructional capital around vulnerability assessments. I want to give everyone a chance to improve their skillsets, techniques, as well as toolchains.

Part 1: Information assurance vulnerability assessment — Network Access Control

This post is not about NAC, the common technology you may all be familiar with or studying/researching. The Cisco version of NAC is a poor concept. The endpoint security work in the IETF by Juniper Networks and the Microsoft work (or StillSecure and anybody else) is also a complete waste of time. This industry and these products are dead and or dying. So let's just skip Cisco NAC and concentrate on the real topic: access controls in networks.

Is anyone here familiar with VLAN's? How about VACL's? What about Cisco's new access control layer in the network? This is more along the lines of what I'm talking about. However, I don't want to get into protecting the network infrastructure (that's next week).

Recommendation: There is a concept, which is really more of a dream that I have. In the spirit of Martin Luther King Jr. (who was born on this day, 79 years ago) -- I am going to get my favorite industry to believe in this dream. To believe in a network that has no traffic except SSL, GPG, and SSH (or any of the other secure channel technologies talked about on Day 5). Every packet that flies over the WiFi, the Ethernet, and between servers is all wrapped in happy encryption. All ports are closed unless they speak SSL.

But wait -- what about DNS? Surely, DNS must be used for the local Intranet -- to get to local servers and printers, and to get to an SSL VPN or automatically-configured SSL proxy (so that packets can go to/from the global Internet). But Internet-aware DNS can be restricted internally, so that only the SSL proxy has access to the Internet. This keeps people from tunneling SSH in DNS or other strange network affairs.

All other services besides some Intranet DNS, a little printer port access, and SSL can be completely shut down and shut off. We don't need it anymore. This is 2008, not 1998. Certainly, there will be exceptions at some companies or organizations -- but these can be monitored with compensating controls. Even Intranet servers and printers should technically be behind an "Intranet proxy" which works in a similar way as the Internet SSL proxy. All traffic can thus be wrapped in SSL, so that printers can be accessed via HTTP (although it would be nice if they supported SSL natively). The Intranet proxy could then whitelist scripts coming from the Internet to prevent cross-site printing or other unwanted script execution.

Better - the SSL proxies can be configured with concepts from ClientVA and Whitetrash. All client-side applications that access the Internet not only are passively verified for their version numbers (also don't see: NAC scanning which actively verifies by scanning), but they are additionally only allowed to certain URI's via a whitelist.

I'm not really big on Windows or Apple file sharing for distributed clients. iSCSI might be ok on a server backend network, but these sorts of protocols don't belong on a safe network regardless of how they are encrypted. I'm mostly referring to SMB, which is safe to turn off in 2008. We have Intranet wiki software that allows flies to be uploaded instead.

Intranet web servers that do allow file uploads/downloads should have the presence of web shells or malicious Javascript detected. Some network-IPS devices do block some web shells or malicious Javascript content, but this is hit or miss. It's best to run a utility such as SpyBye locally, or utilize a commercial tool such as Nessus or PVS to detect malicious Javascript. While on the server, documents can also be scanned for versions by using Metagoofil or OfficeCat.

Also, ideally all user clients would be thin clients -- but this is possibly a dream for a different day.

Part 2: Software assurance vulnerability assessment — Stored XSS

Best Stored-XSS attack tools

w3af, HTMangLe, Hackvertor (or anything Gareth Heyes writes), PostInterceptor, Tamper Data, Burp Suite, Paros, OWASP WebScarab, XSSscan.py, Acunetix XSS Scanner, Syhunt Sandcat Free, Wapiti, OWASP CAL9000, Wfuzz, SPIKEproxy, Gamja, screamingCSS

Best XSS attack helper tools Web Developer, RSnake's Security Bookmarklet methodToggle, .mario's Encoding tools, Dean Edwards' Packer, JSMin, RSnake's XSS Cheat Sheet, OWASP SWFIntruder, HackVertor (and everything else Gareth Heyes writes), HTMangLe, ExtendedScanner, Hunting Security Bugs' Reference for ASP.NET Control Encoding and Web Text Converer, WhiteAcid's XSS Assistant, Net-Force Tools' NF-Tools, Hunting Security Bugs' Overlong UTF, RefControl, User Agent Switcher, ProxMon, OWASP Pantera, AppPrint, AppCodeScan, FindBugs, FxCop, Pixy (for PHP), Milk (for Java), SWAAT (for ASP, JSP, PHP), ASP-Auditor (for ASP.NET), XSSDetect (for .NET), Mod-Security, PHP-IDS, CORE GRASP, Inspekt, RATS, PSA3, PFF, PHP-SAT, PHPSecAudit, Orizon, LAPSE

Unlike black-box testing Reflected-XSS, it is highly recommended that every time that you change a parameter or POST a form -- that each test string be unique. Know which tool you used and where in the application your vector was initially sent. Stored-XSS can pop up anywhere throughout the web application much in the same way that a fuzzer can crash a fat application by sending a sequence of strings. This is the reason why humans are needed and manual testing must be done to expose all flaws.

However, I am highly impressed with the accuracy and methods used when doing manual code review for finding XSS. There are plenty of SQL injection and XSS that can only be found by looking through the source code. Often, either finding the source code through information disclosure or other means (identifying an open-source application or component is the easiest/obvious way) will allow finding the most obscure of stored-XSS vulnerabilities.

Day 6: ITSM Vulnerability Assessment techniques

Lesson 6: Last week was great as I started out talking about a variety of topics including --

Over the weekend I spent some time playing with some of my favorite tools. I learned a few things about them. For the browser tools, I installed the SecurityQA Toolbar, written by Tim Newsham. It has a restricted evaluation, which is an IE BHO. The evaluation is very restricted, but I'm sure that the full-copy from iSecPartners works amazing just based on what I've seen from the interface. Not only is it limited in the types of attacks one can do (no blind SQL injection, XML injection, OS command injection, XSS/CSRF/HRS testing, no directory traversal, and no ActiveX testing -- but all of these look to be available in the full commercial product. There is only one attack vector for even the attacks that do work (and you can see the ones for the attack vectors that are grayed out). The reports and the wizard are fantastic -- certainly a browser-based tool that has a future.

Firebug Lite is one of my favorite external browser tools that works with browsers. However, I found out a method to use Firebug with IE using bookmarklets. Besides just Internet Explorer, I also found some useful tools for Opera, such as the Opera developer tools, as well as Firefox crawling using spider.xpi. I also learned a few other things that I'll save for later. Also, I'm leaving out a separate "Part 2" section today because I've already given you some new software assurance tools to check out. We'll cover Stored-XSS tomorrow!

Information assurance vulnerability assessment — "Technology X over IP"

TCP/IP used to be a fascinating protocol because you could run it both on and off the Internet. When I first got into TCP/IP, friends and I would run local networks that did not connect to the Internet. By, this I mean that there was no firewall. DEC hadn't even invented the TCP/IP firewall until at least a year or two after I got online. We ran a local LAN using TCP/IP and even had our own DNS... e.g. domain.lan or domain.local. This worked really well.

Once Network Address Translation became popular, local LAN's based on TCP/IP went away. So did DECnet, AppleTalk, Novell IPX/SPX, and OSI. Everything became connected to the Internet, and Intranets became something you had internally but thought were safe behind a firewall. I knew right away that these networks were not safe, as the most powerful attacks and backdoors I had seen at that time were all based on the client-side (IRC grok, ssh client backdoors, etc).

Circa 1995-1996, I was already much aware of using ptrace(2) in a way that a reverse engineer would use UHooker today. Yet, I was also playing with the first IP telephony systems using Dialogic boards (similar to the Digium PRI and FXO/FXS PCI cards) under Solaris x86 and connecting them to ISDN (both PRI and BRI), POTS, and T1 CAS -- even as trunks to other IPBX's (e.g. MiTel) at the time. With Asterisk, Trixbox, and ShoreTel -- we now refer to these as IP-PBX's, but it's the same acronym. Before I got bored of ISP access engineering (this was around 1997-1998 when Internet data centers started popping up all over the country), I also got to play a little with SS7 and setting up IMT trunks on Cisco AS5300's and Lucent Portmaster 4's.

On my mind the entire time was why on earth would any telecommunications provider want to connect this stuff to the Internet? It's one thing to keep your SS7-connected Portmasters out-of-band for management access and allow dial-up users to be on the modems for said devices. But it's another huge issue to allow integration of RIPv1 (and years later, RIPv2 to provide CIDR support), RADIUS, DNS, DHCP, and all the other features (I think I even ran BGP-4 on a Portmaster) available at that time. Nobody ever changed the paradigm... the devices worked and they didn't suffer a lot of security problems (none that I knew about at least).

Today, telecommunications fraud is huge... growing by at least 10% per year. In 2003, a survey conducted by the Communications Fraud Control Association put the losses at $35 to $40 billion dollars per year. This puts 2008 at over $60B in telecom fraud losses at the most generous level.

We are facing a new scenario today. Some of the most complex modern applications happens to be those based on voice and video communications, as well as the popular web applications we already spoke about. Network drivers, even Bluetooth, WiFi, and IRda are dangerous because of their scope but not necessarily their complexity. Microsoft models the design of these types of network drivers using SAL (their Standard Annotation Language) and also provides a lot of software verification with tools such as SLAM (a model-checker). Many IP communications and web applications do not get the benefit of formal methods testing.

I recently saw the season finale for the TV show, "Hero", where a prominent Cisco IP Video Communications web interface was utilized in the show instead of the classic Hollywood security surveillance room. I think they even used it in one of those Vegas shows. The first thing I thought of is what a bad idea it would be to use this sort of system. Combining internal communications system and web applications on the Internet is asking for the worst kind of trouble. See also: SCADA.

Asterisk alone had suffered two of the most popular types of web application attacks last year. The first one I already mentioned in my post Ajax security opens up a whole new can of worms, where I mention Wade Alcorn's work on XSS Interprotocol Exploitation. This start with an XSS that allows a buffer overflow to be passed through the client-side browser to an Asterisk server. Even more recently, Asterisk-Addons allowed a SQL injection to run remote commands.

Recommendation: Test your VoIP (and Video-over-IP systems if you have them) and maintain strict vulnerability management over these sorts of cross-technology converging worlds. In my opinion, MITRE OVAL isn't enough -- although integrating these concepts into OVAL-Compatible solutions would be a good start. Use reconnaissance, footprinting, and enumeration tools such as iWar (a VoIP-enabled war dialer to bring you back to the 1983 WarGames era). Also utilize full-knowledge to gain access to known 800/WATS and DID numbers. Check PBX or IP-PBX configurations for correct DID assignments.

I've mentioned before that while WiFi has WVE, it doesn't have a software weakness enumeration program. Voice and video/surveillence communications systems should also have their own CWE-like programs. Peter Thermos and Ari Takanen created these sorts of CAPEC and CWE models for VoIP in their book on, "Securing VoIP Networks". They call these the VoIP threat and VoIP vulnerability categories, respectively -- and even compare the VoIP vulnerability categories to both CWE and OWASP Top Ten. Using these along with binary analysis is a good place to start to define where systems are weakest and require testing, as per my usual recommendation.

The guys over at Learn Security Online have some great content. One of my favorites was submitted by a user named Sandro Gauci last month, where he demonstrates how to use SIPVicious to "get the job done" (login required -- get their free registration!). It's definitely a must read when thinking about penetration-testing or VoIP systems.

I also recommend additional reading such as the "Securing VoIP Networks" book mentioned above and the "Hacking Exposed VoIP" (of which the author's blogs are great reads if you can find them). There's also a recent SANS paper by David Persky available in their Reading Room - VoIP Issues.

Sorry about the lack of a Part 2, Software assurance section today. I promise waiting one more day for a better Stored-XSS post will be worth it.

Day 5: ITSM Vulnerability Assessment techniques

Lesson 5:After the first week, many of these assessment techniques don't all fit together or seem congruent. Mid next-week, I think a lot of these pieces will start to come together to form a big picture. The recommendations I've given so far are not things I've seen or heard from the community of security professionals. Many people are asking for examples, but my question is -- what exactly do you want to delve into? If anything, I would rather spend my time introducing the concepts so that you can explore the details for yourself.

Part 1: Information assurance vulnerability assessment — Secure channels

There has been constant debate about how to create a secure channel over a network, especially say, the global Internet. The two leading systems are SSL and DNSSEC.

SSL has had various problems over the years, but it's the top dog. DNSSEC will likely never become popular, and the complexity behind it rivals IPSec. SSL VPN has all but replaced IPSec today as well. SSH is in use but isn't seen as a consumer-level technology, not even with SSHTerm / Ajaxterm. Other abominations such as SNMPv3, S-BGP, and Kerberos-enabled protocols, encrypted IMAP/POP3, et al -- these are bound to be around and unpopular for another ten to twenty years.

Off-topic and unrelated, yet on my mind as I write this: I can't believe that people still use TFTP for router/firewall images and configurations. I'm sorry did I say, "people still use"? I meant, "vendors left implemented for over 13-14 years because that's how long SSH and SSL have been around for".

Drive-by-pharming, which involves using CSRF (possibly aided by XSS or other attack vector) to modify Intranet/home routers and firewalls, often changes the router DNS servers. DNS hijacking in this way could create a situation where browser rootkits are always installed on Intranet users' browsers universally. RSnake's Using DNS to enable XSS and the subsequently linked LURHQ paper are must reads.

Similarly, DNS cache poisoning can cause the same effect. ARP cache poisoning, ditto. We've seen BIND 9 exploits and ARP spoofing malware throughout 2007. The only interesting defenses in the research community have also ended up in failure, as seen by the PRIV8 SCM Firefox Add-on. It appears that this research has been duplicated by OpenDNS and DNSstuff, as I recently read in this article from Dark Reading on Hacking a New DNS Attack.

Sure, there are issues with Firefox add-ons (which I knew about the first time I installed an extension). I love how every security professional thinks their research is new when they apply an old concept (e.g. arp cache poisoning) with a bleeding-edge technology (e.g. Firefox add-ons).

Recommendation: There were plenty of exploits available for both Microsoft's DNS server and ISC BIND last year. Do you want to repeat the same mistakes and headaches this year? Consider alternatives, or push vendors to provide reliable DNS server software that has high assurance properties. CoDoNS is an interesting research project that needs more attention and support.

Every book worth it's weight on network security and system administration has a section on DNS server security. Go read that section now. I also suggest reading Domain Contamination from Amit Klein.

Monitor your DNS servers. I also suggest monitoring external DNS and co-operating with other organizations to form a strong passive DNS infrastructure for replication. Recently, source code was released for dnslogger-forward in order to create sensors for this purpose.

As for SSL, I'm getting quite upset about what once was a great technology. I mean, what good is it when browsers have serious problems that remain unfixed for years? Please be sure to read heise Security's article on Bugs in Mozilla browsers facilitate man-in-the-middle attacks. Try out the test page that they link to and see the problem for yourself.

Certificates are a nuisance and all of this is being wrapped up under the umbrellas of liability and Certificate Authority god-complexes. Sure, SSL works today and DNSSEC doesn't, but I'm pretty sure both are wrong and we'll see the demise of both over time. If anyone besides myself thinks that Enigform and mod_auth_openpgp are the future of secure HTTP channels, please holler.

For more information, you would think I'd recommend DNS & BIND, but it turns out that one of the authors is a spammer (yes, Cricket Liu is an evil, bad spammer -- how's that for irony?) and BIND software just plain sucks. Instead, I suggest you read "The dotCrime Manifesto", by Phillip Hallam-Baker.

Part 2: Software assurance vulnerability assessment — Reflected XSS

Best Reflected-XSS scanning tools

XSSscan.py, XSS-Me, HttpBee, Acunetix XSS Scanner, Syhunt Sandcat, w3af, Wapiti, OWASP CAL9000, Wfuzz, Grabber, SPIKEproxy, WebFuzz, Gamja, Burp Intruder, Burp Repeater, Paros, OWASP WebScarab, screamingCSS, gunzip webfuzzer, N-Stealth Scanner Free Edition

I'll cover Stored-XSS, DOM-based XSS, and XSS attack helper tools next week! I will go into more detail about finding XSS once more techniques/tools are suggested. Here's a few suggested tools to play with over the weekend.

I don't usually repeat tools if they aren't particularly interesting for helping individual attacks. However, you'll want to go back and review how Reflected-XSS can be found using HTTP request tampering tools or browser-based tools. In the case of Reflected-XSS, these can be found in both parameters and forms, as well as in binaries (UXSS), emails, images, QuickTime/Flash and other media files, and pretty much just about everywhere.

SunSec Trip Report

Last night Rich Mogull of Securosis, and co-host of Network Security Podcast, hosted SunSec (which was on hiatus for far too long) at the Furio in Scottsdale. It was a great turnout last night -- about twenty people had shown up and talked up all kinds of storms for several hours.

Dre and I talked with Dennis Groves, one of the founding members of OWASP and contributor to the OWASP Guide. Dennis had mentioned the DARPA Browser Project and we then talked about trusted systems and how software assurance through formal methods will fix all the security problems.

Obviously with Mogull we had to talk about data security -- his specialty, and what's also obvious he is a rockstar at it. Where are all the other security researchers that are into data security like he is?? All I can count and know of is Dan Geer, Rob Newby and Gunnar Peterson (oh, and Christofer Hoff too!). We also had brought up the little SCADA hack/hoax that Hoff and him had tried to pull a couple weeks ago. Trailing off, we then got into a discussion about hacking train controllers, and what do I notice in my feed reader this morning? Courtesy of Domber's Basecamp: Schoolboy hacks into city's tram system.

All in all, SunSec rocked. If you live in the Phoenix area, you definitely have to make it to the next one.

« Newer entries — 16 — Older entries »

blog comments powered by Disqus