Podcasts

News, analysis and commentary

Risky Business #82 -- The Paul Craig Omnibus Experience

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

This is a special weekend listening edition of Risky Business and is brought to you by our sponsor MessageLabs.

If you're a regular listener to this program you'll know I headed to New Zealand a couple of weekends ago to attend the Kiwicon security conference in Wellington... there were presentations, lots of free beer, and of course this presentation by security consultant and researcher Paul Craig.

Paul works for Security Assessment.com in New Zealand, and he delivered by far the most entertaining presentation at Kiwicon. Called the Paul Craig Omnibus Experience, the talk blended three separate talks into one, which I've edited down into one fine hour of listening. The first talk is about iKat, the interactive kiosk attack tool.

iKat was unveiled by Paul at the most recent DEFCON conference in Las Vegas -- it's basically a website that you can visit from Internet kiosks -- like you find in corporate lobbies or airports. Of course when you visit the iKat website from a kiosk you can start clicking on stuff and popping shells. Paul released iKat to get people thinking -- so many people pump all sorts of sensitive information into the average kiosk... but since the release of iKat, we now know fore SURE they're not safe. Umm... thanks mate!

That's the first part of his talk, and it's a lot of fun. As you'll hear, Paul has a healthy sense of humour and does really well in front of a crowd.

In the second part of the Omnibus Experience, Paul discusses his hobby -- stealing data from botnets. In all, Paul boosted 3.3 gigabytes of plain text logs that had been intercepted by a fairly unsophisticated keylogging Trojan... the resulting findings are hilarious.

Last up he unveils the Moth Trojan.

Listeners to our last show would have heard a bit about this. Moth uses native Windows functionality to subvert the operating system. Not only does it allow full remote access to the affected host, but it actually insults the user through Microsoft's text to speech function. It's classic stuff.

Now, you would have heard an interview I did with MacLeonard Starkey from AusCERT about this -- Macca says detecting this thing is actually pretty easy. Now, while Macca has come up with some nifty detection techniques, I think the jury's still out on how effective Paul's techniques are. Because the Trojan is so customisable and allows such an amazing level of control over the infected system, I reckon it'd be a real challenge to get rid of different variants of this thing ... anyway, have a listen to Paul's talk and make your own mind up. I've linked to Paul's Web site where you can download the source code to Moth, and I've also linked to Macca's write up on Moth.

You can find the source code to Moth here, and MacLeonard Starkey's write-up here.

Risky Business #82 -- The Paul Craig Omnibus Experience
0:00 / 0:00

Risky Business #81 -- Reports of the death of the Internet are greatly exaggerated (again)

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

This week's show is brought to you by RSA Security and hosted by Vigabyte virtual hosting.

We've got two feature interviews this week. The first story in this week's show is an interview with BreakingPoint Systems' Dennis Cox. He's been playing around with TCP Denial of Service attacks for something like 12 years, and he's got a few insights into this latest DoS that some researchers from a Swedish company are saying will melt the Internet.

We'll also chat about a new type of Trojan -- which uses WMI event filters and consumers -- unveiled at the Kiwicon security conference in Wellington. MacLeonard Starkey from AusCERT will be along to talk about that one.

This week's sponsor interview is with Greg Singh of RSA Security. With world markets in a tailspin, layoffs are sure to follow. What can we do to make sure disgruntled ex employees don't make a bad situation worse?

If you're looking for a link to the source for the Moth Trojan you can find it here. To read Macca's write-up on Moth, click here.

Risky Business #81 -- Reports of the death of the Internet are greatly exaggerated (again)
0:00 / 0:00

Risky Business #80 -- The Kiwicon II Panel, PLUS Secure-Freedom.org

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

This week's edition of Risky Business is brought to you by Check Point and hosted by Vigabyte virtual hosting. Risky Business 80 was recorded at the second annual Kiwicon conference in Wellington, New Zealand.

In this podcast, you'll hear the panel I ran at Kiwicon. Panelists were Insomnia Security's Brett Moore, the University of Auckland's Peter Gutmann and Security-Assessment.com's Paul Craig.

You'll also hear an interview with Mark "pipes" Piper about his latest initiative -- secure-freedom.org. It's a site designed to funnel knowledge from corporate security guys into the delicate little brains of open source developers.

This week's sponsor interview features Check Point Software's Steve MacDonald discussing recent changes to Australia's EPL process.

Risky Business #80 -- The Kiwicon II Panel, PLUS Secure-Freedom.org
0:00 / 0:00

Risky Omni(bus)iness #79 -- GOVCERT.NL special

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

This special edition of Risky Business was recorded in Rotterdam, in the Netherlands, at the GOVCERT.NL security conference. The conference organisers flew me there to host a couple of ask the expert sessions and record some custom interviews... but I got to record my own stuff too and prepare this special.

This podcast is essentially a bunch of interviews I did at the conference, glued together for your listening pleasure. Big thanks to our advertiser MessageLabs for making this week's show possible!

On this week's show you'll hear:

  • Marcus Sachs of the Internet Storm Centre (Day job: Verizon) talks supply chain subversion and fun with USB devices. (Hint: Load them up with malware then leave them in the bathrooms of your target...)
  • GovCERT's Carol Overes talks HoneySpiders -- they're basically client-side honeypots, but they could have some nifty commercial applications.
  • Lance Spitzner looks back at his experience running the Honeynet Project over the years. Honeynets showed some early promise as potential products, ala "bait and switch honeynets". It never happened, so I asked Lance why.
  • A quick interview with Bart Jacobs, the professor who wound up leading the research team that broke NXP Semiconductors' MIFARE RFID access cards. The whole thing has actually turned into a political catastrophe that has potential to divert votes away from the incumbent government...

Massive thanks to all the GOVCERT guys -- Eelco, Roeland, Tarik and especially Erik de Jong. Apologies if I spelled any of your freakish European names incorrectly... ;) Coming from Australia I know plenty of alcos, but not too many Eelcos!

Risky Omni(bus)iness #79 -- GOVCERT.NL special
0:00 / 0:00

Risky Business REPOST

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

For some inexplicable reason, when I posted this week's podcast my content management system (fancy way of saying WordPress) wound up sending out the wrong file with the post in the RSS feed. I'd linked to a presentation by David Rice at GovCERT which WordPress decided should be this week's podcast. Ugh.

So, apologies, listeners... you got David Rice's presentation to GovCERT in Rotterdam instead of my interview with David Rice!

So let's try that again... if you want to actually hear David's presentation you can grab it from link in the older post...

Risky Business REPOST
0:00 / 0:00

Risky Business #78 -- Geekonomics author David Rice

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

This week's podcast was recorded and prepared at the GovCERT Symposium in Rotterdam. This week's feature guest is David Rice, the author of Geekonomics.

Rice argues the pervasiveness of software and systems vulnerabilities are a symptom of a market failure, and the only way out is for governments to introduce economic incentives -- similar to those being considered to reduce carbon emissions -- to whip the vendors in shape.

This week's sponsor guest is Microsoft's Chief Privacy Strategist Peter Cullen. Peter joins the show to discuss, perhaps not surprisingly, privacy in the digital age.

If you're interested, you can also download David's presentation to GovCERT here.

Risky Business #78 -- Geekonomics author David Rice
0:00 / 0:00

Risky Business #77 -- Google engineers huffing Chrome?

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

This week's edition of Risky Business is brought to you by Tenable Network Security.

It's been a fairly quiet week so we've prepared a shorter than usual show. In this week's podcast we take a look at the depressing state of the Internet -- a recent 'net-wide scan by nmap creator Fyodor found Telnet is the second most commonly open port. Marcus Ranum pops in to discuss the possible role of backbone providers in mopping up this outrageously shite style of systems management.

ZDNet Australia's Munir Kotadia is also along this week to discuss the news. Nothing earth-shattering -- a few bugs in Google's newly-released Chrome browser, some Facebook application badness and a downright skeletal-challenging backflip on the part of MythBusters' host Adam Savage.

Enjoy!

Risky Business #77 -- Google engineers huffing Chrome?
0:00 / 0:00

Risky Business #76 -- MythBusters mauled, BGP borked, MIFARE mangled

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

We've got a great show this week, there's been plenty happening in the infosec world. Our feature topic this week is BGP insecurity. There's been some renewed hysteria around BGP and we'll be getting to the bottom of it with Danny McPherson, Arbor Networks' Chief Smart Guy. As it turns out, you really, really just can't trust Internet routing.

Seriously.

There's been a lot of news about RFID and contactless RFID insecurity over the last few months, and some very interesting video footage from the HOPE conference in New York has surfaced. It turns out a proposed MythBusters segment on RFID security was nixed when the credit card companies called in the lawyertrons to heavy Discovery Channel. Hear the show's own Adam Savage address HOPE back in July.

This week's show is sponsored by RSA security -- they slice, they dice, and they know Alice and Bob's dirty little shared secret. RSA Security's Greg Singh will be along in this week's sponsor segment to have a chat about the MIFARE snafu, key management and other geeky crypto stuff.

And as always, the greatest IT news editor in the world, ZDNet Australia's Munir Kotadia, will be along with the week's news headlines.

Risky Business #76 -- MythBusters mauled, BGP borked, MIFARE mangled
0:00 / 0:00

Risky Business #75 -- Red Hat gets pwned hard, RaceToZero wrap

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

This week's edition of Risky Business is brought to you by Check Point Software.

In this week's news segment we take a long, hard, disapproving look at the "Red Hat incident". It seems the software-maker was fairly thoroughly pwned -- the attackers managed to compromise the package signing boxes for both Fedora Core and Red Hat.

Ouch.

We also check in with RaceToZero virus obfuscation contest organiser Simon Howard. Until now the focus has been on the performance of the contest entrants, but how did the actual anti-virus software hold up? What's good and what sucks?

Simon is back from hosting RaceToZero at DEFCON in Vegas and joined the show by phone from New Zealand.

Steve McDonald is this week's sponsor guest from Check Point Software, and Munir Kotadia joins us from ZDNet Australia HQ for a look at the week's news.

If you'd like to read the Popular Mechanics interview with the MIT "subway hackers," as mentioned on the show, it's here.

Risky Business #75 -- Red Hat gets pwned hard, RaceToZero wrap
0:00 / 0:00

Risky Business #74 -- HOWTO: Make your own Elvis bin Laden e-passport

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

This week's Risky Business is brought to you by Microsoft and hosted, as always, by Vigabyte virtual hosting. On this week's show we take a look at e-passport security. After 9-11, Chimp W Shrub decreed that foreigners wanting to enter the United States would soon need to carry new-fangled, biometric passports with embedded wireless RFIDs.

The result was a rush job the likes of which you've never seen.

This week's guest, Peter Gutmann, has figured out how to modify the data on e-passport chips. He hasn't broken the encryption scheme responsible for signing the data but that doesn't matter -- no one checks to see if the signing key is genuine and even if they do the implementation is so bad it's easy to fool.

The recent theft in Britain of 3,000 blank e-passports in a van hijacking is starting to make a lot more sense.

ZDNet Australia's Munir Kotadia is back this week to chat about recent news, and this week's sponsor interview is with Microsoft's Jeffery Jones who talks comparative vulnerability analysis.

The music used at the end of this week's podcast comes from Marshall and the Fro. Australians can buy the band's album for $25 via Paypal (postage paid) here. Music used with permission.

Risky Business #74 -- HOWTO: Make your own Elvis bin Laden e-passport
0:00 / 0:00