Category: Suggested Blog Reading

Suggested Blog Reading – Tuesday July 3rd, 2007

ReadI apologize for not updating the blog over the past few days but I took some vacation to visit with my in-laws. But now I’m back!

Here’s the list:

Paper On Log Management – Thanks to Dr. A I’ve got some more reading material.

Unusually good trade rag paper on log management.

Why There Is No Syslog in Windows – I was following this thread as well but Anton beat me to the blog post. I don’t agree with the reasoning behind not adding native syslog support AND I don’t care what you say….I like syslog 😛

Ever wondered why after all this years Windows still doesn’t support syslog? This is why; read a very comprehensive answer by Eric Fitzgerald, who “owns” Windows logging. There is also a very lively discussion that ensued, which includes things like “my blood boils and a halo of pink steam forms around my head, throbbing the the gnashing of my teeth and the kodo drum-like thudding of my overworked heart. ” 🙂 /guess who said this/

Configuring Granular Password Settings in Windows Server 2008, Part 1 – Looks like the Win2k8 (wow that feels strange to type) security articles are starting to come out.

In previous versions of Active Directory (AD) we had only one password and account lockout policy for the entire domain. Some companies had to use multiple domains to place different password policies on different users; others had to develop their own password filters or buy third party solutions. With Windows Server 2008 we have the option to specify different password policies for different users and groups “out-of-the-box”.

This first of two articles is a “walkthrough” on creating a password policy in addition to the usual one we have in the “Default Domain Policy” Group Policy placed on the domain level.

Homeland Security to host security forum in August – Will it be called “Don’t do what Donny Don’t Does? – Your guide to succeeding where we failed!”

The U.S. Department of Homeland security will host a invite-only conference two months from now that will bring together security experts from law enforcement, Internet service providers, and the technology industry.

The Internet Security Operations and Intelligence (ISOI) workshop will be held on August 27 and 28 at the Academy for Educational Development in Washington D.C. It is expected to draw about 240 participants who will engage in a frank discussion of the latest trends in cybercrime, said Gadi Evron, a security evangelist with Beyond Security who is one of the event’s planners.

Selenium – JavaScript Web Application Security Testing Tool – Not only does selenium protect you from aliens and dandruff….it also acts as a Web Application Security Tool 🙂 — bonus points to the one who guesses what movie that’s from 😉

Selenium is a test tool for web applications. Selenium tests run directly in a browser, just as real users do. And they run in Internet Explorer, Mozilla and Firefox on Windows, Linux, and Macintosh. No other test tool covers such a wide array of platforms.

Browser compatibility testing. Test your application to see if it works correctly on different browsers and operating systems. The same script can run on any Selenium platform.
System functional testing. Create regression tests to verify application functionality and user acceptance.

Snort and the IT Appliance Fixation – Having worked as a consultant I completely agree with Bill on this one. The unfortunate reality is that people want the shiny, slick looking car by the company with the huge marketing machine behind it that convince them to buy it in the first place…not the one with the best gas milage and helps protect unladen African or European swallows — Another bonus point to the person who guesses that movie 😉

Assume that a Vendor supplied IDS will cost $50,000 just to purchase. Factor in the time spent finding the right product. Now consider that an organization could easily spend that time configuring a Snort sensor baseline image, and roll that out on computers that are past the end of their life cycle – see where I’m going? Now factor in the open source nature of Snort’s rule sets, and you could easily save money in implementation, and use the money to hire a decently paid IDS analyst.

The bottom line here is that the best solution is not always the newest one, or one that comes with vendor support. If you are in a position to do something useful on a network, it does not always have to cost money.

Paper on Identity Theft – from the SANS Information Security Reading Room

Anton Logging Tip of the Day #11: But These Are OUR Logs! – Another good post by Anton. I completely agree with his statement that “the only way to truly to resolve such control issues is to deploy log management tools across the entire organization and then provide limited access to the logs to all the stakeholders on the “as needed” basis” – this is why soldiers are put on sentry duty have been deployed this way for thousands of years!

A common and unfortunate situation that occurs when dealing with logs is not technical, but political: not being able to get the logs you need due to political, cultural, egotistic, or other “corporate” reasons. In this tip we will try to present a few situations and solutions for those trying to wrangle logs from whatever hostile (or ambivalent – sometimes worse!) entity at your organization and thus to break the siloed approach to log management.

The One Minute Security Manager – Good “quickie” to review every now and then.

Security has a bad name. Whenever I say I work in security, people get paranoid assuming that my job is to block whatever good work they are doing in the name of security. Plus, in many organizations, security is a one way street. Information goes in, but never comes out. There’s no information sharing because neither side wants to discluse their “secrets.” It’s time to change this negative connotation for security.
For my entire security career, I’ve been exploring ways to improve the image and effectiveness of security. Also throughout my professional career, I’ve been studying leadership. Recently it dawned on me (while reading Seth Godin’s The Dip) to put the two together. One of my favorite leadership books is The One Minute Manager by Ken Blanchard, Ph.D. and Spencer Johnson, MD. There is no reason why we can’t use the ideas in The One Minute Manager to improve our security practices.

tcpxtract – Extract Files from Network Traffic AKA Carving – Good way to see exactly what your [employees/colleagues/kids/friends] are downloading that is sucking up your [bandwidth/sanity/resources].

tcpxtract is a tool for extracting files from network traffic based on file signatures. Extracting files based on file type headers and footers (sometimes called “carving”) is an age old data recovery technique. Tools like Foremost employ this technique to recover files from arbitrary data streams. tcpxtract uses this technique specifically for the application of intercepting files transmitted across a network.

Building a better security events system – I’m not sure what Tate’s looking for as everything he has described is available in many vendors offerings. Or some sort of SEIM/Skynet hybrid 🙂

Capture an alert fired from an IDS, check netflow for a session, note a “first-time” event recorded in a syslog message, mix in statistical data mining and learning techniques – and do it all in near real time. This is how things get interesting.

Unfortunately it’s hard to get complete visibility (i.e. get all syslog, all netflow, all application logs, etc.). There must be a point though where I can get enough information to successfully prioritize interesting events. I’m not sure exactly where that’s at, but it’s a fun problem to work on.

Office 2007 Event Logs – I really enjoy posts that detail analysis of an incident in some way. I wish there were more out there.

A coworker walked into my office today and asked if I’d take a look at a drive to see if I thought the former owner had tried to tamper with the contents. After a little “pokin’ ’round” I exported the event logs and opened up my event viewer to look at them when I noticed another log on my box. Not the ones I’d exported, but a new event log that comes with a default installation of Office 2007. So naturally, I discarded the investigation that I was supposed to be doing and began investigating what interested me. My proclivity for doing things like this is the reason that my desk is a shambles, but that’s a tale for a different day, on to the new event log!

Antiforensics: When Tools Enable the Masses – Good article…very low ‘fluff factor’ 🙂

Once again, the bad guys are lining their arsenals with new tools to use against you. Computer forensics is an emerging field of study and anti-forensics is certainly developing right alongside. Some say anti-forensics is developing faster. Why? Because what was once only possible for the elite has now washed downstream in the form of automated tools. More or less, anyone can throw trashcans in the path of forensic investigators now that the tools are there to make it all possible…

Security Mentoring – I was lucky enough to have an understanding wife support my self study and employers that fostered my quest for knowledge.

How do you become a “Security Expert”? You can take classes in high school, college and trade school. You can attend “vendor training” or security related classes offered by many different organizations (Global Knowledge, ISC2, New Horizons, etc). You can attend seminars and conferences such as BlackHat, ShmooCon, SANS, etc. You can read books and practice with your own computer, home network or use some online labs. You can participate in forums (security catalysts community, friends in tech, etc). You can read blogs and “security” websites (Andy ITGuy, Tao Security, SearchSecurity, etc). You can join in on chats using IRC or other Instant Messaging type clients. You can join organizations such as ISSA, InfraGard, ISACA.

All of these are good and viable ways to learn about information security and how to practice it and do it. Of course the best way is OJT. On the Job Training. The school of hard knocks. Working side by side with other security professionals who have already been there and learned things by experience. It has been said that experience is the best teacher. This morning on my ride into work I was listening to Chuck Swindoll speak about learning through confrontation. He said that he thinks that the best teacher is “guided experience”. I must agree. You can learn a lot from experience but if you don’t have someone there to help you understand all that the experience has to offer then you are missing out. If you don’t have someone there who will challenge your experience and more importantly, the lessons that you think you are learning then you are missing out on a valuable resource.

Suggested Blog Reading – Thursday June 28th, 2007

ReadApparently I have my own “style”. Thanks for the mention Marcin 😉

Also, there looks to be a cage match in the works between Thomas “The Animal” Ptacek of Matasano Security and Joanna “The Lovely Lady of Security” Rutkowska over how hypervisor-based rootkits are not invisible and the detector always has the fundamental advantage. The problem is that Joanna claims that hypervisor rootkits are “100% undetectable”. I wish I could get ring side seats but I don’t have the funds for Blackhat this time around.

Here’s the list:

Schools Lack Cybersecurity Training As Students Grow Cybersavvy – I’m sure this comes as no surprise to anyone. The question is…how do we fix it and not look like a bunch of lame old folks trying to bestow wisdom?

The School Safety Index indicates that while 95% of districts surveyed are blocking Web sites, only 38% have a closed network that lets them control the content students can access.

HIPAA Growing Teeth? – This is good to see.

“An audit of Atlanta’s Piedmont Hospital that was initiated by the U.S. Department of Health and Human Services in March is raising concerns in the health care industry about the prospect of more enforcement actions related to the data security requirements of the federal HIPAA legislation.”

Microsoft Product Keys & XML Fun – Good check to see if any unauthorized Microsoft software was added to a system 🙂

It’s an XML file called Product_keys.XML, the root XML tag is
and it contains a list of Product Keys for
Microsoft products.

When you have an Microsoft MSDN subscription, you have access to a
website with product keys for your subscription. There is a button on
the site to export these keys as an XML file, and the file I
discovered has exeactly the same format.

Some questions to ask yourself when assessing reported security breaches in Windows Vista – Probably not all of the questions you need to be asking but definitely some good ones.

Most anyone who has been in the security industry for a while is familiar with the term ‘security theater’. It’s a term used for security that is about show, rather than substance.

Since I became the Product Manager for Windows Vista security I have noted that the same concept seems to increasingly apply to the world of vulnerability disclosure – let’s call this ‘vulnerability theater’.

Take5 (Episode #3) – Five Questions for Jeremiah Grossman, Founder/CTO of Whitehat Security – Good interview with Jeremiah Grossman.

Jeremiah Grossman is the founder and CTO of WhiteHat Security,
considered a world-renowned expert in Web security, co-founder of the
Web Application Security Consortium, and recently named to
InfoWorld’s Top 25 CTOs for 2007. Mr. Grossman is a frequent speaker
at industry events including the BlackHat Briefings, ISACA, CSI,
OWASP, Vanguard, ISSA, OWASP, Defcon, etc. He has authored of dozens
of articles and white papers, credited with the discovery of many
cutting-edge attack and defensive techniques, and co-author of XSS
Attacks. Mr. Grossman is frequently quoted in major media publications such as InfoWorld, USA Today, PCWorld, Dark Reading, SC Magazine, SecurityFocus, C-Net, SC Magazine, CSO, and InformationWeek. Prior to WhiteHat he was an information security officer at Yahoo!

If you tell a fact in forest and you haven’t written a security book, is your fact wrong? – Looks like Michael Farnum got slammed by an angry Computerworld blog follower. Good for you Michael for not backing down. You were right by the way 😉

OK, I was going to leave this one alone, but it is just bothering me so much. A couple of weeks back, I wrote a blog post about a comment I had left on a post by Douglas Schweitzer’s at his Computerworld blog. Douglas said in his post that a bot was “essentially just another term for an infected computer.” I took issue with this and wrote a comment as such, then I posted the comment on my blog. I also noted that I wasn’t slamming Douglas in any way. I just felt the error needed to be corrected. Douglas argued on his blog that it was semantics, and that is probably true to a degree, but oh well. I let that go (actually I tried to post another comment on Douglas’ blog, but I think I put too many links in to prove my point because it never popped up – probably looked like spam).

3Com will be 2 com’s – This just in from the “a blind man could have seen it coming” department…

I guess they finally had enough at 3Com. Enough of the dual, schizophrenic personality. Or maybe it’s better described as the petulant teenager who just wouldn’t stop railing against being a part of the family. Tipping Point will get it’s way and be spun out on an IPO by years end according to an announcement from Edgar Masri, 3Com’s president and CEO.

It never was a fit. TippingPoint always saw themselves as the real acquirer in the deal, or maybe as Ty Pennington leading the Extreme Makeover – Home Edition of 3Com. The next generation to take over the company. And lets face it, the integration of 3Com and TippingPoint never did happen, starting with TippingPoint being identified as a “3Com company”.

Suggested Blog Reading – Wednesday June 27th, 2007

ReadNot a very busy day out in the blogosphere today but there were some quality posts.

Here’s the list:

The Right Way to Establish a Culture of Security – Quite the interesting concept.

After reading this article, my hat is off to Yahoo’s Arturo Bejar. Not only does he have the worlds coolest job title (“Chief Paranoid Yahoo”), but he’s taken some extremely creative measures to help build a pervasive culture of security at the Internet behemoth. I especially like the part about the t-shirts, since it not only gives people a reward to strive for, but they are also free advertising for the program. And the multiple tiers sounds like it would really spur some competition to get those coveted red shirts.

Cisco MARS Exam 642-544 – Hmmm…I wonder if the other large SEIM vendors are going to follow suit by offering certifications in their products through places like VUE and Prometric?

Cisco Security Mitigation and Response System (CS MARS) is a family of high performance, scalable appliances for threat management, monitoring and mitigation, enabling customers to make more effective use of network and security devices by combining network intelligence, context correlation, vector analysis, anomaly detection, hotspot identification and automated mitigation capabilities. CS MARS solutions empower customers to readily and accurately identify, manage and eliminate network attacks and maintain network compliance.

Worms 2.0! – The Metasploit menace inside your firewall – Good interview with Wade Alcorn.

In his research he focused on using a web browser as a beachhead to launch Metasploit-style attacks. What this means is that any Javascript enabled web browser might be used to launch an attack against a service, for example a VoIP server, and gain complete control of the box.

Generally exploits are executed inside a development framework such as Metasploit, or run directly from the code. But this time, the code would run inside the browser, using Javascript. And all of this takes palce without exploiting any bugs in the browser itself.
Your browser is now an active menace against the security of your internal network. However, the problem can’t be easily fixed, because it is not based on a bug: it simply uses “Web 2.0” technologies against you.

NBA – Can it be the star of the show? – I agree with Alan. One of the best ways to detect zero-day type of attacks is to perform behavioral analysis on your network traffic.

No, I am not talking about Kobe, Shaq, Tim Duncan and the rest of the athletes over at the National Basketball Association. I refer of course to Network Behavior Analysis. The estimable Mr. Rothman in his daily rant laments the fact that 5 years later we are still trying to explain what it is and that is pretty sad. I don’t think it is sad at all, it is just the facts. In spite of this though, I think NBA has made terrific strides. Here is why:

Memory Analysis Cheat Sheet – Might want to print this off 🙂

I’ve created a cheat sheet in order to accompany the tutorial held at the FIRST Conference 2007. On four pages it lists the most frequently used commands of Microsoft’s Debugger and some other memory analysis tools along with some structures and kernel variables. Get the cheat sheet here.

Scroll to top