Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Tenable Network Security Podcast - Episode 92

Welcome to the Tenable Network Security Podcast - Episode Episode 92

Hosts:

  • Paul Asadoorian, Product Evangelist
  • Ron Gula, CEO/CTO
  • Carlos Perez, Lead Vulnerability Researcher

Announcements

Stories

  • SILENT BUG IS SILENT. - A seemingly well-known bug in Internet Explorer, which allows for privilege escalation within IE itself, has been silently fixed. The bug allows processes in low integrity mode to execute processes in medium integrity mode. A remote exploit in IE is required to take advantage of this flaw, which has been patched.
  • Blow Your Own Horn - This article describes a series of talks in which the presenter was to offer situations in information security where they "won". An elevator speech if you will, and one such example was this: "Last year you (the Board) approved purchase of a $50,000 license fee for AV software on the email server. This past month, records show it stopped 1 million viruses, which would otherwise have gotten through. Had they been run, they would have cost $500 each (estimated industry average) to clean up. Therefore, your prescient decision to spend $50,000 has returned $500,000,000 to the company."Is that a "win" or an example of socially engineering management?
  • Anonymous hacks BART, creating even more innocent victims - Anonymous hacks San Francisco's BART (Bay Area Rapid Transit) system. "They performed a SQL injection (SQLi) attack against the site and were able to extract more than 2,000 records containing names, usernames, passwords (plain text), emails, phone numbers, addresses and zip codes." Begs the question, what are the motives of Anonymous? Do they wish to expose user data to hurt the users themselves, hurt the target organization to make an example, or are they funded by organizations for political or capital gain? I'm not sure what is to gain by attacking this system, but certainly begs the question.
  • XSS on eBay's site - The problem seems to crop up in eBay's sub-domains, which could mean that the main eBay site gets all of the attention, leaving the sub-domains vulnerable to easy find and fix XSS vulnerabilities.
  • Device finds child porn on WiFi - It's refreshing to see technology being used for good, rather than evil. A recent example is Fluke Networks Aircheck WiFi device that can detect child pornography on open and encrypted WiFi networks. Also: "This device can also be used against identity theft, Internet stalking and even online phishing scams."Nice, I wonder if it does in fact break the encryption on WiFi networks if permission, e.g. a warrant, is required?
  • Microsoft patches 1990s-era 'Ping of Death' - Microsoft released MS11-064, which fixed the infamous "Ping Of Death" vulnerability in the Windows TCP/IP stack. "...appeared that today's "Ping of Death" bug was a different vulnerability than Microsoft patched in its now-ancient OSes of the 1990s. The bug exists in Windows Vista, Server 2008, Windows 7 and Server 2008 R2, Microsoft said, but not in Windows XP or Server 2003. Others were less concerned with the new Ping of Death problem. "It's definitely an old-school kind of attack," said Sarwate of Qualys. "But if it is exploited, I think it would be more on the prank side.""
  • Defcon: VoIP makes a good platform for controlling Botnets - This is one of the most interesting Botnet command and control channel implementations I've seen in some time. Using "MoshiMoshi", open-source software that converts DTMF tones to bits and bytes, they can use it to communicate with the bots. This is difficult to detect, as VoIP networks are typically separate and often not monitored for this type of communications. However, if you were to look closely at the session data, you may be able to pick up on anomalies such as long sessions, or in this case long phone calls or phone calls with specific patterns.

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training