Security Related Report #24 Black Hat 2011 & Def Con 19
Total Page:16
File Type:pdf, Size:1020Kb
ISSN 1061-5725 This Month’s Presentation SOUTHWEST CONFERENCE REVIEW Presented Volume 29, No. 9 September 2011 by www.ucs.org Bob This Month’s Meeting: Wednesday 14th at 7 pm Beaudoin Check Out Review of Security Related Report #24 Hope to See Black Hat 2011 You There! & Def Con 19 Starting on on page 4 Utah’s Award Winning Computer Magazine! ™ By Cliff Millward, Editor [email protected] Reflections Don Nendell pointed out to me that the space pro- gram started the same year Blue Chips Started and now comes to a conclusion the same year as Blue Chips seem- ingly folds. Therefore, I will use my column to highlight some interesting photos of the past years of Blue Chips photos. DO YOU REMEMBER 1998? ----- I will show more photos of our glorious past in the next edition. Finè Page 2 Blue Chips Magazine — September 2011 Blue Chips Magazine “Utah’s Award Winning Publication” Magazine Staff Charter Member of the Editor — Cliff Millward 619-9633 Association of PC User Groups Review Program Liaison — James Alexander 250-2269 Review Product Editor — Donna Nendell (702) 776-8677 Review Editor/Product Recruiter — Don Nendell (702) 776-8677 Photography — LeRoy Johnson Officers and Trustees Eve. Phone E-mail Proof Reader — Larry Lamph, Doug Jackson President, Stuart Gygi 576-1891 [email protected] V. Pres., Larry Lamph 571-2908 [email protected] Advertising Rates Secretary, Lowell Kenedy 278-3035 lkenedy@ucs,org Treasurer, John Witzel 296-1390 witzelj@ucs,orgtt Ad costs 1 month 3 months 6 months 12 months 2 Page Spread $150 $400 $700 $1200 Doug Jackson 322-2337 [email protected] Full Page $100 $275 $500 $900 Half Page $50 $130 $250 $450 Quarter Page $25 $70 $130 $225 Business Card $15 $30 $60 $120 Information Full page size is 7½ x 10 inches. All other page sizes are based on a 7 x 10 Persons or companies may join or renew at the meeting, or by sending a check payable inch page in order to conform to editorial style. Half-page ads may be 7 x 5 inches to the Utah Computer Society to: or 3½ x 10 inches. Quarter-page ads are 3½ x 5 inches. Business card ads are 3½ x 2½ inches. Utah Computer Society Classified Advertising Membership Secretary Utah Blue Chips members may place personal classified ads at no charge. Maximum ad size is 7 lines, 35 characters per line. 5435 Riley Lane Murray, Utah 84107 Submissions Members are encouraged to submit text articles for publication in ASCII text only. Photos in .TIF or .JPG format only. Line graphics, tables, in almost any vector or Individual memberships are $25/year. .TIF format. Do not imbed graphics or tables in text files. All articles must be received Business Memberships are $35.00 a year. by the 15th of the month preceding the month of publication. All articles become the Corporate sponsorships are available at two levels. Corporate Sponsors enjoy all benefits property of the Utah Computer Society and by submitting an article, the author gives of membership including multiple individual membership and prepaid advertising coverage. permission for the Blue Chips Magazine Staff to edit the submission. The author Contact a Board Member for more information. also gives permission for republication in other users groups’ communications. Permission to Copy Permission is granted to other nonprofit PC user groups to reproduce any Other important information: Meeting Information http://www.ucs.org article published in this newsletter, provided credit is given Blue Chips Magazine Group Business (James Alexander) 250-2269 and the author (s) of the reproduced materials. Reprinted articles are subject to the Magazine (Cliff Millward) 955-9633 terms of their respective copyright holders. Web Site http://www.ucs.org WebMaster 262-6045 Membership (evenings) (Bob) 262-6045 MONTHLY MEETING LOCATION 2nd Wednesday of every month Monthly Meeting: SouthWest Conference Review University of Utah, Union Building, 7:00 p.m. Page 3 Blue Chips Magazine — September 2011 Black Hat 2011 and Def Con 19 Security-Related Report #24 Security Report By Don Nendell Dear Reader, If you are reading this in a non-PDF format, you are missing a large part of the whole Report/Review 1 & 2. You should, therefore, stop reading and immediately follow the steps outlined in the Footnotes 1 & 2 below. Which BTW are: 1. “If you are reading this Report/ Review 1 & 2 from directly off of an Internet search, you are seeing it in HTML (or text) format. Yuk! There’s No Graphics there! To see all the beautiful Graphics in this Report/Review 1 & 2 - the ones that we’ve worked so very hard to entertain you with - you will need the Internet, at Banks, Medical-related 125 lines of code to create the typical to follow the procedures outlined in 2 Establishments, Industrial Giants, et piece of malware and it takes about 10 below. Enjoy! Again, our web page is: al., even between Nation-states (see (www.ucs.org). below), et cetera, et cetera. The list is 2. “See the actual Reports/Reviews endless actually; it effects everybody, 1 & 2 in the Blue Chips Magazine (BCM) and is everywhere, because it’s virtually Archives (i.e., begin search on left-hand “ubiquitous” now (see below). side of web page) at: (www.ucs.org). Black Hat Teaser. Peiter Zatko is a Note. Always famous hacker known as Mudge from million lines of code to create sophisti- choose the center the early L0pht (Crack) group. But he cated technologies to protect against it. option, i.e., PDF for- crossed into the realm of white hats (My emphasis here) There’s more, lots mat for its beauty.” more... Read on, dear ones. Prelude It’s a War, this time a Cyberwar, and they’re taking no prisoners. Well almost. Let me qual- ify that statement. The “Good Guys” Putting Security into Context and the “Bad Guys” eEye Digital Securty at Black Hat are sitting side-by-side and taking notes USA 2011 stated (http://go.eeye.com/ at the same classes at Security Confer- LP=62), There’s a lot of fear swirling ences, much like Black Hat USA 2011 through the IT Security world. You’re (BHB 2011) and Def Con 19 (DC19), all warned to prepare for the worst – Stux- over the world day in and day out. When net, Night Dragon, Aurora, APTs, bot- these conferences conclude they return nets, etc. You try to make sense of media to their place(s) of business(es) and when he joined the Pentagon’s Defense alarmism like “coordinated attack on the contiue to duke it out all over the world, Advanced Research Projects Agency US,” “state-sponsored e-terrorism,” and and they do it in every nook and cranny (DARPA) as program manager for cyber “cyber Armageddon!” [But] Hold on. that holds any information of value; but security. In a Black Hat keynote, he an- Let’s bring this conversation down to it’s most evident to us all when it’s over nounced that the government plans to Earth. Cyber threats are very real and “Money!” invest in hundreds of small cyber secu- very serious, but not all of them should These “fierce battles” are raging, rity projects and companies in order to incite the same urgency to every busi- as we speak (and sleep, because these kickstart security technology. ness, [or everybody, for that matter,] cyber-combatants never sleep), all over Zatko found that it takes about every time. Page 4 Blue Chips Magazine — September 2011 that is targeted at specific government soliloquy, though; it’s the ‘ol Nigerian officials, in the hope of stealing critical scam crowd, and the like, they’re “still government information, passcodes and making fools out of the naive ones,” I, more. What is at stake is everything from and my other “Pied Pipers” can’t seem military secrets to the operation of criti- to get through to. “Yeah, those other cal infrastructure, such as power and simpleton’s,” you are saying to yourself water utilities. No government agency - nodding vigorously, “but not me!” Well is immune nor any person or industry now, let’s do that again and then listen (see below). to the rocks rattle, OK? I agree with the admonisssion wholeheartedly, but let’s leave the “na- ivity” part out of this very serious mat- ter before us “over there in the toilet” where it rightfully belongs! Instead, I have been writing about such “Be informed, be forewarned, be armed, things for what seems a very long time and fight this evil scourge with all your now, mostly because of my personal might, while you can!” involvement in that self-same Security Industry, plus my very deep conviction “No!” you shout vigorously and that everyone must be made aware of vehemently, wildly shaking your head the inherent dangers to the their very from side to side. “Yeeees!” I say softly life, limb and properties. with a slight nod of my head, “It is!” “I was an intelligence officer, not a policy-maker. As long as there are people who are not happy with their lot in life, as long as the United States is perceived to somehow be the cause of I’m not going to argue with you, I’m 9/11, A Decade Later - Targeted this unhappiness, there will be terror- merely going to quote a potpourri of attacks: Bulls-eye on govern- ism.” - Cofer Black, former Blackwater recent news and a couple of well-chosen ment agencies by: Bradley Anstis, CEO (See below) recently attended (See below) formal GSN 09/08/11.