Intro
Welcome back! This is episode 30 of The Insider Threat podcast, for the first week of 2018.
Here we are in a new year.
Well, not really. I'm prepping and recording this episode in the last week of 2017, but you're listening to it in the new year
Move went well - my wife is awesome
How have your holidays gone so far?
Important: Many people don't feel as well during the holidays, especially in our industry. I completely understand, as I've gone through some of that myself in the past. Hang in there and if you need anyone to talk to, please contact me in any of the ways listed at the end of the show. I mean that and I won't go blabbing about it anywhere. You're very important to many people, whether you know them or not.
That's it for the annoucements so...
Infosec Question of the Week
It's time for your Infosec Question of the Week, where Google is king and the prize is nonexistent!
The question last week was "A key method for stealing information in databases that are accessible from the web is to input a string of characters in certain fields in order to trick the database into doing something unintended. What is the name of this technique?"
The answer was "SQL Injection".
SQL Inection is a technique that has been around for a long time - maybe since 1998 when Jeff Forristal wrote about issues with SQL servers for the Phrack magazine
Remember when we used to call them "zines"?
Essentially you use this technique to inject commands or confusing information into the SQL server, which causes it to do many things, like let you into a website as administrator, dump data, or even discover information about the underlying system
Still probably the leading method for stealing data from a website, even after all this time
There were a ton of people who got this one correct, so I'm just going to list first names
Congratulations to Erin, Ron, Alicia, Carol, Tim, Joel, Naji, Julian, Kedar, Steffen, Terry, Sophie, and Josh for getting the correct answer.
Here's your question for this week: "Quite a long time ago in a distant place, the biggest weapon ever developed was completely destroyed by exploiting a vulnerability intentionally left by an insider threat. What was the name of this weapon and who was the insider threat?"
Send your response to InfosecAnswer@gmail.com. Be sure to include your first name, location, and the hashtag "seeingthenewonethisweekendandsuperexcited". That's all one word, if you were wondering.
Discussion Topics for the Week
This week’s discussion topics are expectations for the coming year and insider threat resolutions
"Expectations"
Don't want to call it predictions
Twitter predictions: there will be more ransomware, more breaches, and marketers taking advantage of it all
Cryptocurrency is going to play a bigger role
More vendors coming out with tools and services for awareness
Resolutions
Personally: I'm in the position to educate more and I need to take it
Implement some sort of continuous education
Take time to teach my kids more about technology and how to be safe with it
Do more writing
Do more reading
Have more guests on the show
News
ATMs can be "hacked" using old Windows XP "feature"
This is done through sticky keys
Hit shift button 5 times
I hated this feature, and as I'm testing right now it looks like it still exists on Windows 10
Who ever used sticky keys? Am I alone in this? (Let me know)
Used this "feature" to bypass the normal ATM screen and manipulate the back end XP operating system (change boot scripts, install malware, etc.)
Wonder if you could also use this to access the internal banking system
Thought of the Week Segment
Our thought of the week comes from a British author named Neil Gaiman, . He said, "I hope that in this year to come, you make mistakes. Because if you are making mistakes, then you are making new things, trying new things, learning, living, pushing yourself, changing yourself, changing your world. You're doing things you've never done before, and more importantly, you're doing something."
Outro
Thank you for listening to episode 30 of The Insider Threat podcast. Please remember to subscribe and review in your favorite podcast app, and also share with everyone you know! Those reviews are key to building this out and improving for later episodes, so please feel free to leave suggestions.
You can contact me on twitter @stevehigdon or send an email to steve@theinsiderthreatpodcast.com. Go to our website, www.theinsiderthreatpodcast.com, to find the show notes for this and every other episode, as well as links to the topics we've covered. You can also go to the website to find a link to the Patreon page and subscribe to the newsletter to get up-to-date information on current episodes and news for the show. Call and leave a voicemail at (443) 292-2287 to have a conversation, get a comment added to the show, or even ask a question.
Happy New Year, everyone! I hope 2018 is everything you want it to be, no matter what that looks like.
Thanks again and I'll see you folks next time!
Contact information:
Call in number: (443) 292-2287
Email - steve@theinsiderthreatpodcast.com
Blog - http://www.stephenhigdon.com
Twitter - https://twitter.com/stevehigdon
LinkedIn - https://www.linkedin.com/in/stevehigdon-infosec/
LinksATMs Running Windows XP Can Be Hacked Using Sticky Keys
Comentarios