Tuesday, December 11, 2012

The Twelve Days of Infosec

As was pointed out to me, these numbers do not represent real-life events. No one should assume these are accurate metrics over a twelve-day period for the average information security office. Now, if you add a few orders of magnitude...

The Twelve Days of Infosec

On the Twelfth Day of Infosec, the network gave to me...
Twelve hackers hacking,
Eleven spammers spamming,
Ten form injections,
Nine busted authNs,
Eight bad configures,
Seven crap encryptions,
Six plaintext cookies,
Five Pastebin posts!
Four calling cons,
Three Wikileaks,
Two credit cards,
And a forced password change for us all.

Happy Holidays from the Songs of Infosec!

Tuesday, November 6, 2012

One (More Hacked User)

As a kid, I loved the dark, scary feel of Metallica's video for their excellent song, "One".

http://www.youtube.com/watch?v=WM8bTdBs-cw

Some days, in the world of Infosec, things seem that scary.


One (More Hacked User)

I can't remember my accounts.
They seem to come in large amounts.
Deep down inside, terror mounts.
My Facebook account's gone now.

With all of the hackers through with me,
I'm freaking out, this cannot be!
Just ain't nothin' left, you see.
My data is all but gone now.

Hold me up as I try backups.
Oh, please help, IT!

Banking accounts are there to steal.
They grab all the stuff then make a deal.
Trade your ID for a cheap meal,
And the bank can't figure why.

Spam is flowing from my email:
Tourists in London needing bail,
Stock market hints, amazing kale.
All with a link to malware.

Hold me up as I try backups.
Oh, please help, IT!

Now my phone has gone dead, I mourn.
Oh, please help me!
Hold me up as I try backups.
Oh, please help, IT!

Hackers!
Impersonating
What I can be!
Absolute horror!
I cannot surf,
I cannot stream,
Trapped without hope,
Living with life off-line!

Malware!
Has taken my Mac!
Taken my phone!
Taken my Windows!
Taken my PIN!
Taken my cash!
Taken my soul!
Left me with ID fraauuuudd!

Thursday, October 25, 2012

M3AAWG - 7726

Did you know you can report mobile text message (SMS) spam to you cell phone provider?

You can!

Forward the offending message to 7726 from your phone.


7726

Your mobile phone chimes.
Quick wind knocks screaming branches.
A new text arrives.

Interest falters,
Sun slips behind horizon.
It's a spam message!

Feel empowerment:
Use 7726!
Spite the spamming night.

Wednesday, October 24, 2012

M3AAWG - V6

The Internet is taking its time moving to IPv6 networking. The lack of speed is understandable, considering the plethora of issues that come along with a giant network migration.
V6

I've heard all these stories 'bout IPv6.
From what I can tell, we're in a great fix.
Imagine some puzzles, a maze in the mix.
That starts to describe the IPv6.

It gives more addresses than stars in the sky.
It counts them with hexes; makes net tools all die.
If you want to keep going, you'd better be spry.
Don't let this big change-up cause you to cry.

Get used to notation like /44.
You're tracking addresses? Your caches will soar.
Despite all the admins that think it's a bore,
You've got to adopt it, of that you be sure.

Lest one day you'll find someone can't reach your site.
You'll do troubleshooting late into the night,
And you'll find a solution: v6 is it, right?
Your powers that be will have a great fright!

M3AAWG - ESP

I'm attending the M3AAWG General Meeting this week. I've gotten to meet all sorts of interesting people from across the Internet, all with the common goal to make the Internet a safer place for everyone.

One group of people I newly met are employees of ESPs, Email Service Providers. I kinda knew these sorts of businesses existed, but this is the first time I'm hearing the term, since Higher Ed has traditionally used their own email services. (This is shifting quickly, though, with the promise of The Cloud(tm).)

It turns out, ESPs have the same problems as Higher Ed email and abuse admins.


ESP

I have
Something to say and
Something to send you.
I really do.

I am
One of your partners.
I want to do business,
But there's a big mess.

You have
Blocked all my email,
Hung up on my phone calls:
Discussion all stalls.

And you
Send something through us.
Attachments seem fishy.
Oh, you just spammed me?

And no,
It wasn't just to us.
You spammed half of Europe.
In spam traps we're chomped up.

Oh, no!
You included virii,
And ain't that a real shame
We're taking all the blame.

It seems
That email is chaos,
Our goose has been boiled,
Our business is foiled!

Tuesday, September 11, 2012

Guest Post - A Few of My Favorite Things

[I am hardly the only voice singing into the maelstrom. Today, I hand the mic over to a fellow infosec pro and all-around witmaster, Brad Judy. -Dan]

A Few of My Favorite Things

Like Dan, I'm an information security pro in higher education. I am currently the Director of Information Security for the Administrative Division of the University of Colorado (for professional info, see http://www.linkedin.com/pub/brad-judy/1/470/7b3). I'm a husband, father, traveler, photographer, wood turner and general geek. I like to sing to my one year old daughter on our walks and have recently been singing her items from The Sound of Music. With thanks to Dan for help on the meter, and apologies to Rogers, Hammerstein and Julie Andrews; I give you the infosec version of "My Favorite Things"


Full disk encryption and good virus scanners,
IDS updates and disaster planners,
Coding securely: the joy that it brings!
These are a few of my favorite things.

DLP networks and good central logging,
Firewall blocking and infosec blogging,
Checking the uptime with regular pings:
These are a few of my favorite things.

Two factor tokens and HIPAA compliance,
Incident handling and forensic science,
Regex that matches to sensitive strings:
These are a few of my favorite things!

When the bots come!
When the disk's lost!
When the feds have phoned!
I simply remember my favorite things,
And then I don't feel so owned!

Thursday, July 26, 2012

Sixteen Hosts

Sixteen Hosts
Sung to the tune of Sixteen Tons by Tennessee Ernie Ford

Some people say my job is all about FUD.
They think I like to spend my days deep in the mud.
Deep in the mud where the data thrive.
None of your apps will make it out there alive.

You block 16 hosts, and what do you get?
Another day older and goals left unmet.
Don't you call me for a meeting 'cause I can't go!
I'm busy analyzing our Anonymous foe.

The Internet was born in a simpler time.
People didn't think how to use it for crime.
But now every day you're on a hacker's mind.
He'll steal all the data that that baddie can find.

You block 16 hosts, and what do you get?
Another day older and goals left unmet.
Don't you call me for a meeting 'cause I can't go!
I'm busy analyzing our Anonymous foe.

We try to lock it down, and we try to secure.
But some of our diseases just don't have a cure.
New viruses come and find their way home.
Stealin' all the passwords as the users go roam.

You block 16 hosts, and what do you get?
Another day older and goals left unmet.
Don't you call me for a meeting 'cause I can't go!
I'm busy analyzing our Anonymous foe.

"You canna change the laws of physics," said Scott.
And I can't do my job with the budget I got.
You expect me to find all the hackers inside.
But the wave of dangers makes me want to hide.

You block 16 hosts, and what do you get?
Another day older and goals left unmet.
Don't you call me for a meeting 'cause I can't go!
I'm busy analyzing our Anonymous foe.

If you see me walking down the hallway to you,
Don't tell me you have got something better to do.
Security is not just only my job.
Your lack of clue makes me want to sob.

You block 16 hosts, and what do you get?
Another day older and goals left unmet.
Don't you call me for a meeting 'cause I can't go!
I'm busy analyzing our Anonymous foe.

Tuesday, June 26, 2012

Data Loss Greeting Cards

There are many state laws on the books that require anyone collecting certain personally identifiable information (PII) to notify the affected parties (and the state) if that data is compromised and shared inappropriately. Why should that process be boring? I see an opportunity for a new style of greeting cards!
___________
Data Loss Greeting Cards

Front: 
"Congratulations on Your Identity Theft!"

Inside: 
"Hackers thought you were so cool,
They want to make some copies.
We're sorry we made it all so easy
By losing all those floppies."

_____________

Front:
"We're Sorry About The Breach!"

Inside:
"You shared with us your secrets, which we vowed to safely keep
But like a careless swimmer, we dove in way too deep.
Alas, our budget for security was met with strong rejection.
Instead, for you, we'll spend that cash on identity theft protection!"

______________

Front: 
"Did you know your computer could get a virus just from clicking a link, opening it up to hackers and other criminals who can then steal any of the data on the system as well as any passwords you type into it, especially passwords that might access large stores of personal data about our customers?"

Inside:
"Hey, we didn't either! :)
Happy Data Loss!"

Thursday, May 17, 2012

SPC 2012 - A Limerick

Things were getting too serious...



There once was a smart Russian hacker.
His code obfuscation a bushwhacker.
He pooched your website
Last Saturday night,
Making Monday morning even blacker.

SPC 2012 - What You Can't Outsource

During the conference happy hour on Wednesday, someone asked the crowd what couldn't be outsourced in IT.  (This was part of an ice breaker where they gave an open mic to anyone who wanted to talk about anything, like Speakers Corner in Hyde Park in London).

Coincidentally, upon seeing an opportunity to be a ham, I wrote the following.  It happened to also answer the question of what things in an IT program can't be outsourced.



What You Can't Outsource

Our school buses
    look like city buses.

Children ride those buses
    from dorms
    from slums.

They ride
    one hand on the strap
    or on the bar.

Their minds
    on the books
    in the bag
    attached to the strap
    on their back.

Their minds
    on the face
    of the person
    they met last night
    in the bar.

Their other hand
    holding their phone
    sending a text
    updating their timeline
    checking their grades.

Their grades
    the key
    their future
    hanging in the balance.

The bus opens to
    the library
    the stacks
    the computers.

They research
    they study
    they dream
    they snooze
    they wake with a start.

Their phone reminds them:
    Time for class.
    Time for office hours.
    Time for lunch.

They smile,
    unaware
    that we are there
    we run
    the network,
    the Blackboard,
    the kiosks,
    the instruments

Instruments that sing
    with music and data
    flowing and caressing them
    with an endless tune.

We keep their classrooms
    warm
    wired
    wireless
    lit
    projected
    safe

We keep their Internet
    warm
    wired
    wireless
    lit
    projected
    safe

They may never know
    to thank us
    to ask us
    to help them again

But we watch
    we fix
    we plan
    we dream too.

Our dreams are their dreams.

They just don't know it.

And we
    should never forget it.