Showing posts with label CyberWar. Show all posts
Showing posts with label CyberWar. Show all posts

Sunday, 21 April 2013

@th3j35ter is more than a Newt Gingrich, he also violates Wounded Warriors | The Internet Chronicle

My dear j35t3r, you are a bottomless source of lulz.

When I helped ruin your Westboro Baptist Psy-Op, Topiary took all the glory and I stole all your troll food. You were a failure then, and you are a failure now. You may be pretty good at throwing packets around, but that doesn’t mean you have any valuable skills. I have all the insanely advanced Computer Science 101 it takes to do what you do, but I can get attention for my cause without the parlor tricks you pass for hacktivism. This site gets nearly as much traffic as yours without the need for that kind of childish behavior.

failtroll th3j35ter is more than a Newt Gingrich, he also violates Wounded Warriors

In June, th3j35t3r received a huge spike in traffic because Tyler Bass mentioned him in an interview with LulzSec.

Lately, no one’s been paying attention to you. That makes you a sad little troll, eh? Your recent confrontation with John Tiessen not only proves you are desperately in need of attention, but it also shows how fearful you are of engaging truly skilled trolls. Remember that hilarious, substantive troll about Hugo Carvalho I published on pastebin in your name? You denied it before I could even refresh the page to see the view count. I guess you were saving all your attention for this obstreperous John Tiessen nutjob. I guess it’s just natural that you’d pick the low hanging fruit. It’s okay, you know I’m a pro, and you know not to fuck with me.

John Tiessen is right though, you are a Newt Gingrich. The fact that Tiessen is a sex offender only strengthens his point. It takes one to know one, as they say. You’re an adult who believes that the childish DDoS of Jihadist web sites justifies the illegal possession of a bot-net. You rape the computers of children, old women, wounded soldiers, and the general public just so you can get the kind of attention that other writers at this site and I command with pure creativity. And then, most insulting of all, you use what you do as a platform to collect donations for Wounded Warriors and yourself. You sick Newt Gingrich.

I hope you enjoy your empty bitcoin purse and your dwindling traffic. Your 15 minutes of fame are up, loser. Tick-tock, tango down, stay frosty. Get the fuck off the internet forever, please.

Yours truly,

Someone much better than you

P.S. As a joke, I advertised my bitcoin address (18zJouAQAMzX5sJygZ4M2QV7yb8FzxSbdq) and begged for money to spend on Silk Road. Since then, I have received more donations than you ever will.

We tested this page and blocked content that comes from potentially dangerous or suspicious sites. Allow this content only if you’re sure it comes from safe sites.

Joseph K Black plagiarizes Gregory D Evans | The Internet Chronicle

Joseph K Black plagiarizes Gregory D Evans

Famous for books that are 99.3% plagiarized, security charlatan Gregory D Evans has, for once, had his work stolen out from under him. Joseph K Black has adopted Gregory D Evans’ methods. Black has cited his doubtful “expertise” as a reason for people to pay attention to him. Joseph K Black is unapologetic about his obvious intellectual theft from Gregory D Evans, just as Evans embraces his place as a plagiarist.

twittershot Joseph K Black plagiarizes Gregory D Evans

Twitterrific is a Mac-only Twitter client, final proof of Gregory D Evans' fraudulent computer expertise.

Gregory D Evans obviously doesn’t care that he’s a plagiarist, as long as he gets his attention. He’s made many contradictory and uninformed comments for reporters who think he’s an expert on Anonymous or computer security.

This is a challenge to Joseph K Black: Step up your game if you want to outdo Gregory D Evans.

We tested this page and blocked content that comes from potentially dangerous or suspicious sites. Allow this content only if you’re sure it comes from safe sites.

Saturday, 20 April 2013

Project World Awareness: This psychopaths kettle is boiling... she did warn us....

Photo

Foresight Through Hindsight | Project World Awareness
http://www.projectworldawareness.com/forums/


Comments

  • osmankadrikoca on April 28th, 2009

    ‘When an artist looks at the world,he sees color..

    When a musician looks at the world,she hears music..

    When an economist looks at the world,she sees a symphony of costs and benefits..

    The economist’s world might not be as colorful or as melodic as the others’ worlds,but it’s more practical..

    If you want to understand what’s going on in the world that’s really out there,you need to know economics..„

  • Lisa on September 8th, 2010

    Hey Jude, this Rocks!! Thank you so much for taking the time to provide a place where we can gather and start the conversation. Luv ya!

  • admin on September 9th, 2010

    I’m in lala land so going to take a rest…Thanks for the comment Lisa…can always count on you xoxoxo

    ~hugs

  • Elyssa Durant on September 9th, 2010

    “The paradox of education is precisely this– that as one begins to
    become educated, one begins to examine the society in which he [or
    she] is being educated.” – Baldwin

  • vaxen_var on September 9th, 2010

    Hope all your lala’s are us… ;) Happy 9 of 7 jude san.

  • admin on September 9th, 2010

    I think this article, published in 1993, gives an excellent perspective on why 9/11 and the war on terrorism were ‘needed’ for US For. Pol. Leon Hadar: The Green Peril, Creating the Islamic Fundamentalist Threat (Cato Institute) http://bit.ly/c3w2m1

    Here are some more articles posted on this in 2006 (ignore the Dutch comments) http://bit.ly/bV11Sk

    Nye/Woolsey – Defend Against the Shadow Enemy (US Senate, 5 Sep. 2001) http://bit.ly/bxYrX5

    Donald Rumsfeld: From Bureaucracy to Battlefield (Sep. 10, 2001) http://bit.ly/9IjyNu Ever read this speech ?

  • admin on September 9th, 2010

    OHHH and BTW…my lala’s were fine lolll
    ~hugs

  • Elyssa Durant on September 10th, 2010

    Hey Jude~ I just came across this comment iin the Examiner http://tinyurl.com/2fbvprv

    “WE NEED NULLIFICATION NOW TO REGAIN OUR COUNTRY FROM THESE TYRANNICAL FREAKS WHO HAVE TAKEN OVER AMERICA AND WANT TO USHER IN THEIR ILLUMINATI NWO INSANITY. I NEED HELP IF ANYBODY GIVES A DAMN IN THIS WORLD.”

    http://disc.yourwebapps.com/discussion.cgi?disc=149495;article=131896;ti

    KEVIN CANADA
    631 778-5024

    The eror is real and although I can’t call perssonallly, I’m wondering if there is some way we can le that there ARE people who give a damn. Aritcle link

    http://www.examiner.com/human-rights-in-national/extremist-stalking-cells-america

    http://tinyurl.com/2fbvprv

  • Lessat on September 10th, 2010

    Your gift of Words & Wisdom is a blessing to us all ….thank you for always reaching out to help your fellow man. Hugs

  • opphoto on September 10th, 2010

    Just popped by to check on you and your your lala’s ;-) Thanks for the meeting spot, it’s a great start!

  • admin on September 11th, 2010

    Exclusive: Google, CIA Invest in ‘Future’ of Web Monitoring | Danger Room | Wired… http://bit.ly/cribNL <> hold 4 HiStory…

    Thanks for all checking in hope to hear *more* from you ;)
    ~love, me

  • admin on September 12th, 2010

    per your post Ellysa… http://www.nwbotanicals.org/oak/newphysics/synthtele/synthtele.html

  • Krystin Piel on September 21st, 2010

    nice blog!! Learning something new everyday and benefiting from the posts of other people is one reason why I love to read blogs. Thanks for sharing this.

  • admin on September 22nd, 2010

    You’re very welcome…enjoy!!!
    ~hugs,~jude

  • Just1Marine on April 5th, 2011

    Great site my friend. Stay Free, Semper Fi

  • rockingjude on April 5th, 2011

    Semper Fi~

    XOXO

  • Al Holtje on March 24th, 2012

    Hey Jude, I’ve been around for a long time. Worked as a cryptographer at NATO Headquarters in Paris for 3 years during the Cold War and came away at the early age of 22 with the ability to look at any problem figure it out and then put the pieces back together. I did exactly that on Wall Street for 35 years. Designing and implementing systems. In 1987 I was asked to look at the new computerized trading system and said: “NO” it had too many loop holes and needed to be strengthened. System was making big money so nothing got done. Later that year i realized that the system could experience a sell off and invested in puts on the S&P500. The market crashed and well let’s just say, I have the confirmations to prove it.

    That being said. Here we go again except this time, it’s out of control. Thank you very much for publishing my article “Bursting the Bubble” and, if there’s anyway I can help let me know. Again, great site and … Thank You
    Al Holtje

  • rockingjude on March 24th, 2012

    Would love to talk with you…I wasn’t on the inside but a group of us that were trading released what was happening with the housing market etc way before anyone even realized it was a problem…ergo I decided our private boards weren’t enough and built this site…got on twitter and started talking… ;)

    ~jude

Leave a Reply

© 2009-2013 Project World Awareness 


 

image.png

image.jpeg

RockingJude in all her glory... 

I let it rest. When she disappeared from the blogosphere and her precious twitter, I secretly hoped that she had either followed through with her frequent threats of suicide or was finally receiving the long term psychiatric hospitalization that she so desperately needs. 

No such luck. Jude reappeared to solicit sympathy and assistance from some of my biggest fans (DefCon 4 types) begging them to protect her from me and my hacking skills. 

Jude Vosika, "allegedly from Wyoming" accused me once again of hacking her site and begged for assistance from AntiSec and LulzSec. 

Little Miss V claims she had to hire security professionals (again) to secure her pathetic, unoriginal site, ProjectWorldAwareness.com (which, incidentally is not registered in her name or place of residence) as a result of being hacked since 2010 by me and my "cronies."

I have two things to say:

1. What is so damn special about her pathetic website worthy of hacking? She BEGGED me to post these generic comments just so my name would be on her page. She also took my original writings (protected by copyright) and posted them as her own on her stupid little site. 

Since she can't spell, write and has no education or real "creds" you can find other comments and people complaining that she merely steals materials from others (like myself) and when she wants to troll or harass people she uses fake names since hers carries no weight. 

This is clearly evident in the screen cap above where she pretends to be a well respected and independent thinker using his name to threaten me on my blog. 

"You don't need to be a rocket scientist" to realize that Jude Vosika was posing as someone she claims also hacked her when I met her a few years ago under VERY bizarre circumstances.. 

2. If you're so damn sure I am hacking you, call the fucking Feds. God knows you have enough an interest in them judging by how you stalked and fixated on my father; posting his bio and credentials on YOUR pathetic little website. 

Glad that shit got suspended. Couldn't have happened to a nicer person. 

To be continued if need be. 

Quit while your ahead, stupid cunt. 

PS  Also noticed Jude posts under multiple admin accounts, Gravatars and multiple aliases and personalities; but she sure loves using her self-proclaimed "celebrity" and the name ROCKINGJUDE ( @rockingjude on Twitter and FaceBook) and her less than interesting timeline to create, drama, terror, fear and to enlist help from 200,000 or so [probably] paid followers to stalk, bully, threaten, harrass and terrorize her victims.

I wonder how many of these people have ever met this deranged woman.  I sure wish I never did.

Word of advice, if you ever see "Hello, it's me" in her tineline-- she has slipped into an altar ego where she "hunts" her victims with the help of few friends for days, weeks, months, or in my case, years on end. 

I have an advanced degree in Psychology and worked as a therapist for the state, the CDC, SAMHSA, and several other agencies and organizations.

I could you her diagnosis, but that would be sinking to her level and she would claim I am victimizing her.

Do yourselves a favor. STAY AWAY!

[originally posted June 19, 2011 updated in light of recent events April 20, 2013]

 

Just me,

e 📧
@ELyssaD™

Forgive typos! iBLAME iPhone

Tuesday, 2 April 2013

SE Ops » DaveN || WORLDWIDE! Firetown busted again!

FlameWars

Tuesday, February 7th, 2006

DarthN
In a galaxy far far away ….. dum dum dum dee dee dum well something like that anyway lol

People have said a lot of things in the past few weeks about a certain competition V7N , So I jumped in with both feet, why people will ask, to be honest because I was bored. Remember I had a go at Jason Calcanis, and Blog Herald jumped all over me .. lol not Jason hmm

Well I had a go at John Scott recently mainly because I felt that he was having a pop at Mike Grehan, well I think those two have kissed and made up now so I’m not going into the details..

So why am I posting this .. dead easy, FlameWars can and do get you links. Ok the Flamewars rules :

a) Pick your fighting ground
Example Threadwatch, Notice Seobook is just pointing out a writeup on SeoBuzzBox, Ok Threadwatch is one of playing grounds like V7N, so if you’re going to pick a fight pick a ground you feel comfortable with.

b) Get in quick and straight to the point !
OK I knew that telling John to suck my dick would make him rise to the bait … well it had to really, lol. Also notice the “officially NOT on the fence so you better pick a side” to seobook .. chances are Aaron wall won’t bite back at me ..(phew He didn’t) but someone would have to back him up, hopefully John Scott’s Troll ;)

c) The response
John Scott returns his volley, it’s a very good return, and I would have been done and walked away. I knew that people would post the calm down or stop being childish etc threads, but John made a schoolboy error he posted a controversial image of a disabled child ! ( now in his playing ground that might have been acceptable but not here .. oops )

d) Sit back
The community should now attack or walk away, top tip… you do the same lol (notice half way down John Scott post

e) Wait and wait some more ..
BINGO the target .. yes a Flamewar should always target someone who is defending someone else. Mike Dammann steps up .. thank you lord a fool

Mike Dammann’s Post :
looking at people like DaveN and Mike Grehan and their lack of class and manners. So should everyone in this industry be.

Class and manners… ok, Mike Grehan has these, so he may feel offended but not me

I find it surprising that anyone would want to associate himself with such individuals. That speaks very poorly of our industry as a whole that anyone that low could be accepted as equals within our community.

LOL I’m a Blackhat Seo. I work in Casinos, Pills, Loans, and the Affiliate marketplace, Notice the Naked Bull Riding !! (added for my whitehat corp clients, I still love you guys too)

Those 2 are yes men and what DaveN has suggested for John Scott to do to him … wouldn’t be a surprise to me if that is how Mike and Dave have gotten your foot into the door somehow.

YES men HAHAHAHA, that’s too funny I nearly pissed myself , you see Mr Damman, you have the good and you have the evil, we are not the same by a long shot, I mud wrestle in the serps , while Mike swims in champagne, both top of our Game, just different games lol

Aaron doesn’t have to pick any side, Dave. You don’t get it. He is not on your level, he’s intelligent enough to understand seo without sucking up to anyone, and he is mature enough to choose his battles well and not fall into the herd mentality.

Yep, I agree I threw the Aaron bit in to find my Troll :)

But then again, if it wasn’t for following someone, you and Mike Grehan would be working at McDonalds or cleaning trainstation bathrooms together

Lol that’s too funny as well, I have worked at a Happy Eater (they are like McDonald’s but on our motorways), while I was saving up to go to college to learn how to programme which was kind of a big step because none of my friends or family were into computers, so that kind of rules out the bit about having to follow someone.

I have no problems of you bad mouthing me and you linking to my site, after all you’re a fucking nobody, but isn’t that part of the game, but please get some facts right .

I have been married twice, but never walk out on my family
I do live in a half a million pound house and have never lived in my car
I always pay my way and never free load or sneak into places
I have rode a bull naked (well with my boxers still on!)
And the ONLY competition I will be entering is the Greg and DaveN Vodka challenge, But again thanks for the Links

DaveN

who has WHO by the balls now?

Firetown0

SE Ops » DaveN || WORLDWIDE! Go Team #BLACK

FlameWars

Tuesday, February 7th, 2006

DarthN
In a galaxy far far away ….. dum dum dum dee dee dum well something like that anyway lol

People have said a lot of things in the past few weeks about a certain competition V7N , So I jumped in with both feet, why people will ask, to be honest because I was bored. Remember I had a go at Jason Calcanis, and Blog Herald jumped all over me .. lol not Jason hmm

Well I had a go at John Scott recently mainly because I felt that he was having a pop at Mike Grehan, well I think those two have kissed and made up now so I’m not going into the details..

So why am I posting this .. dead easy, FlameWars can and do get you links. Ok the Flamewars rules :

a) Pick your fighting ground
Example Threadwatch, Notice Seobook is just pointing out a writeup on SeoBuzzBox, Ok Threadwatch is one of playing grounds like V7N, so if you’re going to pick a fight pick a ground you feel comfortable with.

b) Get in quick and straight to the point !
OK I knew that telling John to suck my dick would make him rise to the bait … well it had to really, lol. Also notice the “officially NOT on the fence so you better pick a side” to seobook .. chances are Aaron wall won’t bite back at me ..(phew He didn’t) but someone would have to back him up, hopefully John Scott’s Troll ;)

c) The response
John Scott returns his volley, it’s a very good return, and I would have been done and walked away. I knew that people would post the calm down or stop being childish etc threads, but John made a schoolboy error he posted a controversial image of a disabled child ! ( now in his playing ground that might have been acceptable but not here .. oops )

d) Sit back
The community should now attack or walk away, top tip… you do the same lol (notice half way down John Scott post

e) Wait and wait some more ..
BINGO the target .. yes a Flamewar should always target someone who is defending someone else. Mike Dammann steps up .. thank you lord a fool

Mike Dammann’s Post :
looking at people like DaveN and Mike Grehan and their lack of class and manners. So should everyone in this industry be.

Class and manners… ok, Mike Grehan has these, so he may feel offended but not me

I find it surprising that anyone would want to associate himself with such individuals. That speaks very poorly of our industry as a whole that anyone that low could be accepted as equals within our community.

LOL I’m a Blackhat Seo. I work in Casinos, Pills, Loans, and the Affiliate marketplace, Notice the Naked Bull Riding !! (added for my whitehat corp clients, I still love you guys too)

Those 2 are yes men and what DaveN has suggested for John Scott to do to him … wouldn’t be a surprise to me if that is how Mike and Dave have gotten your foot into the door somehow.

YES men HAHAHAHA, that’s too funny I nearly pissed myself , you see Mr Damman, you have the good and you have the evil, we are not the same by a long shot, I mud wrestle in the serps , while Mike swims in champagne, both top of our Game, just different games lol

Aaron doesn’t have to pick any side, Dave. You don’t get it. He is not on your level, he’s intelligent enough to understand seo without sucking up to anyone, and he is mature enough to choose his battles well and not fall into the herd mentality.

Yep, I agree I threw the Aaron bit in to find my Troll :)

But then again, if it wasn’t for following someone, you and Mike Grehan would be working at McDonalds or cleaning trainstation bathrooms together

Lol that’s too funny as well, I have worked at a Happy Eater (they are like McDonald’s but on our motorways), while I was saving up to go to college to learn how to programme which was kind of a big step because none of my friends or family were into computers, so that kind of rules out the bit about having to follow someone.

I have no problems of you bad mouthing me and you linking to my site, after all you’re a fucking nobody, but isn’t that part of the game, but please get some facts right .

I have been married twice, but never walk out on my family
I do live in a half a million pound house and have never lived in my car
I always pay my way and never free load or sneak into places
I have rode a bull naked (well with my boxers still on!)
And the ONLY competition I will be entering is the Greg and DaveN Vodka challenge, But again thanks for the Links

DaveN

who has WHO by the balls now?

Firetown0

FBI — The Cyber Threat: Planning for the Way Ahead

The Cyber Threat
Planning for the Way Ahead

02/28/13

Denial of service attacks, network intrusions, state-sponsored hackers bent on compromising our national security: The cyber threat is growing, and in response, said FBI Director Robert S. Mueller, the Bureau must continue to strengthen its partnerships with other government agencies and private industry—and take the fight to the criminals.

“Network intrusions pose urgent threats to our national security and to our economy,” Mueller told a group of cyber security professionals in San Francisco today. “If we are to confront these threats successfully,” he explained, “we must adopt a unified approach” that promotes partnerships and intelligence sharing—in the same way we responded to terrorism after the 9/11 attacks.


Padlocks graphic

 Focus on Hackers and Intrusions

The FBI over the past year has put in place an initiative to uncover and investigate web-based intrusion attacks and develop a cadre of specially trained computer scientists able to extract hackers’ digital signatures from mountains of malicious code. Learn more 


The FBI learned after 9/11 that “our mission was to use our skills and resources to identify terrorist threats and to find ways of disrupting those threats,” Mueller said. “This has been the mindset at the heart of every terrorism investigation since then, and it must be true of every case in the cyber arena as well.”

Partnerships that ensure the seamless flow of intelligence are critical in the fight against cyber crime, he explained. Within government, the National Cyber Investigative Joint Task Force, which comprises 19 separate agencies, serves as a focal point for cyber threat information. But private industry—a major victim of cyber intrusions—must also be “an essential partner,” Mueller said, pointing to several successful initiatives.

The National Cyber Forensics and Training Alliance, for example, is a model for collaboration between private industry and law enforcement. The Pittsburgh-based organization includes more than 80 industry partners—from financial services, telecommunications, retail, and manufacturing, among other fields—who work with federal and international partners to provide real-time threat intelligence.

Another example is the Enduring Security Framework, a group that includes leaders from the private sector and the federal government who analyze current—and potential—threats related to denial of service attacks, malware, and emerging software and hardware vulnerabilities.

Mueller also noted the Bureau’s cyber outreach efforts to private industry. The Domestic Security Alliance Council, for instance, includes chief security officers from more than 200 companies, representing every critical infrastructure and business sector. InfraGard, an alliance between the FBI and industry, has grown from a single chapter in 1996 to 88 chapters today with nearly 55,000 members nationwide. And just last week, the FBI held the first session of the National Cyber Executive Institute, a three-day seminar to train leading industry executives on cyber threat awareness and information sharing.

“As noteworthy as these outreach programs may be, we must do more,” Mueller said. “We must build on these initiatives to expand the channels of information sharing and collaboration.”

He added, “For two decades, corporate cyber security has focused principally on reducing vulnerabilities. These are worthwhile efforts, but they cannot fully eliminate our vulnerabilities. We must identify and deter the persons behind those computer keyboards. And once we identify them—be they state actors, organized criminal groups, or 18-year-old hackers—we must devise a response that is effective, not just against that specific attack, but for all similar illegal activity.”

“We need to abandon the belief that better defenses alone will be sufficient,” Mueller said. “Instead of just building better defenses, we must build better relationships. If we do these things, and if we bring to these tasks the sense of urgency that this threat demands,” he added, “I am confident that we can and will defeat cyber threats, now and in the years to come.”

Resources:
- Read Director Mueller’s remarks
- Cyber Crime page
- National Cyber Investigative Joint Task Force

- National Cyber Forensics and Training Alliance
- Infragard

FBI — The New Phenomenon of Swatting

Don’t Make the Call
The New Phenomenon of ‘Swatting’

02/04/08

phonecord020408.jpg

Remember the “phone phreakers?” The term hit our national consciousness in the 1970s, when a magazine reported on a small group of techie troublemakers who were hacking into phone companies’ computers and making free long-distance calls.

Today, there’s a new, much more serious twist on this old crime. It’s called “swatting,” and it involves calling 9-1-1 and faking an emergency that draws a response from law enforcement—usually a SWAT team.

Needless to say, these calls are dangerous to first responders and to the victims. The callers often tell tales of hostages about to be executed or bombs about to go off. The community is placed in danger as responders rush to the scene, taking them away from real emergencies. And the officers are placed in danger as unsuspecting residents may try to defend themselves.

Last year, for example, a 19-year-old Washington state man was charged by California authorities after pretending to be calling from the home of a married California couple, saying he had just shot and murdered someone. A local SWAT team arrived on the scene, and the husband, who had been asleep in his home with his wife and two young children, heard something and went outside to investigate—after first stopping in the kitchen to pick up a knife. What he found was a group of SWAT assault rifles aimed directly at him. Fortunately, the situation didn’t escalate, and no one was injured.

The schemes can also be fairly sophisticated. Consider the following case investigated by our Dallas office recently in concert with a range of partners:

  • Five swatters in several states targeted people who were using online telephone party chat lines (or their family or friends).
  • The swatters found personal details on the victims by accessing telecommunication company information stored on protected computers.
  • Then, by manipulating computer and phone equipment, they called 9-1-1 operators around the country. By using “spoofing technology,” the swatters even made it look like the calls were actually coming from the victims!
  • Between 2002 and 2006, the five swatters called 9-1-1 lines in more than 60 cities nationwide, impacting more than 100 victims, causing a disruption of services for telecommunications providers and emergency responders, and resulting in up to $250,000 in losses.
  • “Swats” that the group committed included using bomb threats at sporting events, causing the events to be delayed; claiming that hotel visitors were armed and dangerous, causing an evacuation of the entire hotel; and making threats against public parks and officials.

Case work. The swatters were tracked down through the cooperative efforts of local, state, and federal agencies and the assistance of telecommunications providers and first responders. In all, the case involved more than 40 state and local jurisdictions in about a dozen states. All five subjects have pled guilty to various charges and are scheduled to be sentenced in 2008.

Why did they do it? Said Kevin Kolbye, Assistant Special Agent in Charge of our Dallas office: “Individuals did it for the bragging rights and ego, versus any monetary gain.” Basically, they did it because they could.

Law enforcement agencies at all levels are currently working with telecommunications providers around the country to help them address swatting activity.

You can help, too—if you believe you’ve been a victim of a “swat” please contact your local FBI office.

Swatting | Law Enforcement Today

Swatter’s Rights?

11:18 am in Featured, Future Crime Trends, Posts, SWAT, Training by James P Gaffney

Swatting is the new rage, growing in frequency throughout the United States and is now an emerging trend in Canada as well. Both countries are experiencing bogus 911 calls requiring an immediate police response. Often a SWAT response is initiated to overcome dire circumstances based on information falsely reported.

A SWAT response requires effective coordination of effort and incident management.  The Incident Commander deploys personnel and resources when a purported critical incident is in progress. SWAT deploys if needed. The swatting is complete once personnel recognize after the fact that no crisis actually exists. Once the hoax is realized, the “swatter” disappears without leaving behind witnesses, fingerprints, DNA, or a traditional crime scene.

No one has been killed yet by a “swatting” incident.  However, innocent people have been forced to the ground, handcuffed, and temporarily detained following the swift action of a SWAT Team. Clearly, the potential for citizen and officer deaths as well as serious injury is simply a matter of time.

SWAT officers need to act quickly. Precise control of the scene is required. The very technical expertise and precision of SWAT teams are being used against law enforcement in swatting incidents.

Kevin Kolbye is the assistant special agent in charge of the Dallas office of the FBI. In 2007, the Dallas office initiated the first swatting case. Kolbye stated that it would be easy for an individual with knowledge of computers, telephone systems, and the desire to do so to create a false hostage situation to initiate a SWAT response.   Successful “swatting” incidents tend to draw national media attention. This in turn generates copycat incidents. Each swatter desires to surpass what others accomplished previously.

There is no exact formula to create a “swatting” incident. In the past, law enforcement had to deal with false alarms and prank calls for service.  However, these incidents pale in comparison to what today’s “swatter” dreams up.  The greater the expenditure of time, effort, manpower, funds, equipment, and disruption of everyday services, the more a swatter is rewarded.  Once swatters experience the adrenalin rush from experiencing such power and control, they need to create similar incidents.   Kollbye advised that swatters do these things simply because they can.

Swatting incidents are criminal acts. The brazenness of the acts has grown with the passing of time. Generally, as information is first received by 911, an immediate police response is initiated. The severity of the circumstances requires an additional response of support personnel and equipment to the scene.

The caller and 911 dispatcher have ongoing communication. As false information is provided to field intelligence, incident commanders are hard-pressed to contact the people they believe need assistance.

From my perspective, swatting has reached a new level. It is more involved.   Just initiating the SWAT action is no longer is the sole goal of a swatter.   Swatters realize success when they can initiate a massive SWAT response with one or more agencies focused on saving lives…for nothing.

Following are recent examples of swatting incidents:

- As of June 27, 2012, four cases of swatting have occurred in the City of Rye, NY. Each incident called for an emergency response. Police believe that a group may be involved. A 14-year-old Rye youth was charged for allegedly making a false report of a home invasion. This investigation is ongoing. Rye Police requested FBI assistance.

- June 11, 2012 the Coast Guard received a report a yacht had exploded off the coast of New Jersey. The caller communicated updates on the situation. An immediate response was required because authorities believed that the boat was sinking.

Information provided by the Coast Guard indicates that the caller claimed three people were dead, 9 injured, and 20 in the water. The caller also advised the Coast Guard that individuals made their way to life rafts. The Coast Guard and New York City police helicopters conducted a search and rescue response of the area for approximately four hours. No sign was ever found suggesting a sinking vessel due to an explosion.

- June 11, 2011 the Coast Guard was advised via their National Distress System that a 33-foot sailboat was sinking. An hour later, a second contact indicated that the boat was almost completely submerged. The Coast Guard was advised the four boaters were changing over to a small gray boat.  They were also advised that the boat was not equipped with flares or a handheld radio. A 10-hour search and rescue operation did not turn up signs of the boaters or the sailboat under water.

- Last year (2011) the Coast Guard, with the assistance of state and local agency marine responded to more than 60 suspected prank calls in the Northern New Jersey, New York City, and Hudson River region.

- On August 3, 2011, a caller reported to the San Francisco Police Department that his brother was being held hostage in his own home. After failing to make contact, SWAT Team entered the home. There was no merit to the call. A couple was at home with their two children. This detail was in place for more than three hours.

In Canada, the same kinds of events are being staged as in United States.  This situation represents an extremely dangerous trend.  Law enforcement agencies MUST respond to any request for help.  However, response to false incidents represents a totally unnecessary expenditure of time and resources in an era of diminishing public budgets.

Assistance from federal agencies will be needed to address this new crime trend, which represents not only an unnecessary risk to personnel and expense, but also has frightening terror implications.  Terror cells could deploy similar swatting incidents as a decoy to a real terror event staged while emergency resources are deployed elsewhere.

Jim Gaffney, MPA is LET’s risk management /police administration contributor.  He has served with a metro-New York police department for over 25 years in varying capacities, including patrol officer, sergeant, lieutenant, and executive officer. He is a member of  ILEETA, IACP, and  the IACSP.  Jim mentors the next generation of LEOs by teaching university-level criminal-justice courses as an adjunct professor in the New York City area.

Learn more about this article here:

http://abcnews.go.com/Technology/fbi-swatting-cases-country-copycats/story?id=14257526

http://www.dailymail.co.uk/news/article-2023415/Armed-police-raiding-homes-Canada-dangerous-swatting-trend-makes-way-north.html

http://www.lohud.com/apps/pbcs.dll/article?AID=2012307040038

http://www.ems1.com/search-rescue/articles/1303020-Hoax-yacht-explosion-part-of-growing-trend-SWAT-ting

http://www.ems1.com/communications-dispatch/articles/1303776-Swatting-pranks-Not-so-funny-to-EMS/

http://www.fbi.gov/news/stories/2008/february/swatting020408

http://www.military.com/daily-news/2012/06/21/hoax-yacht-explosion-may-be-tied-to-swatting.html

http://www.networkworld.com/community/node/24714

SCADA Security: Welcome to the Patching Treadmill | Tofino Industrial Security Solution

As regular readers of this blog know, after Stuxnet, security researchers and hackers on the prowl for new targets to exploit shifted their efforts to critical industrial infrastructure.

 

Unfortunately, the Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) applications they are now focusing on are sitting ducks.

 

Up until recently SCADA and ICS systems have been designed with reliability and safety in mind; security has been a minor consideration. Products that have never faced security tests are now under attack from sophisticated vulnerability discovery tools, and major control system security flaws are being continuously exposed.

 

SCADA/ICS applications are easy targets for security researchers and hackers.

Image Credit: Active Rain Caption

 

In recent years, we have seen a staggering growth in government security alerts for these systems, and have witnessed some of the most sophisticated cyber-attacks on record.

 

The US government’s ICS-Computer Emergency Response Team (ICS-CERT) tracks and publishes Security Advisories for known security vulnerabilities found in industrial products. In the entire decade prior to the discovery of Stuxnet (July 2010), ICS-CERT published 5 security advisories involving 3 vendors.

 

Compare this to 2011, when there were:

 

• 215 publicly disclosed vulnerabilities

• 104 security advisories

• 39 vendors involved in those security advisories

 

By late 2012, the total publically disclosed vulnerabilities topped 569.

 

And remember that these vulnerabilities are typically disclosed to the world prior to ICS vendors having patches available.

 

Furthermore, 40% of disclosed vulnerabilities include working attack code. This means that individuals can download exploit tools and run them against a target with little understanding of control systems or the consequences of their actions. And download and attack they do - ICS-CERT reported over 20,000 reports of unauthorized internet access to control systems in the last half of 2012.

Welcome to the Industrial Security Patching Treadmill!

Since security researchers, hackers, and issues have essentially migrated from the IT environment, it’s not surprising that we look to that world for a solution. There, security vulnerabilities are addressed by applying software patches - a constant cycle involving multiple patches over the life of a product. In fact, the typical IT computer needs patching (with a full reboot) at least once per week.

 

You don’t need to be a SCADA/ICS expert to realize that shutdowns of that frequency just aren’t feasible for critical infrastructure control systems.

On and on and on it goes... Image Credit: Learning to Fly

So How Many Patches Does a Control System Need?

One might argue that a control system requires fewer patches than an IT system…or that the software footprint is smaller, the code quality better… If so, then maybe the patching cycle could be synchronized with annual maintenance shutdowns. In this scenario, patching could be a workable solution to address software vulnerabilities.

 

To determine if this was an option, in 2008 I participated in the analysis of a U.S. refinery process control network (PCN). There were 85 computers on the refinery PCN, and a similar number of industrial controllers. Although we could only gather reliable data for 78 of the computers, we determined that they were running 272 distinct processes/applications.

 

A search of the National Vulnerability Database (NVD) found that 48 of these processes had one or more serious security vulnerabilities. Across the refinery PCN, there were 5,455 publically known vulnerabilities, an average of 70 per machine. An aggressive Windows OS patch program reduced this number by almost 50%, but that still left 2,284 published vulnerabilities remaining. Why? Because the applications involved did not have a means of automated patching.

Latent PLC Vulnerabilities Are Not All Disclosed at Once

And let’s not forget the latent vulnerabilities lurking in the control system. Academic research tells us that most commercial software contains 3 - 10 defects for every thousand lines of code (KLOC), and that 1% to 5% of these result in vulnerabilities. That works out to between 0.03 and 0.5 vulnerabilities per KLOC.

 

So what does that mean in real life?

 

Take Windows XP, for example…it contains about 40 million lines of code (40,000 KLOC). As of October 2012, about 1106 moderate or severe vulnerabilities have been listed in the NVD for Windows XP - that’s a Vulnerability/KLOC ratio of about 0.0276.

 

Whatever your experience using Windows XP, seems it’s on the low end of vulnerabilities and pretty good from a security point of view!

 

Looking back at the history of Windows XP vulnerabilities, we have to assume that SCADA/ICS vulnerabilities won’t all be disclosed at one time. We’ll likely see a relatively small number of disclosures in the first few years, as researchers begin to investigate the products in the industrial space. Then, after SCADA/ICS products have been exposed to widespread security scrutiny, a virtual avalanche of vulnerabilities may occur, resulting in the need to install control system patches on a weekly basis.

 

 Prepare for an avalanche of vulnerabilities once SCADA/ICS products have been exposed to security scrutiny. Image Credit: The Alaska Avalanche Information Center

We Can’t Ignore SCADA/ICS Firmware

It’s also obvious that the firmware in PLC and DCS controllers will also have vulnerabilities and will require patching. Controllers typically contain between 1,000 KLOC and 5,000 KLOC of firmware. Based on the analysis used above, this means that each is likely to contain between 30 and 150 vulnerabilities. If the vulnerability disclosure curves are similar to those we’ve seen in the IT sector, we can expect a low number of patches in the immediate future, followed by an epidemic in a few years.

 

The above analysis clearly indicates that the frequency of patching needed to address future SCADA/ICS vulnerabilities in both controllers and computers is likely to exceed the tolerance of most SCADA/ICS operators for system shutdowns.

 

Tune in to next week’s blog and learn about the impact of patches, what happens when there are no patches, and why many SCADA/ICS customers simply don’t want to patch...

 

Do you think that patching is a workable solution for securing SCADA/ICS control systems? Do you have any patching success or horror stories to share? Let me know your thoughts.

Related Content to Download

Presentation - "Patching for Control Systems - A Broken Model?"

 

Download this presentation and learn about:

 

•    The challenges of patching for control systems

 

•    Vendor data on patching deployment rates on ICS products and what can be achieved in the    future

•    Compensating control-based solutions for security vulnerabilities

 

This document is vendor neutral and is ideal for serious consideration of the topic.
 

Related Links

•    Press Release: Belden Research Shows that Patching for Industrial Cyber Security is a Broken Model

•    ICS-CERT.US-CERT.gov, Webpage: The Industrial Control Systems Cyber Emergency Response Team
•    Automation.com, Webpage: Cyber Attacks on Industrial Systems Increasing Rapidly
•    National Vulnerability Database (NVD), Webpage: Database search page
•    Blog: SCADA Security Basics: Why are PLCS so Insecure?
•    Blog: S4 Security Symposium Takeaway: Time for a Revolution
•    Blog: Tofino provides an Alternative to Patching
 

Wednesday, 20 March 2013

South Korea Cyber Attack Heightens Tensions In Hair-Trigger Region – ReadWrite

South Korea Cyber Attack Heightens Tensions In Hair-Trigger Region

No one is at all clear at all about the origins of a purported cyber attack against South Korean media and financial organizations yesterday, which left broadcaster and bank networks paralyzed for hours. The obvious culprit is a state-sponsored attack from North Korea, but even if that nation isn't directly responsible, it may not make a difference, given the heightened tensions in the region.

According to reports, three South Korean TV networks, KBS, MBS and YTN, as well as Shinhan Bank and Nonghyup Bank, reported that their networks had suddenly been shut down on Wednesday afternoon, local time. The takedown was apparently not from a distributed denial-of-service (DDOS) attack, but a virus that has apparently infected machines in these organizations and delivered its payload simultaneously. There were scattered reports of users seeing skulls on the screens of the affected machines before they shut down, anecdotal evidence that malware was indeed the cause.

South Korea has been the victim of cyber attacks before, of course, just like any other computerized nation. And many of these coordinated efforts have been ultimately traced back to North Korea.

No broadcasts were interrupted by the crashed computers, which apparently only hit the workstations of the television stations' staff. Some banking services, such as ATM and online banking, were adversely affected by the shutdowns, though the banks are reporting that those services have been restored.

North Korea is suspected of being the source of these attacks, just as they have done in the past. North Korea has increased its saber-rattling following new UN sanctions and joint US-South Korean military exercises being conducted in the region, and even accused the U.S. and South Korea of similar cyber attacks against its Internet servers on March 15.

(See World War III Is Already Here - And We're Losing.)

No proof has been offered yet on the source of these latest attacks, but it ultimately may not matter. This kind of attack could have been launched by anyone, since malware can be easy to deliver to unsuspecting computer users. Anyone from sophisticated cyber criminals to script kiddies could have started this, and until there is detailed analysis of the malware, conclusions should be approached with caution.

The problem is, it may not matter. Malware attacks within such an increasingly tense political and military situation are the equivalent of yelling "fire!" in a movie theater or - more appropriately - throwing a lit match into a barrel of fuel.

No matter what the source of this attack, tensions have been ratcheted up, the South Korean armed forces on a state of higher alert. If things go sideways on the Korean peninsula, this could be the first major confrontation preceded by cyber attacks. And when the dust settles, no one may care who actually wrote the code.

Image courtesy of Shutterstock.

Tags:

Tuesday, 19 March 2013

Penetration tests: 10 tips for a successful program

Penetration tests: 10 tips for a successful program

Penetration tests need to accomplish business goals, not just check for random holes. Here's how to get the most value for your efforts.

November 15, 2010

Why are you performing penetration tests? Whether you're using an internal team, outside experts or a combination of the two, are you simply satisfying regulatory or audit requirements, or do you actually expect to improve enterprise security?

We asked penetration testing experts for guidance on how to improve your program to get the most benefit for your time, money and effort. If you turn to outside expertise, their advice will show you what to expect and demand from consultants. The following 10 tips will show you understand the goal and focus of your testing; develop effective testing strategies; make effective use of your personnel; and make the most effective use of pen test results to remediate issues, improve processes and continuously improve enterprise security posture.

Penetration Test Tip 1: Define Your Goals

Penetration testing—really, all information security activity—is about protecting the business. You are taking on the role of attacker to find the vulnerabilities and exploiting them to determine the risks to the business and making recommendations to improve security based on your findings. Attackers are trying to steal your data—their techniques are a means to an end. So too, penetration testing: It's not about the cool technical things you can do to exploit a vulnerability; it's about discovering where the business risk is greatest.

"If can't express things in terms of my business, you're not providing me value," said Ed Skoudis, founder and senior security consultant at InGuardians. "Don't tell me you've exploited a vulnerability and gotten shell on that box without telling me what that means for my business."

Also see Network stress test tools: dos and don'ts on CSOonline.com

With that understanding, from a more tactical perspective, penetration testing is a good way to determine how well your security policies, controls and technologies are actually working. Your company is investing a lot of money in products, patching systems, securing endpoints etc. As a pen tester, you are mimicking an attacker, trying to bypass or neutralize security controls.

"You're trying to give the company a good assessment if their money is being well spent," said Alberto Solino, founder and director of security consulting services of Core Security.

The goal should not be to simply get a check box for pen testing to meet compliance requirements, such as PCI DSS. Pen tests should be aimed at more than discovering vulnerabilities (vulnerability scanning should be part of a pen testing program but is not a substitute). Unless the testing is part of a sustained program for discovering, exploiting and correcting security weaknesses, your money and effort will have gained you at best that check mark, and at worst, a failed audit by a sharp assessor.


Penetration Test Tip 2: Follow the data

Organizations have limited budget and limited resources for pen testing, regardless of whether you are conducting internal tests, hiring outside consultants or using a combination of both. You can't conduct penetration tests across your entire IT infrastructure, spanning hundreds or thousands of devices, yet pen testers will often be told to try to compromise devices across an extensive range of IP addresses. The result is likely to be the most cursory of testing regimens, yielding little or no value. You can't even expect to conduct vulnerability scans and remediate flaws across a very large number of devices in a reasonable amount of time and at reasonable cost.

"In many cases customers have thousand of IP addresses they want us to pen test," said Omar Khawaja, Global Products Manager, Verizon Security Solutions. "We could run vulnerability tests and see what's most vulnerable, but they may not be the most important to your organization."

Step back and ask, "What am I trying to protect?" What critical data is at risk: credit card data, patient information, personally identifiable customer information, business plans, intellectual property? Where does the information reside? Do you even know every database, every file repository and every log store that contains sensitive data? You may not know, but chances are an attacker will find it.

So, the first critical step is to narrow the scope of pen testing is data discovery: determining which sensitive data is at risk and where it is. Then the task is to play the role of attacker and figure out how to get at the prize. (Read Red team versus blue team for more ideas on this approach.)

"The idea to mimic what a real attacker will do during time frame agreed to with the customer," said Core Security's Solino, "not to find all the possible problems."


Penetration Test Tip 3: Talk to the Business Owners

Work with the business people. They know what is at risk—what data is critical, what applications create and interface with that data. They will know at least the more obvious places in which the data resides. They will tell you which applications must be kept up and running.

You'll learn much of what you need to know about the threat level associated with particular applications, the value of the data and the assets that are important in the risk equation.

An important part of this process is to work with people who understand the business logic of the application. Knowing what the application is supposed to do and how it's supposed to work will help you find its weaknesses and exploit them.

"Define the scope that includes critical information assets and business transaction processing," said InGuardians' Skoudis. "Brainstorm with the pen test team and management together."

Skoudis also suggests asking for management to give their worst case scenario, "what's the worst thing that could happen if someone hacks you?" The exercise helps scope the project by determining where "the real crown jewels" are.


Penetration Test Tip 4: Test Against the Risk

The value of the data/applications should determine the type of testing to be conducted. For low-risk assets, periodic vulnerability scanning is a cost-effective use of resources. Medium risk might call for a combination of vulnerability scans and manual vulnerability investigation. For high-risk assets, conduct exploitative penetration testing.

For example, the security director for a large university said they started performing pen testing to meet PCI DSS requirements. Once that program was in place, it became the model for testing a potential attacker's ability to penetrate their systems. The university classifies data as public, internal, sensitive and highly sensitive.

For information that's highly sensitive, we perform pen testing under much the same guidelines as PCI," he said. "We back off from there, based on some specific criteria and some subjective judgment that goes into what level of pen testing, if any, will be done for system."

So, for example, on the lower end of the risk spectrum the university will test a random sample of systems and/or applications, depending on criteria for a particular category and time and budget constraints. With tens of thousands of devices on a campus network, even a low-level scan of all of them would be infeasible.

"You can test on a business system that has a clear owner and systems administrator," he said. "But when you have 3,000 Wiis attached to the network, you don't want to scan those and figure out who they belong to."


Penetration Test Tip 5: Develop attacker profiles

Your pen testers need to think like and act like real attackers. But attackers don't fit into one neat category. Build profiles of potential attackers.

External attackers may have little or no knowledge of your company, perhaps just some IP addresses. They may be former employees or work for partners or service providers and have considerable knowledge of the inside of your network. An insider may be a systems administrator or DBA with privileged access and authorization and knows where critical data resides.

Motive is a factor in developing profiles. Is the attacker after credit card numbers and PII that can be turned into cash? Intellectual property to sell to a competitor or gain a business advantage? The attacker may be politically/ideologically or competitively motivated to bring your Web application down. He may be an angry ex-employee who wants to "get back at the company."

Work with business owners to help fashion these profiles and learn what types of potential attackers they are most concerned about.

The profile narrows the focus of the pen testing, and tests will vary based on each of these multiple profiles.

"We get a snapshot of what a particular attacker can do against a target, and we don't mix results," said Core Security's Solino. "For every profile, we get the result of the pen test and do another profile."


Penetration Test Tip 6: The More Intelligence the Better

Information gathering is as much a part of the process as the actual exploit—identify devices, operating systems, applications, databases, etc. The more you know about a target and its connected systems, the better chance you have of breaking in.

Each step may yield valuable information that will allow you to attack another asset that will eventually get you into the target database, file share etc. The information will allow you to narrow the search for exploitable vulnerabilities. This reconnaissance is typically performed using automated scanning and mapping tools, but you can also use social engineering methods, such as posing as a help desk person or a contractor on the phone, to gather valuable information.

"We're increasingly starting to do social engineering," said Verizon's Khawaja. "It's essentially reconnaissance—performed with the permission of the customer—to let us find everything in the environment that could assist us in breaking in."

Multi-stage penetration testing typically is a repeated cycle of reconnaissance, vulnerability assessment and exploitation, each step giving you the information to penetrate deeper into the network.


Penetration Test Tip 7: Consider All Attack Vectors

Attackers can and will exploit different aspects of your IT infrastructure, individually or, frequently, in combination to get the data they are seeking.

Thorough pen tests will leverage any and all of these potential attack vectors, based on the attacker's end goal, rather than the vulnerability of each.

"A few years ago we would do network penetration testing, and application pen testing and wireless pen testing, and then we stepped back and said 'that makes absolutely no sense," said Solino. "The bad guy doesn't say, 'I can only break into a system using the network.'"

Successful pen tests, like real attacks, may leverage any number of paths that include a number of steps till you hit pay dirt. A print server may not seem particularly interesting, but it may use the same admin login credentials as a database containing credit card information.

"Pen testers find flaws and exploit them, then pivot from that machine to another machine, to yet another," said InGuardians' Skoudis.

An attack on a Web application might fail in terms of exploitation, but yield information that helps exploit other assets on the network. Or an attacker might get information about employees without high privileges, but with access to the internal network that act as a springboard.

Also see How to compare and use wireless intrusion detection systems

So, a critical resource may not be directly assailable, but can be compromised through other systems.

For example, said Khawaja, Verizon pen testers were unable to directly compromise a Web server that had access to a sensitive database. If the testers focused narrowly on testing the Web application on that server, the conclusion would be that the data was safe. But by taking a data-centric approach, they discovered that the Web server was connected to a second Web server, which had a critical vulnerability that an attacker could exploit to gain access to the first Web server and, hence, the database. (Read more about Web application attacks in How to evaluate and use Web application security scanners.)

"We care about anything that isn't cordoned off from the network segment we are targeting," he said. "Are there any network controls to prevent an attacker from jumping from a vulnerable low-value system to a more critical system?"

That being said, there are valid cases for vector-specific testing. For example, a company may be particularly concerned about wireless security, because it knows it has been somewhat lax in this area or may have recently installed or upgraded WLAN infrastructure. But even if you are confident that a particular vector is safe—for example , if the wireless network is isolated from the credit card database—don't be too sure. Attack paths can be complex and byzantine.


Penetration Test Tip 8: Define the Rules of Engagement

Pen testing simulates attack behavior, but it is not an attack. Whether you are conducting in-house testing or contracting with a consultant, you need to establish parameters that define what can and cannot be done, and when, and who needs to know.

The latter depends on whether you are conducting white box or black box testing. In the former case, there's probably an acknowledgement that the security program of the company (or a particular department or business unit) needs a lot of work, and the pen testing is open process known to all involved.

On the other hand, black box testing is more clandestine, conducted more like a real attack—strictly on a need to know basis. You are determining how good the company's people are at their jobs and the effectiveness of the processes and systems supporting them.

"Whether it's the operations center, or the investigative response team or physical security guards, everyone has to pretend it's just another day at the office," said Verizon's Khawaja.

Typically, companies will perform white box testing first to learn the security issues that have to be addressed. Subsequently, black box testing will help determine if the initial findings have been effectively remediated. Sometimes, for example, a CSO will want to know not only how vulnerable critical systems are, but how good their personnel are at detecting and responding to an attack.

In either case, certain key people need to be involved to avoid problems that might impact the business or undermine the testing. At least one person in the target environment who is involved in the change control process should be in the loop, said InGuardians' Skoudis. Under the rules of engagement, for example, the company may permit the pen testers to install software on the target devices to do more in-depth pivoting, but at least that one person has to be involved to make sure that the testers are not stopped by dropping their IP address from a router ACL or invoking a firewall rule.

In both white box and black box scenarios, Skoudis recommends daily briefings with the test stakeholders to let them know what the testers are doing. For example, the rules of engagement may allow the pen testers to exploit vulnerabilities, but the briefing can be used to give folks a heads up that they are about to do it.

"It builds bridges," he said. "It shows the pen testers are not a distant, evil group that is out to 'catch me.' Rather, it's all about transparency and openness."

The rules of engagement also may set limits on what may and may not be exploited, such as client machines, or techniques that may or may not be used, such as social engineering.


Penetration Test Tip 9: Report Findings and Measure Progress

The goal of penetration testing is to improve your security posture, so if you are conducting internal tests, your report should provide useful, actionable and specific information.

"The goal is to help improve security, for management to make decisions to improve business and help the operations team improve security," said InGuardians' Skoudis.

You should provide an executive summary, but the heart of your reporting should include detailed descriptions of the vulnerabilities you found, how you exploited them and what assets would be at risk if a real attack took place. Detail every step used to penetrate, each vulnerability that had to be exploited, and, most important, perhaps, all the attack paths.

"The beauty of identifying the attack path is that it allows you to solve specific problems by breaking the path," said Core Security's Solino.

Be very specific about recommendations. If architectural changes are required, include diagrams. Explain how to verify that a fix is in place (use this command, or that tool to measure). In cases where multiple systems are involved, explain how to mass deploy a fix, using GPOs if possible.

Make sure that each recommended remediation includes a caveat that the solution is thoroughly tested before it is implemented in a production environment. Enterprise IT infrastructure may be very complex.

"This is a huge issue," said Skoudis. "You don't know all the subtleties. You don't want to break production."

Penetration testing should not be a one-time exercise, and successive results should be compared. If you are performing internal testing, put together deltas to measure how your people are addressing issues. If the problems from the last test—or the last two—remain unaddressed, you may have a problem. Perhaps the software patching program isn't working as it should, or developers are not being properly trained to write secure code.

"What we're looking for are trends," said the university security director. "It's just like you would treat an audit report. If you have repeat findings, it indicates you might have a more serious problem."


Penetration Test Tip 10: Decide Who Your Pen Testers Are

The decision to use in-house staff for pen-testing depends on the size of your organization, the value of the information you are trying to protect and where you want to put your internal resources. A company may have a dedicated pen testing team or a group within the security team. An internal team is in a better position to conduct regular testing. If your organization is large and distributed, create mechanisms and promote an environment in which information can be shared.

"If have internal community that can share information, make sure they have a strong knowledge base backed up by mature knowledge management systems," said Verizon's Khawaja . "You want to make sure that what happened in your Beligian unit doesn't happen in Brazil."

Even if you do some in-house testing, there are good reasons for hiring consultants to perform at least some of the work. Some regulations require external companies to perform pen tests; consider that insiders may have too much information about the target systems, as well as a vested interest in the outcome. So, beyond compliance requirements, it's a good idea to bring a fresh view from the outside periodically.

For the same reasons, if you do hire outside testing consultants, rotate among vendors, just as would with auditors every few years.

"Bringing in outside people gives an added degree of confidence in the results," said the university security director. "There's no perception of conflict of interest."—

For your internal team, look for the right blend of knowledge and curiosity.

A good training candidate, said Core's Solino, has a strong knowledge of networking and application protocols as a foundation. Mostly, he looks for curiosity and a hacker mentality.

"It's IT knowledge and that attitude, a specific mindset that denies something is secure and says, 'Go for it!'"

"This is an art," said Skoudis. "Although there are tools and methodologies, you have to be creative in finding problems in target systems and applications."

IT's 9 biggest security threats

IT's 9 biggest security threats

window.cmcb["idge-11271809494_1363747752"]();