Indeed, it pains me to talk to some supposed infosec people at a known AU infosec company and hear them say something like "oh DEFCON, that's that hacker con right?". Sure, maybe not the field tech, but at the management and mitigation layer, they should still know.. Facepalm.<br>
<br><div class="gmail_quote">On Mon, Feb 4, 2013 at 6:26 PM, Aqius <span dir="ltr"><<a href="mailto:aqius@lavabit.com" target="_blank">aqius@lavabit.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div lang="EN-AU" link="blue" vlink="purple"><div><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">And why anyone on this list that allows a device to stay on default passwords should be shot, beaten, and then shot more before they are allowed to come back to the list ;)<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p><div><div style="border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0cm 0cm 0cm">
<p class="MsoNormal"><b><span lang="EN-US" style="font-size:10.0pt;font-family:"Tahoma","sans-serif"">From:</span></b><span lang="EN-US" style="font-size:10.0pt;font-family:"Tahoma","sans-serif""> <a href="mailto:ausnog-bounces@lists.ausnog.net" target="_blank">ausnog-bounces@lists.ausnog.net</a> [mailto:<a href="mailto:ausnog-bounces@lists.ausnog.net" target="_blank">ausnog-bounces@lists.ausnog.net</a>] <b>On Behalf Of </b>Mark Newton<br>
<b>Sent:</b> Monday, 4 February 2013 18:15<br><b>To:</b> Mark Smith<br><b>Cc:</b> <a href="mailto:ausnog@ausnog.net" target="_blank">ausnog@ausnog.net</a></span></p><div class="im"><br><b>Subject:</b> Re: [AusNOG] Interesting and perhaps quite scary security presentation from HD Moore of Metasploit fame<u></u><u></u></div>
<p></p></div></div><p class="MsoNormal"><u></u> <u></u></p><div><p class="MsoNormal"><u></u> <u></u></p></div><div><p class="MsoNormal" style="margin-bottom:12.0pt"><br></p><div><div class="h5">On 04/02/2013, at 17:17, Mark Smith <<a href="mailto:markzzzsmith@yahoo.com.au" target="_blank">markzzzsmith@yahoo.com.au</a>> wrote:<u></u><u></u></div>
</div><p></p></div><div><div class="h5"><blockquote style="margin-top:5.0pt;margin-bottom:5.0pt"><div><p class="MsoNormal">To me both the volume of ineffectiveness, and the apparent lack of taking advantage of it is a surprise.<u></u><u></u></p>
</div></blockquote><div><p class="MsoNormal"><u></u> <u></u></p></div><p class="MsoNormal">Three useful axioms:<u></u><u></u></p><div><p class="MsoNormal"><u></u> <u></u></p></div><div><p class="MsoNormal">1. Most of the infosec industry is selling snake-oil, and is actually quite crap. No matter how much they hyperventilate about their ability to mitigate threats, you can spend as much money with them as you want, and it'll make almost no difference to Anonymous' ability to pull a Sony on you.<u></u><u></u></p>
</div><div><p class="MsoNormal"><u></u> <u></u></p></div><div><p class="MsoNormal">2. In the rare cases where the infosec industry isn't crap and actually tries to bring these probes to a human's attention, the human will inevitably ignore the traces in the IDS logs as "background radiation" until <i>after</i> they're 0wn3d.<u></u><u></u></p>
</div><div><p class="MsoNormal"><u></u> <u></u></p></div><div><p class="MsoNormal">3. Your network is nowhere near as special and interesting as you think, and there probably aren't hoards of Chinese or Russian hackers trying to make off with your precious unique intellectual property. With rare exceptions, if you get 0wn3d it's due to random chance rather than concerted effort, and the random chance probably isn't significantly diminished if you spend more money on whizzy black boxes (see "1" above)<u></u><u></u></p>
</div><div><p class="MsoNormal"><u></u> <u></u></p></div><div><p class="MsoNormal">For almost everyone, the only <b>real, practical</b> protection they have is, "It's a big Internet and I'm a tiny, tiny fish."<u></u><u></u></p>
</div><div><p class="MsoNormal"><u></u> <u></u></p></div><div><p class="MsoNormal">And for <b>almost</b> everyone, that protection is good enough to quantify the losses from successful attacks at some place similar to the losses due to equipment failures.<u></u><u></u></p>
</div><div><p class="MsoNormal"><u></u> <u></u></p></div><div><p class="MsoNormal">And that, in a nutshell, is why we can still buy equipment today with default admin passwords :)<u></u><u></u></p></div><div><p class="MsoNormal">
<u></u> <u></u></p></div><div><p class="MsoNormal"> - mark<u></u><u></u></p></div><div><p class="MsoNormal"><u></u> <u></u></p></div></div></div></div></div><br>_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
<br></blockquote></div><br>