<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.srevilak.net/wiki/index.php?action=history&amp;feed=atom&amp;title=Boston_Security_Meetup_-_5%2F24%2F2014</id>
	<title>Boston Security Meetup - 5/24/2014 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.srevilak.net/wiki/index.php?action=history&amp;feed=atom&amp;title=Boston_Security_Meetup_-_5%2F24%2F2014"/>
	<link rel="alternate" type="text/html" href="https://www.srevilak.net/wiki/index.php?title=Boston_Security_Meetup_-_5/24/2014&amp;action=history"/>
	<updated>2026-05-21T08:16:32Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.41.0</generator>
	<entry>
		<id>https://www.srevilak.net/wiki/index.php?title=Boston_Security_Meetup_-_5/24/2014&amp;diff=113&amp;oldid=prev</id>
		<title>SteveR at 13:13, 3 August 2014</title>
		<link rel="alternate" type="text/html" href="https://www.srevilak.net/wiki/index.php?title=Boston_Security_Meetup_-_5/24/2014&amp;diff=113&amp;oldid=prev"/>
		<updated>2014-08-03T13:13:10Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 09:13, 3 August 2014&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l479&quot;&gt;Line 479:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 479:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;just another layer of administration, to assign MAC addresses to&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;just another layer of administration, to assign MAC addresses to&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;virtual machines.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;virtual machines.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[Category: Notes]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>SteveR</name></author>
	</entry>
	<entry>
		<id>https://www.srevilak.net/wiki/index.php?title=Boston_Security_Meetup_-_5/24/2014&amp;diff=105&amp;oldid=prev</id>
		<title>SteveR: /* Extending the network from the perspective of a rouge user and or device */</title>
		<link rel="alternate" type="text/html" href="https://www.srevilak.net/wiki/index.php?title=Boston_Security_Meetup_-_5/24/2014&amp;diff=105&amp;oldid=prev"/>
		<updated>2014-07-08T01:45:39Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Extending the network from the perspective of a rouge user and or device&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 21:45, 7 July 2014&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l462&quot;&gt;Line 462:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 462:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;from the inside.  In order to catch a thief, you must think like a&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;from the inside.  In order to catch a thief, you must think like a&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;thief.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;thief.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Question: How long can a typical rogue device stay connected to a&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Question: How long can a typical rogue device stay connected to a&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>SteveR</name></author>
	</entry>
	<entry>
		<id>https://www.srevilak.net/wiki/index.php?title=Boston_Security_Meetup_-_5/24/2014&amp;diff=104&amp;oldid=prev</id>
		<title>SteveR: /* Enterprise Email Security Challenges */</title>
		<link rel="alternate" type="text/html" href="https://www.srevilak.net/wiki/index.php?title=Boston_Security_Meetup_-_5/24/2014&amp;diff=104&amp;oldid=prev"/>
		<updated>2014-07-08T01:45:23Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Enterprise Email Security Challenges&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 21:45, 7 July 2014&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l290&quot;&gt;Line 290:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 290:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Email filtering has always been a battle between false positives and&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Email filtering has always been a battle between false positives and&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;false negatives.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;false negatives.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Comment: A fun exercise is to conduct a phishing attack against your&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Comment: A fun exercise is to conduct a phishing attack against your&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l306&quot;&gt;Line 306:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 307:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;rewrite links, so that the links become redirects. This allows IT to&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;rewrite links, so that the links become redirects. This allows IT to&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;block specific links.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;block specific links.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-added&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Human Side of Data Protection ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Human Side of Data Protection ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>SteveR</name></author>
	</entry>
	<entry>
		<id>https://www.srevilak.net/wiki/index.php?title=Boston_Security_Meetup_-_5/24/2014&amp;diff=103&amp;oldid=prev</id>
		<title>SteveR: /* Mobile Security for Everyone */</title>
		<link rel="alternate" type="text/html" href="https://www.srevilak.net/wiki/index.php?title=Boston_Security_Meetup_-_5/24/2014&amp;diff=103&amp;oldid=prev"/>
		<updated>2014-07-08T01:45:13Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Mobile Security for Everyone&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 21:45, 7 July 2014&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l249&quot;&gt;Line 249:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 249:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;your phone. The game isn&amp;#039;t intended to be malicious, but it forces you&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;your phone. The game isn&amp;#039;t intended to be malicious, but it forces you&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;to make security decisions.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;to make security decisions.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Question: What&amp;#039;s the most popular Android Malware?&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Question: What&amp;#039;s the most popular Android Malware?&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l254&quot;&gt;Line 254:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 255:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;There&amp;#039;s a lot of mobile malware out there. I&amp;#039;m not sure what&amp;#039;s most&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;There&amp;#039;s a lot of mobile malware out there. I&amp;#039;m not sure what&amp;#039;s most&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;popular right now.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;popular right now.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-added&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Enterprise Email Security Challenges ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Enterprise Email Security Challenges ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>SteveR</name></author>
	</entry>
	<entry>
		<id>https://www.srevilak.net/wiki/index.php?title=Boston_Security_Meetup_-_5/24/2014&amp;diff=102&amp;oldid=prev</id>
		<title>SteveR: /* Digital Certificates: Design Scalability and Organizational Impact */</title>
		<link rel="alternate" type="text/html" href="https://www.srevilak.net/wiki/index.php?title=Boston_Security_Meetup_-_5/24/2014&amp;diff=102&amp;oldid=prev"/>
		<updated>2014-07-08T01:44:51Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Digital Certificates: Design Scalability and Organizational Impact&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 21:44, 7 July 2014&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l135&quot;&gt;Line 135:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 135:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;money. End users don&amp;#039;t know what they are, and don&amp;#039;t pay attention to&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;money. End users don&amp;#039;t know what they are, and don&amp;#039;t pay attention to&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;them. We&amp;#039;ve trained users to look for the little padlock.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;them. We&amp;#039;ve trained users to look for the little padlock.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Question: Could you DOS a CA with revocation requests?&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Question: Could you DOS a CA with revocation requests?&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l150&quot;&gt;Line 150:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 151:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;example, if you need to remove a domain name, you&amp;#039;ll need to have your&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;example, if you need to remove a domain name, you&amp;#039;ll need to have your&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;UC certificate reissued.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;UC certificate reissued.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-added&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Meta Cognition and Critical Thinking in Open Source Intelligence ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Meta Cognition and Critical Thinking in Open Source Intelligence ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>SteveR</name></author>
	</entry>
	<entry>
		<id>https://www.srevilak.net/wiki/index.php?title=Boston_Security_Meetup_-_5/24/2014&amp;diff=101&amp;oldid=prev</id>
		<title>SteveR: /* Questions Every Pentest Customer Should Ask */</title>
		<link rel="alternate" type="text/html" href="https://www.srevilak.net/wiki/index.php?title=Boston_Security_Meetup_-_5/24/2014&amp;diff=101&amp;oldid=prev"/>
		<updated>2014-07-08T01:44:36Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Questions Every Pentest Customer Should Ask&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 21:44, 7 July 2014&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l31&quot;&gt;Line 31:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 31:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;completely reliant on commercial tools, or are they using a mix of&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;completely reliant on commercial tools, or are they using a mix of&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;commercial tools and custom code?  Good pen testers use a mix of both.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;commercial tools and custom code?  Good pen testers use a mix of both.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-added&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Ask about the ratio of automated vs manual testing. Simple&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Ask about the ratio of automated vs manual testing. Simple&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l44&quot;&gt;Line 44:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 43:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Ask your pen tester what other projects they&amp;#039;ve worked on. Ask what&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Ask your pen tester what other projects they&amp;#039;ve worked on. Ask what&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;resources they&amp;#039;re going to allocate to your testing project.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;resources they&amp;#039;re going to allocate to your testing project.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Question: Could you talk more about the difference between penetration&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Question: Could you talk more about the difference between penetration&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l70&quot;&gt;Line 70:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 70:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Their whole business is testing industrial control and Scada systems.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Their whole business is testing industrial control and Scada systems.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-added&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Digital Certificates: Design Scalability and Organizational Impact ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Digital Certificates: Design Scalability and Organizational Impact ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>SteveR</name></author>
	</entry>
	<entry>
		<id>https://www.srevilak.net/wiki/index.php?title=Boston_Security_Meetup_-_5/24/2014&amp;diff=100&amp;oldid=prev</id>
		<title>SteveR: initial revision</title>
		<link rel="alternate" type="text/html" href="https://www.srevilak.net/wiki/index.php?title=Boston_Security_Meetup_-_5/24/2014&amp;diff=100&amp;oldid=prev"/>
		<updated>2014-07-08T01:43:54Z</updated>

		<summary type="html">&lt;p&gt;initial revision&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;= Notes from Boston Security Meetup #2 = &lt;br /&gt;
&lt;br /&gt;
Boston Security Meetup #2 was held on May 24, 2014, at Microsoft&amp;#039;s New England Research and Development center in Cambridge, MA.&lt;br /&gt;
&lt;br /&gt;
== Questions Every Pentest Customer Should Ask ==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Ed Moyle, ISACA&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Many customers don&amp;#039;t have penetration testing experience, and they&lt;br /&gt;
generally outsource that work. As a result, there tends to be an&lt;br /&gt;
over-reliance on commercial tools.  The quality of pen testers varies&lt;br /&gt;
greatly.&lt;br /&gt;
&lt;br /&gt;
Every pen testing customer should ask about the tester&amp;#039;s&lt;br /&gt;
methodology. Specific questions include (1) what the tester&amp;#039;s&lt;br /&gt;
methodology is, (2) how thorough is their test plan, and (3) is the&lt;br /&gt;
tester knowledgeable about PCI 3.0.&lt;br /&gt;
&lt;br /&gt;
There are industry-standard approaches for penetration testing. NIST&lt;br /&gt;
SP800-115 is one common standard. PTES (the Penetration Testing&lt;br /&gt;
Execution Manual) is another common example.&lt;br /&gt;
&lt;br /&gt;
Ask to see the pen testers &amp;quot;Rules of Engagement&amp;quot; document.&lt;br /&gt;
&lt;br /&gt;
What are the well-known problem areas on your industry (e.g., clinical&lt;br /&gt;
networks in hospitals)? Some critical systems are easy to take down;&lt;br /&gt;
be sure to have a conversation with your customer if you plan to&lt;br /&gt;
attack one of these systems.&lt;br /&gt;
&lt;br /&gt;
Ask your pen tester what kind of tools they&amp;#039;re using. Are they&lt;br /&gt;
completely reliant on commercial tools, or are they using a mix of&lt;br /&gt;
commercial tools and custom code?  Good pen testers use a mix of both.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ask about the ratio of automated vs manual testing. Simple&lt;br /&gt;
vulnerability scans are not the same thing as penetration testing. A&lt;br /&gt;
penetration test should be a simulation of an actual attack, by a&lt;br /&gt;
knowledgeable adversary. A vulnerability scan is an automated process&lt;br /&gt;
of identifying vulnerabilities that might be&lt;br /&gt;
exploitable. Vulnerability scans are the low-hanging fruit. Around 80%&lt;br /&gt;
of real problems are found through manual testing, but manual testing&lt;br /&gt;
is more expensive and resource intensive.&lt;br /&gt;
&lt;br /&gt;
Ask your pen tester what other projects they&amp;#039;ve worked on. Ask what&lt;br /&gt;
resources they&amp;#039;re going to allocate to your testing project.&lt;br /&gt;
&lt;br /&gt;
Question: Could you talk more about the difference between penetration&lt;br /&gt;
testing and vulnerability scanning?&lt;br /&gt;
&lt;br /&gt;
Automated vulnerability scans look for open ports and running&lt;br /&gt;
services. They often include brute force password attacks.&lt;br /&gt;
&lt;br /&gt;
Question: What do you think about crowdsourcing vulnerability&lt;br /&gt;
assessments?&lt;br /&gt;
&lt;br /&gt;
I&amp;#039;m skeptical about this; I&amp;#039;d expect significant variation in the&lt;br /&gt;
quality of crowdsourced tests. That said, I think crowdsourcing&lt;br /&gt;
vulnerability research is a great thing.&lt;br /&gt;
&lt;br /&gt;
Question: Some systems are designated &amp;quot;off limits&amp;quot;. Is that good or&lt;br /&gt;
bad?&lt;br /&gt;
&lt;br /&gt;
You don&amp;#039;t want your penetration tests to bring down a production&lt;br /&gt;
system. However, a real attacker won&amp;#039;t care about that. Everyone has a&lt;br /&gt;
plan until they get punched in the face. Perhaps you could attack &amp;quot;off&lt;br /&gt;
limit&amp;quot; systems during a restricted (off peak) time period, to minimize&lt;br /&gt;
potential negative impact.&lt;br /&gt;
&lt;br /&gt;
Question: Have you heard of Red Tiger?&lt;br /&gt;
&lt;br /&gt;
Their whole business is testing industrial control and Scada systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Digital Certificates: Design Scalability and Organizational Impact ==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Jake McAleer, O&amp;#039;Connor &amp;amp; Drew, PC&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Public Keys are used in asymmetric cryptography. With asymmetric&lt;br /&gt;
cryptography, data is computationally easy to encrypt, and&lt;br /&gt;
computationally difficult to decrypt (without the private key).&lt;br /&gt;
&lt;br /&gt;
RFC 3447 spells out the the digital certificate world. It&amp;#039;s derived&lt;br /&gt;
from the ITU&amp;#039;s X590 standard.&lt;br /&gt;
&lt;br /&gt;
Certificates have to have specific fields, and a distinguished&lt;br /&gt;
name. They&amp;#039;re issued by a certificate authority (CA), with a serial&lt;br /&gt;
number that&amp;#039;s unique to that specific CA.&lt;br /&gt;
&lt;br /&gt;
A CA signs certificates for zero or more intermediate CAs. This&lt;br /&gt;
creates a signature chain, up to the CA&amp;#039;s authoritative root&lt;br /&gt;
certificate.&lt;br /&gt;
&lt;br /&gt;
The CA Browser forum is a consortium that develops guidelines for&lt;br /&gt;
issuing and managing certificates. There&amp;#039;s also an annual auditing&lt;br /&gt;
process for certificate authorities.&lt;br /&gt;
&lt;br /&gt;
There are pre-defined and custom X509 certificate extensions.&lt;br /&gt;
&lt;br /&gt;
If your certificate or private key are compromised, you&amp;#039;ll undergo the&lt;br /&gt;
process of certificate revocation. Different CAs have different&lt;br /&gt;
processes for doing this. Certificates are revoked by adding their&lt;br /&gt;
serial numbers to a certificate revocation list (CRL).  CRLs grow over&lt;br /&gt;
time, but entries can be removed once the certificates expire.&lt;br /&gt;
&lt;br /&gt;
OSCP is the Online Certificate Status Protocol. OSCP allows you to do&lt;br /&gt;
instant checks for certificate revocation. Unfortunately, OSCP checks&lt;br /&gt;
aren&amp;#039;t encrypted, and they&amp;#039;re subject to man in the middle&lt;br /&gt;
attacks. Also, a client&amp;#039;s revocation check tells the OSCP server what&lt;br /&gt;
web sites the client is visiting.&lt;br /&gt;
&lt;br /&gt;
All web browsers notify users of expired certificates. Some browsers&lt;br /&gt;
let you click through the expiration notice; others don&amp;#039;t.&lt;br /&gt;
&lt;br /&gt;
Heartbleed was a major headache for CAs. One CA reported 40 megabits&lt;br /&gt;
of traffic, just from people downloading their certificate revocation&lt;br /&gt;
list.&lt;br /&gt;
&lt;br /&gt;
Best practice is to use a separate private key for each&lt;br /&gt;
certificate. Keep your private keys locked down. Try to avoid putting&lt;br /&gt;
them in source code repositories. Private keys should only be readable&lt;br /&gt;
by processes that need to read them; use restrictive file&lt;br /&gt;
permissions. Try to keep your private keys in non-default locations.&lt;br /&gt;
&lt;br /&gt;
Periodically review who in your organization has the ability to log in&lt;br /&gt;
to your CA and issue (or revoke) certificates. Review how your CA&lt;br /&gt;
authenticates you.&lt;br /&gt;
&lt;br /&gt;
In 2017, SHA-256 will become the standard X509 hash algorithm.&lt;br /&gt;
&lt;br /&gt;
Avoid wildcard certificates. If your wildcard certificate is&lt;br /&gt;
compromised, then all of your web sites are at risk. Avoid UC certs&lt;br /&gt;
(certificates for multiple wildcard domains).  Don&amp;#039;t be lazy with your&lt;br /&gt;
certificate management.&lt;br /&gt;
&lt;br /&gt;
Extended Validation (EV) certificates aren&amp;#039;t worth the extra&lt;br /&gt;
money. End users don&amp;#039;t know what they are, and don&amp;#039;t pay attention to&lt;br /&gt;
them. We&amp;#039;ve trained users to look for the little padlock.&lt;br /&gt;
&lt;br /&gt;
Question: Could you DOS a CA with revocation requests?&lt;br /&gt;
&lt;br /&gt;
Sure. You could DOS a CA to prevent people from downloading their&lt;br /&gt;
CRL. Or, you can use social engineering to convince the CA that you&amp;#039;re&lt;br /&gt;
from Company X, and need to revoke one of Company X&amp;#039;s certificates. As&lt;br /&gt;
a safety measure, you can keep a backup certificate (from a different&lt;br /&gt;
CA) on hand. If something happens to your &amp;quot;main&amp;quot; certificate, just&lt;br /&gt;
deploy the backup.&lt;br /&gt;
&lt;br /&gt;
Question: Are their any good reasons for using a UC certificate?&lt;br /&gt;
&lt;br /&gt;
There are advantages and disadvantages to UC certificates. For&lt;br /&gt;
example, if you need to remove a domain name, you&amp;#039;ll need to have your&lt;br /&gt;
UC certificate reissued.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Meta Cognition and Critical Thinking in Open Source Intelligence ==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Benjamin Brown, Akamai&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Cognitive Bias (i.e., faulty heuristics) can lead to bad intelligence&lt;br /&gt;
and inaccurate conclusions. Critical thinking allows you to identify&lt;br /&gt;
cognitive biases.&lt;br /&gt;
&lt;br /&gt;
OSINT, or Open Source Intelligence, is produced from publicly&lt;br /&gt;
available information.  The quality of publicly available information&lt;br /&gt;
varies widely.&lt;br /&gt;
&lt;br /&gt;
Examples of Cognitive Bias include patterns of subjective judgment,&lt;br /&gt;
heuristics, and simplified strategies for processing information. With&lt;br /&gt;
cognitive bias, you have an idea about what the outcome might be. You&lt;br /&gt;
look for information that supports your hypothesis, and avoid&lt;br /&gt;
information that doesn&amp;#039;t support your hypothesis.&lt;br /&gt;
&lt;br /&gt;
Selection bias is the &amp;quot;echo effect&amp;quot;. A story is retold by different&lt;br /&gt;
outlets, it changes over time, and you forget what the original source&lt;br /&gt;
was.&lt;br /&gt;
&lt;br /&gt;
Availability bias comes from anecdotal information that you hear from&lt;br /&gt;
first-hand sources. When dealing with availability bias, always ask if&lt;br /&gt;
there&amp;#039;s censorship involved.&lt;br /&gt;
&lt;br /&gt;
Disinformation is the spreading of false information. When&lt;br /&gt;
disinformation is sprinkled with accurate information, it can be hard&lt;br /&gt;
to distinguish the fake information from the accurate information.&lt;br /&gt;
&lt;br /&gt;
Example: Reddit vs the Boston Bomber. After the Boston Marathon&lt;br /&gt;
bombings, many people were looking at low-quality photos posted&lt;br /&gt;
online. They were looking for people that &amp;quot;seemed agitated&amp;quot; or who&lt;br /&gt;
&amp;quot;weren&amp;#039;t looking at the race&amp;quot;. This was bad information, but the media&lt;br /&gt;
used it anyway.&lt;br /&gt;
&lt;br /&gt;
There are Advanced Persistent threats (&amp;quot;APTs&amp;quot;). For example &amp;quot;OMG&lt;br /&gt;
. . . China!&amp;quot;.  APTs often have some self-serving bias. For example,&lt;br /&gt;
vendors who want to sell products, claiming that those products will&lt;br /&gt;
protect you from APTs.&lt;br /&gt;
&lt;br /&gt;
Metacognition is thinking about thinking. What do you think you know?&lt;br /&gt;
Why do you think you know it? What would have to happen to make you&lt;br /&gt;
change your mind?&lt;br /&gt;
&lt;br /&gt;
Structured analytic techniques are diagnostic&lt;br /&gt;
techniques. Diagnosticians check and analyze competing hypotheses.&lt;br /&gt;
&lt;br /&gt;
Contrarian techniques include devil&amp;#039;s advocate, and &amp;quot;what if&amp;quot;&lt;br /&gt;
analysis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mobile Security for Everyone ==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Nabil Hannan, Cigital&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Attack layers in the mobile threat model include services, physical&lt;br /&gt;
devices, and apps.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Services&amp;#039;&amp;#039;&amp;#039;. Many websites use your mobile phone number as&lt;br /&gt;
authentication for a password reset. How many people know your mobile&lt;br /&gt;
phone number?&lt;br /&gt;
&lt;br /&gt;
XSS attacks work on mobile browsers, as well as desktop browsers.&lt;br /&gt;
&lt;br /&gt;
Some services require a PIN to reset your password. A four-digit PIN&lt;br /&gt;
is easily subject to a brute force attack.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Physical Devices&amp;#039;&amp;#039;&amp;#039;. If an attacker gets possession of your device,&lt;br /&gt;
game over. Most mobile management software can be bypassed on a&lt;br /&gt;
jail-broken phone. iOS&amp;#039;s keychain can be bypassed. Phones can be&lt;br /&gt;
cloned. Cached data can contain sensitive information. iOS and Android&lt;br /&gt;
are the worst offenders in this regard.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Applications&amp;#039;&amp;#039;&amp;#039;. Lots of applications log data. Many mobile&lt;br /&gt;
applications ignore problems with SSL certificates.&lt;br /&gt;
&lt;br /&gt;
For example, there was a paid android application called Task Killer;&lt;br /&gt;
it killed tasks on an Android phone. Someone took Task Killer, hacked&lt;br /&gt;
it up, created a free version called Task Killer Pro. Task Killer pro&lt;br /&gt;
wants access to many of your phones subsystems (contacts, GPS,&lt;br /&gt;
etc). If an application&amp;#039;s main purpose is to kill processes, why would&lt;br /&gt;
it need access to these subsystems?&lt;br /&gt;
&lt;br /&gt;
There are steps you can take to protect yourself. Don&amp;#039;t trust unknown&lt;br /&gt;
USB connectors (e.g., airport charging stations). Disable&lt;br /&gt;
bluetooth. Review application permissions.&lt;br /&gt;
&lt;br /&gt;
Mobile operating systems are very similar to desktop operating&lt;br /&gt;
systems. All of the traditional desktop attack vectors can be used&lt;br /&gt;
against mobile devices.&lt;br /&gt;
&lt;br /&gt;
As a case study, let&amp;#039;s look at an app called Clumsy Ninja. Clumsy&lt;br /&gt;
Ninja wants access to your facebook and twitter accounts (to report&lt;br /&gt;
your progress in the game).  It also wants access to photos stored on&lt;br /&gt;
your phone. The game isn&amp;#039;t intended to be malicious, but it forces you&lt;br /&gt;
to make security decisions.&lt;br /&gt;
&lt;br /&gt;
Question: What&amp;#039;s the most popular Android Malware?&lt;br /&gt;
&lt;br /&gt;
There&amp;#039;s a lot of mobile malware out there. I&amp;#039;m not sure what&amp;#039;s most&lt;br /&gt;
popular right now.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Enterprise Email Security Challenges ==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Gagan Praksah, Astra Identity&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
SMTP allows anyone to send email as anyone. How do you protect the&lt;br /&gt;
reputation of your domain for outbound mail? How do you protect your&lt;br /&gt;
employees from inbound mail?&lt;br /&gt;
&lt;br /&gt;
In January 2014, several Boston University employees were&lt;br /&gt;
phished. They had electronic payroll deposits stolen as a result of&lt;br /&gt;
the phishing attack.&lt;br /&gt;
&lt;br /&gt;
SPF (Sender Policy Framework) lists servers that are allowed to send&lt;br /&gt;
mail on behalf of a given domain. In 2013, approximately 89% of&lt;br /&gt;
domains used SPF records.&lt;br /&gt;
&lt;br /&gt;
DKIM (Domain Keys Identified Email) is message signing at the server&lt;br /&gt;
level.&lt;br /&gt;
&lt;br /&gt;
SPF and DKIM permit the receiving server to check incoming&lt;br /&gt;
mail. Receivers can discard messages from unauthorized sources, or&lt;br /&gt;
messages with bad cryptographic signatures.&lt;br /&gt;
&lt;br /&gt;
DMARC is Domain-Based Message Authentication, Reporting and&lt;br /&gt;
Conformance.  DMARC specifies handling for SPF and DKIM&lt;br /&gt;
failures. DMARC allows senders to know who&amp;#039;s trying to spoof&lt;br /&gt;
them. It&amp;#039;s a new standard, and it hasn&amp;#039;t been widely adopted yet.&lt;br /&gt;
&lt;br /&gt;
In Q1 2014, 66.3% of all email was spam. There&amp;#039;s been a trend for&lt;br /&gt;
groups to adopt hosted mail services. Last year, 50% of companies with&lt;br /&gt;
5,000 or more employees were spear phished.&lt;br /&gt;
&lt;br /&gt;
Email filtering has always been a battle between false positives and&lt;br /&gt;
false negatives.&lt;br /&gt;
&lt;br /&gt;
Comment: A fun exercise is to conduct a phishing attack against your&lt;br /&gt;
own organization. This can help you to train employees.&lt;br /&gt;
&lt;br /&gt;
Question: What channels are most common for spear phishing?&lt;br /&gt;
&lt;br /&gt;
Email and water-holing are common channels. Water-holing is the tactic&lt;br /&gt;
of adding malware to web sites that are popular within a given&lt;br /&gt;
industry.&lt;br /&gt;
&lt;br /&gt;
Question: Are are solutions that allow IT departments to pull out&lt;br /&gt;
phishing messages?&lt;br /&gt;
&lt;br /&gt;
This is a hard problem. Some software can take a piece of email and&lt;br /&gt;
rewrite links, so that the links become redirects. This allows IT to&lt;br /&gt;
block specific links.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Human Side of Data Protection ==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Dana Tannatt, Veronis Systems&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Companies have lots of unstructured data. Some of this is generated by&lt;br /&gt;
humans (e.g., emails, documents, presentations), and some of it is&lt;br /&gt;
generated by software (e.g., logfiles).&lt;br /&gt;
&lt;br /&gt;
Enterprises are responsible for protecting 80% of all data out&lt;br /&gt;
there. There&amp;#039;s a lot of opportunity to extract value from this&lt;br /&gt;
data. We want to find intelligence around human-generated big data.&lt;br /&gt;
&lt;br /&gt;
In addition to knowing what kind of data you have, you should know who&lt;br /&gt;
has access, and what data people are accessing.&lt;br /&gt;
&lt;br /&gt;
With lots of data, you can have lots of access control lists. In&lt;br /&gt;
general, when you&amp;#039;ve got a lot of access control lists, there&amp;#039;s a lot&lt;br /&gt;
of overlap among lists.&lt;br /&gt;
&lt;br /&gt;
Presenter goes on to pitch Veronis&amp;#039;s metadata framework technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Leveraging Compliance to Raise the Bar on Security ==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Mike Lemire, Pearson Higher Education&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Security practitioners are often seen as cost centers. How do we allow&lt;br /&gt;
them to become profit centers?&lt;br /&gt;
&lt;br /&gt;
In many industries, standards compliance is a requirement. Thus,&lt;br /&gt;
compliance is an important business objective.&lt;br /&gt;
&lt;br /&gt;
When companies look to outsource, they do third-party risk&lt;br /&gt;
assessments. Compliance helps you in the area. Compliance can open&lt;br /&gt;
business opportunities in new vertical markets. Good compliance and&lt;br /&gt;
security depends on mature, repeatable processes within your&lt;br /&gt;
organization.&lt;br /&gt;
&lt;br /&gt;
Here&amp;#039;s a small sampling of compliance regimes:&lt;br /&gt;
&lt;br /&gt;
* SSAE-16 (formerly SAS-70). See http://aicpa.org/soc.&lt;br /&gt;
* SOC1 focuses on corporate controls and accounting.&lt;br /&gt;
* SOC2 focuses on security and privacy controls.&lt;br /&gt;
* Type 1 audits are a point-in-time audit of controls&lt;br /&gt;
* Type 2 audits are much more thorough. They typically cover 6-12 months and involve more comprehensive process testing.&lt;br /&gt;
&lt;br /&gt;
The Cloud Security Alliance is an industry consortium. They&amp;#039;ve&lt;br /&gt;
developed 140 key controls for cloud service providers. See&lt;br /&gt;
https://cloudsecurityalliance.org/star/.&lt;br /&gt;
&lt;br /&gt;
Bits are shared assessments developed by a banking industry&lt;br /&gt;
consortium. It&amp;#039;s a long list of controls, similar to ISO-27002, and an&lt;br /&gt;
attempt to standardize how financial institutions do vendor risk&lt;br /&gt;
assessments. See https://sharedassessments.org/.&lt;br /&gt;
&lt;br /&gt;
HIPPA is a set of compliance laws developed by the US department of&lt;br /&gt;
health and human services.&lt;br /&gt;
&lt;br /&gt;
FISMA, the Federal Information Security Management Act, was developed&lt;br /&gt;
by congress and NIST. It&amp;#039;s a very tough set of controls.&lt;br /&gt;
&lt;br /&gt;
FedRAMP, the Federal Risk and Authorization Management Program, is a&lt;br /&gt;
FISMAlike process for cloud providers.&lt;br /&gt;
&lt;br /&gt;
PCI is the payment card industry standard.&lt;br /&gt;
&lt;br /&gt;
The CSA Cloud Matrix aligns controls for different compliance regimes.&lt;br /&gt;
&lt;br /&gt;
Many compliance regimes require data retention policies.&lt;br /&gt;
&lt;br /&gt;
When approaching a project, establish compliance objectives in&lt;br /&gt;
alignment with business objectives. What markets are most important to&lt;br /&gt;
you? What are customers in those markets looking for? Be sure your&lt;br /&gt;
processes are auditable.&lt;br /&gt;
&lt;br /&gt;
FISMA and DIACAP (Department of Defense Information Assurance&lt;br /&gt;
Certification and Accreditation Process) apply to federal government.&lt;br /&gt;
&lt;br /&gt;
NIST 800-53 is &amp;quot;Security and Privacy Controls for Federal Information&lt;br /&gt;
Systems and Organizations&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== How Dare You Molest the Sea ==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;James O&amp;#039;Keefe, Massachusetts Pirate Party&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
: &amp;quot;How dare I molest the sea? How dare you molest the whole world! I molest the sea and you call me a pirate. You molest the world and they call you an emperor.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
1650-1720 was the golden age of pirates. During this time, there&lt;br /&gt;
really wasn&amp;#039;t any democracy in the world. Instead, we had conflicts of&lt;br /&gt;
empires.&lt;br /&gt;
&lt;br /&gt;
According to the Pirate Code, every man has a vote in their own&lt;br /&gt;
affairs. Pirates were paid according to shares, in a very egalitarian&lt;br /&gt;
way. A crew member might have gotten one share, while a captain got&lt;br /&gt;
two shares.&lt;br /&gt;
&lt;br /&gt;
Threats to modern-day pirates:&lt;br /&gt;
&lt;br /&gt;
* Extended copyright terms&lt;br /&gt;
* The small number of corporations controlling media, banking, and agriculture.&lt;br /&gt;
* Income growth in the top 1% and 0.1%.&lt;br /&gt;
* In 2012, the top 0.01% generated around 40% of all political contributions.&lt;br /&gt;
* Programs like Trap Wire, who&amp;#039;s goal is to link up surveillance cameras all across the country.&lt;br /&gt;
* Lots of NSA programs, like PRISM, MARINA, and Quantum Theory.&lt;br /&gt;
&lt;br /&gt;
What&amp;#039;s our future? Younger folks are very concerned about privacy. P2P&lt;br /&gt;
users tend to spend more money on music than non-P2P users. File&lt;br /&gt;
sharing has hurt sales of recorded music, but it hasn&amp;#039;t decreased&lt;br /&gt;
overall music industry income.&lt;br /&gt;
&lt;br /&gt;
Pirates are freedom fighters, who think culture is incremental, and&lt;br /&gt;
who believe it&lt;br /&gt;
should be shared.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Extending the network from the perspective of a rouge user and or device ==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Enyel Perez, Gray Cyber Security&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Corporations spend a lot of money to defend themselves against&lt;br /&gt;
external attacks.  They spend very little defending themselves against&lt;br /&gt;
internal attacks. Rogue users have a good understanding of technology,&lt;br /&gt;
and they know what they&amp;#039;re doing. They can cause plenty of damage.&lt;br /&gt;
&lt;br /&gt;
When tracking down rogue users, your first task is to figure out what&lt;br /&gt;
they&amp;#039;re doing.&lt;br /&gt;
&lt;br /&gt;
Avoid having unauthorized network equipment plugged in (e.g., a back&lt;br /&gt;
door running on a Raspberry Pi, open wireless access points).&lt;br /&gt;
&lt;br /&gt;
Network Access Controls such as Packet Fence,&lt;br /&gt;
http://www.packetfence.org/, are valuable tools in controlling access&lt;br /&gt;
to your network. Packet Fence keeps track of the MAC addresses that&lt;br /&gt;
appear on your network, and it can notify you when new MAC addresses&lt;br /&gt;
appear.&lt;br /&gt;
&lt;br /&gt;
Examine your firewall logs.&lt;br /&gt;
&lt;br /&gt;
Strategies for protecting yourself against rogue users: provide&lt;br /&gt;
company-controlled wireless access points. Be sure these WAPs reside&lt;br /&gt;
in your DMZ. By having companyprovided WAPs, you create less incentive&lt;br /&gt;
for users to set up their own WAPs. Control the use of external&lt;br /&gt;
storage devices. Run vulnerability scans. Where possible, use&lt;br /&gt;
multi-factor authentication.&lt;br /&gt;
&lt;br /&gt;
A &amp;quot;Rogue Device&amp;quot; is an unauthorized device that&amp;#039;s connected to your&lt;br /&gt;
network. Examples are unauthorized Wireless Access Points, and&lt;br /&gt;
Raspberry Pis that route traffic between the internal network and the&lt;br /&gt;
internet (Kali Linux is a popular distribution for doing this).&lt;br /&gt;
&lt;br /&gt;
Common network configurations protect you from the outside, but not&lt;br /&gt;
from the inside.  In order to catch a thief, you must think like a&lt;br /&gt;
thief.&lt;br /&gt;
&lt;br /&gt;
Question: How long can a typical rogue device stay connected to a&lt;br /&gt;
corporate network?&lt;br /&gt;
&lt;br /&gt;
It depends on how long it takes you to find the rogue device. Some&lt;br /&gt;
devices are easy to physically conceal. Think Raspberry Pi taped to&lt;br /&gt;
the bottom of a desk.&lt;br /&gt;
&lt;br /&gt;
Comment: Network access control tools can be extremely effective, but&lt;br /&gt;
they take a bit of work to implement.&lt;br /&gt;
&lt;br /&gt;
Question: What about MAC addresses in virtual environments?&lt;br /&gt;
&lt;br /&gt;
There&amp;#039;s nothing inherently special about virtual environments. It&amp;#039;s&lt;br /&gt;
just another layer of administration, to assign MAC addresses to&lt;br /&gt;
virtual machines.&lt;/div&gt;</summary>
		<author><name>SteveR</name></author>
	</entry>
</feed>