<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>SpyLogic.net</title>
	<atom:link href="https://www.spylogic.net/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.spylogic.net</link>
	<description></description>
	<lastBuildDate>Thu, 23 Jan 2025 23:29:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.5</generator>
	<item>
		<title>The Three Keys to Success in Cybersecurity</title>
		<link>https://www.spylogic.net/2024/01/the-three-keys-to-success-in-cybersecurity/</link>
					<comments>https://www.spylogic.net/2024/01/the-three-keys-to-success-in-cybersecurity/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Tue, 02 Jan 2024 20:46:35 +0000</pubDate>
				<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Career]]></category>
		<category><![CDATA[Careers]]></category>
		<category><![CDATA[Communication]]></category>
		<category><![CDATA[Communication Skills]]></category>
		<category><![CDATA[Continuous Learning]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Careers]]></category>
		<category><![CDATA[Cybersecurity Industry]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Digital Privacy]]></category>
		<category><![CDATA[Education]]></category>
		<category><![CDATA[Empathy]]></category>
		<category><![CDATA[Future]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[InfoSec]]></category>
		<category><![CDATA[Key Lessons]]></category>
		<category><![CDATA[Learning]]></category>
		<category><![CDATA[podcast]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[Privacy on the Internetz]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[speaking]]></category>
		<category><![CDATA[Teaching]]></category>
		<category><![CDATA[Teaching Others]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://www.spylogic.net/?p=939</guid>

					<description><![CDATA[One of the big questions that I often get is: How does someone become successful in a cybersecurity career? In this blog I want to share with you the three key lessons I&#8217;ve learned during my 18-year journey in the cybersecurity industry. These lessons have paved the way for my success, and I believe they [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>One of the big questions that I often get is: How does someone become successful in a cybersecurity career? In this blog I want to share with you the three key lessons I&#8217;ve learned during my 18-year journey in the cybersecurity industry. These lessons have paved the way for my success, and I believe they can do the same for you, whether you are considering a career in cybersecurity, new to the field, or have been around the block a few times.</p>
<p><strong>Key 1: Communication</strong><br />
In cybersecurity, effective communication is essential. From writing incident reports to presenting penetration test results and explaining the importance of security awareness to employees, everything hinges on how well we convey information. Delivering a briefing on an incident, writing a report on a compromised organization, or convincing your CISO to invest in new security controls all require not only technical expertise but also the ability to communicate complex concepts to both technical and non-technical audiences.</p>
<p>It&#8217;s important to remember that effective communication extends beyond your peers and co-workers. You also need to convey your thoughts clearly to your boss, customers, and even C-level executives. This means both your written and spoken communication skills are equally important. The secret weapon to effective communication is listening – not just hearing, but truly understanding. Remember the saying, &#8220;Seek first to understand, then to be understood.&#8221; Good communication is about making conversations safe, actively listening, paraphrasing, acknowledging feelings, and choosing your words wisely. For example, using &#8220;I&#8221; instead of &#8220;you&#8221; fosters understanding in a conversation.</p>
<p><strong>Key 2: Continuous Learning</strong><br />
Regardless of your role in cybersecurity, continuous learning is crucial. Stagnation is the worst thing for your career. Fortunately, we live in the golden age of affordable cybersecurity training, with numerous resources available for free. Whether it&#8217;s reading books, listening to podcasts, or participating in hands-on labs through platforms like <a href="https://tryhackme.com/">Try Hack Me</a>, <a href="https://www.hackthebox.com/">Hack the Box</a>, or <a href="https://tcm-sec.com/">TCM Security</a>, the opportunities for learning are endless. Additionally, following industry experts like <a href="https://twitter.com/0xTib3rius">Tib3rius</a> and <a href="https://twitter.com/Jhaddix">Jason Haddix</a> can provide invaluable insights. Remember, the best way to reinforce your knowledge is to teach others. Sharing knowledge not only strengthens your own understanding but also contributes to the collective growth of the cybersecurity community. Start a blog, submit a talk proposal for a conference, or find other ways to share your knowledge. You never know, your contributions could be making an impact on someone&#8217;s career!</p>
<p><strong>Key 3: Empathy</strong><br />
Empathy is often overlooked but is an immensely powerful aspect of success in cybersecurity. Lack of empathy can lead to dysfunction in all areas of our lives, including our approach to cybersecurity challenges. Take a moment to reflect on situations where a little more empathy could have made a significant difference. Could you have been more understanding towards a user who clicked on a phishing link? Could you have approached delivering pen test results to a client with less confrontation? Consider any arguments you&#8217;ve had with co-workers or managers – were those situations solely their fault, or did you contribute to the problem as well?</p>
<p>Empathy starts with self-awareness, considering how you&#8217;d like to be treated. It&#8217;s about respecting others, putting yourself in their shoes, and embracing kindness. These qualities are crucial not just in our industry but also in the world. For an in-depth exploration of empathy in cybersecurity, I highly recommend checking out the podcast <a href="https://cyberempathy.org/">Cyber Empathy</a>, hosted by Andra Zaharia.</p>
<p><strong>Conclusion</strong><br />
In summary, success in cybersecurity boils down to three keys: communication, continuous learning, and empathy. Equipping yourself with excellent communication skills, constantly expanding your knowledge, and cultivating empathy will set you on a path towards a successful career in cybersecurity.</p>
<p><strong>Looking for a weekly cybersecurity and privacy podcast with more great content like this?<br />
</strong> Check out my podcast <a href="https://sharedsecurity.net">Shared Security</a>. <a href="https://sharedsecurity.net/subscribe">Subscribe wherever you like to listen to podcasts</a>!</p>
<p>Watch the video for this blog on YouTube:</p>
<div class="ast-oembed-container " style="height: 100%;"><iframe title="Insights from 18 Years in Cybersecurity: Key Lessons for Success | Shared Security Podcast" width="1200" height="675" src="https://www.youtube.com/embed/NwoM3f_I96U?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe></div>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2024/01/the-three-keys-to-success-in-cybersecurity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Importance of Opting Out of CPNI Data Sharing</title>
		<link>https://www.spylogic.net/2023/11/the-importance-of-opting-out-of-cpni-data-sharing/</link>
					<comments>https://www.spylogic.net/2023/11/the-importance-of-opting-out-of-cpni-data-sharing/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Wed, 15 Nov 2023 20:41:41 +0000</pubDate>
				<category><![CDATA[Privacy]]></category>
		<category><![CDATA[AT&T]]></category>
		<category><![CDATA[CPNI]]></category>
		<category><![CDATA[CPNI Data Sharing]]></category>
		<category><![CDATA[CPNI Opt Out]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Digital Privacy]]></category>
		<category><![CDATA[FCC]]></category>
		<category><![CDATA[Federal Communications Commission]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[InfoSec]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Internet Provider]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[Mobile Phone]]></category>
		<category><![CDATA[Mobile Provider]]></category>
		<category><![CDATA[Phone Call]]></category>
		<category><![CDATA[Phone Calls]]></category>
		<category><![CDATA[podcast]]></category>
		<category><![CDATA[Privacy on the Internetz]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Smartphone]]></category>
		<category><![CDATA[T-Mobile]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[Telecommunications]]></category>
		<category><![CDATA[Telephone]]></category>
		<category><![CDATA[Verizon]]></category>
		<guid isPermaLink="false">https://www.spylogic.net/?p=933</guid>

					<description><![CDATA[Let&#8217;s talk about a topic that&#8217;s incredibly important for your privacy and data security. In this blog I&#8217;m going to talk about why you should opt out of the sharing of CPNI data and why that seemingly simple annual email from your mobile phone provider is more significant than you might think. What is CPNI? [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Let&#8217;s talk about a topic that&#8217;s incredibly important for your privacy and data security. In this blog I&#8217;m going to talk about why you should opt out of the sharing of CPNI data and why that seemingly simple annual email from your mobile phone provider is more significant than you might think.</p>
<p><strong>What is CPNI?</strong><br />
CPNI stands for Customer Proprietary Network Information and it refers to the information generated by your use of telecommunication services. This includes things like phone numbers you&#8217;ve called, phone calls you&#8217;ve received, the time and date of those calls, and even your location data.</p>
<p>Your mobile phone provider uses CPNI data for billing and account management, service improvement, fraud prevention, and of course, for marketing and promotions. It&#8217;s essentially a goldmine of your personal information when it comes to your mobile phone usage.</p>
<p><strong>Vague Definitions</strong><br />
What you may find interesting is that the biggest mobile phone providers in the U.S. &#8211; Verizon, AT&amp;T, and T-Mobile &#8211; all have vague definitions of what&#8217;s considered CPNI data. For example, T-Mobile says they collect phone numbers called, date and time of calls, number of minutes on call, phone related purchases like call waiting, and international calling. Verizon states that CPNI data includes services purchased, including specific calls you make and receive, related local and toll billing, the type, destination, technical configuration, location, and amount of use of purchased services.</p>
<p><strong>The Importance of Opting Out</strong><br />
Now, you might have noticed that your mobile phone provider sends you an email once a year about opting out of CPNI data sharing. You might be tempted to ignore it, but I strongly recommend against that. This email is crucial because it&#8217;s your opportunity to take control of your data and protect your privacy. Keep in mind, the Federal Communications Commission actually requires that your mobile phone provider obtain your consent before sharing your CPNI data.</p>
<p><strong>Why should you opt out of CPNI?</strong><br />
Well, when you don&#8217;t opt out, your mobile phone provider can share your CPNI data with their parent companies, affiliates, and agents. Yes, you heard that right. They can give away your call history, your phone usage, and even your location information to these companies. And guess what? These affiliates use that data to target you with ads, promotions, and other marketing materials.</p>
<p>For example, if you&#8217;re an AT&amp;T customer, if you don&#8217;t opt out of CPNI, DirecTV, who happens to be an AT&amp;T affiliate, can target you with ads and other marketing material. But here&#8217;s the thing, your personal data should be just that, personal. You shouldn&#8217;t have to worry about who has access to your call history or where you&#8217;ve been. Opting out of CPNI is one way to reclaim control over your own information.</p>
<p><strong>How to Opt Out?</strong><br />
Depending on your mobile phone provider, it can be fairly straightforward or a pain in the ass. When you receive that annual CPNI email from your mobile phone provider, read it carefully. They will provide you with instructions on how to opt out, typically involving clicking a link or sending a response to a designated email address. But depending on your provider, it can get a little more complicated.</p>
<p>For AT&amp;T customers, it&#8217;s pretty easy. Just go to <a href="https://www.att.com/consent/cpni/">www.att.com/consent/cpni</a>. Put in your billing account number and your zip code and you&#8217;re done.</p>
<p>For Verizon customers, it&#8217;s a little more complicated. First, you&#8217;ll need to go to <a href="https://verizonwireless.com/myVerizon">verizonwireless.com/myVerizon</a>. Then you&#8217;ll need to follow some navigation instructions from there to actually opt out. Alternatively, you can also opt out by calling 1-800-333-9956 and following the recorded directions. Or you can call 1-800-922-0204 to reach their customer service representative department who can process your opt out for you.</p>
<p>Lastly, for T-Mobile customers, go to <a href="https://www.t-mobile.com/privacy-center/education/phone-privacy">tmobile.com/privacy-center/education/phone-privacy</a> for more details on how to opt out by logging into their privacy dashboard.</p>
<p><strong>Protect Your Privacy!</strong><br />
Opting out of CPNI data sharing is a small action that can make a big difference in protecting your privacy. Don&#8217;t let your personal information be used for marketing without your consent. Take that email from your mobile phone provider seriously and opt out to keep your data where it belongs &#8211; with you.</p>
<p>Remember, your privacy matters.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2023/11/the-importance-of-opting-out-of-cpni-data-sharing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Lead High-Performance Security Teams: Links and References</title>
		<link>https://www.spylogic.net/2023/10/how-to-lead-high-performance-security-teams-links-and-references/</link>
					<comments>https://www.spylogic.net/2023/10/how-to-lead-high-performance-security-teams-links-and-references/#comments</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Wed, 25 Oct 2023 15:00:14 +0000</pubDate>
				<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Presentation Notes]]></category>
		<category><![CDATA[bsides las vegas]]></category>
		<category><![CDATA[ISC2]]></category>
		<category><![CDATA[ISC2 Security Congress]]></category>
		<category><![CDATA[leadership]]></category>
		<category><![CDATA[management]]></category>
		<category><![CDATA[management hacking]]></category>
		<category><![CDATA[speaking]]></category>
		<category><![CDATA[Talks]]></category>
		<guid isPermaLink="false">https://www.spylogic.net/?p=926</guid>

					<description><![CDATA[Below are the links and further reading material that I mentioned at the end of my talk &#8220;How to Lead High-Performance Security Teams&#8221; (aka: Management Hacking 101). Please let me know if you have any questions and thank you for coming to my talk! Video from my BSides Las Vegas version of this presentation is [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Below are the links and further reading material that I mentioned at the end of my talk &#8220;How to Lead High-Performance Security Teams&#8221; (aka: Management Hacking 101). Please let me know if you have any questions and thank you for coming to my talk! Video from my BSides Las Vegas version of this presentation is <a href="https://youtu.be/OMBbzFkVnlE">available for viewing here</a>.</p>
<p><span style="text-decoration: underline;"><strong>Recommended Reading</strong></span></p>
<p><strong>For new managers:</strong><br />
The Making of a Manager &#8211; Julie Zhuo<br />
<a href="https://www.amazon.com/Making-Manager-What-Everyone-Looks/dp/0735219567/ref=tmm_hrd_swatch_0?_encoding=UTF8&amp;qid=1698169917&amp;sr=8-1">https://www.amazon.com/Making-Manager-What-Everyone-Looks/dp/0735219567/ref=tmm_hrd_swatch_0?_encoding=UTF8&amp;qid=1698169917&amp;sr=8-1</a></p>
<p><strong>For not so new managers:</strong><br />
The Five Dysfunctions of a Team &#8211; Patrick Lencioni<br />
<a href="https://a.co/d/47V9urc">https://a.co/d/47V9urc</a></p>
<p>Help Them Grow or Watch Them Go: Career Conversations Employees Want &#8211; Beverly Kaye, Julie Winkle Giulioni<br />
<a href="https://www.amazon.com/Help-Them-Grow-Watch-Conversations/dp/1523097507/ref=tmm_pap_swatch_0?_encoding=UTF8&amp;qid=1698169809&amp;sr=8-4">https://www.amazon.com/Help-Them-Grow-Watch-Conversations/dp/1523097507/ref=tmm_pap_swatch_0?_encoding=UTF8&amp;qid=1698169809&amp;sr=8-4</a></p>
<p><strong>For everyone:</strong><br />
Leaders Eat Last &#8211; Simon Sinek<br />
<a href="https://www.amazon.com/Leaders-Eat-Last-Together-Others/dp/1591848016/ref=tmm_pap_swatch_0?_encoding=UTF8&amp;qid=1698169756&amp;sr=8-1">https://www.amazon.com/Leaders-Eat-Last-Together-Others/dp/1591848016/ref=tmm_pap_swatch_0?_encoding=UTF8&amp;qid=1698169756&amp;sr=8-1</a></p>
<p><strong>Watch the video: </strong><br />
<a href="https://www.youtube.com/watch?app=desktop&amp;v=4gUL76lV7gk">https://www.youtube.com/watch?app=desktop&amp;v=4gUL76lV7gk</a></p>
<p><span style="text-decoration: underline;"><strong>Links</strong></span></p>
<p><strong>The 20/60/20 Rule</strong><br />
<a href="https://www.entrepreneur.com/leadership/the-206020-rule-how-to-handle-misaligned-employees/316461">https://www.entrepreneur.com/leadership/the-206020-rule-how-to-handle-misaligned-employees/316461</a></p>
<p><strong>Team Charter Template with Examples</strong><br />
<a href="https://asana.com/resources/team-charter-template">https://asana.com/resources/team-charter-template</a></p>
<p><strong>The E.I.E.I.O Hiring Test</strong><br />
<a href="https://conceptspring.com/the-eieio-hiring-test/">https://conceptspring.com/the-eieio-hiring-test/</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2023/10/how-to-lead-high-performance-security-teams-links-and-references/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Management Hacking 102: Links and References</title>
		<link>https://www.spylogic.net/2023/08/management-hacking-102-links-and-references/</link>
					<comments>https://www.spylogic.net/2023/08/management-hacking-102-links-and-references/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Tue, 08 Aug 2023 04:00:49 +0000</pubDate>
				<category><![CDATA[Leadership]]></category>
		<category><![CDATA[bsides]]></category>
		<category><![CDATA[bsides las vegas]]></category>
		<category><![CDATA[change cycle]]></category>
		<category><![CDATA[difficult conversations]]></category>
		<category><![CDATA[disc]]></category>
		<category><![CDATA[leadership]]></category>
		<category><![CDATA[management]]></category>
		<category><![CDATA[management hacking]]></category>
		<category><![CDATA[pcm]]></category>
		<category><![CDATA[personality types]]></category>
		<category><![CDATA[presentation]]></category>
		<category><![CDATA[process communication model]]></category>
		<category><![CDATA[tom eston]]></category>
		<guid isPermaLink="false">https://www.spylogic.net/?p=897</guid>

					<description><![CDATA[Here&#8217;s the links and references from my 2023 BSides Las Vegas talk &#8220;Management Hacking 102: Personalities, Empathy, and Difficult Conversations&#8221;. Here&#8217;s the link to the YouTube video of the talk. Thanks for attending! I hope my talk will help you become a great manager and leader! Personality Types Enneagram (Book) Discovering Your Personality Type: The [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Here&#8217;s the links and references from my 2023 BSides Las Vegas talk <a href="https://www.bsideslv.org/talks#FBWSBB">&#8220;Management Hacking 102: Personalities, Empathy, and Difficult Conversations&#8221;</a>. <a href="https://www.youtube.com/live/qGlhUeBEyes?si=wC2TUgkRqtpijvKx&amp;t=900">Here&#8217;s the link to the YouTube video of the talk</a>. Thanks for attending! I hope my talk will help you become a great manager and leader!</p>
<p><span style="text-decoration: underline;"><strong>Personality Types</strong></span></p>
<p><strong>Enneagram</strong></p>
<p>(Book) Discovering Your Personality Type: The Essential Introduction to the Enneagram<br />
<a href="https://www.amazon.com/dp/061821903X?ref_=cm_sw_r_cp_ud_dp_MXK6YC59KTYEXPDE8CZV">https://www.amazon.com/dp/061821903X?ref_=cm_sw_r_cp_ud_dp_MXK6YC59KTYEXPDE8CZV</a></p>
<p>Official Riso-Hudson Enneagram Type Indicator Test<br />
<a href="https://tests.enneagraminstitute.com/orders/create#rheti">https://tests.enneagraminstitute.com/orders/create#rheti</a></p>
<p><strong>DISC</strong></p>
<p><a href="https://www.discprofile.com/">https://www.discprofile.com/</a></p>
<p><strong>Myers-Briggs Type Indicator</strong></p>
<p><a href="https://www.myersbriggs.org/">https://www.myersbriggs.org/</a><br />
<a href="https://www.mbtionline.com/">https://www.mbtionline.com/</a><br />
<a href="https://www.verywellmind.com/the-myers-briggs-type-indicator-2795583">https://www.verywellmind.com/the-myers-briggs-type-indicator-2795583</a></p>
<p>(Book) Gifts Differing: Understanding Personality Type<br />
<a href="https://www.amazon.com/dp/089106074X?ref_=cm_sw_r_cp_ud_dp_F4K990BJPPHJZQMQJP1C">https://www.amazon.com/dp/089106074X?ref_=cm_sw_r_cp_ud_dp_F4K990BJPPHJZQMQJP1C</a></p>
<p><strong>Process Communication Model (PCM)</strong><br />
<a href="https://processcommunicationmodel.com/pcm-origins/">https://processcommunicationmodel.com/pcm-origins/</a></p>
<p>The best personality type/leadership training I&#8217;ve ever attended<br />
<a href="https://ssca.com/workshops/lpmd/">https://ssca.com/workshops/lpmd/</a></p>
<p><span style="text-decoration: underline;"><strong>Motivation</strong></span></p>
<p><b>McClelland’s Human Motivation Theory<br />
</b><a href="https://www.mindtools.com/aznjntj/mcclellands-human-motivation-theory">https://www.mindtools.com/aznjntj/mcclellands-human-motivation-theory</a></p>
<p><span style="text-decoration: underline;"><strong>Dealing with Change</strong></span></p>
<p>6 Stages of the Change Cycle<br />
<a href="https://changecycle.com/">https://changecycle.com/</a></p>
<p>(Book) The Change Cycle: How People Can Survive and Thrive in Organizational Change<br />
<a href="https://www.amazon.com/Change-Cycle-People-Survive-Organizational/dp/1576754987">https://www.amazon.com/Change-Cycle-People-Survive-Organizational/dp/1576754987</a></p>
<p><span style="text-decoration: underline;"><strong>Empathy</strong></span></p>
<p>Cyber Empathy Podcast<b> </b>with Andra Zaharia<br />
<a href="https://cyberempathy.org">https://cyberempathy.org</a></p>
<p><span style="text-decoration: underline;"><strong>Difficult Conversations</strong></span></p>
<p>(Book) Difficult Conversations: How to Discuss What Matters Most<br />
<a href="https://www.amazon.com/Difficult-Conversations-Discuss-What-Matters/dp/0143118447/">https://www.amazon.com/Difficult-Conversations-Discuss-What-Matters/dp/0143118447/</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2023/08/management-hacking-102-links-and-references/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Legacy of The Hacker Manifesto</title>
		<link>https://www.spylogic.net/2023/05/the-legacy-of-the-hacker-manifesto/</link>
					<comments>https://www.spylogic.net/2023/05/the-legacy-of-the-hacker-manifesto/#comments</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Wed, 24 May 2023 15:40:56 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Old School]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Vintage Computing]]></category>
		<category><![CDATA[Andra Zaharia]]></category>
		<category><![CDATA[Apple 2e]]></category>
		<category><![CDATA[Apple II]]></category>
		<category><![CDATA[Apple ][e]]></category>
		<category><![CDATA[bbs]]></category>
		<category><![CDATA[Cyber Empathy]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Ethics]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Hacker Manifesto]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Manifesto]]></category>
		<category><![CDATA[Modem]]></category>
		<category><![CDATA[podcast]]></category>
		<category><![CDATA[The Hacker Manifesto]]></category>
		<category><![CDATA[Vintage]]></category>
		<category><![CDATA[Warez]]></category>
		<guid isPermaLink="false">https://www.spylogic.net/?p=883</guid>

					<description><![CDATA[I was 11 years young when The Hacker Manifesto was originally published in 1986 (yes, I&#8217;m that old). I had no idea about the manifesto at that age but several years later I begin tinkering with my first computer (an Apple IIe) and convinced my parents that I needed a separate phone line for a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I was 11 years young when <a href="http://phrack.org/issues/7/3.html">The Hacker Manifesto</a> was originally published in 1986 (yes, I&#8217;m that old). I had no idea about the manifesto at that age but several years later I begin tinkering with my first computer (an Apple IIe) and convinced my parents that I needed a separate phone line for a <a href="https://en.wikipedia.org/wiki/Bulletin_board_system">BBS</a> that ran on a blazing fast 56k modem. I also remember having a massive <a href="https://en.wikipedia.org/wiki/Hard_Disk_20SC">20mb external hard drive</a> thinking I would <em>never</em> use that much disk space for a BBS! Only one computer could connect at a time to my BBS&#8230;and it was glorious.</p>
<p>This was my first introduction to the world of computers and because the BBS community was fairly small at the time, I was exposed to a new world of <a href="https://en.wikipedia.org/wiki/Warez">Warez</a> (cracked and pirated software) as well as the underground chat of this new culture of anti-authority and how to break software. This led to a lot of discussions about how to make this new technology do things it wasn&#8217;t originally designed to do. I was part of those conversations which led me to my first real ethical dilemma. How far is too far before it crosses the line to be something illegal or morally wrong? At that time, there were no rules. Law enforcement barely knew what a computer was let alone had laws around their use. It was the beginning of the golden age of hacking. And I was fortunate to be part of it.</p>
<p>I think The Hacker Manifesto is still important for every hacker and now cybersecurity professional to read and understand how we got here as a industry. The manifesto teaches us about those ethical lines that can be very easy to cross as we navigate a sea of private data at our fingertips. No matter what role you have in this industry, it can be easy to cross that ethical line. The manifesto also tells us that we are all curious and we need to continue to break new technology so that we can better secure it. &#8220;Damn kids. They&#8217;re all alike.&#8221; Still holds true today. Especially with the new generation of hackers entering our industry. We just need to break things in a moral and ethical way.</p>
<p>I was <a href="https://cyberempathy.org/episodes/ethical-hackers-legacy-hacker-manifesto">recently interviewed</a> on the wonderful <a href="https://cyberempathy.org/">Cyber Empathy Podcast</a> with host <a href="https://twitter.com/AndraZaharia">Andra Zaharia</a> who graciously allowed me to share my story of those early days but also share my thoughts on how the manifesto still applies in cybersecurity. I also touch on some related topics such as burnout, cybersecurity training, and how to have empathy for new people in our industry. I hope you give it a listen!</p>
<p><iframe src="https://player.simplecast.com/bea9f25f-6533-4235-aef5-92d7cc1909eb?dark=true" width="100%" height="200px" frameborder="no" scrolling="no" seamless=""></iframe></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2023/05/the-legacy-of-the-hacker-manifesto/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Introducing the Shared Security Weekly Blaze Podcast</title>
		<link>https://www.spylogic.net/2018/02/introducing-the-shared-security-weekly-blaze-podcast/</link>
					<comments>https://www.spylogic.net/2018/02/introducing-the-shared-security-weekly-blaze-podcast/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Sat, 03 Feb 2018 20:58:40 +0000</pubDate>
				<category><![CDATA[Podcast]]></category>
		<category><![CDATA[podcast]]></category>
		<category><![CDATA[Shared Security]]></category>
		<guid isPermaLink="false">https://www.spylogic.net/?p=836</guid>

					<description><![CDATA[As many of you may know, I&#8217;ve been co-hosting the Shared Security Podcast (formally known as the Social Media Security Podcast) with my fabulous co-host Scott Wright from Security Perspectives Inc. We&#8217;ve been recording this podcast every month (mostly) since 2009 and over the years we&#8217;ve had feedback from many of our listeners that they&#8217;ve always [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignright size-full wp-image-839" src="https://www.spylogic.net/wp-content/uploads/2018/02/Shared_Security_Weekly_Blaze_Logo-500x215-e1517691281652.jpg" alt="" width="200" height="84" />As many of you may know, I&#8217;ve been co-hosting the <a href="https://sharedsecurity.net">Shared Security Podcast</a> (formally known as the Social Media Security Podcast) with my fabulous co-host Scott Wright from Security Perspectives Inc. We&#8217;ve been recording this podcast every month (mostly) since 2009 and over the years we&#8217;ve had feedback from many of our listeners that they&#8217;ve always wanted us to offer a weekly podcast. So this year we&#8217;ve decided to step up our podcasting game and release a weekly episode with a brand new format.</p>
<p>This new weekly podcast is called the Shared Security Weekly Blaze. In this podcast we&#8217;ll be covering the top 3 privacy and security news topics from the previous week. This new format is designed to give you fast and consumable security and privacy &#8220;news that you can use&#8221;. In addition, we&#8217;ve added transcripts to the weekly podcast, available with each episode blog post, as this was also another listener request we&#8217;ve had in the past.  The weekly podcasts are in addition to our traditional monthly podcast which will continue to cover security and privacy topics in more detail. We&#8217;ll also be booking more frequent<span class="text_exposed_show"> interviews and guests for the monthly podcasts in 2018.</span></p>
<div class="text_exposed_show">
<p>You can listen to the first episode of the Weekly Blaze right now from our regular podcast feed or <a href="http://sharedsecurity.net/2018/01/29/the-shared-security-weekly-blaze-dark-caracal-meltdown-and-spectre-debacle-amazon-go/">directly from our website</a>. If you haven&#8217;t subscribed to the podcast yet, you can do so through your favorite podcast listening application: <a href="https://itunes.apple.com/us/podcast/the-shared-security-podcast/id329032812?mt=2&amp;ls=1">iTunes</a>, <a href="http://subscribeonandroid.com/sharedsecurity.net/feed/podcast/">Android</a>, <a href="https://play.google.com/music/podcasts/portal/u/0#p:id=playpodcast/series&amp;a=100631628">Google Play</a>, <a href="http://www.stitcher.com/podcast/the-shared-security-podcast/shared-security-podcast">Stitcher</a> or on your Amazon Echo device via <a href="http://tunein.com/radio/Shared-Security-p952054/">TuneIn</a>. You can also <a href="https://sharedsecurity.net/podcast-episodes/">listen directly from our website</a> where we post all past episodes of the podcast.</p>
<p>Lastly, you can now follow our podcast on Instagram where we&#8217;ll be posting additional content including videos, stories and more to supplement the podcast. A huge thanks to all of you for listening and supporting the podcast over the years. 2018 looks to be our best year yet!</p>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2018/02/introducing-the-shared-security-weekly-blaze-podcast/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Using Technology to Defend Digital Privacy &#038; Human Rights &#8211; Presentation Notes</title>
		<link>https://www.spylogic.net/2017/12/using-technology-to-defend-digital-privacy-human-rights-presentation-notes/</link>
					<comments>https://www.spylogic.net/2017/12/using-technology-to-defend-digital-privacy-human-rights-presentation-notes/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Wed, 20 Dec 2017 18:00:26 +0000</pubDate>
				<category><![CDATA[Presentation Notes]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Privacy on the Internetz]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[signal]]></category>
		<category><![CDATA[tails]]></category>
		<category><![CDATA[tor]]></category>
		<category><![CDATA[vpn]]></category>
		<category><![CDATA[whonix]]></category>
		<guid isPermaLink="false">https://www.spylogic.net/?p=819</guid>

					<description><![CDATA[If you attended my talk &#8220;Using Technology to Defend Digital Privacy &#38; Human Rights&#8221;, thank you! Here&#8217;s a list of supplemental material discussed during the presentation as well as where you can find out additional information about the topics covered. I&#8217;m happy to answer any questions that you might have via Twitter, Facebook or LinkedIn. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>If you attended my talk <a href="https://www.jolt.us/u/TomEston/using-technology-to-defend-digital-privacy-human-rights-e05830">&#8220;Using Technology to Defend Digital Privacy &amp; Human Rights&#8221;</a>, thank you! Here&#8217;s a list of supplemental material discussed during the presentation as well as where you can find out additional information about the topics covered. I&#8217;m happy to answer any questions that you might have via <a href="https://twitter.com/agent0x0">Twitter</a>, <a href="https://www.facebook.com/SpyLogic/">Facebook</a> or <a href="https://www.linkedin.com/in/tomeston/">LinkedIn</a>.</p>
<p><strong>Targeted attacks in Egypt</strong><br />
<a href="https://theintercept.com/2017/02/02/egyptian-rights-activists-are-targeted-by-sophisticated-hacking-attacks/">https://theintercept.com/2017/02/02/egyptian-rights-activists-are-targeted-by-sophisticated-hacking-attacks/</a></p>
<p><strong>Mexico and targeted Spyware</strong><br />
<a href="https://www.npr.org/sections/parallels/2017/06/20/533682738/mexicos-government-is-accused-of-targeting-journalists-and-activists-with-spywar">https://www.npr.org/sections/parallels/2017/06/20/533682738/mexicos-government-is-accused-of-targeting-journalists-and-activists-with-spywar</a><br />
<a href="https://citizenlab.ca/2017/06/reckless-exploit-mexico-nso/">https://citizenlab.ca/2017/06/reckless-exploit-mexico-nso/</a></p>
<p><strong>UAE &#8211; Mansoor Discussion</strong><br />
<a href="http://www.abc.net.au/news/2017-11-12/the-forgotten-story-of-ahmed-mansoor/9142004">http://www.abc.net.au/news/2017-11-12/the-forgotten-story-of-ahmed-mansoor/9142004</a><br />
<a href="https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/">https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/</a><br />
<a href="https://en.wikipedia.org/wiki/UAE_Five">https://en.wikipedia.org/wiki/UAE_Five</a></p>
<p><strong>Information about Pegasus Spyware</strong><br />
<a href="https://www.kaspersky.com/blog/pegasus-spyware/14604/">https://www.kaspersky.com/blog/pegasus-spyware/14604/</a></p>
<p><strong>Russia Banning the Use of VPNs</strong><br />
<a href="https://www.reuters.com/article/us-russia-internet/putin-bans-vpns-to-stop-russians-accessing-prohibited-websites-idUSKBN1AF0QI">https://www.reuters.com/article/us-russia-internet/putin-bans-vpns-to-stop-russians-accessing-prohibited-websites-idUSKBN1AF0QI</a><br />
<a href="https://themoscowtimes.com/news/russian-law-banning-anonymous-online-surfing-comes-into-effect-59434">https://themoscowtimes.com/news/russian-law-banning-anonymous-online-surfing-comes-into-effect-59434</a><br />
<a href="http://www.bbc.com/news/technology-41829726">http://www.bbc.com/news/technology-41829726</a></p>
<p><strong>China&#8217;s Great Firewall blocking VPN apps and Skype</strong><br />
<a href="https://www.thestreet.com/story/14399729/1/skype-vanishes-from-app-stores-in-china.html">https://www.thestreet.com/story/14399729/1/skype-vanishes-from-app-stores-in-china.html</a></p>
<p><strong>Mass Surveillance in the United States</strong><br />
<a href="https://www.hrw.org/news/2017/10/25/us-new-evidence-suggests-monitoring-americans">https://www.hrw.org/news/2017/10/25/us-new-evidence-suggests-monitoring-americans</a></p>
<p><strong>Educating yourself on Social Engineering and Phishing (social-engineer.org is a great resource)</strong><br />
<a href="https://www.social-engineer.org/resources/social-engineering-infographic/">https://www.social-engineer.org/resources/social-engineering-infographic/</a></p>
<p><strong>Signal</strong><br />
How Signal&#8217;s Censorship Circumvention Works<br />
<a href="https://signal.org/blog/doodles-stickers-censorship/">https://signal.org/blog/doodles-stickers-censorship/</a></p>
<p><strong>More information about Tor and to download Tor Browser</strong><br />
<a href="https://www.torproject.org/">https://www.torproject.org/</a><br />
<a href="https://www.torproject.org/projects/torbrowser.html.en">https://www.torproject.org/projects/torbrowser.html.en</a></p>
<p><strong>How to use Pluggable Transports to bypass censorship in Tor</strong><br />
<a href="https://www.torproject.org/docs/pluggable-transports.html.en">https://www.torproject.org/docs/pluggable-transports.html.en</a></p>
<p><strong>TAILS USB and Virtual Machine</strong><br />
<a href="https://tails.boum.org/">https://tails.boum.org/</a></p>
<p><strong>Whonix Virtual Machine</strong><br />
<a href="https://www.whonix.org/">https://www.whonix.org/</a></p>
<p><strong>My Recommended VPN Provider</strong><br />
<a href="https://www.privateinternetaccess.com">https://www.privateinternetaccess.com</a></p>
<p><strong>My Recommended Secure Email Provider</strong><br />
<a href="https://protonmail.com">https://protonmail.com</a></p>
<p><strong>Good list of &#8220;burner&#8221; mobile phones</strong><br />
<a href="https://www.wired.com/2017/02/7-great-burner-phones/">https://www.wired.com/2017/02/7-great-burner-phones/</a></p>
<p><strong>Mobile Security Guide for Activists and Journalists</strong><br />
<a href="https://freedom.press/training/mobile-security-for-activists-and-journalists/">https://freedom.press/training/mobile-security-for-activists-and-journalists/</a></p>
<p><strong>Mobile Device Security</strong><br />
<a href="https://www.vice.com/da/article/dp9zvq/how-to-avoid-self-incrimination-via-smartphone">https://www.vice.com/da/article/dp9zvq/how-to-avoid-self-incrimination-via-smartphone</a><br />
<a href="http://www.slate.com/blogs/future_tense/2017/08/18/the_new_iphone_update_will_help_prevent_cops_from_searching_your_locked.html">http://www.slate.com/blogs/future_tense/2017/08/18/the_new_iphone_update_will_help_prevent_cops_from_searching_your_locked.html</a></p>
<p><strong>EFFs (Electronic Frontier Foundation) &#8211; Surveillance Self-Defense Portal</strong><br />
<a href="https://ssd.eff.org/">https://ssd.eff.org/</a></p>
<p>If you missed this Jolt I&#8217;ll be presenting this talk again at other venues in the near future. Be sure to follow me on social media for upcoming dates.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2017/12/using-technology-to-defend-digital-privacy-human-rights-presentation-notes/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Top 5 Attack Vectors Report: Defend It Before You Hack It</title>
		<link>https://www.spylogic.net/2014/07/2014-top-5-attack-vectors-report-defend-hack/</link>
					<comments>https://www.spylogic.net/2014/07/2014-top-5-attack-vectors-report-defend-hack/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Wed, 30 Jul 2014 21:24:48 +0000</pubDate>
				<category><![CDATA[Defense]]></category>
		<category><![CDATA[appsec]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[patches]]></category>
		<category><![CDATA[report]]></category>
		<category><![CDATA[socialengineering]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=801</guid>

					<description><![CDATA[Each year my team conducts hundreds of Penetration Tests in a wide variety of industries, ranging from Healthcare to Retail, Finance to Manufacturing, and many more. The team analyzed data collected from each of our penetration tests at SecureState since 2011 and found common themes in the methods of compromise utilized to break into organizations and compromise [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright wp-image-803" src="https://www.spylogic.net/wp-content/uploads/2014/07/robot-with-sheild-300x287.png" alt="robot-with-sheild-300x287" width="209" height="200" />Each year my team conducts hundreds of Penetration Tests in a wide variety of industries, ranging from Healthcare to Retail, Finance to Manufacturing, and many more. The team analyzed data collected from each of our penetration tests at SecureState since 2011 and found common themes in the methods of compromise utilized to break into organizations and compromise sensitive information. As a result, SecureState has issued a new report that expands on the attack vectors identified and suggests ways organizations can defend themselves against such attack vectors. SecureState’s 2014 Attack Vectors Report revealed the following Top 5 methods of compromise:</p>
<ol>
<li>Weak Passwords</li>
<li>Web Management Consoles</li>
<li>Missing Patches and System Misconfigurations</li>
<li>Application Vulnerabilities</li>
<li>Social Engineering</li>
</ol>
<p>The <a href="http://engage.securestate.com/2014-attack-vectors-report">full report is available for download on the SecureState website</a>. I also presented a webinar (<a href="http://engage.securestate.com/2014-securestate-attack-vectors-report">watch the replay here</a>) with Defense team lead Robert Miller, expanding on the report’s findings and offering additional advice to organizations on how to defend against these attack vectors. I highly recommend you download this report to see where your organization stands in regards to these attack vectors.</p>
<p><strong>What’s the bottom line?</strong><br />
The current mindset of many organizations is to only react after an attack or breach has already occurred. However, based on our findings and what the current onslaught of recent breaches have shown us, it’s clear that organizations face the same attacks month after month. Rather than be reactive, the defensive mindset needs to change to a proactive one. Consider focusing time, money and resources on your defensive controls before a penetration test occurs.</p>
<p>A penetration test should be your final step to ensure your defense can withstand an attack and to adjust your defenses if necessary. We&#8217;ve seen it time and time again where organizations only conduct an annual penetration test and expect that remediating tactical issues from the penetration test will improve their security posture. This needs to stop! Build and test your defensive controls first, then test to see how these controls hold up. Most of these controls are a mix of tactical and strategic, but reactively focused. By taking a proactive stance on defense, your organization will become much more secure and the time, money and resources spent will provide much more value to the business.</p>
<p>Defend it before you hack it.</p>
<p><a href="http://blog.securestate.com/new-2014-attack-vectors-report-release/"><em>Cross-posted from the SecureState Blog</em></a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2014/07/2014-top-5-attack-vectors-report-defend-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Teaching SANS SEC542: Web App Penetration Testing and Ethical Hacking in St. Louis July 8-13</title>
		<link>https://www.spylogic.net/2013/06/teaching-sans-sec542-web-app-penetration-testing-and-ethical-hacking-in-st-louis-july-8-13/</link>
					<comments>https://www.spylogic.net/2013/06/teaching-sans-sec542-web-app-penetration-testing-and-ethical-hacking-in-st-louis-july-8-13/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Fri, 07 Jun 2013 16:07:46 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[SANS]]></category>
		<category><![CDATA[SEC542]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=795</guid>

					<description><![CDATA[Just a quick update to let everyone know that I&#8217;ll be teaching SANS SEC542: Web App Penetration Testing and Ethical Hacking in St. Louis July 8-13th through the Community SANS program.  This is a fantastic 6 day class with lots of hands-on exercises, sharing of my real world web app testing experiences and a Capture [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Just a quick update to let everyone know that I&#8217;ll be teaching <a href="https://www.sans.org/community/event/sec542-st-louis-08jul2013-tom-eston">SANS SEC542: Web App Penetration Testing and Ethical Hacking in St. Louis July 8-13th</a> through the Community SANS program.  This is a fantastic 6 day class with lots of hands-on exercises, sharing of my real world web app testing experiences and a Capture the Flag event in which students will be able to use the methodology and techniques explored during class to find and exploit vulnerabilities within an intranet site.  I&#8217;m very excited to teach you the skills required to be a great web application penetration tester!</p>
<p><a href="https://www.sans.org/community/event/sec542-st-louis-08jul2013-tom-eston">Check out the SANS class information page for more information about the class, agenda and location</a>.</p>
<p><strong>Save 10% on your registration using code: TomStLouis</strong></p>
<p>See you in St. Louis!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2013/06/teaching-sans-sec542-web-app-penetration-testing-and-ethical-hacking-in-st-louis-july-8-13/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Presenting at SANS 2013 in Orlando Next Week</title>
		<link>https://www.spylogic.net/2013/03/presenting-at-sans-2013-in-orlando-next-week/</link>
					<comments>https://www.spylogic.net/2013/03/presenting-at-sans-2013-in-orlando-next-week/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Fri, 08 Mar 2013 19:18:24 +0000</pubDate>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[SANS]]></category>
		<category><![CDATA[socialmedia]]></category>
		<category><![CDATA[zombies]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=788</guid>

					<description><![CDATA[I&#8217;ll be at SANS 2013 in Orlando this weekend assisting Kevin Johnson with his SEC542: Web App Penetration Testing &#38; Ethical Hacking class and giving two SANS@Night presentations: Social Zombies: Rise of the Mobile Dead w/Kevin Johnson &#8211; Monday, March 11th, 7:15pm &#8211; 8:15pm &#8220;Hall of Shame&#8221; Apps in the Apple App Store and Google Play &#8211; Wednesday, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I&#8217;ll be at <a href="http://www.sans.org/event/sans-2013">SANS 2013 in Orlando</a> this weekend assisting <a href="http://www.sans.org/event/sans-2013/instructors/kevin-johnson">Kevin Johnson</a> with his <a href="http://www.sans.org/event/sans-2013/course/web-app-penetration-testing-ethical-hacking">SEC542: Web App Penetration Testing &amp; Ethical Hacking class</a> and giving two SANS@Night presentations:</p>
<ul>
<li><span style="line-height: 13px;"><a href="http://www.sans.org/event/sans-2013/bonus-sessions/1092/#bonus-box">Social Zombies: Rise of the Mobile Dead w/Kevin Johnson</a> &#8211; Monday, March 11th, 7:15pm &#8211; 8:15pm</span></li>
<li style="text-align: left;"><a href="http://www.sans.org/event/sans-2013/bonus-sessions/2262/#bonus-box">&#8220;Hall of Shame&#8221; Apps in the Apple App Store and Google Play</a> &#8211; Wednesday, March 13th, 8:15pm &#8211; 9:15pm</li>
</ul>
<p>This is a great opportunity to see Social Zombies again if you missed our talk at <a href="http://www.derbycon.com/derbycon-2012/">DerbyCon</a> last year.  Registered attendees of SANS 2013 get into the talks for free!  If you see me at the conference next week say hi and feel free to harass Kevin if you&#8217;re taking his class! <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2013/03/presenting-at-sans-2013-in-orlando-next-week/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Project Mayhem to be Unleashed at Black Hat Abu Dhabi</title>
		<link>https://www.spylogic.net/2012/11/project-mayhem-to-be-unleashed-at-black-hat-abu-dhabi/</link>
					<comments>https://www.spylogic.net/2012/11/project-mayhem-to-be-unleashed-at-black-hat-abu-dhabi/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Fri, 30 Nov 2012 22:48:08 +0000</pubDate>
				<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[blackhat]]></category>
		<category><![CDATA[dynamics]]></category>
		<category><![CDATA[gp]]></category>
		<category><![CDATA[mayhem]]></category>
		<category><![CDATA[speaking]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=770</guid>

					<description><![CDATA[For the last several months I&#8217;ve been performing research on techniques attackers could use for performing accounting fraud in popular accounting systems. This research coincides with a whitepaper that SecureState has developed entitled “Cash is King: Who’s Wearing Your Crown?” To perform this research I have collaborated with a coworker of mine, Brett Kimmell, who is the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>For the last several months I&#8217;ve been performing research on techniques attackers could use for performing accounting fraud in popular accounting systems. This research coincides with a whitepaper that SecureState has developed entitled “Cash is King: Who’s Wearing Your Crown?” To perform this research I have collaborated with a coworker of mine, Brett Kimmell, who is the manager of <a href="http://securestate.com/Services/Risk Management/Pages/default.aspx">SecureState’s Risk Management practice</a>. Brett and I will be presenting the findings from our research at the <a href="https://www.blackhat.com/ad-12/briefings.html#Eston">Black Hat security conference in Abu Dhabi on December 6</a>. This is by far the most unique topic I&#8217;ve researched in that we&#8217;ve combined penetration testing techniques with ways to commit fraud and more importantly, showing real world accounting fraud prevention. Brett Kimmell is a CPA and has many years of experience with accounting and fraud detection. He was also the CFO for a large non-profit organization. Combine this skill set with penetration testing and cutting edge malware development and you have research that truly demonstrates attacks that literally hit the “bottom line” of a company. As a penetration tester I find that gaining access to customer data, passwords, credit cards, PHI and other standard fare (ie: Trophies) are just the beginning of what can damage a company. In this research we take it to the next level and show the damage that can be done where it truly hurts a company: the financial system. It’s my hope is that this is just the start of showing organizations’ true business risk through advanced penetration testing.</p>
<p>In our work we&#8217;ve focused our research on Microsoft Dynamics Great Plains (GP). GP is the most popular accounting system used by small to midsized businesses across the world. In our research we show how attackers can commit undetectable fraud by manipulating accounting systems like GP. These attacks are quite different than finding and exposing a 0-day in software, as our research is centered on creating attacks (including custom created malware) that specifically targets a company’s accounting processes. The attacks we illustrate in our research show that technical controls cannot be solely relied on to prevent fraud. Non-technical accounting controls must be implemented and proper oversight maintained to be effective in combating modern fraud.</p>
<p>Next week we will be releasing our whitepaper as well as “Mayhem”, which is proof-of-concept code designed to hijack and manipulate the accounting processes within Microsoft Dynamics GP. Mayhem was created by the talented <a href="http://twitter.com/zerosteiner">Spencer McIntyre</a> of <a href="http://securestate.com/Research and Innovation/Pages/default.aspx">SecureState’s Research &amp; Innovation Team</a>. Mayhem is actively being developed but even in its current state (which we will demonstrate at Black Hat) will make you take a hard look at how a company needs to defend against this type of threat. Similar to how banking Trojans have targeted banking consumers in recent years, Mayhem is the first type of attack that we know of that targets the accounting systems of a company. While we focus on Microsoft Dynamics GP in our research, it can be easily ported to other types of accounting systems. Stay tuned next week as we reveal details about Mayhem and how our research puts a new focus on accounting controls.</p>
<p><a href="https://www.blackhat.com/ad-12/briefings.html"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-771" title="ad-12-336x280" src="http://www.spylogic.net/wp-content/uploads/2012/11/ad-12-336x280.png" alt="" width="336" height="280" srcset="https://www.spylogic.net/wp-content/uploads/2012/11/ad-12-336x280.png 336w, https://www.spylogic.net/wp-content/uploads/2012/11/ad-12-336x280-300x250.png 300w" sizes="auto, (max-width: 336px) 100vw, 336px" /></a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/11/project-mayhem-to-be-unleashed-at-black-hat-abu-dhabi/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Burp Suite Series: Efficient use of Payload Options when Attacking HTTP Basic Authentication</title>
		<link>https://www.spylogic.net/2012/08/burp-suite-series-efficient-use-of-payload-options-when-attacking-http-basic-authentication/</link>
					<comments>https://www.spylogic.net/2012/08/burp-suite-series-efficient-use-of-payload-options-when-attacking-http-basic-authentication/#comments</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Fri, 24 Aug 2012 20:33:19 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[burpsuite]]></category>
		<category><![CDATA[tools]]></category>
		<category><![CDATA[webapp]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=756</guid>

					<description><![CDATA[In this series of blog posts I’ll be discussing some handy Burp Suite techniques we often use on our penetration tests.  Burp Suite is our de facto tool of choice for assessing web applications and conducting web based brute force attacks.  First up are some techniques to use when conducting brute force attacks on websites [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>In this series of blog posts I’ll be discussing some handy Burp Suite techniques we often use on our penetration tests.  <a href="http://www.portswigger.net/burp/">Burp Suite</a> is our de facto tool of choice for assessing web applications and conducting web based brute force attacks.  First up are some techniques to use when conducting brute force attacks on websites that use HTTP Basic Authentication.  While simple brute force attacks are easy to set up in Burp Suite (think form based authentication) not a lot of tutorials exist out there for how to brute force HTTP Basic Authentication, especially if the password is not in clear text like you might usually find it.</p>
<p><strong>How HTTP Basic Authentication Works</strong></p>
<p>HTTP Basic Authentication works by Base64 encoding the username and password in the HTTP header.  It looks like this in a web request:</p>
<p><em>Authorization: Basic dmljdGltQHZpY3RpbS5jb206cGFzc3dvcmQ=</em></p>
<p>Running this through Burp Suite’s decoder function (Base64 decode) gives us the following:</p>
<p><em>victim@victim.com:password</em></p>
<p>As you can see, the username and password are in clear text.  Not a good option for authentication since this can be easily sniffed off the wire with a network sniffer like Wireshark, which is why these credentials should ideally always be going over SSL.  Besides the clear text security issue, using HTTP Basic Authentication provides the penetration tester with a convenient way to brute force the password for users of the system or application.  Typically you will find HTTP Basic Authentication used for web access to network management devices. Also, some websites use this for authentication to their application (and that’s a whole other blog post).  I’ve recently seen more web and mobile applications using this form of authentication.</p>
<p><strong>What if the Password is Hashed?</strong></p>
<p>Occasionally you might encounter a situation where the authentication header does not reveal a clear text password but a hashed representation of the password.  For example, you might see this after running the Base64 string through Burp Suite’s decoder:</p>
<p><em>victim@victim.com:5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8</em></p>
<p>In this example, the password is not clear text but is an SHA1 hash of the password.  If it is a guessable password, you can easily use any type of hash lookup table <a href="http://www.onlinehashcrack.com/">like this one online</a> to lookup this hash.  This SHA1 hash is “password”.  Hopefully that’s not your password. <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p><strong>Attacking HTTP Basic Authentication with Hashed Password Values</strong></p>
<p>One of the attacks on a system utilizing HTTP Basic Authentication is the lovely brute force attack.  First, get yourself a password list of easily guessable passwords.  I recommend any on <a href="http://www.skullsecurity.org/wiki/index.php/Passwords">Ron Bowe’s website SkullSecurity</a>, especially “500 worst” and “Rockyou”.  Next, submit a request with dummy account information and intercept the request with Burp Suite’s proxy:</p>
<p><a href="http://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-request1.png"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-757" title="burp-basicauth-request1" src="http://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-request1-300x160.png" alt="" width="300" height="160" srcset="https://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-request1-300x160.png 300w, https://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-request1.png 803w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></p>
<p>At this point you want to decode the Base64 string to see if the password is plain text.  Right click the request and then “Send to Decoder”. Then select <strong>Decode As Base64</strong> to reveal the plaintext.</p>
<p><a href="http://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-decoder2.png"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-758" title="burp-basicauth-decoder2" src="http://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-decoder2-300x122.png" alt="" width="300" height="122" srcset="https://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-decoder2-300x122.png 300w, https://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-decoder2-1024x416.png 1024w, https://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-decoder2.png 1152w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></p>
<p>The password is hashed so next find out what type of hashing is used (use a look up utility like Hash Identifier in Backtrack 5).</p>
<p>Once you’ve determined the hash type you can configure Burp Intruder, which will be used to actually perform the brute force attack.  Go back to the proxied request and right click “Send to Intruder”.</p>
<p><a href="http://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-intruder1.png"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-759" title="burp-basicauth-intruder1" src="http://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-intruder1-300x180.png" alt="" width="300" height="180" srcset="https://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-intruder1-300x180.png 300w, https://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-intruder1-1024x616.png 1024w, https://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-intruder1.png 1155w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></p>
<p>Press “Clear” and highlight the Base64 string with your mouse.  Press “Add”. Keep the attack type to “Sniper”. Click on the “Payloads” tab.</p>
<p><a href="http://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-intruder2.png"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-760" title="burp-basicauth-intruder2" src="http://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-intruder2-229x300.png" alt="" width="229" height="300" srcset="https://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-intruder2-229x300.png 229w, https://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-intruder2.png 600w" sizes="auto, (max-width: 229px) 100vw, 229px" /></a></p>
<p>Under “Payload Options [Simple list]” is where you want to load your password list. Next, you will need to set your “Payload Processing” rules.  The orders of these rules are very important.  First you want a rule to hash the password using SHA.  Next, you need to add the prefix, which is the username (email) of the account you want to brute force.  Don’t forget the “:” after the username!  Lastly, we want to Base64 encode the entire payload.</p>
<p><a href="http://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-payload-encoding.png"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-761" title="burp-basicauth-payload-encoding" src="http://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-payload-encoding-300x38.png" alt="" width="300" height="38" srcset="https://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-payload-encoding-300x38.png 300w, https://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-payload-encoding.png 828w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></p>
<p>Important: Ensure you uncheck the “URL-encode these characters” in the Payload Encoding section.  This will ensure any “==” or “=” from the Base64 string are not encoded in the request.</p>
<p><a href="http://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-intruder3.png"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-762" title="burp-basicauth-intruder3" src="http://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-intruder3-300x110.png" alt="" width="300" height="110" srcset="https://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-intruder3-300x110.png 300w, https://www.spylogic.net/wp-content/uploads/2012/08/burp-basicauth-intruder3.png 975w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></p>
<p><strong>Other Considerations for More Complex Brute Force Attacks</strong></p>
<p>There are several other ways we can approach this type of brute force attack on HTTP Basic Authentication.  What if you wanted to attack multiple users with one password like “Password1”.  Simply change the payload list to usernames (emails in this case) and in the Payload Processing rules, create a rule to add a suffix.  In the suffix field, add the SHA hash of Password1.  Make sure you include the “:” before the hash value. Then keep your last rule to Base64 encode the payload.  Here are a few other ideas on advanced attacks:</p>
<ul>
<li>Use Burp Extender and perform custom logic to create an attack using the “Pitchfork” or “Cluster Bomb” Intruder functionality.  For example, suppose I want to do a brute force attack using different user id’s and passwords such as:
<p><em>victim1@victim.com:password1<br />
</em><em>victim1@victim.com:password2<br />
</em><em>victim2@victim.com:password1<br />
</em><em>victim2@victim.com:password2</em></li>
</ul>
<p>You can also create a list yourself using a Python script, then replace the payload list with this one and keep the payload processing rules we’ve already defined.</p>
<p>Happy Brute Forcing!</p>
<p><a href="http://blog.securestate.com/"><em>Re-posted</em><em> from the SecureState Blog</em></a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/08/burp-suite-series-efficient-use-of-payload-options-when-attacking-http-basic-authentication/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Android vs. Apple iOS Security Showdown Slides</title>
		<link>https://www.spylogic.net/2012/07/android-vs-apple-ios-security-showdown-slides/</link>
					<comments>https://www.spylogic.net/2012/07/android-vs-apple-ios-security-showdown-slides/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Mon, 23 Jul 2012 18:57:52 +0000</pubDate>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[ios]]></category>
		<category><![CDATA[mobile]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=751</guid>

					<description><![CDATA[Here are the slides from my recent webinar.  Sorry about the delay! The Android vs. Apple iOS Security Showdown from Tom Eston]]></description>
										<content:encoded><![CDATA[<p>Here are the slides from my recent webinar.  Sorry about the delay!</p>
<div style="margin-bottom: 5px;"><strong> <a title="The Android vs. Apple iOS Security Showdown " href="http://www.slideshare.net/agent0x0/the-android-vs-apple-ios-security-showdown" target="_blank" rel="noopener">The Android vs. Apple iOS Security Showdown </a> </strong> from <strong><a href="http://www.slideshare.net/agent0x0" target="_blank" rel="noopener">Tom Eston</a></strong></div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/07/android-vs-apple-ios-security-showdown-slides/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Free Webinar July 12th: Android vs. Apple iOS Security Showdown</title>
		<link>https://www.spylogic.net/2012/07/free-webinar-july-12th-android-vs-apple-ios-security-showdown/</link>
					<comments>https://www.spylogic.net/2012/07/free-webinar-july-12th-android-vs-apple-ios-security-showdown/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Wed, 11 Jul 2012 14:08:21 +0000</pubDate>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Mobile Applications]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[speaking]]></category>
		<category><![CDATA[webinar]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=744</guid>

					<description><![CDATA[It&#8217;s not too late to register for my webinar on July 12th: Android vs. Apple iOS Security Showdown.  I&#8217;ll be taking a entertaining look at the current security posture of both platforms. I&#8217;ll be battling the Apple App Store vs. Google Play, device updates, MDMs, developer controls, security features and the current slew of vulnerabilities for both [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>It&#8217;s not too late to register for my webinar on July 12th: <a href="http://marketing.securestate.com/android-vs-ios-webinar?utm_campaign=webinar">Android vs. Apple iOS Security Showdown</a>.  I&#8217;ll be taking a entertaining look at the current security posture of both platforms. I&#8217;ll be battling the Apple App Store vs. Google Play, device updates, MDMs, developer controls, security features and the current slew of vulnerabilities for both platforms.  Which one will emerge the victor? <a href="http://marketing.securestate.com/android-vs-ios-webinar?utm_campaign=webinar">Register for my webinar on July 12th to find out!</a></p>
<p><a href="http://www.spylogic.net/wp-content/uploads/2012/07/Showdown-Graphic.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-745" title="AndroidvsiOS" src="http://www.spylogic.net/wp-content/uploads/2012/07/Showdown-Graphic.png" alt="" width="687" height="482" srcset="https://www.spylogic.net/wp-content/uploads/2012/07/Showdown-Graphic.png 687w, https://www.spylogic.net/wp-content/uploads/2012/07/Showdown-Graphic-300x210.png 300w" sizes="auto, (max-width: 687px) 100vw, 687px" /></a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/07/free-webinar-july-12th-android-vs-apple-ios-security-showdown/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SANS Mentor brings Security 542: Web App Penetration Testing and Ethical Hacking (GWAPT) to Cleveland</title>
		<link>https://www.spylogic.net/2012/06/sans-mentor-brings-security-542-web-app-penetration-testing-and-ethical-hacking-gwapt-to-cleveland/</link>
					<comments>https://www.spylogic.net/2012/06/sans-mentor-brings-security-542-web-app-penetration-testing-and-ethical-hacking-gwapt-to-cleveland/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Thu, 21 Jun 2012 18:26:42 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[SANS]]></category>
		<category><![CDATA[SEC542]]></category>
		<category><![CDATA[webapp]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=739</guid>

					<description><![CDATA[I&#8217;m proud to be teaching SANS Security 542 here in Cleveland through the SANS Mentor Program beginning in August.  The SANS Mentor Program allows you to save thousands on your training budget and still experience live SANS training on the GWAPT classes &#8211; live training without traveling! COURSE DETAILS: Security 542: Web App Penetration Testing [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright size-full wp-image-740" title="sans-logo" src="http://www.spylogic.net/wp-content/uploads/2012/06/sans-logo.png" alt="" width="118" height="81" />I&#8217;m proud to be teaching SANS Security 542 here in Cleveland through the SANS Mentor Program beginning in August.  The SANS Mentor Program allows you to save thousands on your training budget and still experience live SANS training on the GWAPT classes &#8211; live training without traveling!</p>
<p>COURSE DETAILS:</p>
<p><strong>Security 542: Web App Penetration Testing and Ethical Hacking</strong><br />
Start date: Thursday August 23, class will run over 10 weeks, 6:30-8:30pm<br />
Details and tuition visit: <a href="http://www.sans.org/info/106395">http://www.sans.org/info/106395</a></p>
<p>Where: SecureState<br />
23340 Miles Road<br />
Cleveland, OH 44128</p>
<p>This local course will be offered in a multi-week format via the Mentor Program. Each week I will answer questions and assist you with hands on labs and exercises during the class. Mentor courses give you the opportunity to participate in SANS training without the expense and inconvenience of travel or being out of the office during the workday.</p>
<p>An outline of the class is as follows:</p>
<p>&#8211; Learn an attack methodology and how the pen-tester uses JavaScript within the test<br />
&#8211; Study the art of reconnaissance, specifically targeted to Web applications.<br />
&#8211; Start the discovery phase with a focus on application/server-side discovery.<br />
&#8211; Flash objects and Java applets.<br />
&#8211; Exploitation</p>
<p>The class wraps up with a Capture the Flag event where the students will be able to use the methodology and techniques explored during class to find and exploit the vulnerabilities within an intranet site.</p>
<p>I hope you can join me in August and earn your GWAPT Certification in 2012!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/06/sans-mentor-brings-security-542-web-app-penetration-testing-and-ethical-hacking-gwapt-to-cleveland/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Are We Reaching Security Conference Overload?</title>
		<link>https://www.spylogic.net/2012/05/are-we-reaching-security-conference-overload/</link>
					<comments>https://www.spylogic.net/2012/05/are-we-reaching-security-conference-overload/#comments</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Sat, 12 May 2012 15:01:04 +0000</pubDate>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[bsides]]></category>
		<category><![CDATA[carolinacon]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[derbycon]]></category>
		<category><![CDATA[grrcon]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=728</guid>

					<description><![CDATA[I saw a post from my friend Matt Neely on Twitter about how CarolinaCon and BSidesROC are on the same weekend this year. I&#8217;ve also had conversations with others earlier this week about DerbyCon (September 28-30) and GrrCon (September 27-28) being back to back as well. This is a trend that seems to be increasing [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="http://www.flickr.com/photos/rwp-roger/2483209828/"><img loading="lazy" decoding="async" class="alignright size-medium wp-image-729" title="security-confernce-overload" src="http://www.spylogic.net/wp-content/uploads/2012/05/security-confernce-overload-199x300.jpg" alt="" width="199" height="300" srcset="https://www.spylogic.net/wp-content/uploads/2012/05/security-confernce-overload-199x300.jpg 199w, https://www.spylogic.net/wp-content/uploads/2012/05/security-confernce-overload.jpg 531w" sizes="auto, (max-width: 199px) 100vw, 199px" /></a>I saw a post from my friend <a href="http://twitter.com/#!/matthewneely/status/201127815431725056">Matt Neely on Twitter</a> about how <a href="http://carolinacon.org/">CarolinaCon</a> and <a href="http://bsidesroc.com/">BSidesROC</a> are on the same weekend this year. I&#8217;ve also had conversations with others earlier this week about <a href="http://www.derbycon.com">DerbyCon</a> (September 28-30) and <a href="http://grrcon.org/">GrrCon</a> (September 27-28) being back to back as well. This is a trend that seems to be increasing every year based on the large pool of conferences out there. Not only do we have more security and hacking conferences then ever before but now there is more overlap with each other. My thought is that these choices can make it harder for researchers to present new and relevant content and also tough to decide which conferences to attend from a attendee perspective. DerbyCon was an excellent conference but I&#8217;ve also heard great things about GrrCon as well. Which conference would a speaker or attendee choose? They are also both located in the central part of the country and near large cities which makes it even more difficult for local folks to choose.</p>
<p>On the other hand because of <a href="http://www.securitybsides.com/w/page/12194156/FrontPage">Security BSides</a> and other smaller conferences over the years more unknown speakers are getting out there. We&#8217;re also seeing more great talks and discussions then ever before because of these smaller conferences. This is a good thing for our industry. Many good talks still get rejected from the big conferences like Black Hat and this is where conferences like Security BSides really shine. However, we potentially run the risk of seeing the same speakers, same content and as Matt said we appear to have an <a href="http://twitter.com/#!/matthewneely/status/201131979641589760">&#8220;echo chamber problem&#8221;</a> at all of these conferences including the big ones. Is anyone else seeing this trend? Does the overlap of multiple security conferences matter to you? Like any trend in technology are we about to bust the &#8220;Security Conference Bubble&#8221;? I often wonder what the security conference world will look like in a few years if this trend continues.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/05/are-we-reaching-security-conference-overload/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>New reading material just arrived!</title>
		<link>https://www.spylogic.net/2012/05/new-reading-material-just-arrived/</link>
					<comments>https://www.spylogic.net/2012/05/new-reading-material-just-arrived/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Mon, 07 May 2012 14:09:16 +0000</pubDate>
				<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Apple]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=721</guid>

					<description><![CDATA[I hope to do a review of this book soon. So far it looks to be a good technical read.]]></description>
										<content:encoded><![CDATA[<p><a href="http://www.spylogic.net/wp-content/uploads/2012/05/20120507-100710.jpg"><img decoding="async" src="http://www.spylogic.net/wp-content/uploads/2012/05/20120507-100710.jpg" alt="20120507-100710.jpg" class="alignnone size-full" /></a></p>
<p>I hope to do a review of this book soon. So far it looks to be a good technical read.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/05/new-reading-material-just-arrived/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Three Areas You Need To Test When Assessing Mobile Applications</title>
		<link>https://www.spylogic.net/2012/05/three-areas-you-need-to-test-when-assessing-mobile-applications/</link>
					<comments>https://www.spylogic.net/2012/05/three-areas-you-need-to-test-when-assessing-mobile-applications/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Wed, 02 May 2012 15:38:50 +0000</pubDate>
				<category><![CDATA[Mobile Applications]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[ios]]></category>
		<category><![CDATA[owasp]]></category>
		<category><![CDATA[speaking]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=718</guid>

					<description><![CDATA[Having spoken at both at the SANS Mobile Device Security Summit as well as OWASP AppSec DC recently about testing mobile applications I’ve encountered that like the old saying goes “There are many ways to skin a cat”, there are also many ways to assess a mobile application.  I’ve seen very detailed testing methodologies, not [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Having spoken at both at the SANS Mobile Device Security Summit as well as OWASP AppSec DC recently about testing mobile applications I’ve encountered that like the old saying goes “There are many ways to skin a cat”, there are also many ways to assess a mobile application.  I’ve seen very detailed testing methodologies, not so detailed and everything in between.  I’ve also heard other security professionals say that testing mobile applications are just like testing a web application.  This is simply a wrong and inaccurate statement.  Mobile applications are fairly complex and just assessing the application layer is only a small look into the overall security of a mobile application.  While the <a href="https://www.owasp.org/index.php/OWASP_Mobile_Security_Project" data-cke-saved-href="https://www.owasp.org/index.php/OWASP_Mobile_Security_Project">OWASP Mobile Security Project</a> will help define a complete mobile application testing methodology (which is in process), here are three areas that need to be tested in every mobile application.</p>
<p><strong>1. The Mobile File System</strong><br />
How’s the application storing data and where is it being stored?  You’d be surprised how much information is being stored in files, SQLite databases, system logs and more.  If you’re lucky you will sometimes find private keys and hardcoded passwords.  As a great example, the mobile Facebook application suffers from a file system vulnerability as I write this.  <a href="http://blog.scoopz.com/2012/04/11/how-to-hack-facebook-dropbox-linkedin-and-other-ios-apps-using-a-plist-extracted-from-ios-backups/" data-cke-saved-href="http://blog.scoopz.com/2012/04/11/how-to-hack-facebook-dropbox-linkedin-and-other-ios-apps-using-a-plist-extracted-from-ios-backups/">The author likes to call this a “plist hijack attack”.</a>  Simply move the plist file to another mobile device and you are logged in as that user.  As for tools to use when looking for file system vulnerabilities you should really <a href="http://www.darkreading.com/blog/232800023/forensic-approach-to-mobile-app-vulnerability-research.html" data-cke-saved-href="http://www.darkreading.com/blog/232800023/forensic-approach-to-mobile-app-vulnerability-research.html">check out the forensic approach that John Sawyer from InGuardians has developed</a>.  It’s my preferred method for seeing how the app writes to the file system and saves lots of time over creating a dd image.</p>
<p><strong>2. The Application Layer</strong><br />
How’s the application communicating over HTTP?  How are web services being used and how are they configured.  Important things such as authorization and authentication need to be reviewed as well as session handling, business logic, input validation and crypto functions.  Business logic needs to reviewed just like you would in a Web Application Assessment to find flaws in the way critical functions (like shopping cart checkout processes) were developed.  Remember to never under estimate the criticality of Web Services!  For reference and context, <a href="http://www.spylogic.net/2011/08/dont-drop-the-soap-real-world-web-service-testing-for-web-hackers-presentation/" data-cke-saved-href="http://www.spylogic.net/2011/08/dont-drop-the-soap-real-world-web-service-testing-for-web-hackers-presentation/">check out the presentation that Josh Abraham, Kevin Johnson and I gave at Black Hat USA last year.</a></p>
<p>Something else worth mentioning is that you can’t rely on traditional web proxies like Burp Suite to test the application layer on a mobile app.  I’ve encountered applications that are configured to bypass device proxy settings!  You need to use a tool like <a href="http://intrepidusgroup.com/insight/mallory/" data-cke-saved-href="http://intrepidusgroup.com/insight/mallory/">Mallory</a> which is a fantastic TCP and UDP proxy.  Mallory sees all traffic and allows you to manipulate and fuzz it.  There are other ways to do this as well but regardless, you need to have a way to see all traffic the mobile app may generate.</p>
<p>The application layer is also where you need to look for issues specific to mobile applications like UDID usage in iOS.  UDID is currently being used by many applications for unique device identification.  However, the use of UDID is becoming an increasing concern from a privacy perspective.  Not to mention, <a href="http://lifehacker.com/5898282/what-a-udid-is-and-why-apples-rejecting-apps-that-want-yours" data-cke-saved-href="http://lifehacker.com/5898282/what-a-udid-is-and-why-apples-rejecting-apps-that-want-yours">Apple is cracking down on UDID usage by now denying applications in the Apple App Store</a>.  <a href="http://www.spylogic.net/2012/04/smart-bombs-mobile-vulnerability-and-exploitation-presentation/" data-cke-saved-href="http://www.spylogic.net/2012/04/smart-bombs-mobile-vulnerability-and-exploitation-presentation/">Check out the presentation I did at OWASP AppSec DC this year about some of the privacy and security concerns regarding UDID.</a></p>
<p><strong>3. The Transport Layer</strong><br />
How does the application communicate over TCP?  How are custom protocols and third-party APIs used?  Does the application use SSL?  At OWASP AppSec DC we talked about the LinkedIn mobile application that was vulnerable to “sidejacking” or better known as HTTP session hijacking.  This is where an attacker can pull out the session cookie in clear text and replay this so the attacker can login as the user.  <a href="http://codebutler.com/firesheep" data-cke-saved-href="http://codebutler.com/firesheep">The popular “Firesheep” tool released in 2010 demonstrated this nicely</a>.  The good news is that the recent release of the LinkedIn app (version 5.0) fixes the sidejacking issue.  Unfortunately though, using SSL for just the login process and defaulting back to HTTP is an issue many mobile and web applications still have.</p>
<p>Mobile Application testing is something that will evolve as mobile apps get more complex and the business drives more towards mobile solutions.  If you’re deploying mobile apps for your business it’s more important than ever to have testing done on these three areas at a minimum. Lastly, keep up-to-date on the latest developments on Mobile security and testing methodologies by getting involved with the <a href="https://www.owasp.org/index.php/OWASP_Mobile_Security_Project" data-cke-saved-href="https://www.owasp.org/index.php/OWASP_Mobile_Security_Project">OWASP Mobile Security Project.</a></p>
<p><a href="http://blog.securestate.com/post/2012/05/02/Three-Areas-You-Need-To-Test-When-Assessing-Mobile-Applications.aspx" data-cke-saved-href="http://blog.securestate.com/post/2012/05/02/Three-Areas-You-Need-To-Test-When-Assessing-Mobile-Applications.aspx"><em>Cross-posted from the SecureState blog</em></a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/05/three-areas-you-need-to-test-when-assessing-mobile-applications/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>TigerDirect is &#8220;Mom Approved&#8221;?</title>
		<link>https://www.spylogic.net/2012/04/tigerdirect-is-mom-approved/</link>
					<comments>https://www.spylogic.net/2012/04/tigerdirect-is-mom-approved/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Wed, 25 Apr 2012 13:43:28 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=713</guid>

					<description><![CDATA[Way to capitalize on mothers day and cheesy &#8220;family&#8221; pictures&#8230;lol &#160;]]></description>
										<content:encoded><![CDATA[<p>Way to capitalize on mothers day and cheesy &#8220;family&#8221; pictures&#8230;lol</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-714" title="tigerdirect" src="http://www.spylogic.net/wp-content/uploads/2012/04/tigerdirect.png" alt="" width="650" height="644" srcset="https://www.spylogic.net/wp-content/uploads/2012/04/tigerdirect.png 650w, https://www.spylogic.net/wp-content/uploads/2012/04/tigerdirect-150x150.png 150w, https://www.spylogic.net/wp-content/uploads/2012/04/tigerdirect-300x297.png 300w" sizes="auto, (max-width: 650px) 100vw, 650px" /></p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/04/tigerdirect-is-mom-approved/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Dogfish Head 60 Minute IPA</title>
		<link>https://www.spylogic.net/2012/04/dogfish-head-60-minute-ipa/</link>
					<comments>https://www.spylogic.net/2012/04/dogfish-head-60-minute-ipa/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Fri, 13 Apr 2012 23:00:13 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<category><![CDATA[beer]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=707</guid>

					<description><![CDATA[Hoppy goodness&#8230;]]></description>
										<content:encoded><![CDATA[<p>Hoppy goodness&#8230;</p>
<p><a href="http://www.spylogic.net/wp-content/uploads/2012/04/20120413-185940.jpg"><img decoding="async" class="alignnone size-full" src="http://www.spylogic.net/wp-content/uploads/2012/04/20120413-185940.jpg" alt="20120413-185940.jpg" /></a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/04/dogfish-head-60-minute-ipa/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Slides from my &#8220;5 Lessons Learned From Breaking Into A Casino&#8221; Webcast</title>
		<link>https://www.spylogic.net/2012/04/slides-from-my-5-lessons-learned-from-breaking-into-a-casino-webcast/</link>
					<comments>https://www.spylogic.net/2012/04/slides-from-my-5-lessons-learned-from-breaking-into-a-casino-webcast/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Wed, 11 Apr 2012 17:10:50 +0000</pubDate>
				<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[casino]]></category>
		<category><![CDATA[pentesting]]></category>
		<category><![CDATA[slideshare]]></category>
		<category><![CDATA[webcast]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=627</guid>

					<description><![CDATA[For those of you that attended the webcast yesterday (and those who didn&#8217;t) I&#8217;ve uploaded my slides to my SlideShare page.  Thanks to my co-presenters Richard Stiennon and Kevin Henry for presenting some great content with me!  If you&#8217;re interested Richard has posted  his slides to SlideShare as well. Five Lessons Learned From Breaking Into A [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>For those of you that attended the <a href="http://www.spylogic.net/2012/04/free-webcast-april-10th-learn-about-apts-business-process-hacking-and-breaking-into-a-casino/">webcast</a> yesterday (and those who didn&#8217;t) I&#8217;ve uploaded my slides to <a href="http://www.slideshare.net/agent0x0">my SlideShare page</a>.  Thanks to my co-presenters <a href="http://twitter.com/#!/stiennon">Richard Stiennon</a> and Kevin Henry for presenting some great content with me!  If you&#8217;re interested <a href="http://www.slideshare.net/stiennon/cybercrime-and-business-process-hacking">Richard has posted  his slides to SlideShare as well</a>.</p>
<div id="__ss_12491105" style="width: 425px;"><strong style="display: block; margin: 12px 0 4px;"><a title="Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetration Tester &amp; Other Stories" href="http://www.slideshare.net/agent0x0/5-lessons-learned-from-breaking-into-a-casino" target="_blank">Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetration Tester &amp; Other Stories</a></strong> <iframe loading="lazy" src="http://www.slideshare.net/slideshow/embed_code/12491105" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" width="425" height="355"></iframe></p>
<div style="padding: 5px 0 12px;">View more <a href="http://www.slideshare.net/" target="_blank">presentations</a> from <a href="http://www.slideshare.net/agent0x0" target="_blank">Tom Eston</a></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/04/slides-from-my-5-lessons-learned-from-breaking-into-a-casino-webcast/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Free Webcast April 10th: Learn about APTs, Business Process Hacking and Breaking into a Casino!</title>
		<link>https://www.spylogic.net/2012/04/free-webcast-april-10th-learn-about-apts-business-process-hacking-and-breaking-into-a-casino/</link>
					<comments>https://www.spylogic.net/2012/04/free-webcast-april-10th-learn-about-apts-business-process-hacking-and-breaking-into-a-casino/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Sun, 08 Apr 2012 06:00:32 +0000</pubDate>
				<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Spylogic News]]></category>
		<category><![CDATA[pentest]]></category>
		<category><![CDATA[pentesting]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=611</guid>

					<description><![CDATA[On Tuesday April 10th at 12pm EST, 9am PST, 5pm GMT I&#8217;ll be presenting &#8220;5 Lessons Learned From Breaking In: Confessions of a Pentester &#38; Other Stories&#8221; during a free webinar.  I&#8217;ll be talking about the five most common ways my team and I break into companies that you would think are highly secured such [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>On Tuesday April 10th at 12pm EST, 9am PST, 5pm GMT I&#8217;ll be presenting &#8220;5 Lessons Learned From Breaking In: Confessions of a Pentester &amp; Other Stories&#8221; during a free webinar.  I&#8217;ll be talking about the five most common ways my team and I break into companies that you would think are highly secured such as energy companies and casinos.  I&#8217;ll be joined by <a href="http://twitter.com/#!/stiennon">Richard Stiennon</a> and Kevin Henry who will be discussing business process hacking and APTs.  When you register you will get entered to win a full version of <a href="http://www.mavitunasecurity.com/netsparker/">Netsparker Web Application Scanner</a> (retail value of $5,950).  <a href="http://mile2.com/webcast.html">Register for free here.</a></p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/04/free-webcast-april-10th-learn-about-apts-business-process-hacking-and-breaking-into-a-casino/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Smart Bombs: Mobile Vulnerability and Exploitation Presentation</title>
		<link>https://www.spylogic.net/2012/04/smart-bombs-mobile-vulnerability-and-exploitation-presentation/</link>
					<comments>https://www.spylogic.net/2012/04/smart-bombs-mobile-vulnerability-and-exploitation-presentation/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Sat, 07 Apr 2012 15:06:04 +0000</pubDate>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Mobile Applications]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Computer Forensics]]></category>
		<category><![CDATA[mallory]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[owasp]]></category>
		<category><![CDATA[pentesting]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=613</guid>

					<description><![CDATA[This week I co-presented &#8220;Smart Bombs: Mobile Vulnerability and Exploitation&#8221; with John Sawyer and Kevin Johnson at OWASP AppSec DC.  We talked about the some of the current problems facing mobile applications such as flaws found in the OWASP Mobile Top 10 and various privacy issues.  We also talked about how you go about testing [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright size-full wp-image-614" title="AppSecDC-160x160-banner-2012" src="http://www.spylogic.net/wp-content/uploads/2012/04/AppSecDC-160x160-banner-2012.jpg" alt="" width="160" height="160" srcset="https://www.spylogic.net/wp-content/uploads/2012/04/AppSecDC-160x160-banner-2012.jpg 160w, https://www.spylogic.net/wp-content/uploads/2012/04/AppSecDC-160x160-banner-2012-150x150.jpg 150w" sizes="auto, (max-width: 160px) 100vw, 160px" />This week I co-presented &#8220;Smart Bombs: Mobile Vulnerability and Exploitation&#8221; with <a href="http://twitter.com/#!/johnhsawyer">John Sawyer</a> and <a href="http://twitter.com/#!/secureideas">Kevin Johnson</a> at <a href="https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Smart_Bombs_Mobile_Vulnerability_and_Exploitation">OWASP AppSec DC</a>.  We talked about the some of the current problems facing mobile applications such as flaws found in the OWASP Mobile Top 10 and various privacy issues.  We also talked about how you go about testing mobile applications from the application layer (HTTP) down to the transport layer (TCP) and file system.  I highly recommend you take a look at John&#8217;s file system testing methodology as he takes more of a forensic approach which works really well.  The takeaway from the talk is that you need to look at all these areas when testing mobile apps and mobile apps are growing area of concern from a security and privacy perspective.</p>
<p>One update we forgot to mention in the talk is that you should use <a href="http://intrepidusgroup.com/insight/mallory/">Mallory, which is a transparent TCP and UDP proxy for testing mobile applications</a>.  This is an excellent tool created by the guys at Intrepidus Group.  We&#8217;ve found that some apps will bypass proxy settings and lots of apps are sending data over binary protocols and more.  Mallory is the tool you need for testing any mobile app fully!</p>
<div id="__ss_12308303" style="width: 425px;"><strong style="display: block; margin: 12px 0 4px;"><a title="Smart Bombs: Mobile Vulnerability and Exploitation" href="http://www.slideshare.net/agent0x0/smart-bombs-mobile-vulnerability-and-exploitation" target="_blank">Smart Bombs: Mobile Vulnerability and Exploitation</a></strong> <iframe loading="lazy" src="http://www.slideshare.net/slideshow/embed_code/12308303" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" width="425" height="355"></iframe></p>
<div style="padding: 5px 0 12px;">View more <a href="http://www.slideshare.net/" target="_blank">presentations</a> from <a href="http://www.slideshare.net/agent0x0" target="_blank">Tom Eston</a></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/04/smart-bombs-mobile-vulnerability-and-exploitation-presentation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Attacking &#038; Defending Apple iOS Devices in the Enterprise Presentation Updates</title>
		<link>https://www.spylogic.net/2012/03/attacking-defending-apple-ios-devices-in-the-enterprise-presentation-updates/</link>
					<comments>https://www.spylogic.net/2012/03/attacking-defending-apple-ios-devices-in-the-enterprise-presentation-updates/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Sat, 24 Mar 2012 13:37:10 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[icloud]]></category>
		<category><![CDATA[ios]]></category>
		<category><![CDATA[ios5]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[owasp]]></category>
		<category><![CDATA[pentest]]></category>
		<category><![CDATA[SANS]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=608</guid>

					<description><![CDATA[Below are links over on SlideShare to the latest version of my ever evolving presentation &#8220;Attacking &#38; Defending Apple iOS Devices in the Enterprise&#8221;.  This is the version I presented at the SANS Mobile Device Security Summit a few weeks ago.  I include information on iOS 5, the latest jailbreaks at the time (this has [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Below are links over on SlideShare to the latest version of my ever evolving presentation &#8220;Attacking &amp; Defending Apple iOS Devices in the Enterprise&#8221;.  This is the version I presented at the <a href="http://www.spylogic.net/2012/03/sans-mobile-device-security-summit-recap/">SANS Mobile Device Security Summit</a> a few weeks ago.  I include information on iOS 5, the latest jailbreaks at the time (this has since changed with the release of iOS 5.1) and some information on the security of iCloud.</p>
<p>Just a reminder that I&#8217;ll be presenting <a href="https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Smart_Bombs_Mobile_Vulnerability_and_Exploitation">Smart Bombs: Mobile Vulnerability and Exploitation</a> with John Sawyer and Kevin Johnson at OWASP AppSec DC on April 5th in Washington DC.  I&#8217;ll be focusing my research on iOS application testing and some of the vulnerabilities discovered in some of the top 25 iOS applications.</p>
<div id="__ss_8042641" style="width: 425px;"><strong style="display: block; margin: 12px 0 4px;"><a title="Attacking and Defending Apple iOS Devices" href="http://www.slideshare.net/agent0x0/attacking-and-defending-apple-ios-devices" target="_blank">Attacking and Defending Apple iOS Devices</a></strong> <iframe loading="lazy" src="http://www.slideshare.net/slideshow/embed_code/8042641" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" width="425" height="355"></iframe></p>
<div style="padding: 5px 0 12px;">View more <a href="http://www.slideshare.net/" target="_blank">presentations</a> from <a href="http://www.slideshare.net/agent0x0" target="_blank">Tom Eston</a></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/03/attacking-defending-apple-ios-devices-in-the-enterprise-presentation-updates/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Dogfish Head 90 Minute Imperial IPA</title>
		<link>https://www.spylogic.net/2012/03/dogfish-head-90-minute-imperial-ipa/</link>
					<comments>https://www.spylogic.net/2012/03/dogfish-head-90-minute-imperial-ipa/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Sun, 18 Mar 2012 23:23:55 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<category><![CDATA[beer]]></category>
		<category><![CDATA[ipa]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=601</guid>

					<description><![CDATA[One of the best IPAs out there&#8230;yum!]]></description>
										<content:encoded><![CDATA[<p>One of the best IPAs out there&#8230;yum!</p>
<p><a href="http://www.spylogic.net/wp-content/uploads/2012/03/20120318-173742.jpg"><img loading="lazy" decoding="async" class="alignnone " src="http://www.spylogic.net/wp-content/uploads/2012/03/20120318-173742.jpg" alt="20120318-173742.jpg" width="459" height="614" /></a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/03/dogfish-head-90-minute-imperial-ipa/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SANS Mobile Device Security Summit Recap</title>
		<link>https://www.spylogic.net/2012/03/sans-mobile-device-security-summit-recap/</link>
					<comments>https://www.spylogic.net/2012/03/sans-mobile-device-security-summit-recap/#comments</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Wed, 14 Mar 2012 00:19:21 +0000</pubDate>
				<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[blackberry]]></category>
		<category><![CDATA[jailbreaking]]></category>
		<category><![CDATA[mdm]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[SANS]]></category>
		<category><![CDATA[securestate]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[windowsmobile]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=594</guid>

					<description><![CDATA[Just a quick post about the SANS Mobile Device Security Summit that I participated in.  Kudos to Kevin Johnson and Tony DeLaGrange from Secure Ideas for helping organize and lead the event.  They did a great job!  If you&#8217;ve been to SANS events in the past I assure you that this was much different.  First, there [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Just a quick post about the <a href="http://www.sans.org/mobile-device-security-summit-2012/">SANS Mobile Device Security Summit</a> that I participated in.  Kudos to <a href="http://twitter.com/secureideas">Kevin Johnson</a> and <a href="https://twitter.com/#!/tony_delagrange">Tony DeLaGrange</a> from Secure Ideas for helping organize and lead the event.  They did a great job!  If you&#8217;ve been to SANS events in the past I assure you that this was much different.  First, there was a great line up which included Rafal Los (HP), Jack Mannino (nVisium Security), Chris Cuevas (Secure Ideas), John Sawyer (InGuardians), Josh Feinblum (The Advisory Board Company) and Daniel Miessler (HP ShadowLabs) to name a few.  Having a lineup of great speakers really made the summit flow as well as it did.</p>
<p>What I liked most about this event was that there were plenty of &#8220;real world&#8221; talks on how enterprises are deploying and managing mobile deployments.  Real in the &#8220;trenches&#8221; types of talks.  Here are some of the themes that I heard throughout all the talks:</p>
<ul>
<li>Jailbreaking/Rooting is BAD</li>
<li><a href="https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks">The OWASP Mobile Top 10</a> is going to be just as important as the traditional web application OWASP Top 10</li>
<li>Mobile Threats are an evolving, moving target.  Security teams have to be quick to adapt to new mobile technology</li>
<li>MDM (Mobile Device Management Solutions) are a requirement</li>
<li>Apple iOS devices are preferred over Android in the enterprise (seriously, that was the consensus).  No one seems to care about BlackBerry or Windows Mobile devices.  I think only one speaker mentioned Windows Mobile&#8230;</li>
</ul>
<p>Speaking to the last point I find this pretty interesting.  Especially given the fact that <a href="http://www.informationweek.com/news/mobility/smart_phones/232601613">Android seems to be beating Apple in regards to market share of devices and app store apps</a>.  I also enjoyed hearing about some of the challenges and pitfalls real IT and security departments are facing.  Many of the speakers talked about some best practices they&#8217;ve developed and problems they&#8217;ve had.  One of the highlights for me was a talk by Det. Cindy Murphy from the Madison WI Police Department Computer Forensics Unit.  She shared some of her experiences with mobile device forensics and how this evidence holds up in court.  I highly recommend you check out this summit next year, it&#8217;s one not to miss!</p>
<p>I should have my slides from the latest version of my talk that I gave at the summit (Attacking &amp; Defending Apple iOS Devices in the Enterprise) in the next day or so.</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/03/sans-mobile-device-security-summit-recap/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Passcode Bypass in iOS 5.1? Not so fast!</title>
		<link>https://www.spylogic.net/2012/03/passcode-bypass-in-ios-5-1-not-so-fast/</link>
					<comments>https://www.spylogic.net/2012/03/passcode-bypass-in-ios-5-1-not-so-fast/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Mon, 12 Mar 2012 16:34:15 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=582</guid>

					<description><![CDATA[During the keynote at the SANS Mobile Device Security Summit here in Nashville this morning Rafal Los (aka: Wh1t3Rabbit) talked about a new passcode bypass vulnerability going around in the latest version of iOS (5.1).  Basically how it&#8217;s supposed to work is by opening up the camera on the lock screen you go to the photo [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>During the keynote at the <a href="http://www.sans.org/mobile-device-security-summit-2012/">SANS Mobile Device Security Summit</a> here in Nashville this morning <a href="https://twitter.com/#!/wh1t3rabbit">Rafal Los</a> (aka: Wh1t3Rabbit) talked about a new passcode bypass vulnerability going around in the latest version of iOS (5.1).  Basically how it&#8217;s supposed to work is by opening up the camera on the lock screen you go to the photo gallery, press the home button and it takes you to the home screen bypassing the passcode.  I tried this and it didn&#8217;t work on my iPhone.  I was quickly prompted for my passcode.</p>
<p>I did some research and found <a href="http://attackcomputerwiz.blogspot.com/2012/03/there-is-no-passcode-bypass-bug-in-ios.html">this blog post</a> which says this is simply a configuration issue with the passcode settings.  Check your setting for &#8220;Require Passcode&#8221; (under the Passcode Lock screen) and make sure it&#8217;s set to &#8220;Immediately&#8221;.  If it&#8217;s set to 1 minute or more, you really haven&#8217;t locked your device.  You&#8217;ve just been shutting off the screen. <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" />  See the screen shot below for the passcode setting you should be using.</p>
<p><a href="http://www.spylogic.net/wp-content/uploads/2012/03/20120312-112430.jpg"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-586" title="20120312-112430.jpg" src="http://www.spylogic.net/wp-content/uploads/2012/03/20120312-112430-200x300.jpg" alt="" width="200" height="300" srcset="https://www.spylogic.net/wp-content/uploads/2012/03/20120312-112430-200x300.jpg 200w, https://www.spylogic.net/wp-content/uploads/2012/03/20120312-112430.jpg 480w" sizes="auto, (max-width: 200px) 100vw, 200px" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/03/passcode-bypass-in-ios-5-1-not-so-fast/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Speaking at the SANS Mobile Device Security Summit</title>
		<link>https://www.spylogic.net/2012/03/speaking-at-the-sans-mobile-device-security-summit/</link>
					<comments>https://www.spylogic.net/2012/03/speaking-at-the-sans-mobile-device-security-summit/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Sun, 11 Mar 2012 21:31:35 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[icloud]]></category>
		<category><![CDATA[ios]]></category>
		<category><![CDATA[Jailbreak]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[SANS]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=579</guid>

					<description><![CDATA[I&#8217;ll be presenting &#8220;Attacking and Defending Apple iOS Devices in the Enterprise&#8221; Monday, March 12 @ 10am. I&#8217;ve got a bunch of new content about iOS 5, iCloud and the latest attacks on these devices. This is the inaugural event for SANS and I&#8217;m proud to be part of it! More information can be found [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I&#8217;ll be presenting &#8220;Attacking and Defending Apple iOS Devices in the Enterprise&#8221; Monday, March 12 @ 10am.  I&#8217;ve got a bunch of new content about iOS 5, iCloud and the latest attacks on these devices. This is the inaugural event for SANS and I&#8217;m proud to be part of it! More information can be found <a href="http://www.sans.org/mobile-device-security-summit-2012/">here at the SANS website.</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/03/speaking-at-the-sans-mobile-device-security-summit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Top 5 Security Settings for Apple iPhones and iPads</title>
		<link>https://www.spylogic.net/2012/02/top-5-security-settings-for-apple-iphones-and-ipads/</link>
					<comments>https://www.spylogic.net/2012/02/top-5-security-settings-for-apple-iphones-and-ipads/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Fri, 17 Feb 2012 17:39:36 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[icloud]]></category>
		<category><![CDATA[ipad]]></category>
		<category><![CDATA[iphone]]></category>
		<category><![CDATA[ipod]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[passcode]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[securestate]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=574</guid>

					<description><![CDATA[Apple mobile devices are among the most popular gadgets today. In fact, Apple reports that 250 million iOS devices have been sold and 18 million apps downloaded. I often find that, while the popularity of these devices increases, many don’t understand the basic security features that Apple makes available to them. Some of you may [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Apple mobile devices are among the most popular gadgets today. In fact, Apple reports that 250 million iOS devices have been sold and 18 million apps downloaded. I often find that, while the popularity of these devices increases, many don’t understand the basic security features that Apple makes available to them. Some of you may not even realize that these features exist and how easy they are to use. Let’s walk through the top five security settings for these devices:</p>
<p><strong>#1 &#8211; The Passcode</strong><br />
This is the most important security feature of your device. It’s also one of the least configured settings. While it may be a pain to “unlock” your device when you want to use it, it’s also your first line of defense if your device is ever lost or stolen. The key to the passcode is to ensure its complex and greater than 4 characters or digits. Never use simple passcodes like “1234” or your ATM PIN number. The two other settings that you need to set are to “Require Passcode Immediately” and set “Simple Passcode” to OFF. You can find these settings under the &#8220;Settings&#8221; icon then &#8220;Passcode Lock&#8221;.</p>
<p><strong>#2 – Erase Data</strong><br />
The erase data functionality adds another layer of security to your device. This function will erase all data after 10 failed passcode attempts. What this means is that if someone steals your device and tries to brute force your passcode, if they enter it incorrectly, the device is erased and returned to the factory default settings. Turn “Erase Data” to ON in the Passcode Lock screen.</p>
<p><strong>#3 – Find My iPhone/iPad</strong><br />
If you ever lose or misplace your iPhone or iPad, “Find My iPhone/iPad” is a very important feature to enable. Simply download the application on your device or access it through iCloud (icloud.com). If your device is iOS 4 or below you will need to use the “MobileMe” (me.com) feature instead of iCloud. Either way, you will need to login with your Apple ID to set it up. You can then send the device a message or alert, locate the device on Google Maps, remotely set a passcode, and remotely erase the device. This feature is invaluable if your device is lost or stolen.</p>
<p><strong>#4 – Backup Encryption</strong><br />
One of the more obscure settings that many users don’t set is the “Encrypt Backup” setting, which is found in iTunes. This setting even applies to the new iCloud service in iOS 5. This setting ensures that the backup of your device is encrypted. It goes without saying, if you can access this backup, the data on your device can be accessed and harvested. For example,<a href="http://radar.oreilly.com/2011/04/apple-location-tracking.html"> earlier last year there was a “feature” in which Geolocation data could be easily harvested from the backup file</a>. This has since been remediated, but just think how much information could be harvested about you through an unencrypted backup file.</p>
<p><strong>#5 – Keep iOS Updated</strong><br />
Making sure that you always have the latest version of Apple iOS on your device is important because Apple is always releasing security updates and implementing new security controls. Simply plug your device into iTunes and you will get prompted to update your phone to the latest version. As a side note, don’t Jailbreak your device! Jailbreaking makes many of the built in security features useless and allows your device to be an easy target for data theft.</p>
<p>Ensuring that you have enabled and configured these security settings on your Apple iOS device is more important than ever. Devices like these are lost or stolen all the time and without taking the proper precautions, your data could be vulnerable. Having conducted Apple iOS device penetration testing assessments at SecureState for our clients, I can tell you how easy it is to break into these devices. It’s easy because the proper basic precautions were not taken. Take five minutes now and enable these settings; you’ll be glad you did.</p>
<p><a href="http://blog.securestate.com/post/2011/11/09/Top-5-Security-Settings-for-Apple-iPhones-and-iPads.aspx"><em>Cross-posted from the SecureState Blog</em></a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/02/top-5-security-settings-for-apple-iphones-and-ipads/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Found the Texas BBQ again!</title>
		<link>https://www.spylogic.net/2012/02/found-the-texas-bbq-again/</link>
					<comments>https://www.spylogic.net/2012/02/found-the-texas-bbq-again/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Fri, 10 Feb 2012 00:07:13 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://spylogic.wordpress.com/2012/02/10/found-the-texas-bbq-again</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class='p_embed p_image_embed'>
<a href="http://spylogic.files.wordpress.com/2012/02/photo.jpg"><img loading="lazy" decoding="async" alt="Photo" height="373" src="http://spylogic.files.wordpress.com/2012/02/photo.jpg?w=300" width="500" /></a>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/02/found-the-texas-bbq-again/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Absinthe Jailbreak for iPad2 is fast!</title>
		<link>https://www.spylogic.net/2012/02/absinthe-jailbreak-for-ipad2-is-fast/</link>
					<comments>https://www.spylogic.net/2012/02/absinthe-jailbreak-for-ipad2-is-fast/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Thu, 02 Feb 2012 03:18:37 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[ios5]]></category>
		<guid isPermaLink="false">http://spylogic.wordpress.com/2012/02/02/absinthe-jailbreak-for-ipad2-is-fast</guid>

					<description><![CDATA[Probably the easiest Jailbreak tool out there as well&#8230;]]></description>
										<content:encoded><![CDATA[<p><div class='p_embed p_image_embed'>
<a href="http://spylogic.files.wordpress.com/2012/02/p22-scaled1000.jpg"><img loading="lazy" decoding="async" alt="P22" height="669" src="http://spylogic.files.wordpress.com/2012/02/p22-scaled1000.jpg?w=224" width="500" /></a>
</div>
</p>
<p>Probably the easiest Jailbreak tool out there as well&#8230;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/02/absinthe-jailbreak-for-ipad2-is-fast/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ready for the Pinewood Derby this weekend!</title>
		<link>https://www.spylogic.net/2012/01/ready-for-the-pinewood-derby-this-weekend/</link>
					<comments>https://www.spylogic.net/2012/01/ready-for-the-pinewood-derby-this-weekend/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Fri, 13 Jan 2012 03:59:29 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://spylogic.wordpress.com/2012/01/13/ready-for-the-pinewood-derby-this-weekend</guid>

					<description><![CDATA[&#8230;also graphite is messy! 🙂]]></description>
										<content:encoded><![CDATA[<p>    &#8230;also graphite is messy! <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p><div class='p_embed p_image_embed'>
<a href="http://spylogic.files.wordpress.com/2012/01/photo-scaled-1000.jpg"><img loading="lazy" decoding="async" alt="Photo" height="373" src="http://spylogic.files.wordpress.com/2012/01/photo-scaled-1000.jpg?w=300" width="500" /></a>
</div></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/01/ready-for-the-pinewood-derby-this-weekend/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>I highly suggest everyone avoid pentestmag.com. It&#8217;s infected with malware!</title>
		<link>https://www.spylogic.net/2012/01/i-highly-suggest-everyone-avoid-pentestmag-com-its-infected-with-malware/</link>
					<comments>https://www.spylogic.net/2012/01/i-highly-suggest-everyone-avoid-pentestmag-com-its-infected-with-malware/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Wed, 11 Jan 2012 20:16:08 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://spylogic.wordpress.com/2012/01/11/i-highly-suggest-everyone-avoid-pentestmag-com-its-infected-with-malware</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class='p_embed p_image_embed'>
<a href="http://spylogic.files.wordpress.com/2012/01/photo.png"><img loading="lazy" decoding="async" alt="Photo" height="603" src="http://spylogic.files.wordpress.com/2012/01/photo.png?w=248" width="500" /></a>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/01/i-highly-suggest-everyone-avoid-pentestmag-com-its-infected-with-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Tonight it&#8217;s me and a Dead Guy!</title>
		<link>https://www.spylogic.net/2012/01/tonight-its-me-and-a-dead-guy/</link>
					<comments>https://www.spylogic.net/2012/01/tonight-its-me-and-a-dead-guy/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Sun, 01 Jan 2012 01:27:19 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<guid isPermaLink="false">http://spylogic.wordpress.com/2012/01/01/tonight-its-me-and-a-dead-guy</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class="p_embed p_image_embed"><a><img loading="lazy" decoding="async" src="http://spylogic.files.wordpress.com/2012/01/photo-scaled-10001.jpg?w=224" alt="Photo" width="500" height="669" /></a></div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2012/01/tonight-its-me-and-a-dead-guy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Great work @_yearofthedead_ ! </title>
		<link>https://www.spylogic.net/2011/12/great-work-_yearofthedead_-3-the-calendar-zombies/</link>
					<comments>https://www.spylogic.net/2011/12/great-work-_yearofthedead_-3-the-calendar-zombies/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Thu, 29 Dec 2011 17:39:04 +0000</pubDate>
				<category><![CDATA[Zombies]]></category>
		<guid isPermaLink="false">http://spylogic.wordpress.com/2011/12/29/great-work-_yearofthedead_-3-the-calendar-zombies</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class="p_embed p_image_embed"><a href="http://spylogic.files.wordpress.com/2011/12/photo-scaled-1000.jpg"><img loading="lazy" decoding="async" src="http://spylogic.files.wordpress.com/2011/12/photo-scaled-1000.jpg?w=224" alt="Photo" width="500" height="669" /></a></div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2011/12/great-work-_yearofthedead_-3-the-calendar-zombies/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Christmas Ale at CLE. You can also get GLBC beer to go!</title>
		<link>https://www.spylogic.net/2011/11/christmas-ale-at-cle-you-can-also-get-glbc-beer-to-go-2/</link>
					<comments>https://www.spylogic.net/2011/11/christmas-ale-at-cle-you-can-also-get-glbc-beer-to-go-2/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Sun, 27 Nov 2011 17:39:14 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<guid isPermaLink="false">http://spylogic.wordpress.com/2011/11/27/christmas-ale-at-cle-you-can-also-get-glbc-beer-to-go</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class='p_embed p_image_embed'>
<a href="http://spylogic.files.wordpress.com/2011/11/photo-scaled-1000.jpg"><img loading="lazy" decoding="async" alt="Photo" height="669" src="http://spylogic.files.wordpress.com/2011/11/photo-scaled-1000.jpg?w=224" width="500" /></a>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2011/11/christmas-ale-at-cle-you-can-also-get-glbc-beer-to-go-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>I </title>
		<link>https://www.spylogic.net/2011/10/i-3-my-coworkers-this-was-a-joke-btw/</link>
					<comments>https://www.spylogic.net/2011/10/i-3-my-coworkers-this-was-a-joke-btw/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Fri, 21 Oct 2011 14:30:25 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://spylogic.wordpress.com/2011/10/21/i-3-my-coworkers-this-was-a-joke-btw</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class='p_embed p_image_embed'>
<a href="http://spylogic.files.wordpress.com/2011/10/photo.jpg"><img loading="lazy" decoding="async" alt="Photo" height="373" src="http://spylogic.files.wordpress.com/2011/10/photo.jpg?w=300" width="500" /></a>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2011/10/i-3-my-coworkers-this-was-a-joke-btw/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Who&#8217;s Slide starting now! #derbycon</title>
		<link>https://www.spylogic.net/2011/09/whos-slide-starting-now-derbycon/</link>
					<comments>https://www.spylogic.net/2011/09/whos-slide-starting-now-derbycon/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Fri, 30 Sep 2011 22:02:20 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://spylogic.wordpress.com/2011/09/30/whos-slide-starting-now-derbycon</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class='p_embed p_image_embed'>
<a href="http://spylogic.files.wordpress.com/2011/09/photo-scaled-1000.jpg"><img loading="lazy" decoding="async" alt="Photo" height="669" src="http://spylogic.files.wordpress.com/2011/09/photo-scaled-1000.jpg?w=224" width="500" /></a>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2011/09/whos-slide-starting-now-derbycon/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>@Wh1t3Rabbit speaking at #LouisvilleISSA #SecBiz</title>
		<link>https://www.spylogic.net/2011/09/wh1t3rabbit-speaking-at-louisvilleissa-secbiz/</link>
					<comments>https://www.spylogic.net/2011/09/wh1t3rabbit-speaking-at-louisvilleissa-secbiz/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Thu, 29 Sep 2011 18:26:20 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://spylogic.wordpress.com/2011/09/29/wh1t3rabbit-speaking-at-louisvilleissa-secbiz</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<p><div class='p_embed p_image_embed'>
<a href="http://spylogic.files.wordpress.com/2011/09/image-scaled1000.jpg"><img loading="lazy" decoding="async" alt="Image" height="669" src="http://spylogic.files.wordpress.com/2011/09/image-scaled1000.jpg?w=224" width="500" /></a>
</div></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2011/09/wh1t3rabbit-speaking-at-louisvilleissa-secbiz/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>So we dressed the cat up as a Squirrel and he attacked back w/laser eyes!</title>
		<link>https://www.spylogic.net/2011/09/so-we-dressed-the-cat-up-as-a-squirrel-and-he-attacked-back-wlaser-eyes/</link>
					<comments>https://www.spylogic.net/2011/09/so-we-dressed-the-cat-up-as-a-squirrel-and-he-attacked-back-wlaser-eyes/#comments</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Wed, 28 Sep 2011 01:53:12 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://spylogic.wordpress.com/2011/09/28/so-we-dressed-the-cat-up-as-a-squirrel-and-he-attacked-back-wlaser-eyes</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class='p_embed p_image_embed'>
<a href="http://spylogic.files.wordpress.com/2011/09/photo-scaled-10001.jpg"><img loading="lazy" decoding="async" alt="Photo" height="373" src="http://spylogic.files.wordpress.com/2011/09/photo-scaled-10001.jpg?w=300" width="500" /></a>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2011/09/so-we-dressed-the-cat-up-as-a-squirrel-and-he-attacked-back-wlaser-eyes/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Hmmm&#8230;I know which SSID not to choose, do you? :-)</title>
		<link>https://www.spylogic.net/2011/09/hmmm-i-know-which-ssid-not-to-choose-do-you/</link>
					<comments>https://www.spylogic.net/2011/09/hmmm-i-know-which-ssid-not-to-choose-do-you/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Sun, 18 Sep 2011 00:56:21 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://spylogic.wordpress.com/2011/09/18/hmmm-i-know-which-ssid-not-to-choose-do-you</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class='p_embed p_image_embed'>
<a href="http://spylogic.files.wordpress.com/2011/09/photo.png"><img loading="lazy" decoding="async" alt="Photo" height="750" src="http://spylogic.files.wordpress.com/2011/09/photo.png?w=200" width="500" /></a>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2011/09/hmmm-i-know-which-ssid-not-to-choose-do-you/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>I found multiple Portals in my hotel!</title>
		<link>https://www.spylogic.net/2011/09/i-found-multiple-portals-in-my-hotel/</link>
					<comments>https://www.spylogic.net/2011/09/i-found-multiple-portals-in-my-hotel/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Sun, 11 Sep 2011 08:25:24 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://spylogic.wordpress.com/2011/09/11/i-found-multiple-portals-in-my-hotel</guid>

					<description><![CDATA[See the full gallery on Posterous]]></description>
										<content:encoded><![CDATA[<div class='p_embed p_image_embed'>
<a href="http://spylogic.files.wordpress.com/2011/09/photo_1.jpg"><img loading="lazy" decoding="async" alt="Photo_1" height="373" src="http://spylogic.files.wordpress.com/2011/09/photo_1.jpg?w=300" width="500" /></a><br />
<a href="http://spylogic.files.wordpress.com/2011/09/photo_2.jpg"><img loading="lazy" decoding="async" alt="Photo_2" height="373" src="http://spylogic.files.wordpress.com/2011/09/photo_2.jpg?w=300" width="500" /></a></p>
<div class='p_see_full_gallery'><a href="http://agent0x0.posterous.com/i-found-multiple-portals-in-my-hotel">See the full gallery on Posterous</a></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2011/09/i-found-multiple-portals-in-my-hotel/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New toy arrived! Pwn Plug Elite from Pwnie Express!</title>
		<link>https://www.spylogic.net/2011/09/new-toy-arrived-pwn-plug-elite-from-pwnie-express/</link>
					<comments>https://www.spylogic.net/2011/09/new-toy-arrived-pwn-plug-elite-from-pwnie-express/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Wed, 07 Sep 2011 19:15:22 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://spylogic.wordpress.com/2011/09/07/new-toy-arrived-pwn-plug-elite-from-pwnie-express</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class='p_embed p_image_embed'>
<a href="http://spylogic.files.wordpress.com/2011/09/photo-scaled-100011.jpg"><img loading="lazy" decoding="async" alt="Photo" height="373" src="http://spylogic.files.wordpress.com/2011/09/photo-scaled-100011.jpg?w=300" width="500" /></a>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2011/09/new-toy-arrived-pwn-plug-elite-from-pwnie-express/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Don&#8217;t Drop the SOAP: Real World Web Service Testing for Web Hackers Presentation</title>
		<link>https://www.spylogic.net/2011/08/dont-drop-the-soap-real-world-web-service-testing-for-web-hackers-presentation/</link>
					<comments>https://www.spylogic.net/2011/08/dont-drop-the-soap-real-world-web-service-testing-for-web-hackers-presentation/#comments</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Wed, 31 Aug 2011 15:48:30 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Web Services]]></category>
		<category><![CDATA[blackhat]]></category>
		<category><![CDATA[defcon]]></category>
		<category><![CDATA[metasploit]]></category>
		<category><![CDATA[owasp]]></category>
		<category><![CDATA[pentest]]></category>
		<category><![CDATA[pentesting]]></category>
		<category><![CDATA[securestate]]></category>
		<category><![CDATA[soap]]></category>
		<category><![CDATA[web-services]]></category>
		<category><![CDATA[whitepaper]]></category>
		<guid isPermaLink="false">http://www.spylogic.net/?p=564</guid>

					<description><![CDATA[Sorry for the long delay on posting the slides from the presentation that myself, Josh Abraham and Kevin Johnson did at Black Hat USA and DEF CON 19.  I&#8217;ve uploaded the slides from DEF CON to SlideShare (you can also download a copy there as well) and below are the links to the tools and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Sorry for the long delay on posting the slides from the presentation that myself, Josh Abraham and Kevin Johnson did at Black Hat USA and DEF CON 19.  I&#8217;ve uploaded the slides from DEF CON to <a href="http://www.slideshare.net/agent0x0/dont-drop-the-soap-real-world-web-service-testing-for-web-hackers">SlideShare</a> (you can also download a copy there as well) and below are the links to the tools and white paper.  I&#8217;m currently in the process of working with OWASP to get the testing methodology put into the next version of the OWASP testing guide (v4).  If you have any comments or bug reports for the tools and vulnerable web services please let <a href="http://twitter.com/jabra">Josh</a> and <a href="http://twitter.com/secureideas">Kevin</a> know, they would appreciate it!</p>
<p><a href="http://www.spylogic.net/wp-content/uploads/2011/08/Dont-Drop-the-SOAP-Whitepaper.pdf">Download the white paper.</a>  <a href="http://spl0it.org/msf_web_services.tar.bz2">Download Josh&#8217;s Metasploit modules.</a>  <a href="http://dvws.secureideas.net/">Download Kevin&#8217;s vulnerable web services.</a></p>
<div id="__ss_9084302" style="width: 425px;">
<p><strong style="display: block; margin: 12px 0 4px;"><a title="Don't Drop The SOAP: Real World Web Service Testing for Web Hackers " href="http://www.slideshare.net/agent0x0/dont-drop-the-soap-real-world-web-service-testing-for-web-hackers" target="_blank">Don&#8217;t Drop the SOAP: Real World Web Service Testing for Web Hackers </a></strong> <object id="__sse9084302" width="425" height="355" classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0"><param name="allowFullScreen" value="true" /><param name="allowScriptAccess" value="always" /><param name="src" value="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=defcondontdropthesoappresentation-defcon-110831100544-phpapp02&amp;stripped_title=dont-drop-the-soap-real-world-web-service-testing-for-web-hackers&amp;userName=agent0x0" /><param name="allowscriptaccess" value="always" /><param name="allowfullscreen" value="true" /><embed id="__sse9084302" width="425" height="355" type="application/x-shockwave-flash" src="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=defcondontdropthesoappresentation-defcon-110831100544-phpapp02&amp;stripped_title=dont-drop-the-soap-real-world-web-service-testing-for-web-hackers&amp;userName=agent0x0" allowFullScreen="true" allowScriptAccess="always" allowscriptaccess="always" allowfullscreen="true" /></object></p>
<div style="padding: 5px 0 12px;">View more <a href="http://www.slideshare.net/" target="_blank">presentations</a> from <a href="http://www.slideshare.net/agent0x0" target="_blank">agent0x0</a></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2011/08/dont-drop-the-soap-real-world-web-service-testing-for-web-hackers-presentation/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>@Wh1t3Rabbit presenting at the Cleveland #OWASP meeting</title>
		<link>https://www.spylogic.net/2011/08/wh1t3rabbit-presenting-at-the-cleveland-owasp-meeting/</link>
					<comments>https://www.spylogic.net/2011/08/wh1t3rabbit-presenting-at-the-cleveland-owasp-meeting/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Thu, 18 Aug 2011 16:48:40 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://spylogic.wordpress.com/2011/08/18/wh1t3rabbit-presenting-at-the-cleveland-owasp-meeting</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class='p_embed p_image_embed'>
<a href=""><img loading="lazy" decoding="async" alt="Photo" height="669" src="http://spylogic.files.wordpress.com/2011/08/photo-scaled-10003.jpg?w=224" width="500" /></a>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2011/08/wh1t3rabbit-presenting-at-the-cleveland-owasp-meeting/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>View from the Defcon speakers party</title>
		<link>https://www.spylogic.net/2011/08/view-from-the-defcon-speakers-party/</link>
					<comments>https://www.spylogic.net/2011/08/view-from-the-defcon-speakers-party/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Sun, 07 Aug 2011 02:46:22 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://spylogic.wordpress.com/2011/08/07/view-from-the-defcon-speakers-party</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class='p_embed p_image_embed'>
<a href="http://spylogic.files.wordpress.com/2011/08/photo-scaled-10001.jpg"><img loading="lazy" decoding="async" alt="Photo" height="373" src="http://spylogic.files.wordpress.com/2011/08/photo-scaled-10001.jpg?w=300" width="500" /></a>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2011/08/view-from-the-defcon-speakers-party/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>View from the Rapid7 party&#8230;off the hook!</title>
		<link>https://www.spylogic.net/2011/08/view-from-the-rapid7-party-off-the-hook/</link>
					<comments>https://www.spylogic.net/2011/08/view-from-the-rapid7-party-off-the-hook/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Thu, 04 Aug 2011 20:07:26 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://spylogic.wordpress.com/2011/08/04/view-from-the-rapid7-party-off-the-hook</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class='p_embed p_image_embed'>
<a href="http://spylogic.files.wordpress.com/2011/08/photo-scaled-10002.jpg"><img loading="lazy" decoding="async" alt="Photo" height="373" src="http://spylogic.files.wordpress.com/2011/08/photo-scaled-10002.jpg?w=300" width="500" /></a>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2011/08/view-from-the-rapid7-party-off-the-hook/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>It&#8217;s Rogue Dead Guy Ale tonight!</title>
		<link>https://www.spylogic.net/2011/07/its-rogue-dead-guy-ale-tonight/</link>
					<comments>https://www.spylogic.net/2011/07/its-rogue-dead-guy-ale-tonight/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Sun, 17 Jul 2011 22:28:14 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<guid isPermaLink="false">http://spylogic.wordpress.com/2011/07/17/its-rogue-dead-guy-ale-tonight</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class='p_embed p_image_embed'>
<a href="http://spylogic.files.wordpress.com/2011/07/photo-scaled-10001.jpg"><img loading="lazy" decoding="async" alt="Photo" height="669" src="http://spylogic.files.wordpress.com/2011/07/photo-scaled-10001.jpg?w=224" width="500" /></a>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2011/07/its-rogue-dead-guy-ale-tonight/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Red Lobster gives out tazers now?</title>
		<link>https://www.spylogic.net/2011/07/red-lobster-gives-out-tazers-now/</link>
					<comments>https://www.spylogic.net/2011/07/red-lobster-gives-out-tazers-now/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Sat, 16 Jul 2011 21:45:39 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://spylogic.wordpress.com/2011/07/16/red-lobster-gives-out-tazers-now</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class='p_embed p_image_embed'>
<a href="http://spylogic.files.wordpress.com/2011/07/photo-scaled-10001.jpg"><img loading="lazy" decoding="async" alt="Photo" height="669" src="http://spylogic.files.wordpress.com/2011/07/photo-scaled-10001.jpg?w=224" width="500" /></a>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2011/07/red-lobster-gives-out-tazers-now/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Lego Harry Potter Hogwarts Complete</title>
		<link>https://www.spylogic.net/2011/07/lego-harry-potter-hogwarts-complete/</link>
					<comments>https://www.spylogic.net/2011/07/lego-harry-potter-hogwarts-complete/#respond</comments>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Wed, 13 Jul 2011 01:42:08 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://spylogic.wordpress.com/2011/07/13/lego-harry-potter-hogwarts-complete</guid>

					<description><![CDATA[&#8230;and played with 🙂 See the full gallery on Posterous]]></description>
										<content:encoded><![CDATA[<p>    &#8230;and played with <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p><div class='p_embed p_image_embed'>
<a href="http://spylogic.files.wordpress.com/2011/07/photo_1-scaled-1000.jpg"><img loading="lazy" decoding="async" alt="Photo_1" height="373" src="http://spylogic.files.wordpress.com/2011/07/photo_1-scaled-1000.jpg?w=300" width="500" /></a><br />
<a href="http://spylogic.files.wordpress.com/2011/07/photo_2-scaled-1000.jpg"><img loading="lazy" decoding="async" alt="Photo_2" height="373" src="http://spylogic.files.wordpress.com/2011/07/photo_2-scaled-1000.jpg?w=300" width="500" /></a></p>
<div class='p_see_full_gallery'><a href="http://agent0x0.posterous.com/lego-harry-potter-hogwarts-complete">See the full gallery on Posterous</a></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.spylogic.net/2011/07/lego-harry-potter-hogwarts-complete/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
