Digital Forensics in the Cloud: 5 Hot Skills

Forensics in the Cloud: 5 Hot SkillsWhen it comes to collecting forensic evidence from cloud providers and determining whether a data breach has occurred, what used to take two weeks now takes a month for Greg Thompson, vice president of enterprise security services at Scotia Bank.

“Often we find it is a challenge to get sufficient forensic data from the cloud to prove the event or action did occur,” says Thompson, who oversees the forensics team at Scotia bank, the third largest bank in Canada.

Specifically, he finds the move to cloud services more challenging for forensic practitioners than the traditional methods of acquisition of evidence in pursuing an investigation. In addition to not having access to a full suite of forensic data, including net flows, log files and hard drive images in a cloud environment, now there also is a strong dependency on a third party whose system settings and administration may differ. “This often stretches the time-frame needed to make conclusions on a case, as we have to deal with legal implications and inconsistencies in how data is overall collected and maintained.”

(more…)

A Career in Digital Forensics: 5 Key Steps

A Career in Forensics: 5 Key StepsJoseph Naghdi, an experienced computer technologist, transitioned to digital forensics in early 2000 because he was intrigued by how data is stored and discovered on computers. Today, he’s a forensics analyst at Computer Forensics Lab, aU.K.consultancy specializing in computer forensic services and advanced data recovery. Thehigh pointof his work, he says, is when he solves tough cases, such as a recent phishing attack against a UK bank that almost led to the transfer of 3 million pounds.

With the rise in cyber-fraud and various breach incidents, digital forensics is becoming a growing field with plenty of opportunities. The job involves determining the cause, scope and impact of security incidents; stopping unwanted activity; limiting damage; preserving evidence and preventing other incidents. Digital forensics experts typically investigate networks, systems and data storage devices.

The average salary for digital forensic professionals is about $81,000 in theU.S., according to the salary research and data website PayScale, but specialization in mobile architecture, devices and cloud computingcould lead to higher salaries.

Information security professionals interested in making a transition to a career in digital forensics, as Naghdi did, need to take five key steps, experts say.

(more…)

Cyber Security Challenge UK announces first finalists

 

Cyber Security Candidates

Cyber Security Candidates

Sophos HQ in Abingdon on Saturday 14th January was the scene for the first face-to-face encounter in this year’s Cyber Security Challenge UK. Thirty talented candidates from across the UK battled in a malware hunt which exposed them to some of the criminal world’s nastiest pieces of malicious code, housed within the Sophos vaults.

(more…)

I don’t know where it’s from or who’s behind it…

I don’t know where it’s from or who’s behind it…CanYouCrackIt.co.uk?

 

 

Following our earlier article on ForHacSec.com about the online game CanYouCrackIt.co.uk a video has been uplaoded to YouTube about the challenge.

“This code – I don’t know where it’s from or who’s behind it – I don’t know much to be honest

I only know two things: I have to crack it and I have to crack it soon.”

So can you crack it? Have you cracked it?

 

===

Open Tabs – Intro

I have been having less and less time lately to post things on ForHacSec.com which led me to write the recent post ‘Not enough hours in the day’ and has been causing me to feel a little guilty. So I have decided to borrow an idea from Martin McKeay of at McKeay.net.

As I’m on the move I do try and follow Twitter and other blogs as I’m travelling to and from something on my to do list and always want to share it. Or if I get really interested I decide to ‘re-tweet’ it to 1. share it with followers but deep down it’s to save me having to remember it and means I can go back to my own Twitter feed and find it.

So, I thought I would post my ‘open-tabs’. The items, articles, stories and general stuff I have open in all my browsers on my various devices. Things I have found interesting and things I like to make a note of to perhaps come back to later and also the things I would like to give my thoughts on but simply don’t have time but would like to still provoke discussion about.

So….here comes Open-Tabs number one! –

UK banking goes tits-up this week…coincidence?

There has been an unusual amount of banking downtime this week in the UK. Firstly with HSBC ATM and point of sale terminals being affected. preventing their customers with-drawing cash from ATM’s and making debit card transactions at the till and online. Followed swiftly by Natwest and Royal Bank of Scotland (RBS) following apparent ‘planned maintenance’.

As with any kind of mass downtime with organisations of this size it leads to a number conspiracy theories as appose to it simply be accepted as ‘coincidence’.

Although I will admit it does have me wondering at times.

For example it has been well reported in the news of late that both theUK and US have ‘apparently’ traced cyber-attacks back to the middle east -China. Whilst over recent months HSBC introduced a new ‘one time password’ access control system for it’s customers to access there online accounts and make fund transfers more surely using there new ‘Secure Key Technology’.

(more…)

Pen-Test Game

The ForHacSec.com team have recently come across the Can You Crack It? game for those interested in the security arena particularly around Hacking, Pen-Testing and Coding.

So we thought we’d share it with you and see what results you get. It’s an interesting game and is designed to test the skills of a would be ‘hacker/cracker’.

We have played the game ourselves with mixed results amongst the team with one person doing a lot of washing up! It does prove very addictive and you do need to be focused to crack it. If anything else it also helps pass the time when you have a few moments spare.

www.canyoucrackit.co.uk

We’re starting to see more and more online security challenges appearing both within online live environments such as this one as well as the likes of HackThisSite.org in addition to downloadable virtual machines of De-ICE which are built to practice pen-testing within a safe environment creating goals to achieve before moving on to the next target.

This can only to be a positive development for the security community enabling more talent to come through and be able to develop their skills and set a benchmark.

Get your friends involved for some friendly competition. Like us, you may even be able to avoid doing the washing up for a week!

Let us know your thoughts on the game and any other challenges you would like to share via the comments thread below. But please don’t give any tips or tricks away. That’s all part of the fun.

You can play the game for yourself by going to –

www.canyoucrackit.co.uk

Good luck!

Sponsored Post

Viral video by ebuzzing

Multi-Function Devices – Will they comply…?

Okay, so you did a Penetration Test and all you found was an insecure printer right? The fun things that you can find on Multi-function Printing devices and how it might affect compliance…

Printers, scanners, copiers, and fax machines have become more and more complex over the years.

I find that this is largely due to a Dilbert comic strip character named “The Feature Creep” who would annoyingly want to cram more and more features into a new product line.  

These devices are doing more than what they were intended to do while opening additional security risks. Not only do these Multi-Function printers (MFP) scan, copy, fax and print, but now they can send email, host web-based administrative pages and send you an email to say when the toner, paper and fuser units need replacing.

We are not talking about the all-in-one printer, scanner and copiers the home user can pick up from the local high street for £30-£80 but the much bigger floor standing devices often the footprint size of a standard vending machine.

These devices are designed to print, scan, copy, fax and email on a commercial scale in professional office environments which requirement large printing, copying and scanning facilities.

Each of these multi function devices occupy a standard hard disk drive the same as that found in the likes of your PC or laptop. Once an item (birth certificate, insurance documents, proof of identity etc) are scanned, copied, faxed or emailed by the multi-function device these are then stored on the hard drive.

There may no concern for this providing the device storing these items is stored itself in a secure physical location. However what happens when the device develops a fault and is sent a way for repair, is replaced by a temporary loan multi function device or the hire period has expired and is returned to the manufacture for recycling or disposal?

(more…)

Book Review – BackTrack 5 Wireless Penetration Testing Beginner’s Guide

If you want an easy to follow, step by step guide to analyzing and testing Wi-Fi security, look no further than Vivek Ramachandran’s “BackTrack 5 Wireless Penetration Testing Beginner’s Guide“.

The author guides you on a path from the basic principles of Wi-Fi to advanced monitoring and attacks.
Vivek starts you out by preparing your wireless lab, installing Backtrack 5, configuring your wireless cards and access point.

Then after a brief overview of wireless frames, you get to work right away by sniffing traffic with Wireshark so you can see what these frames actually look like.

The author then takes you on a step by step journey of the most common attacks used against WLANs.
This includes everything from bypassing authentication & cracking encryption (WEP and WPA/WPA2) providing the environmental variable are correct, to advanced techniques like man-in-the-middle attacks and attacking WPA-Enterprise.

(more…)

Security Assessments You’ve Never Had – But Should…

You are probably familiar with the classic security assessments:  internal and external penetration testing, security risk assessments, and PCI gap assessments. 

You may not be as familiar with, or even aware of, other assessments that may be just as valuable for strengthening your security program. 

Some of these less familiar assessments are new, the result of emerging technology and regulations, but others have been around for several years and just haven’t gotten the attention they deserve. 

Consider performing these six assessments at least once in your organisation to combat the constantly looming hacker threat.

  • Social Media Assessment

The use of social media sites is rampant.  Would you like to know what is being said on them about your organisation?  Assessing your databases and social networks (Facebook, Twitter, LinkedIn, blogs, etc.) detects what is being disseminated on the Internet about your organisation – including all of the information that your organisation, employees, ex-employees, and the public are putting out there. About how you are perceived.

In addition, assessing any confidentiality agreements and social media policies you have in place will detect holes in your social media protocol. This will allow you to integrate effective social media policies into your organisation’s overall IT program. You might be surprised at the large number of existing social media channels through which information is disseminated. 

A thorough Social Media Assessment looks at roughly 30-40 of them, including both the well-known sites and some obscure ones such as Hi5, Tagged, Friendster, Bebo, Orkut, Yammer, and Yelp.  In addition, a good Social Media Assessment looks at message boards, online forums, and blogs/micro-blogs like Google Blogger and Tumblr to provide a more complete picture of your organisation’s social media posture.

(more…)