Episode: 315 Title: HPR0315: Interview with ChrisJohnRiley Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0315/hpr0315.mp3 Transcribed: 2025-10-07 16:07:41 --- Music Hello and welcome Hacker Public Radio listeners to another Finix, the Student Hacker's Guide to Linux. My name's Aaron Finnan, but as usual you guys can call me Finix. Well believe it or not guys, this is my first episode of Finix Student Hacker's Guide. At this year I had some time off before New Year for the birth of my daughter. So it's good to get back into the throw things and I have some good news. I recently had a conversation with a pen tester called Chris Riley and I thought I'd like you guys here at I'll see you all again soon. Well hello Hacker Public Radio listeners, it's Saturday afternoon and then having a quick chat with Chris, Chris could you introduce yourself for the HBR listeners? Yeah sure, happy to. My name's Chris, I'm a penetration tester, ethical hacker, whatever you choose as your title of choice. I work for a large European bank in Austria, but I come from England so what else is there to say? My work full-time is a penetration tester, my background is network security and network management. I'm kind of moving more into web application testing now as that seems to be the way forward. So how did you get into it Chris? It's one of the things that quite a lot of people just fall into it and it's the same with me. I mean I spent years working as a server technician and people would just do crazy, crazy stuff and I was always saying, well why are you doing this? This is a test box but why aren't we patching it? People were just saying, well it's a test box, we don't need to patch it and that just drive me crazy. It wasn't until I moved to our office in Germany that I really started to work with network intrusion detection, working with snort, doing vulnerability scanning with Nessus and working on WSUS, the Windows patching software. It didn't work with antivirus as well, working with trend and Fsecure and I really wanted to move that forward because it was only part of my job and it was the real part that interested me. It's the bit that I really wanted to go forward with and make a career of my company at the time. Won't really be able or happy for me to move more into security so I took the step of leaving my job in Germany, moving to Austria to live with my girlfriend and just kind of learning off my own back, reading as many books as I could get, doing as many courses as I could find. I actually spent six weeks in India taking some Microsoft exams. I'd been using Microsoft Windows 2000, 2003 XP for years but I never actually managed to take the exams. So I took six months to read all the books, go through it all again and then went to India, saw a lot of the nice sites, took some exams because it was nice and cheap to take exams over there and I squeezed in a couple of security related exams, the CompTIA Security Plus, which is kind of a basic security qualification and it's the best way to describe it and the EC Council certified ethical hacker, which I have mixed opinions on. I'm not sure if it was just the teacher or the books or just everything about the exam itself but halfway through the course I just realised that they had absolutely nothing at all to teach me. It was like 75% of it was just old tools that no one would use anymore, basic stuff. I've heard mixed views on the CH as well and so a lot of people have mixed views and some people think that it's the best thing since life spread, some people think that it's a little bit dated. Yeah, I must admit that the version I took version 5 and then on version 6 now version 5 was like tools from early 2000 and this was in 2007 I was taking the course I think. And it just annoyed me so much that we're using tools under Linux and you just couldn't even find them on the internet anymore. I don't know where they found some of these tools. They always went back to the same stuff. They didn't teach you things like end map or necessary or anything like that. They used odd windows, port scanning tools like angry IP which they just went over three or four times during the course. It just seemed to be very repetitive, far too much crammed into a five day course and very little of it was useful and there was also no basis for it. It was, okay, you're going to do a scan now, okay, what does this scan do? Well, I don't know, but it doesn't scan. So I mean this could just have been the teacher that we were dealing with but there were certain errors of it as well, SQL injection. I think we covered SQL injection in one hour and the teacher really didn't know anything about databases at all. He was one of those things where I was sitting at the front of the class and every time someone asked a question, I was the one answering it because the teacher had absolutely no idea at all. Pretty much the same when it came to the Linux stuff. He actually had the nerve when we came to the Linux module to say just read through it because I don't know anything about Linux and that just really annoyed me. I think in the end, I think I got a 50% refund for the course because it was so badly handled. Easy peeps. I mean, that kind of leads me on a good question. I mean, what sort of tools do you, you couldn't do without at the moment? What sort of tools do you do being a pan disaster then? I guess the top ones, I mean, the usual stuff. Everyone uses an app, a lot of people use necessary vulnerability scanning. I mean, I find MetaSplite to be a really great tool for exploitation. I mean, it's very Windows-centric. There's some Linux stuff, some Mac OSX stuff, but it's really good on the Windows side. If there's a new patch coming out, HDMor, who writes quite a lot of the modules for MetaSplite usually comes out with something pretty quickly, especially with the latest MS08067 SMBRPC problems. There's usually an exploit out before anything else. I think the only exploitation tool that I know that comes out with modules as quickly is probably immunity canvas, and that's a pay for tool. So I really like the MetaSplite framework. Really does quite a lot of work for us. On the website, I tend to use Burp Suite. I don't know if you've used it. It's a transparent proxy tool. The latest version has a limited application scanner, so it finds you typical cross-site scripting SQL injection kind of problems. It does what it does. It's a web application tool that finds the low-hanging fruit in your application, so it's not the end or an B or but transparent proxies are a must when you're doing web application testing. So the suite really does do the job particularly well. Yeah, I've never actually come across it yet. We use lots of different tools for web applications, scanning and stuff like that, but yeah, I mean, what sort of... I mean, you touched on it earlier on, what sort of operating systems do you use as your base to test other systems with? Well, I think it was Ed Skodis who said, he gets the question a lot, should I use Windows or should I use Linux? And the answer is always yes. You should always use both. I mean, unfortunately, in the company I work for, we have to use Windows as a basis because we use full disk encryption that only functions on the Windows. So we tend to use a standard Windows XP fully patched, obviously, base install, and then everything else runs on the VM. We have VMs that run Windows, we have VM runs that run Backtrack and a couple of Debian systems. It depends what really works best for you. There's always a boot CD, a boot USB or a VM image that will do the job for you as things like Samurai, which is a specific web application testing framework from the guys in Guardians. I find that's all pretty good as well. It's more focused towards web application testing, whereas Backtrack is more of a generic kind of VM or USB boot that does a lot of network and a bit of web application testing. Yeah. I mean, talking about track, did you know that they've released a new beta Backtrack 4s and beta stage now and out for release at the moment? Yeah, I've been using that in some of the classes that we're running at university lately. It's a bit raw, should we say, a few little, little nearly problems that it plays a sound whenever you log in. I'm sure you've experienced that, but there's no volume control, so it plays it at full volume, which can be a little bit embarrassing when you're setting in the middle of a room and you boot up your USB with Backtrack on it for the first time with your speakers on full volume. So, yeah, I learn quickly. I really like the new version of Backtrack, because you can do apt-get and install whatever else you need. It's a lot better than the Slackware version, where you have to download the source. I've got no problems installing stuff from source, but just being able to do an apt-get is just so much easier. Yeah, especially if you're using it in front of classes and that as well, you can't beat the power of apt-get. I'm a bit of an apt-get, junkie myself, to be honest with you. Yeah, I'm not quite sure why, but I think the latest version of Backtrack is still using an old version of M-map, as well as using 4.62 instead of the latest, which is 4.85 beta 2, I think, which is a bit of a mystery to me. I thought they'd be at least using the 4.76 version, which is the version that was released after Defcon, I think. If you had ordered some work on the standard ports that are scanned, did a lot of scanning of the internet, and found that the standard ports that were used in M-map needed to be changed. The new standard ports in 4.76 seemed to speed up scanning a lot, especially when you're doing standard port scans and standard synth scans. Obviously, another thing that you mentioned earlier on, but I just wanted to kind of have a side note, so to speak, did you catch the HPR so with Ken Fallon talking about auto-nesses? It's just you'd be talking about necessarily. I did, actually. That was one of those times where, actually, I stopped in the car pulled over and phoned one of my colleagues and said, auto-nesses, look it up now. Internally. Yeah. I haven't actually had a chance to play with it yet, but it sounds like a really, really good product. Internally, we use something very, very similar, but on a proprietary basis. From my point of view, from what I've heard of auto-nesses, the database stuff in auto-nesses seems to be a lot better than what we're using at the moment. But our proprietary stuff kind of fits in with various other things that we do internally, so. But auto-nesses is certainly a good project, it's something I'll be keeping an eye on in the future. Yeah. I mean, I heard it, and I was marched the same way I was streamed, the lab telling the boys, oh, have you heard of this product? It does this, this, this, and this, and just watch all these ethical hacking students' eyes light up. I got something easier for us to use, but not hiding vulnerabilities between those of information. You know, like, look, it's an Apache server, and, by the way, there is a critical vulnerability, but you're not going to see it at the moment. Internally, it doesn't find everything that's the problem, and it's a lot of people just think that running a nest of scan is going to bring you up a list of every single thing that's wrong in your web server, or your mail server, and that's it, you're done. And it doesn't. I mean, it's a network scan, so if your port is closed, then you're not going to know that your piece of software that runs on the client side is out of date. It's not going to do those client side checks unless you enable nest of local scans, where you give it credentials to log into the machine, and then it can check patches on Windows and Linux boxes. But no one does it. I mean, very few people I know, even know that that kind of feature exists. They just think you run the scan across the network. It tells you everything that's wrong with it. You fix it, and you're finished. I mean, I'm sure you agree that certainly in pan testing, it's a long process. You don't just run a couple of quick tools and say, yeah, you secure checks and checks and more checks. It sounds sexy almost, pan testing, but there's plenty of times looking at screens and repeating data that I'm making sure that you can actually guarantee that the results that you've got are accurate. Exactly. You don't want to be writing in a false negative or a false positive into your penetration test. I mean, this isn't a vulnerability scan. If you want to do a vulnerability scan, you do your end map, you take your port, you do a nest of scan, you print it out, you write it on your company, you let it head, and you give it to the client, that's a vulnerability scan at the basics. A penetration test is not a nest of scan. That's where you start from, maybe, to give you some idea where to move forward. I've seen a lot of companies that are selling nest of scans and end map scans as penetration testing. It just annoys me, especially when we, as a company, we do testing for clients. We go up against a client who says, we need this and this and this and this scan. We say, okay, that'll take 15 days to scan, to check, to test, to do a complete penetration test of this environment. It'll take 15 days. They then come back to us two days later and say, well, this other third company XYZ says they can do it in three days. Yeah, and then they'll be wondering why they got up to the end of it. The thing is that they may never even know that they haven't got their money's worth, because education for clients is very limited. I saw a blog post on it recently. I think it was the Snow Dogs blog, I think it was. They were complaining about lack of standardization in penetration testing quotes. I agree with it. People just quote what they think. I've never had any formal training on how long it takes to do a penetration test. It's one of those things where you just put your finger in the air and were probably ten days. It's a very specific thing. Quite a lot of the time the customer doesn't give you enough information. The customer doesn't know what you're going to come back with. If you come back and say, it'll take three days, they just think it's going to take three days. They don't get their money's worth. Yeah, I think we're both agreeing with pan-tests. They take as long as they take, there's really no kind of, it depends on what you discover, isn't it? Because what you discover opens the doors that you go down and it really does. It really does. If you run a scan and you find nothing, then you have nothing. Having nothing in a penetration test doesn't mean you failed. It just means you've got nothing. It's one of the things quite a lot of penetration tests don't understand is that if you can't write that you got root access on a Linux server, that doesn't mean you failed as a penetration tester. It just means that the server was adequately secured at this current moment in time. You can't get root access on the server. I find that in order to tie down with timescales better is to set goals for the penetration test. If you just say I want to do a web app test, there's so many possibilities you've got cross-site scripting, but if you specifically say, attack our web application and see if you can gain access to our backend database, that's a goal, and you can specifically target your attacks on this website to try and gain access to the backend database. You can specifically say this area and this goal will take us three days. If we can't gain access in three days, then that's a risk that the company will have to accept is that the average attacker, it should take more than three days to get access to the database. It's one of those things where if I spend five weeks attacking an application, if I find nothing, then if an attacker comes along and invests six weeks, then maybe they're going to find something. The more time you invest, the more you're going to find. There's no guarantees, I mean, at the end of the day, the reality of what it is is a scientific process and going through step by step and step, it's not a dark art, it's a logical step to see what can and can't be done, and I think having set goals is incredibly important part of actually achieving something, because you could take your lifetime to test absolutely everything. By the time you get to the end of it, you don't know, it could still be insecure at the other end due to new vulnerabilities, and I think you're absolutely right, set goals is probably an incredibly important thing. Let's clients at the moment don't seem to understand that this is a test at a set point in time. It could be that two weeks after the test, there's a new vulnerability and your systems are vulnerable. Quite a lot of the time the client doesn't understand, they say, well, we had a test six months ago. It's like, well, okay, so you're only vulnerable to everything that's come out in the last six months. A lot of stuff happens in six months, a lot of stuff happens in six hours in this industry, so you can never say that your website or your application is going to be 100% secure, even if you've had a penetration test. It's just going to be a little bit better. I can't remember who said it, but I think it was in some American, Sonic talk or something where they basically said, if a week's a long time in politics and six years and eon and technology, and even two minutes is a long time in our industry, and we're working in an industry that uses terms like zero days, it's kind of one of these things that you have to keep your eyes open to everything that's happening around you at the time, but the reality of it as well, the people that we're, the people that we're almost fighting against are doing the same thing as we are. They're looking for vulnerabilities every day, they're looking for new technologies. In some ways, it's a race to see who can get to the problem first. It was always going to go that way, I mean, it is a business now. We work as penetration testers, we get paid to find vulnerabilities, fix them and protect our systems. The bad guys are getting paid to find vulnerabilities, exploit systems, you send Trojans, send spam mail, they're going to earn money from this kind of stuff, and if they're earning money from it, then they're going to invest time and they're going to invest resources. The amount of zero days that have been released this year alone is just crazy, you've got the Excel, you've got the PDF, exploit currently in the wild that's not been patched yet. You've got a flash zero day, I think, that's just been patched by better, and that's all within the last couple of weeks. Zero days are very hard to protect against, I mean, there's no way you can protect against a zero day, you can put protections in place that are going to scan communications and look for suspicious activities, suspicious shell scripts, but you're never going to be able to save yourself 100% from zero days, it's the whole point, no one knows what they are, but that's how big companies are looking now is to put kind of intrusion detection systems in place that do anomaly detection and say, well, we've never seen a PDF that comes through with this kind of JavaScript inserted into it. This could be an attack, let's quarantine it and have a look at it, but the problem is they don't have anyone looking, anyone educated enough inside the company to look at these PDF exploits for a good example and say, this is a zero day, we've never seen this before. There's very few people who can pick apart a PDF file and say, there's JavaScript in here that runs shell code, I mean, I couldn't do it, I mean, I know a little bit about how PDF fits together, thanks to Didier Stevens and I've read a couple of blogs that entries that he's written on PDF exploits, and I mean, he knows his stuff, but for every one person who knows their stuff like he does, there's 100,000 people who work in IT, who have absolutely no idea how a PDF fits together. Yeah, I mean, I think in the reality for companies, security is always low on the budget, I think that it's the reality that I think companies that have experienced technological-related security breaches probably respect the amount of time and finance that actually needs to go into making a system secure. I think if you have lots of companies that probably security is the last thing that they think about, and they just look at the wage for that security test, they're being a drain on resources, and it's not until something bad happens that they turned around and go, maybe it was worth having that guy on, that did look at security incidents as follows. There's two bits to that, I mean, the first part is that if these companies aren't investing in security at the moment, there's every chance they're never even going to notice that they've got hacked. I mean, you're gone other days of, you know, ScriptKiddy's a log onto your website, deface it, and move on to the next website. You're going to notice that the guys who are hacking your website for money aren't just going to log onto your website and deface it, they're going to steal information, they're going to insert JavaScript into your database so it's served up to your clients, and unless you notice that that JavaScript is running on your client machines, or even worse, one of your clients tells you, you may never even notice, or it could be months before you notice, and that's embarrassing situation, especially when your client calls you up and says, are you aware that you're serving malicious code? That's something anyone wants. And the worst part is forensically going back to look at that, because you've probably never logged, because you're not thinking in security that way, you've probably never logged any access or checked any of the log files, and actually tracing it back to the date that this happened, or, you know, what way they got in it, because they've not taken security seriously, it's hard to actually find out where the penetration happened. Yeah, exactly. I mean, plus, not only are you probably not logging it, but you probably don't have anyone who's experiencing incident handling, so the first thing these guys are going to do when they find they've got a problem is wipe it and restore, and that's it, you've just wiped out all your information, so even if you did want to do a forensic analysis on it, you don't have anyone who can do it, you don't have anyone who can make sure that the image that you get is correctly formed, that you get volatile data from memory before you pull the power cord. Most of the time, these kind of things go uninvestigated, because the people who do the first response don't know exactly what they're doing. How important do you think that the forensic kind of aspect of looking at hacks is for a pentaster? I mean, it's something I'm really interested personally, I mean, I have the problem where I can't do forensic analysis in Austria, because of language issues, kind of the first question I'm always going to ask you, do you speak fluent German? The answer's going to be no, and then they're going to throw out the case thinking I've missed something, but it's still something that interests me from a technical point of you. And there's kind of two aspects to forensic analysis. The question is, are you doing it to get a conviction? Do you want to find out who infected your machines? Do you want to find out who hacked your systems? Have them arrested and put in prison, in which case, you've got to spend a lot of money, you've got to have the policies in place, you've got to be able to catalog things as evidence in a legal way. Or are you just interested in finding where they got into the system, in which case, it's just the case of looking at the logs, figuring out the entry point, looking at the event logs on the machine and seeing what happened, who was accessing what through the firewall at what time. I think the reality of, you know, if you're having an organization, if you're having an organization that's going to prosecute someone through the use of forensic technology, it would certainly indicate that they've actually thought about the issue before it happens. And I think this is probably a theme that's going to roll through our conversation. The companies that think about security before a security incident are so much more prepared when the incident happens than a company that just wakes up one day and finds out that it's intellectual property has been stolen. Oh, definitely, but in this day and age, people are not going to be investing money. If there's a financial crisis going on, they're not going to suddenly sink 100,000 pounds or 100,000 euros into what could possibly happen in six months' time. They're just not interested in it. They're trying to keep their bottom line as low as possible. And if they start investing in things that could be, then they're going to have more financial issues. So that's something that worries me in the future is, is budgets for security going down, not only that, but the budget for new security innovations, new ideas is new, you know, incident handling or forensic initiatives inside companies. The money's just not there at the moment. And if they can't get the money to set up a new forensics lab or a incident handling policy, then these companies are going to be lost when it comes to new infections, new Trojans or new attacks on their systems. Good security for a company for stop is a good base and a good base means that you have a good means that you can go and get your business and you're not worrying about it. I mean, but it just amazes me, I mean, it just amazes me the companies that don't think about security and the knock on effects. I mean, in reality, I suppose I'm kind of referring to the TK MAX incident with unsecured wireless networks and $40 million worth of credit card details being stolen. And it's... Well, that's a great example, especially when you consider that they then had an employee who said internally to their manager, we're still... This is after the breach, so we're still using blank or weak passwords as administrator passwords. And they were just told that the company weren't interested. So when they went public, when this employee went public with the information, TK MAX fired them. Whether or not he was right going public is completely incidental, but even after this breach, TK MAX still didn't get that they had to be secure. Yeah, I scary well. Especially when you think about, they're not going to be the only company that are employing such poor security. And there, I say, without stoking the fires here for the flames, how many other companies are showing complete disregard for the people's data? It scares me when you think about the amount of data that's flying over the internet, or the Wi-Fi is that people's personal private data that you've trusted to a company and they just really don't care. It's scary to think, but I mean, for every one company that says we've been breached and we've lost data, how many companies are there that just think it's going to be so for us not to say anything, and if we get found out, then we'll pay the fine. I mean, that's even if they have to report. I mean, I don't know, is the UK got a breach law now? I haven't been keeping up. I don't think so. I mean, if you get your information stolen by a hacker in the UK, then you're probably never even going to know it, not until your information is used to set up a false identity. Luckily, we don't, in the UK, we don't use social security numbers, but in the US, there still isn't data breach law set up all over the country. As far as I'm aware, it's a region by region thing, so it's very susceptible to companies just turning around and saying, well, if we don't report it, then maybe we'll get fined. If we do report it, then we're going to lose $5 million or $10 million or $100 million, so we're better off just not saying a thing. Yeah, I mean, I did a lot of root kit research, and what you're talking about is a prime example in that, that you don't get many out in the wild root kits, because companies just don't admit to being kitted. When they finally do discover it, we've been root kit and do you want to continue your banking with us, I really hope that it's by this disclosure that we can get problems fixed. If you've got a security breach, my personal feeling is that you have a duty of care to pass that information on, but you can also understand that if you're a system admin who is a wife, two kids at home, and you perspective of doing the right thing and maybe getting fired or keeping your mouth shut, you can understand why people don't come clean and don't tell about what's going on. Equally, you'd expect a company that's had a breach to invest the money in securing themselves, so they're going to be more secure than their competitors who haven't yet been breached. Unfortunately, TK Max is the exception to the rule I hope. If they're not, then people just don't get in the clue. Well, you know, it's the phone, you know, phone me once, shame on you, phone me twice, shame on me. And I really think if TK Max got hacked again in the same sort of scale, I don't think they would do a cover from just basically being caught out twice with your parents now. No, I'm just glad I never used my credit card in TJ Maxx. I mean, what do you see as like the biggest security threat in the future? It's hard to say. I mean, it comes back down to budget. I mean, the biggest security threat I can see at the moment is budget cuts restricting new security innovations. I mean, I've heard of a lot of small companies who have been thinking more about their security, but suddenly during the financial crisis, they're just not interested in investing the money anymore. A lot of companies that are selling security products, security appliances are seeing a downturn in sales because companies are just not moving forward with security. The problem with some of these companies don't understand that you don't need to spend a lot of money in order to be secure. I mean, you can buy a top-of-the-line intrusion detection, intrusion prevention system for IBM and be secure, or you can load up a Linux box with snort and be secure. The problem is it's going to be extra work. If you're doing it with a snort box, you're going to have to upload the rules, you're going to have to know what you're doing, you're going to have to tune it yourself, whereas IBM is going to sell you a box that does it all. I suppose if you're thinking about a box like snort, I suppose the reality is, you're probably going to have someone on staff that gave you the idea in the first place, and probably if they're looking at snort, they've got a certain level of technical expertise. I'm a big one for the technical expertise that you have within a company actually nurturing that and pushing that forward. If you've got a guy coming up to you saying, why are we spending so much on this when we could be doing it this way? My view is that the company should nurture that person that's bringing this idea forward, but does it happen? No, that's the reality of that. Well, it sometimes does, but the thing you have to also consider is during the financial crisis, these staff might not stay at the company. If you're going to lay off staff and you've got a hundred staff, if you just happen to lay off the only one who knew about that product, then you could end up with an intrusion detection system that no one's updating and no one understands. There's no point in having an IDS if no one looks at the locks, because there we go. We've proved a point. Don't fire the security guy in the session. Keep us on. When you go into a company to do a security test, what's kind of like the thing that you see the most, the one that you go, oh my god, not this vulnerability again, I wish people would learn. What thing do you keep on seeing that really bites you? It's sad. It depends what kind of test you're doing. From the network side, I can't believe they're still seeing land man hashes. There's just, for the last X years, land man has been crackable. You've got rainbow tables that'll crack it in less than a couple of minutes. If you're still using land man hashes and we can get any kind of hash from the system, then we're going to get the password. If you're not using land man, then we can still do pass the hash attacks, but that's limited in certain aspects. You can't do pass the hash attacks against things like RDP, but if we can actually get your physical clear text password, we've got the keys to the kingdom. You can then use that on other systems. On the web app side, it's scary to think that the O wasp top 10 that was released on the latest one was 2007. It's not that much different now than it was in 2007 and it wasn't that much different than it was in 2004. I'm sure there's new stuff like cross site request forgeries popped up. It's always been there, but people are now starting to see it, but you've still got cross site scripting in so many web applications and it was there in 2007 and it's still there in 2009 and people aren't fixing it. People are looking at the O wasp top 10 and seeing it as a checklist to test, but the developers aren't looking at it as a checklist to make sure that they're not vulnerable to these things. The developers who don't seem to be taking this on board and improving the products. As penetration testers, I guess we kind of fall down because we go in, we hack the systems, we write a nice report that communicates exactly what's wrong and then we walk away into the sunset and that's our job done. Unless we're brought on board to mitigate the vulnerabilities, we then leave the company to look through the report and do what they need to do to make things better. Quite a lot of the time that involves changing their secure development life cycle to incorporate this kind of testing into the life cycle of a new product and people just don't get it. Quite a lot of development teams just don't seem to understand and the ones that do sometimes take offense when you tell them that their systems are vulnerable. It's very hard to walk into a meeting room with five developers and tell them that there's a cross site scripting failure in the site. The immediate response is okay and you're not validating your inputs or why should we? It gets very adversarial at certain points. It's a simple thing to fix. It should be very, very simple to do. Why is it so hard for us to take the OOS top 10 and just fix it and just make sure that the implications aren't vulnerable to these things? And what we're telling you isn't personal. A lot of network administrators take things really personal. When you give them a list of passwords and go, look, these are the passwords that we could get through rainbow tables and they're passwords there. That's it. They're never going to talk to you again. I've done tests before for clients where you've walked in and you said, I can't just so you know, 10% of the passwords on your network are one, two, three, four, five. It's just scary when the manager will look at you and go, I can't believe that. But you just know you're going to come back next year and the password's going to be one, two, three, four, five, six, because that's more secure than one, two, three, four, five. They just get it. One of the fantastic companies that I've spoken to, they don't actually run brute forcing against passwords anymore. They just have a guy that sits in front of them and goes, I wonder if it's this. And within two or three hours, he's got an account. And you know, they don't really need to run through brute forcing or rainbow tables. You can just literally guess people's passwords. And it still happens. I mean, it's been one of my runs in race or age as decent password security. And I recently did talk some on rainbow tables and landmine hashes and so on and so forth. And it is one of my pet hates too. I mean, what was kind of like the most memorable security incident you've kind of been drawn to in your career? It's been varied, really. I think the biggest point in my career so far was finding a vulnerability in Tipa 3, which is a contact management system, which is PHP based. I'd attended a couple of presentations at a local security conference where they were touting how incredibly secure Tipa 3 was. And I was doing a penetration test where we had set goals to try and do cross site scripting or attack users. And Tipa 3 was pretty good. And I didn't really want to leave it as it was kind of, you know, we always tested. It seems pretty secure. So I kind of started looking at the code and came across a section where they use an encryption key to prevent you from changing certain details of the URL, basically puts an MD5 value of the URL at the end so you can't change any of the values. So I had a quick look at how they use the encryption key to create the MD5 value. It turns out that it's a 96-bit long encryption key, seems pretty unbrewed forcible. But if you look closely at the code, you can see that it creates an MD5 of the millisecond value of when the server was installed, which could only be 1000 possibilities. It then does an MD5 of that MD5 and sticks it together and then repeats the process so you get a 96-bit long key. So even though it looks very impressive, there's still only 1000 possibilities. So this was kind of shocking to me. The first time I could actually write into a penetration testing report that there's a vulnerability in this and that present, there's no patch for it because I've only just found it. And it was an interesting moment to wait three months for the tip of three guys to patch it and release, which they did at the end of January this year. And that was kind of a defining moment for me. The first time I've actually found something. It takes me back to the days before, you know, I'm showing my age here, but the days before the internet told you how to do everything. You know, nowadays, if you want to do something, you just search on the web and there's an instruction sheet that tells you how to do it. When I started, I was using DOS 6, 2, DOS 5, Windows 3, 11, Windows 3, 1. There was almost no internet, you know, there was a couple of sites, but you couldn't log on to the internet and find a description of, you know, how I and I files are configured. You just had to go in there and break it and see how it works and that kind of took me back to that day and age where you're flying without an instruction sheet. There's no one that tells you if you get stuck, what the next step is. If you don't find what the next step is, then that's it. There's no next step. And that, for me, was really exciting. Am I right in thinking that you've talked a bit about this on your blog as well? Yeah, I did a release kind of a tool that automates it, but mostly for testing purposes. I mean, I wanted to write a tool in Python, I haven't written anything in Python. I thought, well, if I'm going to write my first tool in Python, I don't want it to be a Hello World program. No offense to Hello World programs, but I wanted it to be something a bit more impressive so my first Python program calculates MD5 hashes and grabs the URL from the input and splits it up. I'm quite happy with it. I mean, it's not clean. It's not beautiful, but it's my first Python program. I did a short video as well on Vimeo and that's on my blog as well. So it kind of runs you through on the demo site how you can exploit this encryption key. It's not one of those major flaws where you think encryption key great. I can get access to all the background data and attack the server, but it was enough for me to think it's a vulnerability. What's the what's the web address for your blog? It's www.c22.cc I mean, is there any what sort of plans do you have in the future you're going to keep on doing what you're doing at the moment or are you looking to get further training and move forward? Anything you're fancy doing in the community sort of stuff, I mean, what are your future plans? Well, it's been a big year for me. I've only been working as a penetration tester full time since last March, so it's a year now for me. Last year, I've got a full time job as a penetration tester, I've learnt so much. I've written three articles now for a couple of magazines, hacking nine magazine and one for Linux magazine. I finally got over my fear of doing presentations by doing a presentation at a local security conference, nothing highly technical, but enough for me to be able to say that I can stand up in front of 50 people and talk about something without fainting. So that's, I've done a lot in the last year and I'm moving forward now by doing some small university classes on exploitation, MetaSploitM maps and some simple stuff, moving more into kind of advanced MetaSploit with MSF payload and things like that. In the next year, my main project really is to do more training. I really, I think that I learn more by doing training than I do by actually running a training class than by reading a book. I mean, I've learnt more about MetaSploit in the planning for my MetaSploit class than I had in the last three years of using MetaSploit. It's one of those things where it really does hold true, if you can't, if you teach it, you learn it. Yeah, I mean, I can't, you know, I can't have a number of praise for what you're saying there. I mean, I've learnt so much more by doing, you know, talks and presentations on subjects and didn't HPR episodes as well because, you know, if you've got to go and it's almost because you have a legitimate reason to invest huge amounts of your own personal time into learning something inside out. Well, that's what it's all about in this industry. If you think that you can, if you're just in standard IT, if you're doing service support or desktop support, you could spend three or four hours a day learning something new every day. If you're doing security, you have to live it. It sounds cliched, but I've taken a week off once where I haven't read anything. I haven't read any blogs. I haven't read any news. I just haven't kept up today with anything. You come back and you've got 200 blog entries to read and you're just, you're so far behind that you have to spend the whole weekend reading up on things that you didn't read before. It really is a full time job and then another full time job just to keep up today with these things. I recently had some time off with my birth and my second daughter and I came back to looking at emails and blogs and it took me the best part of three days to get through university emails and learning to say to emails and personal emails and the 600 blog entries that you know how to go and read and it's sometimes just get about taking the time off. It really has to be a passion. My idea of a holiday is flying to the Netherlands to go to a hacking conference. It's, I find it fun and if you don't find it fun then this isn't a 9 to 5 job. If you want a 9 to 5 job security is probably not the direction you want to be going in. So what's your top tips for people wanting to get into ethical hacking then? I'm curious about what we were talking about earlier is you really have to understand the underlying stuff. If you run an M-map scan you really need to know what it's doing. You don't just need to know what the sand taxes so you can run a ping scan of your local subnet. You need to know that if you're running a ping scan of a local subnet that it won't actually send a ping packet it'll use R because it's on a local subnet and it's quicker. So if you don't know how to do an attack without a tool then you shouldn't be using the tool. I mean the tool is great for automating things, thousands of tools in MetaSploit thousands of tools online where you can download and quickly launch attacks, do checks and run tests on systems. But if you don't know why it works and how it works and the underlying features of the M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M