A News and Tech News podcast featuring and
Good podcast? Give it some love!

Best Episodes of TechSNAP

Mark All
Search Episodes...
Wes takes a quick look at a container escape proof-of-concept and reviews Docker security best practices.Links:Understanding Docker container escapes | Trail of Bits Blog — Linux cgroups are one of the mechanisms by which Docker isolates containers. The PoC abuses the functionality of the notify_on_release.Felix Wilhelm on Twitter — Quick and dirty way to get out of a privileged k8s pod or docker container by using cgroups release_agent feature.
The next episode of TechSNAP is still in the works, so Wes takes a quick look at an interesting application of public-key cryptography in Apple's Find My feature.Links:Apple's 'Find My' Feature Uses Some Very Clever Cryptography — In upcoming versions of iOS and macOS, the new Find My feature will broadcast Bluetooth signals from Apple devices even when they're offline, allowing nearby Apple devices to relay their location to the cloud. That should help you locate your stolen laptop even when it's sleeping in a thief's bag. And it turns out that Apple's elaborate encryption scheme is also designed not only to prevent interlopers from identifying or tracking an iDevice from its Bluetooth signal, but also to keep Apple itself from learning device locations, even as it allows you to pinpoint yours.
We go inside the epic takedown of SpamHaus, then we break down why CloudFlare’s Flexible SSL is the opposite of security. Followed by a great batch of questions, our answers & much much more!
More and more data breaches are leading to blackmail but the stats don’t tell the whole story. We’ll explain. Plus the latest in the Sony hack, and the wider reaction. Plus a great batch of emails & much, much more!
Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers. It’s a busy TechSNAP week.Sponsored By:Ting: Save $25 off a device, or get $25 in service credits! Promo Code: Visit techsnap.ting.comiXSystems: Get a system purpose built for you. Promo Code: Tell them we sent you!Digital Ocean: Apply our promo snapocean after you create your account, and get a $10 credit. Promo Code: snapoceanLinks:HP Inkjet Printers Buffer Overflows in Processing Files Let Remote Users Execute Arbitrary CodeBlack Hat 2018: Update Mechanisms Allow Remote Attacks on UEFI Firmware | The first stop for security newsHow I gained commit access to Homebrew in 30 minutesReconnaissance tool for GitHub organizationsTruffleHog: Searches through git repositories for high entropy strings and secrets, digging deep into commit historyBFG Repo-Cleaner by rtyleyTCP implementations vulnerable to Denial of ServiceSegmentSmack: kernel: tcp segments with random offsets may cause a remote denial of service [CVE-2018-5390]Merge branch 'tcp-robust-ooo' · torvalds/linuxNew Sysadmin dealing with stress.Microsoft’s undersea data center now has a webcam with fish swimming past 27.6 petabytes of data
We've got another round of WannaCry analysis, the latest on the FCCs battle over Net neutrality. Then IPv6 Tunnels & you, a 2017 check-in. Plus some fantastic feedback, a robust roundup & so much more!
It’s a trifecta of Unix vulnerabilities, our concerns with LessPass & a very valuable vulnerability. Plus your questions, our answers, a spicy round up & much, much more!
This week, Chris & allan are both out of town at different shenanigans, but they recorded a sneaky episode for you in which they recap the Target breach, from when the news broke to the lessons learned and everything in between!
D-Link publishes its private code signing keys, exploiting Windows Symbolic Links & why encryption is not sufficient protection. Plus some great questions, our answers, a rockin roundup & much, much more!
Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle. Sponsored By:Ting: Save $25 off a device, or get $25 in service credits! Promo Code: Visit techsnap.ting.comDigital Ocean: Apply our promo snapocean after you create your account, and get a $10 credit. Promo Code: snapoceaniXSystems: Get a system purpose built for you. Promo Code: Tell them we sent you!Links:Sysadmin unplugged wrong server, ran away, hoped nobody noticed • The Register — ‘I was a snot-nosed kid fresh out of college and thought I knew everything!’Spoofing Cell Networks with a USB to VGA Adapter | Hackaday — Available through the usual overseas suppliers for as little has $5 USD, these devices can be used unmodified to transmit low-power FM, DAB, DVB-T, GSM, UMTS and GPS signals.ShofEL2, a Tegra X1 and Nintendo Switch exploit — The Tegra X1 (also known as Tegra210) SoC inside the Nintendo Switch contains an exploitable bug that allow taking control over early execution, bypassing all signature checks.Atlanta spends more than $2 million to recover from ransomware attack — . It appears that firms Secureworks and Ernst & Young were paid $650,000 and $600,000, respectively, for emergency services while Edelman was paid $50,000 for crisis communication services. Overall, the funds seemingly applied to the ransomware attack response add up to approximately $2.7 million.Google Chrome 66 Released Today Focuses on Security — The biggest change is that Google Chrome will start showing SSL certificate errors for all Symantec certs issued before June 1, 2016. This is "stage two" of Google's long-term plan on distrusting Symantec certificates altogether.Where to get started with monitoring?defunkt uses a fool tools for his networkBrian shares some love for ZabbixVMware Patches Pwn2Own VM Escape Vulnerabilities — VMware on Tuesday patched a series of vulnerabilities uncovered earlier this month at Pwn2Own. The flaws enabled an attacker to execute code on a workstation and carry out a virtual machine escape to attack a host server.balena - A Moby-based container engine for IoT — A Moby-based container engine for IoT
We've got the latest on some mysterious mac malware that's been lurking for years, a handy new tool to help you monitor, backup and generally work with your DNS infrastructure & possibly more problems for Symantec, the certificate authority who just can't seem to get things right.
Spreading the DDoS Disease & selling the cure, we have the audit results of TrueCrypt’s replacement & a comprehensive history of the most important events that shaped the SSL ecosystem. Plus your great questions, our answers & much... Much MORE!
From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network.Links:Introducing Nebula, the open source global overlay network from Slack nebula: A scalable overlay networking tool with a focus on performance, simplicity and security Nebula VPN routes between hosts privately, flexibly, and efficiently How to set up your own Nebula mesh VPN, step by step LINUX Unplugged 329: Flat Network Truthers Cloudy with a chance of neurons: The tools that make neural networks work Welcome To Colaboratory ImageColorizer Notebook DeOldify: A Deep Learning based project for colorizing and restoring old images (and video!)
We continue our take on ZFS as Jim and Wes dive in to snapshots, replication, and the magic on copy on write. Plus some handy tools to manage your snapshots, rsync war stories, and more!Links:sanoid: Policy-driven snapshot management and replication tools. — Sanoid is a policy-driven snapshot management tool for ZFS filesystems. When combined with the Linux KVM hypervisor, you can use it to make your systems functionally immortal. Syncoid — Sanoid also includes a replication tool, syncoid, which facilitates the asynchronous incremental replication of ZFS filesystems. Copy-on-write - WikipediaZFS PaperThe Magic Behind APFS: Copy-On-Write — The brand-new Apple File System (APFS) that landed with macOS High Sierra brings a handful of important new features that rely on a technique called copy-on-write (CoW).Chapter 19. The Z File System (ZFS)
That Equifax hack? So last week! This weeks vulnerability is BlueBorne, a new attack on just about every bluetooth capable device. We've got the details, and what you need to know to get patched. Plus some of our favorite overlooked shell commands & a breakdown of the ACLUs recent lawsuit to protect your rights at the border.
We break down the Bicycle attack against SSL, the story of Brian Krebs’s PayPal account getting backed & the scoop on the Juniper Saga. Plus some great questions, our answers, a news breaking round up & much more!
We take a look back at some of the big stories of 2015, at least, as we see it. Plus the round up & more!
Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS. Plus the importance of sane defaults and why netdata belongs on every system.Links:Why you want QoS - Netdata Documentation — One of the features the Linux kernel has, but it is rarely used, is its ability to apply QoS on traffic. Even most interesting is that it can apply QoS to both inbound and outbound traffic.FireQOS Wiki — FireQOS is a helper to assist you configure traffic shaping on Linux. FireHOL - Linux firewalling and traffic shaping for humans — FireHOL is a language (and a program to run it) which builds secure, stateful firewalls from easy to understand, human-readable configurations. The configurations stay readable even for very complex man page — Traffic Control consists of the following: SHAPING When traffic is shaped, its rate of transmission is under control. Shaping may be more than lowering the available bandwidth - it is also used to smooth out bursts in traffic for better network behaviour. Shaping occurs on egress. SCHEDULING By scheduling the transmission of packets it is possible to improve interactivity for traffic that needs it while still guaranteeing bandwidth to bulk transfers. Reordering is also called prioritizing, and happens only on egress. POLICING Where shaping deals with transmission of traffic, policing pertains to traffic arriving. Policing thus occurs on ingress. DROPPING Traffic exceeding a set bandwidth may also be dropped forthwith, both on ingress and on egress.Overview of Traffic Control Concepts — Traffic control is the name given to the sets of queuing systems and mechanisms by which packets are received and transmitted on a router. This includes deciding which (and whether) packets to accept at what rate on the input of an interface and determining which packets to transmit in what order at what rate on the output of an interface.Advanced traffic control - ArchWikiJourney to the Center of the Linux Kernel: Traffic Control, Shaping and QoS — This document describes the Traffic Control subsystem of the Linux Kernel in depth, algorithm by algorithm, and shows how it can be used to manage the outgoing traffic of a Linux system.Netdata Real-time performance monitoring, done right! — Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring agent you install on all your systems and containers.Add more charts to netdata — To collect non-system metrics, netdata supports a plugin architecture.
The squirrels have gotten in the mailbag as the guys discuss an unfortunate new vulnerability in Squirrelmail. Plus an interesting new entrant to the anonymous domain name space from some of the internet’s most famous rabble rousers. Then Dan & Wes get just a bit jealous of Canada’s new take on net neutrality & more!
The details on the latest WordPress vulnerability, then the surprising, or perhaps not so surprising takeover of a cybersecurity firms website & watch out, hacker's may be using your microphone to steal your data! Plus a packed roundup, your feedback & so much more!
The ShadowBrokers release a batch of the NSA’s tools & we dive in. A Google login issue allows for credential theft & researchers map the Netflix content delivery network! Plus great feedback, follow up, a rockin' roundup & much, much more!
A research team finds various ways to attack LastPass, how to use a cocktail of current Android exploits to own a device & hacking a point of sale system using poisoned barcodes! Plus some great questions, our answers, a rockin roundup & much, much more!
Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. Plus we discuss Let's Encrypt’s Wildcard support and explain what ACME v2 is. Then we detail the bad position Samba 4 admins are in, and the real cause of these recent 1.7Tbps DDoS attacks.Sponsored By:Ting: Save $25 off a device, or get $25 in service credits! Promo Code: Visit techsnap.ting.comDigital Ocean: Apply our promo snapocean after you create your account, and get a $10 credit. Promo Code: snapoceaniXSystems: Get a system purpose built for you. Promo Code: Tell them we sent you!Links:Hardcoded Password Found in Cisco Software — Cisco says that an attacker could exploit this vulnerability (CVE-2018-0141) by connecting to the affected system via Secure Shell (SSH) using the hardcoded password.Potent malware that hid for six years spread through routers — "The malware is highly advanced, solving all sorts of problems from a technical perspective and often in a very elegant way, combining older and newer components in a thoroughly thought-through, long-term operation, something to expect from a top-notch well-resourced actor."CVE 2018-1057: Authenticated Samba users can change other users' password — On a Samba 4 AD DC the LDAP server in all versions of Samba from 4.0.0 onwards incorrectly validates permissions to modify passwords over LDAP allowing authenticated users to change any other users' passwords, including administrative users and privileged service accounts (eg Domain Controllers).CVE-2018-1057 - SambaWiki Workarounds — Revoke the change passwords right for 'the world' from all user objects (including computers) in the directory, leaving only the right to change a user's own password.ACME v2 and Wildcard Certificate Support is Live — We’re pleased to announce that ACMEv2 and wildcard certificate support is live! It just got much easier to wage record-breaking DDoSes — Within days of the new technique going public, security firms reported it being used in a record-setting 1.3 terabit-per-second DDoS against Github and then, two days later, a record-topping 1.7 Tbps attack against an unnamed US-based service provider.The real cause of large DDoS — All the gigantic headline-grabbing attacks are what we call "L3" (Layer 3 OSI[1]). This kind of attack has a common trait - the malicious software sends as many packets as possible onto the network. Project Nimble – Netflix TechBlog — We set ourselves an aggressive goal of being able to fail over traffic in less than 10 minutes. Follow Up: Alex has a tip for AlexQuestion: Oliver asks about a fail2ban replacement S3Scanner — Scan for open S3 buckets and dump Chromium is also a Snap
We’ve got the latest on the ‘Stack Crash’ vulnerability affecting a UNIX OS near you. Plus thanks to a recent RNC data leak we’ve got your name, address, birthday & a lot more personal information! Then Dan does a deep dive on his DNS infrastructure, some recent improvements & his integration with Let’s Encrypt. Plus some fantastic feedback, a robust roundup & so much more!
GNUPG has just released a fix for a dangerous side-channel attack that could expose your private key, a leak of NASDAQ test data was picked up by real news organizations and caused a bit of a panic & the fascinating story of a security researched who managed to take over all .io domains with a little sleuthing and a few domain registrations. Plus Dan's got so much new stuff it has its own segment, and of course your feedback, a fantastic round-up & so much more!
Rate Podcast
Get episode alerts
Subscribe to receive notifications by email whenever this podcast releases new episodes.

Subscribe to receive notifications by email whenever this podcast releases new episodes.

Recommend This Podcast

Recommendation sent



Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Podcast Details

Dec 5th, 2014
Latest Episode
Mar 20th, 2020
Release Period
No. of Episodes
Avg. Episode Length
About 1 hour

Podcast Tags

Do you host or manage this podcast?
Claim and edit this page to your liking.
Are we missing an episode or update?
Use this to check the RSS feed immediately.