ShmooCon Day 2 Part 2

Bring-It-On. This. Analysis of logs to see what happens when security researchers hit known bad hosts.

They seem to be looking at clients accessing known C2 hosts, then looking to see if they can access those clients. I’m trying to be shocked that these, largely, are coming from places like Iran and China.

Curiosity made me look at IPv6 adoption in Iran. Hmm. Interesting. While I really do think that there should not be government efforts to block traffic, I wholeheartedly support individuals/companies blocking traffic to/from that part of the Intertubes.


Next up is this on deception operations. Interesting, but really not a lot that I have any insight into.


Was kind of in and out on this; mislaid something and was looking for it. Anyway, I understand what they were trying to do and assume abandoned domains. It’s good information to have, but I’m not exactly sure what he’s really trying to do. Okay, it’s abandoned. If you’re worried about things like a dominate, there’s always something you can do with a wildcard, then narrow down from the bucket once you see something you want.


Did see all of this one. I understand, and sympathize with, her motivations and concerns. Yes, you should be able to make it harder to get your personal information. Yes, it should be protected by whomever collects it.

If CFPB is the answer, you asked the wrong question. There are very few things government does well; protecting consumers isn’t one of them. Hell, if you look at what’s going on in LA this week, you could easily extend that to delivering water, and providing fire protection, How about that TSA?


This one is interesting when it comes to things like cheap network cameras. Ubiquity for the hardware is a problem with so many of them sending foreign places, but I think probably a lot of it can be solved by just paying attention to what you purchase. I’m just wondering if you don’t need to do better with blocking outbound traffic. They talk about measures put into the firmwares that are there to circumvent protections, but I have to admit my skepticism. If you have a halfway-decent Layer-3 device, you can shut down traffic. If it’s this type of traffic coming from this device, it’s blocked.


As someone who is plugging through all of the Beavis & Butthead , “Silent Push” sounds flatulent.

But this is about FUNNULL, something I’ve never heard about.

Interesting that this is all because of gambling run offshore. These work for money laundering.

People like to gamble. People like to drink, smoke, do other drugs. It’s almost as if these are innately human behaviors.


And the last one. I’m thinking it’s stuff where I’ve completely lost the bubble. Intersting things at the site.

It’s absolutely interesting, but I really don’t have the stuff, or th time.

Leave a Reply

Your email address will not be published. Required fields are marked *