<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 02 May 2026 00:35:04 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Wannacry”</title>
    <link>https://techsnap.systems/tags/wannacry</link>
    <pubDate>Tue, 11 Jun 2019 20:15:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>405: Update Uncertainty</title>
  <link>https://techsnap.systems/405</link>
  <guid isPermaLink="false">8a576c94-20cc-497c-9de7-8402cd0a1135</guid>
  <pubDate>Tue, 11 Jun 2019 20:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/8a576c94-20cc-497c-9de7-8402cd0a1135.mp3" length="22166906" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability.</itunes:subtitle>
  <itunes:duration>30:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability.
Plus the importance of automatic updates, and Jim's new backup box.  
</description>
  <itunes:keywords>BlueKeep, RDP, GoldBrute, Terminal Services, Remote Desktop, Windows, Windows Update, network security, security, firewalls, worm, internet worm, wannacry, NSA, Microsoft, updates, patching, vulnerabilities, automatic updates, backups, supermicro, rosewill, ssd, hard drive, NAS, storage, brute force, industrial control systems, out of support, windows xp, patching policies, password security, remote desktop protocol, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability.</p>

<p>Plus the importance of automatic updates, and Jim&#39;s new backup box. </p><p>Links:</p><ul><li><a title="Errata Security: Almost One Million Vulnerable to BlueKeep Vuln (CVE-2019-0708)" rel="nofollow" href="https://blog.erratasec.com/2019/05/almost-one-million-vulnerable-to.html">Errata Security: Almost One Million Vulnerable to BlueKeep Vuln (CVE-2019-0708)</a> &mdash; Microsoft announced a vulnerability in it's "Remote Desktop" product that can lead to robust, wormable exploits. I scanned the Internet to assess the danger. I find nearly 1-million devices on the public Internet that are vulnerable to the bug. </li><li><a title="Even the NSA is urging Windows users to patch BlueKeep (CVE-2019-0708) | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/even-the-nsa-is-urging-windows-users-to-patch-bluekeep-cve-2019-0708/">Even the NSA is urging Windows users to patch BlueKeep (CVE-2019-0708) | ZDNet</a> &mdash; "[The] NSA is concerned that malicious cyber actors will use the vulnerability in ransomware and exploit kits containing other known exploits, increasing capabilities against other unpatched systems.

</li><li><a title="Prevent a worm by updating Remote Desktop Services (CVE-2019-0708) – MSRC" rel="nofollow" href="https://blogs.technet.microsoft.com/msrc/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/">Prevent a worm by updating Remote Desktop Services (CVE-2019-0708) – MSRC</a> &mdash; This&nbsp;vulnerability&nbsp;is pre-authentication and requires no user interaction. In other words, the vulnerability is ‘wormable’, meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way&nbsp;as the&nbsp;WannaCry&nbsp;malware spread across the globe in 2017</li><li><a title="BlueKeep - everyone agrees, you should patch PCs running legacy versions of Windows" rel="nofollow" href="https://www.grahamcluley.com/bluekeep-everyone-agrees-you-should-patch-pcs-running-legacy-versions-of-windows/">BlueKeep - everyone agrees, you should patch PCs running legacy versions of Windows</a> &mdash; I have this horrible feeling that the only way we’re going to wake the world up to the need to patch their ageing versions of Windows against the BlueKeep vulnerability is to wait until a malicious worm begins to spread around the world.

</li><li><a title="CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability" rel="nofollow" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708">CVE-2019-0708 | Remote Desktop Services&nbsp;Remote Code Execution Vulnerability</a> &mdash; A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

</li><li><a title="Customer guidance for CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability" rel="nofollow" href="https://support.microsoft.com/en-us/help/4500705/customer-guidance-for-cve-2019-0708">Customer guidance for CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability</a> &mdash; Microsoft is aware that some customers are running versions of Windows that no longer receive mainstream support. That means those customers will not have received any security updates to protect their systems from CVE-2019-0708, which is a critical remote code execution vulnerability.

</li><li><a title="Forget BlueKeep: Beware the GoldBrute | Threatpost" rel="nofollow" href="https://threatpost.com/forget-bluekeep-beware-goldbrute/145482/">Forget BlueKeep: Beware the GoldBrute | Threatpost</a> &mdash; In the past few days, GoldBrute (named after the Java class it uses) has attempted to brute-force Remote Desktop Protocol (RDP) connections for 1.5 million Windows systems and counting, according to Morphus Labs chief research officer Renato Marinho. The botnet is actively scanning the internet for machines with RDP exposed, and trying out weak or reused passwords to see if it can gain access to the systems.</li><li><a title="The GoldBrute botnet" rel="nofollow" href="https://nakedsecurity.sophos.com/2019/06/10/the-goldbrute-botnet-is-trying-to-crack-open-1-5-million-rdp-servers/">The GoldBrute botnet</a> &mdash; The latest round of bad news emerged last week when Morphus Labs’ researcher Renato Marinho announced the discovery of an aggressive brute force campaign against 1.5 million RDP servers by a botnet called ‘GoldBrute’.

</li><li><a title="Ubuntu Automatic Updates" rel="nofollow" href="https://help.ubuntu.com/lts/serverguide/automatic-updates.html.en">Ubuntu Automatic Updates</a> &mdash; The unattended-upgrades package can be used to automatically install updated packages, and can be configured to update all packages or just install security updates. </li><li><a title="AutoUpdates - Fedora Project Wiki" rel="nofollow" href="https://fedoraproject.org/wiki/AutoUpdates">AutoUpdates - Fedora Project Wiki</a> &mdash; You must decide whether to use automatic DNF or YUM updates on each of your machines. </li><li><a title="It&#39;s time to block Windows Automatic Updating | Computerworld" rel="nofollow" href="https://www.computerworld.com/article/3339563/its-time-to-block-windows-automatic-updating.html">It's time to block Windows Automatic Updating | Computerworld</a> &mdash; Those of you who feel it’s important to install Windows and Office patches the moment they come out – I salute you. The Windows world needs more cannon fodder.</li><li><a title="Windows 10&#39;s Ugly Updates Just Got Uglier. Here&#39;s How To Stay Safe by Disabling Automatic Updates" rel="nofollow" href="https://www.forbes.com/sites/kevinmurnane/2019/04/25/windows-10s-ugly-updates-just-got-uglier-heres-how-to-stay-safe-by-disabling-automatic-updates/#591e6ac67ff0">Windows 10's Ugly Updates Just Got Uglier. Here's How To Stay Safe by Disabling Automatic Updates</a> &mdash; Stay safe by disabling automatic updates? How is that possible? As a general rule of thumb, I’d never recommend disabling updates because security patches are essential. But the situation with Windows 10 has become intolerable. Microsoft continues to fail and continues to release update after update that they know, or should know, has serious problems.</li><li><a title="Jim&#39;s New Rig" rel="nofollow" href="https://twitter.com/jrssnet/status/1136721049641455617">Jim's New Rig</a> &mdash; I build, sell, and manage much bigger and meaner systems than this all the time. But this one's MINE! 12 hot swap bays, Ryzen 7 2700 w/ ECC RAM, quiet enough to share an office with, and the trays can take either HDD or SSD with no adapter needed.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability.</p>

<p>Plus the importance of automatic updates, and Jim&#39;s new backup box. </p><p>Links:</p><ul><li><a title="Errata Security: Almost One Million Vulnerable to BlueKeep Vuln (CVE-2019-0708)" rel="nofollow" href="https://blog.erratasec.com/2019/05/almost-one-million-vulnerable-to.html">Errata Security: Almost One Million Vulnerable to BlueKeep Vuln (CVE-2019-0708)</a> &mdash; Microsoft announced a vulnerability in it's "Remote Desktop" product that can lead to robust, wormable exploits. I scanned the Internet to assess the danger. I find nearly 1-million devices on the public Internet that are vulnerable to the bug. </li><li><a title="Even the NSA is urging Windows users to patch BlueKeep (CVE-2019-0708) | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/even-the-nsa-is-urging-windows-users-to-patch-bluekeep-cve-2019-0708/">Even the NSA is urging Windows users to patch BlueKeep (CVE-2019-0708) | ZDNet</a> &mdash; "[The] NSA is concerned that malicious cyber actors will use the vulnerability in ransomware and exploit kits containing other known exploits, increasing capabilities against other unpatched systems.

</li><li><a title="Prevent a worm by updating Remote Desktop Services (CVE-2019-0708) – MSRC" rel="nofollow" href="https://blogs.technet.microsoft.com/msrc/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/">Prevent a worm by updating Remote Desktop Services (CVE-2019-0708) – MSRC</a> &mdash; This&nbsp;vulnerability&nbsp;is pre-authentication and requires no user interaction. In other words, the vulnerability is ‘wormable’, meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way&nbsp;as the&nbsp;WannaCry&nbsp;malware spread across the globe in 2017</li><li><a title="BlueKeep - everyone agrees, you should patch PCs running legacy versions of Windows" rel="nofollow" href="https://www.grahamcluley.com/bluekeep-everyone-agrees-you-should-patch-pcs-running-legacy-versions-of-windows/">BlueKeep - everyone agrees, you should patch PCs running legacy versions of Windows</a> &mdash; I have this horrible feeling that the only way we’re going to wake the world up to the need to patch their ageing versions of Windows against the BlueKeep vulnerability is to wait until a malicious worm begins to spread around the world.

</li><li><a title="CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability" rel="nofollow" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708">CVE-2019-0708 | Remote Desktop Services&nbsp;Remote Code Execution Vulnerability</a> &mdash; A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

</li><li><a title="Customer guidance for CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability" rel="nofollow" href="https://support.microsoft.com/en-us/help/4500705/customer-guidance-for-cve-2019-0708">Customer guidance for CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability</a> &mdash; Microsoft is aware that some customers are running versions of Windows that no longer receive mainstream support. That means those customers will not have received any security updates to protect their systems from CVE-2019-0708, which is a critical remote code execution vulnerability.

</li><li><a title="Forget BlueKeep: Beware the GoldBrute | Threatpost" rel="nofollow" href="https://threatpost.com/forget-bluekeep-beware-goldbrute/145482/">Forget BlueKeep: Beware the GoldBrute | Threatpost</a> &mdash; In the past few days, GoldBrute (named after the Java class it uses) has attempted to brute-force Remote Desktop Protocol (RDP) connections for 1.5 million Windows systems and counting, according to Morphus Labs chief research officer Renato Marinho. The botnet is actively scanning the internet for machines with RDP exposed, and trying out weak or reused passwords to see if it can gain access to the systems.</li><li><a title="The GoldBrute botnet" rel="nofollow" href="https://nakedsecurity.sophos.com/2019/06/10/the-goldbrute-botnet-is-trying-to-crack-open-1-5-million-rdp-servers/">The GoldBrute botnet</a> &mdash; The latest round of bad news emerged last week when Morphus Labs’ researcher Renato Marinho announced the discovery of an aggressive brute force campaign against 1.5 million RDP servers by a botnet called ‘GoldBrute’.

</li><li><a title="Ubuntu Automatic Updates" rel="nofollow" href="https://help.ubuntu.com/lts/serverguide/automatic-updates.html.en">Ubuntu Automatic Updates</a> &mdash; The unattended-upgrades package can be used to automatically install updated packages, and can be configured to update all packages or just install security updates. </li><li><a title="AutoUpdates - Fedora Project Wiki" rel="nofollow" href="https://fedoraproject.org/wiki/AutoUpdates">AutoUpdates - Fedora Project Wiki</a> &mdash; You must decide whether to use automatic DNF or YUM updates on each of your machines. </li><li><a title="It&#39;s time to block Windows Automatic Updating | Computerworld" rel="nofollow" href="https://www.computerworld.com/article/3339563/its-time-to-block-windows-automatic-updating.html">It's time to block Windows Automatic Updating | Computerworld</a> &mdash; Those of you who feel it’s important to install Windows and Office patches the moment they come out – I salute you. The Windows world needs more cannon fodder.</li><li><a title="Windows 10&#39;s Ugly Updates Just Got Uglier. Here&#39;s How To Stay Safe by Disabling Automatic Updates" rel="nofollow" href="https://www.forbes.com/sites/kevinmurnane/2019/04/25/windows-10s-ugly-updates-just-got-uglier-heres-how-to-stay-safe-by-disabling-automatic-updates/#591e6ac67ff0">Windows 10's Ugly Updates Just Got Uglier. Here's How To Stay Safe by Disabling Automatic Updates</a> &mdash; Stay safe by disabling automatic updates? How is that possible? As a general rule of thumb, I’d never recommend disabling updates because security patches are essential. But the situation with Windows 10 has become intolerable. Microsoft continues to fail and continues to release update after update that they know, or should know, has serious problems.</li><li><a title="Jim&#39;s New Rig" rel="nofollow" href="https://twitter.com/jrssnet/status/1136721049641455617">Jim's New Rig</a> &mdash; I build, sell, and manage much bigger and meaner systems than this all the time. But this one's MINE! 12 hot swap bays, Ryzen 7 2700 w/ ECC RAM, quiet enough to share an office with, and the trays can take either HDD or SSD with no adapter needed.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 349: All Natural Namespaces</title>
  <link>https://techsnap.systems/349</link>
  <guid isPermaLink="false">1f0cbb01-a231-4cf6-9f5d-f3ded5714065</guid>
  <pubDate>Thu, 21 Dec 2017 19:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/1f0cbb01-a231-4cf6-9f5d-f3ded5714065.mp3" length="36892159" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.
</itunes:subtitle>
  <itunes:duration>50:00</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.
Plus what might be the world’s most important killswitch, the real dollar values for stolen credentials and the 19 year old attack that’s back. 
</description>
  <content:encoded>
    <![CDATA[<p>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.</p>

<p>Plus what might be the world’s most important killswitch, the real dollar values for stolen credentials and the 19 year old attack that’s back.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="The Market for Stolen Account Credentials" rel="nofollow" href="https://krebsonsecurity.com/2017/12/the-market-for-stolen-account-credentials/">The Market for Stolen Account Credentials</a> &mdash; But oh, how times have changed! With dozens of sites in the underground now competing to purchase and resell credentials for a variety of online locations, it has never been easier for a botmaster to earn a handsome living based solely on the sale of stolen usernames and passwords alone.</li><li><a title="Hackers shut down plant by targeting its safety system" rel="nofollow" href="https://www.engadget.com/2017/12/17/hackers-shut-down-plant-by-targeting-safety-system/">Hackers shut down plant by targeting its safety system</a> &mdash;  FireEye reported that a plant of an unmentioned nature and location (other firms believe it's in the Middle East) was forced to shut down after a hack targeted its industrial safety system -- it's the first known instance of a breach like this taking place.</li><li><a title="FireEye Report on TRITON" rel="nofollow" href="https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html">FireEye Report on TRITON</a> &mdash; We assess with moderate confidence that the attacker was developing the capability to cause physical damage and inadvertently shutdown operations. This malware, which we call TRITON, is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers.</li><li><a title="ROBOT Attack: 19-Year-Old Bleichenbacher Attack" rel="nofollow" href="https://thehackernews.com/2017/12/bleichenbacher-robot-rsa.html">ROBOT Attack: 19-Year-Old Bleichenbacher Attack</a> &mdash; Dubbed ROBOT (Return of Bleichenbacher's Oracle Attack), the attack allows an attacker to perform RSA decryption and cryptographic operations using the private key configured on the vulnerable TLS servers.</li><li><a title="The ROBOT Attack - Offical Site" rel="nofollow" href="https://robotattack.org/">The ROBOT Attack - Offical Site</a></li><li><a title="Robot-detect: Detection script for the ROBOT vulnerability" rel="nofollow" href="https://github.com/robotattackorg/robot-detect">Robot-detect: Detection script for the ROBOT vulnerability</a> &mdash; Tool to detect the ROBOT attack (Return of Bleichenbacher's Oracle Threat).</li><li><a title="WannaCry: End of Year Retrospective" rel="nofollow" href="https://blog.kryptoslogic.com/malware/2017/12/20/end-of-year.html">WannaCry: End of Year Retrospective</a> &mdash; Since our Vantage team sinkholed and subsequently nullified the WannaCry attack on May 12th, 2017, we have been monitoring and maintaining the domain known as the WannaCry killswitch.</li><li><a title="Why NSA spied on inexplicably unencrypted Windows crash reports" rel="nofollow" href="https://arstechnica.com/information-technology/2013/12/why-nsa-spied-on-inexplicably-unencrypted-windows-crash-reports/">Why NSA spied on inexplicably unencrypted Windows crash reports</a> &mdash; And, according to slides published this weekend by Der Spiegel, this information also includes crash reports from Microsoft's Windows Error Reporting facility built in to Windows.</li><li><a title="Network namespaces" rel="nofollow" href="https://lwn.net/Articles/580893/">Network namespaces</a> &mdash;  As the name would imply, network namespaces partition the use of the network—devices, addresses, ports, routes, firewall rules, etc.—into separate boxes, essentially virtualizing the network within a single running kernel instance. </li><li><a title="namespaces - Linux manual page" rel="nofollow" href="http://man7.org/linux/man-pages/man7/namespaces.7.html">namespaces - Linux manual page</a> &mdash; A namespace wraps a global system resource in an abstraction that
       makes it appear to the processes within the namespace that they have
       their own isolated instance of the global resource.  Changes to the
       global resource are visible to other processes that are members of
       the namespace, but are invisible to other processes.  One use of
       namespaces is to implement containers.</li><li><a title="Network Namespaces » ADMIN Magazine" rel="nofollow" href="http://www.admin-magazine.com/Archive/2016/34/The-practical-benefits-of-network-namespaces">Network Namespaces » ADMIN Magazine</a> &mdash; With network namespaces, you can virtualize network devices, IPv4 and IPv6 protocol stacks, routing tables, ARP tables, and firewalls separately, as well as /proc/net, /sys/class/net/, QoS policies, port numbers, and sockets in such a way that individual applications can find a particular network setup without the use of containers.</li><li><a title="How to Get the Network Namespace Associated With a Socket" rel="nofollow" href="https://brennan.io/2017/03/08/sock-net/">How to Get the Network Namespace Associated With a Socket</a></li><li><a title="Network devices as virtual Ethernet devices" rel="nofollow" href="https://www.ibm.com/support/knowledgecenter/en/linuxonibm/com.ibm.linux.z.ldva/ldva_c_virtualizationOfNetworkDevices.html">Network devices as virtual Ethernet devices</a> &mdash; Virtualize network devices as virtual Ethernet devices by configuring direct MacVTap connections or virtual switches.</li><li><a title="Testing network software with pytest and Linux namespaces" rel="nofollow" href="https://vincent.bernat.im/en/blog/2016-testing-pytest-linux-namespaces">Testing network software with pytest and Linux namespaces</a></li><li><a title="Implementation of IEEE 802.1ab (LLDP)" rel="nofollow" href="https://vincentbernat.github.io/lldpd/">Implementation of IEEE 802.1ab (LLDP)</a> &mdash; LLDP is an industry standard protocol designed to supplant proprietary Link-Layer protocols such as EDP or CDP. The goal of LLDP is to provide an inter-vendor compatible mechanism to deliver Link-Layer notifications to adjacent network&nbsp;devices.</li><li><a title="WireGuard Routing &amp; Network Namespaces" rel="nofollow" href="https://www.wireguard.com/netns/">WireGuard Routing &amp; Network Namespaces</a> &mdash; This allows for some very cool properties. Namely, you can create the WireGuard interface in one namespace (A), move it to another (B), and have cleartext packets sent from namespace B get sent encrypted through a UDP socket in namespace A.</li><li><a title="VRF for Linux" rel="nofollow" href="https://cumulusnetworks.com/blog/vrf-for-linux/">VRF for Linux</a> &mdash; The concept of VRF was first introduced around 1999 for L3 VPNs, but it has become a fundamental feature for a networking OS. VRF provides traffic isolation at layer 3 for routing, similar to how you use a VLAN to isolate traffic at layer 2. Think multiple routing tables.</li><li><a title="linux/vrf.txt at master · torvalds/linux · GitHub" rel="nofollow" href="https://github.com/torvalds/linux/blob/master/Documentation/networking/vrf.txt">linux/vrf.txt at master · torvalds/linux · GitHub</a></li><li><a title="Using VRFs with linux " rel="nofollow" href="https://andir.github.io/posts/linux-ip-vrf/">Using VRFs with linux </a></li><li><a title="Feedback - DHCPDECLINE over and over again" rel="nofollow" href="https://slexy.org/view/s20dzBcJU2">Feedback - DHCPDECLINE over and over again</a></li><li><a title="DHCP Snooping - Cisco" rel="nofollow" href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html">DHCP Snooping - Cisco</a></li><li><a title="Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites" rel="nofollow" href="https://thehackernews.com/2017/12/wordpress-security-plugin.html">Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites</a> &mdash; In a blog post published on Tuesday, WordFence security firm revealed why WordPress recently kicked a popular Captcha plugin with more than 300,000 active installations out of its official plugin store.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.</p>

<p>Plus what might be the world’s most important killswitch, the real dollar values for stolen credentials and the 19 year old attack that’s back.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="The Market for Stolen Account Credentials" rel="nofollow" href="https://krebsonsecurity.com/2017/12/the-market-for-stolen-account-credentials/">The Market for Stolen Account Credentials</a> &mdash; But oh, how times have changed! With dozens of sites in the underground now competing to purchase and resell credentials for a variety of online locations, it has never been easier for a botmaster to earn a handsome living based solely on the sale of stolen usernames and passwords alone.</li><li><a title="Hackers shut down plant by targeting its safety system" rel="nofollow" href="https://www.engadget.com/2017/12/17/hackers-shut-down-plant-by-targeting-safety-system/">Hackers shut down plant by targeting its safety system</a> &mdash;  FireEye reported that a plant of an unmentioned nature and location (other firms believe it's in the Middle East) was forced to shut down after a hack targeted its industrial safety system -- it's the first known instance of a breach like this taking place.</li><li><a title="FireEye Report on TRITON" rel="nofollow" href="https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html">FireEye Report on TRITON</a> &mdash; We assess with moderate confidence that the attacker was developing the capability to cause physical damage and inadvertently shutdown operations. This malware, which we call TRITON, is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers.</li><li><a title="ROBOT Attack: 19-Year-Old Bleichenbacher Attack" rel="nofollow" href="https://thehackernews.com/2017/12/bleichenbacher-robot-rsa.html">ROBOT Attack: 19-Year-Old Bleichenbacher Attack</a> &mdash; Dubbed ROBOT (Return of Bleichenbacher's Oracle Attack), the attack allows an attacker to perform RSA decryption and cryptographic operations using the private key configured on the vulnerable TLS servers.</li><li><a title="The ROBOT Attack - Offical Site" rel="nofollow" href="https://robotattack.org/">The ROBOT Attack - Offical Site</a></li><li><a title="Robot-detect: Detection script for the ROBOT vulnerability" rel="nofollow" href="https://github.com/robotattackorg/robot-detect">Robot-detect: Detection script for the ROBOT vulnerability</a> &mdash; Tool to detect the ROBOT attack (Return of Bleichenbacher's Oracle Threat).</li><li><a title="WannaCry: End of Year Retrospective" rel="nofollow" href="https://blog.kryptoslogic.com/malware/2017/12/20/end-of-year.html">WannaCry: End of Year Retrospective</a> &mdash; Since our Vantage team sinkholed and subsequently nullified the WannaCry attack on May 12th, 2017, we have been monitoring and maintaining the domain known as the WannaCry killswitch.</li><li><a title="Why NSA spied on inexplicably unencrypted Windows crash reports" rel="nofollow" href="https://arstechnica.com/information-technology/2013/12/why-nsa-spied-on-inexplicably-unencrypted-windows-crash-reports/">Why NSA spied on inexplicably unencrypted Windows crash reports</a> &mdash; And, according to slides published this weekend by Der Spiegel, this information also includes crash reports from Microsoft's Windows Error Reporting facility built in to Windows.</li><li><a title="Network namespaces" rel="nofollow" href="https://lwn.net/Articles/580893/">Network namespaces</a> &mdash;  As the name would imply, network namespaces partition the use of the network—devices, addresses, ports, routes, firewall rules, etc.—into separate boxes, essentially virtualizing the network within a single running kernel instance. </li><li><a title="namespaces - Linux manual page" rel="nofollow" href="http://man7.org/linux/man-pages/man7/namespaces.7.html">namespaces - Linux manual page</a> &mdash; A namespace wraps a global system resource in an abstraction that
       makes it appear to the processes within the namespace that they have
       their own isolated instance of the global resource.  Changes to the
       global resource are visible to other processes that are members of
       the namespace, but are invisible to other processes.  One use of
       namespaces is to implement containers.</li><li><a title="Network Namespaces » ADMIN Magazine" rel="nofollow" href="http://www.admin-magazine.com/Archive/2016/34/The-practical-benefits-of-network-namespaces">Network Namespaces » ADMIN Magazine</a> &mdash; With network namespaces, you can virtualize network devices, IPv4 and IPv6 protocol stacks, routing tables, ARP tables, and firewalls separately, as well as /proc/net, /sys/class/net/, QoS policies, port numbers, and sockets in such a way that individual applications can find a particular network setup without the use of containers.</li><li><a title="How to Get the Network Namespace Associated With a Socket" rel="nofollow" href="https://brennan.io/2017/03/08/sock-net/">How to Get the Network Namespace Associated With a Socket</a></li><li><a title="Network devices as virtual Ethernet devices" rel="nofollow" href="https://www.ibm.com/support/knowledgecenter/en/linuxonibm/com.ibm.linux.z.ldva/ldva_c_virtualizationOfNetworkDevices.html">Network devices as virtual Ethernet devices</a> &mdash; Virtualize network devices as virtual Ethernet devices by configuring direct MacVTap connections or virtual switches.</li><li><a title="Testing network software with pytest and Linux namespaces" rel="nofollow" href="https://vincent.bernat.im/en/blog/2016-testing-pytest-linux-namespaces">Testing network software with pytest and Linux namespaces</a></li><li><a title="Implementation of IEEE 802.1ab (LLDP)" rel="nofollow" href="https://vincentbernat.github.io/lldpd/">Implementation of IEEE 802.1ab (LLDP)</a> &mdash; LLDP is an industry standard protocol designed to supplant proprietary Link-Layer protocols such as EDP or CDP. The goal of LLDP is to provide an inter-vendor compatible mechanism to deliver Link-Layer notifications to adjacent network&nbsp;devices.</li><li><a title="WireGuard Routing &amp; Network Namespaces" rel="nofollow" href="https://www.wireguard.com/netns/">WireGuard Routing &amp; Network Namespaces</a> &mdash; This allows for some very cool properties. Namely, you can create the WireGuard interface in one namespace (A), move it to another (B), and have cleartext packets sent from namespace B get sent encrypted through a UDP socket in namespace A.</li><li><a title="VRF for Linux" rel="nofollow" href="https://cumulusnetworks.com/blog/vrf-for-linux/">VRF for Linux</a> &mdash; The concept of VRF was first introduced around 1999 for L3 VPNs, but it has become a fundamental feature for a networking OS. VRF provides traffic isolation at layer 3 for routing, similar to how you use a VLAN to isolate traffic at layer 2. Think multiple routing tables.</li><li><a title="linux/vrf.txt at master · torvalds/linux · GitHub" rel="nofollow" href="https://github.com/torvalds/linux/blob/master/Documentation/networking/vrf.txt">linux/vrf.txt at master · torvalds/linux · GitHub</a></li><li><a title="Using VRFs with linux " rel="nofollow" href="https://andir.github.io/posts/linux-ip-vrf/">Using VRFs with linux </a></li><li><a title="Feedback - DHCPDECLINE over and over again" rel="nofollow" href="https://slexy.org/view/s20dzBcJU2">Feedback - DHCPDECLINE over and over again</a></li><li><a title="DHCP Snooping - Cisco" rel="nofollow" href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html">DHCP Snooping - Cisco</a></li><li><a title="Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites" rel="nofollow" href="https://thehackernews.com/2017/12/wordpress-security-plugin.html">Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites</a> &mdash; In a blog post published on Tuesday, WordFence security firm revealed why WordPress recently kicked a popular Captcha plugin with more than 300,000 active installations out of its official plugin store.</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
