TSA swap’s laptop

So the other day a friend of a friend brought my friend Bob at Laptop and a great story. He was on his way home to Cleveland from out of the country. TSA did the standard search and seizure of all his belongings and he moved along. A little while later he went to log into his laptop and notice it wasn’t his. He had a non qwerty keyboard on his and this was a qwerty system. So he went to TSA and they were not much help. In fact they wanted him to give them the laptop. He said “NO” and kept the laptop. He wanted to have something to trade with the guy who had his laptop. TSA claimed to remember checking a guy with the name that was the same as the login name but, they couldn’t help him. The airlines were not much help either. So for about 3 days he kept calling the TSA and no respond.

So he brought the laptop to Bob. Bob called the computer manufacturer and explained the issue. Then he escalated the issue to a supervisor. The supervisor said sorry no subpoena no info. He did suggest Bob talk to the corporate offices and gave him the phone number. So Bob called. They were not much help either. So when they transferred him to the product registration group the time had come to stop playing games. Or was time to start? “Hi, This is Bob. I’d like to check that my co-worker has registered his laptop correctly.” So Bob quickly learned that the machine hadn’t been registered.  So they wanted a subpoena to say they had no info. Got to love it.

A few hours later the friend finally received a call from the TSA. They said “Sorry we haven’t heard anything yet. If you can Hack into the machine and get any info go for it.”  So Bob did. The ophcrack disks didn’t work(Laptop Froze.) So he went old school and ran an Ubuntu liveCD. Mounted the local drive and was in.

Then the fun of finding the owner started. Bob noticed a resume, resignation file and a job description. So the assumption is that maybe it’s a manager and an employee is leaving. Bob also noticed the pictures and movies on the drive didn’t feel like a typical set of guy pictures. He went back and looked at the resume again and then it all made sense. The resume was for a lady. Her e-mail address that was on the resume was very similar to the login ID of the laptop. Bob found the owner.

The laptops got swapped back to the correct owners and everyone is happy except for the TSA.

Advertisements

Con Recovery

Wow, I kind of forgot about do an update to the Con 😦 but,

 Shmoocon was great! Got to see old friends and make new ones. Presentation went great. I hope to do another next year but with some audience participation. More details to come but get your cannons ready. 😉

Notacon was awesome as well. Met lots of people. It is always fun after the con when you send people LinkedIn friend requests. Thanks to everyone for helping make another great Con.

Shmoocon Paper Accepted

I’m speaking at Shmoocon. 

Check out Version 1 launcher video’s at : http://www.youtube.com/user/securidave

 

http://www.shmoocon.org/presentations-all.html

 (Mad Props to Larry. I never would have done if he didn’t ask me or write cfp.)

Building the 2008 and 2009 ShmooBall Launchers

Larry Pesce and David Lauer

Its a series of tubes! Pneumatic tubes!

This talk will describe the infamous 2008 and new 2009 ShmooBall Launchers built by Larry, and introduce Dave’s 2009 design. This talk will include all of the steps behind the planning and building process for our launchers, as well as the history, and backgrounds for the design. We’ll talk about the methods of building, safety considerations for the operator, target and environment, selection of building materials, design considerations and testing. We’ll also discuss some of the construction issues, failures and reasons for what may be considered design flaws. Discussion will also be had about improvements made, and how we can improve for next year.

Larry Pesce (Chief Research Officer, PaulDotCom Enterprises) – In the last 13 years in the computer industry, Larry has become a jack of all trades, most recently focused on the computer security field. In addition to his industry experience, Larry is also a Security Evangelist and co-host for the PaulDotCom Security Weekly podcast at http://www.pauldotcom.com. Larry is also Co-Author of “Linksys WRT54G Ultimate Hacking” and Contributing author of “Using Wireshark and Ethereal” and “How to cheat at configuring Open Source Security Tools”, all from Syngress publishing.

David Lauer has been involved in the computer industry since 1990. His broad background covers a large part of the IT industry. He began his career in programming and database development before he found his calling in networking and security (where his professional strengths and personal preferences mesh seamlessly). He has found that this knowledge of software development and database design often gives him a unique perspective on day-to-day issues. David is also a Co-Host of the SecurityJustice Podcast.

My BlackBerry Storm Review

Well I’ve had my Blackberry Storm for a few weeks now and I have a few tips to make it work better. I said “Better.”

1. Install the Blackberry Update that they released about a week after they started selling the Storm. This makes the phone act more like a Beta version.

2. Under the Options menu, Keyboard/screen set the font size to 10. This increases the size of the menus and other buttons. So if you have big hands/paws like me it’s easier to select the button you really want.

3. Remove the Blackberry Messenger. You need to uninstall it. This is one of the apps that Blackberry always keeps open for you so you have faster access to it. 

4. Close the apps your not using. A real pain, I know.

5. Don’t forget about rebooting the unit every now and then. I mean pull the battery for a good minute.

So even with these changes I still get it to crash and burn. (Just use the camera, video and playback.)

BlackBerry Storm Crashed again, and again.

BlackBerry Storm Crashed again, and again.

Physical Security in MDF,IDF, and Phone rooms

Physical Security in MDF,IDF, and Phone rooms

All the companies that I’ve worked for have had the policy of “Never leave unauthorized people alone in the MDF’s, IDF’s , and the phone room’s. “ That being said, over the past year or so I’ve been talking to Phone Guy’s/Gal’s and such that have come to do work in these “sensitive areas.”

I asked them “How many companies require someone be with them? The answer is about half. That doesn’t seem very good. So then I start asking about the people that hang out with them. It seems that again only about half are computer and/or phone people. It seems odd that you would put a guard on the worker that doesn’t know anything about phones and computers.

Stupidity in strange places

I just took my car in for repair at the dealer for some warranty work. My dealership does a lot of on-line stuff. They even have an open wireless network and workstations to use while waiting for car work to be done. So I received the following E-mail from them:

Customer No. #######
Your vehicle is complete and ready for pick up. Please look over the
attached invoice and call with any questions. If the invoice is correct,
you can reply with a credit card number and expiration date. I will run
the credit card number to help speed up the delivery process.
Thank You for Your Business. Jane Doe ###-###-#### ext ###

The biggest issue is the word “Reply” there is no link in the E-mail to go to a secure payment page. Have you ever looked over a dealership invoice? There is a lot of personal information on it about you and your car.

So I went to the dealership and talked to the manager. I was very happy that he listened to me and sent out some e-mails. The first was to stop using above text on invoices. The second was to ask his internal people if I was correct and what is PCI. Does anyone know if this would break PCI compliance?

Yahoo Spam?

I’ve been wondering why is Yahoo Spam so much worse than Google’s Spam. I mean worse in the quantity of E-mails not their content. So this morning I think I figured it out. It’s all about the cash.

From their site:

Mail Plus
Get personalized spam filtering with SpamGuard Plus, 20MB message size, no graphical ads, POP access and forwarding, and more great features for just $19.99/year – that’s less than $2/month.

I feel better knowing that the it is not the poor choice of spam blocking software that Yahoo choose to implement but rather that they want to earn money.