Login/Register
Login
Register
Podcaster Register
×
Home
Top Podcaster
Networks
By Language
By Country
By Category
About Us
Contact Us
Faqs
Features
News & Blogs
Privacy Policy
Terms Of Use
☰
Home
Top Podcaster
Guest
Login
Register
Podcaster Register
Comedy
Arts
Games & Hobbies
Business
Motivation
More
Religion & Spirituality
Education
Arts and Design
Health
Fashion & Beauty
Government & Organizations
Kids & family
Music
News & Politics
Science & Medicine
Society & Culture
Sports & Recreation
TV & Film
Technology
Philosophy
Storytelling
Horror and Paranomal
True Crime
Leisure
Travel
Fiction
Crypto
Marketing
History
Home
Top Podcaster
Networks
By Language
By Country
By Category
About Us
Contact Us
Faqs
Features
News & Blogs
Privacy Policy
Terms Of Use
Search
By Category
Arts
Arts and Design
Business
Comedy
Crypto
Education
Fashion & Beauty
Fiction
Games & Hobbies
Government & Organizations
Health
History
Horror and Paranomal
Kids & family
Leisure
Marketing
Motivation
Music
News & Politics
Philosophy
Religion & Spirituality
Science & Medicine
Society & Culture
Sports & Recreation
Storytelling
Technology
Travel
True Crime
TV & Film
By Language
Afar
Afrikaans
Akan
Albanian
Amharic
Arabic
Armenian
Assamese
Azerbaijani
Bambara
Basque
Belarusian
Bengali
Bihari languages
Bosnian
Breton
Bulgarian
Burmese
Catalan Valencian Active
Central Khmer
Chamorro
Chechen
Chichewa
Corsican
Croatian
Czech
Danish
Dutch
Dzongkha
English
Esperanto
Estonian
Ewe
Faroese
Finnish
French
Fulah
Gaelic, Scottish
Galician
Georgian
Georgien
German
Greek
Greek (modern)
Greenlandic
Gujarati
Hausa
Hebrew (modern)
Hindi
Hungarian
Icelandic
Indonesian
Irish
Italian
Japanese
Javanese
Kannada
Kazakh
Kinyarwanda
Korean
Kurdish
Kyrgyz/ Kirghiz
Latin
Latvian
Lithuanian
Luxembourgish
Macedonian
Maithili
Malagasy
Malay
Malayalam
Maltese
Mandarin Chinese
Maori
Marathi
Mongolian
Nepali
North Ndebele
Northern Sami
Norwegian
Norwegian Bokmål
Norwegian Nynorsk
Oriya
Oromo
Pashto
Persian
Polish
Portuguese
Punjabi
Quechua
Romanian
Romansh
Russian
Sanskrit
Serbian
Serbian
Serbo-Croato-Slovenian
Sindhi
Sinhala
Slovak
Slovenian
Somali
South Ndebele
Spanish
Sundanese
Swahili
Swedish
Tagalog
Tajik
Tamil
Tatar
Telugu
Thai
Tibetan
Tigrinya
Tongan
Tswana
Turkish
Twi
Uighur. Uyghur
Ukrainian
Urdu
Uzbek
Vietnamese
Welsh
Wolof
Xhosa
Yiddish
Yoruba
Zulu
By Country
Afghanistan
Algeria
Andorra
Argentina
Armenia
Australia
Austria
Azerbaijan
Bangladesh
Belgium
Bosnia and Herzegovina
Brazil
Bulgaria
Canada
Chile
China
Colombia
Costa Rica
Croatia
Cyprus
Czech Republic
Denmark
Dominican Republic
Ecuador
Egypt
El Salvador
Estonia
Faroe Islands
Finland
France
Georgia
Germany
Greece
Hong Kong
Hungary
Iceland
India
Indonesia
Iran
Ireland
Israel
Italy
Japan
Kazakhstan
Kuwait
Lao Peoples Democratic Republic
Lithuania
Luxembourg
Mexico
Namibia
Netherlands
New Zealand
Niger
North Korea
Norway
Pakistan
Panama
Peru
Philippines
Poland
Portugal
Puerto Rico
Republic of the Congo
Romania
Russia
Saudi Arabia
Serbia
Slovenia
Somalia
South Africa
South Korea
Spain
Sri Lanka
Sweden
Switzerland
Syria
Taiwan
Tajikistan
Thailand
Turkey
UAE
UK
Ukraine
USA
Uzbekistan
Venezuela
Vietnam
Home
>
Tenable Network Security Podcast
> Tenable Network Security Podcast - Episode 27
Podcast:
Tenable Network Security Podcast
Episode:
Tenable Network Security Podcast - Episode 27
Category:
Technology
Duration:
00:00:00
Publish Date:
2010-03-24 07:46:28
Description:
Welcome to the Tenable Network Security Podcast - Episode 27
Announcements
Two new blog posts have been released titled "
The Value Of Credentialed Vulnerability Scanning
and
Microsoft Patch Tuesday - March 2010 - "It Won't Happen To Me" Edition
.
New Nessus training now being offered at conferences! - The new course titled "Advanced Vulnerability Scanning Techniques Using Nessus" is now being offered at both
Black Hat Las Vegas 2010
and
BruCon 2010
. Its a two-day course that will put the student into a real-world environment, forced to solve problems and identify vulnerabilities using the advanced features of the Nessus vulnerability scanner.
You can provide feedback to this podcast and all of our social media outlets by visiting our discussions forum and adding messages to the "
Tenable Social Media
" thread. I would love to hear your feedback, questions, comments and suggestions!
I put up a call for ideas on new Nessus videos
, so please give us your feedback!
We're hiring
! - Visit the web site for more information about open positions, there are currently 7 open positions listed!
You can subscribe to the NEW
Tenable Network Security Podcast on iTunes! You can also subscribe to the
new podcast RSS feed
directly.
Tenable Tweets - You can find us on Twitter at
http://twitter.com/tenablesecurity
where we make various announcements, Nessus plugin statistics and more!
Stories
Password Lists - Can't Get Enough
- While this blog focuses on comparing some larger password lists, mostly taken from leaked accounts as a result of data breaches, its a good resource. The author links to several different passwords lists, including one called "The 500 worst passwords" (Warning: This list contains some foul language).
Client Side Web Application Attacks
- Malware authors continue to show their creative side with these attacks. The malware manipulates web pages and inserts extra fields, such as password or account numbers, into web page transactions.
DNS Tunneling - 3 Part Series
- DNS tunneling is one of those techniques that has evolved greatly over time. The initial theory was presented some time ago, and tools have been created and improved on over the years. It is now a viable option to send traffic out of a network. The DNS tunneling technique has even been packaged as an exploit payload
as demonstrated by Ron Bowes
.
Finding Malware on your network via cached DNS entries
- Excellent article that demonstrates use of a Perl script to find "evil" cached DNS entries. Basically, it takes a list of known malware domains, then queries your DNS servers to resolve them. If the entry comes back as cached, then someone else has already queried for that domain and you have a host that is infected.
WMI Enabled Plugins Enumerate Anti-Virus, Anti-Spyware, and Firewalls - Tenable has released three new plugins that use WMI to enumerate software and firewall configurations on remote hosts:
WMI Firewall Enumeration (45052)
WMI Anti-virus Enumeration (45051)
WMI Anti-spyware Enumeration (45050)
Download Tenable Podcast Episode 27
Total Play:
0
Your browser does not support the audio element.